WorldWideScience

Sample records for bark beetle attack

  1. Effect of bark beetle (Ips typographus L.) attack on bark VOC emissions of Norway spruce (Picea abies Karst.) trees

    Science.gov (United States)

    Ghimire, Rajendra P.; Kivimäenpää, Minna; Blomqvist, Minna; Holopainen, Toini; Lyytikäinen-Saarenmaa, Päivi; Holopainen, Jarmo K.

    2016-02-01

    Climate warming driven storms are evident causes for an outbreak of the European spruce bark beetle (Ips typographus L.) resulting in the serious destruction of mature Norway spruce (Picea abies Karst.) forests in northern Europe. Conifer species are major sources of biogenic volatile organic compounds (BVOCs) in the boreal zone. Climate relevant BVOC emissions are expected to increase when conifer trees defend against bark beetle attack by monoterpene (MT)-rich resin flow. In this study, BVOC emission rates from the bark surface of beetle-attacked and non-attacked spruce trees were measured from two outbreak areas, Iitti and Lahti in southern Finland, and from one control site at Kuopio in central Finland. Beetle attack increased emissions of total MTs 20-fold at Iitti compared to Kuopio, but decreased the emissions of several sesquiterpenes (SQTs) at Iitti. At the Lahti site, the emission rate of α-pinene was positively correlated with mean trap catch of bark beetles. The responsive individual MTs were tricyclene, α-pinene, camphene, myrcene, limonene, 1,8-cineole and bornyl acetate in both of the outbreak areas. Our results suggest that bark beetle outbreaks affect local BVOC emissions from conifer forests dominated by Norway spruce. Therefore, the impacts of insect outbreaks are worth of consideration to global BVOC emission models.

  2. Early Detection of Bark Beetle Green Attack Using TerraSAR-X and RapidEye Data

    Directory of Open Access Journals (Sweden)

    Gerald Kändler

    2013-04-01

    Full Text Available Bark beetles cause widespread damages in the coniferous-dominated forests of central Europe and North America. In the future, areas affected by bark beetles may further increase due to climate change. However, the early detection of the bark beetle green attack can guide management decisions to prevent larger damages. For this reason, a field-based bark beetle monitoring program is currently implemented in Germany. The combination of remote sensing and field data may help minimizing the reaction time and reducing costs of monitoring programs covering large forested areas. In this case study, RapidEye and TerraSAR-X data were analyzed separately and in combination to detect bark beetle green attack. The remote sensing data were acquired in May 2009 for a study site in south-west Germany. In order to distinguish healthy areas and areas affected by bark beetle green attack, three statistical approaches were compared: generalized linear models (GLM, maximum entropy (ME and random forest (RF. The spatial scale (minimum mapping unit was 78.5 m2. TerraSAR-X data resulted in fair classification accuracy with a cross-validated Cohen’s Kappa Coefficient (kappa of 0.23. RapidEye data resulted in moderate classification accuracy with a kappa of 0.51. The highest classification accuracy was obtained by combining the TerraSAR-X and RapidEye data, resulting in a kappa of 0.74. The accuracy of ME models was considerably higher than the accuracy of GLM and RF models.

  3. The biophysical controls on tree defense against attacking bark beetles in managed pine forests of the Southeastern United States

    Science.gov (United States)

    Novick, K. A.; Miniat, C. F.; Denham, S. O.; Ritger, H. M.; Williams, C.; Guldin, J. M.; Bragg, D.; Coyle, D.

    2013-12-01

    Bark beetles are highly damaging pests capable of destroying large areas of southern pine forests, with significant consequences for regional timber supply and forest ecosystem carbon dynamics. A number of recent studies have shown that following bark beetle outbreak, significant effects on ecosystem carbon and water cycling can occur. Relatively few studies have explored how ecosystem carbon and water cycling interact with other factors to control the hazard or risk of bark beetle outbreaks; these interactions, and their representation in conceptual model frameworks, are the focus of this study. Pine trees defend against bark beetle attacks through the exudation of of resin - a viscous compound that deters attacking beetles through a combination of chemical and physical mechanisms. Constitutive resin flow (CRF, representing resin produced before attack) is assumed to be directly proportional to the balance between gross primary productivity (GPP) and net primary productivity (NPP) according to the Growth-Differentiation Balance theory (GDB). Thus, predictions for tree mortality and bark beetle dynamics under different management and climate regimes may be more accurate if a model framework describing the biophysical controls on resin production (e.g., GDB) were employed. Here, we synthesize measurements of resin flow, bark beetle dynamics, and ecosystem C flux from three managed loblolly pine forests in the Southeastern U.S.: the Duke Forest in Durham, NC; the Savannah River DOE site near Aiken, SC; and the Crossett Experimental Forest in southern Arkansas. We also explore the relationship between CRF and induced resin flow (IRF, representing the de novo synthesis of resin following stem wounding) in the latter two sites, where IRF was promoted by a novel tree baiting approach and prescribed fire, respectively. We assimilate observations within a hierarchical Bayesian framework to 1) test whether observations conform to the GDB hypothesis, and 2) explore effects

  4. Semiochemical Diversity in Practice: Antiattractant Semiochemicals Reduce Bark Beetle Attacks on Standing Trees—A First Meta-Analysis

    Directory of Open Access Journals (Sweden)

    Fredrik Schlyter

    2012-01-01

    Full Text Available Reduction of tree mortality caused by bark beetle attacks is not only important for forestry, but also essential for the preservation of biodiversity and forest carbon sinks in the face of climate change. While bark beetle mass trapping (a “pull” approach is implemented in practice, few studies exist to estimate its effect. The more complex “push-pull” tactic has, in contrast, been repeatedly tested during the last decade. I analysed published data from 32 experiments in 9 papers published during 2000–2011 on Ips typographus and Dendroctonus ponderosae, to test if there was an overall effect of antiattractant semiochemicals, that is, if treatments reduced the number of attacks on standing trees at the habitat or stand scale. This meta-analysis showed a substantial overall effect size (treatment-control means divided by their SD of −0.96, with some heterogeneity but little evidence of publication bias. There was no effect of beetle species or publication year. Heterogeneity resulted from different designs and beetle population levels (as year of study. The conventional “% Reduction” measure correlated well with effect size (2=0.7. Recommendations include more precise reporting of responses (avoiding dichotomous data, more unified experimental designs, and further meta-analyses that include “grey literature” and more beetle species.

  5. Composition and Elevation of Spruce Forests Affect Susceptibility to Bark Beetle Attacks: Implications for Forest Management

    OpenAIRE

    Massimo Faccoli; Iris Bernardinelli

    2014-01-01

    The spruce bark beetle, Ips typographus (L.) (Coleoptera: Curculionidae, Scolytinae), is one of the most destructive insects infesting spruce forests in Europe. Data concerning infestations of I. typographus occurring over the last 19 years (1994–2012) on the Southern Alps were analyzed in seven spruce forest types: (1) pure spruce plantations; (2) pure spruce reforestations; (3) pure spruce mountain forests; (4) pure spruce alpine forests; (5) spruce-conifer mixed forests; (6) spruce-broad...

  6. Predisposition to bark beetle attack by root herbivores and associated pathogens: Roles in forest decline, gap formation, and persistence of endemic bark beetle populations

    DEFF Research Database (Denmark)

    Aukema, Brian H.; Zhu, Jun; Møller, Jesper;

    2010-01-01

    , in that the proportion of killed trees that were not first colonized by root organisms increases. This positive feedback is very weak, however, and we propose the slope between beetle population density and reliance on host stress as a quantitative distinction along a gradient from noneruptive through eruptive species...... within the primary stem, root weevils that breed in root collars, and bark beetles that breed in basal stems. We quantify the sequence of events that drive this decline syndrome, with the primary emergent pattern being an interaction between below- and above-ground herbivores and their fungal symbionts...

  7. A dynamical model for bark beetle outbreaks.

    Science.gov (United States)

    Křivan, Vlastimil; Lewis, Mark; Bentz, Barbara J; Bewick, Sharon; Lenhart, Suzanne M; Liebhold, Andrew

    2016-10-21

    Tree-killing bark beetles are major disturbance agents affecting coniferous forest ecosystems. The role of environmental conditions on driving beetle outbreaks is becoming increasingly important as global climatic change alters environmental factors, such as drought stress, that, in turn, govern tree resistance. Furthermore, dynamics between beetles and trees are highly nonlinear, due to complex aggregation behaviors exhibited by beetles attacking trees. Models have a role to play in helping unravel the effects of variable tree resistance and beetle aggregation on bark beetle outbreaks. In this article we develop a new mathematical model for bark beetle outbreaks using an analogy with epidemiological models. Because the model operates on several distinct time scales, singular perturbation methods are used to simplify the model. The result is a dynamical system that tracks populations of uninfested and infested trees. A limiting case of the model is a discontinuous function of state variables, leading to solutions in the Filippov sense. The model assumes an extensive seed-bank so that tree recruitment is possible even if trees go extinct. Two scenarios are considered for immigration of new beetles. The first is a single tree stand with beetles immigrating from outside while the second considers two forest stands with beetle dispersal between them. For the seed-bank driven recruitment rate, when beetle immigration is low, the forest stand recovers to a beetle-free state. At high beetle immigration rates beetle populations approach an endemic equilibrium state. At intermediate immigration rates, the model predicts bistability as the forest can be in either of the two equilibrium states: a healthy forest, or a forest with an endemic beetle population. The model bistability leads to hysteresis. Interactions between two stands show how a less resistant stand of trees may provide an initial toe-hold for the invasion, which later leads to a regional beetle outbreak in the

  8. Contrasting Patterns of Diterpene Acid Induction by Red Pine and White Spruce to Simulated Bark Beetle Attack, and Interspecific Differences in Sensitivity Among Fungal Associates.

    Science.gov (United States)

    Mason, Charles J; Klepzig, Kier D; Kopper, Brian J; Kersten, Philip J; Illman, Barbara L; Raffa, Kenneth F

    2015-06-01

    Conifers possess a suite of physiochemical defenses that protect their subcortical tissues from bark beetle - fungal complexes. These defenses include rapid induction of terpenoids and phenolics at the site of attack. Studies of the distribution, induction, and bioactivity of conifer terpenoids have focused heavily on monoterpenes. We assessed induction of diterpene acids in white spruce (Picea glauca) and red pine (Pinus resinosa) to fungal associates of two bark beetles, and the responses of four spruce beetle (Dendroctonus rufipennis)-associated fungi to three diterpene acids. Constitutive phloem contents differed between species, in that red pine had extremely low concentrations of diterpene acids, whereas white spruce had substantial constitutive levels. Induction differed quantitatively. Both red pine and white spruce exhibited marked increases, but red pine underwent greater increases and achieved higher concentrations than white spruce. Induction also differed qualitatively in that red pine showed lower diversity and fewer compositional changes during induction than white spruce. In red pine,fungal inoculation accompanying wounding elicited greater increases than wounding alone, but in white spruce total concentrations were higher following wounding alone. Spruce beetle fungal symbiont growth varied among species and compounds. Some diterpenes elicited both stimulatory and inhibitory effects on fungi, depending on concentration. All four fungi exhibited higher tolerances compared to those associated with pine bark beetles in previous studies. Variation in tolerances to, and potentially metabolism of, diterpene acids by symbionts may reflect differences in constitutive levels between spruce and pine, and partially explain differences in concentrations achieved during induction.

  9. US Forest Service Western Bark Beetle Strategy

    Data.gov (United States)

    US Forest Service, Department of Agriculture — A map service on the www depicting Western Bark Beetle Strategy (WBBS) activities reported through the U.S. Forest Service FACTS database. Activities include...

  10. Induced terpene accumulation in Norway spruce inhibits bark beetle colonization in a dose-dependent manner.

    Directory of Open Access Journals (Sweden)

    Tao Zhao

    Full Text Available BACKGROUND: Tree-killing bark beetles (Coleoptera, Scolytinae are among the most economically and ecologically important forest pests in the northern hemisphere. Induction of terpenoid-based oleoresin has long been considered important in conifer defense against bark beetles, but it has been difficult to demonstrate a direct correlation between terpene levels and resistance to bark beetle colonization. METHODS: To test for inhibitory effects of induced terpenes on colonization by the spruce bark beetle Ips typographus (L. we inoculated 20 mature Norway spruce Picea abies (L. Karsten trees with a virulent fungus associated with the beetle, Ceratocystis polonica (Siem. C. Moreau, and investigated induced terpene levels and beetle colonization in the bark. RESULTS: Fungal inoculation induced very strong and highly variable terpene accumulation 35 days after inoculation. Trees with high induced terpene levels (n = 7 had only 4.9% as many beetle attacks (5.1 vs. 103.5 attacks m(-2 and 2.6% as much gallery length (0.029 m m(-2 vs. 1.11 m m(-2 as trees with low terpene levels (n = 6. There was a highly significant rank correlation between terpene levels at day 35 and beetle colonization in individual trees. The relationship between induced terpene levels and beetle colonization was not linear but thresholded: above a low threshold concentration of ∼100 mg terpene g(-1 dry phloem trees suffered only moderate beetle colonization, and above a high threshold of ∼200 mg terpene g(-1 dry phloem trees were virtually unattacked. CONCLUSION/SIGNIFICANCE: This is the first study demonstrating a dose-dependent relationship between induced terpenes and tree resistance to bark beetle colonization under field conditions, indicating that terpene induction may be instrumental in tree resistance. This knowledge could be useful for developing management strategies that decrease the impact of tree-killing bark beetles.

  11. Resin duct characteristics associated with tree resistance to bark beetles across lodgepole and limber pines.

    Science.gov (United States)

    Ferrenberg, Scott; Kane, Jeffrey M; Mitton, Jeffry B

    2014-04-01

    Bark beetles have recently killed billions of trees, yet conifer defenses are formidable and some trees resist attack. A primary anti-insect defense of pines is oleoresin from a system of resin ducts throughout the tree. Resin defense traits are heritable, and evidence suggests that resin duct characteristics are associated with resistance to insects. However, comparisons of resin ducts in trees killed by bark beetles to trees that resisted attack are unavailable. We compared vertical resin duct characteristics (number, density, and size) and growth rates from trees that were "resistant" (survived mass attack) versus "susceptible" (killed by attack) to bark beetles in lodgepole (Pinus contorta) and limber (Pinus flexilis) pines. Resistant trees of both species had significantly more resin ducts in recent growth than susceptible trees. Discriminant analysis (DA) correctly categorized 84% of lodgepole and 92% of limber pines as susceptible/resistant based on combinations of resin duct and growth characteristics from recent 5- through 20-year growth intervals. DA models using measures from only the most recent 5 years of growth correctly categorized 72 and 81% of lodgepole and limber pines, respectively. Comparing resistant to susceptible trees independent of species identity led to the correct categorization of 82% of trees based on factors from 5- to 20-year intervals, and 73% of trees using only resin duct counts from the most recent 5 years. We conclude that resin duct characteristics can be used to assess tree resistance to bark beetles across pine species, and offer a metric for management to enhance pest resistance.

  12. Conifer stored resources and resistance to a fungus associated with the spruce bark beetle Ips typographus.

    Directory of Open Access Journals (Sweden)

    Eleanor C Lahr

    Full Text Available Bark beetles and associated fungi are among the greatest natural threats to conifers worldwide. Conifers have potent defenses, but resistance to beetles and fungal pathogens may be reduced if tree stored resources are consumed by fungi rather than used for tree defense. Here, we assessed the relationship between tree stored resources and resistance to Ceratocystis polonica, a phytopathogenic fungus vectored by the spruce bark beetle Ips typographus. We measured phloem and sapwood nitrogen, non-structural carbohydrates (NSC, and lipids before and after trees were attacked by I. typographus (vectoring C. polonica or artificially inoculated with C. polonica alone. Tree resistance was assessed by measuring phloem lesions and the proportion of necrotic phloem around the tree's circumference following attack or inoculation. While initial resource concentrations were unrelated to tree resistance to C. polonica, over time, phloem NSC and sapwood lipids declined in the trees inoculated with C. polonica. Greater resource declines correlated with less resistant trees (trees with larger lesions or more necrotic phloem, suggesting that resource depletion may be caused by fungal consumption rather than tree resistance. Ips typographus may then benefit indirectly from reduced tree defenses caused by fungal resource uptake. Our research on tree stored resources represents a novel way of understanding bark beetle-fungal-conifer interactions.

  13. Spatio-Temporal Distribution of Bark and Ambrosia Beetles in a Brazilian Tropical Dry Forest.

    Science.gov (United States)

    Macedo-Reis, Luiz Eduardo; Novais, Samuel Matos Antunes de; Monteiro, Graziela França; Flechtmann, Carlos Alberto Hector; Faria, Maurício Lopes de; Neves, Frederico de Siqueira

    2016-01-01

    Bark and the ambrosia beetles dig into host plants and live most of their lives in concealed tunnels. We assessed beetle community dynamics in tropical dry forest sites in early, intermediate, and late successional stages, evaluating the influence of resource availability and seasonal variations in guild structure. We collected a total of 763 beetles from 23 species, including 14 bark beetle species, and 9 ambrosia beetle species. Local richness of bark and ambrosia beetles was estimated at 31 species. Bark and ambrosia composition was similar over the successional stages gradient, and beta diversity among sites was primarily determined by species turnover, mainly in the bark beetle community. Bark beetle richness and abundance were higher at intermediate stages; availability of wood was the main spatial mechanism. Climate factors were effectively non-seasonal. Ambrosia beetles were not influenced by successional stages, however the increase in wood resulted in increased abundance. We found higher richness at the end of the dry and wet seasons, and abundance increased with air moisture and decreased with higher temperatures and greater rainfall. In summary, bark beetle species accumulation was higher at sites with better wood production, while the needs of fungi (host and air moisture), resulted in a favorable conditions for species accumulation of ambrosia. The overall biological pattern among guilds differed from tropical rain forests, showing patterns similar to dry forest areas. PMID:27271969

  14. Linking Increasing Drought Stress to Scots Pine Mortality and Bark Beetle Infestations

    Directory of Open Access Journals (Sweden)

    Matthias Dobbertin

    2007-01-01

    Full Text Available In the dry Swiss Rhone Valley, Scots pine forests have experienced increased mortality in recent years. It has commonly been assumed that drought events and bark beetles fostered the decline, however, whether bark beetle outbreaks increased in recent years and whether they can be linked to drought stress or increasing temperature has never been studied.

  15. Bacterial and fungal symbionts of parasitic Dendroctonus bark beetles.

    Science.gov (United States)

    Dohet, Loïc; Grégoire, Jean-Claude; Berasategui, Aileen; Kaltenpoth, Martin; Biedermann, Peter H W

    2016-09-01

    Bark beetles (Curculionidae: Scolytinae) are one of the most species-rich herbivorous insect groups with many shifts in ecology and host-plant use, which may be mediated by their bacterial and fungal symbionts. While symbionts are well studied in economically important, tree-killing species, little is known about parasitic species whose broods develop in living trees. Here, using culture-dependent and independent methods, we provide a comprehensive overview of the associated bacteria, yeasts and filamentous fungi of the parasitic Dendroctonus micans, D. punctatus and D. valens, and compare them to those of other tree-inhabiting insects. Despite inhabiting different geographical regions and/or host trees, the three species showed similar microbial communities. Enterobacteria were the most prevalent bacteria, in particular Rahnella, Pantoea and Ewingella, in addition to Streptomyces Likewise, the yeasts Candida/Cyberlindnera were the most prominent fungi. All these microorganisms are widespread among tree-inhabiting insects with various ecologies, but their high prevalence overall might indicate a beneficial role such as detoxification of tree defenses, diet supplementation or protection against pathogens. As such, our results enable comparisons of symbiont communities of parasitic bark beetles with those of other beetles, and will contribute to our understanding of how microbial symbioses facilitate dietary shifts in insects. PMID:27387908

  16. Fungal Volatiles Can Act as Carbon Sources and Semiochemicals to Mediate Interspecific Interactions Among Bark Beetle-Associated Fungal Symbionts.

    Science.gov (United States)

    Cale, Jonathan A; Collignon, R Maxwell; Klutsch, Jennifer G; Kanekar, Sanat S; Hussain, Altaf; Erbilgin, Nadir

    2016-01-01

    Mountain pine beetle (Dendroctonus ponderosae) has killed millions of hectares of pine forests in western North America. Beetle success is dependent upon a community of symbiotic fungi comprised of Grosmannia clavigera, Ophiostoma montium, and Leptographium longiclavatum. Factors regulating the dynamics of this community during pine infection are largely unknown. However, fungal volatile organic compounds (FVOCs) help shape fungal interactions in model and agricultural systems and thus may be important drivers of interactions among bark beetle-associated fungi. We investigated whether FVOCs can mediate interspecific interactions among mountain pine beetle's fungal symbionts by affecting fungal growth and reproduction. Headspace volatiles were collected and identified to determine species-specific volatile profiles. Interspecific effects of volatiles on fungal growth and conidia production were assessed by pairing physically-separated fungal cultures grown either on a carbon-poor or -rich substrate, inside a shared-headspace environment. Fungal VOC profiles differed by species and influenced the growth and/or conidia production of the other species. Further, our results showed that FVOCs can be used as carbon sources for fungi developing on carbon-poor substrates. This is the first report demonstrating that FVOCs can drive interactions among bark beetle fungal symbionts, and thus are important factors in beetle attack success. PMID:27583519

  17. High individual variation in pheromone production by tree-killing bark beetles (Coleoptera: Curculionidae: Scolytinae)

    Science.gov (United States)

    Pureswaran, Deepa S.; Sullivan, Brian T.; Ayres, Matthew P.

    2008-01-01

    Aggregation via pheromone signalling is essential for tree-killing bark beetles to overcome tree defenses and reproduce within hosts. Pheromone production is a trait that is linked to fitness, so high individual variation is paradoxical. One explanation is that the technique of measuring static pheromone pools overestimates true variation among individuals. An alternative hypothesis is that aggregation behaviour dilutes the contribution of individuals to the trait under selection and reduces the efficacy of natural selection on pheromone production by individuals. We compared pheromone measurements from traditional hindgut extractions of female southern pine beetles with those obtained by aerating individuals till they died. Aerations showed greater total pheromone production than hindgut extractions, but coefficients of variation (CV) remained high (60-182%) regardless of collection technique. This leaves the puzzle of high variation unresolved. A novel but simple explanation emerges from considering bark beetle aggregation behaviour. The phenotype visible to natural selection is the collective pheromone plume from hundreds of colonisers. The influence of a single beetle on this plume is enhanced by high variation among individuals but constrained by large group sizes. We estimated the average contribution of an individual to the pheromone plume across a range of aggregation sizes and showed that large aggregation sizes typical in mass attacks limit the potential of natural selection because each individual has so little effect on the overall plume. Genetic variation in pheromone production could accumulate via mutation and recombination, despite strong effects of the pheromone plume on the fitness of individuals within the aggregation. Thus, aggregation behaviour, by limiting the efficacy of natural selection, can allow the persistence of extreme phenotypes in nature.

  18. Ophiostoma species (Ascomycetes: Ophiostomatales) associated with bark beetles (Coleoptera: Scolytinae) colonizing Pinus radiata in northern Spain.

    Science.gov (United States)

    Romón, Pedro; Zhou, XuDong; Iturrondobeitia, Juan Carlos; Wingfield, Michael J; Goldarazena, Arturo

    2007-06-01

    Bark beetles (Coleoptera: Scolytinae) are known to be associated with fungi, especially species of Ophiostoma sensu lato and Ceratocystis. However, very little is known about these fungi in Spain. In this study, we examined the fungi associated with 13 bark beetle species and one weevil (Coleoptera: Entiminae) infesting Pinus radiata in the Basque Country of northern Spain. This study included an examination of 1323 bark beetles or their galleries in P. radiata. Isolations yielded a total of 920 cultures, which included 16 species of Ophiostoma sensu lato or their asexual states. These 16 species included 69 associations between fungi and bark beetles and weevils that have not previously been recorded. The most commonly encountered fungal associates of the bark beetles were Ophiostoma ips, Leptographium guttulatum, Ophiostoma stenoceras, and Ophiostoma piceae. In most cases, the niche of colonization had a significant effect on the abundance and composition of colonizing fungi. This confirms that resource overlap between species is reduced by partial spatial segregation. Interaction between niche and time seldom had a significant effect, which suggests that spatial colonization patterns are rarely flexible throughout timber degradation. The differences in common associates among the bark beetle species could be linked to the different niches that these beetles occupy. PMID:17668036

  19. Spatial characterization of bark beetle infestations by a multidate synergy of SPOT and Landsat imagery.

    Science.gov (United States)

    Latifi, Hooman; Schumann, Bastian; Kautz, Markus; Dech, Stefan

    2014-01-01

    Biological infestations in forests, e.g. the insect outbreaks, have been shown as favoured by future climate change trends. In Europe, the European spruce bark beetle (Ips typographus L.) is one of the main agents causing substantial economic disturbances in forests. Therefore, studies on spatio-temporal characterization of the area affected by bark beetle are of major importance for rapid post-attack management. We aimed at spatially detecting damage classes by combining multidate remote sensing data and a non-parametric classification. As study site served a part of the Bavarian Forest National Park (Germany). For the analysis, we used 10 geometrically rectified scenes of Landsat and SPOT sensors in the period between 2001 and 2011. The main objective was to explore the potential of medium-resolution data for classifying the attacked areas. A further aim was to explore if the temporally adjacent infested areas are able to be separated. The random forest (RF) model was applied using the reference data drawn from high-resolution aerial imagery. The results indicate that the sufficiently large patches of visually identifiable damage classes can be accurately separated from non-attacked areas. In contrast to those, the other mortality classes (current year, current year 1 and current year 2 infested classes) were mostly classified with higher commission or omission errors as well as higher classification biases. The available medium-resolution satellite images, combined with properly acquired reference data, are concluded to be adequate tools to map area-based infestations at advanced stages. However, the quality of reference data, the size of infested patches and the spectral resolution of remotely sensed data are the decisive factors in case of smaller areas. Further attempts using auxiliary height information and spatially enhanced data may refine such an approach.

  20. Spatial-temporal modeling of forest gaps generated by colonization from below- and above-ground bark beetle species

    DEFF Research Database (Denmark)

    Zhu, Jun; Rasmussen, Jakob Gulddahl; Møller, Jesper;

    2008-01-01

    the Great Lakes region. Here we examine the impact of two bark beetle groups, red turpentine beetles and pine engraver bark beetles, on tree mortality and the subsequent gap formation over time in a plantation in Wisconsin. We construct spatial-temporal statistical models that quantify the relations among...

  1. Mechanisms of Odor Coding in Coniferous Bark Beetles: From Neuron to Behavior and Application

    Directory of Open Access Journals (Sweden)

    Martin N. Andersson

    2012-01-01

    Full Text Available Coniferous bark beetles (Coleoptera: Curculionidae: Scolytinae locate their hosts by means of olfactory signals, such as pheromone, host, and nonhost compounds. Behavioral responses to these volatiles are well documented. However, apart from the olfactory receptor neurons (ORNs detecting pheromones, information on the peripheral olfactory physiology has for a long time been limited. Recently, however, comprehensive studies on the ORNs of the spruce bark beetle, Ips typographus, were conducted. Several new classes of ORNs were described and odor encoding mechanisms were investigated. In particular, links between behavioral responses and ORN responses were established, allowing for a more profound understanding of bark beetle olfaction. This paper reviews the physiology of bark beetle ORNs. Special focus is on I. typographus, for which the available physiological data can be put into a behavioral context. In addition, some recent field studies and possible applications, related to the physiological studies, are summarized and discussed.

  2. Volatile and Within-Needle Terpene Changes to Douglas-fir Trees Associated With Douglas-fir Beetle (Coleoptera: Curculionidae) Attack.

    Science.gov (United States)

    Giunta, A D; Runyon, J B; Jenkins, M J; Teich, M

    2016-08-01

    Mass attack by tree-killing bark beetles (Curculionidae: Scolytinae) brings about large chemical changes in host trees that can have important ecological consequences. For example, mountain pine beetle (Dendroctonus ponderosae Hopkins) attack increases emission of terpenes by lodgepole pine (Pinus contorta Dougl. ex Loud.), affecting foliage flammability with consequences for wildfires. In this study, we measured chemical changes to Douglas-fir (Pseudotsuga menziesii var. glauca (Mirb.) Franco) foliage in response to attack by Douglas-fir beetles (Dendroctonus pseudotsugae Hopkins) as trees die and crowns transitioned from green/healthy, to green-infested (year of attack), to yellow (year after attack), and red (2 yr after attack). We found large differences in volatile and within-needle terpene concentrations among crown classes and variation across a growing season. In general, emissions and concentrations of total and individual terpenes were greater for yellow and red needles than green needles. Douglas-fir beetle attack increased emissions and concentrations of terpene compounds linked to increased tree flammability in other conifer species and compounds known to attract beetles (e.g., [Formula: see text]-pinene, camphene, and D-limonene). There was little relationship between air temperature or within-needle concentrations of terpenes and emission of terpenes, suggesting that passive emission of terpenes (e.g., from dead foliage) does not fully explain changes in volatile emissions. The potential physiological causes and ecological consequences of these bark beetle-associated chemical changes are discussed. PMID:27231258

  3. Bark and Ambrosia Beetles Show Different Invasion Patterns in the USA.

    Directory of Open Access Journals (Sweden)

    Davide Rassati

    Full Text Available Non-native bark and ambrosia beetles represent a threat to forests worldwide. Their invasion patterns are, however, still unclear. Here we investigated first, if the spread of non-native bark and ambrosia beetles is a gradual or a discontinuous process; second, which are the main correlates of their community structure; third, whether those correlates correspond to those of native species. We used data on species distribution of non-native and native scolytines in the continental 48 USA states. These data were analyzed through a beta-diversity index, partitioned into species richness differences and species replacement, using Mantel correlograms and non-metric multidimensional scaling (NMDS ordination for identifying spatial patterns, and regression on distance matrices to test the association of climate (temperature, rainfall, forest (cover area, composition, geographical (distance, and human-related (import variables with β-diversity components. For both non-native bark and ambrosia beetles, β-diversity was mainly composed of species richness difference than species replacement. For non-native bark beetles, a discontinuous invasion process composed of long distance jumps or multiple introduction events was apparent. Species richness differences were primarily correlated with differences in import values while temperature was the main correlate of species replacement. For non-native ambrosia beetles, a more continuous invasion process was apparent, with the pool of non-native species arriving in the coastal areas that tended to be filtered as they spread to interior portions of the continental USA. Species richness differences were mainly correlated with differences in rainfall among states, while rainfall and temperature were the main correlates of species replacement. Our study suggests that the different ecology of bark and ambrosia beetles influences their invasion process in new environments. The lower dependency that bark beetles have

  4. Bark and Ambrosia Beetles Show Different Invasion Patterns in the USA.

    Science.gov (United States)

    Rassati, Davide; Faccoli, Massimo; Haack, Robert A; Rabaglia, Robert J; Petrucco Toffolo, Edoardo; Battisti, Andrea; Marini, Lorenzo

    2016-01-01

    Non-native bark and ambrosia beetles represent a threat to forests worldwide. Their invasion patterns are, however, still unclear. Here we investigated first, if the spread of non-native bark and ambrosia beetles is a gradual or a discontinuous process; second, which are the main correlates of their community structure; third, whether those correlates correspond to those of native species. We used data on species distribution of non-native and native scolytines in the continental 48 USA states. These data were analyzed through a beta-diversity index, partitioned into species richness differences and species replacement, using Mantel correlograms and non-metric multidimensional scaling (NMDS) ordination for identifying spatial patterns, and regression on distance matrices to test the association of climate (temperature, rainfall), forest (cover area, composition), geographical (distance), and human-related (import) variables with β-diversity components. For both non-native bark and ambrosia beetles, β-diversity was mainly composed of species richness difference than species replacement. For non-native bark beetles, a discontinuous invasion process composed of long distance jumps or multiple introduction events was apparent. Species richness differences were primarily correlated with differences in import values while temperature was the main correlate of species replacement. For non-native ambrosia beetles, a more continuous invasion process was apparent, with the pool of non-native species arriving in the coastal areas that tended to be filtered as they spread to interior portions of the continental USA. Species richness differences were mainly correlated with differences in rainfall among states, while rainfall and temperature were the main correlates of species replacement. Our study suggests that the different ecology of bark and ambrosia beetles influences their invasion process in new environments. The lower dependency that bark beetles have on climate

  5. Bark and Ambrosia Beetles Show Different Invasion Patterns in the USA

    Science.gov (United States)

    Rassati, Davide; Faccoli, Massimo; Haack, Robert A.; Rabaglia, Robert J.; Petrucco Toffolo, Edoardo; Battisti, Andrea; Marini, Lorenzo

    2016-01-01

    Non-native bark and ambrosia beetles represent a threat to forests worldwide. Their invasion patterns are, however, still unclear. Here we investigated first, if the spread of non-native bark and ambrosia beetles is a gradual or a discontinuous process; second, which are the main correlates of their community structure; third, whether those correlates correspond to those of native species. We used data on species distribution of non-native and native scolytines in the continental 48 USA states. These data were analyzed through a beta-diversity index, partitioned into species richness differences and species replacement, using Mantel correlograms and non-metric multidimensional scaling (NMDS) ordination for identifying spatial patterns, and regression on distance matrices to test the association of climate (temperature, rainfall), forest (cover area, composition), geographical (distance), and human-related (import) variables with β-diversity components. For both non-native bark and ambrosia beetles, β-diversity was mainly composed of species richness difference than species replacement. For non-native bark beetles, a discontinuous invasion process composed of long distance jumps or multiple introduction events was apparent. Species richness differences were primarily correlated with differences in import values while temperature was the main correlate of species replacement. For non-native ambrosia beetles, a more continuous invasion process was apparent, with the pool of non-native species arriving in the coastal areas that tended to be filtered as they spread to interior portions of the continental USA. Species richness differences were mainly correlated with differences in rainfall among states, while rainfall and temperature were the main correlates of species replacement. Our study suggests that the different ecology of bark and ambrosia beetles influences their invasion process in new environments. The lower dependency that bark beetles have on climate

  6. Associations of Conifer-Infesting Bark Beetles and Fungi in Fennoscandia

    Directory of Open Access Journals (Sweden)

    Michael J. Wingfield

    2012-02-01

    Full Text Available Bark beetles (Coleoptera, Scolytinae have a widespread association with fungi, especially with ophiostomatoid fungi (Ascomycota that cause blue staining of wood, and in some cases, serious tree diseases. In Fennoscandia, most studies of these fungi have focused on economically important bark beetle species and this is likely to have led to a biased view of the fungal biodiversity in the region. Recently, the associations between fungi and bark beetles in Fennoscandia have been shown to be more diverse than previously thought. Furthermore, they form complex and dynamic associations that are only now beginning to emerge. This review examines the current knowledge of the rather poorly known interactions between bark beetles, fungi and their conifer host trees in Fennoscandia. The diversity of ophiostomatoid species is discussed and the possible factors that influence the assemblages of fungal associates are considered for all species that are known to occur in the region. For many ophiostomatoid species found in Fennoscandia, little or nothing is known regarding their pathogenicity, particularly if they were to be transferred to new environments. We, therefore, draw attention to the possible threats of timber trade and climate change-induced invasions of new habitats by bark beetles and the fungi that can be moved along with them.

  7. Using lake sediment records to reconstruct bark beetle disturbances in western North America

    Directory of Open Access Journals (Sweden)

    Jesse Lee Morris

    2013-12-01

    Full Text Available The recent outbreak of native bark beetles in western North America is unprecedented in severity and scale, at least during the historical period. The aim of this work is to develop a proxy-based methodology to understand how bark beetle disturbances are recorded in lake sediments. Three hypotheses are tested to determine how the ecological impacts of severe spruce beetle (Dendroctonus rufipennis disturbances are recorded following mortality of Engelmann spruce (Picea engelmannii. Outbreaks are hypothesized to: (1 decrease the ratio of spruce to fir pollen; (2 increase soil erosion and mobilize terrestrial C; and (3 leach foliar N, enhancing algal productivity. To test these hypotheses, sediment cores from spruce beetle-affected basins were analyzed for pollen, insect remains, organic and minerogenic content, and isotopic and elemental concentrations. The dataset was tested statistically using generalized linear mixed models (GLMMs to determine if the response variables differed significantly between outbreak and non-outbreak periods. 

  8. Recent bark beetle outbreaks have little impact on streamflow in the Western United States

    Science.gov (United States)

    Slinski, Kimberly M.; Hogue, Terri S.; Porter, Aaron T.; McCray, John E.

    2016-07-01

    In the Western United States (US), the current mountain pine beetle (MPB; Dendroctonus ponderosae) epidemic has affected more than five million hectares since its start in 1996, including headwater catchments that supply water to much of the Western US. There is widespread concern that the hydrologic consequences of the extensive pine tree die-off will impact water supply across the Western US. While forest disturbance studies have shown that streamflow increases in response to tree harvest, the actual effect of bark beetle infestations on water supply remains widely debated. The current study evaluates watershed-level response following bark beetle outbreak for 33 watersheds in seven western states. Streamflow records were investigated to assess whether the timing and amount of stream discharge during bark beetle outbreak and early recovery periods were significantly different to pre-outbreak conditions. Results show no significant modification in peak flows or average daily streamflow following bark beetle infestation, and that climate variability may be a stronger driver of streamflow patterns and snowmelt timing than chronic forest disturbance.

  9. A Tale of Two Forests: Simulating Contrasting Lodgepole Pine and Spruce Forest Water and Carbon Fluxes Following Mortality from Bark Beetles

    Science.gov (United States)

    Ewers, B. E.; Peckham, S. D.; Mackay, D. S.; Pendall, E.; Frank, J. M.; Massman, W. J.; Reed, D. E.; Borkhuu, B.

    2014-12-01

    In recent decades, bark beetle infestation in western North America has reached epidemic levels. The resulting widespread forest mortality may have profound effects on present and future water and carbon cycling with potential negative consequences to a region that relies on water from montane and subalpine watersheds. We simulated stand-level ecosystem fluxes of water and carbon at two bark beetle-attacked conifer forests in southeast Wyoming, USA. The lower elevation site dominated by lodgepole pine (Pinus contorta) was attacked by mountain pine beetle (Dendroctonus ponderosae) during 2008-2010. The high elevation Engelmann spruce (Picea engelmannii) dominated site was attacked by the spruce beetle (Dendroctonus rufipennis) during roughly the same time period. Both beetle infestations resulted in >60% canopy mortality in the footprint of eddy covariance towers located at each site. However, carbon and water fluxes responses to mortality depended on the forest type. Using data collected at the sites, we scaled simulated plant hydraulic conductivity by either percent canopy mortality or loss of live tree basal area during infestation. We also simulated a case of no beetle attack. At the lodgepole site, the no-beetle model best fit the data and showed no significant change in growing season carbon flux and a 15% decrease in evapotranspiration (ET). However, at the spruce site, the simulation that tracked canopy loss agreed best with observations: carbon flux decreased by 72% and ET decreased by 31%. In the lodgepole stand, simulated soil water content agreed with spatially distributed measurements that were weighted to reflect overall mortality in the tower footprint. Although these two forest ecosystems are only 20 km apart, separated by less than 300m in elevation, and have been impacted by similar mortality agents, the associated changes in carbon and water cycling are significantly different. Beetle effects on hydrologic cycling were greatest at high elevation

  10. Non-host volatile blend optimization for forest protection against the European spruce bark beetle, Ips typographus.

    Directory of Open Access Journals (Sweden)

    C Rikard Unelius

    Full Text Available Conifer feeding bark beetles (Coleoptera, Curculionidae, Scolytinae pose a serious economic threat to forest production. Volatiles released by non-host angiosperm plants (so called non-host volatiles, NHV have been shown to reduce the risk of attack by many bark beetle species, including the European spruce bark beetle, Ips typographus. However, the most active blend for I. typographus, containing three green leaf volatiles (GLVs in addition to the key compounds trans-conophthorin (tC and verbenone, has been considered too expensive for use in large-scale management. To lower the cost and improve the applicability of NHV, we aim to simplify the blend without compromising its anti-attractant potency. Since the key compound tC is expensive in pure form, we also tested a crude version: technical grade trans-conophthorin (T-tC. In another attempt to find a more cost effective substitute for tC, we evaluated a more readily synthesized analog: dehydro-conophthorin (DHC. Our results showed that 1-hexanol alone could replace the three-component GLV blend containing 1-hexanol, (3Z-hexen-1-ol, and (2E-hexen-1-ol. Furthermore, the release rate of tC could be reduced from 5 mg/day to 0.5 mg/day in a blend with 1-hexanol and (--verbenone without compromising the anti-attractant activity. We further show that T-tC was comparable with tC, whereas DHC was a less effective anti-attractant. DHC also elicited weaker physiological responses in the tC-responding olfactory receptor neuron class, providing a likely mechanistic explanation for its weaker anti-attractive effect. Our results suggest a blend consisting of (--verbenone, 1-hexanol and technical trans-conophthorin as a cost-efficient anti-attractant for forest protection against I. typographus.

  11. Are bark beetles chewing up our forests? What about our coffee?

    Science.gov (United States)

    A write-up for the Elsevier SciTech Connect blog on the recently published book entitled "Bark Beetles: Biology and Ecology of Native and Invasive Species," edited by Fernando E. Vega and Richard W. Hofstetter. The book was published by Academic Press in January 2015....

  12. Gene discovery for the bark beetle-vectored fungal tree pathogen Grosmannia clavigera

    Directory of Open Access Journals (Sweden)

    Robertson Gordon

    2010-10-01

    Full Text Available Abstract Background Grosmannia clavigera is a bark beetle-vectored fungal pathogen of pines that causes wood discoloration and may kill trees by disrupting nutrient and water transport. Trees respond to attacks from beetles and associated fungi by releasing terpenoid and phenolic defense compounds. It is unclear which genes are important for G. clavigera's ability to overcome antifungal pine terpenoids and phenolics. Results We constructed seven cDNA libraries from eight G. clavigera isolates grown under various culture conditions, and Sanger sequenced the 5' and 3' ends of 25,000 cDNA clones, resulting in 44,288 high quality ESTs. The assembled dataset of unique transcripts (unigenes consists of 6,265 contigs and 2,459 singletons that mapped to 6,467 locations on the G. clavigera reference genome, representing ~70% of the predicted G. clavigera genes. Although only 54% of the unigenes matched characterized proteins at the NCBI database, this dataset extensively covers major metabolic pathways, cellular processes, and genes necessary for response to environmental stimuli and genetic information processing. Furthermore, we identified genes expressed in spores prior to germination, and genes involved in response to treatment with lodgepole pine phloem extract (LPPE. Conclusions We provide a comprehensively annotated EST dataset for G. clavigera that represents a rich resource for gene characterization in this and other ophiostomatoid fungi. Genes expressed in response to LPPE treatment are indicative of fungal oxidative stress response. We identified two clusters of potentially functionally related genes responsive to LPPE treatment. Furthermore, we report a simple method for identifying contig misassemblies in de novo assembled EST collections caused by gene overlap on the genome.

  13. Erwinia typographi sp. nov., isolated from bark beetle (Ips typographus) gut.

    Science.gov (United States)

    Skrodenyte-Arbaciauskiene, V; Radziute, S; Stunzenas, V; Būda, V

    2012-04-01

    Gram-negative-staining bacteria that were resistant to monoterpene myrcene (7-methyl-3-methylene-1.6-octadiene, C10H16, at concentrations of up to 10 µl ml(-1) in TSB) were isolated from the gut contents of adult bark beetles Ips typographus (Coleoptera, Scolytidae). The beetles were collected from the bark of Norway spruce (Picea abies) in Lithuania. Bark beetles feed on conifers, which produce myrcene among many other defensive compounds. It has been suggested that the micro-organisms present within the beetles' guts could be involved in their resistance towards this plant defensive compound. The most resistant bacterial strains were isolated and characterized by phenotypic assays as well as fatty acid analysis, 16S rRNA gene sequencing, multilocus sequence analyses (MLSA) based on the rpoB, atpD and infB genes and DNA-DNA hybridization. Biochemical characterization indicated that the bacteria belonged to the family Enterobacteriaceae. Phylogenetic analyses of the 16S rRNA gene sequences and MLSA of the novel strains revealed that they belonged to the genus Erwinia, but represented a novel species. The dominant cellular fatty acids were C16:0 and C17:0 cyclo. The DNA G+C content was 49.1 mol%. The results obtained in this study indicated that these bacteria from the bark beetle gut represented a novel species, for which the name Erwinia typographi sp. nov. is proposed, with the type strain DSM 22678T (=Y1T=LMG 25347T).

  14. Surveying the endomicrobiome and ectomicrobiome of bark beetles: The case of Dendroctonus simplex.

    Science.gov (United States)

    Durand, Audrey-Anne; Bergeron, Amélie; Constant, Philippe; Buffet, Jean-Philippe; Déziel, Eric; Guertin, Claude

    2015-11-26

    Many bark beetles belonging to the Dendroctonus genus carry bacterial and fungal microbiota, forming a symbiotic complex that helps the insect to colonize the subcortical environment of the host tree. However, the biodiversity of those bacteria at the surface of the cuticle or inside the body parts of bark beetles is not well established. The aim of this study was to characterize the bacterial microbiome associated with the eastern larch beetle, Dendroctonus simplex, using bacterial 16S rRNA gene pyrosequencing. The ecto- and endomicrobiome and the subcortical galleries were investigated. Several bacterial genera were identified, among which Pseudomonas, Serratia and Yersinia are associated with the surface of the beetle cuticle, and genera belonging to Enterobacteriaceae and Gammaproteobacteria with the interior of the insect body. The index of dissimilarity indicates that the bacterial microbiome associated with each environment constitutes exclusive groups. These results suggest the presence of distinct bacterial microbiota on the surface of the cuticle and the interior of D. simplex body. Additionally, the bacterial diversity identified in the galleries is substantially different from the ectomicrobiome, which could indicate a selection by the insect. This study reports for the first time the identification of the eastern larch beetle microbiome.

  15. Preferential host switching and codivergence shaped radiation of bark beetle symbionts, nematodes of Micoletzkya (Nematoda: Diplogastridae).

    Science.gov (United States)

    Susoy, V; Herrmann, M

    2014-05-01

    Host-symbiont systems are of particular interest to evolutionary biology because they allow testable inferences of diversification processes while also providing both a historical basis and an ecological context for studies of adaptation. Our investigations of bark beetle symbionts, predatory nematodes of the genus Micoletzkya, have revealed remarkable diversity of the group along with a high level of host specificity. Cophylogenetic analyses suggest that evolution of the nematodes was largely influenced by the evolutionary history of beetles. The diversification of the symbionts, however, could not be attributed to parallel divergence alone; our results indicate that adaptive radiation of the nematodes was shaped by preferential host shifts among closely related beetles along with codivergence. Whereas ecological and geographic isolation have played a major role in the diversification of Micoletzkya at shallow phylogenetic depths, adaptations towards related hosts have played a role in shaping cophylogenetic structure at a larger evolutionary scale.

  16. Carbon stocks of trees killed by bark beetles and wildfire in the western United States

    Science.gov (United States)

    Hicke, Jeffrey A.; Meddens, Arjan J.H.; Allen, Craig D.; Kolden, Crystal A.

    2013-01-01

    Forests are major components of the carbon cycle, and disturbances are important influences of forest carbon. Our objective was to contribute to the understanding of forest carbon cycling by quantifying the amount of carbon in trees killed by two disturbance types, fires and bark beetles, in the western United States in recent decades. We combined existing spatial data sets of forest biomass, burn severity, and beetle-caused tree mortality to estimate the amount of aboveground and belowground carbon in killed trees across the region. We found that during 1984-2010, fires killed trees that contained 5-11 Tg C year-1 and during 1997-2010, beetles killed trees that contained 2-24 Tg C year-1, with more trees killed since 2000 than in earlier periods. Over their periods of record, amounts of carbon in trees killed by fires and by beetle outbreaks were similar, and together these disturbances killed trees representing 9% of the total tree carbon in western forests, a similar amount to harvesting. Fires killed more trees in lower-elevation forest types such as Douglas-fir than higher-elevation forest types, whereas bark beetle outbreaks also killed trees in higher-elevation forest types such as lodgepole pine and Engelmann spruce. Over 15% of the carbon in lodgepole pine and spruce/fir forest types was in trees killed by beetle outbreaks; other forest types had 5-10% of the carbon in killed trees. Our results document the importance of these natural disturbances in the carbon budget of the western United States.

  17. Colonization of Artificially Stressed Black Walnut Trees by Ambrosia Beetle, Bark Beetle, and Other Weevil Species (Coleoptera: Curculionidae) in Indiana and Missouri.

    Science.gov (United States)

    Reed, Sharon E; Juzwik, Jennifer; English, James T; Ginzel, Matthew D

    2015-12-01

    Thousand cankers disease (TCD) is a new disease of black walnut (Juglans nigra L.) in the eastern United States. The disease is caused by the interaction of the aggressive bark beetle Pityophthorus juglandis Blackman and the canker-forming fungus, Geosmithia morbida M. Kolarik, E. Freeland, C. Utley & Tisserat, carried by the beetle. Other insects also colonize TCD-symptomatic trees and may also carry pathogens. A trap tree survey was conducted in Indiana and Missouri to characterize the assemblage of ambrosia beetles, bark beetles, and other weevils attracted to the main stems and crowns of stressed black walnut. More than 100 trees were girdled and treated with glyphosate (Riverdale Razor Pro, Burr Ridge, Illinois) at 27 locations. Nearly 17,000 insects were collected from logs harvested from girdled walnut trees. These insects represented 15 ambrosia beetle, four bark beetle, and seven other weevil species. The most abundant species included Xyleborinus saxeseni Ratzburg, Xylosandrus crassiusculus Motschulsky, Xylosandrus germanus Blandford, Xyleborus affinis Eichhoff, and Stenomimus pallidus Boheman. These species differed in their association with the stems or crowns of stressed trees. Multiple species of insects were collected from individual trees and likely colonized tissues near each other. At least three of the abundant species found (S. pallidus, X. crassiusculus, and X. germanus) are known to carry propagules of canker-causing fungi of black walnut. In summary, a large number of ambrosia beetles, bark beetles, and other weevils are attracted to stressed walnut trees in Indiana and Missouri. Several of these species have the potential to introduce walnut canker pathogens during colonization.

  18. Naturally-Occurring Entomopathogenic Fungi on Three Bark Beetle Species (Coleoptera: Curculionidae in Bulgaria

    Directory of Open Access Journals (Sweden)

    Slavimira A. Draganova

    2010-01-01

    Full Text Available Bark beetles (Coleoptera: Curculionidae: Scolytinae belong to one of the most damaging groups of forest insects and the activity of their natural enemies –pathogens, parasitoids,parasites or predators suppressing their population density,is of great importance. Biodiversity of entomopathogenic fungi on bark beetles in Bulgaria has been investigated sporadically. The aim of this preliminary study was to find, identify and study morphological characteristics of fungal entomopathogens naturally-occurring in populations of three curculionid species – Ips sexdentatus Boern, Ips typographus (L. and Dryocoetes autographus (Ratz.. Dead pest adults were found under the bark of Pinus sylvestris and Picea abies trees collectedfrom forests in the Maleshevska and Vitosha Mountains. Fungal pathogens were isolated into pure cultures on SDAY (Sabouraud dextrose agar with yeast extract and were identified based on morphological characteristics both on the host and in a culture.Morphological characteristics of the isolates were studied by phenotypic methods. The fungal isolates obtained from dead adults of Ips sexdentatus, Ips typographus and D. autographus were found to belong to the species Beauveria bassiana (Bals. – Criv. Vuillemin,Beauveria brongniartii (Saccardo Petch and Isaria farinosa (Holmsk. Fries (anamorph Ascomycota, Sordariomycetes: Hypocreales, Cordycipitaceae. Morphological traits of the isolates are described.

  19. Host-Tree Monoterpenes and Biosynthesis of Aggregation Pheromones in the Bark Beetle Ips paraconfusus

    Directory of Open Access Journals (Sweden)

    John A. Byers

    2012-01-01

    Full Text Available A paradigm developed in the 1970s that Ips bark beetles biosynthesize their aggregation pheromone components ipsenol and ipsdienol by hydroxylating myrcene, a host tree monoterpene. Similarly, host α-pinene was hydroxylated to a third pheromone component cis-verbenol. In 1990, however, we reported that amounts of ipsenol and ipsdienol produced by male Ips paraconfusus (Coleoptera: Scolytinae feeding in five host pine species were nearly the same, even though no detectable myrcene precursor was detected in one of these pines (Pinus sabiniana. Subsequent research showed ipsenol and ipsdienol are also biosynthesized from smaller precursors such as acetate and mevalonate, and this de novo pathway is the major one, while host tree myrcene conversion by the beetle is the minor one. We report concentrations of myrcene, α-pinene and other major monoterpenes in five pine hosts (Pinus ponderosa, P. lambertiana, P. jeffreyi, P. sabiniana, and P. contorta of I. paraconfusus. A scheme for biosynthesis of ipsdienol and ipsenol from myrcene and possible metabolites such as ipsenone is presented. Mass spectra and quantities of ipsenone are reported and its possible role in biosynthesis of aggregation pheromone. Coevolution of bark beetles and host trees is discussed in relation to pheromone biosynthesis, host plant selection/suitability, and plant resistance.

  20. Bark beetles and pinhole borers (Curculionidae, Scolytinae, Platypodinae alien to Europe

    Directory of Open Access Journals (Sweden)

    Lawrence Kirkendall

    2010-09-01

    Full Text Available Invasive bark beetles are posing a major threat to forest resources around the world. DAISIE’s web-based and printed databases of invasive species in Europe provide an incomplete and misleading picture of the alien scolytines and platypodines. We present a review of the alien bark beetle fauna of Europe based on primary literature through 2009. We find that there are 18 Scolytinae and one Platypodinae species apparently established in Europe, from 14 different genera. Seventeen species are naturalized. We argue that Trypodendron laeve, commonly considered alien in Europe, is a native species; conversely, we hypothesize that Xyleborus pfeilii, which has always been treated as indigenous, is an alien species from Asia. We also point out the possibility that the Asian larch bark beetle Ips subelongatus is established in European Russia. We show that there has been a marked acceleration in the rate of new introductions to Europe, as is also happening in North America: seven alien species were first recorded in the last decade. We present information on the biology, origins, and distributions of the alien species. All but four are polyphagous, and 11 are inbreeders: two traits which increase invasiveness. Eleven species are native to Asia, six to the Americas, and one is from the Canary Islands. The Mediterranean is especially favorable for invasives, hosting a large proportion of the aliens (8/18. Italy, Spain and France have the largest numbers of alien species (15, 10 and 7 respectively. We point out that the low numbers for at least some countries is likely due to under-reporting. Finally, we discuss the difficulties associated with identifying newly invasive species. Lack of good illustrations and keys hinder identification, particularly for species coming from Asia and Oceania.

  1. Elm bark beetle in Holocene peat deposits and the northwest European elm decline

    Science.gov (United States)

    Clark, Sarah H. E.; Edwards, Kevin J.

    2004-09-01

    The elm decline of 5000 14C yr ago has been the most widely discussed phenomenon in post-glacial vegetation history. This pan-European reduction of elm populations, echoed in the decimation of elmwoods in Europe during the twentieth century, has attracted a series of interrelated hypotheses involving climate change, human activity, disease and soil deterioration. The elm bark beetle (Scolytus scolytus L.) is an essential component of disease explanations. We present evidence for the presence of the beetle over a prolonged period (ca. 7950-4910 yr BP [8800-5660 cal. yr BP]) from a lowland raised mire deposit in northeast Scotland, with its final appearance at this site, and the first and only appearance in another mire of a single scolytid find, around the time of the elm decline. The subfossil S. scolytus finds are not only the first from Scotland, but they also represent the most comprehensive sequence of finds anywhere. Copyright

  2. Climate change induced effects on the predisposition of forests of the water protection zone Wildalpen to disturbances by bark beetles

    Science.gov (United States)

    Baier, P.; Pennerstorfer, J.; Schopf, A.

    2012-04-01

    The provision of drinking water of high quality is a precious service of forests. Large-scale disturbances like forest fires, wind throws, pest outbreaks and subsequent clear cutting may lead to changes in hydrology (runoff as well as percolation). Furthermore, water quality can be negatively influenced by increased erosion, increased decomposition of litter and humus and leaching of nitrate. Large-scale epidemics of forest pests may induce forest decline at landscape scale with subsequent long-lasting negative effects on water quality. The European spruce bark beetle, Ips typographus (L.), is one of the most significant sources of mortality in mature spruce forest ecosystems in Eurasia. The objective of this study was to apply a complex predisposition assessment system for hazard rating and for the evaluation of climate change impacts for the water protection forests of the City of Vienna in Wildalpen. The following steps have been done to adapt/apply the bark beetle phenology model and the hazard rating system: -application, adaptation and validation of the bark beetle phenology model PHENIPS concerning start of dispersion, brood initiation, duration of development, beginning of sister broods, voltinism and hibernation - spatial/temporal modelling of the phenology and voltinism of I. typographus using past, present as well as projected climate data - application and validation of the stand- and site related long-term predisposition assessment system using forest stand/site data, annual damage reports and outputs of phenology modelling as data input - mapping of endangered areas and assessment of future susceptibility to infestations by I. typographus and other disturbing agents based on climate scenarios using GIS. The assessment of site- and stand-related predisposition revealed that the forest stands in Wildalpen are highly susceptible to bark beetle infestation. More than 65% of the stands were assigned to the predisposition classes high/very high. Only 10% of

  3. Two newly introduced tropical bark and ambrosia beetles (Coleoptera: Curculionidae, Scolytinae) damaging figs (Ficus carica) in southern Italy.

    Science.gov (United States)

    Faccoli, Massimo; Campo, Giuseppe; Perrotta, Giancarlo; Rassati, Davide

    2016-01-01

    In summer 2014, the bark beetle Hypocryphalus scabricollis (Eichhoff) and the ambrosia beetle Xyleborus bispinatus Eichhoff, species new to Italy and Europe, respectively, were found for the first time in south-eastern Sicily (Italy). Large infestations of the two species were recorded in many plantations of common fig (Ficus carica L.) both in 2014 and 2015. Data concerning insect characteristics, taxonomy, and distribution are briefly reported. PMID:27470760

  4. Two newly introduced tropical bark and ambrosia beetles (Coleoptera: Curculionidae, Scolytinae) damaging figs (Ficus carica) in southern Italy.

    Science.gov (United States)

    Faccoli, Massimo; Campo, Giuseppe; Perrotta, Giancarlo; Rassati, Davide

    2016-01-01

    In summer 2014, the bark beetle Hypocryphalus scabricollis (Eichhoff) and the ambrosia beetle Xyleborus bispinatus Eichhoff, species new to Italy and Europe, respectively, were found for the first time in south-eastern Sicily (Italy). Large infestations of the two species were recorded in many plantations of common fig (Ficus carica L.) both in 2014 and 2015. Data concerning insect characteristics, taxonomy, and distribution are briefly reported.

  5. Negative feedbacks on bark beetle outbreaks: widespread and severe spruce beetle infestation restricts subsequent infestation.

    Science.gov (United States)

    Hart, Sarah J; Veblen, Thomas T; Mietkiewicz, Nathan; Kulakowski, Dominik

    2015-01-01

    Understanding disturbance interactions and their ecological consequences remains a major challenge for research on the response of forests to a changing climate. When, where, and how one disturbance may alter the severity, extent, or occurrence probability of a subsequent disturbance is encapsulated by the concept of linked disturbances. Here, we evaluated 1) how climate and forest habitat variables, including disturbance history, interact to drive 2000s spruce beetle (Dendroctonus rufipennis) infestation of Engelmann spruce (Picea engelmannii) across the Southern Rocky Mountains; and 2) how previous spruce beetle infestation affects subsequent infestation across the Flat Tops Wilderness in northwestern Colorado, which experienced a severe landscape-scale spruce beetle infestation in the 1940s. We hypothesized that drought and warm temperatures would promote infestation, whereas small diameter and non-host trees, which may reflect past disturbance by spruce beetles, would inhibit infestation. Across the Southern Rocky Mountains, we found that climate and forest structure interacted to drive the 2000s infestation. Within the Flat Tops study area we found that stands infested in the 1940s were composed of higher proportions of small diameter and non-host trees ca. 60 years later. In this area, the 2000s infestation was constrained by a paucity of large diameter host trees (> 23 cm at diameter breast height), not climate. This suggests that there has not been sufficient time for trees to grow large enough to become susceptible to infestation. Concordantly, we found no overlap between areas affected by the 1940s infestation and the current infestation. These results show a severe spruce beetle infestation, which results in the depletion of susceptible hosts, can create a landscape template reducing the potential for future infestations. PMID:26000906

  6. Negative feedbacks on bark beetle outbreaks: widespread and severe spruce beetle infestation restricts subsequent infestation.

    Directory of Open Access Journals (Sweden)

    Sarah J Hart

    Full Text Available Understanding disturbance interactions and their ecological consequences remains a major challenge for research on the response of forests to a changing climate. When, where, and how one disturbance may alter the severity, extent, or occurrence probability of a subsequent disturbance is encapsulated by the concept of linked disturbances. Here, we evaluated 1 how climate and forest habitat variables, including disturbance history, interact to drive 2000s spruce beetle (Dendroctonus rufipennis infestation of Engelmann spruce (Picea engelmannii across the Southern Rocky Mountains; and 2 how previous spruce beetle infestation affects subsequent infestation across the Flat Tops Wilderness in northwestern Colorado, which experienced a severe landscape-scale spruce beetle infestation in the 1940s. We hypothesized that drought and warm temperatures would promote infestation, whereas small diameter and non-host trees, which may reflect past disturbance by spruce beetles, would inhibit infestation. Across the Southern Rocky Mountains, we found that climate and forest structure interacted to drive the 2000s infestation. Within the Flat Tops study area we found that stands infested in the 1940s were composed of higher proportions of small diameter and non-host trees ca. 60 years later. In this area, the 2000s infestation was constrained by a paucity of large diameter host trees (> 23 cm at diameter breast height, not climate. This suggests that there has not been sufficient time for trees to grow large enough to become susceptible to infestation. Concordantly, we found no overlap between areas affected by the 1940s infestation and the current infestation. These results show a severe spruce beetle infestation, which results in the depletion of susceptible hosts, can create a landscape template reducing the potential for future infestations.

  7. Predation by Flat Bark Beetles (Coleoptera: Silvanidae and Laemophloeidae) on Coffee Berry Borer (Coleoptera: Curculionidae) in Hawaii coffee

    Science.gov (United States)

    Coffee berry borer(CBB), Hypothenemus hampei, is a serious pest of coffee worldwide and a new invasive pest in Hawaii. Adult flat bark beetles, mainly Leptophloeus sp.(75%) and Cathartus quadricollis(21%) (Coleoptera: Laemophloeidae and Silvanidae, respectively), were found feeding in CBB-infested c...

  8. Riparian zones attenuate nitrogen loss following bark beetle-induced lodgepole pine mortality

    Science.gov (United States)

    Biederman, Joel A.; Meixner, Thomas; Harpold, Adrian A.; Reed, David E.; Gutmann, Ethan D.; Gaun, Janelle A.; Brooks, Paul D.

    2016-03-01

    A North American bark beetle infestation has killed billions of trees, increasing soil nitrogen and raising concern for N loss impacts on downstream ecosystems and water resources. There is surprisingly little evidence of stream N response in large basins, which may result from surviving vegetation uptake, gaseous loss, or dilution by streamflow from unimpacted stands. Observations are lacking along hydrologic flow paths connecting soils with streams, challenging our ability to determine where and how attenuation occurs. Here we quantified biogeochemical concentrations and fluxes at a lodgepole pine-dominated site where bark beetle infestation killed 50-60% of trees. We used nested observations along hydrologic flow paths connecting hillslope soils to streams of up to third order. We found soil water NO3 concentrations increased 100-fold compared to prior research at this and nearby southeast Wyoming sites. Nitrogen was lost below the major rooting zone to hillslope groundwater, where dissolved organic nitrogen (DON) increased by 3-10 times (mean 1.65 mg L-1) and NO3-N increased more than 100-fold (3.68 mg L-1) compared to preinfestation concentrations. Most of this N was removed as hillslope groundwater drained through riparian soils, and NO3 remained low in streams. DON entering the stream decreased 50% within 5 km downstream, to concentrations typical of unimpacted subalpine streams (~0.3 mg L-1). Although beetle outbreak caused hillslope N losses similar to other disturbances, up to 5.5 kg ha-1y-1, riparian and in-stream removal limited headwater catchment export to <1 kg ha-1y-1. These observations suggest riparian removal was the dominant mechanism preventing hillslope N loss from impacting streams.

  9. Nor-hopanes from Zanha africana root bark with toxicity to bruchid beetles.

    Science.gov (United States)

    Stevenson, Philip C; Green, Paul W C; Veitch, Nigel C; Farrell, Iain W; Kusolwa, Paul; Belmain, Steven R

    2016-03-01

    Zanha africana (Radlk.) Exell (Sapindaceae) root bark is used by farmers throughout sub-Saharan Africa to protect stored grain from bruchid beetles, such as Callosobruchus maculatus. Chloroform, methanol and water extracts of Z. africana root bark inhibited oviposition and caused significantly higher mortality of C. maculatus at a rate of application equivalent to that applied by farmers compared to control insects. The chloroform extract contained nor-hopanes rarely found in plants of which seven were isolated, one of which was previously known. Two of the most abundant nor-hopanes 3β,6β-dihydroxy-7β-[(4-hydroxybenzoyl)oxy]-21αH-24-norhopa-4(23),22(29)-diene and 3β,6β-dihydroxy-7β-[(4-hydroxybenzoyl)oxy]-24-norhopa-4(23),17(21)-diene were toxic to and reduced oviposition of C. maculatus in a dose dependent manner. Z. africana root bark is rich in insecticidal compounds that account for its effective use by smallholder farmers as an alternative to conventional insecticides. PMID:26803395

  10. Metal fate and partitioning in soils under bark beetle-killed trees.

    Science.gov (United States)

    Bearup, Lindsay A; Mikkelson, Kristin M; Wiley, Joseph F; Navarre-Sitchler, Alexis K; Maxwell, Reed M; Sharp, Jonathan O; McCray, John E

    2014-10-15

    Recent mountain pine beetle infestation in the Rocky Mountains of North America has killed an unprecedented acreage of pine forest, creating an opportunity to observe an active re-equilibration in response to widespread land cover perturbation. This work investigates metal mobility in beetle-impacted forests using parallel rainwater and acid leaches to estimate solid-liquid partitioning coefficients and a complete sequential extraction procedure to determine how metals are fractionated in soils under trees experiencing different phases of mortality. Geochemical model simulations analyzed in consideration with experimental data provide additional insight into the mechanisms controlling metal complexation. Metal and base-cation mobility consistently increased in soils under beetle-attacked trees relative to soil under healthy trees. Mobility increases were more pronounced on south facing slopes and more strongly correlated to pH under attacked trees than under healthy trees. Similarly, soil moisture was significantly higher under dead trees, related to the loss of transpiration and interception. Zinc and cadmium content increased in soils under dead trees relative to living trees. Cadmium increases occurred predominantly in the exchangeable fraction, indicating increased mobilization potential. Relative increases of zinc were greatest in the organic fraction, the only fraction where increases in copper were observed. Model results reveal that increased organic complexation, not changes in pH or base cation concentrations, can explain the observed differences in metal partitioning for zinc, nickel, cadmium, and copper. Predicted concentrations would be unlikely to impair human health or plant growth at these sites; however, higher exchangeable metals under beetle-killed trees relative to healthy trees suggest a possible decline in riverine ecosystem health and water quality in areas already approaching criteria limits and drinking water standards. Impairment of water

  11. Metal fate and partitioning in soils under bark beetle-killed trees.

    Science.gov (United States)

    Bearup, Lindsay A; Mikkelson, Kristin M; Wiley, Joseph F; Navarre-Sitchler, Alexis K; Maxwell, Reed M; Sharp, Jonathan O; McCray, John E

    2014-10-15

    Recent mountain pine beetle infestation in the Rocky Mountains of North America has killed an unprecedented acreage of pine forest, creating an opportunity to observe an active re-equilibration in response to widespread land cover perturbation. This work investigates metal mobility in beetle-impacted forests using parallel rainwater and acid leaches to estimate solid-liquid partitioning coefficients and a complete sequential extraction procedure to determine how metals are fractionated in soils under trees experiencing different phases of mortality. Geochemical model simulations analyzed in consideration with experimental data provide additional insight into the mechanisms controlling metal complexation. Metal and base-cation mobility consistently increased in soils under beetle-attacked trees relative to soil under healthy trees. Mobility increases were more pronounced on south facing slopes and more strongly correlated to pH under attacked trees than under healthy trees. Similarly, soil moisture was significantly higher under dead trees, related to the loss of transpiration and interception. Zinc and cadmium content increased in soils under dead trees relative to living trees. Cadmium increases occurred predominantly in the exchangeable fraction, indicating increased mobilization potential. Relative increases of zinc were greatest in the organic fraction, the only fraction where increases in copper were observed. Model results reveal that increased organic complexation, not changes in pH or base cation concentrations, can explain the observed differences in metal partitioning for zinc, nickel, cadmium, and copper. Predicted concentrations would be unlikely to impair human health or plant growth at these sites; however, higher exchangeable metals under beetle-killed trees relative to healthy trees suggest a possible decline in riverine ecosystem health and water quality in areas already approaching criteria limits and drinking water standards. Impairment of water

  12. Menzbieria chalcographi, a new neogregarine pathogen of the great spruce bark beetle, Dendroctonus micans (Kugelann) (Curculionidae, Scolytinae).

    Science.gov (United States)

    Yaman, Mustafa; Radek, Renate

    2012-09-01

    This study concerns a new neogregarine parasitic in the great spruce bark beetle Dendroctonus micans (Kugelann) (Curculionidae, Scolytinae). The rate of infection was high, reaching 27.3%. There was no difference in the rate of infection of male and female beetles. The life-cycle stages of the pathogen were described by light and electron microscopy. Each gametocyst of the neogregarine included 8-16 actinocephalid oocysts measuring 11.19 ± 0.42 × 4.99 ± 0.25 μm. The described pathogen has the typical characteristics of members of the genus Menzbieria within the order Neogregarinida and it was identified as Menzbieria chalcographi. This is the first record of an infection of D. micans by M. chalcographi. Possibly, this pathogen could be useful for the biological control of this destructive bark beetle.

  13. An attempt to use the fungus Beauveria bassiana (Bals.) Vuill. in forest protection against the bark beetle Ips typographus (L.) in the field

    OpenAIRE

    Grodzki Wojciech; Kosibowicz Mieczysław

    2015-01-01

    In 2011–2013, trials on the use of the entomopathogenic fungus Beauveria bassiana against bark beetle (Ips typographus) populations were carried out under open field conditions in Norway spruce stands suffering from an outbreak in the Beskid Żywiecki Mts. in Poland. Modified pheromone traps were deployed to capture and thereafter release fungus-infected bark beetles to the forest environment. Infested spruce trees felled next to the traps remained unaffected by the transmission of the fungus ...

  14. Metal fate and partitioning in soils under bark beetle-killed trees

    Energy Technology Data Exchange (ETDEWEB)

    Bearup, Lindsay A., E-mail: lbearup@mines.edu [Department of Civil and Environmental Engineering, Colorado School of Mines, 1500 Illinois Street, Golden, CO 80401 (United States); Hydrological Science and Engineering Program, Colorado School of Mines, 1500 Illinois Street, Golden, CO 80401 (United States); Mikkelson, Kristin M. [Department of Civil and Environmental Engineering, Colorado School of Mines, 1500 Illinois Street, Golden, CO 80401 (United States); Hydrological Science and Engineering Program, Colorado School of Mines, 1500 Illinois Street, Golden, CO 80401 (United States); Wiley, Joseph F. [Department of Civil and Environmental Engineering, Colorado School of Mines, 1500 Illinois Street, Golden, CO 80401 (United States); Navarre-Sitchler, Alexis K.; Maxwell, Reed M. [Hydrological Science and Engineering Program, Colorado School of Mines, 1500 Illinois Street, Golden, CO 80401 (United States); Department of Geology and Geological Engineering, Colorado School of Mines, 1500 Illinois Street, Golden, CO 80401 (United States); Sharp, Jonathan O.; McCray, John E. [Department of Civil and Environmental Engineering, Colorado School of Mines, 1500 Illinois Street, Golden, CO 80401 (United States); Hydrological Science and Engineering Program, Colorado School of Mines, 1500 Illinois Street, Golden, CO 80401 (United States)

    2014-10-15

    Recent mountain pine beetle infestation in the Rocky Mountains of North America has killed an unprecedented acreage of pine forest, creating an opportunity to observe an active re-equilibration in response to widespread land cover perturbation. This work investigates metal mobility in beetle-impacted forests using parallel rainwater and acid leaches to estimate solid–liquid partitioning coefficients and a complete sequential extraction procedure to determine how metals are fractionated in soils under trees experiencing different phases of mortality. Geochemical model simulations analyzed in consideration with experimental data provide additional insight into the mechanisms controlling metal complexation. Metal and base-cation mobility consistently increased in soils under beetle-attacked trees relative to soil under healthy trees. Mobility increases were more pronounced on south facing slopes and more strongly correlated to pH under attacked trees than under healthy trees. Similarly, soil moisture was significantly higher under dead trees, related to the loss of transpiration and interception. Zinc and cadmium content increased in soils under dead trees relative to living trees. Cadmium increases occurred predominantly in the exchangeable fraction, indicating increased mobilization potential. Relative increases of zinc were greatest in the organic fraction, the only fraction where increases in copper were observed. Model results reveal that increased organic complexation, not changes in pH or base cation concentrations, can explain the observed differences in metal partitioning for zinc, nickel, cadmium, and copper. Predicted concentrations would be unlikely to impair human health or plant growth at these sites; however, higher exchangeable metals under beetle-killed trees relative to healthy trees suggest a possible decline in riverine ecosystem health and water quality in areas already approaching criteria limits and drinking water standards. Impairment of

  15. Metal fate and partitioning in soils under bark beetle-killed trees

    International Nuclear Information System (INIS)

    Recent mountain pine beetle infestation in the Rocky Mountains of North America has killed an unprecedented acreage of pine forest, creating an opportunity to observe an active re-equilibration in response to widespread land cover perturbation. This work investigates metal mobility in beetle-impacted forests using parallel rainwater and acid leaches to estimate solid–liquid partitioning coefficients and a complete sequential extraction procedure to determine how metals are fractionated in soils under trees experiencing different phases of mortality. Geochemical model simulations analyzed in consideration with experimental data provide additional insight into the mechanisms controlling metal complexation. Metal and base-cation mobility consistently increased in soils under beetle-attacked trees relative to soil under healthy trees. Mobility increases were more pronounced on south facing slopes and more strongly correlated to pH under attacked trees than under healthy trees. Similarly, soil moisture was significantly higher under dead trees, related to the loss of transpiration and interception. Zinc and cadmium content increased in soils under dead trees relative to living trees. Cadmium increases occurred predominantly in the exchangeable fraction, indicating increased mobilization potential. Relative increases of zinc were greatest in the organic fraction, the only fraction where increases in copper were observed. Model results reveal that increased organic complexation, not changes in pH or base cation concentrations, can explain the observed differences in metal partitioning for zinc, nickel, cadmium, and copper. Predicted concentrations would be unlikely to impair human health or plant growth at these sites; however, higher exchangeable metals under beetle-killed trees relative to healthy trees suggest a possible decline in riverine ecosystem health and water quality in areas already approaching criteria limits and drinking water standards. Impairment of

  16. Hydrological effects of forest transpiration loss in bark beetle-impacted watersheds

    Science.gov (United States)

    Bearup, Lindsay A.; Maxwell, Reed M.; Clow, David W.; McCray, John E.

    2014-01-01

    The recent climate-exacerbated mountain pine beetle infestation in the Rocky Mountains of North America has resulted in tree death that is unprecedented in recorded history. The spatial and temporal heterogeneity inherent in insect infestation creates a complex and often unpredictable watershed response, influencing the primary storage and flow components of the hydrologic cycle. Despite the increased vulnerability of forested ecosystems under changing climate1, watershed-scale implications of interception, ground evaporation, and transpiration changes remain relatively unknown, with conflicting reports of streamflow perturbations across regions. Here, contributions to streamflow are analysed through time and space to investigate the potential for increased groundwater inputs resulting from hydrologic change after infestation. Results demonstrate that fractional late-summer groundwater contributions from impacted watersheds are 30 ± 15% greater after infestation and when compared with a neighbouring watershed that experienced earlier and less-severe attack, albeit uncertainty propagations through time and space are considerable. Water budget analysis confirms that transpiration loss resulting from beetle kill can account for the relative increase in groundwater contributions to streams, often considered the sustainable flow fraction and critical to mountain water supplies and ecosystems.

  17. Declining Bark Beetle Densities (Ips typographus, Coleoptera: Scolytinae from Infested Norway Spruce Stands and Possible Implications for Management

    Directory of Open Access Journals (Sweden)

    Alexander Angst

    2012-01-01

    Full Text Available The eight-toothed spruce bark beetle (Ips typographus is the most serious insect pest in Central European forests. During the past two decades, extreme meteorological events and subsequent beetle infestations have killed millions of cubic meters of standing spruce trees. Not all the infested stands could be cleared in time, and priorities in management had to be set. Natural or man-made buffer zones of about 500 meters in width are frequently defined to separate differently managed stands in Central Europe. While the buffer zones seem to be effective in most of the cases, their impact has not been studied in detail. Beetle densities were therefore assessed in three case studies using pheromone traps along transects, leading from infested stands into spruce-free buffer zones. The results of the trap catches allow an estimation of the buffer zone influence on densities and the dispersal of Ips typographus. Beetle densities were found to decrease rapidly with increasing distance from the infested spruce stands. The trap catches were below high-risk thresholds within a few hundred meters of the infested stands. The decrease in catches was more pronounced in open land and in an urban area than in a broadleaf stand. Designed buffer zones of 500 m width without spruce can therefore very probably help to reduce densities of spreading beetles.

  18. Landscape-scale Ips typographus attack dynamics: from monitoring plots to GIS-based disturbance models

    Directory of Open Access Journals (Sweden)

    Schlyter F

    2011-12-01

    Full Text Available In natural spruce stands, a change of generation is usually initiated by wind or bark beetle disturbances. We combined semi-temporary monitoring plots, remote sensing, and GIS in order to understand and model these processes. Sub plots, called “active”, were located in areas with a high probability of bark beetle or wind disturbances. The optimal location of these plots is usually at an active forest edge, i.e., the zone of maximal change in bark beetle abundance over time, corresponding to the border between wind-damaged or bark beetle-attacked parts and undisturbed parts of a forest stand. The key variable investigated was tree mortality caused by bark beetles. Other variables were similar to those recorded in traditional forest monitoring. Tree defense indicators (resin flow, phenolic compounds and reaction of a tree to bark beetle inoculation were measured. Terrestrial data were then combined with remote sensing data. Time series of satellite images were analyzed in order to define the pattern of wind and bark beetle damages. Weather monitoring data were used for predicting bark beetle and water stress development. All of the information was integrated in a GIS-based system and future bark beetle infestations were predicted. In this paper, we review previous studies and conclude that: (1 the hypotheses of habitat selection (non-host volatiles and semiochemical diversity and location of moderately-stressed host trees are confirmed, although further work about olfactory orientation and host resistance is needed;(2 reactions of trees to bark beetle attack can be predicted by monitoring several parameters, e.g., air temperature and tree physiology; (3 data from ground monitoring can be integrated with GIS and remote sensing systems for bark beetle prognosis and management at the habitat and landscape levels.

  19. Resiliency of an Interior Ponderosa Pine Forest to Bark Beetle Infestations Following Fuel-Reduction and Forest-Restoration Treatments

    Directory of Open Access Journals (Sweden)

    Christopher J. Fettig

    2014-01-01

    Full Text Available Mechanical thinning and the application of prescribed fire are commonly used to restore fire-adapted forest ecosystems in the Western United States. During a 10-year period, we monitored the effects of fuel-reduction and forest-restoration treatments on levels of tree mortality in an interior ponderosa pine, Pinus ponderosa Dougl. ex Laws., forest in California. Twelve experimental plots, ranging in size from 77–144 ha, were established to create two distinct forest structural types: mid-seral stage (low structural diversity; LoD and late-seral stage (high structural diversity; HiD. Following harvesting, half of each plot was treated with prescribed fire (B. A total of 16,473 trees (8.7% of all trees died during the 10-year period. Mortality was primarily attributed to bark beetles (Coleoptera: Curculionidae, Scolytinae (10,655 trees, specifically fir engraver, Scolytus ventralis LeConte, mountain pine beetle, Dendroctonus ponderosae Hopkins, western pine beetle, D. brevicomis LeConte, pine engraver, Ips pini (Say, and, to a much lesser extent, Jeffrey pine beetle, D. jeffreyi Hopkins. Trees of all ages and size classes were killed, but mortality was concentrated in the smaller-diameter classes (19–29.2 and 29.3–39.3 cm at 1.37 m in height. Most mortality occurred three to five years following prescribed burns. Higher levels of bark beetle-caused tree mortality were observed on LoD + B (8.7% than LoD (4.2%. The application of these and other results to the   management of interior P. ponderosa forests are discussed, with an emphasis on the maintenance of large trees.

  20. The Response of Subalpine Vegetation to Climate Change and Bark Beetle Infestations: A Multi-Scale Interaction.

    Science.gov (United States)

    Foster, A.; Shuman, J. K.; Shugart, H. H., Jr.; Negrón, J. F.

    2015-12-01

    Mean annual temperatures in the western United States have increased in the last few decades, and are predicted to continue warming. In the subalpine zone of the Rocky Mountains, this warming is also predicted to increase the frequency and severity of spruce beetle outbreaks. Climate change itself may affect this vegetation, potentially leading to shifts in species compositions. These forests are a crucial part of the US's carbon budget, thus it is important to analyze how climate change and bark beetles in conjunction will affect the biomass and species composition of vegetation in subalpine zone. UVAFME is an individual-based gap model that simulates biomass and species composition of a forest. This model has been quantitatively tested at various Rocky Mountain sites in the Front Range, and has been shown to accurately simulate the vegetation dynamics in the region. UVAFME has been updated with a spruce beetle subroutine that calculates the probability for beetle infestation of each tree on a plot. This probability is based on site, climate, and individual tree characteristics, such as temperature; stand structure; and tree stress level, size, and age. These governing characteristics are based on data from the US Forest Service, and other studies on spruce susceptibility and spruce beetle phenology. UVAFME is then run with multiple climate change and beetle scenarios to determine the net effect of both variables on subalpine vegetation. These results are compared among the different scenarios and to current forest inventory data. We project that increasing temperatures due to climate change will cause an increase in the frequency and severity of spruce beetle outbreaks, leading to a decrease in the biomass and dominance of Engelmann spruce. These results are an important step in understanding the possible futures for the vegetation of subalpine zone in the Rocky Mountains.

  1. The Banded Elm Bark Beetle, Scolytus schevyrewi Semenov (Coleoptera, Curculionidae, Scolytinae in North America: a taxonomic review and modifications to the Wood (1982 key to the species of Scolytus Geoffroy in North and Central America

    Directory of Open Access Journals (Sweden)

    James LaBonte

    2010-09-01

    Full Text Available In 2003, an Asian bark beetle, Scolytus schevyrewi Semenov (Coleoptera: Curculionidae: Scolytinae, the banded elm bark beetle, was detected for the first time in North America. This paper modifies the Wood (1982 key to the species of Scolytus Geoffroy to enable identification of S. schevyrewi in North and Central America. Variation of diagnostic characters in S. schevyrewi is discussed.

  2. The Banded Elm Bark Beetle, Scolytus schevyrewi Semenov (Coleoptera, Curculionidae, Scolytinae) in North America: a taxonomic review and modifications to the Wood (1982) key to the species of Scolytus Geoffroy in North and Central America

    OpenAIRE

    James LaBonte

    2010-01-01

    Abstract In 2003, an Asian bark beetle, Scolytus schevyrewi Semenov (Coleoptera: Curculionidae: Scolytinae), the banded elm bark beetle, was detected for the first time in North America. This paper modifies the Wood (1982) key to the species of Scolytus Geoffroy to enable identification of Scolytus schevyrewi in North and Central America. Variation of diagnostic characters in Scolytus schevyrewi is discussed.

  3. Bark Beetles, Pityogenes bidentatus, Orienting to Aggregation Pheromone Avoid Conifer Monoterpene Odors When Flying but Not When Walking

    Directory of Open Access Journals (Sweden)

    John A. Byers

    2012-01-01

    Full Text Available Previous studies and data presented here suggest that odors from healthy host Scotch pine (Pinus sylvestris and nonhost Norway spruce (Picea abies, as well as major monoterpenes of these trees at natural release rates, significantly reduce the attraction of flying bark beetles, Pityogenes bidentatus, of both sexes to their aggregation pheromone components grandisol and cis-verbenol in the field, as tested by slow rotation of trap pairs. In contrast, P. bidentatus males and females walking in an open-arena olfactometer in the laboratory did not avoid monoterpene vapors at release rates spanning several orders of magnitude in combination with aggregation pheromone. The bark beetle may avoid monoterpenes when flying as a mechanism for avoiding nonhost species, vigorous and thus unsuitable host trees, as well as harmful resinous areas of hosts. Inhibition of this flight avoidance response in beetles after landing would allow them to initiate, or to find and enter, gallery holes with high monoterpene vapor concentrations in order to feed and reproduce.

  4. Morphological and biological investigation of two pioneer Ips bark beetles in natural spruce forests in Qinghai Province, northwest China

    Institute of Scientific and Technical Information of China (English)

    LIU Li; WU Jian; LUO You-qing; LI Zhen-yu; WANG Guo-cang; HAN Fu-zhong

    2008-01-01

    Bark beetle species in natural stands of spruce, Picea crassifolia (Kom.) were investigated in Maixiu Forest Park, Qinghai Province, northwest China, during 2005 and 2007. Two pioneer lps species, Ips nitidus Eggers and lps shangrila Cognato and Sun were found. L nitidus occurs naturally in northwest China. L shangrila is a new species in the world. In the past, it was confused with I. mannsfeldi Wachtl in China. The damage of these two Ips species has been very severe in Maixiu and the morphological and biological characteristics were studied. L nitidus starts to fly in early May and prefers the mid to lower part of the host tree to colonize as its habitat. L shangrila always infests from the top of the trunk, especially in branches larger than 3 em in diameter in the crowns and sometimes even colonizes entire young trees. The two Ips species are the most destructive secondary bark beetles on P. crassifolia and always cause mortality of trees by their cooperation.

  5. Using UAV-Based Photogrammetry and Hyperspectral Imaging for Mapping Bark Beetle Damage at Tree-Level

    Directory of Open Access Journals (Sweden)

    Roope Näsi

    2015-11-01

    Full Text Available Low-cost, miniaturized hyperspectral imaging technology is becoming available for small unmanned aerial vehicle (UAV platforms. This technology can be efficient in carrying out small-area inspections of anomalous reflectance characteristics of trees at a very high level of detail. Increased frequency and intensity of insect induced forest disturbance has established a new demand for effective methods suitable in mapping and monitoring tasks. In this investigation, a novel miniaturized hyperspectral frame imaging sensor operating in the wavelength range of 500–900 nm was used to identify mature Norway spruce (Picea abies L. Karst. trees suffering from infestation, representing a different outbreak phase, by the European spruce bark beetle (Ips typographus L.. We developed a new processing method for analyzing spectral characteristic for high spatial resolution photogrammetric and hyperspectral images in forested environments, as well as for identifying individual anomalous trees. The dense point clouds, measured using image matching, enabled detection of single trees with an accuracy of 74.7%. We classified the trees into classes of healthy, infested and dead, and the results were promising. The best results for the overall accuracy were 76% (Cohen’s kappa 0.60, when using three color classes (healthy, infested, dead. For two color classes (healthy, dead, the best overall accuracy was 90% (kappa 0.80. The survey methodology based on high-resolution hyperspectral imaging will be of a high practical value for forest health management, indicating a status of bark beetle outbreak in time.

  6. Molecular markers detect cryptic predation on coffee berry borer (Coleoptera: Curculionidae) by silvanid and laemophloeid flat bark beetles (Coleoptera: Silvanidae, Laemophloeidae) in coffee beans

    Science.gov (United States)

    The coffee berry borer, Hypothenemus hampei(Coleoptera: Curculionidae)(Ferrari), is a serious pest of coffee worldwide and has been recently introduced in Hawai’i, first detected in the state in 2010. Adult silvanid flat bark beetles, Cathartus quadricollis (Coleoptera: Silvanidae) and adult laemoph...

  7. The flat bark beetles (Coleoptera, Silvanidae, Cucujidae, Laemophloeidae of Atlantic Canada

    Directory of Open Access Journals (Sweden)

    Christopher Majka

    2008-09-01

    Full Text Available As a result of the present investigations 18 species of flat bark beetles are known to occur in Atlantic Canada, 10 in New Brunswick, 17 in Nova Scotia, four on Prince Edward Island, six on insular Newfoundland, and one in Labrador. Twenty-three new provincial records are reported and nine species, Uleiota debilis (LeConte, Uleiota dubius (Fabricius, Nausibius clavicornis (Kugelann, Ahasverus advena (Waltl, Cryptolestes pusillus (Schönherr, Cryptolestes turcicus (Grouvelle, Charaphloeus convexulus (LeConte, Charaphloeus species nr. adustus, and Placonotus zimmermanni (LeConte are newly recorded in the region, one of which C. sp. nr. adustus, is newly recorded in Canada as a whole. Eight species are cosmopolitan species introduced to the region and North America, nine are native Nearctic species, and one, Pediacus fuscus Erichson, is Holarctic in distribution. All the introduced species except for one (Silvanus bidentatus (Fabricius, a saproxylic species are found on various stored products, whereas all the native species are saproxylic. Ahasverus longulus (Blatchley, is removed from the species list of New Brunswick and Charophloeus adustus (LeConte is removed from the species list of Nova Scotia. One tropical Asian species, Cryptamorpha desjardinsi (Guérin-Méneville, has been intercepted in the region in imported produce, but is not established. The substantial proportion (44% of the fauna that is comprised of introduced species is highlighted, almost all of which are synanthropic species associated with various dried stored products. The island faunas of Prince Edward Island, Cape Breton Island, and insular Newfoundland are diminished in comparison to the mainland fauna, that of Prince Edward Island being exceptionally so in comparison to other saproxylic groups found there. Of the ten native species, four can be categorized as 'apparently rare' (i.e., comprising ≤ 0.005% of specimens examined from the region. It is possibly that the

  8. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, D R; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the first time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  9. Testing remote sensing estimates of bark beetle induced mortality in lodgepole pine and Engelmann spruce with ground data

    Science.gov (United States)

    King, A.; Ewers, B. E.; Sivanpillai, R.; Pendall, E.

    2012-12-01

    Bark beetles have caused widespread regional mortality in both lodgepole and Engelmann spruce forests across western North America, and while studies have addressed the impact on water partitioning caused by the mountain pine beetle, spruce beetle which often occur at high elevations with larger snowpack might have a disproportional impact. Beetle caused mortality can have significant effects on the hydrology of a watershed and therefore needs to be considered when evaluating increased runoff. The objective of this project was to generate maps showing beetle caused mortality for lodgepole pine and spruce fir forests that capture changes to the landscape to improve hydrologic models. Our study area in southeast Wyoming covered an area of approximately 2 by 4 km from 2700 to 2800m elevation range. High spatial resolution (0.5m) aerial imagery acquired by the Airborne Environmental Research Observational Camera (AEROCam) in fall 2011, provided by the Upper Midwest Aerospace Consortium (UMAC), was manually classified into four conifer thematic classes: live and dead lodgepole pine, and live and dead spruce/fir. The classified high resolution image was then verified by tree surveys conducted July-September, 2012 documenting species, tree diameter at breast height (dbh), and the stage of beetle infestation for each tree. After verification the high resolution aerial images were used to train and evaluate the accuracy of a supervised classification of a Landsat 5 Thematic Mapper image from the same time period and area. The preliminary results of a supervised classification show that map accuracy was 57%, 77%, 44%, and 83% for lodgepole live and dead, and spruce/fir live and dead respectively. The highest commission error, 24%, was for dead lodgepole pine being falsely labeled dead spruce/fir. The second highest commission error, 22%, was for live spruce/fir falsely labeled dead spruce/fir. The results indicate high spectral overlap between dead spruce/fir and dead

  10. Effects of biotic and abiotic stress on induced accumulation of terpenes and phenolics in red pines inoculated with bark beetle-vectored fungus.

    Science.gov (United States)

    Klepzig, K D; Kruger, E L; Smalley, E B; Raffa, K F

    1995-05-01

    This study characterized the chemical response of healthy red pine to artificial inoculation with the bark beetle-vectored fungusLeptographium terebrantis. In addition, we sought to determine whether stress altered this induced response and to understand the implications of these interactions to the study of decline diseases. Twenty-five-year-old trees responded to mechanical wounding or inoculation withL. terebrantis by producing resinous reaction lesions in the phloem. Aseptically wounded and wound-inoculated phloem contained higher concentrations of phenolics than did constitutive tissue. Trees inoculated withL. terebrantis also contained higher concentrations of six monoterpenes,α-pinene,β-pinene, 3-carene, limonene, camphene, and myrcene, and higher total monoterpenes than did trees that were mechanically wounded or left unwounded. Concentrations of these monoterpenes increased with time after inoculation. Total phenolic concentrations in unwounded stem tissue did not differ between healthy and root-diseased trees. Likewise, constitutive monoterpene concentrations in stem phloem were similar between healthy and root-diseased trees. However, when stem phloem tissue was challenged with fungal inoculations, reaction tissue from root-diseased trees contained lower concentrations ofα-pinene, the predominant monoterpene in red pine, than did reaction tissue from healthy trees. Seedlings stressed by exposure to low light levels exhibited less extensive induced chemical changes when challenge inoculated withL. terebrantis than did seedlings growing under higher light. Stem phloem tissue in these seedlings contained lower concentrations ofα-pinene than did nonstressed seedlings also challenge inoculated withL. terebrantis. It is hypothesized that monoterpenes and phenolics play a role in the defensive response of red pine against insect-fungal attack, that stress may predispose red pine to attack by insect-fungal complexes, and that such interactions are involved

  11. Semiochemical-mediated flight strategies of two invasive elm bark beetles: a potential factor in competitive displacement.

    Science.gov (United States)

    Lee, Jana C; Hamud, Shakeeb M; Negrón, José F; Witcosky, Jeffrey J; Seybold, Steven J

    2010-04-01

    A seven-state survey showed that the recently detected invasive Asian banded elm bark beetle, Scolytus schevyrewi Semenov, was abundant in areas of Colorado and Wyoming, whereas the long-established European elm bark beetle, S. multistriatus (Marsham), was not as abundant. In one of a series of studies to evaluate whether S. schevyrewi is competitively displacing S. multistriatus in their North American zone of sympatry, we characterized long-range flight responses infested or uninfested to small cut logs of American, Chinese, and Siberian elm, Ulmus americana, U. parvifolia, and U. pumila. Trials were conducted in Colorado and Wyoming to test the flight response of S. schevyrewi; in California to test the response of S. multistriatus; and in Nevada to test the responses of both species simultaneously. Studies with S. schevyrewi showed that males and females aggregated toward Ulmus spp. host volatiles but provided no evidence of a putative aggregation pheromone during the 0- to 48- or 48- to 96-h period of infestation. In contrast, S. multistriatus was attracted to U. pumila over unbaited controls, more to U. pumila infested with conspecific females than without, and more during the 48- to 96- versus 0- to 48-h period of infestation. This confirmed that male and female S. multistriatus aggregated toward host volatiles and that females produced an aggregation pheromone. In a cross-attraction study, S. schevyrewi displayed neither flight preference nor interruption to U. pumila infested with conspecifics, heterospecifics, or a mix of both species. Response of S. multistriatus was too low to draw conclusions. Although S. multistriatus aggregates moderately to host volatiles and strongly to female-derived pheromones emitted after a few days, S. multistriatus may have a relative disadvantage by selecting elm hosts more slowly than S. schevyrewi, which aggregates very strongly to host volatiles. The differential long-range host location strategy may be one factor in a

  12. A Population Genetic Model of Evolution of Host-Mate Attraction and Nonhost Repulsion in a Bark Beetle Pityogenes bidentatus

    Directory of Open Access Journals (Sweden)

    John A. Byers

    2012-01-01

    Full Text Available Studies have shown that the bark beetle Pityogenes bidentatus (Coleoptera, Curculionidae, Scolytinae avoids volatiles of nonhost trees (Norway Spruce, birch, and oak and healthy host Scotch Pine when orienting to aggregation pheromone. A population genetic model of two behavioral genes was hypothesized where AA, Aa, and aa were allele combinations regulating orientation to host tree and pheromone odors, and BB, Bb, and bb were combinations allowing avoidance of nonhost and unsuitable host odors. The nine possible genotypes were assigned different survival factors that remained constant during simulation. The initial proportion of aabb genotype (little aggregation/host response and little avoidance of nonhosts was ~1.0 when a mutation was hypothesized that caused better orientation to host/beetle odors (Aabb and another mutation causing more efficient avoidance of nonhosts (aaBb. After these initial mutations, the model used indiscriminate mating of genotypic proportions and subsequent survival as input for each successive generation. The results indicate that AABB eventually fixates in the populations in some scenarios, while AABB and other genotypes reach stable equilibriums in other models depending on genotypic survival values supported by ecologically sound assumptions. The models indicate how development of insecticide resistance in pest insects may proceed.

  13. 小蠹识别信息化合物的嗅觉机制%Olfactory mechanism of bark beetle recognizing the semiochemicals

    Institute of Scientific and Technical Information of China (English)

    秦浩; 于艳雪; 张俊华; 叶保华; 陈乃中

    2013-01-01

    小蠹是全球森林生态系统最具危害性的森林害虫类群之一,具有十分突出的检疫重要性.本文从昆虫周缘嗅觉信号的传导过程入手,阐述了小蠹识别信息化合物的类别、小蠹嗅觉编码机制以及小蠹嗅觉定位机制3个方面,提出了探索小蠹识别外界信息化合物分子机制的必要性.%The bark beetle is one of the most dangerous forest pests in global forest ecological system, which plays an important role in the plant quarantine. This review begin with the transmitting progress of the peripheral olfactory signal, and amplify the types of semiochemicals of bark beetles recognizing. Mechanism of olfactory code, and localization are subsequently summarized. It is necessary to explore the molecular mechanism of bark beetle recognizing the semiochemicals.

  14. Snowpack Response to Changes in Forest Condition Over Six Years Post Mountain Pine Beetle Attack

    Science.gov (United States)

    Winkler, R.; Boon, S.

    2011-12-01

    Since 1994, 17.5 million hectares of lodgepole pine dominated forest in British Columbia have been attacked by mountain pine beetle (MPB). More than 6 million hectares of timber in Alberta are susceptible, as are lodgepole pine stands throughout the western United States. Such extensive forest die-off raises concern regarding increased snow accumulation and ablation rates in affected stands and associated increases in snowmelt generated streamflow. To quantify changes in snow accumulation and ablation post-MPB, forest condition and snow were monitored in an attacked young lodgepole pine stand, a mature mixed species green stand and a clearcut near Mayson Lake in the southern interior of BC. Surveys began in 2006, the year following attack, and continued until 2011, as trees turned from green to red to grey. Forest canopy loss was described by canopy transmittance and litter in and on the snowpack. Canopy transmittance in the attacked stand increased from 27% in fall 2007 to 49% in spring 2011. Canopy transmittance in the mature stand remained constant, averaging 19% across the stand. The greatest canopy loss in the attacked stand occurred in summer 2009 when canopy transmittance increased from 35% to 42%. However, the largest accumulation of litter over a winter was measured in the spring of 2009 when the weight of litter in the snowpack (210 g m-2) was double that in the green stand and ten times the amount collected in 2010, by which time trees were turning grey. At mid-melt 2009, snow surface litter cover in the attacked stand varied from 0% to 54% and averaged 18% compared to ≤9% in other years. Increases in forest litter in the attacked stand caused a more rapid decay in snow surface albedo in spring 2009 than in other years. Snow water equivalent near the onset of melt varied significantly from year to year; from 148 mm to 263 mm on April 1 in the clearcut, 88 mm to 191 mm in the attacked pine, and 65 mm to 144 mm in the green mature stand. The strongest

  15. Mattesia weiseri sp. nov., a new neogregarine (Apicomplexa: Lipotrophidae) pathogen of the great spruce bark beetle, Dendroctonus micans (Coleoptera: Curculionidae, Scolytinae).

    Science.gov (United States)

    Yaman, Mustafa; Radek, Renate

    2015-08-01

    A new neogregarine pathogen of the great spruce bark beetle, Dendroctonus micans (Coleoptera: Curculionidae, Scolytinae), is described based on light microscopy and ultrastructural characteristics. The pathogen infects the fat body and the hemolymph of the beetle. The infection was nonsynchronous so that different developmental stages could be observed simultaneously in the hemolymph. All life stages from sporozoite to oocyst of the pathogen including micronuclear and macronuclear merozoites were detected. The sporozoites measured about 8.7 × 1.9 μm and trophozoites, 11.9 × 3.3 μm. Micronuclear merozoites seen in the hemolymph were motile, elongate, slightly broader at the anterior pole, and measured 18.4 × 2.0 μm. Macronuclear merozoites had a size of ca. 16.4 × 2.3 μm. Gametogamy results in the formation of two paired oocysts within a gametocyst. The lemon-shaped oocyst measured 10.9 × 6.1 μm and had a very thick wall (375-450 nm). All morphological and ultrastructural characteristics of the life cycle stages indicate that the described neogregarine in D. micans is clearly different from known Mattesia species infecting bark beetles, and from any other described Mattesia spp. Therefore, we create a new species, Mattesia weiseri sp. nov.

  16. Host suitability analysis of the bark beetle Scolytus amygdali (Coleoptera: Curculionidae: Scolytinae).

    Science.gov (United States)

    Zeiri, A; Ahmed, M Z; Braham, M; Qiu, B-L

    2015-08-01

    Scolytus amygdali is a polyphagous insect pest that feeds on fruit trees and forest trees. Our study assessed the host preference and reproductive potential of S. amygdali on four tree species: almond (Prunus dulcis), apricot (Prunus armeniaca), peach (Prunus persica), and plum (Prunus domestica). Females of S. amygdali produced maternal galleries that were longer on peach than the other three trees, and female fecundity was highest on peach. Females with longer maternal galleries produced more eggs, indicating a positive correlation between maternal gallery length and female fertility. The under-bark development time of S. amygdali is significantly shorter on plum (45 days) and almond (56 days) than on apricot (65 days) and peach (64 days). Despite this longer development time on peach, our results still suggest that, of the four types of tree tested, peach is the most preferred host for S. amygdali.

  17. 四川铁路口岸首次从美国白蜡木中截获刺海小蠹%The first interception of eastern ash bark beetle in Sichuan railway port

    Institute of Scientific and Technical Information of China (English)

    鲁昕; 刘洋洋

    2014-01-01

    Eastern ash bark beetle was been intercepted for the first time from the American imported ash wood by the port of Sichuan. This article describes the identification characters,the biological characteristics,the damage situation of Eastern ash bark beetle, and the methods of control.%四川口岸从美国进口白蜡木板材中首次截获外来有害生物刺海小蠹。本文叙述了刺海小蠹的鉴定特征、生物学特性、危害情况,并对防治进行了介绍。

  18. New record and extension of the distribution range of the bark beetle Dendroctonus rhizophagus (Curculionidae: Scolytinae) Nuevo registro y ampliación del área de distribución del descortezador Dendroctonus rhizophagus (Curculionidae: Scolytinae)

    OpenAIRE

    Francisco Armendáriz-Toledano; Verónica Torres-Banda; María Fernanda López; Jaime Villa-Castillo; Gerardo Zúñiga

    2012-01-01

    After several exploratory surveys to the states of Jalisco and Zacatecas in the Sierra Madre Occidental (SMOC), the bark beetle Dendroctonus rhizophagus Thomas and Bright, 1970 was recorded in 2 geographic localities of Villa Guerrero, Jalisco. These new records extend the range of distribution of this beetle a further 250 km south along the SMOC from the southernmost site recorded in the state of Durango. These records indicate that this species may be present in almost any area of the SMOC ...

  19. Impact of bark beetle calamity on soil moisture dynamics during floods and droughts in 2013 - case study of Rokytka Brook catchment, Šumava Mts., Czech Republic

    Science.gov (United States)

    Vlcek, Lukas; Kocum, Jan; Jansky, Bohumir; Sefrna, Ludek

    2014-05-01

    This paper describes the dynamics of soil moisture in the experimental catchment of Rokytka Brook, Otava River basin, Šumava National Park, Czech Republic. This area has a long-term problems with bark beetle which results predominantly in the spruce forest perdition. This phenomenon has resulted not only in a change of a vegetation composition, but also it has impacted the development of local land cover, soil moisture dynamics or the storage capacity of soils and the potential retention conditions within the basin . The experimental catchment, where the research was carried out, consists by 2/3 of terrestrial soil (Entic Podzol). The soil is covered by the dead forest (former spuce forest before bark beetle calamity) and by the beech forest (former spruce-beech forest). The rest of the basin consists of well-developed peatbogs that represents a typical example of a peatbog in Šumava Mts. In terms of vegetation, the area can be divided into a lower part consisting of healthy waterlogged spruce forest, the mountain pine covers the middle part and the upper part is covered mostly by the cotton grass. In the part where terrestrial soils predominate, measuring of soil pressures and temperatures at two depths (20 and 60 cm) at two sites (former spruce-beech and spruce forest) has been carried out since 2012. Due to the bark beetle calamity, the spruce forest has become withered and thus the vegetation cover has changed. Meteorological data (precipitation, air temperature, humidity) are collected by meteorological stations located within the basin or used from nearby stations (solar radiation, wind speed). The outflow from the experimental catchment is also measured. The aim of this paper is to simulate the dynamics of a soil moisture condition before bark beetle outbreak, to compare the differences and changes of a soil moisture and retention ability of a typical soil type in the case of a characteristic headwater catchment in Šumava Mts. For the simulation of a soil

  20. CONTRIBUTION FOR THE DIAGNOSIS AND CONTROL OF THE BARK BEETLES OF GENUS IPS (COLEOPTERA: SCOLYTIDAE IN THE PINE FOREST OF CUBA

    Directory of Open Access Journals (Sweden)

    René Alberto López Castilla

    2009-12-01

    Full Text Available There are four pines species endemic from Cuba with width importance, from the Conservation of the Forest Genetic Resources at regional level to the mitigation of the climatic change. Their economical importance is due to forming pure forest stand of fast growth and of straight trunk. The bark beetle of the genus Ips De Geer (Coleoptera: Scolytidae and the associate mushrooms from the complex Ophiostomatoid (Ceratocystidaceae: Microascales Phylum Ascomycotina are those that cause the biggest damages in the plantations of pines in Cuba. The damage management was based mainly on the logging of all the infested trees and the application of organosintetic insecticides with the consequent affectations to the environment apart from economic losses. In this work were determined the most noxious Ips species and the most vulnerable pine species by means of the development of experiments with randomized design on logging of pines and systematic samplings in pine trees in the western region. It was also defined a threshold of damage index and the most effective treatment with biological products in the central region. These results were integrated and introduced like a methodology of bark beetle management in a plantations area of Pinus caribaea Morelet. var caribaea (Punta Felipe, Villa Clara, Cuba after the development of an outbreak of this noxious complex and it was demonstrated that it was possible to control this forest pest without carrying out the logging of all the affected trees neither the application of organosintetic insecticides. As what this work has a positive environmental impact, contributing to the healthy conservation of the pine forests and an economic impact due to the saving of foreign currencies for concept of insecticides left of applying and also to diminish the losses of wooden increase.

  1. Carbon isotopic composition of forest soil respiration in the decade following bark beetle and stem girdling disturbances in the Rocky Mountains.

    Science.gov (United States)

    Maurer, Gregory E; Chan, Allison M; Trahan, Nicole A; Moore, David J P; Bowling, David R

    2016-07-01

    Bark beetle outbreaks are widespread in western North American forests, reducing primary productivity and transpiration, leading to forest mortality across large areas and altering ecosystem carbon cycling. Here the carbon isotope composition (δ(13) C) of soil respiration (δJ ) was monitored in the decade after disturbance for forests affected naturally by mountain pine beetle infestation and artificially by stem girdling. The seasonal mean δJ changed along both chronosequences. We found (a) enrichment of δJ relative to controls (<1 ‰) in near-surface soils in the first 2 years after disturbance; (b) depletion (1‰ or no change) during years 3-7; and (c) a second period of enrichment (1-2‰) in years 8-10. Results were consistent with isotopic patterns associated with the gradual death and decomposition of rhizosphere organisms, fine roots, conifer needles and woody roots and debris over the course of a decade after mortality. Finally, δJ was progressively more (13) C-depleted deeper in the soil than near the surface, while the bulk soil followed the well-established pattern of (13) C-enrichment at depth. Overall, differences in δJ between mortality classes (<1‰) and soil depths (<3‰) were smaller than variability within a class or depth over a season (up to 6‰). PMID:26824577

  2. Field responses of the Asian larch bark beetle, Ips subelongatus, to potential aggregation pheromone components: disparity between two populations in northeastern China

    Institute of Scientific and Technical Information of China (English)

    Li-Wen Song; Qing-He Zhang; Yue-Qu Chen; Tong-Tong Zuo; Bing-Zhong Ren

    2011-01-01

    Behavioral responses of the Asian larch bark beetle, Ips subelongatus Motsch. to three potential aggregation pheromone components, ipsenol (racemic or [-]-enantiomer), ipsdienol (racemic or [+]-enantiomer) and 3-methyl-3-buten-1 -ol, were tested using partial or full factorial experimental designs in two provinces (Inner Mongolia and Jilin) of northeastern China. Our field bioassays in Inner Mongolia (Larix principis- rupprechtii Mayr. plantation) clearly showed that ipsenol, either racemic or 97%-(-)-enantiomer, was the only compound that significantly attracted both sexes of I. subelongatus, while all other compounds (singly or in combinations) were unattractive. There were no two- or three-way synergistic interactions. However, in Jilin Province (L. gmelini [Rupr.] Rupr. Plantation), all the individual compounds tested were inactive, except a very weak activity by 97%-(-)-ipsenol in 2004 when the beetle population was very high. While a combination of ipsenol and ipsdienol (racemates or enantiomerically pure natural enantiomers) showed a significant attraction for both sexes of I. subelongatus, indicating a two-way synergistic interaction between these two major components, addition of 3-methyl-3-buten-l-ol to these active binary blend(s) did not have any effects on trap catches, suggesting that ipsenol and ipsdienol are the synergistic aggregation pheromone components of I. subelongatus in Jilin Province. It seems that 97%-(-)-ipsenol in Inner Mongolia or the binary blend of 97%-(-)-ipsenol and 97%-(+)-ipsdienol in Jilin Province are superior to their corresponding racemates, which might be due either to weak inhibitory effects of the antipode enantiomers or to reduced release rates of the active natural enantiomers) in the racemate(s). Our current bioassay results suggest that there is a strong geographical variation in aggregation pheromone response of I. subelongatus in northeastern China. Future research on the pheromone production and response of I

  3. Biological pest control in beetle agriculture.

    Science.gov (United States)

    Aanen, Duur K; Slippers, Bernard; Wingfield, Michael J

    2009-05-01

    Bark beetles are among the most destructive tree pests on the planet. Their symbiosis with fungi has consequently been studied extensively for more than a century. A recent study has identified actinomycete bacteria that are associated with the southern pine beetle and produce specific antibiotics against an antagonist of the beetles' mutualistic fungus. In addition to highlighting the ecological complexity of bark-beetle-microbial symbioses, this work reveals a potential source of novel antibiotics.

  4. Emissions of BVOC from Lodgepole Pine in response to Mountain Pine Beetle attack in high and low mortality forest stands

    Directory of Open Access Journals (Sweden)

    T. R. Duhl

    2012-07-01

    Full Text Available In this screening study biogenic volatile organic compound (BVOC emissions from intact branches of lodgepole pine (Pinus contorta trees were measured from trees at two forested sites that have been impacted differently by the mountain pine beetle (MPB with one having higher mortality and the other with lower mortality. Differences in the amounts and chemical diversity of BVOC between the two sites and from apparently healthy trees versus trees in different stages of MPB attack are presented, as well as (for one site observed seasonal variability in emissions. A brief site comparison is made of the hydrological characteristics and prior disturbances (both natural and man-made at the sites. Trees sampled at the site experiencing high MPB-related tree mortality had lower chemodiversity in terms of monoterpene (MT emission profiles, while profiles were more diverse at the lower-mortality site. Also at the higher-mortality site, MPB-infested trees in various stages of decline had lower emissions of sesquiterpenes (SQT compared to healthy trees, while at the site with lower mortality, MPB-survivors had significantly higher SQT emissions during part of the growing season when compared to both uninfested and newly-infested trees. SQT profiles differed between the two sites, and, like monoterpene and oxygenated VOC profiles, varied through the season For the low-mortality site in which repeated measurements were made over the course the early summer-late fall, higher chemical diversity was observed in early- compared to late-season measurements for all compound classes investigated (MT, oxygenated VOC, and SQT, with the amount of change appearing to correlate to the MPB status of the trees studied. Emissions of methyl-3-buten-2-ol had a distinct seasonal signal but were not much different between healthy or infested trees, except in trees with dead needles, from which emissions of this compound were negligible, and in late-season MPB survivors, in

  5. Emissions of BVOC from lodgepole pine in response to mountain pine beetle attack in high and low mortality forest stands

    Directory of Open Access Journals (Sweden)

    T. R. Duhl

    2013-01-01

    Full Text Available In this screening study, biogenic volatile organic compound (BVOC emissions from intact branches of lodgepole pine (Pinus contorta trees were measured from trees at two forested sites that have been impacted differently by the mountain pine beetle (MPB, with one having higher mortality and the other with lower mortality. Differences in the amounts and chemical diversity of BVOC between the two sites and from apparently healthy trees versus trees in different stages of MPB attack are presented, as well as (for one site observed seasonal variability in emissions. A brief comparison is made of geological and climatic characteristics as well as prior disturbances (both natural and man-made at each site. Trees sampled at the site experiencing high MPB-related tree mortality had lower chemodiversity in terms of monoterpene (MT emission profiles, while profiles were more diverse at the lower-mortality site. Also at the higher-mortality site, MPB-infested trees in various stages of decline had lower emissions of sesquiterpenes (SQTs compared to healthy trees, while at the site with lower mortality, MPB-survivors had significantly higher SQT emissions during part of the growing season when compared to both uninfested and newly infested trees. SQT profiles differed between the two sites and, like monoterpene and oxygenated VOC profiles, varied through the season. For the low-mortality site in which repeated measurements were made over the course of the early summer–late fall, higher chemical diversity was observed in early- compared to late-season measurements for all compound classes investigated (MT, oxygenated VOC, and SQT, with the amount of change appearing to correlate to the MPB status of the trees studied. Emissions of 2-methyl-3-buten-2-ol (MBO had a distinct seasonal signal but were not much different between healthy or infested trees, except in trees with dead needles, from which emissions of this compound were negligible, and in late

  6. Assessing forest vulnerability and the potential distribution of pine beetles under current and future climate scenarios in the Interior West of the US

    Science.gov (United States)

    Evangelista, P.H.; Kumar, S.; Stohlgren, T.J.; Young, N.E.

    2011-01-01

    mountain pine beetle from another climate model suggested a decrease in habitat areas as great as 46% by 2050. Generally, 2020 and 2050 models that tested the three climate scenarios independently had similar trends, though one climate scenario for the western pine beetle produced contrasting results. Ranges for all three species of bark beetles shifted considerably geographically suggesting that some host species may become more vulnerable to beetle attack in the future, while others may have a reduced risk over time. ?? 2011 Elsevier B.V.

  7. Interruption of the semiochemical-based attraction of ambrosia beetles to ethanol-baited traps and ethanol-injected trap trees by verbenone.

    Science.gov (United States)

    Ranger, Christopher M; Tobin, Patrick C; Reding, Michael E; Bray, Alicia M; Oliver, Jason B; Schultz, Peter B; Frank, Steven D; Persad, Anand B

    2013-06-01

    We examined the extent to which verbenone, a bark beetle antiaggregation pheromone, interrupted the semiochemical-based attraction of ambrosia beetles. Field trapping studies conducted in Ohio showed that a verbenone dispenser with a release rate of 50 mg/d at 25°C reduced the attraction of Anisandrus sayi Hopkins, Euwallacea validus (Eichhoff), Hypothenemus dissimilis (Zimmermann), Xylosandrus germanus (Blandford), and Xyleborinus saxesenii (Ratzeburg) to ethanol-baited traps. A verbenone dispenser attached to ethanol-injected Magnolia virginiana L. trap trees deployed in Ohio also reduced ambrosia beetle attacks compared to trap trees without a verbenone dispenser. Subsequent field trials demonstrated a direct relationship between distance from a verbenone dispenser and ambrosia beetle attacks on trap trees in Ohio in 2011 and 2012 and Tennessee in 2012, but not in Tennessee and Virginia in 2011. Assessment of the influence of verbenone on the probability of attacks above a density threshold found that although attacks occurred on trap trees regardless of their proximity to a verbenone dispenser, the higher density of attacks per tree occurred on trap trees farthest away from the verbenone source in Ohio and Tennessee. Verbenone alone could be somewhat useful for discouraging ambrosia beetle attacks on individual trees or on a small spatial scale, but deployment of verbenone might be most effective when integrated as part of a "push-pull" strategy.

  8. New record and extension of the distribution range of the bark beetle Dendroctonus rhizophagus (Curculionidae: Scolytinae Nuevo registro y ampliación del área de distribución del descortezador Dendroctonus rhizophagus (Curculionidae: Scolytinae

    Directory of Open Access Journals (Sweden)

    Francisco Armendáriz-Toledano

    2012-09-01

    Full Text Available After several exploratory surveys to the states of Jalisco and Zacatecas in the Sierra Madre Occidental (SMOC, the bark beetle Dendroctonus rhizophagus Thomas and Bright, 1970 was recorded in 2 geographic localities of Villa Guerrero, Jalisco. These new records extend the range of distribution of this beetle a further 250 km south along the SMOC from the southernmost site recorded in the state of Durango. These records indicate that this species may be present in almost any area of the SMOC where conditions are suitable for its development.Después de varios viajes de exploración a los estados de Jalisco y Zacatecas en la sierra Madre Occidental (SMOC, se registró la presencia del descortezador Dendroctonus rhizophagus Thomas y Bright, 1970 en 2 localidades en el Municipio de Villa Guerrero, Jalisco. Estos nuevos registros amplían el área de distribución del descortezador 250 km hacia el sur de la SMOC, a partir del punto más sureño registrado en el estado de Durango. Asimismo, estos registros indican que esta especie puede estar presente en prácticamente cualquier área de la SMOC que reúna las condiciones adecuadas para su desarrollo.

  9. Influence of Mountain Pine Beetle on Fuels, Foliar Fuel Moisture Content, and Litter and Volatile Terpenes in Whitebark Pine

    OpenAIRE

    Toone, Chelsea

    2013-01-01

    Mountain pine beetle (Dendroctonus ponderosae Hopkins) has caused extensive tree mortality in whitebark pine (Pinus albicaulis Engelm) forests. Previous studies conducted in various conifer forests have shown that fine surface fuels are significantly altered during a bark beetle outbreak. Bark beetle activity in conifer stands has also been shown to alter foliar fuel moisture content and chemistry over the course of the bark beetle rotation.The objective of this study was to evaluate changes ...

  10. Spatial-temporal modeling of forest gaps generated by colonization from below- and above-ground beetle species

    DEFF Research Database (Denmark)

    Zhu, J.; Rasmussen, Jakob Gulddahl; Møller, Jesper;

    the Great Lakes Region. Here we examine the impact of two bark beetle groups, namely red turpentine beetles and pine engraver bark beetles, on tree mortality and the subsequent gap formation over time in a plantation in Wisconsin. We construct spatial-temporal statistical models that quantify the relations...

  11. Carbon balance of a partially-harvested mixed conifer forest following mountain pine beetle attack and its comparison to a clearcut

    Directory of Open Access Journals (Sweden)

    A. Mathys

    2013-03-01

    Full Text Available The recent mountain pine beetle (MPB outbreak has had an impact on the carbon (C cycling of lodgepole pine forests in British Columbia. This study examines how partial harvesting as a forest management response to MPB infestation affects the net ecosystem production (NEP of a mixed conifer forest (MPB-09 in Interior BC. MPB-09 is a 70-yr old stand that was partially harvested in 2009 after it had been attacked by MPB. Using the eddy-covariance technique, the C dynamics of the stand were studied over two years and compared to an adjacent clearcut (MPB-09C over the growing season. The annual NEP at MPB-09 increased from −108 g C m−2 in 2010 to −57 g C m−2 in 2011. The increase of NEP was due to the associated increase in annual gross ecosystem photosynthesis (GEP from 812 g C m−2 in 2010 to 954 g C m−2 in 2011 exceeding the increase in annual respiration (Re from 920 g C m−2 to 1011 g C m−2 during the two years. During the growing season of 2010, NEP at MPB-09C was −132 g C m−2 indicating high C losses in the clearcut. MPB-09 was a C sink during the growing season of both years, increasing from 9 g C m−2 in 2010 to 47 g C m−2 in 2011. The increase of NEP in the partially-harvested stand amounted to a recovery corresponding to a 25% increase in the maximum assimilation rate in the second year. This study shows that retaining the healthy residual forest can result in higher C sequestration of MPB-attacked stands compared to clearcut harvesting.

  12. A dark cuticle allows higher investment in immunity, longevity and fecundity in a beetle upon a simulated parasite attack.

    Science.gov (United States)

    Krams, Indrikis; Burghardt, Gordon M; Krams, Ronalds; Trakimas, Giedrius; Kaasik, Ants; Luoto, Severi; Rantala, Markus J; Krama, Tatjana

    2016-09-01

    Cuticle melanism in insects is linked to a number of life history traits: a positive relationship is hypothesized between melanism, immune function, fecundity and lifespan. However, it is not clear how activation of the immune system affects trade-offs between life history traits in female mealworm beetles (Tenebrio molitor) differing in cuticle melanization. The females with tan, brown and black cuticles examined in the present study did not differ in the intensity of encapsulation response, fecundity and longevity when their immune system was not activated. However, we found that immune activation and cuticle melanization have a significant effect on life history traits. Offspring number and lifespan decreased in females with tan and brown cuticles, while the fecundity and lifespan of black females were not affected. Importantly, we inserted the implants again and found a significant decrease in the strength of encapsulation response in females with tan and brown cuticles. In contrast, black females increased melanotic reactions against the nylon implant, suggesting immunological priming. The results show that cuticle melanization plays an important adaptive role under the risk of being infected, while the lack of these benefits before the insertion of nylon monofilaments suggests that there are costs associated with an activated immunity system. PMID:27245343

  13. Impacts of partial harvesting on the carbon and water balance of a mixed conifer forest attacked by the mountain pine beetle

    Science.gov (United States)

    Mathys, A.; Black, T. A.; Brown, M.; Nesic, Z.; Nishio, G.; Burton, P.; Spittlehouse, D.; Fredeen, A.; Trofymow, T.; Grant, N.; Lessard, D.; Bowler, R.

    2011-12-01

    The mountain pine beetle (MPB) outbreak has had a major impact on the carbon (C) and water balances of forests in Interior BC, Canada. As a management response, the forest sector has increased the annual allowable cut to enable partial harvesting in the timber supply areas. Protecting the non-pine secondary structure provides opportunities for mid-term (15-30 years) timber harvest, while providing habitat for wildlife, reducing run-off to rivers and streams and retaining stand biomass. This study investigates the effects of partial cutting on the CO2 and H2O fluxes and also compares it to clearcut harvesting. The study area is an MPB-attacked forest located near Summit Lake (54°13'N, 122°37'W) about 40 km north of Prince George, BC. In February and March 2009, the beetle-killed lodgepole pine trees (Pinus contorta var. latifolia) were removed, leaving 49% of secondary structure consisting mainly of black spruce (Picea mariana), white hybrid spruce (Picea engelmannii x glauca) and subalpine fir trees (Abies lasiocarpa) with a canopy height of ~16 m and a stand density of 535 stems ha-1. Net ecosystem productivity (NEP) has been continuously measured since October 2009 with the eddy-covariance technique using an ultrasonic anemometer and an open-path infrared gas analyzer mounted 26 m above the ground. This poster reports results for 2010, which was a relatively normal year in central BC with respect to solar radiation, precipitation and air temperature. During the growing season the stand was a C sink, with monthly total NEP values of up to 23.1 g C m-2 in June. Midday evapotranspiration rates did not exceed 0.3 mm h-1 with Bowen ratios usually greater than 1.5. By the end of the year the stand was a weak C source with an annual NEP of -50 g C m-2. In comparison, clearcuts in the region remain C sources for many years during the growing season. Results for 2011 will also be presented and compared to flux measurements in part of the stand that was clearcut

  14. Bark- and wood-borer colonization of logs and lumber after heat treatment to ISPM 15 specifications: the role of residual bark.

    Science.gov (United States)

    Haack, Robert A; Petrice, Toby R

    2009-06-01

    Wood packaging material (WPM) is a major pathway for international movement of bark- and wood-infesting insects. ISPM 15, the first international standard for treating WPM, was adopted in 2002 and first implemented in the United States in 2006. ISPM 15 allows bark to remain on WPM after treatment, raising concerns that insects could infest after treatment, especially if bark were present. We conducted field studies to evaluate insect infestation of green logs and lumber with varying amounts of bark after heat treatment. In a log study, Cerambycidae and Scolytinae (ambrosia beetles and bark beetles) readily infested and developed in logs with bark after heat treatment. In a lumber study, Cerambycidae and bark beetles laid eggs in all sizes of bark patches tested (approximately 25, 100, 250, and 1,000 cm2) after heat treatment but did not infest control or heat-treated lumber without bark. Cerambycidae completed development only in boards with bark patches of 1,000 cm2, whereas bark beetles completed development on patches of 100, 250, and 1,000 cm2. Survival of bark beetles was greater in square patches (10 by 10 cm) versus rectangular patches (2.5 by 40 cm) of the same surface area (100 cm2). In surveys at six U.S. ports in 2006, 9.4% of 5,945 ISPM 15-marked WPM items contained bark, and 1.2% of 564 ISPM 15-marked WPM items with bark contained live insects of quarantine significance under the bark. It was not possible to determine whether the presence of live insects represented treatment failure or infestation after treatment.

  15. Molecular Markers Detect Cryptic Predation on Coffee Berry Borer (Coleoptera: Curculionidae) by Silvanid and Laemophloeid Flat Bark Beetles (Coleoptera: Silvanidae, Laemophloeidae) in Coffee Beans.

    Science.gov (United States)

    Sim, Sheina B; Yoneishi, Nicole M; Brill, Eva; Geib, Scott M; Follett, Peter A

    2016-02-01

    The coffee berry borer, Hypothenemus hampei (Ferrari) (Coleoptera: Curculionidae), is a serious pest of coffee worldwide. It was first detected in Hawai'i in 2010. Two predatory beetles, Cathartus quadricollis (Coleoptera: Silvanidae) and Leptophloeus sp. (Coleoptera: Laemophloeidae), have been observed in H. hampei-infested coffee. Under laboratory conditions, colony-reared C. quadricollis and Leptophloeus sp. prey upon all life stages of H. hampei. However, the H. hampei life cycle occurs almost exclusively within a coffee bean obscured from direct observation. Thus, it is unknown if C. quadricollis and Leptophloeus sp. consume H. hampei as prey in the wild. To demonstrate predation of H. hampei by C. quadricollis and Leptophloeus sp., a molecular assay was developed utilizing species-specific primers targeting short regions of the mitochondrial COI gene to determine species presence. Using these primers, wild C. quadricollis and Leptophloeus sp. were collected and screened for the presence of H. hampei DNA using PCR. Analysis of collections from five coffee farms revealed predation of C. quadricollis and Leptophloeus sp. on H. hampei. Further laboratory testing showed that H. hampei DNA could be detected in predators for as long as 48 h after feeding, indicating the farm-caught predators had preyed on H. hampei within 2 d of sampling. This study demonstrates the utility of molecular markers for the study of the ecology of predators and prey with cryptic behavior, and suggests C. quadricollis and Leptophloeus sp. might be useful biocontrol agents against H. hampei.

  16. Enhancing Stand Structure through Snag Creation in Northeastern U.S. Forests: Using Ethanol Injections and Bark Beetle Pheromones to Artificially Stress Red Maple and White Pine

    Directory of Open Access Journals (Sweden)

    Kevin J. Dodds

    2016-06-01

    Full Text Available We investigated two methods to create white pine and red maple snags in a forested setting. The first involved injecting trees with ethanol at two times (single Ethanol (ETOH and double ETOH injections to increase attractiveness to insects and elicit attacks on trees. The second method was unique to white pines and involved both injection treatments in combination with baiting trees with Ips-specific pheromones. Three of five white pines from the double ETOH treatment died in the second year. Species including Ips pini (Say, Ips grandicollis Eichhoff, Orthotomicus caelatus Eichhoff, Crypturgus borealis Swaine and Monochamus notatus (Drury responded more strongly to at least one of the treatments over control trees. However, there were no differences found in individual Scolytinae or Cerambycidae species response to treatments in red maple. Fitness (FV/FM and vitality (PIabs were both significantly reduced in both ETOH treatments compared to controls in white pine. In red maple, fitness was reduced in the double ETOH treated trees but the final mean FV/FM values were within the approximate optimal of health. Ethanol injections, in combination with Ips-specific semiochemicals, show promise for creating standing coarse woody debris (CWD in white pine. Injecting ethanol was not effective for stressing red maple.

  17. Evaluating Predators and Competitors in Wisconsin Red Pine Forests for Attraction to Mountain Pine Beetle Pheromones for Anticipatory Biological Control.

    Science.gov (United States)

    Pfammatter, Jesse A; Krause, Adam; Raffa, Kenneth F

    2015-08-01

    Mountain pine beetle, Dendroctonus ponderosae Hopkins (Coleoptera: Curculionidae), is an irruptive tree-killing species native to pine forests of western North America. Two potential pathways of spread to eastern forests have recently been identified. First, warming temperatures have driven range expansion from British Columbia into Albertan jack pine forests that are contiguous with the Great Lakes region. Second, high temperatures and drought have fostered largescale outbreaks within the historical range, creating economic incentives to salvage killed timber by transporting logs to midwestern markets, which risks accidental introduction. We evaluated the extent to which local predators and competitors that exploit bark beetle semiochemicals would respond to D. ponderosae in Wisconsin. We emulated D. ponderosae attack by deploying lures containing synthetic aggregation pheromones with and without host tree compounds and blank control traps in six red pine plantations over 2 yr. Predator populations were high in these stands, as evidenced by catches in positive control traps, baited with pheromones of local bark beetles and were deployed distant from behavioral choice plots. Only one predator, Thanasimus dubius F. (Coleoptera: Cleridae) was attracted to D. ponderosae's aggregation pheromones relative to blank controls, and its attraction was relatively weak. The most common bark beetles attracted to these pheromones were lower stem and root colonizers, which likely would facilitate rather than compete with D. ponderosae. There was some, but weak, attraction of potentially competing Ips species. Other factors that might influence natural enemy impacts on D. ponderosae in midwestern forests, such as phenological synchrony and exploitation of male-produced pheromones, are discussed.

  18. Asparagus Beetle and Spotted Asparagus Beetle

    OpenAIRE

    Erin W Hodgson; Drost, Dan

    2007-01-01

    Asparagus beetle, Crioceris asparagi, and spotted asparagus beetle, C. duodecimpunctata are leaf beetles in the family Chrysomelidae. These beetles feed exclusively on asparagus and are native to Europe. Asparagus beetle is the more economically injurious of the two species.

  19. Fire severity unaffected by spruce beetle outbreak in spruce-fir forests in southwestern Colorado.

    Science.gov (United States)

    Andrus, Robert A; Veblen, Thomas T; Harvey, Brian J; Hart, Sarah J

    2016-04-01

    Recent large and severe outbreaks of native bark beetles have raised concern among the general public and land managers about potential for amplified fire activity in western North America. To date, the majority of studies examining bark beetle outbreaks and subsequent fire severity in the U.S. Rocky Mountains have focused on outbreaks of mountain pine beetle (MPB; Dendroctonus ponderosae) in lodgepole pine (Pinus contorta) forests, but few studies, particularly field studies, have addressed the effects of the severity of spruce beetle (Dendroctonus rufipennis Kirby) infestation on subsequent fire severity in subalpine Engelmann spruce (Picea engelmannii) and subalpine fir (Abies lasiocarpa) forests. In Colorado, the annual area infested by spruce beetle outbreaks is rapidly rising, while MPB outbreaks are subsiding; therefore understanding this relationship is of growing importance. We collected extensive field data in subalpine forests in the eastern San Juan Mountains, southwestern Colorado, USA, to investigate whether a gray-stage (fire) spruce beetle infestation affected fire severity. Contrary to the expectation that bark beetle infestation alters subsequent fire severity, correlation and multivariate generalized linear regression analysis revealed no influence of pre-fire spruce beetle severity on nearly all field or remotely sensed measurements of fire severity. Findings were consistent across moderate and extreme burning conditions. In comparison to severity of the pre-fire beetle outbreak, we found that topography, pre-outbreak basal area, and weather conditions exerted a stronger effect on fire severity. Our finding that beetle infestation did not alter fire severity is consistent with previous retrospective studies examining fire activity following other bark beetle outbreaks and reiterates the overriding influence of climate that creates conditions conducive to large, high-severity fires in the subalpine zone of Colorado. Both bark beetle outbreaks and

  20. Ethanol injection of ornamental trees facilitates testing insecticide efficacy against ambrosia beetles (Coleoptera: Curculionidae: Scolytinae).

    Science.gov (United States)

    Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Ranger, Christopher M; Youssef, Nadeer N

    2013-02-01

    Exotic ambrosia beetles are damaging pests in ornamental tree nurseries in North America. The species Xylosandrus crassiusculus (Motshulsky) and Xylosandrus germanus (Blandford) are especially problematic. Management of these pests relies on preventive treatments of insecticides. However, field tests of recommended materials on nursery trees have been limited because of unreliable attacks by ambrosia beetles on experimental trees. Ethanol-injection of trees was used to induce colonization by ambrosia beetles to evaluate insecticides and botanical formulations for preventing attacks by ambrosia beetles. Experiments were conducted in Ohio, Tennessee, and Virginia. Experimental trees injected with ethanol had more attacks by ambrosia beetles than uninjected control trees in all but one experiment. Xylosandrus crassiusculus and X. germanus colonized trees injected with ethanol. In most experiments, attack rates declined 8 d after ethanol-injection. Ethanol-injection induced sufficient pressure from ambrosia beetles to evaluate the efficacy of insecticides for preventing attacks. Trunk sprays of permethrin suppressed cumulative total attacks by ambrosia beetles in most tests. Trunk sprays of the botanical formulations Armorex and Veggie Pharm suppressed cumulative total attacks in Ohio. Armorex, Armorex + Permethrin, and Veggie Pharm + Permethrin suppressed attacks in Tennessee. The bifenthrin product Onyx suppressed establishment of X. germanus in one Ohio experiment, and cumulative total ambrosia beetle attacks in Virginia. Substrate drenches and trunk sprays of neonicotinoids, or trunk sprays of anthranilic diamides or tolfenpyrad were not effective. Ethanol-injection is effective for inducing attacks and ensuring pressure by ambrosia beetles for testing insecticide efficacy on ornamental trees.

  1. Comparison of lodgepole and jack pine resin chemistry: implications for range expansion by the mountain pine beetle, Dendroctonus ponderosae (Coleoptera: Curculionidae).

    Science.gov (United States)

    Clark, Erin L; Pitt, Caitlin; Carroll, Allan L; Lindgren, B Staffan; Huber, Dezene P W

    2014-01-01

    The mountain pine beetle, Dendroctonus ponderosae, is a significant pest of lodgepole pine in British Columbia (BC), where it has recently reached an unprecedented outbreak level. Although it is native to western North America, the beetle can now be viewed as a native invasive because for the first time in recorded history it has begun to reproduce in native jack pine stands within the North American boreal forest. The ability of jack pine trees to defend themselves against mass attack and their suitability for brood success will play a major role in the success of this insect in a putatively new geographic range and host. Lodgepole and jack pine were sampled along a transect extending from the beetle's historic range (central BC) to the newly invaded area east of the Rocky Mountains in north-central Alberta (AB) in Canada for constitutive phloem resin terpene levels. In addition, two populations of lodgepole pine (BC) and one population of jack pine (AB) were sampled for levels of induced phloem terpenes. Phloem resin terpenes were identified and quantified using gas chromatography. Significant differences were found in constitutive levels of terpenes between the two species of pine. Constitutive α-pinene levels - a precursor in the biosynthesis of components of the aggregation and antiaggregation pheromones of mountain pine beetle - were significantly higher in jack pine. However, lower constitutive levels of compounds known to be toxic to bark beetles, e.g., 3-carene, in jack pine suggests that this species could be poorly defended. Differences in wounding-induced responses for phloem accumulation of five major terpenes were found between the two populations of lodgepole pine and between lodgepole and jack pine. The mountain pine beetle will face a different constitutive and induced phloem resin terpene environment when locating and colonizing jack pine in its new geographic range, and this may play a significant role in the ability of the insect to persist in

  2. Comparison of lodgepole and jack pine resin chemistry: implications for range expansion by the mountain pine beetle, Dendroctonus ponderosae (Coleoptera: Curculionidae

    Directory of Open Access Journals (Sweden)

    Erin L. Clark

    2014-02-01

    Full Text Available The mountain pine beetle, Dendroctonus ponderosae, is a significant pest of lodgepole pine in British Columbia (BC, where it has recently reached an unprecedented outbreak level. Although it is native to western North America, the beetle can now be viewed as a native invasive because for the first time in recorded history it has begun to reproduce in native jack pine stands within the North American boreal forest. The ability of jack pine trees to defend themselves against mass attack and their suitability for brood success will play a major role in the success of this insect in a putatively new geographic range and host. Lodgepole and jack pine were sampled along a transect extending from the beetle’s historic range (central BC to the newly invaded area east of the Rocky Mountains in north-central Alberta (AB in Canada for constitutive phloem resin terpene levels. In addition, two populations of lodgepole pine (BC and one population of jack pine (AB were sampled for levels of induced phloem terpenes. Phloem resin terpenes were identified and quantified using gas chromatography. Significant differences were found in constitutive levels of terpenes between the two species of pine. Constitutive α-pinene levels – a precursor in the biosynthesis of components of the aggregation and antiaggregation pheromones of mountain pine beetle – were significantly higher in jack pine. However, lower constitutive levels of compounds known to be toxic to bark beetles, e.g., 3-carene, in jack pine suggests that this species could be poorly defended. Differences in wounding-induced responses for phloem accumulation of five major terpenes were found between the two populations of lodgepole pine and between lodgepole and jack pine. The mountain pine beetle will face a different constitutive and induced phloem resin terpene environment when locating and colonizing jack pine in its new geographic range, and this may play a significant role in the ability of the

  3. Diversidad, fluctuación poblacional y plantas huésped de escolitinos (Coleoptera: Curculionidae asociados con el agroecosistema cacao en Tabasco, México Diversity, dynamic population and host plants of bark and ambrosia beetles (Coleoptera: Curculionidae associated to the cocoa agroecosystem in Tabasco, Mexico

    Directory of Open Access Journals (Sweden)

    Manuel Pérez-De La Cruz

    2009-12-01

    Full Text Available Se estudió la diversidad de escolitinos asociados con el agroecosistema cacao en Tabasco, México durante el año 2007. Los insectos adultos fueron recolectados en 4 localidades con trampas de alcohol etílico, trampas de atracción luminosa y captura directa sobre sus plantas huésped. Se recolectaron 19 263 ejemplares, pertenecientes a 51 especies y 26 géneros. Araptus hymenaeae y Cnesinus squamosus son nuevos registros para México. La máxima diversidad de insectos capturados con los 3 métodos de recolecta se obtuvo en El Bajío (H'=2.45 y Dmg=4.83, la mínima en Río Seco (H'=2.29 y Km. 21 (Dmg=3.85, y el máximo valor de equidad (J lo obtuvo El Bajío (0.67. El índice de similitud de Sorensen (Is mostró que los sitios de estudio tienden a presentar la misma composición de especies. Los índices de diversidad, equidad y similitud, aplicados a la fauna de escolitinos capturados con cada uno de los métodos empleados, mostraron diferencias, excepto en las trampas de alcohol. La fluctuación presenta picos poblacionales marcados al inicio y al final del año de estudio. Las plantas en las que se recolectó el mayor número de especies fueron Theobroma cacao (16 y Swietenia macrophylla (13.The bark and ambrosia beetle diversity in cocoa agroecosystems was studied during 2007 in Tabasco, Mexico. Adult insects were gathered in 4 localities with ethanol and light traps and by direct collecting in their host plants. 19 263 specimens were gathered, belonging to 51 species and 26 genera. Araptus hymenaeae and Cnesinus squamosus are new records for Mexico. The maximum diversity of insects captured with the 3 collecting methods was obtained in El Bajío (H'=2.45 and Dmg=4.83, the minimum in Río Seco (H'=2.29 and Km. 21 (Dmg=3.85, and the maximum value of justness (J was obtained in El Bajío (0.67. The Sorensen similarity index (Is showed that the study places present the same species composition. The diversity, justness and similarity indices

  4. Efficacy of imidacloprid, trunk-injected into Acer platanoides, for control of adult Asian longhorned beetles (Coleoptera: Cerambycidae).

    Science.gov (United States)

    Ugine, Todd A; Gardescu, Sana; Lewis, Phillip A; Hajek, Ann E

    2012-12-01

    Feeding experiments with Asian longhorned beetles (Anoplophora glabripennis (Motschulsky)) in a quarantine laboratory were used to assess the effectiveness of imidacloprid in reducing adult fecundity and survival. The beetles were fed twigs and leaves cut between June-September 2010 from Norway maples (Acer platanoides L.) in the beetle-infested area of Worcester, MA. Treated trees had been trunk-injected once with imidacloprid in spring 2010 under the U.S. Department of Agriculture-Animal and Plant Health Inspection Service operational eradication program. The 21 d LC50 value for adult beetles feeding on twig bark from imidacloprid-injected trees was 1.3 ppm. Adult reproductive output and survival were significantly reduced when beetles fed on twig bark or leaves from treated trees. However, results varied widely, with many twig samples having no detectable imidacloprid and little effect on the beetles. When twigs with > 1 ppm imidacloprid in the bark were fed to mated beetles, the number of larvae produced was reduced by 94% and median adult survival was reduced to 14 d. For twigs with 1 ppm). When given a choice of control twigs and twigs from injected trees, beetles did not show a strong preference.

  5. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  6. Multitrophic interaction facilitates parasite–host relationship between an invasive beetle and the honey bee

    OpenAIRE

    Torto, Baldwyn; Boucias, Drion G.; Arbogast, Richard T.; Tumlinson, James H.; Teal, Peter E. A.

    2007-01-01

    Colony defense by honey bees, Apis mellifera, is associated with stinging and mass attack, fueled by the release of alarm pheromones. Thus, alarm pheromones are critically important to survival of honey bee colonies. Here we report that in the parasitic relationship between the European honey bee and the small hive beetle, Aethina tumida, the honey bee's alarm pheromones serve a negative function because they are potent attractants for the beetle. Furthermore, we discovered that the beetles f...

  7. Traditional African plant products to protect stored cowpeas against insect damage : the battle against the beetle

    NARCIS (Netherlands)

    Boeke, S.J.

    2002-01-01

    Seeds of the cowpea plant, Vigna unguiculata , a tropical crop, are very susceptible to attack by the cowpea beetle. This specialist beetle needs only the beans to reproduce rapidly.Most farmers in West Africa have few possibilities to treat the beans and they face their stored supply

  8. Microsclerotia of Metarhizium brunneum F52 Applied in Hydromulch for Control of Asian Longhorned Beetles (Coleoptera: Cerambycidae).

    Science.gov (United States)

    Goble, Tarryn A; Hajek, Ann E; Jackson, Mark A; Gardescu, Sana

    2015-04-01

    The entomopathogenic fungus Metarhizium brunneum (Petch) strain F52 (Hypocreales: Clavicipitaceae) is able to produce environmentally persistent microsclerotia (hyphal aggregates). Microsclerotia of strain F52 produced as granules and incorporated into hydromulch (hydro-seeding straw, water, and a natural glue) provides a novel mycoinsecticide that could be sprayed onto urban, forest, or orchard trees. We tested this formulation against adult Asian longhorned beetles (Anoplophora glabripennis (Motschulsky)) using three substrates (moistened bark, dry bark, absorbent bench liner) sprayed with a low rate (9 microsclerotia granules/cm2) of hydromulch. Median survival times of beetles continuously exposed to sprayed moist bark or absorbent liner were 17.5 and 19.5 d, respectively. Beetles exposed to sprayed dry bark, which had a lower measured water activity, lived significantly longer. When moist bark pieces were sprayed with increased rates of microsclerotia granules in hydromulch, 50% died by 12.5 d at the highest application rate, significantly sooner than beetles exposed to lower application rates (16.5-17.5 d). To measure fecundity effects, hydromulch with or without microsclerotia was sprayed onto small logs and pairs of beetles were exposed for a 2-wk oviposition period in containers with 98 or 66% relative humidity. At 98% humidity, oviposition in the logs was highest for controls (18.3±1.4 viable offspring per female) versus 3.9±0.8 for beetles exposed to microsclerotia. At 66% humidity, fecundities of controls and beetles exposed to microsclerotia were not significantly different. This article presents the first evaluation of M. brunneum microsclerotia in hydromulch applied for control of an arboreal insect pest.

  9. The Spruce Beetle

    OpenAIRE

    Holsten, E H; Their, R W; Munson, A. S.; Gibson, K.E.

    1999-01-01

    The spruce beetle, Dendroctonus rufipennis (Kirby), is the most significant natural mortality agent of mature spruce. Outbreaks of this beetle have caused extensive spruce mortality from Alaska to Arizona and have occurred in every forest with substantial spruce stands. Spruce beetle damage results in the loss of 333 to 500 million board feet of spruce saw timber annually. More than 2.3 million acres of spruce forests have been infested in Alaska in the last 7 years with an estimated 30 milli...

  10. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  11. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  12. Importance of Secondary Metabolites for Leaf Beetles (Coleoptera: Chrysomelidae

    Directory of Open Access Journals (Sweden)

    A. N. EKİZ

    2014-06-01

    Full Text Available Leaf beetles (Chrysomelidae are one of the most diverse families of herbivorous insects. Many of them are important agricultural pests and cause remarkable loss of crop and money as well. Plant leaves and roots are primary food source of both larva and adults of leaf beetles. Plants produce many secondary metabolites in reaction to herbivore insects. It is a well-known phenomenon that quantity and variety of secondary metabolites in plant leaves may change in response to insect attacks. Herbivore insects have to deal with such defensive secondary chemicals and overcome either by detoxifying or storing them. Accordingly, many specialist herbivores coevolved with their host plant. Certain phenolic glycosides may reduce leaf beetle feeding. Condensed tannins are anti-herbivore defenses against leaf chewing beetles, including leaf beetles. Flavonoid compounds are feeding deterrents for many flea leaf beetles. Cinnamic acid derivatives are other known feeding deterrents for leaf beetles. Secondary metabolites quantity and nutritional quality of host plants are not only important for feeding but also for providing enemy-free space and suitable oviposition sites.

  13. Pyrolysis of Barks from Three Japanese Softwood

    OpenAIRE

    Umemura, Aki; Enomoto, Ryohei; Kounosu, Taku; Orihashi, Ken; Kato, Yoshiaki; Kojima, Yasuo

    2014-01-01

    Along with Japanese cedar bark, fir bark and Japanese larch bark were pyrolyzed to estimate the possibility of utilizing these softwood barks as resources for fine chemicals by comparing the pyrolysis product compositions. The three softwood barks contained higher ash content and yielded lower amount of volatiles when compared with cedar heartwood. The major pyrolysis products from their barks were similar to those previously reported from softwood trunks. Levoglucosan was a major pyrolysis p...

  14. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  15. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  16. [Panic attack].

    Science.gov (United States)

    Scantamburlo, G; Ansseau, M

    2004-05-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. PMID:15264579

  17. Management for Mountain Pine Beetle Outbreak Suppression: Does Relevant Science Support Current Policy?

    Directory of Open Access Journals (Sweden)

    Diana L. Six

    2014-01-01

    Full Text Available While the use of timber harvests is generally accepted as an effective approach to controlling bark beetles during outbreaks, in reality there has been a dearth of monitoring to assess outcomes, and failures are often not reported. Additionally, few studies have focused on how these treatments affect forest structure and function over the long term, or our forests’ ability to adapt to climate change. Despite this, there is a widespread belief in the policy arena that timber harvesting is an effective and necessary tool to address beetle infestations. That belief has led to numerous proposals for, and enactment of, significant changes in federal environmental laws to encourage more timber harvests for beetle control. In this review, we use mountain pine beetle as an exemplar to critically evaluate the state of science behind the use of timber harvest treatments for bark beetle suppression during outbreaks. It is our hope that this review will stimulate research to fill important gaps and to help guide the development of policy and management firmly based in science, and thus, more likely to aid in forest conservation, reduce financial waste, and bolster public trust in public agency decision-making and practice.

  18. Fire severity unaffected by spruce beetle outbreak in spruce-fir forests in southwestern Colorado.

    Science.gov (United States)

    Andrus, Robert A; Veblen, Thomas T; Harvey, Brian J; Hart, Sarah J

    2016-04-01

    Recent large and severe outbreaks of native bark beetles have raised concern among the general public and land managers about potential for amplified fire activity in western North America. To date, the majority of studies examining bark beetle outbreaks and subsequent fire severity in the U.S. Rocky Mountains have focused on outbreaks of mountain pine beetle (MPB; Dendroctonus ponderosae) in lodgepole pine (Pinus contorta) forests, but few studies, particularly field studies, have addressed the effects of the severity of spruce beetle (Dendroctonus rufipennis Kirby) infestation on subsequent fire severity in subalpine Engelmann spruce (Picea engelmannii) and subalpine fir (Abies lasiocarpa) forests. In Colorado, the annual area infested by spruce beetle outbreaks is rapidly rising, while MPB outbreaks are subsiding; therefore understanding this relationship is of growing importance. We collected extensive field data in subalpine forests in the eastern San Juan Mountains, southwestern Colorado, USA, to investigate whether a gray-stage (forests will alter fire severity, a result that has important implications for management and policy decisions.

  19. The Fungi and Insects Which Attack Rubberwood%危害橡胶木的真菌和昆虫

    Institute of Scientific and Technical Information of China (English)

    邢嘉琪

    2001-01-01

    The biological characteristics of the insects and fungi which seriously attack rubberwood and the present state of rubberwood biodeterioration in China were described. The fungi attaching rubberwood consist mainly of blue-stain fungi, moulds and rotting fungi. The insects include beetle borers, termites and some other Coleopteran species, such as longicorns and snout beetles etc., the total insect species are near to one hundred. The stain fungi, moulds and beetles should be paid more attention to in rubberwood preservation.

  20. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  1. Wildfire and Spruce Beetle Outbreak: Simulation of Interacting Disturbances in the Central Rocky Mountains

    OpenAIRE

    DeRose, Justin; Long, James N.

    2009-01-01

    Infrequent large-scale natural disturbance regimes are an integral component of Engelmann spruce (Picea engelmannii) forests of the central Rocky Mountains. Wildfires, bark beetle outbreaks, winds, and avalanches cause relatively drastic changes in community structure, composition, and function. These disturbances may occur independently or interact where the incidence of one may change the potential for another. We assessed potential wildfire behaviour change in the wake of a catastrophic, l...

  2. Mars attacks.

    Science.gov (United States)

    Cohain, Judy Slome

    2008-01-01

    "Mars Attacks" is a new term coined to describe unjustified violation of women by care providers at the time of birth, as well as the purposeful abandonment of the peer review system by major obstetric journals and the abandonment of the use of research evidence by ACOG in their latest protocols, in order to justify continued use of this form of violence against women. PMID:19244777

  3. What do dung beetles eat?

    DEFF Research Database (Denmark)

    Holter, Peter; Scholtz, Clarke H.

    2007-01-01

    Most adult coprophagous beetles feed on fresh dung of mammalian herbivores, confining ingestion to small particles with measured maximum diameters from 2-5 to 130 µm, according to body size and kind of beetle. This study explores benefits and costs of selective feeding in a ‘typical' dung beetle ...

  4. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  5. Hit‐and‐run trophallaxis of small hive beetles

    OpenAIRE

    Neumann, Peter; Naef, J.; Crailsheim, K; Crewe, RM; Pirk, CWW

    2015-01-01

    Abstract Some parasites of social insects are able to exploit the exchange of food between nestmates via trophallaxis, because they are chemically disguised as nestmates. However, a few parasites succeed in trophallactic solicitation although they are attacked by workers. The underlying mechanisms are not well understood. The small hive beetle (=SHB), Aethina tumida, is such a parasite of honey bee, Apis mellifera, colonies and is able to induce trophallaxis. Here, we investigate whether SHB ...

  6. Multitrophic interaction facilitates parasite-host relationship between an invasive beetle and the honey bee.

    Science.gov (United States)

    Torto, Baldwyn; Boucias, Drion G; Arbogast, Richard T; Tumlinson, James H; Teal, Peter E A

    2007-05-15

    Colony defense by honey bees, Apis mellifera, is associated with stinging and mass attack, fueled by the release of alarm pheromones. Thus, alarm pheromones are critically important to survival of honey bee colonies. Here we report that in the parasitic relationship between the European honey bee and the small hive beetle, Aethina tumida, the honey bee's alarm pheromones serve a negative function because they are potent attractants for the beetle. Furthermore, we discovered that the beetles from both Africa and the United States vector a strain of Kodamaea ohmeri yeast, which produces these same honey bee alarm pheromones when grown on pollen in hives. The beetle is not a pest of African honey bees because African bees have evolved effective methods to mitigate beetle infestation. However, European honey bees, faced with disease and pest management stresses different from those experienced by African bees, are unable to effectively inhibit beetle infestation. Therefore, the environment of the European honey bee colony provides optimal conditions to promote the unique bee-beetle-yeast-pollen multitrophic interaction that facilitates effective infestation of hives at the expense of the European honey bee. PMID:17483478

  7. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  8. Impact of Forest Fragmentation on Patterns of Mountain Pine Beetle-Caused Tree Mortality

    Directory of Open Access Journals (Sweden)

    Trisalyn A. Nelson

    2013-04-01

    Full Text Available The current outbreak of mountain pine beetle, Dendroctonus ponderosae Hopkins, has led to extensive tree mortality in British Columbia and the western United States. While the greatest impacts of the outbreak have been in British Columbia, ongoing impacts are expected as the outbreak continues to spread eastward towards Canada’s boreal and eastern pine forests. Successful mitigation of this outbreak is dependent on understanding how the beetle’s host selection behaviour is influenced by the patchwork of tree mortality across the landscape. While several studies have shown that selective mechanisms operate at the individual tree level, less attention has been given to beetles’ preference for variation in spatial forest patterns, namely forest fragmentation, and if such preference changes with changing population conditions. The objective of this study is to explore the influence of fragmentation on the location of mountain pine beetle caused mortality. Using a negative binomial regression model, we tested the significance of a fragmentation measure called the Aggregation Index for predicting beetle-caused tree mortality in the central interior of British Columbia, Canada in 2000 and 2005. The results explain that mountain pine beetle OPEN ACCESS Forests 2013, 4 280 exhibit a density-dependent dynamic behaviour related to forest patterns, with fragmented forests experiencing greater tree mortality when beetle populations are low (2000. Conversely, more contiguous forests are preferred when populations reach epidemic levels (2005. These results reinforce existing findings that bark beetles exhibit a strong host configuration preference at low population levels and that such pressures are relaxed when beetle densities are high.

  9. Molluscicidal activity of Nerium indicum bark

    Directory of Open Access Journals (Sweden)

    Sushma Singh

    1998-07-01

    Full Text Available The molluscicidal activity of Nerium indicum bark against Lymnaea acuminata snails was studied. The toxicity of different bark preparations was both time and dose dependent. The 24-h LC50 of the lyophilized aqueous extract of bark was 34.5 mg/l whereas that of lyophilized boiled water extract was 42.5 mg/l. Low concentrations of vacuum-dried ethanolic extract (24-h LC50: 4.9 mg/l and purified bark (24-h LC50: 0.87 mg/l were effective in killing the test snails.

  10. Pharmacognostic evaluation of Nyctanthes arbortristis bark

    Institute of Scientific and Technical Information of China (English)

    Sunil Ashokrao Nirmal; Subodh Chandra Pal; Subhash Chandra Mandal

    2012-01-01

    Objective: To study detailed Pharmacognosy of the bark of Nyctanthes arbortristis Linn (Oleaceae), an important plant in Indian system of medicine. Methods: the macroscopy, microscopy, physicochemical analysis, preliminary phytochemical testing of powder of the plant bark and other WHO recommended methods for the standardization was done. Results: Trunk bark consists of two distinct regions i.e. outer bark and inner bark. Outer bark consists of broad periderm of a wide phellem and inner phelloderm regions. Inner bark is broader than the outer part and it includes all the secondary phloem tissues. It can be distinguished into 2 zones viz. collapsed secondary phloem and non-collapsed secondary phloem regions. Collapsed secondary phloem region consist of thick blocks of phloem sclereids and radially oblique dark streaks of crushed sieve tubes and dilated axial parenchyma cells. Non-collapsed secondary phloem region is the conducting part of the phloem where the sieve elements are intact. It consists of intact sieve tube members, companion cells, axial parenchyma cells and narrow undilated ray. Calcium oxalate crystals are abundant in collapsed phloem region. Conclusions: it can be concluded that the pharmacognostic profile of N. arbortristis bark is helpful in developing standards for quality, purity and sample identification.

  11. The mountain pine beetle in western North America: Management challenges in an era of altered disturbance regimes and changing climate

    International Nuclear Information System (INIS)

    The mountain pine beetle (MPB), Dendroctonus ponderosae Hopkins (Coleoptera: Scolytidae) is an eruptive forest insect that is widely distributed in western North America. Throughout its range, it breeds in virtually all Pinus spp., but due to the size, intensity and commercial impact of epidemics, lodgepole pine (Pinus contorta Dougl. ex Loud. var. latifolia Engelm.) is considered its primary host. MPB preferentially attacks mature, large-diameter trees where it feeds and reproduces within the phloem. Successful colonisation of a tree almost always results in tree death. Although MPB populations have erupted several times in the past, the latest outbreak that began in 1992 in British Columbia (BC), Canada has reached levels that are nearly an order of magnitude greater than any previously recorded. Indeed, the cumulative area impacted comprises nearly 9 million ha of lodgepole pine forests. For a MPB outbreak to occur, two main conditions must be satisfied; there must be (i) an abundance of susceptible host trees, and (ii) a sustained period of favourable weather. Both of these conditions have coincided in recent years in western North America. Moreover, evidence suggests that these conditions have been exacerbated by anthropogenic activities. Lodgepole pine-dominated forests cover approximately 14 million ha of BC. Virtually all of these forests originated from stand-replacing wild fires. However, due to aggressive fire suppression, the average yearly area burned in these forests has declined from ca. 100,000 ha to <10,000 ha during last five decades. This dramatic reduction in the rate of disturbance has allowed pine forests to age such that nearly 70% of current stands are ≥80 years old. This is a significantly greater proportion than that expected from a natural wild-fire regime. Since MPB preferentially attacks trees ≥80 years old, fire suppression has dramatically increased the amount of susceptible trees. In fact, it has been estimated that there was 3

  12. The treeline as a refuge: are elevational gradients in Mountain Pine Beetle-caused mortality common in Pinus albicaulis populations at treeline?

    Science.gov (United States)

    Maher, C. T.; Tobalske, C.

    2015-12-01

    Climate change-induced mountain pine beetle outbreaks are a major cause of recent declines in high-elevation whitebark pine in the US Northern Rocky Mountains. Whitebark pine is a major component of subalpine forests in western North America. It is often the dominant tree species at treeline, where it readily forms krummholz, a stunted, shrub-like growth form. Whitebark pine appears to be relatively naïve to beetle attack; it has poor physical defense compared to that of lodgepole pine. However, anecdotal accounts suggest that whitebark krummholz may be resistant to beetle attack. I investigate the potential for treeline habitats to serve as a refuge from mountain pine beetle attack. I sampled recent beetle-caused whitebark pine mortality across treeline ecotones at 10 sites. I compared treeline mortality gradients with other forest edges to determine if mortality patterns are unique to treeline edges. Preliminary results from this study indicate that treeline habitats evaded mountain pine beetle attack during recent outbreaks. If treeline individuals are long-lived or can reproduce, treeline habitats may be viable refugia for whitebark pine populations.

  13. Elevated bark temperature in unremoved stumps after disturbances facilitates multi-voltinism in Ips typographus population in a mountainous forest

    Directory of Open Access Journals (Sweden)

    Fleischer Peter

    2016-03-01

    Full Text Available The number of Ips typographus generations developed in a year might be indicative of its population size and of risk to Norway spruce forests. Warm weather and unremoved fallen trees after natural disturbances are thought of as key factors initiating large population increase. We studied I. typographus development in a spruce forest of the Tatra National Park, which was heavily affected by large-scale disturbances in the last decade. Repeated windthrows and consequent bark beetle outbreaks have damaged almost 20,000 hectares of mature Norway spruce forests, what is a half of the National Park forest area. Current I. typographus population size and its response to the environment and to forestry defense measures attract attention of all stakeholders involved in natural resource management, including public. In this paper we analyse the potential I. typographus population size in two consecutive years 2014 and 2015, which represented a climatologically normal year and an extremely hot year, respectively. We used bark temperature and phenology models to estimate the number of generations developed in each year. In 2014, the average bark temperature of standing living trees at study sites was 14.5 °C, in 2015 it increased to 15.7 °C. The bark temperature of fallen logs was 17.7 °C in 2014, and 19.5 °C in 2015. The bark temperature of standing living trees allowed to develop one and two generations in 2014 and 2015, respectively. The elevated bark temperature of fallen logs allowed to develop two generations in 2014 and three generations in 2015. The good match between the predicted and observed timing of each generation emergence as well as the large increase in the number of catches in pheromone traps in 2015 indicated a dramatic increase of the I. typographus population in the extremely warm year, especially at the unmanaged windthrown site.

  14. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio......-technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  15. Beetle wings are inflatable origami

    Science.gov (United States)

    Chen, Rui; Ren, Jing; Ge, Siqin; Hu, David

    2015-11-01

    Beetles keep their wings folded and protected under a hard shell. In times of danger, they must unfold them rapidly in order for them to fly to escape. Moreover, they must do so across a range of body mass, from 1 mg to 10 grams. How can they unfold their wings so quickly? We use high-speed videography to record wing unfolding times, which we relate to the geometry of the network of blood vessels in the wing. Larger beetles have longer unfolding times. Modeling of the flow of blood through the veins successfully accounts for the wing unfolding speed of large beetles. However, smaller beetles have anomalously short unfolding times, suggesting they have lower blood viscosity or higher driving pressure. The use of hydraulics to unfold complex objects may have implications in the design of micro-flying air vehicles.

  16. Genetics of Ophraella leaf beetles

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This proposal is to collect samples of each species of Ophraella leaf beetle encountered, not to exceed 50 specimens per species, for genetic analysis using DNA...

  17. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  18. Molecular evidence of facultative intraguild predation by Monochamus titillator larvae (Coleoptera: Cerambycidae) on members of the southern pine beetle guild

    Science.gov (United States)

    Schoeller, Erich N.; Husseneder, Claudia; Allison, Jeremy D.

    2012-11-01

    The southern pine bark beetle guild (SPBG) is arguably the most destructive group of forest insects in the southeastern USA. This guild contains five species of bark beetles (Coleoptera: Curculionidae: Scolytinae): Dendroctonus frontalis, Dendroctonus terebrans, Ips avulsus, Ips calligraphus, and Ips grandicollis. A diverse community of illicit receivers is attracted to pheromones emitted by the SPBG, including the woodborers Monochamus carolinensis and Monochamus titillator (Coleoptera: Cerambycidae). These woodborers have been traditionally classified as resource competitors; however, laboratory assays suggest that larval M. carolinensis may be facultative intraguild predators of SPBG larvae. This study used polymerase chain reaction (PCR)-based molecular gut content analyses to characterize subcortical interactions between M. titillator and members of the SPBG. The half-lives of SPBG DNA were estimated in the laboratory prior to examining these interactions in the field. A total of 271 field-collected M. titillator larvae were analyzed and 26 (9.6 %) tested positive for DNA of members of the SPBG. Of these larvae, 25 (96.2 %) tested positive for I. grandicollis and one (3.8 %) for I. calligraphus. Failure to detect D. terebrans and D. frontalis was likely due to their absence in the field. I. avulsus was present, but primers developed using adult tissues failed to amplify larval tissue. Results from this study support the hypothesis that larval Monochamus spp. are facultative intraguild predators of bark beetle larvae. Additionally, this study demonstrates the capabilities of PCR in elucidating the interactions of cryptic forest insects and provides a tool to better understand mechanisms driving southern pine beetle guild population fluctuations.

  19. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  20. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  1. Metals Bioaccumulation Mechanism in Neem Bark.

    Science.gov (United States)

    Krishnani, Kishore K; Boddu, Veera M; Moon, Deok Hyun; Ghadge, S V; Sarkar, Biplab; Brahmane, M P; Choudhary, K; Kathiravan, V; Meng, Xiaoguang

    2015-09-01

    The aim of this work was to define the bioaccumulation mechanism of metals onto the non-living biomaterial prepared from an extensively available plant bark biomass of neem (Azadirachta indica). Based on maximum ultimate fixation capacities (mmol/g) of the product, metals ions could be arranged as Hg(2+) Neem bark can be used as bioindicators, bioaccumulators and biomonitors while determining environmental pressures. Metal bioaccumulative properties and structural investigation of plant bark has potential in providing quantitative information on the metal contamination in the surrounding environment.

  2. Intraguild predation and native lady beetle decline.

    Directory of Open Access Journals (Sweden)

    Mary M Gardiner

    Full Text Available Coccinellid communities across North America have experienced significant changes in recent decades, with declines in several native species reported. One potential mechanism for these declines is interference competition via intraguild predation; specifically, increased predation of native coccinellid eggs and larvae following the introduction of exotic coccinellids. Our previous studies have shown that agricultural fields in Michigan support a higher diversity and abundance of exotic coccinellids than similar fields in Iowa, and that the landscape surrounding agricultural fields across the north central U.S. influences the abundance and activity of coccinellid species. The goal of this study was to quantify the amount of egg predation experienced by a native coccinellid within Michigan and Iowa soybean fields and explore the influence of local and large-scale landscape structure. Using the native lady beetle Coleomegilla maculata as a model, we found that sentinel egg masses were subject to intense predation within both Michigan and Iowa soybean fields, with 60.7% of egg masses attacked and 43.0% of available eggs consumed within 48 h. In Michigan, the exotic coccinellids Coccinella septempunctata and Harmonia axyridis were the most abundant predators found in soybean fields whereas in Iowa, native species including C. maculata, Hippodamia parenthesis and the soft-winged flower beetle Collops nigriceps dominated the predator community. Predator abundance was greater in soybean fields within diverse landscapes, yet variation in predator numbers did not influence the intensity of egg predation observed. In contrast, the strongest predictor of native coccinellid egg predation was the composition of edge habitats bordering specific fields. Field sites surrounded by semi-natural habitats including forests, restored prairies, old fields, and pasturelands experienced greater egg predation than fields surrounded by other croplands. This study shows

  3. Intraguild predation and native lady beetle decline.

    Science.gov (United States)

    Gardiner, Mary M; O'Neal, Matthew E; Landis, Douglas A

    2011-01-01

    Coccinellid communities across North America have experienced significant changes in recent decades, with declines in several native species reported. One potential mechanism for these declines is interference competition via intraguild predation; specifically, increased predation of native coccinellid eggs and larvae following the introduction of exotic coccinellids. Our previous studies have shown that agricultural fields in Michigan support a higher diversity and abundance of exotic coccinellids than similar fields in Iowa, and that the landscape surrounding agricultural fields across the north central U.S. influences the abundance and activity of coccinellid species. The goal of this study was to quantify the amount of egg predation experienced by a native coccinellid within Michigan and Iowa soybean fields and explore the influence of local and large-scale landscape structure. Using the native lady beetle Coleomegilla maculata as a model, we found that sentinel egg masses were subject to intense predation within both Michigan and Iowa soybean fields, with 60.7% of egg masses attacked and 43.0% of available eggs consumed within 48 h. In Michigan, the exotic coccinellids Coccinella septempunctata and Harmonia axyridis were the most abundant predators found in soybean fields whereas in Iowa, native species including C. maculata, Hippodamia parenthesis and the soft-winged flower beetle Collops nigriceps dominated the predator community. Predator abundance was greater in soybean fields within diverse landscapes, yet variation in predator numbers did not influence the intensity of egg predation observed. In contrast, the strongest predictor of native coccinellid egg predation was the composition of edge habitats bordering specific fields. Field sites surrounded by semi-natural habitats including forests, restored prairies, old fields, and pasturelands experienced greater egg predation than fields surrounded by other croplands. This study shows that intraguild

  4. Investigation of thermal decomposition of bark

    Energy Technology Data Exchange (ETDEWEB)

    Adamczak, B.; Babicki, R.

    1978-01-01

    Destructive distillation of Scots pine bark in the laboratory yielded poor quality charcoal. Processing of liquid distillates was not economically justified. The charcoal could be upgraded by demineralization followed by briquetting but this would considerably increase costs. (Refs. 5).

  5. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  6. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  7. Density and location of simulated signs of injury affect efficacy of ground surveys for Asian longhorned beetle

    Science.gov (United States)

    Surveys for the detection and delimitation of the Asian longhorned beetle, Anoplophora glabripennis (Motschulsky) (Coleoptera: Cerambycidae) currently rely upon visual examination of trees to discover the presence of signs of attack such as oviposition pits and exit holes. Understanding the factors ...

  8. Molecular basis of Colorado potato beetle adaptation to potato plant defence at the level of digestive cysteine proteinases

    NARCIS (Netherlands)

    Gruden, K.; Kuipers, A.G.J.; Guncar, G.; Slapar, N.; Strukelj, B.; Jongsma, M.A.

    2004-01-01

    Potato synthesises high levels of proteinase inhibitors in response to insect attack. This can adversely affect protein digestion in the insects, leading to reduced growth, delayed development and lowered fecundity. Colorado potato beetle overcomes this defence mechanism by changing the composition

  9. New insights into the consequences of post-windthrow salvage logging revealed by functional structure of saproxylic beetles assemblages.

    Science.gov (United States)

    Thorn, Simon; Bässler, Claus; Gottschalk, Thomas; Hothorn, Torsten; Bussler, Heinz; Raffa, Kenneth; Müller, Jörg

    2014-01-01

    Windstorms, bark beetle outbreaks and fires are important natural disturbances in coniferous forests worldwide. Wind-thrown trees promote biodiversity and restoration within production forests, but also cause large economic losses due to bark beetle infestation and accelerated fungal decomposition. Such damaged trees are often removed by salvage logging, which leads to decreased biodiversity and thus increasingly evokes discussions between economists and ecologists about appropriate strategies. To reveal the reasons behind species loss after salvage logging, we used a functional approach based on four habitat-related ecological traits and focused on saproxylic beetles. We predicted that salvage logging would decrease functional diversity (measured as effect sizes of mean pairwise distances using null models) as well as mean values of beetle body size, wood diameter niche and canopy cover niche, but would increase decay stage niche. As expected, salvage logging caused a decrease in species richness, but led to an increase in functional diversity by altering the species composition from habitat-filtered assemblages toward random assemblages. Even though salvage logging removes tree trunks, the most negative effects were found for small and heliophilous species and for species specialized on wood of small diameter. Our results suggested that salvage logging disrupts the natural assembly process on windthrown trees and that negative ecological impacts are caused more by microclimate alteration of the dead-wood objects than by loss of resource amount. These insights underline the power of functional approaches to detect ecosystem responses to anthropogenic disturbance and form a basis for management decisions in conservation. To mitigate negative effects on saproxylic beetle diversity after windthrows, we recommend preserving single windthrown trees or at least their tops with exposed branches during salvage logging. Such an extension of the green-tree retention

  10. New insights into the consequences of post-windthrow salvage logging revealed by functional structure of saproxylic beetles assemblages.

    Directory of Open Access Journals (Sweden)

    Simon Thorn

    Full Text Available Windstorms, bark beetle outbreaks and fires are important natural disturbances in coniferous forests worldwide. Wind-thrown trees promote biodiversity and restoration within production forests, but also cause large economic losses due to bark beetle infestation and accelerated fungal decomposition. Such damaged trees are often removed by salvage logging, which leads to decreased biodiversity and thus increasingly evokes discussions between economists and ecologists about appropriate strategies. To reveal the reasons behind species loss after salvage logging, we used a functional approach based on four habitat-related ecological traits and focused on saproxylic beetles. We predicted that salvage logging would decrease functional diversity (measured as effect sizes of mean pairwise distances using null models as well as mean values of beetle body size, wood diameter niche and canopy cover niche, but would increase decay stage niche. As expected, salvage logging caused a decrease in species richness, but led to an increase in functional diversity by altering the species composition from habitat-filtered assemblages toward random assemblages. Even though salvage logging removes tree trunks, the most negative effects were found for small and heliophilous species and for species specialized on wood of small diameter. Our results suggested that salvage logging disrupts the natural assembly process on windthrown trees and that negative ecological impacts are caused more by microclimate alteration of the dead-wood objects than by loss of resource amount. These insights underline the power of functional approaches to detect ecosystem responses to anthropogenic disturbance and form a basis for management decisions in conservation. To mitigate negative effects on saproxylic beetle diversity after windthrows, we recommend preserving single windthrown trees or at least their tops with exposed branches during salvage logging. Such an extension of the green

  11. Transcriptome and full-length cDNA resources for the mountain pine beetle, Dendroctonus ponderosae Hopkins, a major insect pest of pine forests.

    Science.gov (United States)

    Keeling, Christopher I; Henderson, Hannah; Li, Maria; Yuen, Mack; Clark, Erin L; Fraser, Jordie D; Huber, Dezene P W; Liao, Nancy Y; Docking, T Roderick; Birol, Inanc; Chan, Simon K; Taylor, Greg A; Palmquist, Diana; Jones, Steven J M; Bohlmann, Joerg

    2012-08-01

    Bark beetles (Coleoptera: Curculionidae: Scolytinae) are major insect pests of many woody plants around the world. The mountain pine beetle (MPB), Dendroctonus ponderosae Hopkins, is a significant historical pest of western North American pine forests. It is currently devastating pine forests in western North America--particularly in British Columbia, Canada--and is beginning to expand its host range eastward into the Canadian boreal forest, which extends to the Atlantic coast of North America. Limited genomic resources are available for this and other bark beetle pests, restricting the use of genomics-based information to help monitor, predict, and manage the spread of these insects. To overcome these limitations, we generated comprehensive transcriptome resources from fourteen full-length enriched cDNA libraries through paired-end Sanger sequencing of 100,000 cDNA clones, and single-end Roche 454 pyrosequencing of three of these cDNA libraries. Hybrid de novo assembly of the 3.4 million sequences resulted in 20,571 isotigs in 14,410 isogroups and 246,848 singletons. In addition, over 2300 non-redundant full-length cDNA clones putatively containing complete open reading frames, including 47 cytochrome P450s, were sequenced fully to high quality. This first large-scale genomics resource for bark beetles provides the relevant sequence information for gene discovery; functional and population genomics; comparative analyses; and for future efforts to annotate the MPB genome. These resources permit the study of this beetle at the molecular level and will inform research in other Dendroctonus spp. and more generally in the Curculionidae and other Coleoptera. PMID:22516182

  12. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  13. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  14. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  15. Mountain pine beetles colonizing historical and naive host trees are associated with a bacterial community highly enriched in genes contributing to terpene metabolism.

    Science.gov (United States)

    Adams, Aaron S; Aylward, Frank O; Adams, Sandye M; Erbilgin, Nadir; Aukema, Brian H; Currie, Cameron R; Suen, Garret; Raffa, Kenneth F

    2013-06-01

    The mountain pine beetle, Dendroctonus ponderosae, is a subcortical herbivore native to western North America that can kill healthy conifers by overcoming host tree defenses, which consist largely of high terpene concentrations. The mechanisms by which these beetles contend with toxic compounds are not well understood. Here, we explore a component of the hypothesis that beetle-associated bacterial symbionts contribute to the ability of D. ponderosae to overcome tree defenses by assisting with terpene detoxification. Such symbionts may facilitate host tree transitions during range expansions currently being driven by climate change. For example, this insect has recently breached the historical geophysical barrier of the Canadian Rocky Mountains, providing access to näive tree hosts and unprecedented connectivity to eastern forests. We use culture-independent techniques to describe the bacterial community associated with D. ponderosae beetles and their galleries from their historical host, Pinus contorta, and their more recent host, hybrid P. contorta-Pinus banksiana. We show that these communities are enriched with genes involved in terpene degradation compared with other plant biomass-processing microbial communities. These pine beetle microbial communities are dominated by members of the genera Pseudomonas, Rahnella, Serratia, and Burkholderia, and the majority of genes involved in terpene degradation belong to these genera. Our work provides the first metagenome of bacterial communities associated with a bark beetle and is consistent with a potential microbial contribution to detoxification of tree defenses needed to survive the subcortical environment. PMID:23542624

  16. The Beetle Reference Manual

    CERN Document Server

    Van Bakel, N; Van den Brand, J F J; Feuerstack-Raible, M; Harnew, N; Hofmann, W; Knöpfle, K-T; Löchner, S; Schmelling, M; Sexauer, E; Smale, N J; Trunk, U; Verkooijen, H

    2001-01-01

    This paper details the port de nitions, electrical speci cations, modes of operation and programming sequences of the 128 channel readout chip Beetle . The chip is developed for the LHCb experiment and ful lls the requirements of the silicon vertex detector, the inner tracker, the pile-up veto trigger and the RICH detector in case of multianode photomultiplier readout. It integrates 128 channels with low-noise charge-sensitive preampli ers and shapers. The risetime of the shaped pulse is 25 ns with a 30% remainder of the peak voltage after 25 ns. A comparator per channel with con gurable polarity provides a binary signal. Four adjacent comparator channels are being ORed and brought o chip via LVDS ports. Either the shaper or comparator output is sampled with the LHC-bunch-crossing frequency of 40 MHz into an analogue pipeline with a programmable latency of max. 160 sampling intervalls and an integrated derandomizing bu er of 16 stages. For analog readout data is multiplexed with up to 40 MHz onto 1 or 4 ports...

  17. Building Computer Network Attacks

    CERN Document Server

    Futoransky, Ariel; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.

  18. Building Computer Network Attacks

    OpenAIRE

    Futoransky, Ariel; Notarfrancesco, Luciano; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities o...

  19. Quantum non-barking dogs

    Science.gov (United States)

    Imari Walker, Sara; Davies, Paul C. W.; Samantray, Prasant; Aharonov, Yakir

    2014-06-01

    Quantum weak measurements with states both pre- and post-selected offer a window into a hitherto neglected sector of quantum mechanics. A class of such systems involves time dependent evolution with transitions possible. In this paper we explore two very simple systems in this class. The first is a toy model representing the decay of an excited atom. The second is the tunneling of a particle through a barrier. The post-selection criteria are chosen as follows: at the final time, the atom remains in its initial excited state for the first example and the particle remains behind the barrier for the second. We then ask what weak values are predicted in the physical environment of the atom (to which no net energy has been transferred) and in the region beyond the barrier (to which the particle has not tunneled). Thus, just as the dog that didn't bark in Arthur Conan Doyle's story Silver Blaze gave Sherlock Holmes meaningful information about the dog's non-canine environment, here we probe whether the particle that has not decayed or has not tunneled can provide measurable information about physical changes in the environment. Previous work suggests that very large weak values might arise in these regions for long durations between pre- and post-selection times. Our calculations reveal some distinct differences between the two model systems.

  20. Quantum non-barking dogs

    International Nuclear Information System (INIS)

    Quantum weak measurements with states both pre- and post-selected offer a window into a hitherto neglected sector of quantum mechanics. A class of such systems involves time dependent evolution with transitions possible. In this paper we explore two very simple systems in this class. The first is a toy model representing the decay of an excited atom. The second is the tunneling of a particle through a barrier. The post-selection criteria are chosen as follows: at the final time, the atom remains in its initial excited state for the first example and the particle remains behind the barrier for the second. We then ask what weak values are predicted in the physical environment of the atom (to which no net energy has been transferred) and in the region beyond the barrier (to which the particle has not tunneled). Thus, just as the dog that didn't bark in Arthur Conan Doyle's story Silver Blaze gave Sherlock Holmes meaningful information about the dog's non-canine environment, here we probe whether the particle that has not decayed or has not tunneled can provide measurable information about physical changes in the environment. Previous work suggests that very large weak values might arise in these regions for long durations between pre- and post-selection times. Our calculations reveal some distinct differences between the two model systems. (paper)

  1. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  2. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  3. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  4. The bark, the howl and the bark-howl: Identity cues in dingoes' multicomponent calls.

    Science.gov (United States)

    Déaux, Éloïse C; Charrier, Isabelle; Clarke, Jennifer A

    2016-08-01

    Dingoes (genus Canis) produce a stereotyped bark-howl vocalisation, which is a unimodal complex signal formed by the concatenation of two call types (a bark and a howl). Bark-howls may function as alarm signals, although there has been no empirical investigation of this vocalisation's structure or function. We quantified the content and efficacy of the bark and howl segments separately and when combined, using 140 calls from 10 individuals. We found that both segments are individually distinctive, although howl segments are more accurately classified, suggesting a higher level of individuality. Furthermore, howls convey signature characteristics that are conserved across different contexts of production, and thus may act as 'identity signals'. The individual distinctiveness of full bark-howls increases above that of isolated segments, which may be a result of selection on improved signal discriminability. Propagation tests revealed that bark-howls are best described as medium-range signals, with both segments potentially allowing for individual discrimination up to 200m regardless of environmental conditions. We discuss our findings regarding the fitness benefits of encoding identity cues in a potential alarm call and propose additional hypotheses for the function(s) of bark and howl segments.

  5. Impact of mountain pine beetle induced mortality on forest carbon and water fluxes

    International Nuclear Information System (INIS)

    Quantifying impacts of ecological disturbance on ecosystem carbon and water fluxes will improve predictive understanding of biosphere—atmosphere feedbacks. Tree mortality caused by mountain pine bark beetles (Dendroctonus ponderosae) is hypothesized to decrease photosynthesis and water flux to the atmosphere while increasing respiration at a rate proportional to mortality. This work uses data from an eddy-covariance flux tower in a bark beetle infested lodgepole pine (Pinus contorta) forest to test ecosystem responses during the outbreak. Analyses were conducted on components of carbon (C) and water fluxes in response to disturbance and environmental factors (solar radiation, soil water content and vapor pressure deficit). Maximum CO2 uptake did not change as tree basal area mortality increased from 30 to 78% over three years of beetle disturbance. Growing season evapotranspiration varied among years while ecosystem water use efficiency (the ratio of net CO2 uptake to water vapor loss) did not change. Between 2009 and 2011, canopy water conductance increased from 98.6 to 151.7 mmol H2O m−2 s−1. Ecosystem light use efficiency of photosynthesis increased, with quantum yield increasing by 16% during the outbreak as light increased below the mature tree canopy and illuminated remaining vegetation more. Overall net ecosystem productivity was correlated with water flux and hence water availability. Average weekly ecosystem respiration, derived from light response curves and standard Ameriflux protocols for CO2 flux partitioning into respiration and gross ecosystem productivity, did not change as mortality increased. Separate effects of increased respiration and photosynthesis efficiency largely canceled one another out, presumably due to increased diffuse light in the canopy and soil organic matter decomposition resulting in no change in net CO2 exchange. These results agree with an emerging consensus in the literature demonstrating CO2 and H2O dynamics following

  6. Mountain Pine Beetle Host Selection Between Lodgepole and Ponderosa Pines in the Southern Rocky Mountains.

    Science.gov (United States)

    West, Daniel R; Briggs, Jennifer S; Jacobi, William R; Negrón, José F

    2016-02-01

    Recent evidence of range expansion and host transition by mountain pine beetle (Dendroctonus ponderosae Hopkins; MPB) has suggested that MPB may not primarily breed in their natal host, but will switch hosts to an alternate tree species. As MPB populations expanded in lodgepole pine forests in the southern Rocky Mountains, we investigated the potential for movement into adjacent ponderosa pine forests. We conducted field and laboratory experiments to evaluate four aspects of MPB population dynamics and host selection behavior in the two hosts: emergence timing, sex ratios, host choice, and reproductive success. We found that peak MPB emergence from both hosts occurred simultaneously between late July and early August, and the sex ratio of emerging beetles did not differ between hosts. In two direct tests of MPB host selection, we identified a strong preference by MPB for ponderosa versus lodgepole pine. At field sites, we captured naturally emerging beetles from both natal hosts in choice arenas containing logs of both species. In the laboratory, we offered sections of bark and phloem from both species to individual insects in bioassays. In both tests, insects infested ponderosa over lodgepole pine at a ratio of almost 2:1, regardless of natal host species. Reproductive success (offspring/female) was similar in colonized logs of both hosts. Overall, our findings suggest that MPB may exhibit equally high rates of infestation and fecundity in an alternate host under favorable conditions. PMID:26546596

  7. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  8. Comparative efficacy of plant-derived essential oils for managing ambrosia beetles (Coleoptera: Curculionidae: Scolytinae) and their corresponding mass spectral characterization.

    Science.gov (United States)

    Ranger, Christopher M; Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Moyseenko, James J; Youssef, Nadeer

    2011-10-01

    Ambrosia beetles (Coleoptera: Curculionidae: Scolytinae) pose a significant challenge to producers of ornamental nursery stock. Conventional insecticides are commonly used for management purposes, but plant-derived essential oils also may discourage ambrosia beetles from initiating attacks. To identify promising commercially available products, field-based efficacy trials were conducted in Ohio in 2009 and 2010 with the following products: Armorex (Soil Technologies), Cinnacure (Proguard, Inc.), EcoTrol (EcoSMART Technologies, Inc.), and Veggie Pharm (Pharm Solutions, Inc.). Potted Magnolia virginiana L. were first injected with 75 ml of 5% ethanol to ensure ambrosia beetle pressure on experimental trees. Mixtures of each product (10% in water) and a water control were applied until runoff and attacks occurring under field conditions were quantified at 1, 4, 7, and 14 d after treatment (DAT). Ambrosia beetle attacks generally increased over time but at differing rates depending on the particular treatment. In 2009, Armorex and Veggie Pharm were associated with the lowest cumulative attacks 14 DAT. In 2010, Armorex and Cinnacure were associated with the fewest attacks 14 DAT. Solid phase microextraction-gas chromatography-mass spectrometry was used to characterize the volatile compounds associated with each product. Allyl isothiocyanate, a compound with known repellent and insecticidal properties, was unique and predominant in Armorex. These experiments identified commercially available botanicals containing plant essential oils with activity against ambrosia beetles, along with demonstrating the usefulness of ethanol-injection to ensure ambrosia beetle pressure under field conditions. Characterizing the constituents of efficacious botanically based products could also lead to the development of improved botanical insecticides.

  9. Attaching lures to multiple-funnel traps targeting saproxylic beetles (Coleoptera) in pine stands: inside or outside funnels?

    Science.gov (United States)

    Miller, Daniel R; Crowe, Christopher M; Barnes, Brittany F; Gandhi, Kamal J K; Duerr, Donald A

    2013-02-01

    We conducted two field trapping experiments with multiple-funnel traps in 2008 and one experiment in 2010 to determine the effects of lure placement (inside or outside funnels) on catches of saproxylic species of beetles (Coleoptera). The experiments were conducted in southern pine (Pinus spp.) stands in central Georgia using combinations of ethanol, alpha-pinene, ipsenol, and ipsdienol lures. We report on a modification to the multiple-funnel trap that allows placement of large lures inside the confines of the funnels with minimal blockage. In general, catches of five species of common longhorn beetles (Cerambycidae), two species of regeneration weevils (Curculionidae), four species of bark beetles (Curculionidae: Scolytinae), and seven species of beetle predators and ectoparasites (Cleridae, Histeridae, Tenebrionidae, Trogossitidae, and Zopheridae) were higher in funnel traps with lures attached inside the funnels than in those with lures attached outside of the funnels. Catches of the remaining species were unaffected by lure placement. In no instance were catches of any species lower in funnel traps with lures attached inside the funnels than in those with lures attached outside of the funnels. For most species, catches in modified funnel traps with ethanol, alpha-pinene, ipsenol, and ipsdienol lures attached inside funnels were comparable with those in cross-vane panel traps.

  10. Impact of a Mountain Pine Beetle Outbreak on Young Lodgepole Pine Stands in Central British Columbia

    Directory of Open Access Journals (Sweden)

    Amalesh Dhar

    2015-09-01

    Full Text Available The current mountain pine beetle (MPB (Dendroctonous ponderosae Hopkins epidemic has severely affected pine forests of Western Canada and killed millions of hectares of lodgepole pine (Pinus contorta Dougl. ex Loud. var. latifolia Engelm. forest. Generally, MPB attack larger and older (diameter > 20 cm or >60 years of age trees, but the current epidemic extends this limit with attacks on even younger and smaller trees. The study’s aim was to investigate the extent of MPB attack in young pine stands and its possible impact on stand dynamics. Although MPB attacks were observed in trees as small as 7.5 cm diameter at breast height (DBH and as young as 13 years old, the degree of MPB attack (percent stems ha−1 increased with increasing tree diameter and age class (13–20, 21–40, 41–60, and 61–80 years old (6.4%, 49.4%, 62.6%, and 69.5% attack, respectively, by age class which is greater than that reported from previous epidemics for stands of this age. The mean density of surviving residual structure varied widely among age classes and ecological subzones. Depending on age class, 65% to 77% of the attacked stands could contribute to mid-term timber supply. The surviving residual structure of young stands offers an opportunity to mitigate the effects of MPB-attack on future timber supply, increase age class diversity, and enhance ecological resilience in younger stands.

  11. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  12. Non-Native Ambrosia Beetles as Opportunistic Exploiters of Living but Weakened Trees.

    Science.gov (United States)

    Ranger, Christopher M; Schultz, Peter B; Frank, Steven D; Chong, Juang H; Reding, Michael E

    2015-01-01

    Exotic Xylosandrus spp. ambrosia beetles established in non-native habitats have been associated with sudden and extensive attacks on a diverse range of living trees, but factors driving their shift from dying/dead hosts to living and healthy ones are not well understood. We sought to characterize the role of host physiological condition on preference and colonization by two invaders, Xylosandrus germanus and Xylosandrus crassiusculus. When given free-choice under field conditions among flooded and non-flooded deciduous tree species of varying intolerance to flooding, beetles attacked flood-intolerant tree species over more tolerant species within 3 days of initiating flood stress. In particular, flood-intolerant flowering dogwood (Cornus florida) sustained more attacks than flood-tolerant species, including silver maple (Acer saccharinum) and swamp white oak (Quercus bicolor). Ethanol, a key host-derived attractant, was detected at higher concentrations 3 days after initiating flooding within stems of flood intolerant species compared to tolerant and non-flooded species. A positive correlation was also detected between ethanol concentrations in stem tissue and cumulative ambrosia beetle attacks. When adult X. germanus and X. crassiusculus were confined with no-choice to stems of flood-stressed and non-flooded C. florida, more ejected sawdust resulting from tunneling activity was associated with the flood-stressed trees. Furthermore, living foundresses, eggs, larvae, and pupae were only detected within galleries created in stems of flood-stressed trees. Despite a capability to attack diverse tree genera, X. germanus and X. crassiusculus efficiently distinguished among varying host qualities and preferentially targeted trees based on their intolerance of flood stress. Non-flooded trees were not preferred or successfully colonized. This study demonstrates the host-selection strategy exhibited by X. germanus and X. crassiusculus in non-native habitats involves

  13. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  14. Historical demography and phylogeography of a specialist bark beetle, Dendroctonus pseudotsugae Hopkins (Curculionidae: Scolytinae).

    Science.gov (United States)

    Ruiz, Enrico A; Rinehart, John E; Hayes, Jane L; Zuñiga, Gerardo

    2010-10-01

    Contemporary distribution of North American species has been shaped by past glaciation events during the Quaternary period. However, their effects were not as severe in the southern Rocky Mountains and Northern Mexico as elsewhere in North America. In this context, we test hypotheses about the historical demography of Dendroctonus pseudotsugae, based on 136 haplotypes of mitochondrial cytochrome oxidase I. The phylogenetic analysis yielded four haplogroups corresponding to northwestern United States and southwestern Canada (NUS), southwestern United States (Arizona, SUS), northwestern Mexico (Sierra Madre Occidental, SMOC), and northeastern Mexico (Sierra Madre Oriental, SMOR). Predictions of demographic expansion were examined through neutrality tests against population growth and mismatch distribution. Results showed that the NUS and SMOC haplogroups have experienced demographic expansion events, whereas the SUS and SMOR haplogroups have not. Divergence times between pairs of haplogroups were estimated from early to middle Pleistocene. The longer divergence time between NUS and all other haplogroups could be the result of refugia within the Pacific Northwest and northern Rocky Mountains and long-term isolation from southernmost populations in Mexico. The results obtained in this study are in agreement with the evolutionary history of the host Douglas-fir, as the warmer climates of interglacial periods pushed conifers northward of Colorado, New Mexico, and Arizona, whereas environmental changes reduced the population size of Douglas-fir and forced fragmentation of distribution range southward into northern Mexico. PMID:22546468

  15. Ophiostoma spp. associated with pine- and spruce-infesting bark beetles in Finland and Russia

    NARCIS (Netherlands)

    Linnakoski, R.; Beer, de Z.W.; Ahtiainen, J.; Sidorov, E.; Niemelä, P.; Pappinen, A.; Wingfield, M.J.

    2010-01-01

    Baobabs (Adansonia spp.) are iconic trees, known for their immense size, strange forms, sources of food and as the subjects of myths and mysteries. It is thus surprising that little is known regarding the fungi that infect these trees. During a survey to determine which wound infecting fungi occur o

  16. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  17. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  18. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  19. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  20. Metals bioaccumulation mechanism in neem bark

    Science.gov (United States)

    The aim of this work was to define the bioaccumulation mechanism of metals onto the non-living biomaterial prepared from an extensively available plant bark biomass of neem (Azadirachta indica). Based on maximum ultimate fixation capacities (mmol/g) of the product, metals ions could be arranged as H...

  1. Phenolic glycosides of Paulownia tomentosa bark.

    Science.gov (United States)

    Sticher, O; Lahloub, M F

    1982-11-01

    The isolation of acteoside and coniferin from Paulownia tomentosa bark along with the previously reported phenolic glucoside syringin is described. The structure of both, acteoside and coniferin, have been assigned by (1)H- and (13)C-NMR spectroscopy. PMID:17396961

  2. Antioxidant activity of Rhizophora mangle bark.

    Science.gov (United States)

    Sánchez, Janet; Melchor, Gleiby; Martínez, Gregorio; Escobar, Arturo; Faure, Roberto

    2006-02-01

    The antioxidant activity of Rhizophora mangle bark aqueous extract and its majoritary component and high molecular weight polyphenols' fraction were studied using deoxyribose assay. The total extract and its fraction showed scavenging activity of hydroxyl radicals and hability to chelate iron ions. PMID:16436316

  3. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  4. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  5. Lima bean lady beetle interactions: spider mite mediates sublethal effects of its host plant on growth and development of its predator

    Science.gov (United States)

    Cultivated plants can have negative effects on natural enemies that attack spider mites. In this study, we tested the hypothesis that spider mites mediate effects of a lima bean, Phaseolus lunatus L., cultivar on the life history of a lady beetle Stethorus punctillum Weise. We provisioned laborato...

  6. Post entry interception of the yellow-spotted longhorned beetle,Psacothea hilaris (Coleoptera: Cerambycidae) in Italy Genbank Accession Number GU244486

    Science.gov (United States)

    Psacothea hilaris (Pascoe) (Coleoptera: Cerambycidae) known as the yellow-spotted longhorned beetle is native from eastern Asia (China, Japan including Ryukyu, Shikoku and Honshu archipelago and Taïwan) where it attacks plants belonging to Moraceae family, in particular to Morus and Ficus genera. In...

  7. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  8. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  9. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  10. [Behavioral mechanisms of spatial competition between red wood ants (Formica aquilonia) and ground beetles (Carabidae)].

    Science.gov (United States)

    Dorosheva, E A; Reznikova, Zh I

    2006-01-01

    . Instead, they recognize an "enemy's image" and selectively attack relatively small predatory carabids rather than herbivorous species. Experiments with dummy beetles suggest that ants react for several hierarchically organized key characteristics of competitors such as speed of movement, dark color, bilateral symmetry, protuberances (legs, antennae), and smell. Among "professional" groups in ant family, guards and hunters react to beetles aggressively, whereas aphid tenders ignore them. Sophisticated combination of flexible and innate behavioral patterns enables insects to share territories and interact in the mode of relatively mild, spatial, competition instead of predation. Eliciting sets of hierarchically organized features of competitors that govern adjustment of spatial distribution in insects' community enable us to integrate ideas of classic and cognitive ethology. PMID:17100097

  11. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  12. Bark and charcoal filters for greywater treatment

    OpenAIRE

    Dalahmeh, Sahar

    2013-01-01

    Water scarcity, inappropriate sanitation and wastewater pollution are critically important global issues. Greywater is a sustainable water source for recycling, so this thesis examined simple, robust, low-cost alternatives for on-site treatment of greywater to irrigation water quality. Laboratory-scale pine bark, activated charcoal and sand filters were evaluated as regards their pollutant removal and interactions between medium properties, greywater, microbial activity and bacterial communit...

  13. Sequestration of plant-derived glycosides by leaf beetles: A model system for evolution and adaptation

    Directory of Open Access Journals (Sweden)

    Wilhelm Boland

    2015-12-01

    Full Text Available Leaf beetles have developed an impressive repertoire of toxins and repellents to defend themselves against predators. Upon attack, the larvae discharge small droplets from glandular reservoirs on their back. The reservoirs are “bioreactors” performing the late reactions of the toxin-production from plant-derived or de novo synthesised glucosides. The import of the glucosides into the bioreactor relies on a complex transport system. Physiological studies revealed a functional network of transporters guiding the glucosides through the larval body into the defensive system. The first of the involved transporters has been identified and characterised concerning selectivity, tissue distribution, and regulation. The development of a well-tuned transport system, perfectly adjusted to the compounds provided by the food plants, provides the functional basis for the leaf beetle defenses and their local adaptation to their host plants.

  14. Genotype analysis and studies of pyrethroid resistance of the oilseed rape (Brassica napus) insect pest - pollen beetle (Meligethes aeneus)

    OpenAIRE

    Kazachkova, Nadiya

    2007-01-01

    Oilseed Brassicas are vulnerable to attack from many insects and pathogens, calling for an extensive use of pesticides to secure crop yields; this can cause increased resistance in pests. During recent years, one of the main oilseed insect pests—the pollen beetle (Meligethes aeneus), resistant to pyrethroid insecticides—has emerged in southern Sweden. This, because of its frequency and geographic range, provides an excellent source of material for analysis of genetic variation among pollen be...

  15. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  16. Olfactory cues from plants infected by powdery mildew guide foraging by a mycophagous ladybird beetle.

    Science.gov (United States)

    Tabata, Jun; De Moraes, Consuelo M; Mescher, Mark C

    2011-01-01

    Powdery mildews (Erysiphales) are economically important plant pathogens that attack many agricultural crops. Conventional management strategies involving fungicide application face challenges, including the evolution of resistance and concerns over impacts on non-target organisms, that call for investigation of more sustainable alternatives. Mycophagous ladybird beetles (Coleoptera: Coccinellidae) feed on powdery mildew and have considerable potential as biological control agents; however, the foraging ecology and behavior of these beetles is not well understood. Here we document the olfactory cues presented by squash plants (Cucurbita moschata) infected by powdery mildew (Podosphaera sp.) and the behavioral responses of twenty-spotted ladybird beetles (Psyllobora vigintimaculata) to these cues. Volatile analyses through gas chromatography revealed a number of volatile compounds characteristic of infected plants, including 3-octanol and its analogues 1-octen-3-ol and 3-octanone. These compounds are typical "moldy" odorants previously reported in volatiles collected from other fungi. In addition, infected plants exhibited elevated emissions of several compounds also observed in collections from healthy leaves, including linalool and benzyl alcohol, which are reported to have anti-fungal properties. In Y-tube choice assays, P. vigintimaculata beetles displayed a significant preference for the odors of infected plants compared to those of healthy plants. Moreover, beetles exhibited strong attraction to one individual compound, 1-octen-3-ol, which was the most abundant of the characteristic fungal compounds identified. These results enhance our understanding of the olfactory cues that guide foraging by mycophagous insects and may facilitate the development of integrated disease-management strategies informed by an understanding of underlying ecological mechanisms.

  17. Olfactory cues from plants infected by powdery mildew guide foraging by a mycophagous ladybird beetle.

    Directory of Open Access Journals (Sweden)

    Jun Tabata

    Full Text Available Powdery mildews (Erysiphales are economically important plant pathogens that attack many agricultural crops. Conventional management strategies involving fungicide application face challenges, including the evolution of resistance and concerns over impacts on non-target organisms, that call for investigation of more sustainable alternatives. Mycophagous ladybird beetles (Coleoptera: Coccinellidae feed on powdery mildew and have considerable potential as biological control agents; however, the foraging ecology and behavior of these beetles is not well understood. Here we document the olfactory cues presented by squash plants (Cucurbita moschata infected by powdery mildew (Podosphaera sp. and the behavioral responses of twenty-spotted ladybird beetles (Psyllobora vigintimaculata to these cues. Volatile analyses through gas chromatography revealed a number of volatile compounds characteristic of infected plants, including 3-octanol and its analogues 1-octen-3-ol and 3-octanone. These compounds are typical "moldy" odorants previously reported in volatiles collected from other fungi. In addition, infected plants exhibited elevated emissions of several compounds also observed in collections from healthy leaves, including linalool and benzyl alcohol, which are reported to have anti-fungal properties. In Y-tube choice assays, P. vigintimaculata beetles displayed a significant preference for the odors of infected plants compared to those of healthy plants. Moreover, beetles exhibited strong attraction to one individual compound, 1-octen-3-ol, which was the most abundant of the characteristic fungal compounds identified. These results enhance our understanding of the olfactory cues that guide foraging by mycophagous insects and may facilitate the development of integrated disease-management strategies informed by an understanding of underlying ecological mechanisms.

  18. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  19. Fire Severity Controlled Susceptibility to a 1940s Spruce Beetle Outbreak in Colorado, USA

    Science.gov (United States)

    Kulakowski, Dominik; Veblen, Thomas T.; Bebi, Peter

    2016-01-01

    The frequency, magnitude, and size of forest disturbances are increasing globally. Much recent research has focused on how the occurrence of one disturbance may affect susceptibility to subsequent disturbances. While much has been learned about such linked disturbances, the strength of the interactions is likely to be contingent on the severity of disturbances as well as climatic conditions, both of which can affect disturbance intensity and tree resistance to disturbances. Subalpine forests in western Colorado were affected by extensive and severe wildfires in the late 19th century and an extensive and severe outbreak of spruce beetle (Dendroctonus rufipennis) in the 1940s. Previous research found that most, but not all, of the stands that burned and established following the late 19th century fires were not susceptible to the 1940s outbreak as beetles preferentially attack larger trees and stands in advanced stages of development. However, previous research also left open the possibility that some stands that burned and established following the 19th century fires may have been attacked during the 1940s outbreak. Understanding how strongly stand structure, as shaped by disturbances of varying severity, affected susceptibility to past outbreaks is important to provide a baseline for assessing the degree to which recent climate change may be relaxing the preferences of beetles for larger trees and for stands in latter stages of structural development and thereby changing the nature of linked disturbances. Here, dendroecological methods were used to study disturbance history and tree age of stands in the White River National Forest in Western Colorado that were identified in historical documents or remotely-sensed images as having burned in the 19th century and having been attacked by spruce beetle in the 1940s. Dendroecological reconstructions indicate that in young post-fire stands only old remnant trees that survived the otherwise stand-replacing fires were

  20. Fire Severity Controlled Susceptibility to a 1940s Spruce Beetle Outbreak in Colorado, USA.

    Directory of Open Access Journals (Sweden)

    Dominik Kulakowski

    Full Text Available The frequency, magnitude, and size of forest disturbances are increasing globally. Much recent research has focused on how the occurrence of one disturbance may affect susceptibility to subsequent disturbances. While much has been learned about such linked disturbances, the strength of the interactions is likely to be contingent on the severity of disturbances as well as climatic conditions, both of which can affect disturbance intensity and tree resistance to disturbances. Subalpine forests in western Colorado were affected by extensive and severe wildfires in the late 19th century and an extensive and severe outbreak of spruce beetle (Dendroctonus rufipennis in the 1940s. Previous research found that most, but not all, of the stands that burned and established following the late 19th century fires were not susceptible to the 1940s outbreak as beetles preferentially attack larger trees and stands in advanced stages of development. However, previous research also left open the possibility that some stands that burned and established following the 19th century fires may have been attacked during the 1940s outbreak. Understanding how strongly stand structure, as shaped by disturbances of varying severity, affected susceptibility to past outbreaks is important to provide a baseline for assessing the degree to which recent climate change may be relaxing the preferences of beetles for larger trees and for stands in latter stages of structural development and thereby changing the nature of linked disturbances. Here, dendroecological methods were used to study disturbance history and tree age of stands in the White River National Forest in Western Colorado that were identified in historical documents or remotely-sensed images as having burned in the 19th century and having been attacked by spruce beetle in the 1940s. Dendroecological reconstructions indicate that in young post-fire stands only old remnant trees that survived the otherwise stand

  1. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  2. Effect of associated fungi on the immunocompetence of red turpentine beetle larvae, Dendroctonus valens (Coleoptera: Curculionidae: Scolytinae)

    Institute of Scientific and Technical Information of China (English)

    Zhang-Hong Shi; Bo Wang; Stephen R.Clarke; Jiang-Hua Sun

    2012-01-01

    Dendroctonus-fungus symbioses are often considered as the ideal model systems to study the development and maintenance ofectosymbioses,and diverse interactions,including antagonism,commensalism and mutualism,have been documented between these organisms.The red turpentine beetle,Dendroctonus valens LeConte (Coleoptera:Curculionidae:Scolytinae) is a pine-killing invasive beetle in northern China.Fungi species Ophiostoma minus,Leptographium sinoprocerum,L.terebrantis and L.procerum were associated with this bark beetle.Antagonistic interactions between D.valens and its associated fungi,such as O.minus and L.sinoprocerum,have been demonstrated,but the underlying causes of this phenomenon are unknown.Here,we first found the two tested fungi species retarded the net weight gain of D.valens larvae after completing 3-day feeding on their media.Furthermore,we provide direct evidence indicating the effect of associated fungi on the immunocompetence of D.valens larvae to explain the documented antagonism.Our results showed that the activity of phenoloxidase and total phenoloxidase in D.valens larvae were significantly upregulated by two strains of associated fungi,O.minus and L.sinoprocerum as compared with the controls.The phenoloxidase ratio increased significantly in the larvae which had fed for 3 days on media inoculated with O.minus.Because insect immune defenses are costly to be deployed,these results could be explored as one of the underlying mechanisms of the documented antagonism.

  3. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  4. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  5. Effective monitoring as a basis for adaptive management: a case history of mountain pine beetle in Greater Yellowstone Ecosystem whitebark pine

    Directory of Open Access Journals (Sweden)

    Willcox L

    2009-01-01

    Full Text Available With reference to massive outbreaks of a variety of bark beetles occurring across the forests of western North America, it is stressed that an accurate assessment of the extent of the problem is the first step toward formulating effective adaptive management strategies. This assessment will only be possible through a coordinated effort that combines all available technologies, that is an approach that builds on satellite image analysis, aerial survey from fixed-wing aircraft, and on the ground observation and measurement.

  6. Approaches to engineer stability of beetle luciferases

    Directory of Open Access Journals (Sweden)

    Mikhail Koksharov

    2012-09-01

    Full Text Available Luciferase enzymes from fireflies and other beetles have many important applications in molecular biology, biotechnology, analytical chemistry and several other areas. Many novel beetle luciferases with promising properties have been reported in the recent years. However, actual and potential applications of wild-type beetle luciferases are often limited by insufficient stability or decrease in activity of the enzyme at the conditions of a particular assay. Various examples of genetic engineering of the enhanced beetle luciferases have been reported that successfully solve or alleviate many of these limitations. This mini-review summarizes the recent advances in development of mutant luciferases with improved stability and activity characteristics. It discusses the common limitations of wild-type luciferases in different applications and presents the efficient approaches that can be used to address these problems.

  7. American burying beetle site records : Valentine NWR

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document is specific site records of American burying beetle on Valentine Nationl Wildlife Refuge to date. It includes a map of site location. A discussion...

  8. Xanthones from the bark of Garcinia Xanthochymus

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Two novel xanthones, 1,6-dihydroxy-4,5-dimethoxyxanthone (1) and 1,5,6-trihydroxy-7,8-di(3-methyl-2-butenyl)-6',6'-dimethylpyrano(2',3':3,4)xanthone (2) were isolated from the bark of Garcinia xanthochymus by normal phase and reverse phase silica gel column chromatography. Their structures were elucidated by spectroscopic methods, especially 2D-NMR techniques.(C) 2007 Guang Zhong Yang. Published by Elsevier B.V. on behalf of Chinese Chemical Society. All rights reserved.

  9. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  10. INORGANIC STATUS OF STEM BARK OF PTEROCARPUS MARSUPIUM

    Directory of Open Access Journals (Sweden)

    Gaikwad Dattatraya Krishna

    2011-06-01

    Full Text Available Pterocarpus marsupium is well known for its sugar lowering potential. In the present examination different bark samples (Apical bark, middle bark and mature inner bark of Pterocarpus marsupium were screened for inorganic status. The levels of macro-minerals Nitrogen (1.50-3.13%, Phosphorus (0.023-0.163%, Calcium (0.60-1.848%, and Magnesium (0.21-0.339%, levels of trace minerals Copper (0.68-3.2mg/100g, Zinc (1.98-3.62mg/100g, Manganese (2.0-4.94mg/100g and Iron (11.38-44.34mg/100g and heavy metals Chromium (2.08-3.94mg/100g and Nickel (0.32-1.26mg/100g were evaluated in the present study. Cadmium and Lead were found to be absent in all the bark samples analyzed.

  11. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  12. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  13. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  14. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  15. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  16. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  17. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  18. Two-and Three-Dimensional Simulations of Beetle Hind Wing Flapping during Free Forward Flight

    Institute of Scientific and Technical Information of China (English)

    Tuyen Quang Le; Tien Van Truong; Hieu Trung Tran; Soo Hyung Park; Jin Hwan Ko; Hoon Cheol Park; Kwang Joon Yoon

    2013-01-01

    Aerodynamic characteristic of the beetle,Trypoxylus dichotomus,which has a pair of elytra (forewings) and hind wings,is numerically investigated.Based on the experimental results of wing kinematics,two-dimensional (2D) and three-dimensional (3D) computational fluid dynamic simulations were carried out to reveal aerodynamic performance of the hind wing.The roles of the spiral Leading Edge Vortex (LEV) and the spanwise flow were clarified by comparing 2D and 3D simulations.Mainly due to pitching down of chord line during downstroke in highly inclined stroke plane,relatively high averaged thrust was produced in the free forward flight of the beetle.The effects of the local corrugation and the camber variation were also investigated for the beetle's hind wings.Our results show that the camber variation plays a significant role in improving both lift and thrust in the flapping.On the other hand,the local corrugation pattern has no significant effect on the aerodynamic force due to large angle of attack during flapping.

  19. Molluscicidal activity of Punica granatum bark and Canna indica root

    OpenAIRE

    Tripathi, S.M.; Singh, D.K.

    2000-01-01

    The molluscicidal activity of Punica granatum Linn. (Punicaceae) and Canna indica Linn. (Cannaceae) against the snail Lymnaea acuminata was studied. The molluscicidal activity of P. granatum bark and C. indica root was found to be both time and dose dependent. The toxicity of P. granatum bark was more pronounced than that of C. indica. The 24 h LC50 of the column-purified root of C. indica was 6.54 mg/l whereas that of the column-purified bark of P. granatum was 4.39 mg/l. The ethanol extract...

  20. Dosage response mortality of Japanese beetle, masked chafer, and June beetle (Coleoptera: Scarabaeidae) adults when exposed to experimental and commercially available granules containing Metarhizium brunneum

    Science.gov (United States)

    Adult beetles of three different white grub species, Japanese beetle, Popillia japonica, June beetle, Phyllophaga spp., and masked chafer, Cyclocephala spp. were exposed to experimental and commercially available granules containing Metarhizium brunneum (Petch) strain F52, to determine susceptibilit...

  1. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  2. ANTIMICROBIAL ACTIVITY OF FICUS GLOMERATA LINN. BARK

    Directory of Open Access Journals (Sweden)

    Jagtap Supriya G.

    2012-05-01

    Full Text Available Ficus glomerata Linn. (Moraceae, commonly known as Ficus racemosa. A large deciduous tree distributed all over India and Ceylon, found throughout the year, grows in evergreen forest, moist localities, along the sides of ravines and banks of streams. Gular (Ficus glomerata Linn. is well known, commonly used plant in various disorders. It has been traditionally claimed to be useful in asthmatic condition, as an antitussive and anti-inflammatory. Successive soxhlet extractions of dried powdered bark were carried out using petroleum ether and methanol as a solvent. The antimicrobial activity of the extracts were tested in vitro against two different bacterial species Bacillus substilis and Escherichia coli by cup plate diffusion method were used in this investigation. The results of antimicrobial activity revealed that methanolic extract showed good activity as compared to petroleum ether extract. Methanolic extract is more potent towards gram - positive bacteria. The antimicrobial activities of the extracts were compared with standard antibiotics.

  3. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  4. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  5. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  6. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  7. Fire Severity Controlled Susceptibility to a 1940s Spruce Beetle Outbreak in Colorado, USA.

    Science.gov (United States)

    Kulakowski, Dominik; Veblen, Thomas T; Bebi, Peter

    2016-01-01

    The frequency, magnitude, and size of forest disturbances are increasing globally. Much recent research has focused on how the occurrence of one disturbance may affect susceptibility to subsequent disturbances. While much has been learned about such linked disturbances, the strength of the interactions is likely to be contingent on the severity of disturbances as well as climatic conditions, both of which can affect disturbance intensity and tree resistance to disturbances. Subalpine forests in western Colorado were affected by extensive and severe wildfires in the late 19th century and an extensive and severe outbreak of spruce beetle (Dendroctonus rufipennis) in the 1940s. Previous research found that most, but not all, of the stands that burned and established following the late 19th century fires were not susceptible to the 1940s outbreak as beetles preferentially attack larger trees and stands in advanced stages of development. However, previous research also left open the possibility that some stands that burned and established following the 19th century fires may have been attacked during the 1940s outbreak. Understanding how strongly stand structure, as shaped by disturbances of varying severity, affected susceptibility to past outbreaks is important to provide a baseline for assessing the degree to which recent climate change may be relaxing the preferences of beetles for larger trees and for stands in latter stages of structural development and thereby changing the nature of linked disturbances. Here, dendroecological methods were used to study disturbance history and tree age of stands in the White River National Forest in Western Colorado that were identified in historical documents or remotely-sensed images as having burned in the 19th century and having been attacked by spruce beetle in the 1940s. Dendroecological reconstructions indicate that in young post-fire stands only old remnant trees that survived the otherwise stand-replacing fires were

  8. Vasorelaxant effect of Prunus yedoensis bark

    Directory of Open Access Journals (Sweden)

    Lee Kyungjin

    2013-02-01

    Full Text Available Abstract Background Prunus yedoensis Matsum. is used as traditional medicine—‘Yaeng-Pi’ or ‘Hua-Pi’—in Japan and Korea. However, no studies have examined the pharmacological activities of the P. yedoensis bark. Only the antioxidant and antiviral activities of P. yedoensis fruit and the anti-hyperglycaemic effect of P. yedoensis leaf have been investigated. While studying the antihypertensive effects of several medicinal plants, we found that a methanol extract of P. yedoensis bark (MEPY had distinct vasorelaxant effects on rat aortic rings. Methods The aortic rings were removed from Sprague–Dawley rats and suspended in organ chambers containing 10 ml Krebs-Henseleit solution. The aortic rings were placed between 2 tungsten stirrups and connected to an isometric force transducer. Changes in tension were recorded via isometric transducers connected to a data acquisition system. Results MEPY relaxed the contraction induced by phenylephrine (PE both in endothelium-intact and endothelium-denuded aortic rings concentration dependently. However, the vasorelaxant effects of MEPY on endothelium-denuded aortic rings were lower than endothelium-intact aortic rings. The vasorelaxant effects of MEPY on endothelium-intact aortic rings were reduced by pre-treatment with l-NAME, methylene blue, or ODQ. However, pre-treatment with indomethacin, atropine, glibenclamide, tetraethylammonium, or 4-aminopyridine had no affection. In addition, MEPY inhibited the contraction induced by extracellular Ca2+ in endothelium-denuded rat thoracic aorta rings pre-contracted by PE (1 μM or KCl (60 mM in Ca2+-free solution. Conclusions Our results suggest that MEPY exerts its vasorelaxant effects via the activation of NO formation by means of l-Arg and NO-cGMP pathways and via the blockage of extracellular Ca2+ channels.

  9. MALDI-TOF MS Analysis of Condensed Tannins with Potent Antioxidant Activity from the Leaf, Stem Bark and Root Bark of Acacia confusa

    Directory of Open Access Journals (Sweden)

    Shu-Dong Wei

    2010-06-01

    Full Text Available The structures of the condensed tannins from leaf, stem bark and root bark of Acacia confusa were characterized by matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS analysis, and their antioxidant activities were measured using 1,1-diphenyl-2-picrylhydrazyl (DPPH free radical scavenging and ferric reducing/antioxidant power (FRAP assays. The results showed that the condensed tannins from stem bark and root bark include propelargonidin and procyanidin, and the leaf condensed tannins include propelargonidin, procyanidin and prodelphinidin, all with the procyanidin dominating. The condensed tannins had different polymer chain lengths, varying from trimers to undecamers for leaf and root bark and to dodecamers for stem bark. The condensed tannins extracted from the leaf, stem bark and root bark all showed a very good DPPH radical scavenging activity and ferric reducing power.

  10. Colonization patterns of the red turpentine beetle, Dendroctonus valens (Coleoptera: Curculionidae), in the Luliang Mountains, China

    Institute of Scientific and Technical Information of China (English)

    Zhudong Liu; Longwa Zhang; Zhanghong Shi; Bo Wang; Wan Qiang Tao; Jiang-hua Sun

    2008-01-01

    The alien red turpentine beetle (RTB), Dendroctonus valens LeConte, is one of the most economically destructive forest pests in China, having killed more than 6 million pines in recent years. There is a need to understand the basic biology and ecology of the beetle in order to develop an effective monitoring and management strategy. In this study, the effects of hillside exposure (south- and north-facing), host-tree locations according to relief (valley, mid-slope, and ridge-top) and tree diameters on RTB colonization were investigated in one valley (3 sites). The results showed that (i) RTB clearly preferred colonizing pines growing on south-facing hillsides, especially in the valley; (ii) RTB preferred to colonize the pines growing at the valley rather than pines growing at mid-slope or on ridge-top; (iii) RTB preferred to colonize trees with large diameter over small and medium-sized pines; (iv) the attack density of RTBs (measured by pitch tubes/pine) was obviously higher on larger trees standing in the valley than other trees standing at other places. We conclude from RTB colonization patterns, that RTB prefers to attack large trees in the valley, which may be useful in developing a pest-management strategy.

  11. Small hive beetles survive in honeybee prisons by behavioural mimicry

    Science.gov (United States)

    Ellis, J. D.; Pirk, C. W. W.; Hepburn, H. R.; Kastberger, G.; Elzen, P. J.

    2002-05-01

    We report the results of a simple experiment to determine whether honeybees feed their small hive beetle nest parasites. Honeybees incarcerate the beetles in cells constructed of plant resins and continually guard them. The longevity of incarcerated beetles greatly exceeds their metabolic reserves. We show that survival of small hive beetles derives from behavioural mimicry by which the beetles induce the bees to feed them trophallactically. Electronic supplementary material to this paper can be obtained by using the Springer LINK server located at htpp://dx.doi.org/10.1007/s00114-002-0326-y.

  12. MALDI-TOF MS Analysis of Condensed Tannins with Potent Antioxidant Activity from the Leaf, Stem Bark and Root Bark of Acacia confusa

    OpenAIRE

    Shu-Dong Wei; Hai-Chao Zhou; Yi-Ming Lin; Meng-Meng Liao; Wei-Ming Chai

    2010-01-01

    The structures of the condensed tannins from leaf, stem bark and root bark of Acacia confusa were characterized by matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS) analysis, and their antioxidant activities were measured using 1,1-diphenyl-2-picrylhydrazyl (DPPH) free radical scavenging and ferric reducing/antioxidant power (FRAP) assays. The results showed that the condensed tannins from stem bark and root bark include propelargonidin and procyanidi...

  13. Antibacterial and cytotoxic compounds from the bark of Cananga odorata.

    Science.gov (United States)

    Rahman, M Mukhlesur; Lopa, Simin S; Sadik, Golam; Harun-Or-Rashid; Islam, Robiul; Khondkar, Proma; Alam, A H M Khurshid; Rashid, Mohammad A

    2005-12-01

    O-Methylmoschatoline, liriodenine and 3,4-dihydroxybenzoic acid isolated from the barks of Cananga odorata showed antibacterial activities against a number of Gram (+) and Gram (-) bacteria. The compounds also showed antifungal and cytotoxic activities. PMID:16242266

  14. A Styrylpyrone Dimer from the Bark of Goniothalamus leiocarpus

    Institute of Scientific and Technical Information of China (English)

    Qing MU; Yi Neng HE; Wei Dong TANG; Chao Ming LI; Li Guang LOU; Han Dong SUN; Bin XU; Guo Xun YANG; Chang Qi HU

    2004-01-01

    A dimer of styrylpyrone derivative, leiocarpin E (1), was isolated from the bark of Goniothalamus leiocarpus. Its structures was elucidated by means of spectral and chemical methods. The cytotoxicity of leiocarpin E against HL-60 cells was tested.

  15. A New Abietane Diterpenoid from the Barks of Taxus yunnanensis

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The structure of a new abietane diterpenoid,taxayunnin (1),from the barks of Taxus yunnanensis,was determined by spectroscopic analysis.A known abietane diterpenoid,taxamairin C (2),was also isolated.

  16. Fatty Acid Composition of Novel Host Jack Pine Do Not Prevent Host Acceptance and Colonization by the Invasive Mountain Pine Beetle and Its Symbiotic Fungus.

    Science.gov (United States)

    Ishangulyyeva, Guncha; Najar, Ahmed; Curtis, Jonathan M; Erbilgin, Nadir

    2016-01-01

    Fatty acids are major components of plant lipids and can affect growth and development of insect herbivores. Despite a large literature examining the roles of fatty acids in conifers, relatively few studies have tested the effects of fatty acids on insect herbivores and their microbial symbionts. Particularly, whether fatty acids can affect the suitability of conifers for insect herbivores has never been studied before. Thus, we evaluated if composition of fatty acids impede or facilitate colonization of jack pine (Pinus banksiana) by the invasive mountain pine beetle (Dendroctonus ponderosae) and its symbiotic fungus (Grosmannia clavigera). This is the first study to examine the effects of tree fatty acids on any bark beetle species and its symbiotic fungus. In a novel bioassay, we found that plant tissues (hosts and non-host) amended with synthetic fatty acids at concentrations representative of jack pine were compatible with beetle larvae. Likewise, G. clavigera grew in media amended with lipid fractions or synthetic fatty acids at concentrations present in jack pine. In contrast, fatty acids and lipid composition of a non-host were not suitable for the beetle larvae or the fungus. Apparently, concentrations of individual, rather than total, fatty acids determined the suitability of jack pine. Furthermore, sampling of host and non-host tree species across Canada demonstrated that the composition of jack pine fatty acids was similar to the different populations of beetle's historical hosts. These results demonstrate that fatty acids composition compatible with insect herbivores and their microbial symbionts can be important factor defining host suitability to invasive insects. PMID:27583820

  17. Antioxidant Potential of Bark Extracts from Boreal Forest Conifers

    OpenAIRE

    Jean Legault; Karl Girard-Lalancette; Dominic Dufour; André Pichette

    2013-01-01

    The bark of boreal forest conifers has been traditionally used by Native Americans to treat various ailments and diseases. Some of these diseases involve reactive oxygen species (ROS) that can be prevented by the consumption of antioxidants such as phenolic compounds that can be found in medicinal plants. In this study, ultrasonic assisted extraction has been performed under various solvent conditions (water:ethanol mixtures) on the bark of seven boreal forest conifers used by Native American...

  18. Estimation and relevance of bark proportion in a willow stand

    Energy Technology Data Exchange (ETDEWEB)

    Adler, Anneli [Swedish Univ. of Agricultural Sciences (SLU), Dept. of Short Rotation Forestry, Uppsala (Sweden); Estonian Agricultural Univ. (EAU), Inst. of Zoology and Botany, Tartu (Estonia); Verwijst, Theo; Aronsson, Paer [Swedish Univ. of Agricultural Sciences (SLU), Dept. of Short Rotation Forestry, Uppsala (Sweden)

    2005-08-01

    We studied bark proportion of a willow (Salix viminalis) plantation established to produce biomass for energy, the vertical distribution of elements (N, P, K, Mg, Ca, Co, Cu, Zn, As, Si, Cd, Cr, Pb, Hg and Ni) in bark and in wood of the shoots and the content of elements in the standing biomass. The study is based on 5-year-old shoots (clone 77-683) from a 12-year-old plantation. The bark proportion of the whole willow stand was 19% (9 tDM ha{sup -1}). The bark proportion of single shoots was constant after they had reached the size of 20 mm at stem diameter at 55 cm height. Compared to wood, bark had significantly higher concentrations of N, P, K, Mg, Ca, Cd, Pb, Co and Zn. The nutrient element (N, P, K, Mg) concentrations in the bark and in the wood of the current year shoot fractions (twigs) were significantly higher compared to the bark and the wood of other fractions. The accumulation of heavy metals occurred due to the accumulation of tree biomass and not due to the increase of heavy metal (Cd, Cr, Pb and Hg) concentrations in plant tissues over time. In summary, different management regimes give a possibility to influence shoot size frequency distribution of the crop and the chemical composition of biomass. For minimizing element removals from the soil and corrosion processes in power plants, energy willow stands should be managed in a way that promotes low bark proportion and thereby as little nutrient removal from the site by biomass harvest as possible. (Author)

  19. ANTIOXIDANT ACTIVITIES OF NATURAL PHENOLIC COMPOUNDS FROM ACACIA CONCURRENS BARK

    OpenAIRE

    Nimbekar, Tulsidas; Wanjari, Bhumesh; Patil, A. T.

    2010-01-01

    The present study showed that the ethanolic extracts from the bark of Acacia concurrens exhibited a strong antioxidant activity. Among all the fractions from ethanolic extracts of bark, the EtOAc soluble fraction exhibited the best antioxidant performance. Furthermore, the amounts of total phenolic compound were determined from the ethanolic extracts. Therefore, Acacia concurrens could be considered as a potential source of natural antioxidant.

  20. Antibacterial Effect of Juglans Regia Bark against Oral Pathologic Bacteria

    OpenAIRE

    Faramarz Zakavi; Leila Golpasand Hagh; Arash Daraeighadikolaei; Ahmad Farajzadeh Sheikh; Arsham Daraeighadikolaei; Zahra Leilavi Shooshtari

    2013-01-01

    Background. In this study antimicrobial effect of ethanolic and aqueous extracts of Juglans regia bark in Iran was evaluated on four different oral bacteria, Streptococcus mutans, Streptococcus salivarius, Streptococcus sanguis, and Staphylococcus aureus. Methods. Aqueous and ethanol extracts of Juglans regia bark were prepared by using disk diffusion technique and Minimal Inhibitory Concentration (MIC) methods. Tetracycline 30 μg and Erythromycin 15 μg were used as positive control and w...

  1. Antibacterial Effect of Juglans Regia Bark against Oral Pathologic Bacteria

    OpenAIRE

    Zakavi, Faramarz; Golpasand Hagh, Leila; Daraeighadikolaei, Arash; Farajzadeh Sheikh, Ahmad; Daraeighadikolaei, Arsham; Leilavi Shooshtari, Zahra

    2013-01-01

    Background. In this study antimicrobial effect of ethanolic and aqueous extracts of Juglans regia bark in Iran was evaluated on four different oral bacteria, Streptococcus mutans, Streptococcus salivarius, Streptococcus sanguis, and Staphylococcus aureus. Methods. Aqueous and ethanol extracts of Juglans regia bark were prepared by using disk diffusion technique and Minimal Inhibitory Concentration (MIC) methods. Tetracycline 30  μ g and Erythromycin 15  μ g were used as positive control and w...

  2. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  3. INCORPORATION OF BARK AND TOPS IN EUCALYPTUS GLOBULUS WOOD PULPING

    Directory of Open Access Journals (Sweden)

    Isabel Miranda,

    2012-07-01

    Full Text Available Bark and the tops of E. globulus trees were considered for kraft pulping under industrial conditions. Pulping experiments included wood, bark, tops, and composite samples. Top wood had an average chemical composition most similar to that of wood but with somewhat lower cellulose content (52.8% vs. 56.9% and higher lignin content (18.8% vs. 17.8%. There was also a small difference between tops and wood for non-polar extractives, which were higher for tops (2.0% vs. 1.4%. Bark had a less favorable chemical composition with more extractives, especially polar extractives (5.3% vs. 1.6% and 1% NaOH solubility (19.9% vs. 12.2%, pentosans (23.7% vs. 21.3%, and ash (2.9% vs. 1.0%, although the fiber length was higher (1.12 mm vs. 0.98 mm. The kraft pulps obtained using bark showed significantly lower yield, delignification degree, and strength properties but had a quicker response to refining. The incorporation of tops and bark in the wood pulping in levels below or similar to a corresponding whole-stem, however, had a limited effect on pulp yield, kappa number, refining, and pulp strength properties. These additional raw-materials, which were estimated to be 26% of the commercial stem wood (14% bark and 12% tops, may therefore be considered in enlarging the eucalypt fiber feedstock in kraft pulping.

  4. Bark thickness across the angiosperms: more than just fire.

    Science.gov (United States)

    Rosell, Julieta A

    2016-07-01

    Global variation in total bark thickness (TBT) is traditionally attributed to fire. However, bark is multifunctional, as reflected by its inner living and outer dead regions, meaning that, in addition to fire protection, other factors probably contribute to TBT variation. To address how fire, climate, and plant size contribute to variation in TBT, inner bark thickness (IBT) and outer bark thickness (OBT), I sampled 640 species spanning all major angiosperm clades and 18 sites with contrasting precipitation, temperature, and fire regime. Stem size was by far the main driver of variation in thickness, with environment being less important. IBT was closely correlated with stem diameter, probably for metabolic reasons, and, controlling for size, was thicker in drier and hotter environments, even fire-free ones, probably reflecting its water and photosynthate storage role. OBT was less closely correlated with size, and was thicker in drier, seasonal sites experiencing frequent fires. IBT and OBT covaried loosely and both contributed to overall TBT variation. Thickness variation was higher within than across sites and was evolutionarily labile. Given high within-site diversity and the multiple selective factors acting on TBT, continued study of the different drivers of variation in bark thickness is crucial to understand bark ecology. PMID:26890029

  5. DNA Extraction and Amplification from Contemporary Polynesian Bark-Cloth

    Science.gov (United States)

    Moncada, Ximena; Payacán, Claudia; Arriaza, Francisco; Lobos, Sergio; Seelenfreund, Daniela; Seelenfreund, Andrea

    2013-01-01

    Background Paper mulberry has been used for thousands of years in Asia and Oceania for making paper and bark-cloth, respectively. Museums around the world hold valuable collections of Polynesian bark-cloth. Genetic analysis of the plant fibers from which the textiles were made may answer a number of questions of interest related to provenance, authenticity or species used in the manufacture of these textiles. Recovery of nucleic acids from paper mulberry bark-cloth has not been reported before. Methodology We describe a simple method for the extraction of PCR-amplifiable DNA from small samples of contemporary Polynesian bark-cloth (tapa) using two types of nuclear markers. We report the amplification of about 300 bp sequences of the ITS1 region and of a microsatellite marker. Conclusions Sufficient DNA was retrieved from all bark-cloth samples to permit successful PCR amplification. This method shows a means of obtaining useful genetic information from modern bark-cloth samples and opens perspectives for the analyses of small fragments derived from ethnographic materials. PMID:23437166

  6. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  7. Efficient dewatering of bark in heated presses. Survey and pilot-scale trials; Effektivare avvattning av bark i vaermda pressar. Problemkartering samt foersoek i pilotskala

    Energy Technology Data Exchange (ETDEWEB)

    Haakansson, Martin; Stenstroem, Stig (Lund Inst. of Technology, Lund (SE))

    2007-12-15

    Dewatering and drying of biofuels such as bark and GROT have received increased importance due to an increased interest to use these products as energy sources. In Sweden there are about 30 bark presses installed, however the amount of available information is very limited about dewatering of bark. The goal with this work is to increase the knowledge about dewatering of bark. Two separate goals have been defined in the project: A. Survey about problems related to dewatering of bark and compilation of operating experiences at Swedish mills. B. Study how different parameters affect bark dewatering at pilot scale experiments. Study different techniques for heating bark and the bark pressing process. The results will mainly be of interest for mills which are handling bark, for municipal power plants who buy wet forest residues (bark, GROT etc.) and for manufacturers of industrial bark pressing equipment. The results show that the dry matter content for birch- and pine bark normally are so high that pressing does not result in dewatering of the barks. Both dry and wet debarking is used and these bark fractions should be pressed separately. On line measurement of the dry matter content for the bark should be used as a standard tool on the bark press. This will facilitate improved control of the bark press during the year. Other conclusions are that smaller bark particles result in an increased dry matter content, large bark- and wood pieces decrease the dewatering in the bark press and that the total residence time in the press nip should be at least 30 seconds. The most common method to take care of bark water is to send it to the evaporators or to the water purification plant. Maintenance of the bark press appears not to be a big problem. Hot pressing can be accomplished in different ways, either the bark press can be heated or the bark can be heated in different ways. The alternatives that have been studied in this project are steaming the bark, heating the bark using

  8. Management, morphological, and environmental factors influencing Douglas-fir bark furrows in the Oregon Coast Range

    Science.gov (United States)

    Sheridan, Christopher D.; Puettmann, Klaus J.; Huso, Manuela M.P.; Hagar, Joan C.; Falk, Kristen R.

    2013-01-01

    Many land managers in the Pacific Northwest have the goal of increasing late-successional forest structures. Despite the documented importance of Douglas-fir tree bark structure in forested ecosystems, little is known about factors influencing bark development and how foresters can manage development. This study investigated the relative importance of tree size, growth, environmental factors, and thinning on Douglas-fir bark furrow characteristics in the Oregon Coast Range. Bark furrow depth, area, and bark roughness were measured for Douglas-fir trees in young heavily thinned and unthinned sites and compared to older reference sites. We tested models for relationships between bark furrow response and thinning, tree diameter, diameter growth, and environmental factors. Separately, we compared bark responses measured on trees used by bark-foraging birds with trees with no observed usage. Tree diameter and diameter growth were the most important variables in predicting bark characteristics in young trees. Measured environmental variables were not strongly related to bark characteristics. Bark furrow characteristics in old trees were influenced by tree diameter and surrounding tree densities. Young trees used by bark foragers did not have different bark characteristics than unused trees. Efforts to enhance Douglas-fir bark characteristics should emphasize retention of larger diameter trees' growth enhancement.

  9. Regeneration of Rhizophora mangle in a Caribbean mangrove forest: interacting effects of canopy disturbance and a stem-boring beetle.

    Science.gov (United States)

    Sousa, Wayne P; Quek, Swee P; Mitchell, Betsy J

    2003-11-01

    Current theory predicts that in low-density, seed-limited plant populations, seed predation will be more important than competition in determining the number of individuals that reach maturity. However, when plant density is high, competition for microsites suitable for establishment and growth is expected to have a relatively greater effect. This dichotomous perspective does not account for situations in which the risk of seed predation differs inside versus outside recruitment microsites. We report the results of a field experiment and sampling studies that demonstrate such an interaction between microsite quality and the risk of propagule predation in mangrove forests on the Caribbean coast of Panama, where it appears to play a key role in shaping the demography and dynamics of the mangrove, Rhizophora mangle. Rhizophora's water-borne propagules establish wherever they strand, but long-term sampling revealed that only those that do so in or near lightning-created canopy gaps survive and grow to maturity. These microsites afford better growth conditions than the surrounding understory and, as importantly, provide a refuge from predation by the scolytid beetle, Coccotrypes rhizophorae. This refuge effect was confirmed with a field experiment in which Rhizophora seedlings were planted at different positions relative to gap edges, from 5 m inside to 20 m outside the gap. Mortality due to beetle attack increased linearly from an average of 10% inside a gap to 72% at 20 m into the forest. The interaction between canopy disturbance and propagule predation may be having a large impact on the composition of our study forests. Being shade-tolerant, Rhizophora seedlings that escape or survive beetle attack can persist in the understory for years. However, the high rate of beetle-induced mortality effectively eliminates the contribution of advance regeneration by Rhizophora saplings to gap succession. This may explain why the shade-intolerant mangrove, Laguncularia racemosa

  10. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. Chirality determines pheromone activity for flour beetles

    Science.gov (United States)

    Levinson, H. Z.; Mori, K.

    1983-04-01

    Olfactory perception and orientation behaviour of female and male flour beetles ( Tribolium castaneum, T. confusum) to single stereoisomers of their aggregation pheromone revealed maximal receptor potentials and optimal attraction in response to 4R,8R-(-)-dimethyldecanal, whereas its optical antipode 4S,8S-(+)-dimethyldecanal was found to be inactive in this respect. Female flour beetles of both species were ≈ 103 times less attracted to 4R,8S-(+)- and 4S,8R-(-)-dimethyldecanal than to 4R,8R-(-)-dimethyldecanal, while male flour beetles failed to respond to the R,S-(+)- and S,R-(-)-stereoisomers. Pheromone extracts of prothoracic femora from unmated male flour beetles elicited higher receptor potentials in the antennae of females than in those of males. The results suggest that the aggregation pheromone emitted by male T. castaneum as well as male T. confusum has the stereochemical structure of 4R,8R-(-)-dimethyl-decanal, which acts as sex attractant for the females and as aggregant for the males of both species.

  12. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  13. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  14. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  15. Tiger beetle's pursuit of prey depends on distance

    Science.gov (United States)

    Noest, Robert; Wang, Jane

    2015-03-01

    Tiger beetles are fast predators capable of chasing prey under closed-loop visual guidance. We investigated their control system using high-speed digital recordings of beetles chasing a moving prey dummy in a laboratory arena. Analysis reveals that the beetle uses a proportional control law in which the angular position of the prey relative to the beetle's body axis drives the beetle's angular velocity with a delay of about 28 ms. The system gain is shown to depend on the beetle-prey distance in a pattern indicating three hunting phases over the observed distance domain. We show that to explain this behavior the tiger beetle must be capable of visually determining the distance to its target and using that to adapt the gain in its proportional control law. We will end with a discussion on the possible methods for distance detection by the tiger beetle and focus on two of them. Motion parallax, using the natural head sway induced by the walking gait of the tiger beetle, is shown to have insufficient distance range. However elevation in the field of vision, using the angle with respect to the horizon at which a target is observed, has a much larger distance range and is a prime candidate for the mechanism of visual distance detection in the tiger beetle.

  16. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  17. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  18. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  19. Confinement of small hive beetles (Aethina tumida) by Cape honeybees (Apis mellifera capensis)

    OpenAIRE

    James D. Ellis Jr.,; Hepburn, Randall; Elzen, Patti

    2004-01-01

    International audience In this study we quantify small hive beetle (Aethina tumida Murray) and Cape honeybee (A.m. capensis Esch., an African subspecies) behaviours that are associated with beetle confinement in an effort to understand why Cape bees can withstand large beetle infestations. Four observation hives were each inoculated with 25 beetles and were observed for 11-17 days. Data collected included guard bee (worker bees who guard beetle confinement sites) and confined beetle behavi...

  20. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  1. Sertraline-induced panic attack.

    Science.gov (United States)

    González-Berríos, Nereida

    2009-01-01

    Selective Serotonin Reuptake Inhibitors are the treatment of choice for depression and anxiety disorders due to its tolerability, safety and side effects profile. However, with the current and frequent use of these medications in patients with these disorders, new side effects have been reported. This case report describes the development of panic attacks in a 24-year-old-female patient with depressive and anxiety symptoms, and no previous predisposing history for panic attacks. PMID:19954091

  2. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  3. Utilization of flavonoid compounds from bark and wood: a review.

    Science.gov (United States)

    Yazaki, Yoshikazu

    2015-03-01

    Flavonoid compounds, which are extracted from bark and wood and used commercially, are flavan 3-ols as monomers and their polymers, which are called "condensed tannins". Reactions of the condensed tannins with formaldehyde are the basis for wood adhesives. In the late 1940s, tannin research for wood adhesives was begun and the world-first commercial use of wattle tannin from black wattle (Acacia mearnsii) bark as wood adhesives occurred in Australia in the 1960s. In addition, wattle tannin-based adhesives were further developed in South Africa and the uses of these adhesives have been continuing to date. The success of wattle tannin in wood adhesives is demonstrated by the collaboration of the ACIAR with the CAF in the early 1990s. Although radiata pine bark (Pinus radiata) could be a useful resource for the production of wood adhesives, three problems prevented its use in this application: low extractive yields from the bark, variable quality of the tannin extracts and excessive viscosity of the formulated tannin adhesives. In order to overcome these problems, various extraction methods have been proposed. Studies on tannin adhesives from bark of other pine species are also described. Furthermore, the use of the tannin in the bark without extraction is described as "bark adhesives" from radiata pine and black wattle. The use of radiata tannin without formaldehyde for moulded wood products is also described. Owing to the strong antioxidant activity of flavonoid compounds, bark extracts from French maritime pine (Pinus pinaster, synonym P. maritima) and radiata pine have been commercialized as nutritional supplements: Pycnogenol and Enzogenol, respectively. The background and the development of Pycnogenol and the basic difference in the preparation processes between Pycnogenol and Enzogenol are described. On the basis of the discovery that the SOSA value for wattle tannin is approximately 10 times that of extracts from pine bark supplements (Pycnogenol and Enzogenol

  4. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  5. Pharmacognostic evaluation of stem bark of Pongamia pinnata (L.) Pierre

    Institute of Scientific and Technical Information of China (English)

    Dinesh Kumar; Ajay Kumar; Om Prakash

    2012-01-01

    Objective: To perform the pharmacognostic study of Pongamia pinnata (L.) Pierre (P. pinnata) stem bark. Method: The pharmacognostic studies were carried out in terms of organoleptic, macroscopic, microscopic, fluorescence analysis and physicochemical parameters. Results: The bark consisting of channelled, recurved, slightly quilled, usually 0.2-1 cm thick, lenticellate pieces with outer surface ash-grey to greyish-brown and internal surface yellowish-white to cream coloured having unpleasant odour and bitter taste. The main microscopic characterstics of the bark include phellem (5-20 or more layers of cork), phellogen (2-3 layered) followed by 10-15 layered phelloderm. Among other microscopic components were phloem parenchyma, phloem fibre and stone cells, traversed by wavy medullary rays. Further, physicochemical analysis of the bark power showed total ash, water soluble ash, acid insoluble ash and sulphated ash as 10.94, 1.96, 1.47 and 15.8 % w/w respectively. The alcohol and water soluble extractives values of the stem bark were 9.6 and 18.4 %w/w respectively. Conclusions: Various pharmacognostic characters observed in this study helps in botanical identification and standardization of P. pinnata L. in crude form.

  6. Antioxidant Potential of Bark Extracts from Boreal Forest Conifers.

    Science.gov (United States)

    Legault, Jean; Girard-Lalancette, Karl; Dufour, Dominic; Pichette, André

    2013-01-01

    The bark of boreal forest conifers has been traditionally used by Native Americans to treat various ailments and diseases. Some of these diseases involve reactive oxygen species (ROS) that can be prevented by the consumption of antioxidants such as phenolic compounds that can be found in medicinal plants. In this study, ultrasonic assisted extraction has been performed under various solvent conditions (water:ethanol mixtures) on the bark of seven boreal forest conifers used by Native Americans including: Pinus strobus, Pinus resinosa, Pinus banksiana, Picea mariana, Picea glauca, Larix laricina, and Abies balsamea. The total phenolic content, as well as ORACFL potency and cellular antioxidant activity (IC50), were evaluated for all bark extracts, and compared with the standardized water extract of Pinus maritima bark (Pycnogenol), which showed clinical efficiency to prevent ROS deleterious effects. The best overall phenolic extraction yield and antioxidant potential was obtained with Picea glauca and Picea mariana. Interestingly, total phenolic content of these bark extracts was similar to Pycnogenol but their antioxidant activity were higher. Moreover, most of the extracts did not inhibit the growth of human skin fibroblasts, WS1. A significant correlation was found between the total phenolic content and the antioxidant activity for water extracts suggesting that these compounds are involved in the activity. PMID:26784337

  7. Antioxidant Potential of Bark Extracts from Boreal Forest Conifers

    Directory of Open Access Journals (Sweden)

    Jean Legault

    2013-07-01

    Full Text Available The bark of boreal forest conifers has been traditionally used by Native Americans to treat various ailments and diseases. Some of these diseases involve reactive oxygen species (ROS that can be prevented by the consumption of antioxidants such as phenolic compounds that can be found in medicinal plants. In this study, ultrasonic assisted extraction has been performed under various solvent conditions (water:ethanol mixtures on the bark of seven boreal forest conifers used by Native Americans including: Pinus strobus, Pinus resinosa, Pinus banksiana, Picea mariana, Picea glauca, Larix laricina, and Abies balsamea. The total phenolic content, as well as ORACFL potency and cellular antioxidant activity (IC50, were evaluated for all bark extracts, and compared with the standardized water extract of Pinus maritima bark (Pycnogenol, which showed clinical efficiency to prevent ROS deleterious effects. The best overall phenolic extraction yield and antioxidant potential was obtained with Picea glauca and Picea mariana. Interestingly, total phenolic content of these bark extracts was similar to Pycnogenol but their antioxidant activity were higher. Moreover, most of the extracts did not inhibit the growth of human skin fibroblasts, WS1. A significant correlation was found between the total phenolic content and the antioxidant activity for water extracts suggesting that these compounds are involved in the activity.

  8. Analgesic and anti-inflammatory activity of root bark of Grewia asiatica Linn. in rodents

    Directory of Open Access Journals (Sweden)

    Udaybhan Singh Paviaya

    2013-01-01

    Conclusions: The present study indicates that root bark of G. asiatica exhibits peripheral and central analgesic effect and anti-inflammatory activity, which may be attributed to the various phytochemicals present in root bark of G. asiatica.

  9. Antigenotoxic properties of Terminalia arjuna bark extracts.

    Science.gov (United States)

    Scassellati-Sforzolini, G; Villarini, L M; Moretti, L M; Marcarelli, L M; Pasquini, R; Fatigoni, C; Kaur, L S; Kumar, S; Grover, I S

    1999-01-01

    Compounds possessing antimutagenic properties (polyphenols, tannins, vitamins, etc.) have been identified in fruits, vegetables, spices, and medicinal plants. Terminalia arjuna (Combretaceae), a tropical woody tree occurring throughout India and known locally as Kumbuk, is a medicinal plant rich in tannins and triterpenes that is used extensively in Ayurvedic medicine as a cardiac tonic. The aim of the present collaborative work was to test six solvent extracts from the bark of Terminalia arjuna for antigenotoxic activity using in vitro short-term tests. Terminalia arjuna extracts were obtained by sequential extraction using acetone, methanol, methanol + HCl, chloroform, ethyl acetate, and ethyl ether. The antigenotoxic properties of these extracts were investigated by assessing the inhibition of genotoxicity of the directacting mutagen 4-nitroquinoline-N-oxide (4NQO) using the "comet" assay and the micronucleus (MN) test. Human peripheral blood leukocytes were incubated with different concentrations of the six extracts (from 5 to 100 microg/ mL) and with 4NQO (1 and 2 microg/mL, for the "comet" assay and MN test, respectively). Each extract/4NQO combination was tested twice; in each experiment, positive control (4NQO alone) and negative control (1% DMSO) were set. "Comet" assay results showed that acetone and methanol extracts were highly effective in reducing the DNA damage caused by 4NQO, whereas the acidic methanol, chloroform, ethyl acetate, and ethyl ether extracts showed less marked or no antigenotoxic activity. In the MN test, a decrease in 4NQO genotoxicity was observed by testing this mutagen in the presence of acetone, methanol, chloroform, and ethyl acetate extracts, even though the extent of inhibition was not always statistically significant. PMID:15281223

  10. The bacterial community of entomophilic nematodes and host beetles.

    Science.gov (United States)

    Koneru, Sneha L; Salinas, Heilly; Flores, Gilberto E; Hong, Ray L

    2016-05-01

    Insects form the most species-rich lineage of Eukaryotes and each is a potential host for organisms from multiple phyla, including fungi, protozoa, mites, bacteria and nematodes. In particular, beetles are known to be associated with distinct bacterial communities and entomophilic nematodes. While entomopathogenic nematodes require symbiotic bacteria to kill and reproduce inside their insect hosts, the microbial ecology that facilitates other types of nematode-insect associations is largely unknown. To illuminate detailed patterns of the tritrophic beetle-nematode-bacteria relationship, we surveyed the nematode infestation profiles of scarab beetles in the greater Los Angeles area over a five-year period and found distinct nematode infestation patterns for certain beetle hosts. Over a single season, we characterized the bacterial communities of beetles and their associated nematodes using high-throughput sequencing of the 16S rRNA gene. We found significant differences in bacterial community composition among the five prevalent beetle host species, independent of geographical origin. Anaerobes Synergistaceae and sulphate-reducing Desulfovibrionaceae were most abundant in Amblonoxia beetles, while Enterobacteriaceae and Lachnospiraceae were common in Cyclocephala beetles. Unlike entomopathogenic nematodes that carry bacterial symbionts, insect-associated nematodes do not alter the beetles' native bacterial communities, nor do their microbiomes differ according to nematode or beetle host species. The conservation of Diplogastrid nematodes associations with Melolonthinae beetles and sulphate-reducing bacteria suggests a possible link between beetle-bacterial communities and their associated nematodes. Our results establish a starting point towards understanding the dynamic interactions between soil macroinvertebrates and their microbiota in a highly accessible urban environment. PMID:26992100

  11. A small animal model study of perlite and fir bark dust on guinea pig lungs.

    Science.gov (United States)

    McMichael, R F; DiPalma, J R; Blumenstein, R; Amenta, P S; Freedman, A P; Barbieri, E J

    1983-05-01

    Fir bark (Abies) and perlite (noncrystalline silicate) dusts have been reported to cause pulmonary disease in humans. Guinea pigs were exposed to either fir bark or perlite dust in a special chamber. Severe pathologic changes occurred in the lungs, consisting of lymphoid aggregated and a perivascular inflammatory response. Both dusts caused similar changes although one was vegetable (fir bark) and the other mineral (perlite). Fir bark and perlite dust appeared to be more than just nuisance dusts.

  12. Colorado potato beetle toxins revisited: evidence the beetle does not sequester host plant glycoalkaloids.

    Science.gov (United States)

    Armer, Christine A

    2004-04-01

    The Colorado potato beetle feeds only on glycoalkaloid-laden solanaceous plants, appears to be toxic to predators, and has aposematic coloration, suggesting the beetle may sequester alkaloids from its host plants. This study tested 4th instars and adults, as well as isolated hemolymph and excrement, to determine if the beetles sequester, metabolize, or excrete alkaloids ingested from their host plants. HPLC analysis showed: that neither the larvae nor the adults sequestered either solanine or chaconine from potato foliage; that any alkaloids in the beetles were at concentrations well below 1 ppm; and that alkaloids were found in the excrement of larvae at approximately the same concentrations as in foliage. Analysis of alkaloids in the remains of fed-upon leaflet halves plus excreta during 24 hr feeding by 4th instars, as compared to alkaloids in the uneaten halves of the leaflets, showed that equal amounts of alkaloids were excreted as were ingested. The aposematic coloration probably warns of a previously-identified toxic dipeptide instead of a plant-derived alkaloid, as the Colorado potato beetle appears to excrete, rather than sequester or metabolize, the alkaloids from its host plants.

  13. iBeetle-Base: a database for RNAi phenotypes in the red flour beetle Tribolium castaneum.

    Science.gov (United States)

    Dönitz, Jürgen; Schmitt-Engel, Christian; Grossmann, Daniela; Gerischer, Lizzy; Tech, Maike; Schoppmeier, Michael; Klingler, Martin; Bucher, Gregor

    2015-01-01

    The iBeetle-Base (http://ibeetle-base.uni-goettingen.de) makes available annotations of RNAi phenotypes, which were gathered in a large scale RNAi screen in the red flour beetle Tribolium castaneum (iBeetle screen). In addition, it provides access to sequence information and links for all Tribolium castaneum genes. The iBeetle-Base contains the annotations of phenotypes of several thousands of genes knocked down during embryonic and metamorphic epidermis and muscle development in addition to phenotypes linked to oogenesis and stink gland biology. The phenotypes are described according to the EQM (entity, quality, modifier) system using controlled vocabularies and the Tribolium morphological ontology (TrOn). Furthermore, images linked to the respective annotations are provided. The data are searchable either for specific phenotypes using a complex 'search for morphological defects' or a 'quick search' for gene names and IDs. The red flour beetle Tribolium castaneum has become an important model system for insect functional genetics and is a representative of the most species rich taxon, the Coleoptera, which comprise several devastating pests. It is used for studying insect typical development, the evolution of development and for research on metabolism and pest control. Besides Drosophila, Tribolium is the first insect model organism where large scale unbiased screens have been performed.

  14. Tannins quantification in barks of Mimosa tenuiflora and Acacia mearnsii

    Directory of Open Access Journals (Sweden)

    Leandro Calegari

    2016-03-01

    Full Text Available Due to its chemical complexity, there are several methodologies for vegetable tannins quantification. Thus, this work aims at quantifying both tannin and non-tannin substances present in the barks of Mimosa tenuiflora and Acacia mearnsii by two different methods. From bark particles of both species, analytical solutions were produced by using a steam-jacketed extractor. The solution was analyzed by Stiasny and hide-powder (no chromed methods. For both species, tannin levels were superior when analyzed by hide-powder method, reaching 47.8% and 24.1% for A. mearnsii and M. tenuiflora, respectively. By Stiasny method, the tannins levels considered were 39.0% for A. mearnsii, and 15.5% for M. tenuiflora. Despite the best results presented by A. mearnsii, the bark of M. tenuiflora also showed great potential due to its considerable amount of tannin and the availability of the species at Caatinga biome.

  15. Factors controlling bark decomposition and its role in wood decomposition in five tropical tree species

    Science.gov (United States)

    Dossa, Gbadamassi G. O.; Paudel, Ekananda; Cao, Kunfang; Schaefer, Douglas; Harrison, Rhett D.

    2016-01-01

    Organic matter decomposition represents a vital ecosystem process by which nutrients are made available for plant uptake and is a major flux in the global carbon cycle. Previous studies have investigated decomposition of different plant parts, but few considered bark decomposition or its role in decomposition of wood. However, bark can comprise a large fraction of tree biomass. We used a common litter-bed approach to investigate factors affecting bark decomposition and its role in wood decomposition for five tree species in a secondary seasonal tropical rain forest in SW China. For bark, we implemented a litter bag experiment over 12 mo, using different mesh sizes to investigate effects of litter meso- and macro-fauna. For wood, we compared the decomposition of branches with and without bark over 24 mo. Bark in coarse mesh bags decomposed 1.11–1.76 times faster than bark in fine mesh bags. For wood decomposition, responses to bark removal were species dependent. Three species with slow wood decomposition rates showed significant negative effects of bark-removal, but there was no significant effect in the other two species. Future research should also separately examine bark and wood decomposition, and consider bark-removal experiments to better understand roles of bark in wood decomposition. PMID:27698461

  16. PHYTOCHEMICAL SCREENING AND MICROBICIDAL ACTIVITY OF STEM BARK OF PTEROCARPUS MARSUPIUM

    Directory of Open Access Journals (Sweden)

    Udaysing Hari Patil,

    2011-01-01

    Full Text Available Bactericidal potential of methanolic extract of stem bark (Apical bark, middle bark and Mature bark of Pterocarpus marsupium was evaluated with respect to pathogenic bacteria Bacillus subtilis, Staphylococcus aureus, Escherichia coli, Pseudomonas aeruginosa, Klebsiella pneumoneae, Salmonella typhi, Proteus mirabilis and Micrococcus sp. The methanolic extract of apical stem bark was effective than the middle bark and mature bark in inhibiting the growth of all bacteria. The bacterium Staphylococcus aureus was most sensitive among all the bacterial species studied. Preliminary phytochemical analysis revealed the presence of alkaloids, glycosides,flavonoids, flavonols, phenols and terpenoids. Saponins were absent in all the bark samples.The concentrations of these phytoconstituents was higher in the apical stem bark than the middle and mature stem bark. The percent extract yield was maximum in apical stem bark. Thus, in the pharmacological point of view, it is important to study the biochemistry of apical bark in order to isolate and screen the new pharmacological active principals which can be useful in designing of new drugs active against various infectious micro- rganisms like bacteria, fungi and viruses etc.

  17. PHARMACOGNOSTIC EVALUATION AND PHYTOCHEMICAL SCREENING OF ALBIZIA ODORATISSIMA BARK POWDER

    Directory of Open Access Journals (Sweden)

    Chandra Amrish

    2011-06-01

    Full Text Available Pharmacognostic evaluation of the crude drugs powder is done by using the different botanical parameters in order to evaluate the quality and purity of drugs, based on the concentration of their active principles, physical and chemical standards. This article reports on pharmacognostic evaluation or standardization of the crude drug powder of Albizia odoratissima bark powder. Albizia odoratissima bark powder has been standardized on the basis of organoleptic properties, physical characteristics, and physico‐chemical properties and phytochemical investigation. In the phytochemical investigation flavonoids, tannin, carbohydrate, saponin, triterpenoids are found to be present.

  18. DEVELOPMENT OF QUALITY STANDARDS OF BERBERIS ARISTATA STEM BARK

    Directory of Open Access Journals (Sweden)

    Javed Ahamad

    2012-02-01

    Full Text Available Berberis aristata is an important medicinal plant of family Berberidaceae. It is commonly known as Zarishk and Daruhaldi. It is mainly used for the treatment piles, liver diseases and diabetes. As the herb is used widely in the Indian traditional systems of medicine, it was thought worthwhile to develop the quality standards for its stem bark. The results of Pharmacognostic standardization of stem bark of B. aristata are very helpful in determination of quality and purity of the crude drug and its marketed formulation.

  19. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  20. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  1. Lehr's fields of campaniform sensilla in beetles (Coleoptera): functional morphology. III. Modification of elytral mobility or shape in flying beetles.

    Science.gov (United States)

    Frantsevich, Leonid; Gorb, Stanislav; Radchenko, Vladimir; Gladun, Dmytro

    2015-03-01

    Some flying beetles have peculiar functional properties of their elytra, if compared with the vast majority of beetles. A "typical" beetle covers its pterothorax and the abdomen from above with closed elytra and links closed elytra together along the sutural edges. In the open state during flight, the sutural edges diverge much more than by 90°. Several beetles of unrelated taxa spread wings through lateral incisions on the elytra and turn the elytron during opening about 10-12° (Cetoniini, Scarabaeus, Gymnopleurus) or elevate their elytra without partition (Sisyphus, Tragocerus). The number of campaniform sensilla in their elytral sensory field is diminished in comparison with beetles of closely related taxa lacking that incision. Elytra are very short in rove beetles and in long-horn beetles Necydalini. The abundance of sensilla in brachyelytrous long-horn beetles Necydalini does not decrease in comparison with macroelytrous Cerambycinae. Strong reduction of the sensory field was found in brachyelytrous Staphylinidae. Lastly, there are beetles lacking the linkage of the elytra down the sutural edge (stenoelytry). Effects of stenoelytry were also not uniform: Oedemera and flying Meloidae have the normal amount of sensilla with respect to their body size, whereas the sensory field in the stenoelytrous Eulosia bombyliformis is 5-6 times less than in chafers of the same size but with normally linking broad elytra.

  2. Spatial dependence of random sets and its application to dispersion of bark beetle infestation in a natural forest:

    OpenAIRE

    Düll, Jochen; Kautz, Markus; Ohser, Joachim

    2011-01-01

    Image Analysis and Stereology is the official journal of the International Society for Stereology. It promotes the exchange of scientific, technical, organizational and other information on the quantitative analysis of data having a geometrical structure, including stereology, differential geometry, image analysis, image processing, mathematical morphology, stochastic geometry, statistics, pattern recognition, and related topics. The fields of application are not restricted and range from bio...

  3. Using UAV-Based Photogrammetry and Hyperspectral Imaging for Mapping Bark Beetle Damage at Tree-Level

    OpenAIRE

    Roope Näsi; Eija Honkavaara; Päivi Lyytikäinen-Saarenmaa; Minna Blomqvist; Paula Litkey; Teemu Hakala; Niko Viljanen; Tuula Kantola; Topi Tanhuanpää; Markus Holopainen

    2015-01-01

    Low-cost, miniaturized hyperspectral imaging technology is becoming available for small unmanned aerial vehicle (UAV) platforms. This technology can be efficient in carrying out small-area inspections of anomalous reflectance characteristics of trees at a very high level of detail. Increased frequency and intensity of insect induced forest disturbance has established a new demand for effective methods suitable in mapping and monitoring tasks. In this investigation, a novel miniaturized hypers...

  4. Improvement of nutritive value of acacia mangium bark by alkali treatment

    Directory of Open Access Journals (Sweden)

    Elizabeth Wina

    2001-10-01

    Full Text Available Bark, especially from Acacia mangium is a by-product from wood processing industries that commonly found in Indonesiaand in big amount will cause environmental problems. One of the alternatives to utilize bark is for animal feed. The aims of this experiment are to improve the nutritive value of bark by alkali treatments (urea and sodium hydroxide and to determine the level of substitution of elephant grass by bark. The experiment consisted of 3 in vitro studies and 1 in sacco study. In vitro studies consisted of 1 the use of urea or NaOH by wetting and incubation-method, 2 the use of different concentration of Na OH (0-4% by soaking method, 3 determination of substitution level of elephant grass by treated bark. In sacco study was conducted at 0, 6, 12, 24, 48 and 72 hours of incubation to compare the degradation of treated bark to elephant grass. The results show that urea treatment did not improve DM or OM digestibilities of bark. Soaking bark in 4% NaOH solution was more effective than wetting and incubation-method in improving in vitro digestibility. (49.26% vs19.56% for soaking and dry-method, respectively. In sacco studyl shows that treated bark had a very high solubility at 0 hour incubation but the degradation at 72 hours incubation was not significantly different from that of 0 hour incubation. The gas produced at in vitro study of treated bark was very low indicated that there was no degradation of bark at all. The level of substitution of elephant grass by treated bark up to 30% gave a non-significant digestibility value to that of 100% elephant grass. In conclusion, bark after tannin-extraction was a better feedstuff for animal feed. The soaking method in 4% NaOH solution improved the digestibility of bark significantly and the level of substitution of elephant grass by treated bark was 30%.

  5. Hepatocurative potential of Vitex doniana root bark, stem bark and leaves extracts against CCl4-induced liver damage in rats

    Institute of Scientific and Technical Information of China (English)

    James Dorcas Bolanle; Kadejo Olubukola Adetoro; Sallau Abdullahi Balarabe; Owolabi Olumuyiwa Adeyemi

    2014-01-01

    Objective: To evaluate the hepatocurative effects of aqueous root bark, stem bark and leaves ofVitex doniana in carbon tetrachloride (CCl albino rats.Methods:4) induced liver damage and non induced liver damage were assigned into liver damage and non liver damage groups of 6 rats in a group. The animals in the CCl4 induced liver damage groups, were induced by intraperitoneal injection with a single dose of CCl4 (1 mL/kg body weight) as a 1:1(v/v) solution in olive oil and were fasted for 36 h before the subsequent treatment with aqueous root bark, stem bark and leaves extracts of Vitex doniana and vitamin E as standard drug (100 mg/kg body weight per day) for 21 d, while the animals in the non induced groups were only treated with the daily oral administration of these extracts at the same dose. The administration of CCl4 was done once a week for a period of 3 weeks.Results:There was significant (P<0.05) increase in concentration of all liver marker enzymes, A total of 60 albino rats (36 induced liver damage and 24 non induced liver damage) alanine aminotransferase, aspartate aminotransferase and alkaline aminotransferase (ALT, AST and ALP) and significant (P<0.05) decrease in albumin in the CCl4 induced liver damage control when compared to the normal control. The extracts caused a significant (P<0.05) reduction in the serum activities of liver marker enzymes (ALT, AST and ALP) and a significant (P<0.05) increase in albumin of all the induced treated groups. Only stem bark extract and vitamin E significantly (P<0.05) increased total protein. All the extracts significantly (P<0.05) lowered serum creatinine whereas only root bark extract significantly (P<0.05) lowered serum level of urea in the rats with CCl4 induced liver damage.Conclusion:Hepatocurative study shows that all the plant parts (root bark, stem bark and leaves) possess significant hepatocurative properties among other therapeutic values justifying their use in folklore medicine.

  6. The usability of tree barks as long term biomonitors of atmospheric radionuclide deposition

    Energy Technology Data Exchange (ETDEWEB)

    Belivermis, Murat, E-mail: belmurat@istanbul.edu.t [Istanbul University, Faculty of Science, Department of Biology, 34134 Vezneciler, Istanbul (Turkey); Kilic, Onder, E-mail: okilic@istanbul.edu.t [Istanbul University, Faculty of Science, Department of Biology, 34134 Vezneciler, Istanbul (Turkey); Cotuk, Yavuz, E-mail: cotukyav@istanbul.edu.t [Istanbul University, Faculty of Science, Department of Biology, 34134 Vezneciler, Istanbul (Turkey); Topcuoglu, Sayhan, E-mail: sayhantopcuoglu@yahoo.co [Istanbul University, Faculty of Science, Department of Biology, 34134 Vezneciler, Istanbul (Turkey); Kalayci, Guelsah, E-mail: gulsahkalayci@yahoo.co [Istanbul University, Faculty of Science, Department of Biology, 34134 Vezneciler, Istanbul (Turkey); Pestreli, Didem, E-mail: didempestreli@hotmail.co [Istanbul University, Faculty of Science, Department of Biology, 34134 Vezneciler, Istanbul (Turkey)

    2010-12-15

    In view of the lower radionuclide activities of moss and lichen, tree barks can be used as biomonitors of radioactive contamination, regardless of the contribution of soil uptake. The present study was conducted to determine the activity concentrations of {sup 137}Cs, {sup 40}K, {sup 232}Th and {sup 238}U in the barks of pine (Pinus nigra) and oak (Quercus petraea) trees collected from the Thrace region in Turkey. By considering the previous studies carried out in the same region, it is noticed that among lichen, moss, oak bark and pine bark, oak bark is the best accumulator of {sup 137}Cs and natural radionuclides.

  7. Morphology of Betula pendula var. carelica bark at the pre-reproductive stage

    Directory of Open Access Journals (Sweden)

    Nadezhda N. Nikolaeva

    2014-04-01

    Full Text Available Changes in bark morphology at the pre-reproductive stage of Karelian birch are for the first time considered in connection with the type of trunk surface. The bark surface in Karelian birch changes with age from smooth to fissured. At the pre-reproductive stage Karelian birch has smooth bark with different types of exfoliation of the phellem surface layers, and tubercular specimens feature locally fissured bark on muffs at the very onset of their formation, as well as early rhytidome formation. Morphology of the bark tissues complex is a reflection of direction and intensity of the internal processes of the plant.

  8. Morphological and physiological adaptations of wood-boring beetle larvae in timber

    Directory of Open Access Journals (Sweden)

    Elisabetta Chiappini

    2011-08-01

    Full Text Available Beetles which develop boring tunnels inside and feed on seasoned wood present morphological and physiological adaptations related to the specific activities of their larvae in such a peculiar substrate. As far as protection of antiquarian goods made of wood is concerned, we are dealing mainly with three Coleoptera families, namely Lyctidae, Anobiidae, and Cerambycidae, which include species with wood-boring larvae. The adaptation to wood-boring and wood-feeding activities in beetle larvae was reached independently by phyletic lines not closely related, as a convergent evolution due to feeding behaviour. Among these adaptations, the following are examined with reference to the three families mentioned above. The conformation and activity of the larval mandibles and their possible correlations with the characteristics of the wood attacked are considered together with the presence of body structures for anchoring the larvae to the wood substrate inside the tunnel during the gnawing action. Intracellular endosymbiosis (endocytobiosis with yeasts or bacteria, capable of supplementing larval diets lacking in some essential nutrients, and its main features are summarized. Last, structural and functional characteristics are discussed as regards tracheal spiracles, provided with filter devices important for preventing intrusion of wood powder into tracheae from larval tunnels as well as useful for avoiding dehydration.

  9. Morphological correlates of a combat performance trait in the forked fungus beetle, Bolitotherus cornutus.

    Directory of Open Access Journals (Sweden)

    Kyle M Benowitz

    Full Text Available Combat traits are thought to have arisen due to intense male-male competition for access to females. While large and elaborate weapons used in attacking other males have often been the focus of sexual selection studies, defensive traits (both morphological and performance have received less attention. However, if defensive traits help males restrict access to females, their role in the process of sexual selection could also be important. Here we examine the morphological correlates of grip strength, a defensive combat trait involved in mate guarding, in the tenebrionid beetle Bolitotherus cornutus. We found that grip strength was repeatable and differed between the sexes. However, these differences in performance were largely explained by body size and a non-additive interaction between size and leg length that differed between males and females. Our results suggest that leg size and body size interact as part of an integrated suite of defensive combat traits.

  10. Clerodane diterpenes from bark of Croton urucurana baillon

    Energy Technology Data Exchange (ETDEWEB)

    Pizzolatti, Moacir G.; Bortoluzzi, Adailton J.; Brighente, Ines M.C.; Zuchinalli, Analice; Carvalho, Francieli K., E-mail: moacir.pizzolatti@ufsc.br [Universidade Federal de Santa Catarina (UFSC), Florianopolis, SC (Brazil). Departamento de Qumica; Candido, Ana C. S.; Peres, Marize T.L.P. [Universidade Federal do Mato Grosso do Sul (UFMS), Campo Grande, MS (Brazil). Departamento de Hidraulica e Transportes

    2013-04-15

    The new clerodane diterpene methyl 3-oxo-12-epibarbascoate was isolated from the stem barks of Croton urucurana together with the known diterpene methyl 12-epibarbascoate. The structures of these compounds were elucidated by spectroscopic techniques and comparison with the literature data. The obtainment of crystals allowed the crystallographic analysis of X-ray diffraction of diterpenes, thus confirming the proposed structures. (author)

  11. A new chromanone acid from the bark of Calophyllum dryobalanoides

    DEFF Research Database (Denmark)

    Dieu, Ly Ha; Hansen, Poul Erik; Duus, Fritz;

    2012-01-01

    A new chromanone acid, calodryobalanoic acid, along with six known compounds, apetalic acid, isoblancoic acid, lupeol, 1-hydroxy-2-methoxyxanthone, 1,7-dihydroxy-3-methoxyxanthone, and 5,7,4′-trihydroxyflavanone, was isolated from the bark of Calophyllum dryobalanoides collected in Vietnam. The s...

  12. Ellagitannins and complex tannins from Quercus petraea bark.

    Science.gov (United States)

    König, M; Scholz, E; Hartmann, R; Lehmann, W; Rimpler, H

    1994-10-01

    The ellagitannins 2,3-(S)-hexahydroxydiphenoyl-glucose, pedunculagin, vescalagin, and castalagin; the flavanoellagitannins acutissimin A, acutissimin B, eugenigrandin A, guajavin B, and stenophyllanin C; and the procyanidinoellagitannin mongolicanin have been isolated from the bark of Quercus petraea. The ellagitannin fraction had a weak antisecretory effect. PMID:7807126

  13. New Diarylheptanoid from the Barks of Alnus japonica Steudel

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    A new diarylheptanoid glycoside, 1,7-bis-(3,4-dihydroxyphenyl)-5-hydroxyheptane-3-O-β-D-xylopyranoside (1), together with nine known diarylheptanoids (2-10) were isolated from the fresh bark of Alnus japonica which is a species of the genus Alnus species, growing throughout Korea.

  14. Cytotoxic Coumarins from the Bark of Mammea siamensis

    DEFF Research Database (Denmark)

    Ngo, Ngoc Trang Nhu; Nguyen, Vy Thuy; Vo, Hoa Van;

    2010-01-01

    A new geranylated coumarin, (E)-4-(1-hydroxypropyl)-5,7-dihydroxy-6-(3,7-dimethyl-2,6-octadienyl)-8-(3-methyl-1-oxobutyl)coumarin (named surangin D), was isolated from the bark of Mammea siamensis collected in Vietnam, along with four known coumarins, surangins B and C, and theraphins B and C, an...

  15. Nitrogen Availability in Fresh and Aged Douglas Fir Bark

    Science.gov (United States)

    The objective of this study was to determine if there are growth differences in geranium (Pelargonium ×hortorum Bailey 'Maverick Red') produced in either fresh or aged Douglas fir [Pseudotsuga menziesii (Mirbel) Franco] bark (DFB). A second objective was to document nitrogen immobilization and deco...

  16. [Removing the bark from the cinnamon cane] 790

    OpenAIRE

    W L H Skeen and Co

    2003-01-01

    279 x 211 mm. Showing four men seated in a row on the ground in front of a bungalow, with piles of cinnamon beside them from which they are stripping the bark. Annotated '790' on bottom left hand corner of the photograph. Date approximate.

  17. A new diterpenoid from the stem bark of Populus davidiana

    Institute of Scientific and Technical Information of China (English)

    Xin Feng Zhang; Xiang Li; Byung Sun Min; Ki Hwan Bae

    2008-01-01

    A new diterpenoid, named populusol A (1), was isolated from the methanolic extraction of the stem bark of Populus davidiana. The structure was elucidated on the basis of extensive 1D and 2D NMR as well as HRFAB-MS spectroscopic analysis.

  18. Ellagitannins and complex tannins from Quercus petraea bark.

    Science.gov (United States)

    König, M; Scholz, E; Hartmann, R; Lehmann, W; Rimpler, H

    1994-10-01

    The ellagitannins 2,3-(S)-hexahydroxydiphenoyl-glucose, pedunculagin, vescalagin, and castalagin; the flavanoellagitannins acutissimin A, acutissimin B, eugenigrandin A, guajavin B, and stenophyllanin C; and the procyanidinoellagitannin mongolicanin have been isolated from the bark of Quercus petraea. The ellagitannin fraction had a weak antisecretory effect.

  19. Formulating entompathogens for control of boring beetles in avocado orchards

    Science.gov (United States)

    A foam formulation of Beauveria bassiana was adapted to control boring beetles in avocado orchards. The two geographically independent avocado growing areas in the United States are threatened by emerging diseases vectored by boring beetles. In the California growing region, Fusarium dieback is vect...

  20. Efficacy of plant extracts against the cowpea beetle, Callosobruchus maculatus

    NARCIS (Netherlands)

    Boeke, S.J.; Barnaud, B.; Loon, van J.J.A.; Kossou, D.K.; Huis, van A.; Dicke, M.

    2004-01-01

    Traditionally used African plant powders, with a known effect against the cowpea beetle Callosobruchus maculatus in stored cowpea, were extracted with water. The extracts, 13 volatile oils, 2 non-volatile oils and 8 slurries, were evaluated for their toxic and repellent effects against the beetle. A

  1. Changes in food resources and conservation of scarab beetles

    DEFF Research Database (Denmark)

    Carpaneto, Giuseppe Maria; Mazziotta, Adriano; Piattella, Emanuele

    2005-01-01

    The aim of the research was to show how a change in land use influences the structure of a dung beetle assemblage and affect its conservation. In the Pineto Urban Regional Park (Rome), dog dung is the sole food resource currently available for scarab dung beetles, after the recent removal of wild...

  2. The use of tree bark as long term biomonitor of (137)Cs deposition.

    Science.gov (United States)

    Cosma, Constantin; Iurian, Andra-Rada; Incze, Reka; Kovacs, Tibor; Žunić, Zora S

    2016-03-01

    Airborne (137)Cs originated from the nuclear tests in the atmosphere and from the Chernobyl nuclear disaster was retained by the trees biomass and nowadays it can still be found in various concentrations in tree barks from Romania and other European countries. This study brings the first results of (137)Cs presence in tree bark from Romania on different considerations: (i) data dispersion in spruce and oak bark from NW, SW and central Romania, and the spatial variability of (137)Cs within oak and spruce bark from a natural protected forest area from Balvanyos area (Covasna County), known to be highly affected by the Chernobyl nuclear release; (ii) comparison of (137)Cs content in different tree bark species (oak, spruce, poplar and cherry); (iii) differences in (137)Cs concentrations with the bark depth layers and around the tree trunk; and (iv) comparison of mean (137)Cs values in spruce/oak bark from Romania with data from other European countries. PMID:26771244

  3. Structure of Phoretic Mite Assemblages Across Subcortical Beetle Species at a Regional Scale.

    Science.gov (United States)

    Pfammatter, Jesse A; Coyle, David R; Gandhi, Kamal J K; Hernandez, Natalie; Hofstetter, Richard W; Moser, John C; Raffa, Kenneth F

    2016-02-01

    Mites associated with subcortical beetles feed and reproduce within habitats transformed by tree-killing herbivores. Mites lack the ability to independently disperse among these habitats, and thus have evolved characteristics that facilitate using insects as transport between resources. Studies on associations between mites and beetles have historically been beetle-centric, where an assemblage of mite species is characterized on a single beetle species. However, available evidence suggests there may be substantial overlap among mite species on various species of beetles utilizing similar host trees. We assessed the mite communities of multiple beetle species attracted to baited funnel traps in Pinus stands in southern Wisconsin, northern Arizona, and northern Georgia to better characterize mite dispersal and the formation of mite-beetle phoretic associations at multiple scales. We identified approximately 21 mite species totaling 10,575 individuals on 36 beetle species totaling 983 beetles. Of the mites collected, 97% were represented by eight species. Many species of mites were common across beetle species, likely owing to these beetles' common association with trees in the genus Pinus. Most mite species were found on at least three beetle species. Histiostoma spp., Iponemus confusus Lindquist, Histiogaster arborsignis Woodring and Trichouropoda australis Hirschmann were each found on at least seven species of beetles. While beetles had largely similar mite membership, the abundances of individual mite species were highly variable among beetle species within each sampling region. Phoretic mite communities also varied within beetle species between regions, notably for Ips pini (Say) and Ips grandicollis (Eichhoff). PMID:26496952

  4. Hit-and-run trophallaxis of small hive beetles.

    Science.gov (United States)

    Neumann, Peter; Naef, Jan; Crailsheim, Karl; Crewe, Robin M; Pirk, Christian W W

    2015-12-01

    Some parasites of social insects are able to exploit the exchange of food between nestmates via trophallaxis, because they are chemically disguised as nestmates. However, a few parasites succeed in trophallactic solicitation although they are attacked by workers. The underlying mechanisms are not well understood. The small hive beetle (=SHB), Aethina tumida, is such a parasite of honey bee, Apis mellifera, colonies and is able to induce trophallaxis. Here, we investigate whether SHB trophallactic solicitation is innate and affected by sex and experience. We quantified characteristics of the trophallactic solicitation in SHBs from laboratory-reared individuals that were either bee-naïve or had 5 days experience. The data clearly show that SHB trophallactic solicitation is innate and further suggest that it can be influenced by both experience and sex. Inexperienced SHB males begged more often than any of the other groups had longer breaks than their experienced counterparts and a longer soliciting duration than both experienced SHB males and females, suggesting that they start rather slowly and gain more from experience. Successful experienced females and males were not significantly different from each other in relation to successful trophallactic interactions, but had a significantly shorter soliciting duration compared to all other groups, except successful inexperienced females. Trophallactic solicitation success, feeding duration and begging duration were not significantly affected by either SHB sex or experience, supporting the notion that these behaviors are important for survival in host colonies. Overall, success seems to be governed by quality rather than quantity of interactions, thereby probably limiting both SHB energy investment and chance of injury (<1%). Trophallactic solicitation by SHBs is a singular example for an alternative strategy to exploit insect societies without requiring chemical disguise. Hit-and-run trophallaxis is an attractive test

  5. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  6. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    reflected in the journalistic practices. The described norms form a coherent pattern if safeguarding the existing democracy and the general public is considered to be the main purpose. A coverage based on this pattern of norms can be compared to other forms of crisis management following attacks because...

  7. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  8. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  9. [Polygraphy of a panic attack].

    Science.gov (United States)

    Noffke, H U; Roser, M

    2001-09-01

    We studied a 24-year old female patient with Type 1 diabetes mellitus suffering for 4 weeks from a major depressive episode combined with panic disorder without agoraphobia. A spontaneous panic attack was serendipitously recorded by polygraph while the subject was at rest. Electrocardiogram, finger blood-flow, respiratory rhythm and muscle tone (forearm, forehead) were recorded. A triphasic course consisting of a "dynamic phase" (appr. 80 s) preceded by a discrete "initial phase" (appr. 140 s) and a "declining phase" (appr. 180 s) was observed. The dynamic phase is characterized by an acute increase of fingertip vasoconstriction and heart rate. The patient was not aware of the panic attack before the dynamic phase. The recognisable central regulation confirms previously published findings indicating a sympathetic-norepinephrine activation at the beginning of the panic attack without activating the musculoskeletal system. Furthermore, a paradoxical phenomenon involving heart and respiratory rate was observed before the onset of anxiety, i.e. an increase of the heart rate and a simultaneous decline of the respiratory rate, suggesting a non-antagonistic regulation of the ergotropic-trophotropic system. The autonomic state of the patient points to a lability in homeostasis from which panic attacks as a form of CNS response could develop. PMID:11572106

  10. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  11. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  12. Target-site resistance to pyrethroid insecticides in German populations of the cabbage stem flea beetle, Psylliodes chrysocephala L. (Coleoptera: Chrysomelidae).

    Science.gov (United States)

    Zimmer, Christoph T; Müller, Andreas; Heimbach, Udo; Nauen, Ralf

    2014-01-01

    Cabbage stem flea beetle, Psylliodes chrysocephala L. (Coleoptera: Chrysomelidae) is a major pest of winter oilseed rape in several European countries particularly attacking young emerging plants in autumn. Over the last several decades, pyrethroid insecticides have been foliarly applied to control flea beetle outbreaks. Recent control failures in northern Germany suggested pyrethroid resistance development in cabbage stem flea beetles, which were confirmed by resistance monitoring bioassays using lambda-cyhalothrin in an adult vial test. The purpose of this study was to investigate the presence of polymorphisms in the para-type voltage-gated sodium channel gene of P. chrysocephala known to be involved in knock-down resistance (kdr). By using a degenerate primer approach we PCR amplified part of the para-type sodium channel gene and identified in resistant flea beetles a single nucleotide polymorphism resulting in an L1014F (kdr) mutation within domain IIS6 of the channel protein, known as one of the chief pyrethroid target-site resistance mechanisms in several other pest insects. Twenty populations including four archived museum samples collected between 1945 and 1958 were analyzed using a newly developed pyrosequencing diagnostic assay. The assay revealed a kdr allele frequency of 90-100% in those flea beetle populations expressing high-level cross-resistance in discriminating dose bioassays against different pyrethroids such as lambda-cyhalothrin, tau-fluvalinate, etofenprox and bifenthrin. The presence of target-site resistance to pyrethroids in cabbage stem flea beetle is extremely worrying considering the lack of effective alternative modes of action to control this pest in Germany and other European countries, and is likely to result in major control problems once it expands to other geographies. The striking fact that cabbage stem flea beetle is next to pollen beetle, Meligethes aeneus the second coleopteran pest in European winter oilseed rape resisting

  13. Functional morphology and adhesive performance of the stick-capture apparatus of the rove beetles Stenus spp. (Coleoptera, Staphylinidae).

    Science.gov (United States)

    Koerner, Lars; Gorb, Stanislav N; Betz, Oliver

    2012-04-01

    The adhesive prey-capture apparatus of the representatives of the rove beetle genus Stenus (Coleoptera, Staphylinidae) is an outstanding example of biological adhesive systems. This unique prey-capture device is used for catching elusive prey by combining (i) hierarchically structured adhesive outgrowths, (ii) an adhesive secretion, and (iii) a network of cuticular fibres within the pad. The outgrowths arise from a pad-like cuticle and are completely immersed within the secretion. To date, the forces generated during the predatory strike of these beetles have only been estimated theoretically. In the present study, we used force transducers to measure both the compressive and adhesive forces during the predatory strike of two Stenus species. The experiments revealed that the compressive forces are low, ranging from 0.10 mN (Stenus bimaculatus) to 0.18 mN (Stenus juno), whereas the corresponding adhesive forces attain up to 1.0 mN in S. juno and 1.08 mN in S. bimaculatus. The tenacity or adhesive strength (adhesive force per apparent unit area) amounts to 51.9 kPa (S. bimaculatus) and 69.7 kPa (S. juno). S. juno beetles possess significantly smaller pad surface areas than S. bimaculatus but seem to compensate for this disadvantage by generating higher compressive forces. Consequently, S. juno beetles reach almost identical adhesive properties and an equal prey-capture success in attacks on larger prey. The possible functions of the various parts of the adhesive system during the adhesive prey-capture process are discussed in detail.

  14. Intra-Annual Variation in Responses by Flying Southern Pine Beetles (Coleoptera: Curculionidae: Scolytinae) to Pheromone Component endo-Brevicomin.

    Science.gov (United States)

    Sullivan, Brian T; Brownie, Cavell; Barrett, JoAnne P

    2016-08-01

    The southern pine beetle Dendroctonus frontalis Zimmermann (Coleoptera: Curculionidae: Scolytinae) is attracted to an aggregation pheromone that includes the multifunctional pheromone component endo-brevicomin. The effect of endo-brevicomin on attractive lures varies from strong enhancement to reduction of beetle attraction depending upon release rate, lure component spacing, and proximity of beetle infestations. Anecdotal observations have further suggested that the effects of endo-brevicomin vary during the year. We investigated this possibility under nonoutbreak conditions in southwestern Mississippi where for two-and-a-half years we monitored traps baited with frontalin and the host odor alpha-pinene either (a) alone, or with an endo-brevicomin release device either (b) located directly on the trap, or (c) displaced 6 m away. The endo-brevicomin devices in our tests increased D. frontalis catches during all times of year, and 6 m displacement of the endo-brevicomin release device from the trap did not significantly alter responses except during the spring flight peak when displacement increased catches. Our data suggest that flying D. frontalis have a stronger tendency to avoid the immediate proximity of a release point of endo-brevicomin during their springtime dispersal flight when catches are greatest. Catches of Thanasimus dubius (F.) (Coleoptera: Cleridae), a major predator of D. frontalis, were not altered by endo-brevicomin, and ratios of D. frontalis to T. dubius changed over the course of the year. We discuss the possible effects of intra-annual variation in D. frontalis response to endo-brevicomin both on beetle attack behavior and use of endo-brevicomin as a lure adjuvant in D. frontalis population monitoring.

  15. Curcurbita pepo subspecies delineates striped cucumber beetle (Acalymma vittatum) preference

    Science.gov (United States)

    Brzozowski, L; Leckie, B M; Gardner, J; Hoffmann, M P; Mazourek, M

    2016-01-01

    The striped cucumber beetle (Acalymma vittatum (F.)) is a destructive pest of cucurbit crops, and management could be improved by host plant resistance, especially in organic farming systems. However, despite the variation in striped cucumber beetle preference observed within the economically important species, Cucurbita pepo L., plant breeders and entomologists lacked a simple framework to classify and exploit these differences. This study used recent phylogenetic evidence and bioassays to organize striped cucumber beetle preference within C. pepo. Our results indicate preference contrasts between the two agriculturally relevant subspecies: C. pepo subsp. texana and C. pepo subsp. pepo. Plants of C. pepo subsp. pepo were more strongly preferred than C. pepo subsp. texana plants. This structure of beetle preference in C. pepo will allow plant breeders and entomologists to better focus research efforts on host plant non-preference to control striped cucumber beetles. PMID:27347423

  16. Bark ecology of twigs vs. main stems: functional traits across eighty-five species of angiosperms.

    Science.gov (United States)

    Rosell, Julieta A; Castorena, Matiss; Laws, Claire A; Westoby, Mark

    2015-08-01

    Although produced by meristems that are continuous along the stem length, marked differences in bark morphology and in microenvironment would suggest that main stem and twig bark might differ ecologically. Here, we examined: (1) how closely associated main stem and twig bark traits were, (2) how these associations varied across sites, and (3) used these associations to infer functional and ecological differences between twig and main stem bark. We measured density, water content, photosynthesis presence/absence, total, outer, inner, and relative thicknesses of main stem and twig bark from 85 species of angiosperms from six sites of contrasting precipitation, temperature, and fire regimes. Density and water content did not differ between main stems and twigs across species and sites. Species with thicker twig bark had disproportionately thicker main stem bark in most sites, but the slope and degree of association varied. Disproportionately thicker main stem bark for a given twig bark thickness in most fire-prone sites suggested stem protection near the ground. The savanna had the opposite trend, suggesting that selection also favors twig protection in these fire-prone habitats. A weak main stem-twig bark thickness association was observed in non fire-prone sites. The near-ubiquity of photosynthesis in twigs highlighted its likely ecological importance; variation in this activity was predicted by outer bark thickness in main stems. It seems that the ecology of twig bark can be generalized to main stem bark, but not for functions depending on the amount of bark, such as protection, storage, or photosynthesis.

  17. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  18. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  19. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  20. Spruce Beetle Biology, Ecology and Management in the Rocky Mountains: An Addendum to Spruce Beetle in the Rockies

    Directory of Open Access Journals (Sweden)

    Michael J. Jenkins

    2014-01-01

    Full Text Available Spruce beetle outbreaks have been reported in the Rocky Mountains of western North America since the late 1800s. In their classic paper, Spruce Beetle in the Rockies, Schmid and Frye reviewed the literature that emerged from the extensive outbreaks in Colorado in the 1940s. A new wave of outbreaks has affected Rocky Mountain subalpine spruce-fir forests beginning in the mid-1980s and continuing to the present. These outbreaks have spurred another surge of basic and applied research in the biology, ecology and management of spruce and spruce beetle populations. This paper is a review of literature on spruce beetle focusing on work published since the late 1970s and is intended as an addendum to Spruce Beetle in the Rockies.

  1. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  2. Hylotrupes bajulus (L. (Col., Cerambycidae: nutrition and attacked material

    Directory of Open Access Journals (Sweden)

    Chiappini, E

    2010-09-01

    Full Text Available Hylotrupes bajulus, attacks softwood utilising the cellulose contained in wood walls as food. The fibre is digested in variable percentages, depending on the type of analysis, 20 to 48% and, according to some authors, without the assistance of intestinal symbiotic microorganisms. Furthermore, there is published work referring to Hylotrupes, concluding that "starch” … “plays no role in the nutrition of the larvae". Nevertheless, considering that attacks of this species decrease with wood seasoning increasing and having been demonstrated, and that “lignin degradation products of spruce wood do not influence larvae development”, it is possible to suppose that cell walls alone are not sufficient to feed this wood boring species. Furthermore, Hylotrupes larvae have chisel shaped mandibles, similar to those of powder post beetle larvae that feed on starch and need to pulverise the wood to access the cellular content. Preliminary research suggests an utilization of wood fibre as well as of starch by larvae of H. bajulus. Therefore, the purpose of this research is to test the degree of digestion of wood fibre from different sources (sapwood or heartwood and the possible role of symbiotic microorganisms. Larvae of H. bajulus were grown on synthetic diets made of purified wood fibre and/or starch as main components supplied with mineral and vitamin. Substrates and frass were analysed for fibre fractions, starch and acid insoluble ash, the latter used as an indigestible marker. Larvae purified DNA was analysed by means of metagenomics approaches carried out by direct retrieval and analysis of 16S rRNA gene sequences free of cultural bias in order to discover the bacterial diversity from larva alimentary channel alone. Larvae of H. bajulus seem be able to digest either fibre or starch, and a role for symbiotic bacteria is supposed.

  3. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  4. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  5. Fat May Not Hike Heart Attack Risk

    Science.gov (United States)

    ... news/fullstory_160179.html Fat May Not Hike Heart Attack Risk: Study But it does raise diabetes risk, ... that obesity may not increase the risk of heart attack or premature death. Their study of identical twins ...

  6. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  7. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  8. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  9. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  10. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...

  11. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  12. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  13. Coyote Attacks: An Increasing Suburban Problem

    OpenAIRE

    Timm, Robert M.; Baker, Rex O.; Bennett, Joe R.; Coolahan, Craig C.

    2004-01-01

    Coyote attacks on humans and pets have increased within the past 5 years in California. We discuss documented occurrences of coyote aggression and attacks on people, using data from USDA Wildlife Services, the California Department of Fish & Game, and other sources. Forty-eight such attacks on children and adults were verified from 1998 through 2003, compared to 41 attacks during the period 1988 through 1997; most incidents occurred in Southern California near the suburban-wildland interfac...

  14. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  15. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  16. Origin and Diversification of Dung Beetles in Madagascar

    DEFF Research Database (Denmark)

    Miraldo, Andreia; Wirta, Helena; Hanski, Ilkka

    2011-01-01

    Madagascar has a rich fauna of dung beetles (Scarabaeinae and Aphodiinae) withalmost 300 species described to date. Like most other taxa in Madagascar, dung beetles exhibit an exceptionally high level of endemism (96% of the species). Here,we review the current knowledge of the origin and diversi......Madagascar has a rich fauna of dung beetles (Scarabaeinae and Aphodiinae) withalmost 300 species described to date. Like most other taxa in Madagascar, dung beetles exhibit an exceptionally high level of endemism (96% of the species). Here,we review the current knowledge of the origin...... and diversification of Malagasy dung beetles. Based on molecular phylogenies, the extant dung beetles originate from eight colonizations, of which four have given rise to extensive radiations. These radiations have occurred in wet forests, while the few extant species in the less successfulradiations occur in open...... and semi-open habitats. We discuss the likely mechanisms of speciation and the ecological characteristics of the extant communities, emphasizing the role of adaptation along environmental gradients and allopatric speciation in generating the exceptionally high beta diversity in Malagasy dung beetles...

  17. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  18. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  19. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Stroke More Understand Your Risks to Prevent a Heart Attack Updated:Aug 2,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  20. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  1. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  2. Phylogeny of world stag beetles (Coleoptera: Lucanidae) reveals a Gondwanan origin of Darwin's stag beetle.

    Science.gov (United States)

    Kim, Sang Il; Farrell, Brian D

    2015-05-01

    Stag beetles (family Lucanidae Latreille, 1804) are one of the earliest branching lineages of scarab beetles that are characterized by the striking development of the male mandibles. Despite stag beetles' popularity among traditional taxonomists and amateur collectors, there has been almost no study of lucanid relationships and evolution. Entomologists, including Jeannel (1942), have long recognized resemblance between the austral stag beetles of the tribes Chiasognathini, Colophonini, Lamprimini, Pholidotini, Rhyssonotini, and Streptocerini, but this hypothesis of their close relationship across the continents has never been tested. To gain further insight into lucanid phylogeny and biogeography, we reconstructed the first molecular phylogeny of world stag beetles using DNA sequences from mitochondrial 16S rDNA, nuclear 18S and 28S rDNA, and the nuclear protein-coding (NPC) gene wingless for 93 lucanid species representing all extant subfamilies and 24 out of the 27 tribes, together with 14 representative samples of other early branching scarabaeoid families and two staphyliniform beetle families as outgroups. Both Bayesian inference (BI) and maximum likelihood inference (MLI) strongly supported the monophyly of Lucanidae sensu lato that includes Diphyllostomatidae. Within Lucanidae sensu stricto, the subfamilies Lucaninae and Lampriminae appeared monophyletic under both methods of phylogenetic inferences; however, Aesalinae and Syndesinae were found to be polyphyletic. A time-calibrated phylogeny based on five fossil data estimated the origin of crown group Lucanidae as circa 160 million years ago (MYA). Divergence between the Neotropical and Australasian groups of the Chiasognathini was estimated to be circa 47MYA, with the South African Colophonini branching off from the ancient Chiasognathini lineage around 87MYA. Another Gondwanan relationship was recovered between the Australasian Eucarteria and the Neotropical Casignetus, which diverged circa 58MYA. Lastly

  3. The impact of an invasive ambrosia beetle on the riparian habitats of the Tijuana River Valley, California

    Science.gov (United States)

    2016-01-01

    The Tijuana River Valley is the first natural habitat in California to be substantially invaded by the Kuroshio Shot Hole Borer (KSHB, Euwallacea sp.), an ambrosia beetle native to Southeast Asia. This paper documents the distribution of the KSHB in the riparian vegetation in the valley and assesses the damage done to the vegetation as of early 2016, approximately six months after the beetle was first observed in the valley. I divided the riparian habitats into 29 survey units so that the vegetation within each unit was relatively homogenous in terms of plant species composition, age and density. From a random point within each unit, I examined approximately 60 individuals of the dominant plant species for evidence of KSHB infestation and evidence of major damage such as limb breakage. In the 22 forested units,I examined the dominant arroyo and black willows (Salix lasiolepis Benth. and S. gooddingii C.R. Ball), and in the seven scrub units, I examined mule fat (Baccharis salicifolia (Ruiz & Pav.) Pers.). Evidence of KSHB infestation was found in 25 of the 29 units. In the forest units, infestation rates ranged from 0 to 100% and were high (>60%) in 16 of the units. In the scrub units, infestation rates ranged from 0 to 33%. Infestation rates were significantly correlated with the wetness of a unit; wetter units had higher infestation rates. Evidence of major physical damage was found in 24 units, and dense stands of willows were reduced to broken trunks in several areas. Overall, I estimated that more than 280,000 (70%) of the willows in the valley were infested, and more than 140,000 had suffered major limb damage. In addition, I recorded evidence of KSHB infestation in the other common plant species in the valley; of the 23 species examined, 14 showed evidence of beetle attack. The four species with the highest rates of infestation were native trees in the Salicaceae family. The three species considered to be the worst invasive plants in the valley, Ricinus

  4. Understanding Boswellia papyrifera tree secondary metabolites through bark spectral analysis

    Science.gov (United States)

    Girma, Atkilt; Skidmore, Andrew K.; de Bie, C. A. J. M.; Bongers, Frans

    2015-07-01

    Decision makers are concerned whether to tap or rest Boswellia Papyrifera trees. Tapping for the production of frankincense is known to deplete carbon reserves from the tree leading to production of less viable seeds, tree carbon starvation and ultimately tree mortality. Decision makers use traditional experience without considering the amount of metabolites stored or depleted from the stem-bark of the tree. This research was designed to come up with a non-destructive B. papyrifera tree metabolite estimation technique relevant for management using spectroscopy. The concentration of biochemicals (metabolites) found in the tree bark was estimated through spectral analysis. Initially, a random sample of 33 trees was selected, the spectra of bark measured with an Analytical Spectral Device (ASD) spectrometer. Bark samples were air dried and ground. Then, 10 g of sample was soaked in Petroleum ether to extract crude metabolites. Further chemical analysis was conducted to quantify and isolate pure metabolite compounds such as incensole acetate and boswellic acid. The crude metabolites, which relate to frankincense produce, were compared to plant properties (such as diameter and crown area) and reflectance spectra of the bark. Moreover, the extract was compared to the ASD spectra using partial least square regression technique (PLSR) and continuum removed spectral analysis. The continuum removed spectral analysis were performed, on two wavelength regions (1275-1663 and 1836-2217) identified through PLSR, using absorption features such as band depth, area, position, asymmetry and the width to characterize and find relationship with the bark extracts. The results show that tree properties such as diameter at breast height (DBH) and the crown area of untapped and healthy trees were strongly correlated to the amount of stored crude metabolites. In addition, the PLSR technique applied to the first derivative transformation of the reflectance spectrum was found to estimate the

  5. Anti-inflammatory activity of Syzygium cumini bark.

    Science.gov (United States)

    Muruganandan, S; Srinivasan, K; Chandra, S; Tandan, S K; Lal, J; Raviprakash, V

    2001-05-01

    The ethanolic extract of the bark of Syzygium cumini was investigated for its anti-inflammatory activity in animal models. The extract did not show any sign of toxicity up to a dose of 10.125 g/kg, p.o. in mice. Significant anti-inflammatory activity was observed in carrageenin (acute), kaolin-carrageenin (subacute), formaldehyde (subacute)-induced paw oedema and cotton pellet granuloma (chronic) tests in rats. The extract did not induce any gastric lesion in both acute and chronic ulcerogenic tests in rats. Thus, the present study demonstrated that S. cumini bark extract has a potent anti-inflammatory action against different phases of inflammation without any side effect on gastric mucosa. PMID:11395258

  6. Photonic nanoarchitectures of biologic origin in butterflies and beetles

    Energy Technology Data Exchange (ETDEWEB)

    Biro, L.P., E-mail: biro@mfa.kfki.h [Research Institute for Technical Physics and Materials Science, H-1525 Budapest, POB 49 (Hungary)

    2010-05-25

    Photonic nanoarchitectures occurring in butterflies and beetles, which produce structural color in the visible range of the electromagnetic spectrum by the selective reflection of light, are investigated under the aspect of being used as possible 'blueprints' for artificial, bioinspired nanoarchitectures. The role of order and disorder and of regularity/irregularity in photonic nanoarchitectures of biologic origin is discussed. Three recent case studies are briefly reviewed for butterflies (Albulina metallica, Cyanophrys remus, Troides magellanus) and three for beetles (Hoeplia coerulea, Chrysochroa vittata, Charidotella egregia). The practical realization of bioinspired artificial structures is discussed for the A. metallica butterfly and for the C. vittata beetle.

  7. Atlas of Iberian water beetles (ESACIB database).

    Science.gov (United States)

    Sánchez-Fernández, David; Millán, Andrés; Abellán, Pedro; Picazo, Félix; Carbonell, José A; Ribera, Ignacio

    2015-01-01

    The ESACIB ('EScarabajos ACuáticos IBéricos') database is provided, including all available distributional data of Iberian and Balearic water beetles from the literature up to 2013, as well as from museum and private collections, PhD theses, and other unpublished sources. The database contains 62,015 records with associated geographic data (10×10 km UTM squares) for 488 species and subspecies of water beetles, 120 of them endemic to the Iberian Peninsula and eight to the Balearic Islands. This database was used for the elaboration of the "Atlas de los Coleópteros Acuáticos de España Peninsular". In this dataset data of 15 additional species has been added: 11 that occur in the Balearic Islands or mainland Portugal but not in peninsular Spain and an other four with mainly terrestrial habits within the genus Helophorus (for taxonomic coherence). The complete dataset is provided in Darwin Core Archive format. PMID:26448717

  8. Phenolic glycosides from sugar maple (Acer saccharum) bark.

    Science.gov (United States)

    Yuan, Tao; Wan, Chunpeng; González-Sarrías, Antonio; Kandhi, Vamsikrishna; Cech, Nadja B; Seeram, Navindra P

    2011-11-28

    Four new phenolic glycosides, saccharumosides A-D (1-4), along with eight known phenolic glycosides, were isolated from the bark of sugar maple (Acer saccharum). The structures of 1-4 were elucidated on the basis of spectroscopic data analysis. All compounds isolated were evaluated for cytotoxicity effects against human colon tumorigenic (HCT-116 and Caco-2) and nontumorigenic (CCD-18Co) cell lines. PMID:22032697

  9. Singular Fibers in Barking Families of Degenerations of Elliptic Curves

    CERN Document Server

    Okuda, Takayuki

    2012-01-01

    Takamura established a theory on splitting families of degenerations of complex curves. He introduced a powerful method for constructing a splitting family, called a barking family, in which there appear not only a singular fiber over the origin but also singular fibers over other points, called subordinate fibers. In this paper, for the case of degenerations of elliptic curves, we determine the types of these subordinate fibers.

  10. PHYTOCHEMICAL INVESTIGATION OF THE STEM BARK OF MORINGA OLEIFERA LAM.

    Directory of Open Access Journals (Sweden)

    Khan Maria

    2011-05-01

    Full Text Available Phytochemical investigation of the stem bark of Moringa oleifera Lam. (Moringaceae furnished two new phytoconstituents identified as n-heptacosanyl n-octadec-9,12,15 trieneoate (moringyl linoleneate and n- docas- 4-en-11-one-1-yl n-decanoate (oleiferyl capriate along with the known compounds β-sitosterol, epilupeol, glyceropalmityl phosphate and glycerol-oleiostearyl phosphate. The structures of all the phytoconstituents have been elucidated on the basis of spectral data analyses and chemical reactions.

  11. Pharmaceutical and nutraceutical effects of Pinus pinaster bark extract

    OpenAIRE

    Iravani, S.; Zolfaghari, B.

    2011-01-01

    In everyday life, our body generates free radicals and other reactive oxygen species which are derived either from the endogenous metabolic processes (within the body) or from external sources. Many clinical and pharmacological studies suggest that natural antioxidants can prevent oxidative damage. Among the natural antioxidant products, Pycnogenol® (French Pinus pinaster bark extract) has been received considerable attention because of its strong free radical-scavenging activity against reac...

  12. New sucrose derivatives from the bark of Securidaca longipedunculata.

    Science.gov (United States)

    De Tommasi, N; Piacente, S; De Simone, F; Pizza, C

    1993-01-01

    Two new bitter principles were isolated from the bark of Securidaca longipedunculata (Polygalaceae) and identified as beta-D-(3,4-disinapoyl)fructofuranosyl-alpha-D-(6-sinapoyl)g lucopyranoside and beta-D-(3-sinapoyl)fructofuranosyl-alpha-D-(6-sinapoyl)gluco pyranoside. The structures were elucidated by a combination of 1H nmr (1D, 2D COSY, 2D HOHAHA), 13C-nmr, and fabms spectra. PMID:8450315

  13. Three new compounds from the stem bark of Juglans mandshurica.

    Science.gov (United States)

    Lin, Hua; Zhang, Yu-Wei; Hua, Ying; Bao, Yong-Li; Wu, Yin; Sun, Lu-Guo; Yu, Chun-Lei; Huang, Yan-Xin; Wang, En-Bo; Jiang, Hong-Yu; Li, Yu-Xin

    2014-01-01

    Three new compounds, 3,6-dihydroxy-4,5-dimethoxy-1,8-naphalic anhydride (1), 3,4,5,6-tetrahydroxy-1,8-naphalic anhydride (2), and methyl (7E,9E)-6,11-dioxononadeca-7,9-dienoate (3), were isolated from the stem bark of Juglans mandshurica. Their structures were elucidated on the basis of spectroscopic evidence, including 1D and 2D NMR, HR-TOF-MS, and by comparison with the literature data.

  14. Acoustic cues to identity and predator context in meerkat barks

    OpenAIRE

    Townsend, Simon; Charlton, Benjamin; Manser, Marta B.

    2014-01-01

    Formants, the resonance frequencies of the vocal tract, are the key acoustic parameters underlying vowel identity in human speech. However, recent work on nonhuman animal communication systems has shown that formant variation provides potentially important information to receivers about static and dynamic attributes of callers. Meerkats, Suricata suricatta, produce broadband noisy bark vocalisations, lacking a clear fundamental frequency and harmonic structure, when they detect aerial or terr...

  15. A New Phenolic Glycoside from the Barks of Cinnamomum cassia

    OpenAIRE

    Junfen Zeng; Yongbo Xue; Yongji Lai; Guangmin Yao; Zengwei Luo; Yonghui Zhang; Jinwen Zhang

    2014-01-01

    A new phenolic glycoside (1), named methyl 2-phenylpropanoate-2-O-β-D-apiofuranosyl-(1→6)-O-β-D–glucopyranoside, was isolated from the barks of Cinnamomum cassia, along with three known phenolic glycosides and four known lignan glycosides. The structure of 1 was elucidated by extensive interpretation of spectroscopic data and chemical method. Selected compounds were evaluated for their immunosuppressive activities against murine lymphocytes. Compounds 1, 2, 6 and 8 exhibited differential inhi...

  16. Bioactive constituents of the bark of Parkia biglobosa.

    Science.gov (United States)

    Tringali, C; Spatafora, C; Longo, O D

    2000-04-01

    In the frame of a systematic analysis of African plants used for the 'cure salée', from the bark of Parkia biglobosa, a long-chain ester of trans-ferulic acid (1) has been isolated together with an unseparable mixture of long-chain cis-ferulates (2a-e). In addition, lupeol, 4-O-methyl-epi-gallocatechin, epi-gallocatechin, epi-catechin 3-O-gallate, and epi-gallocatechin 3-O-gallate were isolated.

  17. HYPOGLYCEMIC EFFECT OF ACETONE EXTRACT OF TERMINALIA ARJUNA ROXB. BARK ON TYPE-2 DIABETIC ALBINO RATS

    Directory of Open Access Journals (Sweden)

    SHAMSHUN NEHAR

    2013-01-01

    Full Text Available In the present study, hypoglycemic effects of Terminalia arjuna bark extract were seen in high fructose (21%followed by streptozotocin (40mg/kg BW induced type-2 diabetic male albino rats. In vivo study showedprotective effect of T. arjuna bark acetone extract of towards blood glucose, serum urea, serum createnine, SGOT,SGPT, oral glucose tolerance (OGTT, urine sugar and urine ketone bodies in diabetic rats. Feeding 500 mg/kgBW arjuna bark extract to rats showed better effect for blood and urine parameters as compared to rats fed with250 mg/kg BW arjuna bark extract. The effect of feeding 500 mg/kg BW arjuna bark extract was found to bealmost equal to that of with glimepiride fed diabetic rats. The result indicated that Terminalia arjuna bark acetoneextract of have antidiabetogenic and possess hypoglycemic effects in type-2 diabetic rats.

  18. Antibacterial Effect of Juglans Regia Bark against Oral Pathologic Bacteria

    Directory of Open Access Journals (Sweden)

    Faramarz Zakavi

    2013-01-01

    Full Text Available Background. In this study antimicrobial effect of ethanolic and aqueous extracts of Juglans regia bark in Iran was evaluated on four different oral bacteria, Streptococcus mutans, Streptococcus salivarius, Streptococcus sanguis, and Staphylococcus aureus. Methods. Aqueous and ethanol extracts of Juglans regia bark were prepared by using disk diffusion technique and Minimal Inhibitory Concentration (MIC methods. Tetracycline 30 μg and Erythromycin 15 μg were used as positive control and water as negative control in disk diffusion and MIC methods. Data were analyzed by ANOVA test. Results. The results showed that S. sanguis and S. mutans were the most sensitive and the most resistant bacteria against ethanolic and aqueous extracts, respectively. Ethanolic extract had significant antibacterial effect against all tested bacteria. Aqueous extract did not show antibacterial effect on S. mutans, in contrast to ethanolic extract. Aqueous extract had significantly antibacterial effect against Staphylococcus aureus, S. salivarius, and S. sanguis compared to control (P<0.0001, but it did not show effect on S. mutans when compared with Erythromycin. According to the obtained MIC values, ethanol extract of Juglans regia bark had the lowest rate. Conclusion. The results may provide the basis for using natural antimicrobial substance for oral hygiene prophylaxis purposes.

  19. Molluscicidal activity of Punica granatum bark and Canna indica root

    Directory of Open Access Journals (Sweden)

    S.M. Tripathi

    2000-11-01

    Full Text Available The molluscicidal activity of Punica granatum Linn. (Punicaceae and Canna indica Linn. (Cannaceae against the snail Lymnaea acuminata was studied. The molluscicidal activity of P. granatum bark and C. indica root was found to be both time and dose dependent. The toxicity of P. granatum bark was more pronounced than that of C. indica. The 24 h LC50 of the column-purified root of C. indica was 6.54 mg/l whereas that of the column-purified bark of P. granatum was 4.39 mg/l. The ethanol extract of P. granatum (24 h LC50: 22.42 mg/l was more effective than the ethanol extract of C. indica (24 h LC50: 55.65 mg/l in killing the test animals. P. granatum and C. indica may be used as potent molluscicides since the concentrations used to kill the snails were not toxic for the fish Colisa fasciatus, which shares the same habitat with the snail L. acuminata.

  20. Phenolic Extracts from Acacia mangium Bark and Their Antioxidant Activities

    Directory of Open Access Journals (Sweden)

    Liangliang Zhang

    2010-05-01

    Full Text Available Phenolic compounds are present at very high concentrations in the bark of Acacia mangium. These compounds are known to have strong antioxidant activity and thus different beneficial effects on human health. Phenolic compounds in bark of A. mangium were extracted and their antioxidant activities were investigated using the 1,1-diphenyl-2-picrylhydrazyl (DPPH free radical-scavenging and ferric-reducing antioxidant power (FRAP assays. A central composite design has been employed to optimize the experimental conditions for a high total phenolic content and antioxidant activity. The desirability function approach has been employed to simultaneously optimize the three responses: total phenols, antiradical activity and FRAP. An extraction time of 90 min, liquid-solid ratio of 5, and temperature of 50 °C was predicted for the optimum experimental conditions using the desirability function. A significant linear relationship between antioxidant potency, antiradical activity and the content of phenolic compounds of bark extracts was observed. The structures of condensed tannins isolated from A. mangium were characterized by MALDI-TOF MS analyses. Condensed tannin oligomers from A. mangium were shown to be heterogeneous mixtures consisting of procyanidin and prodelphinidin structural units with polymerization degrees up to 9.

  1. PHARMACOGNOSTICAL STANDARDIZATION AND HPTLC FINGERPRINT OF ALSTONIA SCHOLARIS LINN. BARK

    Directory of Open Access Journals (Sweden)

    Avinash Patil

    2014-03-01

    Full Text Available There is increasing global interest in herbal and other forms of traditional medicines. Herbs have long been an important source of numerous effective drugs. As per World Health Organization recommendations, there is a need for investigation of traditional medicinal plants for their potential therapeutic efficacy. The bark of Alstonia scholaris (L. R. Br. (Family: Apocynaceae locally known as ‘Sapthaparni’ or ‘Satwid’, is reported to have anticancer, antihelminthic, antidiarrhoeal, antiasthamatic, antimalarial etc. The present work embodies the study carried out for quality control of herbal drugs which comprises of macroscopy, microscopy, physicochemical properties, phytochemical analysis, fluorescence analysis and HPTLC fingerprint. The anatomical markers present were found to be stone cells, sclereids, cork cells, fibers and prismatic crystals of calcium oxalate. Methanol soluble extractive value was found to be higher than Water, Ethanol and Petroleum ether soluble extractive values. Preliminary phytochemical analysis revealed the presence of tannins, alkaloids, steroids, amino acids, fats, fixed oil, glycosides, proteins, starch and flavonoids. A unique HPTLC fingerprint for A. scholaris (L. R. Br. bark was developed. Results of the present study on pharmacognostical and phytochemical investigation of A. scholaris (L. R. Br. bark will be helpful in developing standards for quality, purity and sample identification of this plant.

  2. Antibacterial Effect of Juglans Regia Bark against Oral Pathologic Bacteria.

    Science.gov (United States)

    Zakavi, Faramarz; Golpasand Hagh, Leila; Daraeighadikolaei, Arash; Farajzadeh Sheikh, Ahmad; Daraeighadikolaei, Arsham; Leilavi Shooshtari, Zahra

    2013-01-01

    Background. In this study antimicrobial effect of ethanolic and aqueous extracts of Juglans regia bark in Iran was evaluated on four different oral bacteria, Streptococcus mutans, Streptococcus salivarius, Streptococcus sanguis, and Staphylococcus aureus. Methods. Aqueous and ethanol extracts of Juglans regia bark were prepared by using disk diffusion technique and Minimal Inhibitory Concentration (MIC) methods. Tetracycline 30  μ g and Erythromycin 15  μ g were used as positive control and water as negative control in disk diffusion and MIC methods. Data were analyzed by ANOVA test. Results. The results showed that S. sanguis and S. mutans were the most sensitive and the most resistant bacteria against ethanolic and aqueous extracts, respectively. Ethanolic extract had significant antibacterial effect against all tested bacteria. Aqueous extract did not show antibacterial effect on S. mutans, in contrast to ethanolic extract. Aqueous extract had significantly antibacterial effect against Staphylococcus aureus, S. salivarius, and S. sanguis compared to control (P effect on S. mutans when compared with Erythromycin. According to the obtained MIC values, ethanol extract of Juglans regia bark had the lowest rate. Conclusion. The results may provide the basis for using natural antimicrobial substance for oral hygiene prophylaxis purposes. PMID:23878540

  3. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  4. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  5. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  6. Antioxidant Tannins from Stem Bark and Fine Root of Casuarina equisetifolia

    OpenAIRE

    Guang-Hui Lin; Shu-Dong Wei; Hai-Chao Zhou; Yi-Ming Lin; Shang-Ju Zhang; Gong-Fu Ye

    2010-01-01

    Structures of condensed tannins from the stem bark and fine root of Casuarina equisetifolia were identified using MALDI-TOF MS and HPLC analyses. The condensed tannins from stem bark and fine root consist predominantly of procyanidin combined with prodelphinidin and propelargonidin, and epicatechin is the main extension unit. The condensed tannins had different polymer chain lengths, varying from trimers to tridecamer for stem bark and to pentadecamer for fine root. The antioxidant activities...

  7. Anti-inflammatory and anti-cancer activity of mulberry (Morus alba L.) root bark

    OpenAIRE

    Eo, Hyun Ji; Park, Jae Ho; Park, Gwang Hun; Lee, Man Hyo; Lee, Jeong Rak; Koo, Jin Suk; Jeong, Jin Boo

    2014-01-01

    Background Root bark of mulberry (Morus alba L.) has been used in herbal medicine as anti-phlogistic, liver protective, kidney protective, hypotensive, diuretic, anti-cough and analgesic agent. However, the anti-cancer activity and the potential anti-cancer mechanisms of mulberry root bark have not been elucidated. We performed in vitro study to investigate whether mulberry root bark extract (MRBE) shows anti-inflammatory and anti-cancer activity. Methods In anti-inflammatory activity, NO was...

  8. The Relation between Hepatotoxicity and the Total Coumarin Intake from Traditional Japanese Medicines Containing Cinnamon Bark

    OpenAIRE

    Iwata, Naohiro; Kainuma, Mosaburo; Kobayashi, Daisuke; Kubota, Toshio; Sugawara, Naoko; Uchida, Aiko; Ozono, Sahoko; Yamamuro, Yuki; Furusyo, Norihiro; Ueda, Koso; Tahara, Eiichi; Shimazoe, Takao

    2016-01-01

    Cinnamon bark is commonly used in traditional Japanese herbal medicines (Kampo medicines). The coumarin contained in cinnamon is known to be hepatotoxic, and a tolerable daily intake (TDI) of 0.1 mg/kg/day, has been quantified and used in Europe to insure safety. Risk assessments for hepatotoxicity by the cinnamon contained in foods have been reported. However, no such assessment of cinnamon bark has been reported and the coumarin content of Kampo medicines derived from cinnamon bark is not y...

  9. Isolation and amplification of genomic DNA from barks of Cinnamomum spp.

    OpenAIRE

    SWETHA, Valya Parambil; PARVATHY, Viswanath Alambath; SHEEJA, Thotten Elampillay; Bhaskaran SASIKUMAR

    2014-01-01

    Cinnamomum verum Presl (syn. C. zeylanicum Blume), the cinnamon of commerce, is an important aromatic tree spice having wide applications in perfumery, flavoring, beverages, and medicine. Adulteration of cinnamon with the cheaper and inferior barks of C. aromaticum and C. malabatrum is a problem. Morphological distinction of the barks is difficult; in the case of powdered barks, the situation is even worse. DNA-based molecular tools are preferred under these circumstances. Isolation of high q...

  10. Managing invasive populations of Asian longhorned beetle and citrus longhorned beetle: a worldwide perspective.

    Science.gov (United States)

    Haack, Robert A; Hérard, Franck; Sun, Jianghua; Turgeon, Jean J

    2010-01-01

    The Asian longhorned beetle (ALB), Anoplophora glabripennis (Motschulsky), and citrus longhorned beetle (CLB), Anoplophora chinensis (Forster) (Coleoptera: Cerambycidae), are polyphagous xylophages native to Asia and are capable of killing healthy trees. ALB outbreaks began in China in the 1980s, following major reforestation programs that used ALB-susceptible tree species. No regional CLB outbreaks have been reported in Asia. ALB was first intercepted in international trade in 1992, mostly in wood packaging material; CLB was first intercepted in 1980, mostly in live plants. ALB is now established in North America, and both species are established in Europe. After each infestation was discovered, quarantines and eradication programs were initiated to protect high-risk tree genera such as Acer, Aesculus, Betula, Populus, Salix, and Ulmus. We discuss taxonomy, diagnostics, native range, bionomics, damage, host plants, pest status in their native range, invasion history and management, recent research, and international efforts to prevent new introductions. PMID:19743916

  11. Mountain pine beetle host-range expansion threatens the boreal forest.

    Science.gov (United States)

    Cullingham, Catherine I; Cooke, Janice E K; Dang, Sophie; Davis, Corey S; Cooke, Barry J; Coltman, David W

    2011-05-01

    The current epidemic of the mountain pine beetle (MPB), an indigenous pest of western North American pine, has resulted in significant losses of lodgepole pine. The leading edge has reached Alberta where forest composition shifts from lodgepole to jack pine through a hybrid zone. The susceptibility of jack pine to MPB is a major concern, but there has been no evidence of host-range expansion, in part due to the difficulty in distinguishing the parentals and their hybrids. We tested the utility of a panel of microsatellite loci optimized for both species to classify lodgepole pine, jack pine and their hybrids using simulated data. We were able to accurately classify simulated individuals, and hence applied these markers to identify the ancestry of attacked trees. Here we show for the first time successful MPB attack in natural jack pine stands at the leading edge of the epidemic. This once unsuitable habitat is now a novel environment for MPB to exploit, a potential risk which could be exacerbated by further climate change. The consequences of host-range expansion for the vast boreal ecosystem could be significant. PMID:21457381

  12. Comparative resistance of Russian and Italian honey bees (Hymenoptera: Apidae) to small hive beetles (Coleoptera: Nitidulidae).

    Science.gov (United States)

    Frake, Amanda M; De Guzman, Lilia I; Rinderer, Thomas E

    2009-02-01

    To compare resistance to small hive beetles (Coleoptera: Nitidulidae) between Russian and commercial Italian honey bees (Hymenoptera: Apidae), the numbers of invading beetles, their population levels through time and small hive beetle reproduction inside the colonies were monitored. We found that the genotype of queens introduced into nucleus colonies had no immediate effect on small hive beetle invasion. However, the influence of honey bee stock on small hive beetle invasion was pronounced once test bees populated the hives. In colonies deliberately freed from small hive beetle during each observation period, the average number of invading beetles was higher in the Italian colonies (29 +/- 5 beetles) than in the Russian honey bee colonies (16 +/- 3 beetles). A similar trend was observed in colonies that were allowed to be freely colonized by beetles throughout the experimental period (Italian, 11.46 +/- 1.35; Russian, 5.21 +/- 0.66 beetles). A linear regression analysis showed no relationships between the number of beetles in the colonies and adult bee population (r2 = 0.1034, P = 0.297), brood produced (r2 = 0.1488, P = 0.132), or amount of pollen (P = 0.1036, P = 0.295). There were more Italian colonies that supported small hive beetle reproduction than Russian colonies. Regardless of stock, the use of entrance reducers had a significant effect on the average number of small hive beetle (with reducer, 16 +/- 3; without reducer, 27 +/- 5 beetles). However, there was no effect on bee population (with reducer, 13.20 +/- 0.71; without reducer, 14.60 +/- 0.70 frames) or brood production (with reducer, 6.12 +/- 0.30; without reducer, 6.44 +/- 0.34 frames). Overall, Russian honey bees were more resistant to small hive beetle than Italian honey bees as indicated by fewer invading beetles, lower small hive beetle population through time, and lesser reproduction. PMID:19253612

  13. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  14. Spatially distinct responses within willow to bark stripping by deer: effects on insect herbivory

    Science.gov (United States)

    Tanaka, Motonobu; Nakamura, Masahiro

    2015-10-01

    Within individual plants, cervid herbivory may cause positive or negative plant-mediated effects on insect herbivores, depending on where it occurs. Using a combination of field observations and artificial bark-stripping experiments in Hokkaido, Japan, we examined the plant-mediated effects of bark stripping by sika deer ( Cervus nippon yesoensis) on insect herbivory in two spatially distinct parts of willow ( Salix udensis) trees: resprouting leaves below bark-stripping wounds and canopy leaves above. Natural and artificial bark stripping stimulated resprouting from trunks below wounds. Resprouting leaves on bark-stripped trees had lower total phenolics, condensed tannin, and C/N ratios than did canopy leaves on control trees. Herbivory rates were higher in resprouting leaves on bark-stripped trees than in canopy leaves on controls. Conversely, above-wound canopy leaves on bark-stripped trees had higher total phenolics than did those on controls, while herbivory rates were lower in the canopy leaves of bark-stripped trees than in those on controls. These results demonstrate that plant-mediated effects of bark stripping diverge between plant tissues below and above wounds in individual willow trees. We submit that focusing on multiple plant parts can elucidate plant-mediated effects at the whole-plant scale.

  15. Content of certain mineral components in the thallus of lichens and the bark of roadside trees

    Directory of Open Access Journals (Sweden)

    Stanisława Kuziel

    2015-05-01

    Full Text Available The total N, P, Mg, Ca, K and Na contents were investigated in the thalli of several lichen species occurring on various trees, and in the bark and bark extracts from these trees. pH of the bark extracts was also determined. Wide differences were found in the content of the elements in point in the thalli of various lichen species on Acer platanoides and on the thalli of the same species on other trees. No relation was detected between the chemical composition of the bark and that of the lichen thalli occurring on it.

  16. Biologically inspired optics: analog semiconductor model of the beetle exoskeleton

    Science.gov (United States)

    Buhl, Kaia; Roth, Zachary; Srinivasan, Pradeep; Rumpf, Raymond; Johnson, Eric

    2008-08-01

    Evolution in nature has produced through adaptation a wide variety of distinctive optical structures in many life forms. For example, pigment differs greatly from the observed color of most beetles because their exoskeletons contain multilayer coatings. The green beetle is disguised in a surrounding leaf by having a comparable reflection spectrum as the leaves. The Manuka and June beetle have a concave structure where light incident at any angle on the concave structures produce matching reflection spectra. In this work, semiconductor processing methods were used to duplicate the structure of the beetle exoskeleton. This was achieved by combining analog lithography with a multilayer deposition process. The artificial exoskeleton, 3D concave multilayer structure, demonstrates a wide field of view with a unique spectral response. Studying and replicating these biologically inspired nanostructures may lead to new knowledge for fabrication and design of new and novel nano-photonic devices, as well as provide valuable insight to how such phenomenon is exploited.

  17. Mechanical properties of the beetle elytron, a biological composite material

    Science.gov (United States)

    We determined the relationship between composition and mechanical properties of elytral (modified forewing) cuticle of the beetles Tribolium castaneum and Tenebrio molitor. Elytra of both species have similar mechanical properties at comparable stages of maturation (tanning). Shortly after adult ecl...

  18. The artificial beetle, or a brief manifesto for engineered biomimicry

    Science.gov (United States)

    Bartl, Michael H.; Lakhtakia, Akhlesh

    2015-03-01

    The artificial beetle is possibly the Holy Grail for practitioners of engineered biomimicry. An artificial beetle could gather and relay data and images from compromised environments on earth and other planets to decision makers. It could also be used for surveillance of foes and friends alike, and will require ethical foresight and oversight. What would it take to develop an artificial beetle? Several biotemplating techniques can be harnessed for the replication of external structural features of beetle bodies, and thus preserve functionalities such as coloration of the exoskeleton and the hydrophobicity of wings. The body cavity must host a power supply, motors to move the wings for flight, sensors to capture ambient conditions and images, and data transmitters and receivers to communicate with a remote command center. All of these devices must be very small and reliable.

  19. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  20. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  1. The gut microbiota of the pine weevil is similar across Europe and resembles that of other conifer-feeding beetles.

    Science.gov (United States)

    Berasategui, Aileen; Axelsson, Karolin; Nordlander, Göran; Schmidt, Axel; Borg-Karlson, Anna-Karin; Gershenzon, Jonathan; Terenius, Olle; Kaltenpoth, Martin

    2016-08-01

    The pine weevil (Hylobius abietis, Coleoptera: Curculionidae) is an important pest of conifer seedlings in Europe. Despite its economic importance, little is known about the composition of its gut microbial community and the role it plays in mediating the weevil's ability to utilize conifers as a food source. Here, we characterized the gut bacterial communities of different populations of H. abietis across Europe and compared them to those of other beetles that occupy similar ecological niches. We demonstrate that the microbial community of H. abietis is similar at higher taxonomic levels (family and genus) across locations in Europe, with Wolbachia as the dominant microbe, followed by Enterobacteria and Firmicutes. Despite this similarity, we observed consistent differences between countries and locations, but not sexes. Our meta-analysis demonstrates that the gut bacterial community of the pine weevil is very similar to that of bark beetles that also exploit conifers as a food source. The Enterobacteriaceae symbionts of both host taxa are especially closely related phylogenetically. Conversely, the microbiota of H. abietis is distinct from that of closely related weevils feeding on nonconifer food sources, suggesting that the microbial community of the pine weevil is determined by the environment and may be relevant to host ecology. Furthermore, several H. abietis-associated members of the Enterobacteriaceae family are known to contain genes involved in terpenoid degradation. As such, we hypothesize that the gut microbial community is important for the utilization of conifer seedlings as a food source, either through the detoxification of plant secondary metabolites or through the supplementation of essential nutrients. PMID:27199034

  2. Juvenile Hormone Regulates Extreme Mandible Growth in Male Stag Beetles

    OpenAIRE

    Gotoh, Hiroki; Cornette, Richard; Koshikawa, Shigeyuki; Okada, Yasukazu; Lavine, Laura Corley; Emlen, Douglas J.; Miura, Toru

    2011-01-01

    The morphological diversity of insects is one of the most striking phenomena in biology. Evolutionary modifications to the relative sizes of body parts, including the evolution of traits with exaggerated proportions, are responsible for a vast range of body forms. Remarkable examples of an insect trait with exaggerated proportions are the mandibular weapons of stag beetles. Male stag beetles possess extremely enlarged mandibles which they use in combat with rival males over females. As with o...

  3. To mitigate Black-hole attack with CBDS in MANET

    OpenAIRE

    Navjot; Er.Pooja Ran

    2015-01-01

    Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperati...

  4. Shoulder injuries from attacking motion

    Science.gov (United States)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  5. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  6. BIOSORPTION OF LEAD (II ON MODIFIED BARKS EXPLAINED BY THE HARD AND SOFT ACIDS AND BASES (HSAB THEORY

    Directory of Open Access Journals (Sweden)

    Cedric Astier,

    2012-01-01

    Full Text Available Chemical modification of Douglas fir bark and its subsequent utilization in adsorption of Pb(II from aqueous solutions was investigated. The polysaccharidic moiety of barks was functionalized by periodate oxidation and derivatized after reductive amination in the presence of aminated oligo-carrageenans. Pb(II adsorption isotherms of derivatized barks were then determined and compared to the capabilities of crude barks using the Langmuir adsorption model in terms of affinity (b and maximum binding capacity (qmax. Compared to crude barks, the derivatization of barks by oligo-carrageenans resulted in significant enhancements of qmax and b by up to x8 and x4, respectively. The results obtained from crude barks on chemically grafted carboxylic and sulfated barks are discussed and interpreted through the Hard and Soft Acids and Bases (HSAB theory.

  7. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  8. Attack Penetration System for SQL Injection

    Directory of Open Access Journals (Sweden)

    Manju Kaushik

    2014-06-01

    Full Text Available The SQL Injection attack is a popular way of attack in terms of document structure and common threats now a day. There are several ways of attack detection as per our study and also prevention methods had been discussed in several research papers. So the main motivation of our paper to penetrate the attack. For this we have proposed an efficient framework from which the central authority can control all the visited IP and restrict those IP. If the IP is in the restricted zone then the contents are restricted by using SQL update command with some status modification states. If the restricted IP wish to access the data from their credentials, it is immediately inform to the admin and the time of attack alert will be stored in the log area of that attack. Finally by comparison we will justify our results which are better in comparison to the previous test and methodology.

  9. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  10. SQL INJECTION ATTACK DETECTION AND PREVENTION

    OpenAIRE

    Dr. SUNITHA ABBURU; PERUMALSAMY RAMASAMY

    2012-01-01

    Nowadays SQL injection attacks (SQLIAs) and cross scripting increased in real web applications very much, and the SQL injection attacks damages the databases through web applications. Injection queries are different type of way to attack the databases. This paper address the issue of SQLIA’s and script in an efficient way. The proposed approach detects and prevents all the Injection queries as well as the cross scripting through the Framework and Static analysis and Dynamic analysis. The cont...

  11. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  12. Antennal Transcriptome Analysis of Odorant Reception Genes in the Red Turpentine Beetle (RTB, Dendroctonus valens.

    Directory of Open Access Journals (Sweden)

    Xiao-Cui Gu

    Full Text Available The red turpentine beetle (RTB, Dendroctonus valens LeConte (Coleoptera: Curculionidae, Scolytinae, is a destructive invasive pest of conifers which has become the second most important forest pest nationwide in China. Dendroctonus valens is known to use host odors and aggregation pheromones, as well as non-host volatiles, in host location and mass-attack modulation, and thus antennal olfaction is of the utmost importance for the beetles' survival and fitness. However, information on the genes underlying olfaction has been lacking in D. valens. Here, we report the antennal transcriptome of D. valens from next-generation sequencing, with the goal of identifying the olfaction gene repertoire that is involved in D. valens odor-processing.We obtained 51 million reads that were assembled into 61,889 genes, including 39,831 contigs and 22,058 unigenes. In total, we identified 68 novel putative odorant reception genes, including 21 transcripts encoding for putative odorant binding proteins (OBP, six chemosensory proteins (CSP, four sensory neuron membrane proteins (SNMP, 22 odorant receptors (OR, four gustatory receptors (GR, three ionotropic receptors (IR, and eight ionotropic glutamate receptors. We also identified 155 odorant/xenobiotic degradation enzymes from the antennal transcriptome, putatively identified to be involved in olfaction processes including cytochrome P450s, glutathione-S-transferases, and aldehyde dehydrogenase. Predicted protein sequences were compared with counterparts in Tribolium castaneum, Megacyllene caryae, Ips typographus, Dendroctonus ponderosae, and Agrilus planipennis.The antennal transcriptome described here represents the first study of the repertoire of odor processing genes in D. valens. The genes reported here provide a significant addition to the pool of identified olfactory genes in Coleoptera, which might represent novel targets for insect management. The results from our study also will assist with evolutionary

  13. Understanding Changes to Interrelated Hydrologic and Trace Metal Cycles in Mountain Pine Beetle Infested Watersheds

    Science.gov (United States)

    Bearup, L.; Maxwell, R. M.; Clow, D. W.; McCray, J. E.; Sharp, J. O.

    2012-12-01

    Changing climate in the Rocky Mountain West and worldwide has led to insect infestation and resultant tree mortality at epidemic levels. This unprecedented change in land cover is known to impact tree-scale hydrologic processes in forested watersheds, with possible implications for water quality. In this work, soil and streamwater samples from a mountain pine beetle (MPB) infested watershed were analyzed for metals and stable isotopes to understand how the loss of forest cover over large spatial and temporal extent changes interrelated hydrologic and metal transport processes. An increase in trace metal fluxes from pine forest soils is a potential result of increases in organic matter and alterations in pH. To understand the implication for MPB-infested forests, the mobility of eight metals of interest (Al, Ba, Cd, Cu, Fe, Mn, Ni and Zn) were compared from soils beneath impacted and living trees. Preliminary results from this study found significant decreases in solid - liquid partitioning coefficients among the majority of metals analyzed, particularly in organic horizon samples. These results suggest an increase in potential mobilization from deposited litter and underlying soil horizons after beetle attack. Differences were also observed between aspects, with more pronounced mobility increases on south facing slopes. Sequential extractions are underway to better elucidate the important mechanisms and possible change in metal fractionation under different tree phases. In addition to increased metal release, changes in transport processes are also possible. Stable isotopes (∂18O and ∂D) and streamwater chemistry were analyzed to distinguish potential changes of water sources. Observed increases in soil moisture under impacted trees suggest possible increases in flow through the shallow subsurface that could have implications for contaminant transport. Clarifying important metal release mechanisms at the tree scale and changes in flow processes at the watershed

  14. Significantly higher Carabid beetle (Coleoptera: Carabidae) catch in conventionally than in organically managed Christmas tree plantations

    DEFF Research Database (Denmark)

    Bagge, Søren; Lund, Malthe; Rønn, Regin;

    2012-01-01

    trapped carabid beetles (Coleoptera, Carabidae) varied between conventionally and organically managed Caucasian Fir (Abies nordmanniana (Stev.)) plantations, in northern Zealand, Denmark. We recorded significantly higher numbers of carabid beetle specimens and species at conventionally than at organically...

  15. Oviposition by small hive beetles elicits hygienic responses from Cape honeybees.

    Science.gov (United States)

    Ellis, J D; Richards, C S; Hepburn, H R; Elzen, P J

    2003-11-01

    Two novel behaviours, both adaptations of small hive beetles ( Aethina tumida Murray) and Cape honeybees ( Apis mellifera capensis Esch.), are described. Beetles puncture the sides of empty cells and oviposit under the pupae in adjoining cells. However, bees detect this ruse and remove infested brood (hygienic behaviour), even under such well-disguised conditions. Indeed, bees removed 91% of treatment brood (brood cells with punctured walls caused by beetles) but only 2% of control brood (brood not exposed to beetles). Only 91% of treatment brood actually contained beetle eggs; the data therefore suggest that bees remove only that brood containing beetle eggs and leave uninfected brood alone, even if beetles have accessed (but not oviposited on) the brood. Although this unique oviposition strategy by beetles appears both elusive and adaptive, Cape honeybees are able to detect and remove virtually all of the infested brood. PMID:14610654

  16. 2004 American Burying Beetle Annual Report - Pond Creek National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Survey efforts for the endangered American Burying Beetle at Pond Creek NWR in 2004 are reported from 14 sampling locations on the refuge. American buring beetle...

  17. Oviposition by small hive beetles elicits hygienic responses from Cape honeybees.

    Science.gov (United States)

    Ellis, J D; Richards, C S; Hepburn, H R; Elzen, P J

    2003-11-01

    Two novel behaviours, both adaptations of small hive beetles ( Aethina tumida Murray) and Cape honeybees ( Apis mellifera capensis Esch.), are described. Beetles puncture the sides of empty cells and oviposit under the pupae in adjoining cells. However, bees detect this ruse and remove infested brood (hygienic behaviour), even under such well-disguised conditions. Indeed, bees removed 91% of treatment brood (brood cells with punctured walls caused by beetles) but only 2% of control brood (brood not exposed to beetles). Only 91% of treatment brood actually contained beetle eggs; the data therefore suggest that bees remove only that brood containing beetle eggs and leave uninfected brood alone, even if beetles have accessed (but not oviposited on) the brood. Although this unique oviposition strategy by beetles appears both elusive and adaptive, Cape honeybees are able to detect and remove virtually all of the infested brood.

  18. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to...... properties of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  19. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  20. Phytochemical Analysis and Biological Activities of Cola nitida Bark

    Directory of Open Access Journals (Sweden)

    Durand Dah-Nouvlessounon

    2015-01-01

    Full Text Available Kola nut is chewed in many West African cultures and is used ceremonially. The aim of this study is to investigate some biological effects of Cola nitida’s bark after phytochemical screening. The bark was collected, dried, and then powdered for the phytochemical screening and extractions. Ethanol and ethyl acetate extracts of C. nitida were used in this study. The antibacterial activity was tested on ten reference strains and 28 meat isolated Staphylococcus strains by disc diffusion method. The antifungal activity of three fungal strains was determined on the Potato-Dextrose Agar medium mixed with the appropriate extract. The antioxidant activity was determined by DPPH and ABTS methods. Our data revealed the presence of various potent phytochemicals. For the reference and meat isolated strains, the inhibitory diameter zone was from 17.5±0.7 mm (C. albicans to 9.5±0.7 mm (P. vulgaris. The MIC ranged from 0.312 mg/mL to 5.000 mg/mL and the MBC from 0.625 mg/mL to >20 mg/mL. The highest antifungal activity was observed with F. verticillioides and the lowest one with P. citrinum. The two extracts have an excellent reducing free radical activity. The killing effect of A. salina larvae was perceptible at 1.04 mg/mL. The purified extracts of Cola nitida’s bark can be used to hold meat products and also like phytomedicine.

  1. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  2. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  3. Bark water uptake promotes localized hydraulic recovery in coastal redwood crown.

    Science.gov (United States)

    Mason Earles, J; Sperling, Or; Silva, Lucas C R; McElrone, Andrew J; Brodersen, Craig R; North, Malcolm P; Zwieniecki, Maciej A

    2016-02-01

    Coastal redwood (Sequoia sempervirens), the world's tallest tree species, rehydrates leaves via foliar water uptake during fog/rain events. Here we examine if bark also permits water uptake in redwood branches, exploring potential flow mechanisms and biological significance. Using isotopic labelling and microCT imaging, we observed that water entered the xylem via bark and reduced tracheid embolization. Moreover, prolonged bark wetting (16 h) partially restored xylem hydraulic conductivity in isolated branch segments and whole branches. Partial hydraulic recovery coincided with an increase in branch water potential from about -5.5 ± 0.4 to -4.2 ± 0.3 MPa, suggesting localized recovery and possibly hydraulic isolation. As bark water uptake rate correlated with xylem osmotic potential (R(2)  = 0.88), we suspect a symplastic role in transferring water from bark to xylem. Using historical weather data from typical redwood habitat, we estimated that bark and leaves are wet more than 1000 h per year on average, with over 30 events being sufficiently long (>24 h) to allow for bark-assisted hydraulic recovery. The capacity to uptake biologically meaningful volumes of water via bark and leaves for localized hydraulic recovery throughout the crown during rain/fog events might be physiologically advantageous, allowing for relatively constant transpiration.

  4. Elemental analyses of pine bark and wood in an environmental study

    Energy Technology Data Exchange (ETDEWEB)

    Saarela, K.-E.; Harju, L.; Rajander, J. [Laboratory of Analytical Chemistry, Process Chemistry Group, AAbo Akademi University, Biskopsg. 8, FIN-20500 AAbo (Finland); Lill, J.-O.; Heselius, S.-J. [Turku PET Centre, Accelerator Laboratory, AAbo Akademi University, Porthansg. 3, FIN-20500 AAbo (Finland); Lindroos, A. [Department of Geology and Mineralogy, AAbo Akademi University, Domkyrkotorget 1, FIN-20500 AAbo (Finland); Mattsson, K. [Department of Biology, AAbo Akademi University, BioCity, Artillerig. 6, FIN-20500 AAbo (Finland)

    2005-05-01

    Bark and wood samples were taken from the same individuals of Scots pine (Pinus sylvestris L.) from a polluted area close to a Cu-Ni smelter in Harjavalta and from some relatively unpolluted areas in western Finland. The samples were analysed by thick-target particle induced X-ray emission (PIXE) after preconcentration by dry ashing at 550 {sup o}C. The elemental contents of pine bark and wood were compared to study the impact of heavy metal pollution on pine trees. By comparison of the elemental contents in ashes of bark and wood, a normalisation was obtained. For the relatively clean areas, the ratios of the concentration in bark ash to the concentration in wood ash for different elements were close to 1. This means that the ashes of Scots Pine wood and bark have quite similar elemental composition. For the samples from the polluted area the mean concentration ratios for some heavy metals were elevated (13-28), reflecting the effect of direct atmospheric contamination. The metal contents in the ashes of pine bark and wood were also compared to recommendations for ashes to be recycled back to the forest environment. Bark from areas close to emission sources of heavy metal pollution should be considered with caution if aiming at recycling the ash. Burning of bark fuel of pine grown within 6 km of the Cu-Ni smelter is shown to generate ashes with high levels of Cu, Ni as well as Cd, As and Pb. (author)

  5. Selective bark-stripping of beech, Fagus sylvatica, by free-ranging horses

    NARCIS (Netherlands)

    Kuiters, A.T.; Sluijs, van der L.A.M.; Wytema, G.A.

    2006-01-01

    Incidence and intensity of bark-stripping by horses was surveyed in stands and tree lanes of European beech (Fagus sylvatica L.) in Veluwezoom National Park, by using transects. Damage was apparent on 38% of beech trees, and 11% were seriously damaged (score 3 or more). Susceptibility to bark-stripp

  6. 78 FR 23592 - Certain Electronic Bark Control Collars, Termination of the Investigation

    Science.gov (United States)

    2013-04-19

    ... COMMISSION Certain Electronic Bark Control Collars, Termination of the Investigation AGENCY: U.S... certain electronic bark control collars by reason of infringement of certain claims of U.S. Patent No. 5....usitc.gov . The public record for this investigation may be viewed on the Commission's electronic...

  7. Divergence among barking frogs (Eleutherodactylus augusti) in the southwestern United States

    Science.gov (United States)

    Goldberg, C.S.; Sullivan, B.K.; Malone, J.H.; Schwalbe, C.R.

    2004-01-01

    Barking frogs (Eleutherodactylus augusti) are distributed from southern Mexico along the Sierra Madre Occidental into Arizona and the Sierra Madre Oriental into Texas and New Mexico. Barking frogs in Arizona and most of Texas live in rocky areas in oak woodland, while those in New Mexico and far western Texas live in rodent burrows in desertscrub. Barking frogs in each of the three states have distinct coloration and differ in sexually dimorphic characters, female vocalization, and skin toxicity. We analyzed advertisement call variation and conducted a phylogenetic analysis using mitochondrial DNA sequences (ND2 and tRNA regions) for barking frogs from these three states. Advertisement calls of frogs from Arizona were significantly longer in duration, higher in frequency, and had longer duration pulses than those of frogs from either New Mexico or Texas; frogs from these latter two sites were indistinguishable in these call variables. Phylogenetic analysis showed deep divisions among barking frogs from the three states. Differences in call structure, coloration, and mitochondrial DNA sequences strongly suggest that barking frogs in Arizona are reproductively isolated from those in New Mexico and Texas. Our results indicate that either northern populations are connected via gene flow through southern Mexico (i.e., they are subspecies as currently recognized), or represent independent lineages as originally described (i.e., western barking frogs, E. cactorum in AZ, and the eastern barking frogs, E. latrans in NM, TX).

  8. Microscopic and UPLC-UV-MS analyses of authentic and commercial yohimbe (Pausinystalia johimbe) bark samples

    Science.gov (United States)

    Yohimbine is the major alkaloid found in the stem-bark of yohimbe, Pausinystalia johimbe (Rubiaceae), an evergreen tree native to Africa. A number of yohimbe products are sold in USA as dietary supplements. Hand-sections of the stem-bark were prepared and the anatomical features were studied by ligh...

  9. Bark water uptake promotes localized hydraulic recovery in coastal redwood crown.

    Science.gov (United States)

    Mason Earles, J; Sperling, Or; Silva, Lucas C R; McElrone, Andrew J; Brodersen, Craig R; North, Malcolm P; Zwieniecki, Maciej A

    2016-02-01

    Coastal redwood (Sequoia sempervirens), the world's tallest tree species, rehydrates leaves via foliar water uptake during fog/rain events. Here we examine if bark also permits water uptake in redwood branches, exploring potential flow mechanisms and biological significance. Using isotopic labelling and microCT imaging, we observed that water entered the xylem via bark and reduced tracheid embolization. Moreover, prolonged bark wetting (16 h) partially restored xylem hydraulic conductivity in isolated branch segments and whole branches. Partial hydraulic recovery coincided with an increase in branch water potential from about -5.5 ± 0.4 to -4.2 ± 0.3 MPa, suggesting localized recovery and possibly hydraulic isolation. As bark water uptake rate correlated with xylem osmotic potential (R(2)  = 0.88), we suspect a symplastic role in transferring water from bark to xylem. Using historical weather data from typical redwood habitat, we estimated that bark and leaves are wet more than 1000 h per year on average, with over 30 events being sufficiently long (>24 h) to allow for bark-assisted hydraulic recovery. The capacity to uptake biologically meaningful volumes of water via bark and leaves for localized hydraulic recovery throughout the crown during rain/fog events might be physiologically advantageous, allowing for relatively constant transpiration. PMID:26178179

  10. Two new phenylbutanoids from inner bark of Betula pendula.

    Science.gov (United States)

    Liimatainen, Jaana; Sinkkonen, Jari; Karonen, Maarit; Pihlaja, Kalevi

    2008-02-01

    Two phenylbutanoids, 7-{3R-[(4-hydroxyphenyl)butyl] beta-glucopyranosid-O-6-yl} 4-O-beta-glucopyranosylvanillin and 3-beta-glucopyranosyloxy-1-(4-hydroxyphenyl)-butanone were isolated from an aqueous methanol extract of the inner bark of Betula pendula. Their structures were determined by NMR spectroscopy and mass spectrometry. The complete assignment of proton and carbon signals was achieved by 1D and 2D NMR experiments: selective 1D TOCSY, HSQC, HMBC and DQF-COSY. PMID:18098157

  11. Procyanidin xylosides from the bark of Betula pendula.

    Science.gov (United States)

    Liimatainen, Jaana; Karonen, Maarit; Sinkkonen, Jari

    2012-04-01

    A procyanidin dimer xyloside, catechin-(4α→8)-7-O-β-xylopyranosyl-catechin, was isolated from the inner bark of Betula pendula and its structure was determined using 1D and 2D NMR, CD and high-resolution ESIMS. Interestingly, the 7-O-β-xylopyranose unit was found to be present in the lower terminal unit of the dimer. In addition to this procyanidin dimer xyloside, an entire series of oligomeric and polymeric procyanidin xylosides was detected. Their structures were investigated by hydrophilic interaction HPLC-HRESIMS. Procyanidin glycosides are still rarely found in nature. PMID:22273040

  12. Cytotoxic Constituents from bark and leaves of Amyris pinnata Kunth.

    Directory of Open Access Journals (Sweden)

    Luis Enrique Cuca-Suarez

    2015-04-01

    Full Text Available From leaves and bark of Amyris pinnata Kunth twelve compounds were isolated, corresponding to six lignans 1-6, three coumarins 7-9, a sesquiterpene 10, an oxazole alkaloid 11, and a prenylated flavonoid 12,. Metabolites were identified by spectroscopic techniques ( 1H and 13C NMR, EIMS and by comparison with published data in the literature. C ytotoxicity against leukemia, solid tumors, and normal cells was evaluated for all isolated compounds. Lignans were found to be the most cytotoxic compounds occurring in A. pinnata.

  13. Lancifoliaine, a New Bisbenzylisoquinoline from the Bark of Litsea lancifolia

    Directory of Open Access Journals (Sweden)

    Kazumasa Zaima

    2011-04-01

    Full Text Available A new bisbenzylisoquinoline, lancifoliaine (1, together with seven known alkaloids – N-allyllaurolitsine (2, reticuline (3, actinodaphnine, norboldine, pallidine, cassythicine and boldine – were isolated from the stem bark of Litsea lancifolia (Lauraceae. In addition to that of lancifoliaine, complete 13C-NMR data of N-allyl-laurolitsine (2 was also reported. The alkaloidal structures were elucidated by means of high field 1D- and 2D-NMR IR, UV, and LCMS-IT-TOF spectral data. N-Allyllaurolitsine (2 showed a moderate vasorelaxant activity on isolated rat aorta.

  14. Triterpenoid saponins from the stem bark of Caryocar villosum

    OpenAIRE

    Magid, A. A.; Voutquenne Nazabadioko, L.; Renimel, I.; Harakat, D.; Moretti, Christian; Lavaud, C.

    2006-01-01

    Five triterpenoid saponins, caryocarosides II-22 (3), III-22 (4), II-23 (5), III-23 (6), and II-24 (7), have been isolated from the methanol extract of the stem bark of Caryocar villosum, along with two known saponins (1-2). The seven saponins are glucuronides of hederagenin (II) or bayogenin (III). Caryocaroside II-24 (7) is an unusual galloyl ester saponin acylated on the sugar chain attached to C-28, the 3-O-alpha-L-rhamnopyranosyl-(1 -> 3)-beta-D-galactopyranosyl-(1 -> 3)-beta-D-glueurono...

  15. Chemical Constituents from Stem Bark and Roots of Clausena anisata

    Directory of Open Access Journals (Sweden)

    Etienne Dongo

    2012-11-01

    Full Text Available Phytochemical investigations on the stem bark and roots of the tropical shrub Clausena anisata led to the isolation and characterization three carbazole alkaloids: girinimbine, murrayamine-A and ekeberginine; two peptide derivatives: aurantiamide acetate and N-benzoyl-l-phenylalaninyl-N-benzoyl-l-phenylalaninate; and a mixture of two phytosterols: sitosterol and stigmasterol. The structures of these compounds were established by nuclear magnetic resonance (1H-NMR, 13C-NMR, COSY, HSQC, HMQC, HMBC and NOESY spectroscopy and electrospray ionization mass spectrometry (MS.

  16. Prenylated xanthones from the root bark of Cudrania tricuspidata.

    Science.gov (United States)

    Hwang, Ji Hye; Hong, Seong Su; Han, Xiang Hua; Hwang, Ji Sang; Lee, Dongho; Lee, Heesoon; Yun, Yeo Pyo; Kim, Youngsoo; Ro, Jai Seup; Hwang, Bang Yeon

    2007-07-01

    Four new prenylated xanthones, cudratricusxanthones J-M (1-4), were isolated from the CH2Cl2-soluble extract of the root bark of Cudrania tricuspidata, along with four known prenylated xanthones, isocudraxanthone K (5), cudraxanthone C (6), cudratricusxanthone A (7), and cudraxanthone L (8), and three known prenylated flavonoids, cudraflavone A (9), cudraflavanone A (10), and cudraflavone B (11). The structures of compounds 1-4 were elucidated using spectroscopic methods. Cudratricusxanthone A (7), cudraflavanone A (10), and cudraflavone B (11) showed moderate inhibitory effects on mouse brain monoamine oxidase (MAO) with IC50 values of 88.3, 89.7, and 80.0 microM, respectively.

  17. Pharmacognostical evaluation of medicinally important Ficus retusa (Leaves and bark

    Directory of Open Access Journals (Sweden)

    Alok Semwal

    2013-01-01

    Full Text Available Ficus retusa (F. retusa belongs to family Moraceae is a large and extensively growing tree across Indian continent. It's commonly known as Chilkan and Marabuten. This tree is claimed to have medicinal properties. The aim of present study is to investigate the pharmacognostical characters of important medicinal plant, F. retusa L. The pharmacognostic studies were carried out in terms of macroscopical, microscopical characters, standardization, phytoconstituents and chromatographic analysis of F. retusa leaf and bark. Various standard methods were adopted to carry out the investigation.

  18. Antiplasmodial and larvicidal compounds of Toddalia asiatica root bark

    Indian Academy of Sciences (India)

    T Nyahanga; J Isaac Jondiko; L Onyango Arot Manguro; J Atieno Orwa

    2013-09-01

    From the -hexane, ethyl acetate and methanol extracts of Toddalia asiatica root bark were isolated eight compounds (1-8) which were identified on the basis of both spectroscopic and physical data as well as comparison with already published results. The crude extracts and isolated compounds showed moderate in vitro antiplasmodial activity against D6 (chloroquine-sensitive) and W2 (chloroquine-resistant) strains of Plasmodium falciparum. The extracts and isolates also exhibited larvicidal activities against Aedes aegypti and coumarins were identified as the active compounds.

  19. Calotroposide S, New Oxypregnane Oligoglycoside from Calotropis procera Root Bark

    Directory of Open Access Journals (Sweden)

    Sabrin R. M. Ibrahim

    2016-05-01

    Full Text Available Calotroposide S (1, a new oxypregnane oligoglycoside has been isolated from the n-butanol fraction of Calotropis procera (Ait R. Br. root bark. The structure of 1 was assigned based on various spectroscopic analyses. Calotroposide S (1 possesses the 12-O-benzoylisolineolon aglycone moiety with eight sugar residues attached to C-3 of the aglycone. It showed potent anti-proliferative activity towards PC-3 prostate cancer, A549 non-small cell lung cancer (NSCLC, and U373 glioblastoma (GBM cell lines with IC 50 0.18, 0.2, and 0.06 µM, respectively compared with cisplatin and carboplatin.

  20. Douglas-Fir Tussock Moth- and Douglas-Fir Beetle-Caused Mortality in a Ponderosa Pine/Douglas-Fir Forest in the Colorado Front Range, USA

    Directory of Open Access Journals (Sweden)

    José F. Negrón

    2014-12-01

    Full Text Available An outbreak of the Douglas-fir tussock moth, Orgyia pseudotsugata McDunnough, occurred in the South Platte River drainage on the Pike-San Isabel National Forest in the Colorado Front Range attacking Douglas-fir, Pseudotsuga menziesii (Mirb. Franco. Stocking levels, species composition, and tree size in heavily and lightly defoliated stands were similar. Douglas-fir tussock moth defoliation resulted in significant Douglas-fir mortality in the heavily defoliated stands, leading to a change in dominance to ponderosa pine, Pinus ponderosa Lawson. Douglas-fir beetle, Dendroctonus pseudotsuqae Hopkins, populations increased following the defoliation event but caused less mortality, and did not differ between heavily and lightly defoliated stands. Douglas-fir tussock moth-related mortality was greatest in trees less than 15 cm dbh (diameter at 1.4 m above the ground that grew in suppressed and intermediate canopy positions. Douglas-fir beetle-related mortality was greatest in trees larger than 15 cm dbh that grew in the dominant and co-dominant crown positions. Although both insects utilize Douglas-fir as its primary host, stand response to infestation is different. The extensive outbreak of the Douglas-fir tussock moth followed by Douglas-fir beetle activity may be associated with a legacy of increased host type growing in overstocked conditions as a result of fire exclusion.

  1. Distance and sex determine host plant choice by herbivorous beetles.

    Directory of Open Access Journals (Sweden)

    Daniel J Ballhorn

    Full Text Available BACKGROUND: Plants respond to herbivore damage with the release of volatile organic compounds (VOCs. This indirect defense can cause ecological costs when herbivores themselves use VOCs as cues to localize suitable host plants. Can VOCs reliably indicate food plant quality to herbivores? METHODOLOGY: We determined the choice behavior of herbivorous beetles (Chrysomelidae: Gynandrobrotica guerreroensis and Cerotoma ruficornis when facing lima bean plants (Fabaceae: Phaseolus lunatus with different cyanogenic potential, which is an important constitutive direct defense. Expression of inducible indirect defenses was experimentally manipulated by jasmonic acid treatment at different concentrations. The long-distance responses of male and female beetles to the resulting induced plant volatiles were investigated in olfactometer and free-flight experiments and compared to the short-distance decisions of the same beetles in feeding trials. CONCLUSION: Female beetles of both species were repelled by VOCs released from all induced plants independent of the level of induction. In contrast, male beetles were repelled by strongly induced plants, showed no significant differences in choice behavior towards moderately induced plants, but responded positively to VOCs released from little induced plants. Thus, beetle sex and plant VOCs had a significant effect on host searching behavior. By contrast, feeding behavior of both sexes was strongly determined by the cyanogenic potential of leaves, although females again responded more sensitively than males. Apparently, VOCs mainly provide information to these beetles that are not directly related to food quality. Being induced by herbivory and involved in indirect plant defense, such VOCs might indicate the presence of competitors and predators to herbivores. We conclude that plant quality as a food source and finding a potentially enemy-free space is more important for female than for male insect herbivores

  2. In vitro Development of Callus from Node of Mimusops elengi - As Substitute of Natural Bark

    Directory of Open Access Journals (Sweden)

    Bharat Gami

    2010-10-01

    Full Text Available In this study, results of in vitro callus development from Mimusops elengi as substitute of bark were formulated. By different auxine/cytokinine ratio from young nodal explant compact, globular and fragile types of callus were developed. Methanolic extract of all types of callus and bark were studied for extractable matter, antibacterial activity, phytochemical profiling, biouautography and Thin Layer Chromatography (TLC banding patterns. Results of all calluses were compared with results of natural bark of M. elengi. TLC pattern of three types of callus and bark revealed similar banding pattern, and same bioactivity was also observed in bioautography. Our results indicate that natural bark & in vitro developed callus of M. elengi posses similar chemical profiling and bioactivity regardless the type & colour of callus.

  3. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  4. 7 CFR 301.48-6 - Movement of live Japanese beetles.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Movement of live Japanese beetles. 301.48-6 Section... INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE DOMESTIC QUARANTINE NOTICES Japanese Beetle Quarantine and Regulations § 301.48-6 Movement of live Japanese beetles. Regulations requiring a permit for and...

  5. Olfaction in the Colorado beetle at the onset of host plant selection

    NARCIS (Netherlands)

    Visser, J.H.

    1979-01-01

    Long-range olfactory orientation of the adult Colorado beetle was studied in a low- speed wind tunnel. The odour of fully grown potato plants elicits an upwind locomotory response in Colorado beetles (odour-conditioned positive anemotaxis), and increases the beetles' speed of locomotion (direct chem

  6. Volatile Organic Compounds from the Clone Populus x canadensis “Conti” Associated with Megaplatypus mutatus Attack

    Directory of Open Access Journals (Sweden)

    Alejandro Lucia

    2014-01-01

    Full Text Available Megaplatypus mutatus (Chapuis (Coleoptera, Platypodidae is an ambrosia beetle native to South America. It builds internal galleries that weaken the tree trunks, causing them severe stem breakage and mortality in commercial poplar plantations. The host selection by male M. mutatus has previously been correlated with the increasing diameter. This work explores the possibility that differential susceptibility of individual plants to M. mutatus could be associated with volatiles emitted. The comparison of the VOCs profiles of attacked and nonattacked P. x canadensis “Conti” 12 during M. mutatus flying season showed both qualitative and quantitative differences. The attacked plants, but not the nonattacked ones, showed the following compounds: a long chain aldehyde, α-ylangene, δ-cadinene, α-gurjunene, and β-cubebene; on the other side, β-sesquiphellandrene and β-chamigrene were detected only in nonattacked plants. α-Copaene is a common component of all the samples analyzed, but its proportion is increased in attacked individuals. Behavioral bioassays showed that males but not females M. mutatus are attracted to α-copaene. The relative increase of α-copaene in attacked individuals and the positive behavioral answer of males to it suggest that this compound could play a role in the orientation of the pioneer male towards the most suitable host.

  7. Developmental biology, polymorphism and ecological aspects of Stiretrus decemguttatus (Hemiptera, Pentatomidae, an important predator of cassidine beetles

    Directory of Open Access Journals (Sweden)

    Lucia Maria Paleari

    2013-03-01

    Full Text Available Developmental biology, polymorphism and ecological aspects of Stiretrus decemguttatus (Hemiptera, Pentatomidae, an important predator of cassidine beetles. Stiretrus decemguttatus is an important predator of two species of cassidine beetles, Botanochara sedecimpustulata (Fabricius, 1781 and Zatrephina lineata (Fabricius, 1787 (Coleoptera, Cassidinae, on the Marajó Island, Brazil. It attacks individuals in all development stages, but preys preferentially on late-instar larvae. Its life cycle in the laboratory was 43.70 ± 1.09 days, with an egg incubation period of six days and duration from nymph and adult stages of 16.31 ± 0.11 and 22.10 ± 1.67 days, respectively. The duration of one generation (T was 12.65 days and the intrinsic population growth rate (r 0.25. These data reveal the adjustment of the life cycle of S. decemgutattus with those of the two preys, but suggest greater impact on Z. lineata. However, no preference over cassidine species was shown in the laboratory. Up to 17 different color patterns can be found in adults of S. decemguttatus, based on combinations of three basic sets of color markings. Some of them resemble the markings of chrysomelids associated with Ipomoea asarifolia (Convolvulaceae and are possibly a mimetic ring. Three color patterns were identified in nymphs, none of which was associated with any specific adult color pattern.

  8. Potential New Associations of North American Parasitoids With the Invasive Asian Longhorned Beetle (Coleoptera: Cerambycidae) for Biological Control.

    Science.gov (United States)

    Duan, Jian J; Aparicio, Ellen; Tatman, Daria; Smith, Michael T; Luster, Doug G

    2016-04-01

    The Asian longhorned beetle, Anoplophora glabripennis (Motschulsky), is a polyphagous wood-boring insect native to Asia. Since it invaded North America in the 1990s, the beetle has been continuously targeted by quarantines and eradication programs in the United States and Canada. We examined the potential for development of new species-associations between A. glabripennis and hymenopteran parasitoids collected from cerambycids and other wood-boring insects infesting red maple (Acer rubrum L.) trees in the mid-Atlantic region of the United States. Results of our study showed that five groups of braconid parasitoids (Ontsira mellipes Ashmead, Rhoptrocentrus piceus Marsh, Spathius laflammei Provancher, Heterospilus spp., and Atanycolus spp.) successfully attacked early instars of A. glabripennis larvae infesting red maple logs and produced both male and female progenies. One species, O. mellipes, was continuously reared on A. glabripennis larvae inserted inside small red maple sticks for over 50 generations, and produced female-biased progeny (∼6:1 female to male ratio) at each generation. Continuous rearing of O. mellipes on A. glabripennis larvae did not significantly increase the parasitism and mean number of progeny produced per parasitized host. Together, these findings demonstrate that some North American parasitoids may be able to develop new associations with A. glabripennis and thus should be further studied under semifield or field conditions for possible use in biocontrol. PMID:26602779

  9. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  10. STUDIES ON SOME PHYSICOCHEMICAL PROPERTIES OF LEUCAENA LEUCOCEPHALA BARK GUM

    Directory of Open Access Journals (Sweden)

    Vijetha Pendyala

    2010-06-01

    Full Text Available Gum exudates from Leucaena Leucocephala (Family: Fabaceae plants grown all over India were investigated for its physicochemical properties such as pH, swelling capacity and viscosities at different temperatures using standard methods. Leucaena Leucocephala bark gum appeared to be colorless to reddish brown translucent tears. 5 % w/v mucilage has pH of 7.5 at 28°C. The gum is slightly soluble in water and practically insoluble in ethanol, acetone and chloroform. It swells to about 5 times its original weight in water. A 5 %w/v mucilage concentration gave a viscosity value which was unaffected at temperature ranges (28-40°C. At concentrations of 2 and 5 %w/v, the gum exhibited pseudo plastic flow pattern while at 10 %w/v concentration the flow behaviour was thixotropic. The results indicate that the swelling ability of Leucaena Leucocephala (LL bark gum may provide potentials for its use as a disintegrant in tablet formulation, as a hydro gel in modified release dosage forms and the rheological flow properties may also provide potentials for its use as suspending and emulsifying agents owing to its pseudo plastic and thixotropic flow patterns.

  11. Pharmaceutical and nutraceutical effects of Pinus pinaster bark extract.

    Science.gov (United States)

    Iravani, S; Zolfaghari, B

    2011-01-01

    In everyday life, our body generates free radicals and other reactive oxygen species which are derived either from the endogenous metabolic processes (within the body) or from external sources. Many clinical and pharmacological studies suggest that natural antioxidants can prevent oxidative damage. Among the natural antioxidant products, Pycnogenol(®) (French Pinus pinaster bark extract) has been received considerable attention because of its strong free radical-scavenging activity against reactive oxygen and nitrogen species. P. pinaster bark extract (PBE) contains polyphenolic compounds (these compounds consist of catechin, taxifolin, procyanidins of various chain lengths formed by catechin and epicatechin units, and phenolic acids) capable of producing diverse potentially protective effects against chronic and degenerative diseases. This herbal medication has been reported to have cardiovascular benefits, such as vasorelaxant activity, angiotensin-converting enzyme inhibiting activity, and the ability to enhance the microcirculation by increasing capillary permeability. Moreover, effects on the immune system and modulation of nitrogen monoxide metabolism have been reported. This article provides a brief overview of clinical studies describing the beneficial and health-promoting effects of PBE. PMID:22049273

  12. Anticonvulsant properties of saponins from Ficus platyphylla stem bark.

    Science.gov (United States)

    Chindo, Ben A; Anuka, Joseph A; McNeil, Lilly; Yaro, Abdullahi H; Adamu, Simon S; Amos, Samson; Connelly, William K; Lees, George; Gamaniel, Karniyus S

    2009-03-30

    Preparations of Ficus platyphylla have been used in Nigerian traditional medicine for the management of epilepsy for many years and their efficacy is widely acclaimed among the Hausa communities of northern Nigeria. The anticonvulsant properties of the saponin rich fraction (SFG) obtained from the methanol extract of F. platyphylla stem bark were studied on pentylenetetrazole-, strychnine- and maximal electroshock seizures in mice. Effects of SFG were also examined in murine models for neurological disease and on relevant in vitro targets for anticonvulsant drugs. SFG protected mice against pentylenetetrazole- and strychnine-induced seizures; and significantly delayed the onset of myoclonic jerks and tonic seizures. SFG failed to protect mice against maximal electroshock seizures at doses tested. SFG neither abolished the spontaneous discharges induced by 4-aminopyridine in a neonatal rat brain slice model of tonic-clonic epilepsy nor could it modulate chloride currents through GABA(A) receptor channel complex in cultured cortical cells. However, it was able to non-selectively suppress excitatory and inhibitory synaptic traffic, blocked sustained repetitive firing (SRF) and spontaneous action potential firing in these cultured cells. Our results provide scientific evidence that F. platyphylla stem bark may contain psychoactive principles with potential anticonvulsant properties. SFG impaired membrane excitability; a property shared by most anticonvulsants particularly the voltage-gated sodium channel (VGSC) blocking drugs, thus supporting the isolation and development of the saponin components of this plant as anticonvulsant agents.

  13. Studies on some physicochemical properties of Leucaena Leucocephala bark gum

    Directory of Open Access Journals (Sweden)

    Vijetha Pendyala

    2010-01-01

    Full Text Available Gum exudates from Leucaena Leucocephala (Family: Fabaceae plants grown all over India were investigated for its physicochemical properties such as pH, swelling capacity and viscosities at different temperatures using standard methods. Leucaena Leucocephala bark gum appeared to be colorless to reddish brown translucent tears. 5 % w/v mucilage has pH of 7.5 at 28°C. The gum is slightly soluble in water and practically insoluble in ethanol, acetone and chloroform. It swells to about 5 times its original weight in water. A 5 %w/ v mucilage concentration gave a viscosity value which was unaffected at temperature ranges (28-40°C. At concentrations of 2 and 5 %w/v, the gum exhibited pseudo plastic flow pattern while at 10 %w/v concentration the flow behaviour was thixotropic. The results indicate that the swelling ability of Leucaena Leucocephala (LL bark gum may provide potentials for its use as a disintegrant in tablet formulation, as a hydro gel in modified release dosage forms and the rheological flow properties may also provide potentials for its use as suspending and emulsifying agents owing to its pseudo plastic and thixotropic flow patterns.

  14. Polysaccharides with immunomodulating properties from the bark of Parkia biglobosa.

    Science.gov (United States)

    Zou, Yuan-Feng; Zhang, Bing-Zhao; Inngjerdingen, Kari Tvete; Barsett, Hilde; Diallo, Drissa; Michaelsen, Terje Einar; El-Zoubair, Elnour; Paulsen, Berit Smestad

    2014-01-30

    The bark of Parkia biglobosa is used in traditional medicine to cure a wide range of illnesses. Polysaccharides were extracted from the bark with 50% ethanol-water, 50°C and 100°C water, and seven active fractions obtained by anion exchange chromatography and gel filtration. The complement fixation and macrophage stimulating activities of the different fractions were determined. The acidic fractions PBEII-I and PBEII-IV were the most active in the complement fixation assay, but the other fractions were also potent compared to the positive control BPII from Biophytum petersianum. Fractions PBEII-I and PBEII-IV were also the most potent fractions in stimulating macrophages to release nitric oxide. Structural studies showed that PBEII-I and PBEII-IV were pectic type polysaccharides, containing arabinogalactan type II structures. The observed differences in biological activities among the seven purified polysaccharide sub-fractions are probably due to differences in monosaccharide compositions, linkage types and molecular sizes.

  15. IN VITRO ANTIINFLAMMATORY ACTIVITY OF FICUS BENGHALENSIS BARK

    Directory of Open Access Journals (Sweden)

    Matpal Mahesh

    2013-07-01

    Full Text Available To evaluate the anti-inflammatory property of the different extract of bark of Ficus benghalensis, family Moraceae is a very large, fast growing, evergreen tree up to 30 meters, with spreading branches and many aerial roots. Leaves stalked, ovate-cordate, 3-nerved, entire, when young downy on both sides; petiole with a broad smooth greasy gland at the apex, compressed, downy; Fruit in axillary pairs, the size of a cherry, round and downy. According to Ayurveda, it is astringent to bowels; useful in treatment of biliousness, ulcers, erysipelas, vomiting, vaginal complains, fever, inflammations, leprosy. According to Unani system of medicine, its latex is aphrodisiac, tonic, vulernary, maturant, lessens inflammations; useful in piles etc. The present study aimed at the evaluation of anti-inflammatory property of the aqueous, chloroform and alcoholic extracts of the bark by in vitro methods. In vitro method was estimated by human red blood cell membrane stabilization (HRBC method. Results showed significant anti-inflammatory property of the different extracts tested. The methanolic extract at a concentration of 200 mg/ml. showed potent activity on comparing with the standard drug diclofenac sodium.

  16. Automated Detection System for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Dr K.V.N.Sunitha

    2010-10-01

    Full Text Available Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input users provide. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQLIA based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.

  17. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    R.J.J.H. van Son

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  18. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  19. DNA barcoding of Japanese click beetles (Coleoptera, Elateridae).

    Science.gov (United States)

    Oba, Yuichi; Ôhira, Hitoo; Murase, Yukio; Moriyama, Akihiko; Kumazawa, Yoshinori

    2015-01-01

    Click beetles (Coleoptera: Elateridae) represent one of the largest groups of beetle insects. Some click beetles in larval form, known as wireworms, are destructive agricultural pests. Morphological identification of click beetles is generally difficult and requires taxonomic expertise. This study reports on the DNA barcoding of Japanese click beetles to enable their rapid and accurate identification. We collected and assembled 762 cytochrome oxidase subunit I barcode sequences from 275 species, which cover approximately 75% of the common species found on the Japanese main island, Honshu. This barcode library also contains 20 out of the 21 potential pest species recorded in Japan. Our analysis shows that most morphologically identified species form distinct phylogenetic clusters separated from each other by large molecular distances. This supports the general usefulness of the DNA barcoding approach for quick and reliable identification of Japanese elaterid species for environmental impact assessment, agricultural pest control, and biodiversity analysis. On the other hand, the taxonomic boundary in dozens of species did not agree with the boundary of barcode index numbers (a criterion for sequence-based species delimitation). These findings urge taxonomic reinvestigation of these mismatched taxa.

  20. Flow Visualization of Rhinoceros Beetle (Trypoxylus dichotomus) in Free Flight

    Institute of Scientific and Technical Information of China (English)

    Tien Van Truong; Tuyen Quang Le; Hieu Trung Tran; Hoon Cheol Park; Kwang Joon Yoon; Doyoung Byun

    2012-01-01

    Aerodynamic characteristics of the beetle,Trypoxylus dichotomus,which has a pair of elytra (forewings) and flexible hind wings,are investigated.Visualization experiments were conducted for various flight conditions of a beetle,Trypoxylus dichotomus:free,tethered,hovering,forward and climbing flights.Leading edge,trailing edge and tip vortices on both wings were observed clearly.The leading edge vortex was stable and remained on the top surface of the elytron for a wide interval during the downstroke of free forward flight.Hence,the elytron may have a considerable role in lift force generation of the beetle.In addition,we reveal a suction phenomenon between the gaps of the hind wing and the elytron in upstroke that may improve the positive lift force on the hind wing.We also found the reverse clap-fling mechanism of the T.dichotomus beetle in hovering flight.The hind wings touch together at the beginning of the upstroke.The vortex generation,shedding and interaction give a better understanding of the detailed aerodynamic mechanism of beetle flight.

  1. Dung beetles use the Milky Way for orientation.

    Science.gov (United States)

    Dacke, Marie; Baird, Emily; Byrne, Marcus; Scholtz, Clarke H; Warrant, Eric J

    2013-02-18

    When the moon is absent from the night sky, stars remain as celestial visual cues. Nonetheless, only birds, seals, and humans are known to use stars for orientation. African ball-rolling dung beetles exploit the sun, the moon, and the celestial polarization pattern to move along straight paths, away from the intense competition at the dung pile. Even on clear moonless nights, many beetles still manage to orientate along straight paths. This led us to hypothesize that dung beetles exploit the starry sky for orientation, a feat that has, to our knowledge, never been demonstrated in an insect. Here, we show that dung beetles transport their dung balls along straight paths under a starlit sky but lose this ability under overcast conditions. In a planetarium, the beetles orientate equally well when rolling under a full starlit sky as when only the Milky Way is present. The use of this bidirectional celestial cue for orientation has been proposed for vertebrates, spiders, and insects, but never proven. This finding represents the first convincing demonstration for the use of the starry sky for orientation in insects and provides the first documented use of the Milky Way for orientation in the animal kingdom.

  2. Coarse woody material has value as habitat for saproxylic beetles

    Energy Technology Data Exchange (ETDEWEB)

    Wood, C.M.; Spence, J.R. [Alberta Univ., Edmonton, AB (Canada). Dept of Renewable Resources; Langor, D.W. [Canadian Forest Service, Northern Forestry Centre, Edmonton, AB (Canada)

    2010-07-01

    Biomass harvesting practices are expected to alter the abundance and natural range of variation in coarse woody material (CWM), which in turn may change soil productivity as well as the hydrological balance and structure of tree stands and habitats needed to ensure forest biodiversity. Ecosystem sustainability should be a main criterion for the development of biomass energy production schemes. Studies in northern Europe indicate that the hyperdiverse saproxylic fauna is sensitive to changes in CWM. Saproxylic beetles are dependent on decaying wood, and play an important role in forest nutrient cycling. Approximately 11 per cent of European saproxylic beetles are at risk of regional extirpation. This study sampled saproxylic beetle species from CWM in mature trembling aspen stands in Alberta. Over 150 species were collected, including 4 species new to science. The study showed that the beetles use numerous CWM habitats and exhibit high habitat specificity. A diversity of CWM substrates are needed to maintain saproxylic beetle habitats. Further research is needed to minimize the loss of species and their ecosystem functions.

  3. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  4. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  5. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  6. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  7. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  8. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  9. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  10. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  11. Research on First Attack Probability Model of an Attacker Level Bombing Anti-air Radars

    Institute of Scientific and Technical Information of China (English)

    LUO Peng-cheng; MU Fu-ling; ZHOU Jing-lun

    2007-01-01

    The paper mainly studies the first attack probability (FAP) of an attacker level bombing anti-air radars through analyzing the radiant point orientation and attack (RPOA) process of attackers. Firstly, the searching target process is analyzed, and a corresponding target finding model is brought forward. Secondly, the target approaching process is concretely analyzed when the attacker levelly bombs the anti-air radar, and a corresponding target approaching model is presented. Finally, a demonstration is given to analyze the major factors in the model and prove its validity.

  12. An Network Attack Modeling Method Based on MLL-AT

    Science.gov (United States)

    Fen, Yan; Xinchun, Yin; Hao, Huang

    In this paper, the method of modeling attack using attack tree is researched. The main goal is effectively using attack tree to model and express multi-stage network attacks. We expand and improve the traditional attack tree. The attack nodes in traditional attack tree are redefined, and the attack risk of leaf node is quantified. On those basis, the mentality and method of building MLL-AT (Multi-Level & Layer Attack Tree) are proposed. The improved attack tree can model attack more accurately, in particular to multi-stage network attacks. And the new model can also be used to evaluate system's risk, to distinguish between varying system security threat degrees caused by different attack sequences.

  13. Marking small hive beetles with thoracic notching: effects on longevity, flight ability and fecundity

    OpenAIRE

    De Guzman, Lilia; Frake, Amanda; Rinderer, Thomas

    2012-01-01

    International audience We tested two marking techniques for adult small hive beetles (SHB): dusting and thoracic notching. The use of blue and red chalk dusts to mark beetles was not persistent and caused early death of SHB with an average survival of 52.6 ± 23.8 and 13.9 ± 7.3 days, respectively. In contrast, notched beetles survived longer (mean = 353.6 ± 5.3 days) with the last beetle dying after 383 days. Likewise, notched beetles (presumed to be injured because of oozing hemolymph fro...

  14. Micro-structure and frictional characteristics of beetle's joint

    Institute of Scientific and Technical Information of China (English)

    DAI Zhendong; Stanislav N. Gorb

    2004-01-01

    Geometric and micro-structure design, tribology properties of beetle joints were experimentally studied, which aimed to enlighten ideas for the joint design of MEMS.The observation by using SEM and microscopy suggested that beetle's joints consist of a concave surface matched with a convex surface. The heads of the beetles, rubbing with flat glass, were tested in fresh and dried statuses and compared with sapphire ball with flat glass. Frictional coefficient of the joint material on glass was significantly lower than that of the sapphire sphere on glass. The material of the joint cuticle for convex surface is rather stiff (the elastic modulus 4.5 Gpa) and smooth. The surface is hydrophobic (the contact angle of distilled water was 88.3° ). It is suggested here that the high stiffness of the joint material and hydrophobicity of the joint surface are parts of the mechanism minimizing friction in insect joints.

  15. The alternative Pharaoh approach: stingless bees mummify beetle parasites alive

    Science.gov (United States)

    Greco, Mark K.; Hoffmann, Dorothee; Dollin, Anne; Duncan, Michael; Spooner-Hart, Robert; Neumann, Peter

    2010-03-01

    Workers from social insect colonies use different defence strategies to combat invaders. Nevertheless, some parasitic species are able to bypass colony defences. In particular, some beetle nest invaders cannot be killed or removed by workers of social bees, thus creating the need for alternative social defence strategies to ensure colony survival. Here we show, using diagnostic radioentomology, that stingless bee workers ( Trigona carbonaria) immediately mummify invading adult small hive beetles ( Aethina tumida) alive by coating them with a mixture of resin, wax and mud, thereby preventing severe damage to the colony. In sharp contrast to the responses of honeybee and bumblebee colonies, the rapid live mummification strategy of T. carbonaria effectively prevents beetle advancements and removes their ability to reproduce. The convergent evolution of mummification in stingless bees and encapsulation in honeybees is another striking example of co-evolution between insect societies and their parasites.

  16. Black pine (Pinus nigra) barks as biomonitors of airborne mercury pollution.

    Science.gov (United States)

    Chiarantini, Laura; Rimondi, Valentina; Benvenuti, Marco; Beutel, Marc W; Costagliola, Pilario; Gonnelli, Cristina; Lattanzi, Pierfranco; Paolieri, Mario

    2016-11-01

    Tree barks are relevant interfaces between plants and the external environment, and can effectively retain airborne particles and elements at their surface. In this paper we have studied the distribution of mercury (Hg) in soils and in black pine (Pinus nigra) barks from the Mt. Amiata Hg district in southern Tuscany (Italy), where past Hg mining and present-day geothermal power plants affect local atmospheric Hg concentration, posing serious environmental concerns. Barks collected in heavily Hg-polluted areas of the district display the highest Hg concentration ever reported in literature (8.6mg/kg). In comparison, barks of the same species collected in local reference areas and near geothermal power plants show much lower (range 19-803μg/kg) concentrations; even lower concentrations are observed at a "blank" site near the city of Florence (5-98μg/kg). Results show a general decrease of Hg concentration from bark surface inwards, in accordance with a deposition of airborne Hg, with minor contribution from systemic uptake from soils. Preliminary results indicate that bark Hg concentrations are comparable with values reported for lichens in the same areas, suggesting that tree barks may represent an additional useful tool for biomonitoring of airborne Hg. PMID:27341111

  17. Enhancing the hydrophobicity of mangrove bark by esterification for oil adsorption.

    Science.gov (United States)

    Asadpour, Robabeh; Sapari, Nasiman Bin; Isa, Mohamed Hasnain; Orji, Kalu Uka

    2014-01-01

    Oil spills generally cause worldwide concern due to their detrimental effects on the environment and the economy. An assortment of commercial systems has been developed to control these spills, including the use of agricultural wastes as sorbents. This work deals with raw and modified mangrove barks (Rhizophora apiculata), an industrial lignocellulosic waste, as a low cost adsorbent for oil-product-spill cleanup in the aquatic environment. Mangrove bark was modified using fatty acids (oleic acid and palmitic acid) to improve its adsorption capacity. The oil sorption capacity of the modified bark was studied and compared with that of the raw bark. Kinetic tests were conducted with a series of contact times. The influence of particle size, oil dosage, pH and temperature on oil sorption capacity was investigated. The results showed that oleic acid treated bark has a higher sorption capacity (2,860.00 ± 2.00 mg/g) than untreated bark for Tapis crude oil. A correlation between surface functional groups, morphology and surface area of the adsorbent was studied by Fourier transform infrared spectrum, field emission scanning electron microscopy images and Brunauer-Emmett-Teller analysis. Isotherm study was conducted using the Langmuir and Freundlich isotherm models. The result showed that adsorption of crude oil on treated mangrove bark could be best described by the Langmuir model. PMID:25325547

  18. Physiological resistance of grasshopper mice (Onychomys spp.) to Arizona bark scorpion (Centruroides exilicauda) venom.

    Science.gov (United States)

    Rowe, Ashlee H; Rowe, Matthew P

    2008-10-01

    Predators feeding on toxic prey may evolve physiological resistance to the preys' toxins. Grasshopper mice (Onychomys spp.) are voracious predators of scorpions in North American deserts. Two species of grasshopper mice (Onychomys torridus and Onychomys arenicola) are broadly sympatric with two species of potentially lethal bark scorpion (Centruroides exilicauda and Centruroides vittatus) in the Sonoran and Chihuahuan deserts, respectively. Bark scorpions produce toxins that selectively bind sodium (Na(+)) and potassium (K(+)) ion channels in vertebrate nerve and muscle tissue. We previously reported that grasshopper mice showed no effects of bark scorpion envenomation following natural stings. Here we conducted a series of toxicity tests to determine whether grasshopper mice have evolved resistance to bark scorpion neurotoxins. Five populations of grasshopper mice, either sympatric with or allopatric to bark scorpions, were injected with bark scorpion venom; LD50s were estimated for each population. All five populations of grasshopper mice demonstrated levels of venom resistance greater than that reported for non-resistant Mus musculus. Moreover, venom resistance in the mice showed intra- and interspecific variability that covaried with bark scorpion sympatry and allopatry, patterns consistent with the hypothesis that venom resistance in grasshopper mice is an adaptive response to feeding on their neurotoxic prey. PMID:18687353

  19. Development and characterization of ice cream enriched with different formulations flour jabuticaba bark (Myrciaria cauliflora

    Directory of Open Access Journals (Sweden)

    Marina Leopoldina Lamounier

    2015-09-01

    Full Text Available The aim was to perform the physicochemical characterization of the flour from the bark of jabuticaba, as well as developing three ice cream formulations (enriched with 0, 5 and 10% of this flour and evaluate the physicochemical and sensory characteristics. Fruits were pulped, the peels were dehydrated, dried, crushed and sieved to obtain the flour that was analyzed for physicochemical levels. Then, three ice cream formulations were developed (with 0%, 5% and 10% flour from the bark of jabuticaba, considering the physicochemical and sensorial characteristics. The results showed that the flour from the bark of jabuticaba showed high ash and fiber. The ice creams showed differences (p < 0.05 for pH, titratable acidity, moisture and ash due to the incorporation of flour from the bark of jabuticaba. The only attribute that did not differ (p > 0.05 was soluble solid. The overrun was ecreasing with increasing addition of flour. In the sensory evaluation, only attributes that differ (p < 0.05 were flavor, texture and overall appearance of the formulation with 10% flour from the bark of jabuticaba, which represents that incorporation of 5% flour from the bark of jabuticaba did not affect the cceptability of ice creams. It can be concluded that the enrichment of blemish bark flour provides edible ice increase in nutritional value without affecting the sensory characteristics at the level of 5% added.

  20. Evaluating leaf litter beetle data sampled by Winkler extraction from Atlantic forest sites in southern Brazil

    Directory of Open Access Journals (Sweden)

    Philipp Werner Hopp

    2011-06-01

    Full Text Available Evaluating leaf litter beetle data sampled by Winkler extraction from Atlantic forest sites in southern Brazil. To evaluate the reliability of data obtained by Winkler extraction in Atlantic forest sites in southern Brazil, we studied litter beetle assemblages in secondary forests (5 to 55 years after abandonment and old-growth forests at two seasonally different points in time. For all regeneration stages, species density and abundance were lower in April compared to August; but, assemblage composition of the corresponding forest stages was similar in both months. We suggest that sampling of small litter inhabiting beetles at different points in time using the Winkler technique reveals identical ecological patterns, which are more likely to be influenced by sample incompleteness than by differences in their assemblage composition. A strong relationship between litter quantity and beetle occurrences indicates the importance of this variable for the temporal species density pattern. Additionally, the sampled beetle material was compared with beetle data obtained with pitfall traps in one old-growth forest. Over 60% of the focal species captured with pitfall traps were also sampled by Winkler extraction in different forest stages. Few beetles with a body size too large to be sampled by Winkler extraction were only sampled with pitfall traps. This indicates that the local litter beetle fauna is dominated by small species. Hence, being aware of the exclusion of large beetles and beetle species occurring during the wet season, the Winkler method reveals a reliable picture of the local leaf litter beetle community.

  1. Cork oak vulnerability to fire: the role of bark harvesting, tree characteristics and abiotic factors.

    Directory of Open Access Journals (Sweden)

    Filipe X Catry

    Full Text Available Forest ecosystems where periodical tree bark harvesting is a major economic activity may be particularly vulnerable to disturbances such as fire, since debarking usually reduces tree vigour and protection against external agents. In this paper we asked how cork oak Quercus suber trees respond after wildfires and, in particular, how bark harvesting affects post-fire tree survival and resprouting. We gathered data from 22 wildfires (4585 trees that occurred in three southern European countries (Portugal, Spain and France, covering a wide range of conditions characteristic of Q. suber ecosystems. Post-fire tree responses (tree mortality, stem mortality and crown resprouting were examined in relation to management and ecological factors using generalized linear mixed-effects models. Results showed that bark thickness and bark harvesting are major factors affecting resistance of Q. suber to fire. Fire vulnerability was higher for trees with thin bark (young or recently debarked individuals and decreased with increasing bark thickness until cork was 3-4 cm thick. This bark thickness corresponds to the moment when exploited trees are debarked again, meaning that exploited trees are vulnerable to fire during a longer period. Exploited trees were also more likely to be top-killed than unexploited trees, even for the same bark thickness. Additionally, vulnerability to fire increased with burn severity and with tree diameter, and was higher in trees burned in early summer or located in drier south-facing aspects. We provided tree response models useful to help estimating the impact of fire and to support management decisions. The results suggested that an appropriate management of surface fuels and changes in the bark harvesting regime (e.g. debarking coexisting trees in different years or increasing the harvesting cycle would decrease vulnerability to fire and contribute to the conservation of cork oak ecosystems.

  2. Cork oak vulnerability to fire: the role of bark harvesting, tree characteristics and abiotic factors.

    Science.gov (United States)

    Catry, Filipe X; Moreira, Francisco; Pausas, Juli G; Fernandes, Paulo M; Rego, Francisco; Cardillo, Enrique; Curt, Thomas

    2012-01-01

    Forest ecosystems where periodical tree bark harvesting is a major economic activity may be particularly vulnerable to disturbances such as fire, since debarking usually reduces tree vigour and protection against external agents. In this paper we asked how cork oak Quercus suber trees respond after wildfires and, in particular, how bark harvesting affects post-fire tree survival and resprouting. We gathered data from 22 wildfires (4585 trees) that occurred in three southern European countries (Portugal, Spain and France), covering a wide range of conditions characteristic of Q. suber ecosystems. Post-fire tree responses (tree mortality, stem mortality and crown resprouting) were examined in relation to management and ecological factors using generalized linear mixed-effects models. Results showed that bark thickness and bark harvesting are major factors affecting resistance of Q. suber to fire. Fire vulnerability was higher for trees with thin bark (young or recently debarked individuals) and decreased with increasing bark thickness until cork was 3-4 cm thick. This bark thickness corresponds to the moment when exploited trees are debarked again, meaning that exploited trees are vulnerable to fire during a longer period. Exploited trees were also more likely to be top-killed than unexploited trees, even for the same bark thickness. Additionally, vulnerability to fire increased with burn severity and with tree diameter, and was higher in trees burned in early summer or located in drier south-facing aspects. We provided tree response models useful to help estimating the impact of fire and to support management decisions. The results suggested that an appropriate management of surface fuels and changes in the bark harvesting regime (e.g. debarking coexisting trees in different years or increasing the harvesting cycle) would decrease vulnerability to fire and contribute to the conservation of cork oak ecosystems.

  3. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  4. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  5. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  6. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  7. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  8. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  9. Attack detection in unattended sensor networks

    Science.gov (United States)

    Wu, Curt; Monnier, Camille; Fry, Gerald; Girod, Lewis; Luke, Jahn

    2010-04-01

    Because sensor networks are often deployed in hostile environments where their security and integrity may be compromised, it is essential to maximize the reliability and trustworthiness of existing and envisioned sensor networks. During operations, the sensor network must be robust to deception, node compromise, and various other attacks, while maintaining the operator's situational awareness regarding the health and integrity of the system. To address these needs, we have designed a Framework to Ensure and Assess Trustworthiness in Sensor systems (FEATS) to identify attacks on sensor system integrity and inform the operator of sensor data trustworthiness. We have developed and validated unsupervised anomaly detection algorithms for sensor data captured from an experimental acoustic sensor platform under a number of attack scenarios. The platform, which contains four audio microphones, was exposed to two physical attacks (audio filtering and audio playback) as well as a live replay attack (replaying live audio data that is captured at a remote location), which is analogous to a wormhole attack in the routing layer. With our unsupervised learning algorithms, we were able to successfully identify the presence of various attacks.

  10. Lost Books: Abbess Hildelith and the Literary Culture of Barking Abbey.

    OpenAIRE

    Watt, D

    2012-01-01

    This article explores the literary culture of Barking Abbey, a vital centre of Anglo-Saxon learning, when it was under the rule of its second abbess, Hildelith, in the late seventh and early eighth century. Particular attention is given to the intersection of lived practice at Barking and the literary record, focusing on three pieces of evidence: Bede’s account of the early history of Barking in his Ecclesiastical History, written in 731; Aldhelm’s De Virginitate (c.675-680), which was writte...

  11. Energy capacity of black wattle wood and bark in different spacing plantations

    Directory of Open Access Journals (Sweden)

    Elder Eloy

    2015-06-01

    Full Text Available The study aimed at the energetic description of wood and bark biomass of Acacia mearnsii De Wild. in two spacing plantations: 2.0 m × 3.0 m × 1.0 m and 1.5 m, during 36 months after the planting. The experiment was conducted in the municipality of Frederico Westphalen, state of Rio Grande do Sul, Brazil. Biomass (BIO, calorific value, basic density, ash content, volatile matter and fixed carbon content and energy density (ED of wood and bark were determined. The smallest spacing plantation presented the highest production per unit area of BIO and ED of wood and bark.

  12. Assessment of Alder Tree Bark Potential as a Renewable Source of Proanthocyanidins in Latvia

    Directory of Open Access Journals (Sweden)

    Janceva Sarmīte

    2016-05-01

    Full Text Available With the purpose to assess potential of alder tree bark as a renewable source of bioactive polyphenolic compounds, antioxidant properties of hydrophilic extracts and proanthocyanidins (PAC isolated from bark of two alder species (grey alder and black alder growing in Latvia have been examined employing two test systems, ABTS●+, DPPH● assays. In the tests the high free radical scavenging capacities of the PAC were demonstrated. The polyphenolic nature of the bark PAC opens the possibility of its application as food additive. The PAC has good potential as an antioxidant for mayonnaise.

  13. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  14. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  15. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  16. Who Is at Risk for a Heart Attack?

    Science.gov (United States)

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  17. Antiplasmodial compounds from Cassia siamea stem bark extract.

    Science.gov (United States)

    Ajaiyeoba, E O; Ashidi, J S; Okpako, L C; Houghton, P J; Wright, C W

    2008-02-01

    Cassia siamea L. (Fabaceae) was identified from the southwest Nigerian ethnobotany as a remedy for febrile illness. This led to the bioassay-guided fractionation of stem bark of the plant extract, using the parasite lactate dehydrogenase assay and multi-resistant strain of Plasmodium falciparum (K1) for assessing the in vitro antimalarial activity. Emodin and lupeol were isolated from the ethyl acetate fraction by a combination of chromatographic techniques. The structures of the compounds were determined by spectroscopy, co-spotting with authentic samples and comparison with literature data. Both compounds were found to be the active principles responsible for the antiplasmodial property with IC(50) values of 5 microg/mL, respectively. PMID:17705142

  18. Condensed tannins from the bark of Guazuma ulmifolia Lam. (Sterculiaceae)

    International Nuclear Information System (INIS)

    From the bark of Guazuma ulmifolia Lam. (Sterculiaceae), nine compounds were isolated and identified: ent-catechin, epicatechin, ent-gallocatechin, epigallocatechin, epiafzelechin-(4β?8)-epicatechin, epicatechin-(4β?8)-catechin (procyanidin B1), epicatechin-(4β?8)-epicatechin (procyanidin B2), epicatechin-(4β?8)-epigallocatechin, and the new compound 4'-O-methyl-epiafzelechin. Their structures were elucidated on the basis of spectral and literature data. HPLC fingerprint analysis of the semipurified extract was performed on a C18 column, with a mixture of acetonitrile (0.05% trifluoroacetic acid):water (0.05% trifluoroacetic acid) (v/v) with a flow rate of 0.8 mL min-1. The sample injection volume was 100 μL and the wavelength was 210 nm. (author)

  19. Condensed tannins from the bark of Guazuma ulmifolia Lam. (Sterculiaceae)

    Energy Technology Data Exchange (ETDEWEB)

    Lopes, Gisely C.; Rocha, Juliana C.B.; Mello, Joao C.P. de [Universidade Estadual de Maringa (UEM), PR (Brazil). Programa de Pos-graduacao em Ciencias Farmaceuticas], e-mail: mello@uem.br; Almeida, Glalber C. de [Universidade Estadual de Maringa (UEM), PR (Brazil)

    2009-07-01

    From the bark of Guazuma ulmifolia Lam. (Sterculiaceae), nine compounds were isolated and identified: ent-catechin, epicatechin, ent-gallocatechin, epigallocatechin, epiafzelechin-(4{beta}?8)-epicatechin, epicatechin-(4{beta}?8)-catechin (procyanidin B1), epicatechin-(4{beta}?8)-epicatechin (procyanidin B2), epicatechin-(4{beta}?8)-epigallocatechin, and the new compound 4'-O-methyl-epiafzelechin. Their structures were elucidated on the basis of spectral and literature data. HPLC fingerprint analysis of the semipurified extract was performed on a C18 column, with a mixture of acetonitrile (0.05% trifluoroacetic acid):water (0.05% trifluoroacetic acid) (v/v) with a flow rate of 0.8 mL min-1. The sample injection volume was 100 {mu}L and the wavelength was 210 nm. (author)

  20. ANTIOXIDANT, CYTOTOXIC AND ANTIMICROBIAL ACTIVITY OF SONNERATIA ALBA BARK

    Directory of Open Access Journals (Sweden)

    Md. Ali Milon*1, Md. Abdul Muhit , Durajan Goshwami , Mohammad Mehedi Masud and Bilkis Begum

    2012-07-01

    Full Text Available The present study was undertaken to evaluate antioxidant, cytotoxic and antimicrobial activity of Sonneratia alba bark. The carbon tetrachloride, chloroform soluble partitionate of methanolic extract and crude methanolic extract showed significant antioxidant property using 1,1-diphenyl-2-pecrylhydrazyl(DPPH scavenging assay ,of which chloroform partitionate and crude extract demonstrated highest activity with IC50 value of 12µg/ml and 14µg/ml respectively. In the brine shrimp lethality bioassay, LC50 values obtained from the best fit line slope were 0.812, 14.94, 0.831 and 3.288 µg/ml for standard (Vincristine sulphate, n-Hexane, carbon tetrachloride and chloroform soluble partitionate of methanolic extract respectively. The carbon tetrachloride soluble fraction revealed moderate activities against Bacillus cereus, Bacillus subtilis, Sarcina lutea, Pseudomonas aeruginosa and Shigella dysenteriae test organisms.

  1. Influence of Metals on Lindane Adsorption onto Pine Bark

    International Nuclear Information System (INIS)

    Some persistent pesticides, as organochlorines, are not efficiently removed from usual wastewater treatment plants, unless a tertiary treatment, commonly activated carbon adsorption, is applied. The downside of this practice rests on its high regeneration costs. This fact motivated the research for alternative processes involving the use of natural materials. Pine bark was used in this work, to remove lindane from contaminated waters. The adsorptive capabilities of this material were studied (equilibrium time, adsorption model and saturation of the adsorbent) and the interference of some metals (iron, cadmium, copper, nickel and lead) was also investigated. Results showed an excellent efficiency of adsorption (average 80,65%) and that the presence of the studied metals did not affect both efficiency and the model of the adsorption, within the range of the concentration of the pesticide studied

  2. Nitric oxide inhibitory constituents from the barks of Cinnamomum cassia.

    Science.gov (United States)

    He, Shan; Zeng, Ke-Wu; Jiang, Yong; Tu, Peng-Fei

    2016-07-01

    Six new compounds including one γ-butyrolactone, cinncassin A (1), two tetrahydrofuran derivatives, cinncassins B and C (2, 3), two lignans, cinncassins D and E (4, 5), and one phenylpropanol glucoside, cinnacassoside D (6), together with 14 known lignans (7-20) were isolated from the barks of Cinnamomum cassia. The structures of 1-6 were elucidated by extensive 1D and 2D NMR spectroscopic data analysis as well as chemical methods, and the absolute configurations were established by experimental and calculated ECD data. The anti-inflammatory activities of the isolates were evaluated on nitric oxide (NO) production in lipopolysaccharide (LPS)-induced BV-2 microglial cells. Compounds 5, 7, 8, and 15 showed potent inhibition activities with IC50 values of 17.6, 17.7, 18.7, and 17.5μM, respectively. PMID:27223848

  3. TANNIN CONTENT DETERMINATION IN THE BARK OF Eucalyptus spp

    Directory of Open Access Journals (Sweden)

    Paulo Fernando Trugilho

    2003-07-01

    Full Text Available The objective of this study was to determine the tannin contents in the bark oftwenty-five species of Eucalyptus through two extraction methods, one using hot water andthe other a sequence of toluene and ethanol. The results showed that the extraction methodspresented significant differences in the tannin contents. The method using the sequencetoluene and ethanol, for most of the species, promoted a larger extraction of tannin. The hotwater method presented higher contents of tannin for Eucalyptus cloeziana (40,31%,Eucalyptus melanophoia (20,49% and Eucalyptus paniculata (16,03%. In the toluene andethanol method the species with higher tannin content was Eucalyptus cloeziana (31,00%,Eucalyptus tereticornis (22,83% and Eucalyptus paniculata (17,64%. The Eucalyptuscloeziana presented great potential as commercial source of tannin, independent of theextraction method considered.

  4. Spruce Beetle Biology, Ecology and Management in the Rocky Mountains: An Addendum to Spruce Beetle in the Rockies

    OpenAIRE

    Jenkins, Michael J; Hebertson, Elizabeth G; A. Steven Munson

    2014-01-01

    Spruce beetle outbreaks have been reported in the Rocky Mountains of western North America since the late 1800s. In their classic paper, Spruce Beetle in the Rockies, Schmid and Frye reviewed the literature that emerged from the extensive outbreaks in Colorado in the 1940s. A new wave of outbreaks has affected Rocky Mountain subalpine spruce-fir forests beginning in the mid-1980s and continuing to the present. These outbreaks have spurred another surge of basic and applied research in the bio...

  5. Installations of SNCR on bark-fired boilers

    International Nuclear Information System (INIS)

    Experience has been collected from the twelve bark-fired boilers in Sweden with selective non catalytic reduction (SNCR) installations to reduce emissions of nitrogen oxides. Most of the boilers have slope grates, but there are also two boilers with cyclone ovens and two fluidized bed boilers. In addition to oil there are also possibilities to burn other fuel types in most boilers, such as sludge from different parts of the pulp and paper mills, saw dust and wood chips. The SNCR installations seems in general to be of simple design. In most installations the injection nozzles are located in existing holes in the boiler walls. The availability is reported to be good from several of the SNCR installations. There has been tube leakage in several boilers. The urea system has resulted in corrosion and in clogging of one oil burner. This incident has resulted in a decision not to use SNCR system with the present design of the system. The fuel has also caused operational problems with the SNCR system in several of the installations due to variations in the moisture content and often high moisture content in bark and sludge, causing temperature variations. The availability is presented to be high for the SNCR system at several of the plants, in two of them about 90 %. The results in NOx reduction vary between the installations depending on boiler, fuel and operation. The emissions are between 45 and 100 mg NO2/MJ fuel input and the NOx reduction rates are in most installations between 30 and 40 %, the lowest 20 and the highest 70 %. 13 figs, 3 tabs

  6. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    OpenAIRE

    Patel, A K; Jaypalsinh. A. Gohil; D.T. Meva

    2010-01-01

    Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between commun...

  7. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  8. SQL INJECTION ATTACK DETECTION AND PREVENTION

    Directory of Open Access Journals (Sweden)

    Dr. SUNITHA ABBURU

    2012-04-01

    Full Text Available Nowadays SQL injection attacks (SQLIAs and cross scripting increased in real web applications very much, and the SQL injection attacks damages the databases through web applications. Injection queries are different type of way to attack the databases. This paper address the issue of SQLIA’s and script in an efficient way. The proposed approach detects and prevents all the Injection queries as well as the cross scripting through the Framework and Static analysis and Dynamic analysis. The contribution is twofold 1. SQL Injection AttackDetection and prevention 2. SQL Injection Reports. These techniques have been implemented in ASP.Net and SQL Server and tested by conducting various experiments and prove that the web applications and database is protected from scripting and SQL injection queries.

  9. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  10. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  11. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  12. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  13. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  14. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  15. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  16. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  17. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  18. Karachi Commander Escapes Attack, 10 Dead

    Institute of Scientific and Technical Information of China (English)

    潘志强

    2004-01-01

    KARACHI: The army commander in the Pakistani city of Karachi narrowly① escaped assassination② yesterday when gunmen attacked his convoy③ with gunfire and a bomb, killing at least 10 and wounding his driver, officials said.

  19. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  20. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts