WorldWideScience

Sample records for gall midge attack

  1. Meadow-grass gall midge

    DEFF Research Database (Denmark)

    Hansen, Lars Monrad

    The area with meadow-grass (Poa pratensis, L.) grown for seed production in Den-mark is a significant proportion of the entire seed production. The meadow-grass gall midge (Mayetiola schoberi, Barnes 1958) is of considerable economic importance since powerful attacks can reduce the yield...

  2. New gall midges (Diptera, Cecidomyiidae) associated with Eugenia uniflora and Psidium cattleianum (Myrtaceae)

    OpenAIRE

    Maia,Valéria C; Nava,Dori E

    2011-01-01

    Two new species and a new genus of gall midges (Diptera, Cecidomyiidae) are described and illustrated. Both species induce leaf galls on Myrtaceae, the former on Eugenia uniflora and the latter on Psidium cattleianum.

  3. Gall midges (Diptera: Cecidomyiidae) new to the Danish fauna

    DEFF Research Database (Denmark)

    Haarder, Simon; Bruun, Hans Henrik; Harris, Keith M.

    2016-01-01

    First records of twenty-three gall midge species in Denmark are reported: Asphondylia ervi Rübsaamen, Contarinia acetosellae Rübsaamen, C. viburnorum Kieffer, Dasineura astragalorum (Kieffer), D. fructum (Rübsaamen), D. harrisoni (Bagnall), D. lotharingiae (Kieffer), D. papaveris (Winnertz), D...

  4. Size, age and composition: characteristics of plant taxa as diversity predictors of gall-midges (Diptera: Cecidomyiidae

    Directory of Open Access Journals (Sweden)

    Walter S Araújo

    2011-12-01

    Full Text Available Many hypotheses have been proposed to explain the diversity of gall-midge insects (Diptera: Cecidomyiidae, some of them taking into account plant diversity. This study aims to test the importance of size, age and composition of host plant taxa in the diversity of Cecidomyiidae. For this we used inventories data on the diversity of galling and host plants in Brazil. We found that Asterales, Myrtales and Malpighiales, were the most important orders, with 34, 33 and 25, gall morphotypes, respectively. The most representative host families were Asteraceae (34 morphotypes, Myrtaceae (23 and Fabaceae (22. In general, the order size and the plant family were good predictors of the galling diversity, but not the taxon age. The most diverse host genera for gall-midges were Mikania, Eugenia and Styrax, with 15, 13 and nine galler species, respectively. The size of plant genera showed no significant relationship with the richness of Cecidomyiidae, contrary to the prediction of the plant taxon size hypothesis. The plant genera with the greatest diversity of galling insects are not necessarily those with the greatest number of species. These results indicate that some plant taxa have a high intrinsic richness of galling insects, suggesting that the plant species composition may be equally or more important for the diversity of gall-midges than the size or age of the host taxon. Rev. Biol. Trop. 59 (4: 1599- 1607. Epub 2011 December 01.

  5. New gall midges (Diptera, Cecidomyiidae) associated with Eugenia uniflora and Psidium cattleianum (Myrtaceae)

    OpenAIRE

    Maia, Valéria C; Nava, Dori E

    2011-01-01

    Two new species and a new genus of gall midges (Diptera, Cecidomyiidae) are described and illustrated. Both species induce leaf galls on Myrtaceae, the former on Eugenia uniflora and the latter on Psidium cattleianum. Duas novas espécies e um novo gênero de insetos galhadores (Diptera, Cecidomyiidae) são descritos e ilustrados. Ambas espécies induzem galhas foliares em Myrtaceae, a primeira em Eugenia uniflora e a segunda em Psidium cattleianum.

  6. Are gall midge species (Diptera, Cecidomyiidae host-plant specialists? Espécies de moscas galhadoras (Diptera, Cecidomyiidae são especialistas em plantas hospedeiras?

    Directory of Open Access Journals (Sweden)

    Marco Antonio A. Carneiro

    2009-01-01

    Full Text Available Despite the speciose fauna of gall-inducing insects in the Neotropical region, little is known about their taxonomy. On the other hand, gall morphotypes associated with host species have been extensively used as a surrogate of the inducer species worldwide. This study reviewed the described gall midges and their galls to test the generalization on the use of gall morphotypes as surrogates of gall midge species in the Brazilian fauna. We compiled taxonomic and biological data for 196 gall midge species recorded on 128 host plant species. Ninety two percent of those species were monophagous, inducing galls on a single host plant species, whereas only 5.6% species were oligophagous, inducing galls on more than one congeneric host plant species. Only four species induced galls on more than one host plant genus. We conclude that gall morphotypes associated with information on the host plant species and attacked organs are reliable surrogates of the gall-inducing species.Apesar do elevado número de espécies da fauna de insetos indutores de galhas na região Neotropical, muito pouco espécies foram descritas. Por outro lado, o morfotipo da galha associado com a espécie da planta hospedeira é em todo o mundo amplamente utilizado como um indicador da espécie de inseto indutor. Este estudo revê as espécies de cecidommídeos descritos e suas galhas para verificar a generalização do uso da morfologia da galha como indicador da espécie de cecidomíideo na fauna brasileira. Nós compilamos dados biológicos e taxonômicos de 196 espécies de cecidomiídeos em 128 espécies de plantas no Brasil. Noventa e dois porcento destas espécies foram monófagas, induzindo galhas em uma única espécie de planta hospedeira, enquanto somente 5,6% das espécies foram oligófagas, induzindo galhas em mais de uma espécie de planta do mesmo gênero. Somente quatro espécies induzem galhas em espécies de plantas de gêneros diferentes. Nós concluímos que o morfo

  7. New Genus and Species of Gall Midges (Diptera, Cecidomyiidae, Porricondylinae, Holoneurini from the Late Eocene Amber of Olevsk (Zhitomir Region, Ukraine

    Directory of Open Access Journals (Sweden)

    Fedotova Z. A.

    2017-02-01

    Full Text Available Gall midges are reported for the first time in Late Eocene Rovno amber from the Olevsk, Zhitomir Region. This is the second amber locality to yield gall midges in the Zhitomir Region, after Gulyanka. Rovnoholoneurus gen. n. and two new species, Rovnoholoneurus davidi sp. n. and R. miyae sp. n. are described. Bryocrypta laqueata Fedotova, 2005 is transferred to the genus Rovnoholoneurus, and Rovnoholoneurus laqueatus (Fedotova, 2005, comb. n. is established. A key to the species of Rovnoholoneurus is provided.

  8. Celticecis, a Genus of Gall Midges (Diptera: Cecidomyiidae), Newly Reported for the Western Palearctic Region

    Science.gov (United States)

    Raymond J. Gagné; John C. Moser

    1997-01-01

    Many Holarctic genera of trees and shrubs are host over much of their ranges to particular genera of Cecidomyiidae. As examples, willows host gall midges of Rabdophaga and Iteomyia, oaks host Macrodiplosis and Polystepha, and birches host Semudobia in both the Nearctic and...

  9. The gall midges (Diptera, Cecidomyiidae from three restingas of Rio de Janeiro State, Brazil

    Directory of Open Access Journals (Sweden)

    Valéria Cid Maia

    2001-06-01

    Full Text Available One hundred and eight species of Cecidomyiinae (Cecidomyiidae were found in association with 53 species of plant distributed among 42 genera and 32 families at restingas of Barra de Maricá, Itaipuaçu and Carapebus. Ninety four gall midge species were cecidogenous, four predaceous, five inquilinous of galls and five were free living. Galling species were associated with 47 plant species belonging to 36 genera and 28 families. The majority of the galls occurred on the leaves (N = 63; 13 on buds; nine on inflorescence, closed flower or flower peduncle; three on fruits and one on tendril. Myrtaceae were the richest plant family in number of galls followed by Burseraceae, Nyctaginaceae, Sapotaceae, Erythroxylaceae, Malpighiaceae and Solanaceae. New records of host plants and localities were recorded. Seventy nine Cecidomyiinae species were found at Restinga of Barra de Maricá, 64 at Carapebus and 41 at Itaipuaçu. Sorensen's index revealed that the restingas of Barra de Maricá and Itaipuaçu ate more similar in Cecidomyiinae fauna, confirming a positive relation between geographical proximity and fauna similarity.

  10. Wheat Mds-1 encodes a heat-shock protein and governs susceptibility towards the Hessian fly gall midge

    Science.gov (United States)

    Plant pests including insects must manipulate plants in order to utilize the nutrition and environment of the host. Here, we show that the heat-shock protein gene Mayetiola destructor susceptibility gene-1 (Mds-1) is a major susceptibility gene in wheat that allows the gall midge M. destructor, com...

  11. Size, age and composition: characteristics of plant taxa as diversity predictors of gall-midges (Diptera: Cecidomyiidae

    Directory of Open Access Journals (Sweden)

    Walter S Araújo

    2011-12-01

    Full Text Available Many hypotheses have been proposed to explain the diversity of gall-midge insects (Diptera: Cecidomyiidae, some of them taking into account plant diversity. This study aims to test the importance of size, age and composition of host plant taxa in the diversity of Cecidomyiidae. For this we used inventories data on the diversity of galling and host plants in Brazil. We found that Asterales, Myrtales and Malpighiales, were the most important orders, with 34, 33 and 25, gall morphotypes, respectively. The most representative host families were Asteraceae (34 morphotypes, Myrtaceae (23 and Fabaceae (22. In general, the order size and the plant family were good predictors of the galling diversity, but not the taxon age. The most diverse host genera for gall-midges were Mikania, Eugenia and Styrax, with 15, 13 and nine galler species, respectively. The size of plant genera showed no significant relationship with the richness of Cecidomyiidae, contrary to the prediction of the plant taxon size hypothesis. The plant genera with the greatest diversity of galling insects are not necessarily those with the greatest number of species. These results indicate that some plant taxa have a high intrinsic richness of galling insects, suggesting that the plant species composition may be equally or more important for the diversity of gall-midges than the size or age of the host taxon. Rev. Biol. Trop. 59 (4: 1599- 1607. Epub 2011 December 01.Muchas hipótesis se han propuesto para explicar la diversidad de dipteros de la familia Cecidomyiidae, algunos de ellos teniendo en cuenta la diversidad de las plantas. Este estudio tiene como objetivo probar la importancia del tamaño, la edad y la composición de las plantas en la diversidad de Cecidomyiidae, a través de los inventarios de las agallas y las plantas hospederas, en Brasil. Asterales, Malpighiales y Myrtales fueron los órdenes más importantes, con 34, 33 y 25 tipos de agallas, respectivamente. Las familias m

  12. New genera and species of gall midges (Diptera, Cecidomyiidae from three restingas of Rio de Janeiro State, Brazil

    Directory of Open Access Journals (Sweden)

    Valéria Cid Maia

    2001-07-01

    Full Text Available Five new genera and fourteen new species of gall midges from restingas of Rio de Janeiro State are described. The larva, pupa, male, female and gall are described for each species. The new genera are: Arrabidaeamyia, Epihormomyia, Manilkaramyia, Mayteniella and Parazalepidota. The new species are: Arrabidaeamyia serrata, Asphondylia peploniae, Clinodiplosis diodiae, Clinodiplosis profusa, Clusiamyia granulosa, Dasineura couepiae, Epihormomyia miconiae, Lopesia grandis, Lopesia marginalis, Lopesia singularis, Manilkaramyia notabilis, Mayteniella distincta, Parazalepidota clusiae and Paulliniamyia ampla. Also, the larva of a previously described species, Clusiamyia nitida Maia, 1996 is described and Asphondylia byrsonimae Maia & Couri is transferred to Bruggmaniella.

  13. Two new species of gall midges (Diptera, Cecidomyiidae) associated with Erythroxylum ovalifolium Peyr. (Erythroxylaceae) from the Barra de Maricá restinga, Maricá, Rio de Janeiro, Brazil.

    Science.gov (United States)

    Maia, V C; Fernandes, S P C

    2011-05-01

    Two new species of gall midges (Diptera, Cecidomyiidae) Dasineura ovalifoliae and Clinodiplosis maricaensis are described based on material from the Barra de Maricá restinga, Maricá, Rio de Janeiro, Brazil. Both species are associated with Erythroxylum ovalifolium Peyr. (Erythroxylaceae). The former is the gall inducer and the latter an inquiline.

  14. Endophagy of biting midges attacking cavity-nesting birds.

    Science.gov (United States)

    Votýpka, J; Synek, P; Svobodová, M

    2009-09-01

    Feeding behaviour, host preferences and the spectrum of available hosts determine the role of vectors in pathogen transmission. Feeding preferences of blood-feeding Diptera depend on, among others factors, the willingness of flies to attack their hosts either in the open (exophagy) or in enclosed places (endophagy). As far as ornithophilic blood-feeding Diptera are concerned, the biting midges (Diptera: Ceratopogonidae) and blackflies (Diptera: Simuliidae) are generally considered to be strictly exophagous. We determined which blood-sucking Diptera enter nest cavities and feed on birds by placing sticky foil traps inside artificial nest boxes. A total of 667 females of eight species of biting midges of the genus Culicoides (Latreille, 1809) were captured on traps during 2006-2007, with Culicoides truncorum (Edwards, 1939) being the dominant species. DNA blood analyses of blood-engorged females proved that midges actually fed on birds nesting in the boxes. Three species were identified as endophagous: Culicoides truncorum, Culicoides pictipennis (Staeger, 1839), and Culicoides minutissimus (Zetterstedt, 1855). Our study represents the first evidence that ornithophilic biting midges are endophagous. The fact that we caught no blackflies in the bird boxes supports the exophagy of blackflies. We believe that our findings are important for surveillance programmes focusing on Diptera that transmit various bird pathogens.

  15. Two new species of gall midges (Diptera, Cecidomyiidae associated with Erythroxylum ovalifolium Peyr. (Erythroxylaceae from the Barra de Maricá restinga, Maricá, Rio de Janeiro, Brazil

    Directory of Open Access Journals (Sweden)

    VC Maia

    Full Text Available Two new species of gall midges (Diptera, Cecidomyiidae Dasineura ovalifoliae and Clinodiplosis maricaensis are described based on material from the Barra de Maricá restinga, Maricá, Rio de Janeiro, Brazil. Both species are associated with Erythroxylum ovalifolium Peyr. (Erythroxylaceae. The former is the gall inducer and the latter an inquiline.

  16. Functional responses and prey-stage preferences of a predatory gall midge and two predacious mites wtih twospotted spider mites, Tetranychus urticae as host

    Science.gov (United States)

    The twospotted spider mite, Tetranychus urticae (Acari: Tetranychidae), is an important pest of vegetables and other crops. This study was conducted to evaluate and compare the potential role of three commercially available predators, predatory gall midge, Feltiella acarisuga (Vallot) (Diptera: Ceci...

  17. Genetic and biochemical basis of Gall Midge resistance in some cultivars of Indica Rice. Final report for the period 1 October 1980 - 30 November 1986

    International Nuclear Information System (INIS)

    Reddy, G.M.

    1986-01-01

    The stability of high productivity of modern rice varieties is greatly affected by insect pests. Rice gall midge is a serious insect pest of rice that is prevalent in several south eastern asian countries. Gall midge resistance has been mainly attributed to antibiosis. No progress has so far been made in identifying the exact biochemical nature of resistance. In Indica subspecies the understanding of chemical nature of disease would be helpful in the control of the disease and also in breeding programme aimed at developing resistance varieties. Studies were undertaken to establish the biochemical basis of resistance. Biochemical characterization of resistant and susceptible varieties were carried out. The parameters considered were: total sugar and reducing sugar content, total phenol content, amino acid profile, post infectional changes in sugar and phenol, isozyme studies. 2 figs, 6 tabs

  18. Genetic and biochemical basis of Gall Midge resistance in some cultivars of Indica Rice. Final report for the period 1 October 1980 - 30 November 1986

    Energy Technology Data Exchange (ETDEWEB)

    Reddy, G M [Osmania Univ., Hyderabad (India). Dept. of Genetics

    1987-12-31

    The stability of high productivity of modern rice varieties is greatly affected by insect pests. Rice gall midge is a serious insect pest of rice that is prevalent in several south eastern asian countries. Gall midge resistance has been mainly attributed to antibiosis. No progress has so far been made in identifying the exact biochemical nature of resistance. In Indica subspecies the understanding of chemical nature of disease would be helpful in the control of the disease and also in breeding programme aimed at developing resistance varieties. Studies were undertaken to establish the biochemical basis of resistance. Biochemical characterization of resistant and susceptible varieties were carried out. The parameters considered were: total sugar and reducing sugar content, total phenol content, amino acid profile, post infectional changes in sugar and phenol, isozyme studies. 2 figs, 6 tabs.

  19. A simulation approach to assessing sampling strategies for insect pests: an example with the balsam gall midge.

    Directory of Open Access Journals (Sweden)

    R Drew Carleton

    Full Text Available Estimation of pest density is a basic requirement for integrated pest management in agriculture and forestry, and efficiency in density estimation is a common goal. Sequential sampling techniques promise efficient sampling, but their application can involve cumbersome mathematics and/or intensive warm-up sampling when pests have complex within- or between-site distributions. We provide tools for assessing the efficiency of sequential sampling and of alternative, simpler sampling plans, using computer simulation with "pre-sampling" data. We illustrate our approach using data for balsam gall midge (Paradiplosis tumifex attack in Christmas tree farms. Paradiplosis tumifex proved recalcitrant to sequential sampling techniques. Midge distributions could not be fit by a common negative binomial distribution across sites. Local parameterization, using warm-up samples to estimate the clumping parameter k for each site, performed poorly: k estimates were unreliable even for samples of n ∼ 100 trees. These methods were further confounded by significant within-site spatial autocorrelation. Much simpler sampling schemes, involving random or belt-transect sampling to preset sample sizes, were effective and efficient for P. tumifex. Sampling via belt transects (through the longest dimension of a stand was the most efficient, with sample means converging on true mean density for sample sizes of n ∼ 25-40 trees. Pre-sampling and simulation techniques provide a simple method for assessing sampling strategies for estimating insect infestation. We suspect that many pests will resemble P. tumifex in challenging the assumptions of sequential sampling methods. Our software will allow practitioners to optimize sampling strategies before they are brought to real-world applications, while potentially avoiding the need for the cumbersome calculations required for sequential sampling methods.

  20. Serine Proteases-Like Genes in the Asian Rice Gall Midge Show Differential Expression in Compatible and Incompatible Interactions with Rice

    Directory of Open Access Journals (Sweden)

    Suresh Nair

    2011-04-01

    Full Text Available The Asian rice gall midge, Orseolia oryzae (Wood-Mason, is a serious pest of rice. Investigations into the gall midge-rice interaction will unveil the underlying molecular mechanisms which, in turn, can be used as a tool to assist in developing suitable integrated pest management strategies. The insect gut is known to be involved in various physiological and biological processes including digestion, detoxification and interaction with the host. We have cloned and identified two genes, OoprotI and OoprotII, homologous to serine proteases with the conserved His87, Asp136 and Ser241 residues. OoProtI shared 52.26% identity with mosquito-type trypsin from Hessian fly whereas OoProtII showed 52.49% identity to complement component activated C1s from the Hessian fly. Quantitative real time PCR analysis revealed that both the genes were significantly upregulated in larvae feeding on resistant cultivar than in those feeding on susceptible cultivar. These results provide an opportunity to understand the gut physiology of the insect under compatible or incompatible interactions with the host. Phylogenetic analysis grouped these genes in the clade containing proteases of phytophagous insects away from hematophagous insects.

  1. The Asian Rice Gall Midge (Orseolia oryzae Mitogenome Has Evolved Novel Gene Boundaries and Tandem Repeats That Distinguish Its Biotypes.

    Directory of Open Access Journals (Sweden)

    Isha Atray

    Full Text Available The complete mitochondrial genome of the Asian rice gall midge, Orseolia oryzae (Diptera; Cecidomyiidae was sequenced, annotated and analysed in the present study. The circular genome is 15,286 bp with 13 protein-coding genes, 22 tRNAs and 2 ribosomal RNA genes, and a 578 bp non-coding control region. All protein coding genes used conventional start codons and terminated with a complete stop codon. The genome presented many unusual features: (1 rearrangement in the order of tRNAs as well as protein coding genes; (2 truncation and unusual secondary structures of tRNAs; (3 presence of two different repeat elements in separate non-coding regions; (4 presence of one pseudo-tRNA gene; (5 inversion of the rRNA genes; (6 higher percentage of non-coding regions when compared with other insect mitogenomes. Rearrangements of the tRNAs and protein coding genes are explained on the basis of tandem duplication and random loss model and why intramitochondrial recombination is a better model for explaining rearrangements in the O. oryzae mitochondrial genome is discussed. Furthermore, we evaluated the number of iterations of the tandem repeat elements found in the mitogenome. This led to the identification of genetic markers capable of differentiating rice gall midge biotypes and the two Orseolia species investigated.

  2. Complex interactions envolving a gall midge Myrciamyia maricaensis Maia (Diptera, Cecidomyiidae, phytophagous modifiers and parasitoids

    Directory of Open Access Journals (Sweden)

    Fernando Fortunato Faria Ferraz

    2003-09-01

    Full Text Available Myrciamyia maricaensis Maia, 1995 (Diptera, Cecidomyiidae induces a gall in lateral and apical shoots in the plant Myrcia lundiana Kiaersk (Myrtaceae which is used and modified by two eulophid wasps species. In both cases the gall former species suffer high rate of attack exceeding the importance of parasitoid species as mortality factors. In this study these interactions are described and their effects as mortality of gall former. The intensity of occurrence of the two eulophid species as modifiers and of microhymenopteran parasitoids, and the relative importance of these species as mortality agents of the M. maricaensis larvae is compared. This comparison reveals that two modifiers species found in the gall tissue modification causing the death of the M. maricaensis larva and it is a more important factor of mortality than the cecidomyiid larva parasitism. The fluctuation of the number of each type of gall along the year was monitored in the research field and confirmed in numerical and in synchronic terms of occurrence of the galls; the importance of the species of the gall modifier eulophids, particularly one of these species, as factors of mortality of the M. maricaensis larvae and justified our comparing the relationship between these species and M. maricaensis as similar to the parasitoid-host relationship. The gall shape modification by one of the eulophids allows the occurrence of other inquiline insect species, what means that this gall modification becomes it more heterogeneous and allows the increase of the species richness to the system.

  3. Transcriptomic analyses of the secreted proteins from the salivary glands of the wheat midge larvae

    Science.gov (United States)

    Both the wheat midge (Sitodiplosis mosellana) and the Hessian fly (Mayetiola destructor) belong to a group of insects called gall midges (Diptera: Cecidomyiidae) and both are destructive pests of wheat. From Hessian fly larvae, a large number of genes have been identified to encode Secreted Salivary...

  4. CONFIRMATION OF PRESENCE OF A PREDATORY GALL MIDGE, Feltiella acarisuga, (Vallot, 1827 AND STAPHYLINID PREDATOR Oligota oviformis Casey, 1893 OF A TWO SPOTTED SPIDER MITE (Tetranychus urticae, Koch, 1836 IN SLOVENIA

    Directory of Open Access Journals (Sweden)

    Katarina KOS

    2018-04-01

    Full Text Available The two spotted spider mite, Tetranychus urticae C. L. Koch, 1836 is one of the most important pests of greenhouse crops worldwide. Due to its polyphagic range of hosts and rapid development it forms great populations and as such represents a suitable host/prey for lots of natural enemies usable in biological control. Most commonly used predators of Tetranychid mites are predatory mites (Phytoseiulus persimilis Athias-Henriot, 1957, Amblyseius swirskii Athias-Henriot, 1962 ,…, but among most voracious predators is the larva of a predatory gall midge, Feltiella acarisuga (Vallot, 1827 that was found also in greenhouses of the Biotechnical Faculty in Ljubljana on eggplant leaves in 2017. Besides the predatory gall midge also another predator, staphylinid Oligota oviformis Casey, 1893 beetles and larvae were found in great numbers. After positive identification of F. acarisuga found naturally in Slovenia, it can be added to the list of indigenous species of natural enemies and thus can be used in biological control programs in greenhouse crop protection against spider mites.

  5. Insect galls of Restinga de Marambaia (Barra de Guaratiba, Rio de Janeiro, RJ).

    Science.gov (United States)

    Maia, V C; Silva, L O

    2016-04-19

    Thirty-one morphotypes of insect galls and two flower damages were found on 16 families, 22 genera and 24 plant species in Restinga de Marambaia (Barra de Guaratiba, Rio de Janeiro, RJ). Fabaceae and Myrtaceae were the plant families with the greatest richness of insect galls (4 and 6 morphotypes, respectively), and the greatest number of galled plants (four and three species, respectively). Galls were mostly found on leaves and stems (77% and 10%, respectively). The galling insects are represented by Diptera, Lepidoptera, and Hemiptera. The majority of the galls (81%) were induced by gall midges (Cecidomyiidae: Diptera).

  6. Insect galls from Serra de São José (Tiradentes, MG, Brazil

    Directory of Open Access Journals (Sweden)

    V. C. Maia

    Full Text Available One hundred thirty-seven morphotypes of insect galls were found on 73 plant species (47 genera and 30 families in Serra de São José, in Tiradentes, MG, Brazil. Fabaceae, Myrtaceae, Asteraceae, and Melastomataceae were the plant families that supported most of the galls (49.6% of the total. Galls were mostly found on leaves and stems (66.4% and 25.5%, respectively. Galls were induced by Diptera, Lepidoptera, Coleoptera, Hemiptera (Sternorrhyncha, Hymenoptera, and Thysanoptera. The majority of them (73.7% were induced by gall midges (Cecidomyiidae: Diptera. Besides the gall inducers, other insects found associated with the galls were parasitoids (Hymenoptera, inquilines (Coleoptera, Lepidoptera, Diptera, and Hemiptera, and predators (Diptera.

  7. Predation on rose galls: parasitoids and predators determine gall size through directional selection.

    Directory of Open Access Journals (Sweden)

    Zoltán László

    Full Text Available Both predators and parasitoids can have significant effects on species' life history traits, such as longevity or clutch size. In the case of gall inducers, sporadically there is evidence to suggest that both vertebrate predation and insect parasitoid attack may shape the optimal gall size. While the effects of parasitoids have been studied in detail, the influence of vertebrate predation is less well-investigated. To better understand this aspect of gall size evolution, we studied vertebrate predation on galls of Diplolepis rosae on rose (Rosa canina shrubs. We measured predation frequency, predation incidence, and predation rate in a large-scale observational field study, as well as an experimental field study. Our combined results suggest that, similarly to parasitoids, vertebrate predation makes a considerable contribution to mortality of gall inducer larvae. On the other hand, its influence on gall size is in direct contrast to the effect of parasitoids, as frequency of vertebrate predation increases with gall size. This suggests that the balance between predation and parasitoid attack shapes the optimal size of D. rosae galls.

  8. Impact of a gall midge Parkiamyia paraensis (Diptera, Cecidomyiidae on the Amazonian plant Parkia pendula (Fabaceae Impacto do galhador Parkiamyia paraensis (Diptera, Cecidomyiidae sobre a planta da Amazônia Parkia pendula Benth. ex Walp. (Fabaceae

    Directory of Open Access Journals (Sweden)

    G. Wilson Fernandes

    2007-12-01

    Full Text Available We observed the occurrence of large numbers of galls induced by Parkiamyia paraensis (Diptera, Cecidomyiidae on the leaflets of Parkia pendula (Fabaceae in northern Para, Brazil. We addressed two questions in this study: i what is the proportion of attacked plants in the field, and nursery conditions?; and ii what is the impact of galls on the host plant? An average of 86% of the plants were galled in the field. Galled P. pendula were distinct from healthy individuals due to their prostrated architecture and death of terminal shoots. Approximately 50% of the total available leaves and 35% leaflets were attacked by P. paraensis on saplings under nursery conditions. Each one-year old plant supported an average of 1,300 galls, and an average of 60g allocated to galled tissue. Otherwise, attacked individuals were taller and heavier than healthy plants. Attacked plants weighed five times more than healthy plants. When the weight of the galls was removed, the total weight (aerial part without galls of attacked plants was drastically reduced, indicating that most of the biomass of attacked plants was due to the attack by P. paraensis galls. Although the data indicate a paradox, as young plants attacked by the galling herbivore appear to develop more vigorously than unattacked plants, we suggest that P. paraensis negatively affect P. pendula development.Observou-se a ocorrência de um grande número de galhas induzidas por Parkiamyia paraensis (Diptera, Cecidomyiidae nos folíolos de Parkia pendula (Fabaceae no norte do Pará, Brasil. Este estudo foi direcionado para responder duas perguntas: i qual é a proporção de plantas atacadas no campo e em condições de estufa? e ii qual é o impacto das galhas na planta hospedeira? Uma média de 86% das plantas apresentaram galhas no campo. Indivíduos com galhas de P. pendula eram distintos dos indivíduos saudáveis devido à arquitetura curvada e pela morte dos ramos terminais. Aproximadamente 50% do

  9. Biochemistry and physiology of overwintering in the mature larva of the pine needle gall midge, Thecodiplosis japonensis (Diptera: cecidomyiidae) in Korea.

    Science.gov (United States)

    Li, Y; Gong, H; Park, H

    2000-01-01

    The pine needle gall midge, Thecodiplosis japonensis, overwinters in the soil as a third instar mature larva. The metabolic and physiological compensations and adjustments during its overwintering and acclimation were studied. Field-sampled larvae in 1997/98 winter showed a significant increase in whole-body trehalose by January (5.71 +/- 0.09 vs. 9.41 +/- 0.42 mg/g wet weight) along with a more significant decrease in whole-body glycogen (16.25 +/- 0.18 vs. 5.65 +/- 0.45 mg/g wet weight). Afterwards, there was a partial reconversion of trehalose to glycogen. Moreover, trace amounts of glycerol and steady content of glucose as potential cryoprotectants were found during the overwintering period. Temperature acclimation of field-sampled larvae affects interconversion between trehalose and glycogen. Trehalose accumulation does not affect the larval supercooling capacity. The mean supercooling point of the larvae remained nearly constant at about -20 degree he winter and was unchanged after temperature acclimation. Low temperature survival experiment suggested that the larvae adopt a freeze-avoiding strategy for overwintering.

  10. Coleopterous galls from the Neotropical region

    Directory of Open Access Journals (Sweden)

    Valéria Cid Maia

    2012-01-01

    Full Text Available Data on Neotropical coleopterous galls were compiled from the literature, which showed that 82 galls have so far been recorded among 77 plant species. The Fabaceae and Asteraceae plant families display the greatest richness in galls. Most galls are induced on stems or buds, while leaves constitute the second most attacked plant organ. Only 16 coleopteran gallers have been identified at the species level; most records are presented at the order level. The identified species belong to four families: Apionidae, Buprestidae, Curculionidae and Erirhinidae. The galls are found in Argentina, Brazil, Belize, Chile, Colombia (probably, Costa Rica, El Salvador, Guatemala, Honduras, Mexico, Nicaragua, Panama and Venezuela. Eighteen species of Coleoptera are inquilines of galls and are associated with 18 plant species, most frequently with Asteraceae, Melastomataceae and Fabaceae. The inquilines were recorded mainly in leaf galls induced by Cecidomyiidae (Diptera. The identity of these weevils is poorly known. General data indicate a lack of taxonomic studies in the Neotropical region.

  11. Life history of the gall-maker Eugeniamyia dispar Maia, Mendonça-Jr. & Romanowski, 1996 (Diptera, Cecidomyiidae

    Directory of Open Access Journals (Sweden)

    M. de S.,Jr. MENDONÇA

    Full Text Available The development of the galls of the midge Eugeniamyia dispar Maia, Mendonça-Jr. & Romanowski, 1996 (Diptera: Cecidomyiidae was monitored weekly on its host plant, Eugenia uniflora (Myrtaceae. The work was carried out in the urban area of Porto Alegre, RS, Brazil, from October 1993 to September 1995. Galls were collected from the field and raised in the laboratory to obtain adults. The females oviposit on young leaves of the host plant, with the first instar larvae inducing the gall, which is unilocular. The last instar larvae drop to the soil to pupate and later emerge as adults. The galls occur from late August to early June, when young leaves of the host can be found, with populations peaking during the summer. So far this species is only known from the two southernmost states of Brazil (RS and SC.

  12. Life history of the gall-maker Eugeniamyia dispar Maia, Mendonça-Jr. & Romanowski, 1996 (Diptera, Cecidomyiidae).

    Science.gov (United States)

    Mendonça, M de S; Romanowski, H P

    2002-05-01

    The development of the galls of the midge Eugeniamyia dispar Maia, Mendonça-Jr. & Romanowski, 1996 (Diptera: Cecidomyiidae) was monitored weekly on its host plant, Eugenia uniflora (Myrtaceae). The work was carried out in the urban area of Porto Alegre, RS, Brazil, from October 1993 to September 1995. Galls were collected from the field and raised in the laboratory to obtain adults. The females oviposit on young leaves of the host plant, with the first instar larvae inducing the gall, which is unilocular. The last instar larvae drop to the soil to pupate and later emerge as adults. The galls occur from late August to early June, when young leaves of the host can be found, with populations peaking during the summer. So far this species is only known from the two southernmost states of Brazil (RS and SC).

  13. An Endoparasitoid Avoids Hyperparasitism by Manipulating Immobile Host Herbivore to Modify Host Plant Morphology

    Science.gov (United States)

    Fujii, Tomohisa; Matsuo, Kazunori; Abe, Yoshihisa; Yukawa, Junichi; Tokuda, Makoto

    2014-01-01

    Many parasitic organisms have an ability to manipulate their hosts to increase their own fitness. In parasitoids, behavioral changes of mobile hosts to avoid or protect against predation and hyperparasitism have been intensively studied, but host manipulation by parasitoids associated with endophytic or immobile hosts has seldom been investigated. We examined the interactions between a gall inducer Masakimyia pustulae (Diptera: Cecidomyiidae) and its parasitoids. This gall midge induces dimorphic leaf galls, thick and thin types, on Euonymus japonicus (Celastraceae). Platygaster sp. was the most common primary parasitoid of M. pustulae. In galls attacked by Platygaster sp., whole gall thickness as well as thicknesses of upper and lower gall wall was significantly larger than unparasitized galls, regardless of the gall types, in many localities. In addition, localities and tree individuals significantly affected the thickness of gall. Galls attacked by Platygaster sp. were seldom hyperparasitized in the two gall types. These results strongly suggest that Platygaster sp. manipulates the host plant's development to avoid hyperparasitism by thickening galls. PMID:25033216

  14. Evidence for a stress hypothesis: hemiparasitism effect on the colonization of Alchornea castaneaefolia A. Juss.uphorbiaceae) by Galling Insects

    OpenAIRE

    SCHWARTZ, Gustavo; HANAZAKI, Natalia; SILVA, Marivana B.; IZZO, Thiago J.; BEJAR, María E. P.; MESQUITA, Mariana R.; FERNANDES, G. Wilson

    2003-01-01

    Stressed plants are generally more attacked by galling insects. In this study we investigated the relationship between population abundance and species richness of galling insects on the tree Alchornea castaneaefolia A. JUSS. (Euphorbiaceae), submited to stress induced by the hemiparasite Psittacanthus sp. (Loranthaceae) in the Amazon, Brazil. Branches of A. castaneaefolia attacked by the hemiparasite were more heavily infested by galling insects than non-attacked branches. The field observat...

  15. Dasineura odoratae new to Denmark and new records of the rare Mayetiola hellwigi

    DEFF Research Database (Denmark)

    Bruun, Hans Henrik; Skuhravá, Marcela

    2011-01-01

    We report the first documented records of the gall midge Dasineura odoratae Stelter, based on adults reared from galls on the single host plant of the species, Viola odorata. We also report Aphanogmus abdominalis (Thomson) (Hymenoptera: Ceraphronidae) as a parasitoid of this gall midge. In addition......, we report some recent Danish finds of the rare gall midge Mayetiola hellwigi (Rübsamen)....

  16. Pyrosequencing Reveals the Predominance of Pseudomonadaceae in Gut Microbiome of a Gall Midge

    Directory of Open Access Journals (Sweden)

    Raman Bansal

    2014-06-01

    Full Text Available Gut microbes are known to play various roles in insects such as digestion of inaccessible nutrients, synthesis of deficient amino acids, and interaction with ecological environments, including host plants. Here, we analyzed the gut microbiome in Hessian fly, a serious pest of wheat. A total of 3,654 high quality sequences of the V3 hypervariable region of the 16S rRNA gene were obtained through 454-pyrosequencing. From these sequences, 311 operational taxonomic units (OTUs were obtained at the >97% similarity cutoff. In the gut of 1st instar, otu01, a member of Pseudomonas, was predominant, representing 90.2% of total sequences. otu13, an unidentified genus in the Pseudomonadaceae family, represented 1.9% of total sequences. The remaining OTUs were each less than 1%. In the gut of the 2nd instar, otu01 and otu13 decreased to 85.5% and 1.5%, respectively. otu04, a member of Buttiauxella, represented 9.7% of total sequences. The remaining OTUs were each less than 1%. In the gut of the 3rd instar, otu01 and otu13 further decreased to 29.0% and 0%, respectively. otu06, otu08, and otu16, also three members of the Pseudomonadaceae family were 13.2%, 8.6%, and 2.3%, respectively. In addition, otu04 and otu14, two members of the Enterobacteriaceae family, were 4.7% and 2.5%; otu18 and otu20, two members of the Xanthomonadaceae family, were 1.3% and 1.2%, respectively; otu12, a member of Achromobacter, was 4.2%; otu19, a member of Undibacterium, was 1.4%; and otu9, otu10, and otu15, members of various families, were 6.1%, 6.3%, and 1.9%, respectively. The investigation into dynamics of Pseudomonas, the most abundant genera, revealed that its population level was at peak in freshly hatched or 1 day larvae as well as in later developmental stages, thus suggesting a prominent role for this bacterium in Hessian fly development and in its interaction with host plants. This study is the first comprehensive survey on bacteria associated with the gut of a gall

  17. Reed canary grass observations of effects on crop stand and fibre quality caused by infestation of Epicalamus phalaridis

    Directory of Open Access Journals (Sweden)

    S. HELLQVIST

    2008-12-01

    Full Text Available A severe infestation of the gall midge Epicalamus phalaridis (Diptera: Cecidomyiidaeoccurred in a field of reed canary grass, Phalaris arundinacea in northern Sweden. The midge species has potential to become a serious pest on Phalaris grown for bioenergy or fibre production. Larvae of the midge feed beneath leaf sheaths and the crop lodges in late summer. Details are given on the biology of the midge. In the infested field, population densities of the midge were very high during three consecutive years. The crop was weakened and the occurrence of weeds increased. The dry matter yields declined markedly and were after three years of midge-attack about 50% of the average yield in the preceding years. The yield dropped comparatively more when the crop was harvested in the spring as opposed to harvest in late autumn and more at a nitrogen fertilisation at 100 kg compared to 200 kg N ha–1 per year. The effect of midge attack on fibre quality was studied. The fibre properties of midge-infested parts of internodes were poor, but as midge-damaged parts are brittle, they could probably be sorted out in a fractionation process. Undamaged parts of infested internodes had the same fibre properties as those from an uninfested crop.;

  18. Pattern of attack of a galling insect reveals an unexpected preference-performance linkage on medium-sized resources Padrão de ataque de um inseto galhador revela uma inesperada ligação entre preferência e performance sobre recursos de tamanho médio

    Directory of Open Access Journals (Sweden)

    Jean C. Santos

    2010-03-01

    Full Text Available Pattern of attack of a galling insect reveals an unexpected preference-performance linkage on medium-sized resources. The Plant Vigor Hypothesis (PVH predicts oviposition preference and higher offspring performance on longer and fast-growing shoots, and although several studies have tested its predictions, long-term studies concerning the patterns of host selection by galling species are still lacking. The PVH was tested in this study using Bauhinia brevipes (Fabaceae as the host of a leaf gall midge, Asphondylia microcapillata (Diptera, Cecidomyiidae during three consecutive years. Shoots were collected from the same 80 plants between 2001 and 2003 and shoot length, number of healthy and galled leaves, gall number, and mortality factors were recorded. Nearly 600 galls were found on the 5,800 shoots collected. Medium-sized shoots supported from 46 to 70% of all galls, with greater gall survival rate in 2002 and 2003. A decrease in parasitism rate coupled with an increase in gall predation lead to a constant similar gall survivorship rate in all years (x = 22.7%. Although gall abundance varied among years (122 in 2001, 114 in 2002 and 359 in 2003 preference for longer shoots was not observed because the percentage of galled shoots and galled leaves were higher on medium shoot length classes in all years. The observed distribution of gall abundance and galled shoots were always greater than the expected distribution on medium shoot length classes. These findings do not support the PVH, and show that A. microcapillata can maximize the female preference and larval performance on medium-sized shoots of B. brevipes.A Hipótese do Vigor de Plantas (HVP prevê uma oviposição preferencial e alta performance da prole em ramos longos e de crescimento rápido da planta hospedeira. Embora diversos estudos tenham testado suas predições, estudos de longa duração focados no padrão de seleção de planta hospedeira por insetos galhadores ainda s

  19. Moving your sons to safety: galls containing male fig wasps expand into the centre of figs, away from enemies.

    Directory of Open Access Journals (Sweden)

    Hui Yu

    Full Text Available Figs are the inflorescences of fig trees (Ficus spp., Moraceae. They are shaped like a hollow ball, lined on their inner surface by numerous tiny female flowers. Pollination is carried out by host-specific fig wasps (Agaonidae. Female pollinators enter the figs through a narrow entrance gate and once inside can walk around on a platform generated by the stigmas of the flowers. They lay their eggs into the ovules, via the stigmas and styles, and also gall the flowers, causing the ovules to expand and their pedicels to elongate. A single pollinator larva develops in each galled ovule. Numerous species of non-pollinating fig wasps (NPFW, belonging to other families of Chalcidoidea also make use of galled ovules in the figs. Some initiate galls, others make use of pollinator-generated galls, killing pollinator larvae. Most NPFW oviposit from the outside of figs, making peripherally-located pollinator larvae more prone to attack. Style length variation is high among monoecious Ficus spp. and pollinators mainly oviposit into more centrally-located ovules, with shorter styles. Style length variation is lower in male (wasp-producing figs of dioecious Ficus spp., making ovules equally vulnerable to attack by NPFW at the time that pollinators oviposit. We recorded the spatial distributions of galled ovules in mature male figs of the dioecious Ficus hirta in Southern China. The galls contained pollinators and three NPFW that kill them. Pollinators were concentrated in galls located towards the centre of the figs, NPFW towards the periphery. Due to greater pedicel elongation by male galls, male pollinators became located in more central galls than their females, and so were less likely to be attacked. This helps ensure that sufficient males survive, despite strongly female-biased sex ratios, and may be a consequence of the pollinator females laying mostly male eggs at the start of oviposition sequences.

  20. The relevance of folkloric usage of plant galls as medicines: Finding the scientific rationale.

    Science.gov (United States)

    Patel, Seema; Rauf, Abdur; Khan, Haroon

    2018-01-01

    Galls, the abnormal growths in plants, induced by virus, bacteria, fungi, nematodes, arthropods, or even other plants, are akin to cancers in fauna. The galls which occur in a myriad of forms are phytochemically-distinct from the normal plant tissues, for these are the sites of tug-of-war, just like the granuloma in animals. To counter the stressors, in the form of the effector proteins of the invaders, the host plants elaborate a large repertoire of metabolites, which they normally will not produce. Perturbation of the jasmonic acid pathway, and the overexpression of auxin, and cytokinin, promote the tissue proliferation and the resultant galls. Though the plant family characteristics and the attackers determine the gall biochemistry, most of the galls are rich in bioactive phytochemicals such as phenolic acids, anthocyanins, purpurogallin, flavonoids, tannins, steroids, triterpenes, alkaloids, lipophilic components (tanshinone) etc. Throughout the long trajectory of evolution, humans have learned to use the galls as therapeutics, much like other plant parts. In diverse cultures, the evidence of folkloric usage of galls abound. Among others, galls from the plant genus like Rhus, Pistacia, Quercus, Terminalia etc. are popular as ethnomedicine. This review mines the literature on galling agents, and the medicinal relevance of galls. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  1. Mechanisms Driving Galling Success in a Fragmented Landscape: Synergy of Habitat and Top-Down Factors along Temperate Forest Edges.

    Directory of Open Access Journals (Sweden)

    Nina-S Kelch

    Full Text Available Edge effects play key roles in the anthropogenic transformation of forested ecosystems and their biota, and are therefore a prime field of contemporary fragmentation research. We present the first empirical study to address edge effects on the population level of a widespread galling herbivore in a temperate deciduous forest. By analyzing edge effects on abundance and trophic interactions of beech gall midge (Mikiola fagi Htg., we found 30% higher gall abundance in the edge habitat as well as lower mortality rates due to decreased top-down control, especially by parasitoids. Two GLM models with similar explanatory power (58% identified habitat specific traits (such as canopy closure and altitude and parasitism as the best predictors of gall abundance. Further analyses revealed a crucial influence of light exposure (46% on top-down control by the parasitoid complex. Guided by a conceptual framework synthesizing the key factors driving gall density, we conclude that forest edge proliferation of M. fagi is due to a complex interplay of abiotic changes and trophic control mechanisms. Most prominently, it is caused by the microclimatic regime in forest edges, acting alone or in synergistic concert with top-down pressure by parasitoids. Contrary to the prevailing notion that specialists are edge-sensitive, this turns M. fagi into a winner species in fragmented temperate beech forests. In view of the increasing proportion of edge habitats and the documented benefits from edge microclimate, we call for investigations exploring the pest status of this galling insect and the modulators of its biological control.

  2. Landing sites and diel activity in Culicoides midges attacking Fjord horses in the Netherlands

    NARCIS (Netherlands)

    Elbers, A.R.W.; Heuvel, van den S.J.; Meiswinkel, R.

    2016-01-01

    In the Old World, African horse sickness (AHS) and equine encephalosis are transmitted to equids by Culicoides midges. AHS has a case-fatality-rate of 95% in horses. Though endemic to sub-Saharan Africa, AHS virus is able to incur northwards and to disseminate widely within Mediterranean countries.

  3. Richness and composition of gall-inducing arthropods at Coiba National Park, Panama

    Directory of Open Access Journals (Sweden)

    José Luis Nieves-Aldrey

    2008-09-01

    Full Text Available Interest in studying galls and their arthropods inducers has been growing rapidly in the last two decades. However, the Neotropical region is probably the least studied region for gall-inducing arthropods. A study of the richness and composition of gall-inducing arthropods was carried out at Coiba National Park in the Republic of Panama. Field data come from samples obtained between August 1997 and September 1999, with three (two-week long more intensive samplings. Seventeen sites, representing the main land habitats of Coiba National Park were surveyed. 4942 galls of 50 insect and 9 mite species inducing galls on 50 vascular plants from 30 botanical families were colleted. 62.7% of the galls were induced by gall midges (Diptera, Cecidomyiidae, 15.3% by mites, Eriophyidae, 8.5% by Homoptera, Psyllidae, 6.8% by Coccidae and 5.1% by Phlaeothripidae (Tysanoptera. The host plant families with the most galls were Myrtaceae with seven, Bignoniaceae with five and Euphorbiaceae, Fabaceae and Melastomataceae with four. Leaf galls accounted for about 93% of collected galls. Most leaf galls were pit/blister galls followed by covering and pouch galls. Gall richness per collecting site was between 1 and 19 species. Coiba’s gall diversity is discussed in relation to data available from other tropical sites from continental Panama and the Neotropical region. Our results support the idea that it may be premature to conclude that species richness of gall inducers declines near the equator. Rev. Biol. Trop. 56 (3: 1269-1286. Epub 2008 September 30.El interés por el estudio de las agallas y los artrópodos que las inducen ha crecido en todo el mundo en los últimos veinte años. Sin embargo, los artrópodos que inducen agallas en la región Neotropical son probablemente los menos estudiados. Un estudio de la riqueza y composición de artrópodos que inducen agallas fue desarrollado en el Parque Nacional Coiba en la Republica de Panamá. Los datos provienen de

  4. Distribution and phenology of Dasineura oxycoccana (Diptera: Cecidomyiidae) in Michigan blueberries.

    Science.gov (United States)

    Hahn, Noel G; Isaacs, Rufus

    2012-06-01

    The blueberry gall midge, Dasineura oxycoccana Johnson, is a serious pest of rabbiteye blueberries in Florida, Georgia, and Mississippi, and a potential pest of southern and northern highbush blueberries. Its damage has been observed with increasing frequency in highbush blueberry plantings in the Great Lakes region, including in Wisconsin and in Michigan. Unlike in rabbiteye blueberry plantings, where blueberry gall midge primarily damages flowering buds, it is found to damage only the vegetative shoots of northern highbush blueberry. In this study, farms throughout Michigan were surveyed for the presence of blueberry gall midge and it was found in 43 of 46 sampled farms in 11 counties. From 2009-2011, several monitoring techniques, including yellow sticky traps, emergence traps, observational sampling, and vegetative shoot dissections were used to determine the ecology of this species in blueberry fields in southwest Michigan. Emergence traps were most useful in early detection of blueberry gall midge in April, and observational sampling for damage symptoms and vegetative shoot dissections revealed multiple population peaks throughout July and August. Infestation was detected in vegetative shoot tips in all parts of the bushes, with initial infestation greatest at the base of bushes. Degree day accumulations until first midge detection and peak infestation suggest some potential for predicting key events in the pest's phenology. This information about the distribution and timing of infestation will be useful in developing management strategies for blueberry gall midge infestation.

  5. Arthropods associated with fungal galls: do large galls support more abundant and diverse inhabitants?

    Science.gov (United States)

    Funamoto, Daichi; Sugiura, Shinji

    2017-02-01

    Fungus-induced galls can attract spore-feeding arthropods as well as gall-feeding ones, resulting in diverse communities. Do large fungal galls support more abundant and diverse arthropod communities than small fungal galls? To address this question, we investigated the structure of the arthropod community associated with bud galls induced by the fungus Melanopsichium onumae on the tree species Cinnamomum yabunikkei (Lauraceae) in central Japan. Thirteen species of arthropods were associated with M. onumae galls. Dominant arthropod species were represented by the larvae of a salpingid beetle (a spore feeder), a nitidulid beetle (a spore feeder), a cosmopterigid moth (a spore feeder), an unidentified moth (a gall tissue feeder), and a drosophilid species (a gall tissue feeder). Arthropod abundance and species richness were positively correlated with gall diameter. The majority of the most abundant species were more frequently found in large galls than in small ones, indicating that large fungal galls, which have more food and/or space for arthropods, could support a more abundant and diverse arthropod community.

  6. Interactions among the Predatory Midge Aphidoletes aphidimyza (Diptera: Cecidomyiidae, the Fungal Pathogen Metarhizium brunneum (Ascomycota: Hypocreales, and Maize-Infesting Aphids in Greenhouse Mesocosms

    Directory of Open Access Journals (Sweden)

    Ana Gorete Campos de Azevedo

    2017-04-01

    Full Text Available The generalist entomopathogenic fungus, Metarhizium brunneum, has proved to have great potential as a versatile biological pest control agent. The gall midge Aphidoletes aphidimyza is a specialist predator that occurs naturally in Europe and has been successfully used for aphid suppression. However, the interaction between these two biological control organisms and how it may affect the biological control of aphids awaits further investigation. As part of the EU-supported project INBIOSOIL, this study was conducted in greenhouse conditions to assess the possible effects of combining both biological control agents. In a randomized complete block design, sweet corn (Zea mays var. saccharata plants were grown in large pots filled with natural soil or natural soil inoculated with M. brunneum. At the third leaf stage, before being individually caged, plants were infested with Rhopalosiphum padi and A. aphidimyza pupae were introduced in the soil. Aphidoletes aphidimyza midge emergence, number of living midges and number of aphids were recorded daily. The presence of conidia in the soil and on leaves was assessed during the experiment. At the conclusion of the experiment, the number of live aphids and their developmental stage, consumed aphids, and A. aphidimyza eggs was assessed under stereomicroscope. This study’s findings showed that the presence of M. brunneum did not affect A. aphidimyza midge emergence. However, longevity was significantly affected. As the study progressed, significantly fewer predatory midges were found in cages treated with M. brunneum compared to untreated cages. Furthermore, by the end of the study, the number of predatory midges found in the Metarhizium-treated cages was four times lower than in the untreated cages. Both daily and final count of aphids were significantly affected by treatment. Aphidoletes aphidimyza applied alone suppressed the aphid population more effectively than M. brunneum applied alone. Additionally

  7. Diversity of galling insects in Styrax pohlii (Styracaceae): edge effect and use as bioindicators.

    Science.gov (United States)

    de Araújol, Walter Santos; Julião, Genimar Rebouças; Ribeiro, Bárbara Araújo; Silva, Isadora Portes Abraham; dos Santos, Benedito Baptista

    2011-12-01

    Impacts of forest fragmentation and edge effect on plant-herbivores interactions are relatively unknown, and the relationships between galling insects and their host plants are very susceptible to environmental variations. The goal of our study was to test the edge effect hypothesis for galling insects associated with Styrax pohlii (Styracaceae) host plant. Samplings were conducted at a fragment of semi-deciduous forest in Goiânia, Goiás, Brazil. Thirty host plant individuals (15 at fragment edge and 15 in its interior) were sampled in July of 2007; in each plant, 10 apical branches were collected at the top, middle and bottom crown levels. Our results supported the prediction of greater richness of gall morphotypes in the edge habitat compared with remnant interior. In a similar way, gall abundance and frequency of attacked leaves were also greater in the fragment edge. These findings consequently suggest a positive response of galling insect diversity to edge effect; in the Saint-Hilaire forest, this effect probably operates through the changes in microclimatic conditions of edge habitats, which results in an increased hygrothermal stress, a determinant factor to distribution patterns of galling insects. We also concluded that these organisms could be employed as biological indicators (i) because of their host-specificity, (ii) they are sensitive to changes in plant quality, and (iii) present dissimilar and specific responses to local variation in habitat conditions.

  8. To bite or not to bite! A questionnaire-based survey assessing why some people are bitten more than others by midges

    Directory of Open Access Journals (Sweden)

    Weeks Emma NI

    2010-05-01

    Full Text Available Abstract Background The Scottish biting midge, Culicoides impunctatus, responsible for more than 90% of biting attacks on human beings in Scotland, is known to demonstrate a preference for certain human hosts over others. Methods In this study we used a questionnaire-based survey to assess the association between people's perception of how badly they get bitten by midges and their demographic, lifestyle and health related characteristics. Results Most people (85.8% reported being bitten sometimes, often or always with only 14.2% reporting never being bitten by midges when in Scotland. There was no association between level of bites received and age, smoking, diet, exercise, medication, eating strongly flavoured foods or alcohol consumption. However, there was a strong association between the probability of being bitten and increasing height (in men and BMI (in women. A large proportion of participants (33.8% reported experiencing a bad/severe reaction to midge bites while 53.1% reported a minor reaction and 13.1% no reaction at all. Also, women tend to react more than men to midge bites. Additionally, the results indicated that the susceptibility to being bitten by midges is hereditary. Conclusions This study suggests that midges prefer to bite men that are tall and women that have a large BMI, and that the tendency for a child to be bitten or not could be inherited from their parent. The study is questionnaire-based; therefore, the interpretation of the results may be limited by the subjectivity of the answers given by the respondents. Although the results are relevant only to the Scottish biting midge, the approach used here could be useful for investigating human-insect interactions for other insects, particularly those which transmit pathogens that cause disease.

  9. Morphogenesis of galls induced by Baccharopelma dracunculifoliae (Hemiptera: Psyllidae on Baccharis dracunculifolia (Asteraceae leaves

    Directory of Open Access Journals (Sweden)

    M. Arduin

    Full Text Available The commonest insect gall on Baccharis dracunculifolia (Asteraceae leaves is induced by Baccharopelma dracunculifoliae (Hemiptera, Psyllidae. The gall-inducing insect attacks young leaves in both the unfolded and the fully expanded stages. Four developmental phases were observed in this type of gall: 1 A folding phase, during which the leaf lamina folded upward alongside the midrib and the edges of the upper portion of the leaf approached each other, forming a longitudinal slit. A single chamber was formed on the adaxial surface of the leaf; 2 A swelling phase, in which the folded leaf tissues thickened and the edges of the leaf drew closer together, narrowing the slit. In this phase the gall matured, turning succulent, fusiform and pale green. The single nymphal chamber was lined with white wax and was able to house from one to several nymphs; 3 A dehiscence phase, characterized by the opening of the slit to release inducers; and 4 A senescence phase, when the gall turned dark and dry. The dermal system of the mature gall was composed of a single-layered epidermis. The mesophyll was swollen, and the swelling was due mainly to hyperplasia of the parenchyma. The vascular tissues along the midrib vein were conspicuous and the perivascular fibers resembled parenchymal cells. The hypertrophied secretory cavities contained low lipophylic content. This gall does not form nutritive tissue, but salivary sheaths left by the inducers were observed near the parenchyma, vascular bundles and secretory cavities. This study complements our current knowledge of gall biology and sheds further light on the plasticity of plant tissues stimulated by biotic factors.

  10. The development of a murine model for Forcipomyia taiwana (biting midge) allergy.

    Science.gov (United States)

    Lee, Mey-Fann; Yang, Kai-Jei; Wang, Nancy M; Chiu, Yung-Tsung; Chen, Pei-Chih; Chen, Yi-Hsing

    2014-01-01

    Forcipomyia taiwana (biting midge) allergy is the most prevalent biting insect allergy in Taiwan. An animal model corresponding to the human immuno-pathologic features of midge allergy is needed for investigating the mechanisms and therapies. This study successfully developed a murine model of Forcipomyia taiwana allergy. BALB/c mice were sensitized intra-peritoneally with midge extract on days 0, 7, 14, 21 then intra-dermally on days 28, 31 and 35. Serum midge-specific IgE, IgG1, and IgG2a were measured every 14 days by indirect ELISA. The mice were challenged intradermally with midge extract at day 40 and then sacrificed. Proliferation and cytokine production of splenocytes after stimulation with midge extract were determined by MTT assay and ELISA, respectively. The cytokine mRNA expression in response to midge stimulation was analyzed by RT-PCR. Serum IgE, total IgG, and IgG1 antibody levels against midge extract were significantly higher in the midge-sensitized mice than in the control mice. After the two-step sensitization, all mice in the midge-sensitized group displayed immediate itch and plasma extravasation reactions in response to challenge with midge extract. Skin histology from midge-sensitized mice showed marked eosinophil and lymphocyte infiltrations similar to that observed in humans. Stimulation of murine splenocytes with midge extract elicited significant proliferation, IL-4, IL-10, IL-13 and IFN-γ protein production, and up-regulation of mRNA in a dose-dependent manner in the midge-sensitized group, but not in the control group. A murine model of midge bite allergy has been successfully developed using a two-step sensitization protocol. The sensitized mice have very similar clinical and immunologic reactions to challenge with midge proteins as the reactions of human to midge bites. This murine model may be a useful platform for future research and the development of treatment strategies for insect bite allergy.

  11. Fungus-insect gall of Phlebopus portentosus.

    Science.gov (United States)

    Zhang, Chun-Xia; He, Ming-Xia; Cao, Yang; Liu, Jing; Gao, Feng; Wang, Wen-Bing; Ji, Kai-Ping; Shao, Shi-Cheng; Wang, Yun

    2015-01-01

    Phlebopus portentosus is a popular edible wild mushroom found in the tropical Yunnan, China, and northern Thailand. In its natural habitats, a gall often has been found on some plant roots, around which fungal fruiting bodies are produced. The galls are different from common insect galls in that their cavity walls are not made from plant tissue but rather from the hyphae of P. portentosus. Therefore we have termed this phenomenon "fungus-insect gall". Thus far six root mealy bug species in the family Pseudococcidae that form fungus-insect galls with P. portentosus have been identified: Formicococcus polysperes, Geococcus satellitum, Planococcus minor, Pseudococcus cryptus, Paraputo banzigeri and Rastrococcus invadens. Fungus-insect galls were found on the roots of more than 21 plant species, including Delonix regia, Citrus maxima, Coffea arabica and Artocarpus heterophyllus. Greenhouse inoculation trials showed that fungus-insect galls were found on the roots of A. heterophyllus 1 mo after inoculation. The galls were subglobose to globose, fulvous when young and became dark brown at maturation. Each gall harbored one or more mealy bugs and had a chimney-like vent for ventilation and access to the gall. The cavity wall had three layers. Various shaped mealy bug wax deposits were found inside the wall. Fungal hyphae invaded the epidermis of plant roots and sometimes even the cortical cells during the late stage of gall development. The identity of the fungus inside the cavity was confirmed by molecular methods. © 2015 by The Mycological Society of America.

  12. 77 FR 73654 - Eau Galle Renewable Energy Company, Eau Galle Hydro, LLC; Notice of Transfer of Exemption

    Science.gov (United States)

    2012-12-11

    ... Renewable Energy Company, Eau Galle Hydro, LLC; Notice of Transfer of Exemption 1. By letter filed October 12, 2012, Eau Galle Renewable Energy Company informed the Commission that its exemption from... transferred to Eau Galle Renewable Energy Company by letter.\\2\\ The project is located on the Eau Galle River...

  13. Regional differences in constituents of gall stones.

    Science.gov (United States)

    Ashok, M; Nageshwar Reddy, D; Jayanthi, V; Kalkura, S N; Vijayan, V; Gokulakrishnan, S; Nair, K G M

    2005-01-01

    The pathogenesis of pigment and mixed gall stone formation remains elusive. The elemental constituents of gall stones from southern states of Tamil Nadu, Kerala and Karnataka have been characterized. Our aim was to determine the elemental concentration of representative samples of pigment, mixed and cholesterol gall stones from Andhra Pradesh using proton-induced X-ray emission (PIXE) using a 3 MV horizontal pelletron accelerator. Pigment gall stones had significantly high concentrations of copper, iron and lead; chromium was absent. Except for iron all these elements were significantly low in cholesterol gall stones and intermediate levels were seen in mixed gall stones. Highest concentrations of chromium was seen in cholesterol and titanium in mixed gall stones respectively; latter similar to other southern states. Arsenic was distinctly absent in cholesterol and mixed gall stones. The study has identified differences in elemental components of the gall stones from Andhra Pradesh.

  14. Practices to manage chestnut orchards infested by the Chinese gall wasp

    Directory of Open Access Journals (Sweden)

    Turchetti T

    2012-10-01

    Full Text Available The rapid spread of the Chinese gall wasp (Dryocosmus kuriphilus Yasumatsu in Italian chestnut growing areas is causing new criticisms. In this context, in addition to a clear plant suffering due to the wasp infestation, the dangerous recurrence of chestnut blight and the sudden spread of Gnomoniopsis sp., a coloniser of galls but also the etiological agent of nut brown rot, must be considered. Therefore, it is very important to increase the plants’ vigour and prevent their decline. Preliminary experiments were carried out in different Italian regions between 2010 and 2011. Organic plant fertilizers were applied to plants showing middle or high defoliation levels caused by the wasp attacks. The observations carried out during the growing season indicate a good vegetative restart in the treated plants compared to the untreated controls, in all the situations and independently of the fertilizers applied. Most of the treated plants (between the 75% and the 100% showed an evident improvement in the canopy vegetation, while the untreated controls were always classified in the worse classes of crown condition. These preliminary results highlight the efficacy of this kind of treatments for infested chestnut stands. This strategy, which is based on the preliminary evaluation of the plant vigour (following the proposed scale of attack severity and lack of foliage, consists in a manuring treatment at vegetative restart, which can be repeated in the following years in dependence on the results obtained. Moreover, pruning may be suggested only to manage the development of plants showing a definite recovery. The gall wasp pullulation requires new management strategies aimed at preserving the chestnut orchards, in order to avoid the chestnut cultivation to be marginalized or abandoned.

  15. Duplex gall bladder: bystander or culprit.

    Science.gov (United States)

    Kumar, Jogender; Yadav, Arushi

    2017-08-30

    Gall bladder (GB) duplication is a rare anatomical malformation, which can be detected by preoperative imaging study. We present a case of duplex gall bladder in a 14-year-old boy who presented with abdominal pain. On ultrasound, he had right nephrolithiasis and duplex gall bladder. Duplex gall bladder was confirmed on MR cholangiopancreatography. There was a dilemma for surgical management of duplex gall bladder; however, he became asymptomatic after conservative treatment. Prophylactic surgery is not recommended for asymptomatic incidentally detected duplex gall bladder. Radiologists and paediatric surgeons should be sensitised about the exact anatomy of this entity. © BMJ Publishing Group Ltd (unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  16. Presumptive migrating gall bladder mucocoele in two dogs with gall bladder rupture.

    Science.gov (United States)

    Burchell, R K; Thornton, L; Lim, C K; Murakami, M; Nakamura, Y; Gal, A

    2017-12-13

    A 10-year-old neutered female soft-coated wheaten terrier and a 10-year-old, entire female Pomeranian were presented for vomiting and anorexia. Using ultrasound, an oval structure with a stellate, kiwifruit-like appearance typical of a gall bladder mucocoele was observed in the caudal abdomen of the soft-coated wheaten terrier and adjacent to the liver in the Pomeranian. There was also a moderate volume of abdominal effusion in both dogs. Cytology of the peritoneal fluid indicated a sterile exudative process but varied between the two dogs, with an absence of bile pigment in the soft-coated wheaten terrier and marked bile peritonitis in the Pomeranian. An entire free-floating ectopic mucocoele was confirmed via exploratory laparotomy with concomitant gall bladder rupture and common bile duct obstruction. Both dogs recovered completely after surgery. This is the first report of cases of gall bladder rupture with entire free-floating gall bladder mucocoeles in dogs. © 2017 British Small Animal Veterinary Association.

  17. Shifts in Plant Assemblages Reduce the Richness of Galling Insects Across Edge-Affected Habitats in the Atlantic Forest.

    Science.gov (United States)

    Souza, Danielle G; Santos, Jean C; Oliveira, Marcondes A; Tabarelli, Marcelo

    2016-10-01

    Impacts of habitat loss and fragmentation on specialist herbivores have been rarely addressed. Here we examine the structure of plant and galling insect assemblages in a fragmented landscape of the Atlantic forest to verify a potential impoverishment of these assemblages mediated by edge effects. Saplings and galling insects were recorded once within a 0.1-ha area at habitat level, covering forest interior stands, forest edges, and small fragments. A total of 1,769 saplings from 219 tree species were recorded across all three habitats, with differences in terms of sapling abundance and species richness. Additionally, edge-affected habitats exhibited reduced richness of both host-plant and galling insects at plot and habitat spatial scale. Attack levels also differed among forest types at habitat spatial scale (21.1% of attacked stems in forest interior, 12.4% in small fragments but only 8.5% in forest edges). Plot ordination resulted in three clearly segregated clusters: one formed by forest interior, one by small fragments, and another formed by edge plots. Finally, the indicator species analysis identified seven and one indicator plant species in forest interior and edge-affected habitats, respectively. Consequently, edge effects lead to formation of distinct taxonomic groups and also an impoverished assemblage of plants and galling insects at multiple spatial scales. The results of the present study indicate that fragmentation-related changes in plant assemblages can have a cascade effects on specialist herbivores. Accordingly, hyperfragmented landscapes may not be able to retain an expressive portion of tropical biodiversity. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. Nursery Pest Management of Phytolyma lata Walker (Scott) Attack ...

    African Journals Online (AJOL)

    The establishment of plantations of Milicia excelsa has been constrained by the gall-forming psyllid Phytolyma lata Walker (Scott) that causes extensive damage to young plants. We present findings of an experiment aimed at preventing Phytolyma attack on Milicia seedlings in the nursery using chemical control and ...

  19. The gall wasp Leptocybe invasa (Hymenoptera: Eulophidae) stimulates different chemical and phytohormone responses in two Eucalyptus varieties that vary in susceptibility to galling.

    Science.gov (United States)

    Li, X Q; Liu, Y Z; Guo, W F; Solanki, M K; Yang, Z D; Xiang, Y; Ma, Z C; Wen, Y G

    2017-09-01

    Gall-inducing insects produce various types of galls on plants, but little is known about the gall-induction mechanism of these galling insects. The gall wasp Leptocybe invasa Fisher & LaSalle (Hymenoptera: Eulophidae) forms galls of different sizes on several Eucalyptus species. To clarify the physiological responses of Eucalyptus to L. invasa infestation, we measured the dynamics of nitrogen (N), carbon (C), total phenolics, total tannins and four types of phytohormones (zeatin [Z] + zeatin riboside [ZR], gibberellins [GA], indole-3-acetic acid [IAA] and abscisic acid [ABA]) in galled and ungalled leaf tissues of two Eucalyptus horticultural varieties (DH201-2 [Eucalyptus grandis × Eucalyptus camaldulensis] and EA [Eucalyptus exserta]) with different susceptibility to galling throughout the larval developmental stages. Nitrogen, total phenolics, tannins and four kinds of phytohormones strongly accumulated in tissues galled by L. invasa (especially during early larval feeding stages). While N, Z + ZR and GA levels were higher, tannins and ABA levels were lower in the galled tissues on the highly susceptible variety. Nitrogen, total phenolics, GA, Z + ZR and IAA levels in the galled tissues gradually decreased during gall development, but ABA and tannins conversely increased in the galled tissues of the less susceptible variety. Our results suggest that the effects of gall-inducing insects on plants depend not only on the susceptibility of the plant infested but also on the developmental stage of galled tissues. Gall formation process is thus synergistically influenced by both gall-inducing insect and plant genotypes. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  20. Effects of environmental parameters on the chestnut gall wasp and its complex of indigenous parasitoids

    Science.gov (United States)

    Bonsignore, Carmelo Peter; Bernardo, Umberto

    2018-04-01

    The chestnut gall wasp (CGW), Dryocosmus kuriphilus, an invasive pest native to China, has caused severe yield and economic losses to chestnut production in Europe since its arrival in 2002. In Southern Italy, the complex of indigenous parasitoids colonizing CGW was monitored between 2013 and 2015, with the aim of estimating the composition of the indigenous parasitoid complex, its ability to control CGW populations, and the interactions of both factors with several measured environmental parameters. We compared results among three differently managed field types. Results showed an increase in the rate of parasitism both when the host population density was lower and in unmanaged chestnut stands with more natural conditions. The percentage of parasitism in galls was related to morphological traits of the galls and to higher seasonal temperatures, which reduced the parasitism intensity because CGW develops earlier under such conditions. The host-parasitoid mortality inside galls varied among sites and was associated mostly with rot fungi during wet spring and summer months. Parasitoid species richness was similar among the study sites, but the proportion of parasitoid species differed between orchards and unmanaged coppice stands. The timing of attack by parasitoids followed a species-specific successional sequence throughout the larva-to-adult life cycle of the CGW. These interactions should be considered in future research on trophic relationships and when modeling invasive scenarios for new pest species.

  1. Roughness characterization of the galling of metals

    Science.gov (United States)

    Hubert, C.; Marteau, J.; Deltombe, R.; Chen, Y. M.; Bigerelle, M.

    2014-09-01

    Several kinds of tests exist to characterize the galling of metals, such as that specified in ASTM Standard G98. While the testing procedure is accurate and robust, the analysis of the specimen's surfaces (area=1.2 cm) for the determination of the critical pressure of galling remains subject to operator judgment. Based on the surface's topography analyses, we propose a methodology to express the probability of galling according to the macroscopic pressure load. After performing galling tests on 304L stainless steel, a two-step segmentation of the S q parameter (root mean square of surface amplitude) computed from local roughness maps (100 μ m× 100 μ m) enables us to distinguish two tribological processes. The first step represents the abrasive wear (erosion) and the second one the adhesive wear (galling). The total areas of both regions are highly relevant to quantify galling and erosion processes. Then, a one-parameter phenomenological model is proposed to objectively determine the evolution of non-galled relative area A e versus the pressure load P, with high accuracy ({{A}e}=100/(1+a{{P}2}) with a={{0.54}+/- 0.07}× {{10}-3} M P{{a}-2} and with {{R}2}=0.98). From this model, the critical pressure of galling is found to be equal to 43MPa. The {{S}5 V} roughness parameter (the five deepest valleys in the galled region's surface) is the most relevant roughness parameter for the quantification of damages in the ‘galling region’. The significant valleys’ depths increase from 10 μm-250 μm when the pressure increases from 11-350 MPa, according to a power law ({{S}5 V}=4.2{{P}0.75}, with {{R}2}=0.93).

  2. Cecidonius pampeanus, gen. et sp. n.: an overlooked and rare, new gall-inducing micromoth associated with Schinus in southern Brazil (Lepidoptera, Cecidosidae).

    Science.gov (United States)

    Moreira, Gilson R P; Eltz, Rodrigo P; Pase, Ramoim B; Silva, Gabriela T; Bordignon, Sérgio A L; Mey, Wolfram; Gonçalves, Gislene L

    2017-01-01

    Galls induced by the larval stage of cecidosids (Lepidoptera: Cecidosidae) are complex, multi-trophic systems, still poorly studied. They may be associated with other insect feeding guilds, including inquilines, kleptoparasites, cecidophages, parasitoids, and predators. By causing death of the gall inducer early in life and altering the gall phenotype, inquilines may lead to misidentification of the true gall inducers. Here, we describe through light and scanning electron microscopy Cecidonius pampeanus , a new genus and species of cecidosid moth, from the Pampa biome, south Brazil. It induces unnoticed, small galls under swollen stems of Schinus weinmannifolius Mart. ex Engl. (Anacardiaceae). Such galls are severely attacked early in ontogeny either by unidentified parasitoids belonging to Lyrcus Walker (Pteromalidae) that feed upon the inducer, or by inquiline wasps of the genus Allorhogas Gahan (Braconidae). The inquilines modify the galls into large ones that last longer and promptly call attention. Free-living galls are rare and dehiscent, pupation of C. pampeanus occurring on the ground. Due to these reasons the true inducer has been overlooked in this case for more than a century. Additionally we inferred a phylogeny for Cecidosidae using sequences from mitochondrial and nuclear loci, and characterized genetic variation and gene flow across ten populations. Despite its natural history similarities with the African genus Scyrotis , Cecidonius is a much younger lineage, more closely related to the Neotropical cecidosids. C. pampeanus populations, which are now confined to a few mountain areas within its distribution range due to habitat destruction, are also genetically isolated, requiring conservation measures.

  3. New species of Lopesia Rübsaamen (Diptera: Cecidomyiidae associated with Andira humilis Mart. ex Benth. (Fabaceae

    Directory of Open Access Journals (Sweden)

    Carolina de Almeida Garcia

    2017-07-01

    Full Text Available A new species of Lopesia Rübsaamen, 1908 induces leaf galls on Andira humilis (Fabaceae in the Cerrado biome (Brazilian savanna of Bahia, Mato Grosso and São Paulo states, Brazil. Larva, pupa, female, and male of this new species of gall midge are described and illustrated in this paper. Keywords: Cerrado, Gall maker, Insect–plant interaction, Neotropical region, Taxonomy

  4. Phylogeny, evolution and classification of gall wasps: the plot thickens.

    Directory of Open Access Journals (Sweden)

    Fredrik Ronquist

    Full Text Available Gall wasps (Cynipidae represent the most spectacular radiation of gall-inducing insects. In addition to true gall formers, gall wasps also include phytophagous inquilines, which live inside the galls induced by gall wasps or other insects. Here we present the first comprehensive molecular and total-evidence analyses of higher-level gall wasp relationships. We studied more than 100 taxa representing a rich selection of outgroups and the majority of described cynipid genera outside the diverse oak gall wasps (Cynipini, which were more sparsely sampled. About 5 kb of nucleotide data from one mitochondrial (COI and four nuclear (28S, LWRh, EF1alpha F1, and EF1alpha F2 markers were analyzed separately and in combination with morphological and life-history data. According to previous morphology-based studies, gall wasps evolved in the Northern Hemisphere and were initially herb gallers. Inquilines originated once from gall inducers that lost the ability to initiate galls. Our results, albeit not conclusive, suggest a different scenario. The first gall wasps were more likely associated with woody host plants, and there must have been multiple origins of gall inducers, inquilines or both. One possibility is that gall inducers arose independently from inquilines in several lineages. Except for these surprising results, our analyses are largely consistent with previous studies. They confirm that gall wasps are conservative in their host-plant preferences, and that herb-galling lineages have radiated repeatedly onto the same set of unrelated host plants. We propose a revised classification of the family into twelve tribes, which are strongly supported as monophyletic across independent datasets. Four are new: Aulacideini, Phanacidini, Diastrophini and Ceroptresini. We present a key to the tribes and discuss their morphological and biological diversity. Until the relationships among the tribes are resolved, the origin and early evolution of gall wasps will

  5. New species of Lopesia (Diptera, Cecidomyiidae associated with Eichhornia azurea (Pontederiaceae from Brazil

    Directory of Open Access Journals (Sweden)

    Maria V. Urso-Guimarães

    2014-12-01

    Full Text Available A new species of gall midge, Lopesia eichhorniae sp. nov. (Cecidomyiidae, Diptera, associated with rhizomes of Eichhornia azurea (Sw. Kunth (Pontederiaceae is described. This is the first record of Lopesia galls in this species of macrophyte, quite common in natural and artificial lakes in Southeast Brazil. Illustrations of the adults (male and female, pupa, larva, and gall of the new species are presented.

  6. CLINICO-PATHOLOGICAL STUDY OF CARCINOMA GALL BLADDER

    Directory of Open Access Journals (Sweden)

    Ravindra

    2015-12-01

    Full Text Available INTRODUCTION Gall bladder cancer is 5th most common cancer of GIT. It is associated with cholelithiasis in significant number of patients. Cholelithiasis is cause or effect of gall bladder cancer is still uncertain. There are many risk factors which are common to both gall stones and cancer. Preoperative diagnosis of gall bladder cancer is increased with better and new investigation facilities. AIM The study was aimed to assess clinicopathological behaviour, sociodemography, diagnostic modalities and treatment of cancer gall bladder. MATERIAL AND METHODS It was a type of prospective study which included 75 patients with clinical features suggestive of biliary disease. Various diagnostic modalities and treatment options were assessed along with sociodemography and clinical picture. RESULT Common clinical features were pain abdomen, obstructive jaundice and lump. Nearly one third of the patients were having anaemia and abnormal liver function tests. Majority had gall bladder fossa mass with liver extension and gall stones. The most common histopathological variety of carcinoma Gallbladder was Adenocarcinoma. CONCLUSION Carcinoma Gallbladder was found to affect predominantly the older female patients after the age of 40 years. Cholelithiasis was found in 69.3% patients of carcinoma Gallbladder. The most common clinical presentation was pain abdomen (90.7%. The most common histopathological variety of carcinoma Gallbladder was Adenocarcinoma. Majority of patients were treated with palliative measures.

  7. Galling of unlubricated close-fitting metal parts

    International Nuclear Information System (INIS)

    Wensel, R.G.

    1979-09-01

    Galling susceptibility tests employing threaded and disc-shaped specimens of 42 different combinations of corrosion-resistant alloys are described. Data to assist designers in selecting combinations of corrosion-resistant materials on the basis of galling susceptibility are presented. A test technique using small disc-shaped specimens is described. This provides a sensitive measure of susceptibility of metal pairs to galling. (author)

  8. Mango leaf gall formation: varietal susceptibility and within tree distribution

    International Nuclear Information System (INIS)

    Khan, H.A.; Akram, W.; Khan, M.A.

    2012-01-01

    The present study was carried out to screen most commonly cultivated mango, Mangifera indica L., cultivars for their susceptibility to gall formation. Sarooli cultivar proved to be the most resistant one by having a minimum number of galls per 100 leaves. The abundance of galls in four quadrants of the tree i.e., east, west, north and south, was also studied which revealed that east quadrant had maximum number of galls while the abundance of galls in the remaining quadrants was variable. Gall formation on mango leaves seemed to increase gradually with increasing height from the ground level, reached a maximum at the height 12 ft to 16 ft and then declined. Leaf area measurements and nutrient analysis of the leaves were also done to see their impact on gall formation. Correlation analysis revealed that gall formation was positively linked with leaf area and the amount of Zn (ppm), P (%), K (%) while N (%) had negative correlation (P<0.05) with gall formation. In conclusion, the findings of the present study could be helpful in the management of mango leaf gall formation. (author)

  9. Photosynthesis and sink activity of wasp-induced galls in Acacia pycnantha.

    Science.gov (United States)

    Dorchin, Netta; Cramer, Michael D; Hoffmann, John H

    2006-07-01

    Although insect galls are widely known to influence source-sink relationships in plants, the relationship between photosynthesis and gall activity has not been extensively studied. In this study we used 14CO2, photosynthesis, and respiration measurements to examine the capacity of bud galls induced by the wasp Trichilogaster signiventris (Pteromalidae) as carbon sinks in Acacia pycnantha. Galls of this species develop either in vegetative or reproductive buds, depending on the availability of tissues at different times of the year, and effectively eliminate seed production by the plant. Photosynthetic rates in phyllodes subtending clusters of galls were greater than rates in control phyllodes, a result we attributed to photosynthesis compensating for increased carbon demand by the galls. Contrary to previous studies, we found that photosynthesis within galls contributed substantially to the carbon budgets of the galls, particularly in large, mature galls, which exhibited lower specific respiration rates allowing for a net carbon gain in the light. To determine the sink capacity and competitive potential of galls, we measured the proportion of specific radioactivity in galls originating from either vegetative or reproductive buds and found no difference between them. The proportion of the total amount of phyllode-derived 14C accumulated in both clustered and solitary galls was less than that in fruits. Galls and fruits were predominantly reliant on subtending rather than on distant phyllodes for photosynthate. Solitary galls that developed in vegetative buds constituted considerably stronger sinks than galls in clusters on inflorescences where there was competition between galls or fruits for resources from the subtending phyllode. Wasps developing in solitary vegetative galls were correspondingly significantly larger than those from clustered galls. We conclude that, in the absence of inflorescence buds during summer and fall, the ability of the wasps to cause gall

  10. Gall bladder function test with Ceruletid

    International Nuclear Information System (INIS)

    Schindler, G.

    1981-01-01

    Compared with the stimulating food given orally in the gall bladder function test the administration of the decapeptide Ceruletid which is related with Cholecystokinin has the advantage of avoiding resorption disturbances in the upper gastrointestinal tract. To 100 patients with positive peroral cholecystography, Ceruletid was injected i.m. in a dose of 0.4 μg/kg body weight. The contrasting of the main bile duct was thus increased from 10% to 86%. The oral stimulating food brings an increase to appr. 20%. A special importance is assigned to the frequent diagnosis of adenomyomatoses which, with 6%, lies significantly above the 0.8% achieved by means of the oral stimulating food. More contractile segments of the gall bladder wall can cause pain symptoms which are typical for the biliary tract. Adenomyomatoses in the region of the infundibulum of the gall bladder cause colicky pains and are, as generally accepted, an absolute indication for a surgical intervention. The finding of small gall bladder conrements is often connected with a strong diminution of the gall bladder in order to prevent the small concrements from being overlapped by the non-contrasting bladder bile. Therefore, the application of Ceruletid should be considered also within the frame of the intravenous cholegraphy, thinking of the large number of normal gall bladder findings which were obtained with the oral stimulating food as the only diagnostical help. (orig./MG) [de

  11. Peripheral non-viral MIDGE vector-driven delivery of β-endorphin in inflammatory pain

    Directory of Open Access Journals (Sweden)

    Busch Melanie

    2009-12-01

    Full Text Available Abstract Background Leukocytes infiltrating inflamed tissue produce and release opioid peptides such as β-endorphin, which activate opioid receptors on peripheral terminals of sensory nerves resulting in analgesia. Gene therapy is an attractive strategy to enhance continuous production of endogenous opioids. However, classical viral and plasmid vectors for gene delivery are hampered by immunogenicity, recombination, oncogene activation, anti-bacterial antibody production or changes in physiological gene expression. Non-viral, non-plasmid minimalistic, immunologically defined gene expression (MIDGE vectors may overcome these problems as they carry only elements needed for gene transfer. Here, we investigated the effects of a nuclear localization sequence (NLS-coupled MIDGE encoding the β-endorphin precursor proopiomelanocortin (POMC on complete Freund's adjuvant-induced inflammatory pain in rats. Results POMC-MIDGE-NLS injected into inflamed paws appeared to be taken up by leukocytes resulting in higher concentrations of β-endorphin in these cells. POMC-MIDGE-NLS treatment reversed enhanced mechanical sensitivity compared with control MIDGE-NLS. However, both effects were moderate, not always statistically significant or directly correlated with each other. Also, the anti-hyperalgesic actions could not be increased by enhancing β-endorphin secretion or by modifying POMC-MIDGE-NLS to code for multiple copies of β-endorphin. Conclusion Although MIDGE vectors circumvent side-effects associated with classical viral and plasmid vectors, the current POMC-MIDGE-NLS did not result in reliable analgesic effectiveness in our pain model. This was possibly associated with insufficient and variable efficacy in transfection and/or β-endorphin production. Our data point at the importance of the reproducibility of gene therapy strategies for the control of chronic pain.

  12. Assessing the Economic Importance of Dasineura oxycoccana (Diptera: Cecidomyiidae) in Northern Highbush Blueberries.

    Science.gov (United States)

    Hahn, Noel G; Isaacs, Rufus

    2015-08-01

    Infestation by blueberry gall midge, Dasineura oxycoccana Johnson, is common in northern highbush blueberries, but its effects on crop productivity are unknown. We examined whether infestation by blueberry gall midge reduces flower bud production when compared with uninfested shoots, and how infestation at different times affects the crop response. From the fall of 2009 to the spring of 2011, the number of flower buds on infested and uninfested shoots of blueberry bushes was counted and compared. Despite causing branching of vegetative growth, there was no significant effect of infestation on flower bud production. During the summer of 2010, damaged shoots were marked throughout the growing season in June, July, or August. The number of flower buds set per shoot declined with later infestation dates, and shoots damaged in August had significantly fewer buds than those damaged in June and July. We discuss the implications of these findings for management of blueberry gall midge in northern highbush blueberry. © The Authors 2015. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Galls and gall makers in plants from the Pé-de-Gigante Cerrado Reserve, Santa Rita do Passa Quatro, SP, Brazil.

    Science.gov (United States)

    Urso-Guimarães, M V; Scareli-Santos, C

    2006-02-01

    Thirty-six morphologically different types of galls were obtained in leaves, leaflets, veins, petioles, stems, tendrils and flower buds from twenty-five species of plants in the Pé-de-Gigante Reserve, municipality of Santa Rita do Passa Quatro, state of São Paulo, Brazil. The host plant species belong to the closely related families Anacardiaceae, Annonaceae, Asteraceae, Bignoniaceae, Caryocaraceae, Erythroxylaceae, Fabaceae, Malpighiaceae, Melastomataceae, Myrtaceae, Ochnaceae, Polygalaceae, Sapindaceae, Sapotaceae, and Smilacaceae. The most common gall makers included Cecidomyiidae (Diptera), Pteromalidae (Hymenoptera) and Diaspididae (Sternorrhyncha-Hemiptera). This is the first report of galls found in the following plant genera: Gochnatia (Asteraceae), Distictela (Bignoniaceae), Banisteriopsis (Malpighiaceae), Ouratea (Ochnaceae), and Bredemeyera (Polygalaceae). The results of this work contribute to the body of knowledge about the relationship among host plants, gall makers, and the gall morphology of Pé-de-Gigante Cerrado Reserve.

  14. Galls and gall makers in plants from the Pé-de-Gigante Cerrado Reserve, Santa Rita do Passa Quatro, SP, Brazil

    Directory of Open Access Journals (Sweden)

    M. V. Urso-Guimarães

    Full Text Available Thirty-six morphologically different types of galls were obtained in leaves, leaflets, veins, petioles, stems, tendrils and flower buds from twenty-five species of plants in the Pé-de-Gigante Reserve, municipality of Santa Rita do Passa Quatro, state of São Paulo, Brazil. The host plant species belong to the closely related families Anacardiaceae, Annonaceae, Asteraceae, Bignoniaceae, Caryocaraceae, Erythroxylaceae, Fabaceae, Malpighiaceae, Melastomataceae, Myrtaceae, Ochnaceae, Polygalaceae, Sapindaceae, Sapotaceae, and Smilacaceae. The most common gall makers included Cecidomyiidae (Diptera, Pteromalidae (Hymenoptera and Diaspididae (Sternorrhyncha-Hemiptera. This is the first report of galls found in the following plant genera: Gochnatia (Asteraceae, Distictela (Bignoniaceae, Banisteriopsis (Malpighiaceae, Ouratea (Ochnaceae, and Bredemeyera (Polygalaceae. The results of this work contribute to the body of knowledge about the relationship among host plants, gall makers, and the gall morphology of Pé-de-Gigante Cerrado Reserve.

  15. The biology of gall-inducing arthropods.

    Science.gov (United States)

    Gyuri Csoka; William J. Mattson; Graham N. Stone; Peter W. Price

    1998-01-01

    This proceedings explores many facets of the ever intriguing and enigmatic relationships between plants and their gall-forming herbivores. The research reported herein ranges from studies on classical biology and systematics of galling to molecular phylogeny, population genetics, and ecological and evolutionary theory. Human kind has much to learn and gain from...

  16. A new genus and species of Lasiopteridi (Diptera, Cecidomyiidae on Haplopappus foliosus (Asteraceae from Chile

    Directory of Open Access Journals (Sweden)

    Valéria Cid Maia

    2017-04-01

    Full Text Available A new genus and species of gall midge, Haplopappusmyia gregaria, is described and illustrated (larva, pupa, male, and female. This species induces apical galls on Haplopappus foliosus (Asteraceae, an endemic shrub from central Chile. The specimens were collected at La Ligua Municipality, Petorca Province, Valparaiso region, Chile, during spring of 2011–2014. This area corresponds to one of the fifth Mediterranean Matorral biome, considered among Earth's biodiversity hotspots. The new genus is characterized by presenting lateral margin of antennal scape with a mesal reentrance; four-segmented palpus, one-toothed tarsal claws, R5 straight, reaching C anterior to wing apex; male seventh and eighth tergites lacking sclerotization mesally, beyond proximal margin; presence of trichoid sensilla on the abdominal terga and sterna of both sexes, protrusible ovipositor with elongate fused cerci, and larva with 4 pairs of setose terminal papillae. Keywords: Gall midge, Morphology, Neotropical, Taxonomy

  17. Unusual presentation of metastatic gall bladder cancer

    Directory of Open Access Journals (Sweden)

    Piyush Shukla

    2014-01-01

    Full Text Available To report the first case of rare isolated breast metastasis from carcinoma gall bladder. Single patient case report. A 35-year-old pre-menopausal female presented with 2 FNx01 2 cm right upper outer quadrant breast lump. Post-mastectomy, histology confirmed it to be metastatic adenocarcinoma positive for both Cytokeratin (CK 7 and CK20. Past history as told by the patient revealed that 2 years back, cholecystectomy was performed for gall stones, of which no histology reports were present; she had a port site scar recurrence which showed it to be adenocarcinoma. Adjuvant chemotherapy and radiotherapy was advised which the patient did not complete. This is probably the first case reported of isolated breast metastasis from gall bladder carcinoma, diagnosed retrospectively. It also highlights the importance of adjuvant treatment in gall bladder malignancy.

  18. Fungal endophytes which invade insect galls: insect pathogens, benign saprophytes, or fungal inquilines?

    Science.gov (United States)

    Wilson, Dennis

    1995-08-01

    Fungi are frequently found within insect galls. However, the origin of these fungi, whether they are acting as pathogens, saprophytes invading already dead galls, or fungal inquilines which invade the gall but kill the gall maker by indirect means, is rarely investigated. A pathogenic role for these fungi is usually inferred but never tested. I chose the following leaf-galling-insect/host-plant pairs (1) a cynipid which forms two-chambered galls on the veins of Oregon white oak, (2) a cynipid which forms single-chambered galls on California coast live oak, and (3) an aphid which forms galls on narrowleaf cottonwood leaves. All pairs were reported to have fungi associated with dead insects inside the gall. These fungi were cultured and identified. For the two cynipids, all fungi found inside the galls were also present in the leaves as fungal endophytes. The cottonwood leaves examined did not harbor fungal endophytes. For the cynipid on Oregon white oak, the fungal endophyte grows from the leaf into the gall and infects all gall tissue but does not directly kill the gall maker. The insect dies as a result of the gall tissue dying from fungal infection. Therefore, the fungus acts as an inquiline. Approximately 12.5% of these galls die as a result of invasion by the fungal endophyte.

  19. A Single Swede Midge (Diptera: Cecidomyiidae) Larva Can Render Cauliflower Unmarketable.

    Science.gov (United States)

    Stratton, Chase A; Hodgdon, Elisabeth A; Zuckerman, Samuel G; Shelton, Anthony M; Chen, Yolanda H

    2018-05-01

    Swede midge, Contarinia nasturtii Kieffer (Diptera: Cecidomyiidae), is an invasive pest causing significant damage on Brassica crops in the Northeastern United States and Eastern Canada. Heading brassicas, like cauliflower, appear to be particularly susceptible. Swede midge is difficult to control because larvae feed concealed inside meristematic tissues of the plant. In order to develop damage and marketability thresholds necessary for integrated pest management, it is important to determine how many larvae render plants unmarketable and whether the timing of infestation affects the severity of damage. We manipulated larval density (0, 1, 3, 5, 10, or 20) per plant and the timing of infestation (30, 55, and 80 d after seeding) on cauliflower in the lab and field to answer the following questions: 1) What is the swede midge damage threshold? 2) How many swede midge larvae can render cauliflower crowns unmarketable? and 3) Does the age of cauliflower at infestation influence the severity of damage and marketability? We found that even a single larva can cause mild twisting and scarring in the crown rendering cauliflower unmarketable 52% of the time, with more larvae causing more severe damage and additional losses, regardless of cauliflower age at infestation.

  20. Sugary secretions of wasp galls: a want-to-be extrafloral nectar?

    Science.gov (United States)

    Aranda-Rickert, Adriana; Rothen, Carolina; Diez, Patricia; González, Ana María; Marazzi, Brigitte

    2017-11-10

    The most widespread form of protective mutualisms is represented by plants bearing extrafloral nectaries (EFNs) that attract ants and other arthropods for indirect defence. Another, but less common, form of sugary secretion for indirect defence occurs in galls induced by cynipid wasps. Until now, such galls have been reported only for cynipid wasps that infest oak trees in the northern hemisphere. This study provides the first evidence of galls that exude sugary secretions in the southern hemisphere and asks whether they can be considered as analogues of plants' EFNs. The ecology and anatomy of galls and the chemical composition of the secretion were investigated in north-western Argentina, in natural populations of the host trees Prosopis chilensis and P. flexuosa . To examine whether ants protect the galls from natural enemies, ant exclusion experiments were conducted in the field. The galls produce large amounts of sucrose-rich, nectar-like secretions. No typical nectary and sub-nectary parenchymatic tissues or secretory trichomes can be observed; instead there is a dense vascularization with phloem elements reaching the gall periphery. At least six species of ants, but also vespid wasps, Diptera and Coleoptera, consumed the gall secretions. The ant exclusion experiment showed that when ants tended galls, no differences were found in the rate of successful emergence of gall wasps or in the rate of parasitism and inquiline infestation compared with ant-excluded galls. The gall sugary secretion is not analogous to extrafloral nectar because no nectar-producing structure is associated with it, but is functionally equivalent to arthropod honeydew because it provides indirect defence to the plant parasite. As in other facultative mutualisms mediated by sugary secretions, the gall secretion triggers a complex multispecies interaction, in which the outcome of individual pair-wise interactions depends on the ecological context in which they take place. © The Author

  1. A new genus and species of gall midge (Diptera, Cecidomyiidae associated with Parkia pendula (Fabaceae, Mimosoideae Um novo gênero e espécie de mosquito galhador (Diptera: Cecidomyiidae associado com Parkia pendula (Fabaceae, Mimosoideae

    Directory of Open Access Journals (Sweden)

    Valéria Cid Maia

    2006-03-01

    Full Text Available Parkiamyia paraensis, a new genus and species of Cecidomyiidae that induces galls on Parkia pendula is described (larva, pupa, male,female and gall based on material from Pará (Brazil.Parkiamyia paraensis, um novo gênero e espécie de Cecidomyiidae é descrita (larva, pupa, macho e fêmea com base em material do Pará (Brasil.

  2. A new genus and species of gall midge (Diptera, Cecidomyiidae associated with Myrcia retorta (Myrtaceae Um novo gênero e espécie de mosquito galhador (Diptera, Cecidomyiidae associados com Myrcia retorta (Myrtaceae

    Directory of Open Access Journals (Sweden)

    Valéria Cid Maia

    2009-01-01

    Full Text Available Brethesia Maia, new genus and Brethesia myrciae Maia, new species of Cecidomyiidae are described and illustrated (male, female, pupa and gall based on material collected in Minas Gerais (Brazil. This new species induces leaf galls on Myrcia retorta (Myrtaceae.Brethesia myrciae, um novo gênero e espécie de Cecidomyiidae que induz galhas em Myrcia retorta (Myrtaceae são descritos e ilustrados (macho, fêmea, pupa e galha baseados em material coletado em Minas Gerais (Brazil.

  3. Sex-mediated herbivory by galling insects on Baccharis concinna (Asteraceae Herbivoria por insetos galhadores mediada pelo sexo em Baccharis concinna (Asteraceae

    Directory of Open Access Journals (Sweden)

    Marco Antonio A. Carneiro

    2006-09-01

    Full Text Available The interaction patterns between the dioecious shrub Baccharis concinna Barroso (Asteraceae and its speciose galling insect community were studied in southeastern Brazil. Two hypotheses were tested in this study: "the differential reproduction and growth hypothesis" that predicts that male plants present fewer reproductive structures and are larger than female plants; and the 'sex-biased herbivory hypothesis' that predicts that male plants support a larger abundance of insect galls than female plants. Plants did not show sexual dimorphism in growth (= mean leaf number. However, male plants had longer shoots and a lower average number of inflorescences than female plants. These results corroborate the hypothesis that male plants grow more and reproduce less than female plants. No statistically significant difference was found in the number of galls between male and female plants, but a sex by environmental effect on gall number was detected. When each species of galling insect was individually analyzed per population of the host plant, the rates of attack varied between sex and population of the host plant, and they were highly variable among the species of galling insects. These results highlight the importance of the interaction between sex and environment in the community structure of galling insects and indicate that other variables besides host sex may influence the patterns of attack by galling herbivores.Os padrões de interação entre o arbusto dióico Baccharis concinna Barroso (Asteraceae e sua diversa comunidade de insetos galhadores foram estudados na região sudeste do Brasil. Duas hipóteses foram testadas neste estudo: "a hipótese do crescimento e reprodução diferenciais", que prevê que plantas masculinas apresentam menos estruturas reprodutivas e são maiores do que plantas femininas; e a "hipótese da herbivoria mediada pelo sexo" que prevê que plantas masculinas sustentam uma maior abundância de insetos galhadores do que

  4. Left-sided gall bladder: Report of two cases

    Directory of Open Access Journals (Sweden)

    Chrungoo R

    2007-01-01

    Full Text Available Left-sided gall bladder without situs inversus viscerum is a rare albeit recognized clinical entity. We report our experience of two cases of left-sided gall bladder in two women aged 36 and 48 who underwent laparoscopic cholecystectomy for chronic calculous cholecystitis. Left-sided gall bladder may provide an unusual surprise to the surgeons during laparoscopy as routine pre-operative studies may not always detect the anomaly. Awareness of the unpredictable confluence of the cystic duct into the common bile duct (CBD and selective use of intraoperative cholangiography aid in the safe laparoscopic management of this unusual entity.

  5. Galling insects are bioindicators of environmental quality in a Conservation Unit

    Directory of Open Access Journals (Sweden)

    André Portugal Santana

    2014-12-01

    Full Text Available Galls are well distributed across the World and among plant families. Their diversity can support the status of conservation of an area as an urban park, once inventories are presented. These inventories also help to understand the morphological patterns of the galls, based on their most common shape, color, host botanical families, inducers and galled organs. This study is about an inventory of galls at Parque Estadual Serra Verde, Brazil. This conservation unit is an urban park strongly anthropized in a transition area of Cerrado and Mata Atlântica. Galls from four different trails were observed, and collected monthly during one year. The terminology morphospecies was used to distinguish the galls because the identification of the inducers were not always possible. Seventy five morphospecies of galls belonging to 43 host plant species of 24 botanical families were observed. Mostly of the galls was induced by Diptera:Cecidomyiidae, in Fabaceae and Myrtaceae. The most common traits were the globoid shape and green color. The leaves were the most frequent galled organ and followed by the stems. All these tendencies had been already observed in other inventories. Comparing current results with other studies at similar areas, we can assume that the Parque Estadual Serra Verde is very important for conservation. Urban green areas are subject to high disturbance and degradation but also increase the quality of life for the population inhabiting the areas nearby. The diversity of galls at Parque Estadual Serra Verde reflects an area with high levels of stress but with moderate botanical diversity. These features make this protected area an important site for the continuous conservation and regeneration, and highlight the environmental value of Parque Estadual Serra Verde.

  6. A cadaveric study involving variations in external morphology of gall bladder

    Directory of Open Access Journals (Sweden)

    Anjankar Vaibhav Prakash, Panshewdikar Pradnyesh N, Joshi DS, Anjankar Ashish Prakash

    2013-04-01

    Full Text Available Background: Variations in the pattern of the extra hepatic biliary tract are usual and are commonly encountered during some radiological investigations or in operation theaters. Such Variations of the morphology of Gall bladder have been well documented in the literature for many years but a detail morphological study of variations of the gall bladder and its incidence is very rare. In this era of quick results, increasing use of diagnostic and interventional procedures makes it important to study variations of gall bladder morphology. Most of the interventional procedures in this modern era are done laparoscopically and there is tremendous increase in the number of laparoscopic cholecystectomies. So, sound knowledge of possible variations in morphology of gall bladder is important. Materials and Methods: This study was undertaken on 90 cadaveric liver and gall bladder specimens in terms of length, maximum transverse diameter, shape, external variations of gall bladder, Interior and length of gall bladder below the inferior border of the liver. Results: GB had length ranging between 7 and 10 cm, transverse diameter between 2 and 5 cm. The commonest shape observed in this study was pear shaped in 82.22% of cases. The length of gall bladder below the inferior border of liver varied between 0.4 and 2.5 cm. Conclusion: The growing importance of such variations, lie not only from the point of biliary disease but also with respect to the various invasive techniques in the diagnosis and treatment of gall bladder and extrahepatic bile duct disease.

  7. Antioxidant activity of insect gall extracts of Pistacia integerrima.

    Science.gov (United States)

    Eshwarappa, Ravi Shankara Birur; Lakshmikantha, Ramachandra Yarappa; Subaramaihha, Sundara Rajan; Subbaiah, Sujan Ganapathy Pasura; Surendranath, Austin Richard; Dhananjaya, Bhadrapura Lakkappa

    2015-01-01

    Pistacia integerrima (P. integerrina) insect galls are widely used in ayurveda and siddha system of medicine as karkatasringi. The use of leaf galls as a rejuvenator may be attributed to antioxidant property, however there is less scientific evidence. Therefore, the aim of this study was to evaluate the chemical composition and the antioxidant potential of leaf gall extracts (aqueous and ethanol) of P. integerrina, which is extensively used in the preparation of traditional medications. The antioxidant activities of aqueous and ethanolic leaf gall extracts were examined using diphenylpicrylhydrazyl (DPPH), hydroxyl scavenging and ferric reducing power (FRAP) methods. The presences of phenolics, tannins, phytosterols, triterpenoids, saponins, flavonoids and reducing sugars were identified in both the extracts. In comparison to the aqueous extract, the ethanolic extract had the highest total phenolic and flavonoid content at 234 ±2.4 mg of GAE/g d.w. and 95.5 ±3.2 mg of QUE/g d.w., respectively. This higher content of total phenolics and flavonoids found in the ethanolic extract was directly associated with higher antioxidant activity. This study demonstrates the poetnet antioxidant activities of P. integerrima leaf gall extracts. Further, there was a strong association between the higher antioxidant activities with that of higher total phenolic and flavonoid content in the ethanolic leaf gall extracts of P. integerrima. The results encourage the use of P. integerrima leaf gall extracts for medicinal health, functional food and nutraceuticals applications, due to their antioxidant properties. Future work will be interesting to learn the chemical composition and better understand the mechanism of action of the antioxidants present in the extract for development as a drug for therapeutic application.

  8. The molecular genetics of crown gall tumorigenesis

    International Nuclear Information System (INIS)

    Hooykaas, P.J.J.; Schilperoort, R.A.

    1984-01-01

    The phytopathogenic bacteria Agrobacterium tumefaciens and A. rhizogenes are the causative agents of the widespread plant diseases ''crown gall'' and ''hairy root'' respectively. It is now well established that virulent strains of these bacterial species transfer a piece of bacterial DNA into plant cells, thereby transforming these into tumor cells. In research much attention has been paid to the agrobacteria for several reasons. First is the desire to develop a system for the genetic engineering of plant cells based on the natural system for gene transfer between Agrobacterium species and plant cells. Second, there is a striking resemblance between the etiology of animal cancers and the plant cancer crown gall that was recognized as early as in 1927. This led to basic studies on the process of plant tumor induction and on the recovery of plant cells from the tumorous state. A third important interest lies in crown gall as a disease that is the cause of economically important losses in agriculture an horticulture in Europe, North America, and Austrailia. Research has been aimed at finding means to prevent crown gall and to cure plants of this disease

  9. Community analysis of the abundance and diversity of biting midge species (Diptera: Ceratopogonidae) in three European countries at different latitudes.

    Science.gov (United States)

    Möhlmann, Tim W R; Wennergren, Uno; Tälle, Malin; Favia, Guido; Damiani, Claudia; Bracchetti, Luca; Takken, Willem; Koenraadt, Constantianus J M

    2018-03-27

    The outbreaks of bluetongue and Schmallenberg disease in Europe have increased efforts to understand the ecology of Culicoides biting midges and their role in pathogen transmission. However, most studies have focused on a specific habitat, region, or country. To facilitate wider comparisons, and to obtain a better understanding of the spread of disease through Europe, the present study focused on monitoring biting midge species diversity in three different habitat types and three countries across Europe. Biting midges were trapped using Onderstepoort Veterinary Institute light traps at a total of 27 locations in Sweden, the Netherlands and Italy, comprising farm, peri-urban and wetland habitats. From July 2014 to June 2015 all locations were sampled monthly, except for during the winter months. Trapped midges were counted and identified morphologically. Indices on species richness, evenness and diversity were calculated. Community compositions were analysed using non-metric multidimensional scaling (NMDS) techniques. A total of 50,085 female midges were trapped during 442 collection nights. More than 88% of these belonged to the Obsoletus group. The highest midge diversity was found in Sweden, while species richness was highest in the Netherlands, and most specimens were trapped in Italy. For habitats within countries, diversity of the trapped midges was lowest for farms in all countries. Differences in biting midge species communities were more distinct across the three countries than the three habitat types. A core midge community could be identified, in which the Obsoletus group was the most abundant. Variations in vector communities across countries imply different patterns of disease spread throughout Europe. How specific species and their associated communities affect disease risk is still unclear. Our results emphasize the importance of midge diversity data at community level, how this differs across large geographic range within Europe, and its implications

  10. Extracellular electrical activity from the photoreceptors of midge

    Indian Academy of Sciences (India)

    Unknown

    349. Keywords. Chironomus; electroretinogram; insect development; midge; photoreceptor ... ceran insects, only larval ocelli of mosquito (Family: Culi- cidae) have been ... and Ball (1995) studied the influence of light in Chiro- nomus tentans ...

  11. Diversity of insect galls associated with coastal shrub vegetation in Rio de Janeiro, Brazil.

    Science.gov (United States)

    Carvalho-Fernandes, Sheila P; Ascendino, Sharlene; Maia, Valéria C; Couri, Márcia S

    2016-09-01

    Surveys in the coastal sandy plains (restingas) of Rio de Janeiro have shown a great richness of galls. We investigated the galling insects in two preserved restingas areas of Rio de Janeiro state: Parque Estadual da Costa do Sol and Reserva Particular do Patrimônio Natural Fazenda Caruara. The collections were done each two months, from June 2011 to May 2012. We investigated 38 points during 45 minutes each per collection. The galls were taken to the laboratory for rearing the insects. A total number of 151 insect galls were found in 82 plant species distributed into 34 botanic families. Most of the galls occurred on leaves and the plant families with the highest richness of galls were Myrtaceae and Fabaceae. All the six insect orders with galling species were found in this survey, where Cecidomyiidae (Diptera) was the main galler group. Hymenoptera and Thysanoptera were found as parasitoids and inquilines in 29 galls. The richness of galls in the surveyed areas reveals the importance of restinga for the composition and diversity of gall-inducing insect fauna.

  12. Diversity of insect galls associated with coastal shrub vegetation in Rio de Janeiro, Brazil

    Directory of Open Access Journals (Sweden)

    SHEILA P. CARVALHO-FERNANDES

    Full Text Available ABSTRACT Surveys in the coastal sandy plains (restingas of Rio de Janeiro have shown a great richness of galls. We investigated the galling insects in two preserved restingas areas of Rio de Janeiro state: Parque Estadual da Costa do Sol and Reserva Particular do Patrimônio Natural Fazenda Caruara. The collections were done each two months, from June 2011 to May 2012. We investigated 38 points during 45 minutes each per collection. The galls were taken to the laboratory for rearing the insects. A total number of 151 insect galls were found in 82 plant species distributed into 34 botanic families. Most of the galls occurred on leaves and the plant families with the highest richness of galls were Myrtaceae and Fabaceae. All the six insect orders with galling species were found in this survey, where Cecidomyiidae (Diptera was the main galler group. Hymenoptera and Thysanoptera were found as parasitoids and inquilines in 29 galls. The richness of galls in the surveyed areas reveals the importance of restinga for the composition and diversity of gall-inducing insect fauna.

  13. Distributional record of oak gall wasp (Hymenoptera: Cynipidae ...

    African Journals Online (AJOL)

    In this survey, oak gall wasp species were collected from the oak forests of Pardanan, Mirabad, Nalas, Sardasht, Hamran and Dar-ghabr in West-Azerbaijan province. The galls occurring on 50 cm sampled branches from four cardinal directions on each tree were counted multiple times throughout the season. Species ...

  14. Community analysis of biting midges (Culicoides Latr.) on livestock farms in Denmark

    DEFF Research Database (Denmark)

    Nielsen, S. A.; Banta, G.; Rasmussen, Anne-Marie

    2014-01-01

    This study presents descriptive statistics and community analysis of adult biting midges trapped at 16 livestock farms by means of light traps on Zealand and Lolland-Falster, Denmark. A total of 9,047 male and female Culicoides divided into 24 species, were caught. Biotic and abiotic factors...... ranging from presence of different host species (cattle or sheep/goats), presence of small woody areas or wetlands in the surrounding landscape, and agricultural practice (organic or conventional) were included in the community analysis. Only differences in the Culicoides communities between conventional...... and organic practices were tested significantly different. Total numbers of Culicoides individuals were higher on the organic farms than on the conventional farms. The larger loads of biting midges on the organic farms may be due to free-ranging animals that attracted the midges on pastures and carried them...

  15. The Goldenrod Ball Gall

    Science.gov (United States)

    Fischer, Richard B.

    1974-01-01

    The paper presents a generalized life history of the goldenrod ball gall, a ball-shaped swelling found almost exclusively on the Canada goldenrod, Solidago canadensis, and caused by a peacock fly know as Eurosta soldiaginis. (KM)

  16. Cytological and histochemical gradients on two Copaifera langsdorffii Desf. (Fabaceae)--Cecidomyiidae gall systems.

    Science.gov (United States)

    de Oliveira, Denis Coelho; Carneiro, Renê Gonçalves da Silva; Magalhães, Thiago Alves; Isaias, Rosy Mary dos Santos

    2011-10-01

    Previous ultrastructural and histochemical analysis proposed patterns in the accumulation of substances in galls of Diptera: Cecidomyiidae in some plant species of the temperate region. Similar analyses were done to verify the conservativeness of these patterns in the Neotropical region, where a great number of species of Cecidomyiidae is responsible for a wide diversity of morphotypes. Two gall morphotypes induced by Cecidomyiidae in a unique host plant, Copaifera langsdorffii, were studied. The gradients of carbohydrates and the activity of invertases and acid phosphatases were similar, but the cytological gradients and distribution of proteins evidenced that the sites of the induction as well as the amount of neoformed tissues may be peculiar to each gall system. The production of lipids just in the secretory cavities either in the non-galled or galled tissues indicated a potentiality of the host plant which could not be manipulated by the galling insects. Further, the absence of nucleus in the nutritive tissue, an exclusive feature of the horn-shaped galls, indicates cell death attributed to the feeding habit of the galling herbivore.

  17. African Journal of Environmental Science and Technology - Vol 5 ...

    African Journals Online (AJOL)

    Hymn: Platygasteridae) an egg-larval parasitoid of african rice gall midge Orseolia oryzivora Harris and Gagné (Diptera: Cecidoymiidae) · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  18. New genera and species of gall midges (Diptera, Cecidomyiidae associated with Guarea macrophylla (Meliaceae Novos gêneros e espécies de mosquitos galhadores (Diptera, Cecidomyiidae associados com Guarea macrophylla (Meliaceae

    Directory of Open Access Journals (Sweden)

    Valéria Cid Maia

    2007-06-01

    Full Text Available Three distinct leaf galls are recorded on Guarea macrophylla (Meliaceae. The galling species were identified as Neolasioptera sp., Guareamyia purpura gen. nov. and sp. nov.; Sphaeramyia flava gen. nov. and sp.nov. The new genera and species are described and illustrated based on material collected at restinga areas in Bertioga (São Paulo, Brazil.Três galhas foliares distintas são registradas em Guarea macrophylla (Meliaceae. As espécies galhadoras foram identificadas como Neolasioptera sp., Guareamyia purpura gen. nov. e sp. nov..; Sphaeramyia flava gen. nov. e sp. nov. Os gêneros e espécies novas são descritos e ilustrados com base em material coletado em áreas de restinga em Bertioga (São Paulo, Brasil.

  19. OCCURRENCE AND CHARACTERIZATION OF INSECT GALLS IN THE FLORESTA NACIONAL DE SILVÂNIA, BRAZIL

    Directory of Open Access Journals (Sweden)

    BÁRBARA ARAÚJO RIBEIRO BERGAMINI

    Full Text Available ABSTRACT In the present paper we investigated the insect gall distribution along savanna and forest sites in the Floresta Nacional de Silvânia, Goiás, Brazil. The insect gall fauna was surveyed bi-monthly between December 2009 and June 2010. In total we found 186 insect gall morphotypes, distributed on 35 botanical families and 61 plant species. Ninety-nine insect gall morphotypes were recorded in the forest and 87 in the savanna. Gall-inducing insects belonged to Coleoptera, Diptera, Hemiptera, Lepidoptera and Thysanoptera, with highlight to Cecidomyiidae (Diptera that induced 34.1% of the gall morphotypes. Parasitoids and/or inquilines were recorded in 38 morphotypes, mainly from the families Eulophidae, Eurytomidae and Torymidae (Hymenoptera. Fabaceae was the botanical family with the greatest richness of galls, followed by Asteraceae and Sapindaceae, being Protium (Burseraceae, Siparuna (Siparunaceae and Serjania (Sapindaceae the main host genera. This is the first systematic survey of insect galls realized in the Flona-Silvânia, which result in six plant species are recorded for the first time in Brazil as host of insect galls.

  20. Numerical relationships of the Solidago altissima stem gall insect-parasitoid guild food chain.

    Science.gov (United States)

    Abrahamson, Warren G; Armbruster, Paulette O; Maddox, G David

    1983-06-01

    The field site conditions (soil pH, soil moisture, soil nutrient availability, etc.) and abundances of Solidago altissima (often included in S. canadensis sensu lato), three S. altissima specific stem gall formers, and the parasitepredator guilds for two of the three gall insects were investigated. It was found that S. altissima is tolerant of a wide range of site conditions. Herbivore (stem gall insects) occurrences were positively correlated with plant occurrence, in a linear fashion. However, there was no disproportionate increase in stem gall insect densities with plant density as might be predicted by the resource concentration hypothesis. Parasitoid guilds were exploiting stem gall insect populations over a wide range of occurrence, but were under-utilizing fields of higher herbivore occurrences. Path analysis showed a high degree of predictability in the causal models, with all but 14% of the ball gall parasitoid guild and all but 43% of the elliptical gall parasitoid guild occurrences explained by the direct influences of stem gall insect occurrence and the indirect influences of goldenrod occurrence and site conditions. The numerical relations of this three trophic level system suggest a well-integrated and well-controlled food chain.

  1. Diel activity and preferred landing sites in Culicoides biting midges attacking Fjord horses

    NARCIS (Netherlands)

    Elbers, A.R.W.; Heuvel, van den S.J.; Meiswinkel, R.

    2016-01-01

    In the summer of 2014, in the central part of The Netherlands, Culicoides spp. (Diptera: Ceratopogonidae) attack rates, biting rates, and preferred landing sites were determined for a pair of Fjord horses maintained permanently at pasture in an area devoid of cattle. Eleven body regions of the

  2. Identity and diversity of blood meal hosts of biting midges (Dipterea: Ceratopogonidae: Culicoides Latreille) in Denmark

    DEFF Research Database (Denmark)

    Lassen, Sandra; Nielsen, Søren Achim; Kristensen, Michael

    2012-01-01

    biting midges were sorted and head and wings were removed for morphological species identification. The thoraxes and abdomens including the blood meals of the individual females were subsequently subjected to DNA isolation. The molecular marker cytochrome oxidase I (COI barcode) was applied to identify......: Twenty-four species of biting midges were identified from the four study sites. A total of 111,356 Culicoides biting midges were collected, of which 2,164 were blood-fed. Specimens of twenty species were identified with blood in their abdomens. Blood meal sources were successfully identified by DNA...

  3. Diversity of gall-inducing insects in the high altitude wetland forests in Pernambuco, Northeastern Brazil

    Directory of Open Access Journals (Sweden)

    JC Santos

    Full Text Available We report on the richness of galling insects in the altitudinal wetland forests of Pernambuco State, Northeastern Brazil. We found 80 distinct types of insect galls on 49 species of host plants belonging to 28 families and 35 genera. Most of the galled plant species belong to Nyctaginaceae, Fabaceae, Meliaceae, Sapindaceae and Myrtaceae. The most common gall were spheroid and globoid; most galls were glabrous, predominantly green and with one chamber, and on the leaves. Most galls were induced by Cecidomyiidae (Diptera. The results of this study contribute to existing knowledge richness of galling insects and host-plant diversity in the altitudinal wetland forests of Northeastern Brazil.

  4. Morphological alterations of the gall-bladder following extracorporeal shock-wave lithotripsy

    International Nuclear Information System (INIS)

    Schumacher, K.A.; Zoeller, A.; Swobodnik, W.; Janowitz, P.

    1990-01-01

    The present study reports on 51 patients with symptomatic cholecystolithiasis, who accordingly underwent extracorporeal shock-wave lithotripsy (ESWL). In all cases, computed tomography (CT) was performed prior to and after the therapeutic procedure to delineate changes in gall-bladder morphology. Slight edematous thickening of the gall-bladder wall was found in 15 patients. One patient presented a rupture of the gall-bladder with formation of a bilioma in the adjacent liver tissue. In case of calcific concrements, CT revealed a characteristic pattern of fragment distribution following shock-wave treatment, and fragments of various sizes exhibited distinct adhesion to the gall-bladder wall. (orig.) [de

  5. Gall-inducing insects of deciduous and semideciduous forests in Rio Grande do Sul State, Brazil

    Directory of Open Access Journals (Sweden)

    Ana Paula M. Goetz

    2018-06-01

    Full Text Available ABSTRACT Galls are specific changes induced by insects on plant organs mainly through increases in plant cell number and/or size. Gall diversity is easy to recognize in the field because gallers are mostly species-specific, and thus each gall morphotype can be a proxy for a galling species. Insect galls are virtually unknown in Seasonal Deciduous and Semi-Deciduous forests of southern Brazil. Here, galls and host plants were surveyed between 2015 and 2017 in four forest fragments of Rio Grande do Sul State in these two vegetation types, in secondary-growth and areas under restoration. We recorded 89 gall morphotypes, with gallers belonging to Lepidoptera and Diptera, with the latter represented mainly by Cecidomyiidae. Galls were associated to 46 plant species in 27 families. Asteraceae, Piperaceae, Fabaceae, Myrtaceae and Lauraceae were the richest families in terms of galls, whilst Piper aduncum and Mikania glomerata were superhosts. Most galls occurred in leaves and shoots. The most common shapes were fusiform, globoid and lenticular. Forty-eight gall morphotype records are new for both Rio Grande do Sul and Brazil, an expressive number considering only two seasonal forest types sampled and few sampling points, showing how important surveys still are for these little know fauna both in taxonomic and ecological terms.

  6. Life History of the Camelthorn Gall Leafhopper, Scenergates viridis (Vilbaste (Hemiptera, Cicadellidae

    Directory of Open Access Journals (Sweden)

    Roman Rakitov

    2012-01-01

    Full Text Available The world’s only member of Hemiptera Auchenorrhyncha known to form true galls, the leafhopper Scenergates viridis (Vilbaste (Cicadellidae, transforms leaves of camelthorn (Alhagi maurorum Medikus, Fabaceae into pod-like chambers, up to 35 mm long, inside which individual leafhoppers develop, mate, and lay eggs. At the study site 40 km SE of Bukhara (Uzbekistan, two generations develop annually. First-instar nymphs cause young leaves to fold along the midrib. The subsequent development takes place inside the tightly closed growing gall, plugged at both ends with a mixture of leafhopper excrement, brochosomes, and crushed exuviae. These plugs act as mechanical barriers and sticky traps for intruders. The inner surface of the gall, lined with brochosomes and wax platelets, is hydrophobic. Adult males emerge from their galls and squeeze into female galls. Fertilized females insert an average of 146 eggs under the gall’s inner epidermis and remain inside, possibly protecting the brood, until they die. The walls of the galls containing eggs are approximately three times thicker than regular leaves. The galls are subject to predation by Gelechiidae caterpillars; the eggs of the leafhopper are parasitized by two species of Trichogrammatidae and one Mymaridae (Hymenoptera, and its larvae by one species of Pipunculidae (Diptera.

  7. Insect galls of restinga areas of Ilha da Marambaia, Rio de Janeiro, Brazil

    Directory of Open Access Journals (Sweden)

    Alene Ramos Rodrigues

    2014-06-01

    Full Text Available Insect galls of restinga areas of Ilha da Marambaia, Rio de Janeiro, Brazil. This study carried out an insect gall inventory in restinga areas of Ilha da Marambaia, in the municipality of Mangaratiba, Rio de Janeiro, Brazil. Sampling was carried out monthly from April 2010 to March 2011 along the full extension of seven beaches. A total number of 147 gall morphotypes associated with 70 plant species were found, distributed in 33 plant families, and at least 54 genera. Myrtaceae was the botanical family with the highest richness of gall morphotypes and host species, followed by Bignoniaceae, Fabaceae, Asteraceae, Euphorbiaceae, Sapindaceae, and Malpighiaceae. Most of the gall morphotypes occurred in leaves (78 morphotypes, 38 in stems, 14 in flowers, eight in buds and fruits, and one in adventitious roots. The galling insects belong to the five orders: Diptera, Coleoptera, Hemiptera, Lepidoptera, and Thysanoptera. Cecidomyiidae (Diptera was the most common galling taxon (78 morphotypes, represented by 87 species, being 78 gallers, seven inquilines and two predators. In addition to the gallers, parasitoids, inquilines, and predators were also found.

  8. Variations in the spatial distribution of gall bladder cancer: a call for ...

    African Journals Online (AJOL)

    Background: The incidence of gall bladder cancers in this part of the world is high and the spatial variation in occurrence of gall bladder cancers can be identified by using geographical information system. Materials and Methods: Data set containing the address information of gall bladder cancer patients from the District of ...

  9. Neolasioptera pantaneira, a new species of Cecidomyiidae (Diptera) associated with Aeschynomene denticulata (Fabaceae) from Brazil.

    Science.gov (United States)

    Maia, V C; Catian, G; Leme, F M

    2017-03-01

    A new species of gall midge that induces stem galls on Aeschynomene denticulata (Fabaceae) is described based on material collected in Pantanal (Mato Grosso do Sul, Brazil). This species is unique among the Brazilian congeners in having spatula with three convex teeth, cruciate, with defined anterolateral extensions, four lateral papillae on each side of the spatula, and three pairs of terminal papillae (larva), four-segmented palpi (adult), 17 flagellomeres (female), ovipositor about 11 times length of seventh tergite.

  10. Carcinoma transverse colon masquerading as carcinoma gall bladder.

    Science.gov (United States)

    Munghate, Anand; Kumar, Ashwani; Singh, Harnam; Singh, Gurpreet; Singh, Bimaljot; Chauhan, Mahak

    2014-04-01

    Colorectal cancer is one of the most common cancer worldwide .Its incidence is reported to be increasing in developing countries. It commonly presents with weight loss, anaemia, lump abdomen, change of bowel habit, obstruction or fresh rectal bleeding. Beside these common modes of presentations, there are some rare manifestations which masqueraded as different disease like obstructive jaundice, empyema gall bladder or cholecystitis. A 60-year-old male presented to hospital with right sided pain abdomen. On abdominal examination mild tenderness was present in right hypochondrium. Intra operatively gall bladder was separated from the adjoining gut, peritoneum and liver bed and was removed. On further exploration, there was a large mass in the vicinity of the gall bladder related to transverse colon. Extended right hemicolectomy was done. Histopathological examination of gut mass revealed adenocarcinoma of transverse colon with free margins and gall bladder showed cholecystitis with no evidence of malignancy. We present an interesting case of colon cancer colon that caused diagnostic confusion by mimicking as cholecystitis. Colorectal cancer constitutes a major public health issue globally. Therefore, public awareness, screening of high-risk populations, early diagnosis and effective treatment and follow-up will help to reduce its occurance and further complications.

  11. DNA methylation mediated control of gene expression is critical for development of crown gall tumors.

    Directory of Open Access Journals (Sweden)

    Jochen Gohlke

    Full Text Available Crown gall tumors develop after integration of the T-DNA of virulent Agrobacterium tumefaciens strains into the plant genome. Expression of the T-DNA-encoded oncogenes triggers proliferation and differentiation of transformed plant cells. Crown gall development is known to be accompanied by global changes in transcription, metabolite levels, and physiological processes. High levels of abscisic acid (ABA in crown galls regulate expression of drought stress responsive genes and mediate drought stress acclimation, which is essential for wild-type-like tumor growth. An impact of epigenetic processes such as DNA methylation on crown gall development has been suggested; however, it has not yet been investigated comprehensively. In this study, the methylation pattern of Arabidopsis thaliana crown galls was analyzed on a genome-wide scale as well as at the single gene level. Bisulfite sequencing analysis revealed that the oncogenes Ipt, IaaH, and IaaM were unmethylated in crown galls. Nevertheless, the oncogenes were susceptible to siRNA-mediated methylation, which inhibited their expression and subsequently crown gall growth. Genome arrays, hybridized with methylated DNA obtained by immunoprecipitation, revealed a globally hypermethylated crown gall genome, while promoters were rather hypomethylated. Mutants with reduced non-CG methylation developed larger tumors than the wild-type controls, indicating that hypermethylation inhibits plant tumor growth. The differential methylation pattern of crown galls and the stem tissue from which they originate correlated with transcriptional changes. Genes known to be transcriptionally inhibited by ABA and methylated in crown galls became promoter methylated upon treatment of A. thaliana with ABA. This suggests that the high ABA levels in crown galls may mediate DNA methylation and regulate expression of genes involved in drought stress protection. In summary, our studies provide evidence that epigenetic processes

  12. Host manipulation by the orange leafhopper Cicadulina bipunctata: gall induction on distant leaves by dose-dependent stimulation

    Science.gov (United States)

    Matsukura, Keiichiro; Matsumura, Masaya; Tokuda, Makoto

    2009-09-01

    The evolution of the gall-inducing ability in insects and the adaptive significance of the galling habit have been addressed by many studies. Cicadulina bipunctata, the maize orange leafhopper, is an ideal study organism for evaluating these topics because it can be mass-reared and it feeds on model plants such as rice ( Oryza sativa) and maize ( Zea mays). To reveal differences between gall inductions by C. bipunctata and other gall inducers, we conducted four experiments concerning (a) the relationship between the feeding site and gall-induction sites of C. bipunctata on maize, (b) the effects of leafhopper sex and density, (c) the effects of length of infestation on gall induction, and (d) the effects of continuous infestation. C. bipunctata did not induce galls on the leaves where it fed but induced galls on other leaves situated at more distal positions. The degree of gall induction was significantly correlated with infestation density and length. These results indicate that C. bipunctata induces galls in a dose-dependent manner on leaves distant from feeding sites, probably by injecting chemical(s) to the plant during feeding. We suggest that insect galls are induced by a chemical stimulus injected by gall inducers during feeding into the hosts.

  13. Genetic background of resistance to gall mite in Ribes species

    Directory of Open Access Journals (Sweden)

    Ingrida Mazeikiene

    2017-06-01

    Full Text Available Resistance to gall mite is an important genetic trait of Ribes. P and Ce genes, responsible for gall mite resistance, were established in Ribes species and interspecific hybrids using molecular markers. Resistance in R. americanum is determined by P gene and in R. sanguineum by Ce gene. Both molecular markers were absent in R. dikuscha genome. Molecular markers related to P and Ce genes were identified in the genome of R. aureum. Resistance to gall mite in the field conditions in R. nigrum x R. americanum, R. nigrum x R. aureum and R. nigrum x R. sanguineum F3 hybrids fitted an expected Mendelian segregation ratio of 1:1, 3:1 and 1:1, respectively. 75.0% of hybrids with a pyramidal resistance to gall mite carrying markers related to Ce and P genes were obtained in the cross combination R. nigrum x R. aureum and will be included in the future breeding programs.

  14. Susceptibility of Some Stone and Pome Fruit Rootstocks to Crown Gall

    Directory of Open Access Journals (Sweden)

    A. Rhouma

    2005-12-01

    Full Text Available The susceptibility of different fruit rootstocks to crown gall disease was investigated in greenhouse and field experiments with numerous strains of Agrobacterium tumefaciens over three years. Plants were inoculated in the roots and shoots for pot experiments. Field experiments were performed in a naturally contaminated nursery plot. The genotypes Prunus dulcis and P. persica showed a high level of susceptibility to A. tumefaciens. Among the stone rootstocks, bitter almond was highly susceptible in all experiments. Apricot and Cadaman rootstocks displayed low susceptibility but larger galls, showing that there was no relation between rootstock susceptibility and gall size. Among pome rootstocks, quince BA29 was resistant to the disease, while MM106 was susceptible in potted trials; however, in the field essays, pome rootstocks did not become galled, possibly because the strains had selected for and adapted to stone rootstocks.

  15. Effect of Temperature on Galling Behavior of SS 316, 316 L and 416 Under Self-Mated Condition

    Science.gov (United States)

    Harsha, A. P.; Limaye, P. K.; Tyagi, Rajnesh; Gupta, Ankit

    2016-11-01

    Galling behavior of three different stainless steels (SS 316, 316 L and 416) was evaluated at room temperature and 300 °C under a self-mated condition. An indigenously fabricated galling tester was used to evaluate the galling performance of mated materials as per ASTM G196-08 standard. The variation in frictional torque was recorded online during the test to assess the onset of galling. The galling50 (G50) stress value was used to compare the galling resistance of a combination of materials, and the results indicate a significant influence of temperature on the galling resistance of the materials tested. This has been attributed to the decrease in hardness and yield strength at elevated temperature which results in softening of the steel and limits its ability to resist severe deformation. Scanning electron micrographs of the galled surface reflected a severe plastic deformation in sliding direction, and a typical adhesive wear mechanism is prevalent during the galling process.

  16. Synchronism between Aspidosperma macrocarpon Apocynaceae resources allocation and the establishment of the gall inducer Pseudophacopteron sp. Hemiptera: Psylloidea

    Directory of Open Access Journals (Sweden)

    Ariane C Castro¹

    2013-12-01

    Full Text Available The joint interpretation of phenology and nutritional metabolism provides important data on plant tissues reactivity and the period of gall induction. A population of Aspidosperma macrocarpon Apocynaceae with leaf galls induced by a Pseudophacopteron sp. Psylloidea was studied in Goiás state, Brazil. Assuming the morphological similarity between host leaves and intralaminar galls, a gradient from non-galled leaves towards galls should be generated, establishing a morpho-physiological continuum. The phenology, infestation of galls, and the carbohydrate and nitrogen contents were monthly evaluated in 10-20 individuals, from September 2009 to September 2010. Our objective was to analyze the nutritional status and the establishment of a physiological continuum between the galls and the non-galled leaves of A. macrocarpon. The period of leaf flushing coincided with the highest levels of nitrogen allocated to the new leaves, and to the lowest levels of carbohydrates. The nutrients were previously consumed by the growing leaves, by the time of gall induction. The levels of carbohydrates were higher in galls than in non-galled leaves in time-based analyses, which indicateed their potential sink functionality. The leaves were infested in October, galls developed along the year, and gall senescence took place from March to September, together with host leaves. This first senescent leaves caused insect mortality. The higher availability of nutrients at the moment of gall induction was demonstrated and seems to be important not only for the establishment of the galling insect but also for the responsiveness of the host plant tissues.

  17. Galling Insects of the Brazilian Páramos: Species Richness and Composition Along High-Altitude Grasslands.

    Science.gov (United States)

    Coelho, Marcel S; Carneiro, Marco Antônio Alves; Branco, Cristina A; Borges, Rafael Augusto Xavier; Fernandes, G Wilson

    2017-12-08

    In this work, we investigated the factors that determine the distribution of galling insects in high-altitude grasslands, locally called 'campos de altitude' of Mantiqueira Range and tested whether 1) richness of galling insects decreases with altitude, 2) galling insect richness increases with plant richness, 3) variation in galling insect diversity is predominantly a consequence of its β component, and 4) turnover is the main mechanism driving the beta diversity of both galling insects and plants. Galling insect richness did not exhibit a negative relationship with altitude, but it did increase with plant richness. The additive partition of regional richness (γ) into its local and beta components showed that local diversity (α) of galling insects and plants was relatively low in relation to regional diversity; the β component incorporated most of the regional diversity. This pattern was also found in the multiscale analysis of the additive partition for galling insects and plants. The beta diversity of galling insects and plants was driven predominantly by the process of turnover and minimally by nesting. The results reported here point out that the spatial distribution of galling insects is best explained by historical factors, such as the distribution of genera and species of key host plants, as well as their relation to habitat, than ecological effects such as hygrothermal stress - here represented by altitude. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  18. Modulation of nonessential amino acid biosynthetic pathways in virulent Hessian fly larvae (Mayetiola destructor), feeding on susceptible host wheat (Triticum aestivum)

    Science.gov (United States)

    Hessian fly (Mayetiola destructor), an obligate plant-parasitic gall midge, is an important dipteran pest of wheat (Triticum aestivum). The insect employs an effector-based feeding strategy to reprogram the host plant to be nutritionally beneficial for the developing larva by inducing formation of p...

  19. Richness and composition of gall-inducing arthropods at Coiba National Park, Panama

    OpenAIRE

    Nieves-Aldrey, José Luis; Enrique Medianero, Alicia Ibáñez

    2008-01-01

    Interest in studying galls and their arthropods inducers has been growing rapidly in the last two decades. However, the Neotropical region is probably the least studied region for gall-inducing arthropods. A study of the richness and composition of gall-inducing arthropods was carried out at Coiba National Park in the Republic of Panama. Field data come from samples obtained between August 1997 and September 1999, with three (two-week long) more intensive samplings. Seventeen sites, represent...

  20. Ecology and evolution of gall-forming insects. Forest Service general technical report

    Energy Technology Data Exchange (ETDEWEB)

    Price, P.W.; Mattson, W.J.; Baranchikov, Y.N.

    1994-09-21

    ;Partial Contents: Ecology and Population Dynamics; Effects of the Physical Environment on the Ecology of Gall Insects; Biodiversity and Distribution; Genetic Variation in Host Plant Resistance; Evolutionary Perspectives on Gall Insects.

  1. Lithium absorption by the rabbit gall-bladder

    DEFF Research Database (Denmark)

    Hansen, C P; Holstein-Rathlou, N H; Skøtt, O

    1991-01-01

    Lithium (Li+) absorption across the low-resistance epithelium of the rabbit gall-bladder was studied in order to elucidate possible routes and mechanisms of Li+ transfer. Li+ at a concentration of 0.4 mM in both mucosal and serosal media did not affect isosmotic mucosa-to-serosa fluid absorption...... was elicited from the mucosal side and was not accounted for by compensatory Li+ absorption; water and Na+ absorption rates decreased nearly in parallel. The effects of 0.4 mM amiloride and of substitution with 20 mM Li+ were only partly additive. It is concluded that Li+ absorption in the rabbit gall...

  2. 60Co accumulation from sediment and planktonic algae by midge larvae (Chironomus luridus)

    International Nuclear Information System (INIS)

    Baudin, J.P.; Nucho, R.

    1992-01-01

    This paper reports the results of several experiments carried out to evaluate uptake and retention by a limicolous midge larva of 60 Co retained in sediment, either adsorbed on mineral particles or bound to planktonic algae. In order to determine their relative contributions in radionuclide accumulation, the different vectors (water, algae and sediment) were first labelled individually and then simultaneously. 60 Co accumulation from water and from algae results in a maximum concentration factor of 30 and in a mean trophic transfer factor of 4·5 × 10 −3 . The level of contamination of midge larvae from sediment is markedly influenced by the presence of endogenous organic matter. Thus the radionuclide transfer factor is about twice as high for larvae placed in labelled raw sediment than for larvae placed in labelled incinerated sediment, in the presence as in the absence of contaminated planktonic algae. Irrespective of the contamination conditions, 60 Co depuration from midge larvae is a very rapid phenomenon that corresponds, in all cases, to a radionuclide half-life of only a few days

  3. 60Co accumulation from sediment and planktonic algae by midge larvae (Chironomus luridus)

    International Nuclear Information System (INIS)

    Baudin, J.P.; Nucho, R.

    1992-01-01

    This paper reports the results of several experiments carried out to evaluate uptake and retention by a limicolous midge larva of 60 Co retained in sediment, either adsorbed on mineral particles or bound to planktonic algae. In order to determine their relative contributions in radionuclide accumulation, the different vectors (water, algae and sediment) were first labelled individually and then simultaneously. 60 Co accumulation from water and from algae results in a maximum concentration factor of 30 and in a mean trophic transfer factor of 4.5 x 10 -3 . The level of contamination of midge larvae from sediment is markedly influenced by the presence of endogenous organic matter. Thus the radionuclide transfer factor is about twice as high for larvae placed in labelled raw sediment than for larvae placed in labelled incinerated sediment, in the presence as in the absence of contaminated planktonic algae. Irrespective of the contamination conditions, 60 Co depuration from midge larvae is a very rapid phenomenon that corresponds, in all cases, to a radionuclide half-life of only a few days. (author)

  4. The salivary secretome of the biting midge, Culicoides sonorensis

    Directory of Open Access Journals (Sweden)

    Christopher J. Lehiy

    2014-06-01

    Full Text Available Culicoides biting midges (Diptera: Ceratopogonidae are hematophagous insects with over 1400 species distributed throughout the world. Many of these species are of particular agricultural importance as primary vectors of bluetongue and Schmallenberg viruses, yet little is known about Culicoides genomics and proteomics. Detailed studies of members from other blood-feeding Dipteran families, including those of mosquito (Culicidae and black fly (Simuliidae, have shown that protein components within the insect’s saliva facilitate the blood feeding process. To determine the protein components in Culicoides sonorensis midges, secreted saliva was collected for peptide sequencing by tandem mass spectrometry. Forty-five secreted proteins were identified, including members of the D7 odorant binding protein family, Kunitz-like serine protease inhibitors, maltase, trypsin, and six novel proteins unique to C. sonorensis. Identifying the complex myriad of proteins in saliva from blood-feeding Dipteran species is critical for understanding their role in blood feeding, arbovirus transmission, and possibly the resulting disease pathogenesis.

  5. Standard test method for galling resistance of material couples

    CERN Document Server

    American Society for Testing and Materials. Philadelphia

    2008-01-01

    1.1 This test method covers a laboratory test that ranks the galling resistance of material couples using a quantitative measure. Bare metals, alloys, nonmetallic materials, coatings, and surface modified materials may be evaluated by this test method. 1.2 This test method is not designed for evaluating the galling resistance of material couples sliding under lubricated conditions, because galling usually will not occur under lubricated sliding conditions using this test method. 1.3 The values stated in SI units are to be regarded as standard. No other units of measurement are included in this standard. 1.4 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use.

  6. MRI of perforated gall bladder

    International Nuclear Information System (INIS)

    Sood, B.; Jain, M.; Khandelwal, N.; Singh, P.; Suri, S.

    2002-01-01

    Gall bladder perforation is a dreaded complication of acute cholecystitis that, if not diagnosed early in the course, might have a poor prognosis. Both CT and ultrasonography have been used until now extensively for the diagnosis of acute cholecystitis, but diagnosis of perforation is always difficult. Magnetic resonance, by its superior soft tissue resolution and multiplanar capability, is a better modality and should fare better than ultrasonography and CT, as demonstrated in our case. Magnetic resonance imaging demonstrates the wall of the gall bladder and defects to a much better advantage and more convincingly. In addition, MR colangiopancreatography images demonstrate the biliary tree better than other modalities. We suggest that in the case of acute cholecystitis, if perforation is suspected and CT and ultrasonography are not conclusive, MR should be the modality of choice. It can be used as a first line of investigation; however, it might not be cost-effective. Copyright (2002) Blackwell Science Pty Ltd

  7. RAPD markers for screening shoot gall maker (Betousa stylophora Swinhoe tolerant genotypes of amla (Phyllanthus emblica L.

    Directory of Open Access Journals (Sweden)

    Sethuraman Thilaga

    2017-12-01

    Full Text Available Phyllanthus emblica Linn. is the most important medicinally useful tree crop in Asian Subcontinent and is severely infested by Betousa stylophora Swinhoe, known as shoot gall maker (SGM. This pest tunnels the shoots of seedlings and actively growing branches of trees and develops gall, leading to stunted growth, unusual branching and death of actively growing shoots. Our study revealed that trees possessing smooth bark were free from the attack of this pest than those with rough bark surface. Unfortunately, this character is not detectable either at seedling stage or during early growth of trees in the orchard. RAPD genetic fingerprinting of trees possessing smooth and rough bark revealed distinguishable and highly reproducible DNA banding pattern between the two genotypes. Of the 20 RAPD primers tested, five of them produced distinguishable RAPD bands between rough and smooth barked genotypes of P. emblica. Trees with smooth bark produced five unique RAPD bands with molecular weight ranging from 350 bp to 1500 bp and those with rough bark produced six RAPD bands (350 bp–650 bp to utilize these DNA bands as potential DNA marker for screening tolerant genotypes of this crop against SGM. The utility of this finding in genetic improvement of this tree crop against SGM is discussed.

  8. EVALUATION OF SOME RICE GENOTYPES FOR INCIDENCE OF ...

    African Journals Online (AJOL)

    African rice gall midge (AfRGM), Orseolia oryzivora Harris and Gagne, is one of the major ... TOG 7106 a induit le niveau le plus élevé de résistance parmi toutes les ..... Percentage tiller infestation. Field test. 0. No damage. 1. Less than 1 %. 3.

  9. Gall blandder kinetics in diabetics. A hepatobiliary scintigraphy overview

    International Nuclear Information System (INIS)

    Shelley, S.; Indirani, M.; Gokhale, S.; Anirudhan, N.

    2004-01-01

    Introduction: Hepatobiliary scintigraphy is underutilized in the evaluation of Gall Bladder(GB) function in diabetics when compared to various other imaging modalities that are currently available.It establishes the function of GB in Diabetes mellitus noninvasively, with a quantified ejection fraction thereby helping to resolve the problem of diabetic cholecystopathy, in the evaluation of visceral neuropathy. Aim: To study Gall Bladder kinetics and emptying in diabetic patients. Materials and methods: One forty eight patients of both sexes in the age group of 30 to 70 were included in the study between 1997 to 1999 in our institution.A 90 minute dynamic post mebrofenin study was acquired. A fatty meal of 600 kcal was given to these patients once the Gall Bladder was visualized.Time activity curves were generated and the Gall Bladder contraction in these patients was evaluated.Patients were classified into 3 groups-Group 1 consists of established Diabetic patients. Group 2 consists of patients with impaired glucose tolerance. Group 3 consists of controls. Observation and result: In Group 1 (n=47) ,28 patients (60%) showed reduced ejection fraction and the mean EF% was 44.12 +/- 16.6. In Group 2 (n=48), 18 patients (38%) showed slightly reduced ejection fraction and the mean EF % was 51.56 +/- 15.67. In Group 3(n=53), 7 patients (13%) showed reduced ejection fraction and the meanEF % was 69.77 +/- 13.59. Test of significance was done using 'Z' test also called normal test in large samples. This study has shown that the average Ejection Fraction (in%) is maximum in normal group and least in diabetic group. Conclusion: Hepatobiliary scintigraphy is helpful in early identification of autonomic dysfunction of Gall Bladder in diabetic patients and in patients with impaired glucose tolerance. (authors)

  10. Redescription of Chironomus salinarius (Diptera: Chironomidae), nuisance midges that emerged in brackish water of Jinhae-man (Bay), Kyongsangnam-do, Korea

    Science.gov (United States)

    Yum, Jin-Hwoa

    2006-01-01

    Huge numbers of non-biting midges emerged from brackish water which were made at the harbor construction field in Jinhae City, Kyongsangnam-do, Korea in late summer in 2005, and caused a serious nuisance to villagers. The midges were collected and identified as Chironomus salinarius (Kieffer, 1921). Although this species was recorded in Korea for the first time in 1998, the morphological descriptions were so brief and simple. A full redescription is made with detailed illustrations for ecological and control workers of this nuisance midge. PMID:16514284

  11. Three new genera and three new species of Nearctic Lasiopteridi (Diptera: Cecidomyiidae: Cecidomyiinae) from Asteraceae and Caprifoliaceae, and the tribe Rhopalomyiini subsumed under Oligotrophini.

    Science.gov (United States)

    Gagné, Raymond J

    2016-08-30

    Three new Nearctic genera of gall midges (Diptera: Cecidomyiidae), each with a new species, are described: Helianthecis Gagné for Helianthecis capitum Gagné, new species, that lives in flower heads of Helianthus spp. (Asteraceae) from North Dakota to Texas; Lonicerae Gagné for Lonicerae russoi Gagné, new species, and Lonicerae lonicera (Felt), new combination, that form bud galls on Lonicera spp. (Caprifoliaceae) in California; and Chiosperma Gagné for Chiosperma turgidum Gagné, new species, that forms a bud gall on Symphoricarpos albus (L.) S.F. Blake (Caprifoliaceae) in Washington. The three new genera belong to the supertribe Lasiopteridi and are placed in the tribe Oligotrophini. The tribes Oligotrophini and Rhopalomyiini are combined.

  12. Metatranscriptome Analysis of Fig Flowers Provides Insights into Potential Mechanisms for Mutualism Stability and Gall Induction.

    Directory of Open Access Journals (Sweden)

    Ellen O Martinson

    Full Text Available A striking property of the mutualism between figs and their pollinating wasps is that wasps consistently oviposit in the inner flowers of the fig syconium, which develop into galls that house developing larvae. Wasps typically do not use the outer ring of flowers, which develop into seeds. To better understand differences between gall and seed flowers, we used a metatranscriptomic approach to analyze eukaryotic gene expression within fig flowers at the time of oviposition choice and early gall development. Consistent with the unbeatable seed hypothesis, we found significant differences in gene expression between gall- and seed flowers in receptive syconia prior to oviposition. In particular, transcripts assigned to flavonoids and carbohydrate metabolism were significantly up-regulated in gall flowers relative to seed flowers. In response to oviposition, gall flowers significantly up-regulated the expression of chalcone synthase, which previously has been connected to gall formation in other plants. We propose several genes encoding proteins with signal peptides or associations with venom of other Hymenoptera as candidate genes for gall initiation or growth. This study simultaneously evaluates the gene expression profile of both mutualistic partners in a plant-insect mutualism and provides insight into a possible stability mechanism in the ancient fig-fig wasp association.

  13. Agro-Science - Vol 4, No 2 (2005)

    African Journals Online (AJOL)

    Effects of N-fertilization and spacing on african rice gall midge Orseolia oryzivora harris and gagné i a sub-humid area of southeastern Nigeria. E O Ogah, B C Echezona, E-D N Umeh. http://dx.doi.org/10.4314/as.v4i2.1531 ...

  14. Journal of Technology and Education in Nigeria - Vol 11, No 1 (2006)

    African Journals Online (AJOL)

    Effect Of Transplanting Dates, Plant Spacing And Nitrogen Levels On The Incidence Of African Rice Gall Midge Harris And Gagné (Diptera: Cecidomyiidae) In Southeastern Nigeria · EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT. EO Ogah, E-D Umeh, MC Mbah, 7-16.

  15. Developmental pathway from leaves to galls induced by a sap-feeding insect on Schinus polygamus (Cav.) Cabrera (Anacardiaceae).

    Science.gov (United States)

    Dias, Graciela G; Ferreira, Bruno G; Moreira, Gilson R P; Isaias, Rosy M S

    2013-03-01

    Galling sap-feeding insects are presumed to cause only minor changes in host plant tissues, because they usually do not require development of nutritive tissues for their own use. This premise was examined through comparison of the histometry, cytometry and anatomical development of non-galled leaves and galls of Calophya duvauae (Scott) (Hemiptera: Calophyidae) on Schinus polygamus (Cav.) Cabrera (Anacardiaceae). Cell fates changed from non-galled leaves to galls during the course of tissue differentiation. C. duvauae caused changes in dermal, ground, and vascular systems of the leaves of S. polygamus. Its feeding activity induced the homogenization of the parenchyma, and the neoformation of vascular bundles and trichomes. The histometric and cytometric data revealed compensatory effects of hyperplasia and cell hypertrophy in the epidermis, with hyperplasia predominating in the adaxial epidermis. There was a balance between these processes in the other tissues. Thus, we found major differences between the developmental pathways of non-galled leaves and galls. These changes were associated with phenotypic alterations related to shelter and appropriate microenvironmental conditions for the gall inducer. The nondifferentiation of a typical nutritive tissue in this case was compared to other non-phylogenetically related arthropod gall systems, and is suggested to result from convergence associated with the piercing feeding apparatus of the corresponding gall-inducer.

  16. Questioning the environmental stress hypothesis for gall diversity of restinga vegetation on dunes

    OpenAIRE

    Arriola, Ígor A.; F. MeloJr., JoãoCarlos; S. Isaias, RosyMary

    2015-01-01

    AbstractThe Atlantic Coast Restinga is a mosaic of plant communities with a distinct floristic and phytophysiognomy, exposed to luminous, thermal, and saline stresses. Plants of the restinga must have special features commonly associated to xeric environments, and are expected to host a high diversity of galling herbivores. We studied gall morphotypes, and recorded the diversity of galls on plants growing in sand dunes in a remnant area of restinga (Acaraí State Park) in São Francisco do Sul,...

  17. Diversity of galling insects in Styrax pohlii (Styracaceae: edge effect and use as bioindicators

    Directory of Open Access Journals (Sweden)

    Walter Santos de Araújo

    2011-12-01

    Full Text Available Impacts of forest fragmentation and edge effect on plant-herbivores interactions are relatively unknown, and the relationships between galling insects and their host plants are very susceptible to environmental variations. The goal of our study was to test the edge effect hypothesis for galling insects associated with Styrax pohlii (Styracaceae host plant. Samplings were conducted at a fragment of semi-deciduous forest in Goiânia, Goiás, Brazil. Thirty host plant individuals (15 at fragment edge and 15 in its interior were sampled in July of 2007; in each plant, 10 apical branches were collected at the top, middle and bottom crown levels. Our results supported the prediction of greater richness of gall morphotypes in the edge habitat compared with remnant interior. In a similar way, gall abundance and frequency of attacked leaves were also greater in the fragment edge. These findings consequently suggest a positive response of galling insect diversity to edge effect; in the Saint-Hilaire forest, this effect probably operates through the changes in microclimatic conditions of edge habitats, which results in an increased hygrothermal stress, a determinant factor to distribution patterns of galling insects. We also concluded that these organisms could be employed as biological indicators (i because of their host-specificity, (ii they are sensitive to changes in plant quality, and (iii present dissimilar and specific responses to local variation in habitat conditions. Rev. Biol. Trop. 59 (4: 1589-1597. Epub 2011 December 01.Los impactos de la fragmentación de los bosques y el efecto de borde sobre las interacciones planta-herbívoros son relativamente desconocidos, y las relaciones entre los insectos inductores de agallas y sus plantas hospederas son muy susceptibles a las variaciones ambientales. El objetivo de nuestro estudio fue probar la hipótesis de efecto de borde en los insectos inductores de agallas asociados con la planta hospedera

  18. Assemblage of filamentous fungi associated with aculeate hymenopteran brood in reed galls.

    Science.gov (United States)

    Heneberg, Petr; Bizos, Jiří; Čmoková, Adéla; Kolařík, Miroslav; Astapenková, Alena; Bogusch, Petr

    2016-01-01

    Monotypic stands of common reed and the reed-gall-associated insect assemblages are distributed worldwide. However, fungi associated with these assemblages have not been characterized in detail. Here we examined 5200 individuals (12 species) of immature aculeate hymenopterans or their parasitoids collected at 34 sampling sites in Central Europe. We noticed fungal outgrowth on exoskeletons of 83 (1.60%) larvae and pupae. The most common host was eudominant Pemphredon fabricii. However, the less abundant aculeate hymenopteran reed gall inquilines were infected at higher prevalence, these included Trypoxylon deceptorium, Trypoxylon minus, Hoplitis leucomelana and Hylaeus moricei (all considered new host records). We identified three fungal species, Penicillium buchwaldii (72% of cases), Aspergillus pseudoglaucus (22%) and Penicillium quebecense (6%). When multibrooded nests were affected, only a part of individuals was infected in 62% of cases. The sampling site-specific infection rate reached up to 13%, thus fungal infections should be considered an important variable driving the abundance of gall inquilines. Infections of generalist host species were more frequent than those of reed gall specialists, suggesting that suboptimal conditions decreased the immunocompetence of non-specialized species, which only occasionally nest in reed galls and feed in reed beds. Copyright © 2015 Elsevier Inc. All rights reserved.

  19. Unexpected high diversity of galling insects in the Amazonian upper canopy: the savanna out there.

    Science.gov (United States)

    Julião, Genimar R; Venticinque, Eduardo M; Fernandes, G Wilson; Price, Peter W

    2014-01-01

    A relatively large number of studies reassert the strong relationship between galling insect diversity and extreme hydric and thermal status in some habitats, and an overall pattern of a greater number of galling species in the understory of scleromorphic vegetation. We compared galling insect diversity in the forest canopy and its relationship with tree richness among upland terra firme, várzea, and igapó floodplains in Amazonia, Brazil. The soils of these forest types have highly different hydric and nutritional status. Overall, we examined the upper layer of 1,091 tree crowns. Galling species richness and abundance were higher in terra firme forests compared to várzea and igapó forests. GLM-ANCOVA models revealed that the number of tree species sampled in each forest type was determinant in the gall-forming insect diversity. The ratio between galling insect richness and number of tree species sampled (GIR/TSS ratio) was higher in the terra firme forest and in seasonally flooded igapó, while the várzea presented the lowest GIR/TSS ratio. In this study, we recorded unprecedented values of galling species diversity and abundance per sampling point. The GIR/TSS ratio from várzea was approximately 2.5 times higher than the highest value of this ratio ever reported in the literature. Based on this fact, we ascertained that várzea and igapó floodplain forests (with lower GIA and GIR), together with the speciose terra firme galling community emerge as the gall diversity apex landscape among all biogeographic regions already investigated. Contrary to expectation, our results also support the "harsh environment hypothesis", and unveil the Amazonian upper canopy as similar to Mediterranean vegetation habitats, hygrothermically stressed environments with leaf temperature at lethal limits and high levels of leaf sclerophylly.

  20. Unexpected high diversity of galling insects in the Amazonian upper canopy: the savanna out there.

    Directory of Open Access Journals (Sweden)

    Genimar R Julião

    Full Text Available A relatively large number of studies reassert the strong relationship between galling insect diversity and extreme hydric and thermal status in some habitats, and an overall pattern of a greater number of galling species in the understory of scleromorphic vegetation. We compared galling insect diversity in the forest canopy and its relationship with tree richness among upland terra firme, várzea, and igapó floodplains in Amazonia, Brazil. The soils of these forest types have highly different hydric and nutritional status. Overall, we examined the upper layer of 1,091 tree crowns. Galling species richness and abundance were higher in terra firme forests compared to várzea and igapó forests. GLM-ANCOVA models revealed that the number of tree species sampled in each forest type was determinant in the gall-forming insect diversity. The ratio between galling insect richness and number of tree species sampled (GIR/TSS ratio was higher in the terra firme forest and in seasonally flooded igapó, while the várzea presented the lowest GIR/TSS ratio. In this study, we recorded unprecedented values of galling species diversity and abundance per sampling point. The GIR/TSS ratio from várzea was approximately 2.5 times higher than the highest value of this ratio ever reported in the literature. Based on this fact, we ascertained that várzea and igapó floodplain forests (with lower GIA and GIR, together with the speciose terra firme galling community emerge as the gall diversity apex landscape among all biogeographic regions already investigated. Contrary to expectation, our results also support the "harsh environment hypothesis", and unveil the Amazonian upper canopy as similar to Mediterranean vegetation habitats, hygrothermically stressed environments with leaf temperature at lethal limits and high levels of leaf sclerophylly.

  1. Taxonomic identity of a galling adelgid (Hemiptera: Adelgidae) from three spruce species in central Japan

    Science.gov (United States)

    Masakazu Sano; Nathan P. Havill; Kenichi. Ozaki

    2011-01-01

    Gall-forming insects are commonly highly host-specific, and galling species once thought to be oligo- or polyphagous are often found to represent a complex of host-specific races or cryptic species. A recent DNA barcoding study documented that an unidentified species of the genus Adelges is a gall-former associated with four spruce species (...

  2. Entomopathogenic Fungus as a Biological Control for an Important Vector of Livestock Disease: The Culicoides Biting Midge

    Science.gov (United States)

    Ansari, Minshad Ali; Pope, Edward C.; Carpenter, Simon; Scholte, Ernst-Jan; Butt, Tariq M.

    2011-01-01

    Background The recent outbreak of bluetongue virus in northern Europe has led to an urgent need to identify control measures for the Culicoides (Diptera: Ceratopogonidae) biting midges that transmit it. Following successful use of the entomopathogenic fungus Metarhizium anisopliae against larval stages of biting midge Culicoides nubeculosus Meigen, we investigated the efficacy of this strain and other fungi (Beauveria bassiana, Isaria fumosorosea and Lecanicillium longisporum) as biocontrol agents against adult C. nubeculosus in laboratory and greenhouse studies. Methodology/Findings Exposure of midges to ‘dry’ conidia of all fungal isolates caused significant reductions in survival compared to untreated controls. Metarhizium anisopliae strain V275 was the most virulent, causing a significantly decrease in midge survival compared to all other fungal strains tested. The LT50 value for strain V275 was 1.42 days compared to 2.21–3.22 days for the other isolates. The virulence of this strain was then further evaluated by exposing C. nubeculosus to varying doses (108–1011 conidia m−2) using different substrates (horse manure, damp peat, leaf litter) as a resting site. All exposed adults were found to be infected with the strain V275 four days after exposure. A further study exposed C. nubeculosus adults to ‘dry’ conidia and ‘wet’ conidia (conidia suspended in 0.03% aq. Tween 80) of strain V275 applied to damp peat and leaf litter in cages within a greenhouse. ‘Dry’ conidia were more effective than ‘wet’ conidia, causing 100% mortality after 5 days. Conclusion/Significance This is the first study to demonstrate that entomopathogenic fungi are potential biocontrol agents against adult Culicoides, through the application of ‘dry’ conidia on surfaces (e.g., manure, leaf litter, livestock) where the midges tend to rest. Subsequent conidial transmission between males and females may cause an increased level of fungi-induced mortality in midges

  3. Mbah, MC

    African Journals Online (AJOL)

    Effect Of Dates Of Transplanting, Plant Spacing And Nitrogen Levels On The Incidence Of African Rice Gall Midge Harris And Gagné (Diptera: Cecidomyiidae) In Southeastern Nigeria Abstract · Vol 11, No 1 (2006) - Articles Effect Of Transplanting Dates, Plant Spacing And Nitrogen Levels On The Incidence Of African Rice ...

  4. What should I do about my patient's gall stones?

    Science.gov (United States)

    Dennison, A R; Azoulay, D; Oakley, N; Baer, H; Paraskevopoulos, J A; Maddern, G J

    1995-12-01

    The problem of benign biliary disease is one that causes significant morbidity and social economic strain in the western world. The classical treatment, cholecystectomy, has been challenged by various medical and surgical techniques in a seemingly random nature. The development of the treatment of gall stone disease is reviewed by analysis of published studies over the last 20 years. The advantages and disadvantages are discussed as an overview and summary of the current management of gall stone disease in the light of our knowledge of its malignant potential.

  5. Primary Lymphoma of the Gall Bladder

    African Journals Online (AJOL)

    1974-06-29

    Jun 29, 1974 ... phomas thus constitute about 10% of all primary sarcomas of the gall ... Department of Pathology, University of Cape Town. J B. C. BOTHA, M.B. CH.B. L. B. KAHN ... mon hepatic duct at its junction with the cystic duct. The.

  6. Response of the nonbiting midge Chironomus riparius to multigeneration toxicant exposure

    NARCIS (Netherlands)

    Marinković, M.; de Bruijn, K.; Asselman, M.; Bogaert, M.; Jonker, M.J.; Kraak, M.H.S.; Admiraal, W.

    2012-01-01

    The ability of the nonbiting midge Chironomus riparius to withstand long-term toxicant exposure has been attributed to genetic adaptation. Recently, however, evidence has arisen that supports phenotypic plasticity. Therefore, the present study aimed to investigate if Chironomus riparius indeed copes

  7. Looking for gall bladder disease in the patient's iris.

    Science.gov (United States)

    Knipschild, P

    1988-12-17

    In alternative health care iridology is used as a diagnostic aid. The diagnosis of gall bladder disease was used to study its validity and interperformer consistency. The presence of an inflamed gall bladder containing gall stones is said to be easily recognised by certain signs in the lower lateral part of the iris of the right eye. Stereo colour slides were made of the right eye. Stereo colour slides were made of the right eye of 39 patients with this disease and 39 control subjects of the same sex and age. The slides were presented in a random order to five leading iridologists without supplementary information. The prevalence of the disease was estimated at 56%. The median validity was 51% with 54% sensitivity and 52% specificity. These results were close to chance validity (iota = 0.03). None of the iridologists reached a high validity. The median interperformer consistency was 60%. This was only slightly higher than chance consistency (kappa = 0.18). This study showed that iridology is not a useful diagnostic aid.

  8. Movements of adult Culicoides midges around stables in KwaZulu ...

    African Journals Online (AJOL)

    The catches were identified to species level and regression analysis was performed on untransformed data which followed a negative binomial distribution with a log link function. Midges were found to frequent dung heaps and the interior of stable blocks significantly more than any other site. This occurs most markedly ...

  9. Author Details

    African Journals Online (AJOL)

    Umeh, EDN. Vol 3, No 2 (2005) - Articles Management of african rice gall midge Orseolia oryzivora Harris and Gagné with reference to time planting and natural enemies in southeastern Nigeria Abstract. ISSN: 1597-0906. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors ...

  10. Species turnover drives β-diversity patterns across multiple spatial scales of plant-galling interactions in mountaintop grasslands.

    Science.gov (United States)

    Coelho, Marcel Serra; Carneiro, Marco Antônio Alves; Branco, Cristina Alves; Borges, Rafael Augusto Xavier; Fernandes, Geraldo Wilson

    2018-01-01

    This study describes differences in species richness and composition of the assemblages of galling insects and their host plants at different spatial scales. Sampling was conducted along altitudinal gradients composed of campos rupestres and campos de altitude of two mountain complexes in southeastern Brazil: Espinhaço Range and Mantiqueira Range. The following hypotheses were tested: i) local and regional richness of host plants and galling insects are positively correlated; ii) beta diversity is the most important component of regional diversity of host plants and galling insects; and iii) Turnover is the main mechanism driving beta diversity of both host plants and galling insects. Local richness of galling insects and host plants increased with increasing regional richness of species, suggesting a pattern of unsaturated communities. The additive partition of regional richness (γ) into local and beta components shows that local richnesses (α) of species of galling insects and host plants are low relative to regional richness; the beta (β) component incorporates most of the regional richness. The multi-scale analysis of additive partitioning showed similar patterns for galling insects and host plants with the local component (α) incorporated a small part of regional richness. Beta diversity of galling insects and host plants were mainly the result of turnover, with little contribution from nesting. Although the species composition of galling insects and host plant species varied among sample sites, mountains and even mountain ranges, local richness remained relatively low. In this way, the addition of local habitats with different landscapes substantially affects regional richness. Each mountain contributes fundamentally to the composition of regional diversity of galling insects and host plants, and so the design of future conservation strategies should incorporate multiple scales.

  11. Carcinoma of Gall bladder with distant metastasis to breast parenchyma. Report of a case and review of literature

    International Nuclear Information System (INIS)

    Kumaran, D.; Anamalai, M.; Velu, U.; Julka, P.K.; Nambirajan, A.

    2016-01-01

    Background: Gall bladder carcinoma is one of the most common cancers in India. Gall bladder cancer with metastasis to the breast is very rare. Herein we intend to report a case of carcinoma gall bladder with breast metastasis and a short review of the literature. Methods: This report describes an interesting and unusual case of gall bladder carcinoma presenting with breast metastasis. Case report: A 38-year lady presented with complaints of right abdominal pain. Bilateral breast examination showed 2 2 cm palpable lump in the upper outer quadrant of the left breast. Contrast-enhanced CT of the abdomen and pelvis showed circumferential thickening of gall bladder with the loss of fat plane with the adjacent liver parenchyma. Biopsy from the breast lump was reported as metastatic adenocarcinoma compatible with primary in the gall bladder. Whole body PET-CT showed gall bladder mass with abdominal and pelvic nodes with metastasis to liver, left breast, C7 vertebral body and left supra-clavicular node. She was diagnosed to have disseminated carcinoma gall bladder with liver, breast and supraclavicular nodal metastasis. She received palliative chemotherapy with gemcitabine and carboplatin and radiotherapy to C7 vertebra. After receiving 3 cycles of chemotherapy, chemotherapy was changed to the second line with single agent capecitabine. In spite of two lines of chemotherapy, she succumbed to disease progression and expired. Conclusion: There are limited examples of gall bladder adenocarcinoma with simultaneous metastasis to breast in the English literature. Our case showed an unusual dissemination of gall bladder cancer

  12. Occupational allergy to aquarium fish food: red midge larva, freshwater shrimp, and earthworm. A clinical and immunological study.

    Science.gov (United States)

    Meseguer Arce, J; Villajos, I M Sánchez-Guerrero; Iraola, V; Carnés, J; Fernández Caldas, E

    2013-01-01

    Chironomids seem to be the main cause of occupational allergy to aquarium fish food. The aim of this study was to investigate the pattern of occupational sensitization to 3 different arthropod species used as components of aquarium fish food. The study sample comprised 8 workers from a fish food packing department. The control group comprised 40 atopic patients (20 of whom were allergic to mites). We performed prick tests with extracts of red midge larva (Chironomus thummi), freshwater shrimp (Gammarus species), earthworm (Tubifex species), and other arthropod species and a battery of common inhalant allergens. We measured peak expiratory flow rate (PEFR) and specific immunoglobulin (Ig) E and performed a methacholine challenge test, nasal challenge test, and immunoblotting. Cross-reactivity analyses were completed using immunoblotting and CAP inhibition. Prick test results were positive to red midge larvae in 7 patients (87.5%), Gammarus in 5 (62.5%), Tubifex in 3 (37.5%), and mites in 6 (75%). In the mite-allergic controls, 30% had positive prick test results to red midge larvae. PEFR decreased > or = 20% during the packing process in all patients, and in 1 patient it indicated a dual asthmatic response. Methacholine challenge test results were positive in all participants. Nasal challenge tests were performed in 4 patients, and the results were positive. Specific IgE to red midge larvae was detected in 62.5%, Gammarus in 50%, and Tubifex in 16%. Bands of approximately 14-15 kDa and 31 kDa were observed in Gammarus and red midge larvae extracts. Cross-reactivity assays demonstrated that Gammarus totally inhibited red midge larvae, while Tubifex did so partially. Dermatophagoides pteronyssinus showed very low inhibitory capacity. Aquarium fish food arthropods are potent allergens with an elevated prevalence of sensitization and variable degree of crossreactivity. This is the first report of occupational allergy to Tubifex. More data are necessary to identify and

  13. Sweet Tetra-Trophic Interactions: Multiple Evolution of Nectar Secretion, a Defensive Extended Phenotype in Cynipid Gall Wasps.

    Science.gov (United States)

    Nicholls, James A; Melika, George; Stone, Graham N

    2017-01-01

    Many herbivores employ reward-based mutualisms with ants to gain protection from natural enemies. We examine the evolutionary dynamics of a tetra-trophic interaction in which gall wasp herbivores induce their host oaks to produce nectar-secreting galls, which attract ants that provide protection from parasitoids. We show that, consistent with other gall defensive traits, nectar secretion has evolved repeatedly across the oak gall wasp tribe and also within a single genus (Disholcaspis) that includes many nectar-inducing species. Once evolved, nectar secretion is never lost in Disholcaspis, consistent with high defensive value of this trait. We also show that evolution of nectar secretion is correlated with a transition from solitary to aggregated oviposition, resulting in clustered nectar-secreting galls, which produce a resource that ants can more easily monopolize. Such clustering is commonly seen in ant guard mutualisms. We suggest that correlated evolution between maternal oviposition and larval nectar induction traits has enhanced the effectiveness of this gall defense strategy.

  14. Detection of the onset of galling in strip reduction testing using acoustic emission

    DEFF Research Database (Denmark)

    Moghadam, Marcel; Christiansen, Peter; Bay, Niels Oluf

    2017-01-01

    Galling is an important issue in metal forming of tribologically severe materials such as high strength steel, stainless steel, Al- or Ti-alloys, since it leads to poor surface quality of the formed components, production stops and possibly deterioration of tools. The onset of galling is difficult...

  15. Carcinoma Gall Bladder: Past, Present, and Future

    Directory of Open Access Journals (Sweden)

    Ghosh Y

    2014-12-01

    Full Text Available Carcinoma gall bladder is a very aggressive disease with poor outcomes. Despite achievements in the field of advanced imaging techniques, there is a very high mortality rate of the disease Cancer is the second most common disease in India responsible for maximum mortality with about 0.3 million deaths per year. The magnitude of cancer problem in the Indian Sub-continent (sheer numbers is increasing due to poor to moderate living standards and inadequate medical facilities. Women are more commonly affected than men. The peak incidence occurs in people in their 60s, but the disease age range is from 29 to 90 years of age and there is great geographic and ethnic variation. Carcinoma gall bladder, a disease of old age, is now found in the younger age group and presents with greater ferocity.

  16. Obolodiplosis robiniae (Haldeman (Diptera: Cecidomyiidae: A new invasive insect pest on black locust in Serbia

    Directory of Open Access Journals (Sweden)

    Mihajlović Ljubodrag

    2008-01-01

    Full Text Available Locust gall midge Obolodiplosis robiniae (Haldeman originates from Pennsylvania, USA. It was introduced to Europe in 2003, to Italy, Veneto. Its spreading was very fast and in the following year it was identified from the Check Republic and Slovenia. In 2005, it was recorded from South Tyrol and in 2006 from Hungary, south Slovakia, Germany, Croatia, Ukraine and Serbia. During 2007 it was identified from Albania, Austria, Belgium, Bosnia & Herzegovina, France, Montenegro, the Netherlands, Poland, Switzerland, Russia and UK. The expansion of locust gall midge was also recorded in Japan, South Korea, where it was identified for the first time in 2002, and in 2005 it was identified from China. The first finding from Serbia was recorded in the autumn 2006 in the surroundings of Šabac. During 2007, it was identified from Belgrade, and in the same year and the following year (2008 it was found at numerous sites in Serbia, the Republic of Srpska and Montenegro. This study presents O. robiniae biology, method of distribution, natural enemies and the ecological significance.

  17. Nuclear power plant Generic Aging Lessons Learned (GALL). Appendix B

    International Nuclear Information System (INIS)

    Kasza, K.E.; Diercks, D.R.; Holland, J.W.; Choi, S.U.

    1996-12-01

    The purpose of this generic aging lessons learned (GALL) review is to provide a systematic review of plant aging information in order to assess materials and component aging issues related to continued operation and license renewal of operating reactors. Literature on mechanical, structural, and thermal-hydraulic components and systems reviewed consisted of 97 Nuclear Plant Aging Research (NPAR) reports, 23 NRC Generic Letters, 154 Information Notices, 29 Licensee Event Reports (LERs), 4 Bulletins, and 9 Nuclear Management and Resources Council Industry Reports (NUMARC IRs) and literature on electrical components and systems reviewed consisted of 66 NPAR reports, 8 NRC Generic Letters, 111 Information Notices, 53 LERs, 1 Bulletin, and 1 NUMARC IR. More than 550 documents were reviewed. The results of these reviews were systematized using a standardized GALL tabular format and standardized definitions of aging-related degradation mechanisms and effects. The tables are included in volumes 1 and 2 of this report. A computerized data base has also been developed for all review tables and can be used to expedite the search for desired information on structures, components, and relevant aging effects. A survey of the GALL tables reveals that all ongoing significant component aging issues are currently being addressed by the regulatory process. However, the aging of what are termed passive components has been highlighted for continued scrutiny. This report consists of Volume 2, which consists of the GALL literature review tables for the NUMARC Industry Reports reviewed for the report

  18. Franz Joseph Gall and music: the faculty and the bump.

    Science.gov (United States)

    Eling, Paul; Finger, Stanley; Whitaker, Harry

    2015-01-01

    The traditional story maintains that Franz Joseph Gall's (1758-1828) scientific program began with his observations of schoolmates with bulging eyes and good verbal memories. But his search to understand human nature, in particular individual differences in capacities, passions, and tendencies, can also be traced to other important observations, one being of a young girl with an exceptional talent for music. Rejecting contemporary notions of cognition, Gall concluded that behavior results from the interaction of a limited set of basic faculties, each with its own processes for perception and memory, each with its own territory in both cerebral or cerebellar cortices. Gall identified 27 faculties, one being the sense of tone relations or music. The description of the latter is identical in both his Anatomie et Physiologie and Sur les Fonctions du Cerveau et sur Celles de Chacune de ses Parties, where he provided positive and negative evidences and discussed findings from humans and lower animals, for the faculty. The localization of the cortical faculty for talented musicians, he explained, is demonstrated by a "bump" on each side of the skull just above the angle of the eye; hence, the lower forehead of musicians is broader or squarer than in other individuals. Additionally, differences between singing and nonsinging birds also correlate with cranial features. Gall even brought age, racial, and national differences into the picture. What he wrote about music reveals much about his science and creative thinking. © 2015 Elsevier B.V. All rights reserved.

  19. Patterns of gall infestation in Heteropterys byrsonimifolia A. Juss. in a forest-savannah ecotone

    Directory of Open Access Journals (Sweden)

    Marcela de Castro Nunes Santos Terra

    Full Text Available ABSTRACT Galls are the result of a specific interaction between an inducer and a host plant. The species Heteropterys byrsonimifolia A. Juss. occurs in abundance in semideciduous seasonal forest ecotones and adjacent open formations. In the ecological reserve Quedas do Rio Bonito, located in the state of Minas Gerais, Brazil, this species is affected by a single gall morphotype. The present study aimed to evaluate whether the structural complexity of the host (test of the structural complexity hypothesis and the distance between hosts (test of the resource concentration hypothesis affect gall density in H. byrsonimifolia and to characterize the spatial distribution of the infestation. The results corroborate the two hypotheses tested, suggesting a metapopulation pattern of gall infestation in H. byrsonimifolia. Gallers were more successful in abrupt forest-savannah transition environments, which may be associated with greater stress-induced host vulnerability that plants usually experience in ecotones.

  20. Primary Lymphoma of the Gall Bladder

    African Journals Online (AJOL)

    1974-06-29

    Jun 29, 1974 ... textbooks of pathology.'" We have been able to find only. 11 cases documented in the world literature; and only 4 of these in the English literature..·• They have appeared as isolated case reports or are mentioned in reviews deal- ing with primary sarcomas of the gall bladder. To the best of our knowledge ...

  1. Spatial and temporal variability in midge (Nematocera) assemblages in shallow Finnish lakes (60-70 deg N) : community-based modelling of past environmental change

    Energy Technology Data Exchange (ETDEWEB)

    Luoto, T.

    2010-07-01

    Multi- and intralake datasets of fossil midge assemblages in surface sediments of small shallow lakes in Finland were studied to determine the most important environmental factors explaining trends in midge distribution and abundance. The aim was to develop palaeoenvironmental calibration models for the most important environmental variables for the purpose of reconstructing past environmental conditions. The developed models were applied to three high-resolution fossil midge stratigraphies from southern and eastern Finland to interpret environmental variability over the past 2000 years, with special focus on the Medieval Climate Anomaly (MCA), the Little Ice Age (LIA) and recent anthropogenic changes. The midge-based results were compared with physical properties of the sediment, historical evidence and environmental reconstructions based on diatoms (Bacillariophyta), cladocerans (Crustacea: Cladocera) and tree rings. The results showed that the most important environmental factor controlling midge distribution and abundance along a latitudinal gradient in Finland was the mean July air temperature (TJul). However, when the dataset was environmentally screened to include only pristine lakes, water depth at the sampling site became more important. Furthermore, when the dataset was geographically scaled to southern Finland, hypolimnetic oxygen conditions became the dominant environmental factor. The results from an intralake dataset from eastern Finland showed that the most important environmental factors controlling midge distribution within a lake basin were river contribution, water depth and submerged vegetation patterns. In addition, the results of the intralake dataset showed that the fossil midge assemblages represent fauna that lived in close proximity to the sampling sites, thus enabling the exploration of within-lake gradients in midge assemblages. Importantly, this within-lake heterogeneity in midge assemblages may have effects on midge-based temperature

  2. Renaissance der KMU in einer globalisierten Wirtschaft : Beiträge zu den Rencontres de St-Gall 1998

    OpenAIRE

    1998-01-01

    Rückblick auf 50 Jahre Rencontres de St-Gall / Review of 50 years Rencontres de St-Gall Karl-Heinz Schmidt Leistungsdifferenzierung als Gegenstand internationaler Forschungskooperation - 50 Jahre Rencontres de St-Gall 17 Thema A: Deregulierung und Branchenentwicklung in der Dienstleistungsgesellschaft / Topic A: Deregulation and the prospects of sectors in the service society Leo W. Chini Die betriebswirtschaftlichen Effekte der von der EU induzierten »Deregulier...

  3. Pancreatic heterotopia in the gall bladder: a case report and literature review

    Directory of Open Access Journals (Sweden)

    Sansom Henrique Bromberg

    2009-03-01

    Full Text Available Pancreatic heterotopia in the gall bladder is a rare entity, with approximately 31 cases reported in English language literature until 2006; there are no Brazilian studies on the topic. As it is usually asymptomatic, the definitive diagnosis is made by the anatomopathological material excised due to common diseases of the organ, such as lithiasis, inflammatory processes, polyps and tumors. A case is reported of a 40-year-old female patient submitted to surgery with a diagnosis of lithiasic cholecystopathy. Ectopy was evidenced by the histological study, due to the presence of acinar and ductal components of the pancreas and gall bladder corpus. The authors used their own pathological classification for this ectopy, and recommended that this entity be included more frequently in the differential diagnosis of alithiasic cholecystopathy and intramural and exophytic lesions of the gall bladder.

  4. Culicoides midges (Diptera: Ceratopogonidae as vectors of orbiviruses in Slovakia

    Directory of Open Access Journals (Sweden)

    Adela Sarvašová

    2014-09-01

    Full Text Available In recent years, rapid spread of Culicoides-borne pathogens such as bluetongue (BT and Schmallenberg viruses have been reported in Europe. In this study we examined the Culicoides populations in farms with wild and domestic ruminants in Eastern Slovakia with the aim to confirm the presence of biting midges serving as potential vectors of important pathogens. The main vector complexes were the Obsoletus complex (54%; n=4,209 and the Pulicaris complex (23%; n=1,796. To estimate the relative abundance of the cryptic species of the Obsoletus complex (Culicoides obsoletus, Culicoides scoticus and Culicoides montanus, we performed the multiplex polymerase chain reaction (PCR based on ITS-2 and ITS-1 segments, on 125 midges randomly sampled. The relative abundance of C. obsoletus ranged from 5.26% in the farm with wild ruminants to 85.71% in another farm with cattle and sheep. A total of 112 pools of parous and gravid females belonging to the Obsoletus and Pulicaris complexes were tested for virus detection by the real-time reverse transcription polymerase chain reaction (RT-PCR for BT virus, as well as for the Epizootic Hemorrhagic Disease Virus (EHDV, with negative results.

  5. Distributional record of oak gall wasp (Hymenoptera: Cynipidae ...

    African Journals Online (AJOL)

    m

    2011-11-16

    Nov 16, 2011 ... following formula: ... Sørensen similarity index is calculated from this formula as: ..... Bayesian phylogenetics and the evolution of gall ... theory. Ecology, 89(7): 1921-1930. Stone GN, Schonrogge K, Atkinson R, Bellido D, ...

  6. Review of the generic aging lessons learned (GALL) report for U.S. NPPs

    International Nuclear Information System (INIS)

    Gong Yi; Dou Yikang

    2014-01-01

    Generic aging lessons learned (GALL) report is a technical basis document issued by U.S. nuclear regulatory commission (NRC) for guiding the review of license renewal application (LRA) of its domestic nuclear power plants (NPPs). By form of tabulations, GALL report addresses the correlation among materials, environments, aging effects/mechanisms, and aging management programs (AMPs) from the level of specific structures and/or components. Based on literature investigation and analysis, the essential information of GALL report in the aspects of background, development history, content framework, and application was reviewed in this paper, which should be the first time in China and would have reference value for establishment of both the AMPs and the nuclear safety regulations of extending the lifetime of its NPPs. (authors)

  7. From Midges to Spiders: Mercury Biotransport in Riparian Zones Near the Buffalo River Area of Concern (AOC), USA.

    Science.gov (United States)

    Pennuto, C M; Smith, M

    2015-12-01

    Riparian communities can receive environmental contaminants from adjacent aquatic 'donor' habitats. We investigated mercury biotransport from aquatic to terrestrial habitats via aquatic insect emergence and uptake by riparian spiders at sites within and upstream of the Buffalo River Area of Concern (AOC), a site with known sediment Hg contamination. Mercury concentration in emerging midges was roughly 10× less than contaminated sediment levels with the AOC, but biomagnification factors from midges to spiders ranged from 2.0 to 2.65 between sites. There was a significantly negative body mass:total mercury relationship in spiders (p Spiders contained significantly more mercury than their midge prey and spiders upstream of the AOC had higher mercury concentrations than spiders from within the AOC. Collectively, these data indicate that riparian spiders can be good mercury sentinels in urban environments, and that riparian communities upstream from the AOC may be at greater risk to mercury than has been previously considered.

  8. Effects of pH on the life cycle of the midge Tanytansus dissimilis

    Energy Technology Data Exchange (ETDEWEB)

    Bell, H L

    1970-01-01

    All stages of the life cycle of the midge Tanytarsus (paratanytarsus) dissimilis joh. were subjected to low pH and the exremes of tolerance were determined. The life cycle could not be completed below a pH of 5.5.

  9. Lithium absorption by the rabbit gall-bladder

    DEFF Research Database (Denmark)

    Hansen, C P; Holstein-Rathlou, N H; Skøtt, O

    1991-01-01

    Lithium (Li+) absorption across the low-resistance epithelium of the rabbit gall-bladder was studied in order to elucidate possible routes and mechanisms of Li+ transfer. Li+ at a concentration of 0.4 mM in both mucosal and serosal media did not affect isosmotic mucosa-to-serosa fluid absorption...

  10. Quantification of Galling in Sheet Metal Forming by surface topography characterisation

    DEFF Research Database (Denmark)

    Andreasen, Jan Lasson; Bay, Niels; De Chiffre, Leonardo

    1998-01-01

    One of the major problems in forming of stainless steel sheet is galling due to lubricant film breakdown leading to scoring and bad surface quality. In a Danish research programme new lubricants substituting the normally applied chlorinated paraffin oils are being developed and tested...... for this purpose. In order to determine the limits of lubrication of these new lubricants, as well as commercial ones already available on the market, two sheet forming tests have been developed. Quantification of the degree of galling is done by roughness measurements on the workpiece surface. In a strip...

  11. Efficacy of the Non-Pathogenic Agrobacterium Strains K84 and K1026 against Crown Gall in Tunisia

    Directory of Open Access Journals (Sweden)

    A. Rhouma

    2004-08-01

    Full Text Available The non-pathogenic Agrobacterium radiobacter strain K84 and its genetically modified (GEM strain K1026 were tested for their effectiveness against local Tunisian strains and two reference strains (C58 and B6 of the crown gall bacterium Agrobacterium tumefaciens. Tests in planta were carried out on herbaceous plants (tomato and tagetes and on some sensitive rootstocks (bitter almond, peach almond hybrid GF677 and quince BA29. In vitro tests showed that both K84 and K1026 were effective and that the difference between these strains was not statistically significant. On tomato and tagetes, strain K84 was effective against all crown gall isolates with the exception of the A. tumefaciens reference strain B6. GEM strain K1026 was very effective against all isolates from Tunisia and against the reference strains. Both antagonistic strains significantly reduced the percentage of galled plants as well as the number of galls per plant. Under field conditions, both antagonists controlled crown gall effectively. Best results were obtained on the bitter almond-tree rootstock. Antagonist effectiveness was less evident on quince BA29 and peach almond GF677 rootstocks. The genetically modified strain K1026 is of interest in controlling crown gall disease in Tunisia.

  12. Seasonal and interseasonal dynamics of bluetongue virus infection of dairy cattle and Culicoides sonorensis midges in northern California--implications for virus overwintering in temperate zones.

    Directory of Open Access Journals (Sweden)

    Christie E Mayo

    Full Text Available Bluetongue virus (BTV is the cause of an economically important arboviral disease of domestic and wild ruminants. The occurrence of BTV infection of livestock is distinctly seasonal in temperate regions of the world, thus we determined the dynamics of BTV infection (using BTV-specific real time reverse transcriptase polymerase chain reaction among sentinel cattle and vector Culicoides sonorensis (C. sonorensis midges on a dairy farm in northern California throughout both the seasonal and interseasonal (overwintering periods of BTV activity from August 2012 until March 2014. The data confirmed widespread infection of both sentinel cattle and vector midges during the August-November period of seasonal BTV transmission, however BTV infection of parous female midges captured in traps set during daylight hours also was detected in February of both 2013 and 2014, during the interseasonal period. The finding of BTV-infected vector midges during mid-winter suggests that BTV may overwinter in northern California by infection of long-lived female C. sonorensis midges that were infected during the prior seasonal period of virus transmission, and reemerged sporadically during the overwintering period; however the data do not definitively preclude other potential mechanisms of BTV overwintering that are also discussed.

  13. Seasonal variation of phenolic content in galled and non-galled tissues of Calliandra brevipes Benth (Fabaceae: Mimosoidae Variação sazonal do conteúdo fenólico em tecidos galhados e não-galhados de Calliandra brevipes Benth (Fabaceae: Mimosoidae

    Directory of Open Access Journals (Sweden)

    Michelle de Lima Detoni

    2011-09-01

    Full Text Available Two species, Tanaostigmodes ringueleti and T. mecanga, induce distinct galls on Calliandra brevipes Benth (Fabaceae: Mimosoidae, a globose and a fusiform gall morphotype. Seasonal changes of phenolic content in the tissues of the two distinct galls were compared to those of non-galled leaves and stems of the host plants over one year. The variation in the phenolic content profiles was similar in both non-galled and galled tissues, and was primarily associated with changes in the levels of rainfall, indicating a direct response to hydric stress. In periods of drastic changes in water precipitation, the alterations were significantly higher in non-galled than in galled tissues suggesting that the gall inducers might limit the variation in the phenolic concentration for their own benefit.Duas espécies, Tanaostigmodes ringueleti e T. mecanga, induzem galhas distintas em Calliandra brevipes Benth (Fabaceae: Mimosoidae, um morfotipo globoso e um fusiforme. Mudanças sazonais no conteúdo fenólico nos tecidos das duas galhas foram comparadas àquelas de folha e caule não galhados das plantas hospedeiras por um ano. A variação no perfil de conteúdo fenólico foi similar em tecidos galhados e não galhados, sendo associada primariamente às mudanças nos níveis de chuva, constituindo uma resposta direta ao estresse hídrico. Nos períodos de mudanças drásticas na precipitação de água, as alterações foram significativamente maiores em tecido não galhados do que em tecidos galhados, sugerindo que os galhadores estariam limitando a variação do conteúdo fenólico em seu próprio benefício.

  14. Papular dermatitis induced in guinea pigs by the biting midge Culicoides sonorensis (Diptera: Ceratopogonidae).

    Science.gov (United States)

    O'Toole, D; Pérez de León, A A; Hearne, C; McHolland, L; Yun, L; Tabachnick, W

    2003-01-01

    Histological, ultrastructural, and virological examinations were performed on abdominal skin from guinea pigs after a blood meal by colony-bred biting midges, Culicoides sonorensis. Small, superficial, cutaneous, crateriform ulcers with necrosis of superficial dermis developed at feeding sites and healed within 24-48 hours. Animals developed nonpruritic erythematous papules 5 days after feeding that persisted until the study ended at 12 days after feeding. Papules corresponded histologically to foci of epidermal hyperplasia and superficial interstitial dermatitis with intraepidermal micropustules and scattered intraepidermal polykaryons. The principal ultrastructural changes were spongiosis in germinal epithelium and neutrophilic-histiocytic exocytosis. No viral agents or broken mouthparts were identified in lesions. The dermatitis may represent a host reaction to persisting insect salivary secretion and should be considered as an additional consequence of blood feeding in future studies involving biting midges.

  15. Moessbauer spectrometry applied to the study of laboratory samples made of iron gall ink

    International Nuclear Information System (INIS)

    Burgaud, C.; Rouchon, V.; Refait, P.; Wattiaux, A.

    2008-01-01

    Iron gall inks consist of a mixture of vitriol, gall nut extracts and gum arabic. The association of the iron(II) sulphate present in vitriols, and the carboxyphenolic acids present in gall nut extracts leads to the formation of dark coloured iron-based precipitates. In order to evaluate the percentage of iron used in the formation of these precipitates, transmission Moessbauer spectroscopy (MS) measurements were performed on laboratory made inks at room temperature. These were completed by X-ray diffraction (XRD), and Raman spectroscopy measurements. The samples consisted of several solutions of iron(II) sulphate, gallic acid and gum arabic. After evaporation, the residues were analysed. Up to eight different Moessbauer signatures were detected, most of them correlated to iron sulphates. The Moessbauer signature of the iron gall precipitate was also isolated. It is not distinctly defined and may overlap with the signatures of iron(III) hydroxy-sulphates, such as jarosite or copiapite. Raman spectrometry then proved to be a useful complementary technique for the identification of the precipitate. (orig.)

  16. A NEW SPECIES OF INVASIVE GALL WASP (HYMENOPTERA: EULOPHIDAE: TETRASTICHINAE) ON BLUE GUM (EUCALYPTUS GLOBULUS) IN CALIFORNIA

    Science.gov (United States)

    The blue gum gall wasp, Selitrichodes globulus La Salle & Gates (Hymenoptera: Eulophidae: Tetrastichinae), is described as an invasive gall inducer on blue gum, Eucalyptus globulus (Myrtaceae), in California....

  17. Effects of pH on the toxicity and uptake of [14C]lindane in the midge, Chironomus riparius

    International Nuclear Information System (INIS)

    Fisher, S.W.

    1985-01-01

    The toxicity of the insecticide, lindane, was measured in the midge, Chironomus riparius, at pH 4, 6, and 8 with the finding that lindane is significantly more toxic at pH 6 than at pH 4 and 8. The higher toxicity of lindane at pH 6 is a product of two factors. First the penetration of the compound into the midge is lower at pH 4 than at pH 6 and 8. Second, a greater percentage of total radioactivity is contributed by parent compound at pH 6

  18. Influence of surface texture on the galling characteristics of lean duplex and austenitic stainless steels

    DEFF Research Database (Denmark)

    Wadman, Boel; Eriksen, J.; Olsson, M.

    2010-01-01

    Two simulative test methods were used to study galling in sheet forming of two types of stainless steel sheet: austenitic (EN 1.4301) and lean duplex LDX 2101 (EN 1.4162) in different surface conditions. The pin-on-disc test was used to analyse the galling resistance of different combinations of ...

  19. Life cycle responses of the midge Chironomus riparius to polycyclic aromatic compound exposure

    NARCIS (Netherlands)

    León Paumen, M.; Borgman, E.; Kraak, M.H.S.; van Gestel, C.A.M.; Admiraal, W.

    2008-01-01

    During acute exposure, polycyclic aromatic compounds (PACs) act mainly by narcosis, but during chronic exposure the same compounds may exert sublethal life cycle effects. The aim of this study was therefore to evaluate the chronic effects of sediment spiked PACs on the emergence of the midge

  20. Plant responses to Agrobacterium tumefaciens and crown gall development

    Science.gov (United States)

    Gohlke, Jochen; Deeken, Rosalia

    2014-01-01

    Agrobacterium tumefaciens causes crown gall disease on various plant species by introducing its T-DNA into the genome. Therefore, Agrobacterium has been extensively studied both as a pathogen and an important biotechnological tool. The infection process involves the transfer of T-DNA and virulence proteins into the plant cell. At that time the gene expression patterns of host plants differ depending on the Agrobacterium strain, plant species and cell-type used. Later on, integration of the T-DNA into the plant host genome, expression of the encoded oncogenes, and increase in phytohormone levels induce a fundamental reprogramming of the transformed cells. This results in their proliferation and finally formation of plant tumors. The process of reprogramming is accompanied by altered gene expression, morphology and metabolism. In addition to changes in the transcriptome and metabolome, further genome-wide (“omic”) approaches have recently deepened our understanding of the genetic and epigenetic basis of crown gall tumor formation. This review summarizes the current knowledge about plant responses in the course of tumor development. Special emphasis is placed on the connection between epigenetic, transcriptomic, metabolomic, and morphological changes in the developing tumor. These changes not only result in abnormally proliferating host cells with a heterotrophic and transport-dependent metabolism, but also cause differentiation and serve as mechanisms to balance pathogen defense and adapt to abiotic stress conditions, thereby allowing the coexistence of the crown gall and host plant. PMID:24795740

  1. Penicillium cecidicola, a new species on cynipid insect galls on Quercus pacifica in the western United States

    DEFF Research Database (Denmark)

    Seifert, K.A.; Hoekstra, E.H.; Frisvad, Jens Christian

    2004-01-01

    A synnematous species of Penicillium subgenus Biverticillium was found inside emergence tunnels from insect galls (Cynipidae, Hymenoptera, the so-called gall wasps) on scrub oaks (Quercus pacifica Nixon & C.H. Muller) collected in the western United States. The fungus produces synnemata with white...... isolates exposed to light after 10 days. The fungus produces the extrolite apiculide A and a series of unidentified extrolites also produced by P. panamense. The oak gall species is described here as Penicillium cecidicola and compared with similar species. An ITS phylogeny suggests that P. cecidicola...

  2. The gall mites Vasates quadripedes and Cecidophyopsis psilaspis (Acari: Eriophyidae) new to Denmark

    DEFF Research Database (Denmark)

    Bruun, Hans Henrik; Soika, Grazyna

    2013-01-01

    We report the first records from Denmark of the gall mite species Vasates quadripedes Shimer, 1869 and Cecidophyopsis psilaspis (Nalepa, 1893). V quadripedes is native to North America and forms pouch galls on leaves of some American species of maple. In Europe, it has been found on planted silver...... maple, Acer saccharinum L., only. The species has spread across Europe in recent years. C. psilaspis forms bud galls of species of Taxus in Europe only the native Taxus baccata L. The species is native to Europe and has been introduced to North America....

  3. Comunidades de insetos galhadores (Insecta em diferentes fisionomias do cerrado em Minas Gerais, Brasil Galling insect (Insecta communities in different "cerrado" physiognomies in Minas Gerais, Brazil

    Directory of Open Access Journals (Sweden)

    Silmary J. Gonçalves-Alvim

    2001-07-01

    Full Text Available Studies on the communities of galling insects and their host plants were performed in three "cerrado" physiognomies that occur in Minas Gerais: "campo sujo", "cerrado" sensu strictu, and "cerradão". Galls and host plants were collected along transects in a total of 3,000 herbs, 300 shrubs and 135 trees in each physiognomy. Ninety two species of galling insects (morphotypes on 62 host plant species of 28 families were found. The highest galling insect richness was observed in the "cerrado". Approximately 75.0% of galling insects belonged to the Cecidomyiidae (Diptera. The highest gall frequency was found on leaves (58.70% of the host plants, and was glabrous (83.70%. Most gall shape were elliptic (30.43%. A low similarity in galling insect species was observed among the three sampled physiognomies - the highest similarity index was observed between "cerrado" and "campo sujo" (SΦrensen index = 0.20, indicating that the presence of rare species of galling insects might be common in these environments.

  4. Prevalence of gall bladder stones among type 2 diabetic patients in Benghazi Libya: a case-control study

    Directory of Open Access Journals (Sweden)

    Behieh A

    2009-01-01

    Full Text Available Background: Diabetes mellitus and gall bladder stones are both common and costly diseases.Increasing age, female gender, overweight, familial history of the disease and type 2 diabetes mellitusis all associated with an increased risk of gallstones. Several studies from around the world reportedan increased prevalence of gall bladder stones in patients with diabetes mellitus. Aims andobjectives: The aim of this study was to define the frequency of gall bladder stones among Libyandiabetics and to evaluate the possible associated risk factors in these patients. Patients andmethods: A case-control study was performed during 2007 at Benghazi Diabetes and endocrinologyCenter. The study involved 161 randomly selected type-2 diabetic patients under regular follow up atthe center, and 166 age and sex matched non-diabetic outpatients at the 7th of October teachinghospital. Real-time abdominal ultrasound was performed by two radiologists to examine the abdomenafter an overnight fast. Results: About 40% of the diabetic cohort had gall bladder stones ascompared to 17.5% of non-diabetic patients. Females were significantly more affected than males.Patients with gall bladder stones were significantly older and had a significantly higher body massindex than those without stones. Conclusion: The prevalence of gallstones in Libyan diabeticpatients is higher than the rates reported in other parts of the world. Libyan diabetic patients withgallstones tend to be older and more obese than those without gallstones. Duration of diabetesmellitus and type of treatment does not seem to influence the frequency of gall bladder stones amongLibyan diabetics.

  5. Host-associated genetic differentiation in the goldenrod elliptical-gall moth, Gnorimoschema gallaesolidaginis (Lepidoptera: Gelechiidae).

    Science.gov (United States)

    Nason, John D; Heard, Stephen B; Williams, Frederick R

    2002-07-01

    Careful study of apparently generalist phytophagous insects often reveals that they instead represent complexes of genetically differentiated host races or cryptic species. The goldenrod elliptical-gall moth, Gnorimoschema gallaesolidaginis, attacks two goldenrods in the Solidago canadensis complex: S. altissima and S. gigantea (Asteraceae). We tested for host-associated genetic differentiation in G. gallaesolidaginis via analysis of variation at 12 allozyme loci among larvae collected at six sites in Iowa, Minnesota, and Nebraska. Gnorimoschema gallaesolidaginis from each host are highly polymorphic (3.6-4.7 alleles/locus and expected heterozygosity 0.28-0.38 within site-host combinations). Although there were no fixed differences between larvae from S. altissima and S. gigantea at any site, these represent well differentiated host forms, with 11 of 12 loci showing significantly different allele frequencies between host-associated collections at one or more sites. Host plant has a larger effect on genetic structure among populations than does location (Wright's FST = 0.16 between host forms vs. F(ST) = 0.061 and 0.026 among altissima and gigantea populations, respectively). The estimated F(ST) between host forms suggests that the historical effective rate of gene flow has been low (N(e)m approximately 1.3). Consistent with this historical estimate is the absence of detectable recombinant (hybrid and introgressant between host form) individuals in contemporary populations (none of 431 genotyped individuals). Upper 95% confidence limits for the frequency of recombinant individuals range from 5% to 9%. Host association is tight, but imperfect, with only one likely example of a host mismatch (a larva galling the wrong host species). Our inferences about hybridization and host association are based on new maximum-likelihood methods for estimating frequencies of genealogical classes (in this case, two parental classes, F1 and F2 hybrids, and backcrosses) in a population

  6. Phylogeny of Rhus gall aphids (Hemiptera:Pemphigidae) based on combined molecular analysis of nuclear EF1α and mitochondrial COII genes

    Science.gov (United States)

    Zi-xiang Yang; Xiao-ming Chen; Nathan P. Havill; Ying Feng; Hang. Chen

    2010-01-01

    Rhus gall aphids (Fordinae : Melaphidini) have a disjunct distribution in East Asia and North America and have specific host plant relationships. Some of them are of economic importance and all species form sealed galls which show great variation in shape, size, structure, and galling-site. We present a phylogeny incorporating ten species and four...

  7. CHRONIC EFFECTS OF THE HERBICIDE DIURON ON FRESHWATER CLADOCERANS,AMPHIPODS,MIDGES,MINNOWS,WORMS, AND SNAILS

    Science.gov (United States)

    The chronic effects of the herbicide diuron on survival and reproduction of Daphnia pulex, and survival and growth of the amphipod Hyalella azteca, the midge Chironomus tentans, juvenile and embro/larval fathead minnows, Pimephales promelas, annelid worms, Lumbriculus variegatus,...

  8. New gall midges (Diptera: Cecidomyiidae) from Papua New Guinea

    Czech Academy of Sciences Publication Activity Database

    Kolesik, P.; Butterill, Philip T.

    2015-01-01

    Roč. 54, č. 1 (2015), s. 79-86 ISSN 2052-1758 R&D Projects: GA ČR GA13-10486S EU Projects: European Commission(XE) 669609 Institutional support: RVO:60077344 Keywords : barcoding * COI * insect taxonomy Subject RIV: EG - Zoology Impact factor: 1.114, year: 2015 http://onlinelibrary.wiley.com/doi/10.1111/aen.12095/abstract

  9. Computerized tomography of gall bladder cancer

    International Nuclear Information System (INIS)

    Todua, F.I.; Karmazanovskij, G.G.

    1989-01-01

    The authors have summed up the experience in the use of computerized tomography (CT) in diagnosis of gall bladder cancer. The investigation of 17 patients with cancer of this site showed a high informative value of the method. A retrospective comparative study of the results of CT and surgical interventions was carried out. It has been concluded that CT makes it possible not only to diagnose malignant lesions of the bile ducts but also to assess a possible scope of a forthcoming operation

  10. Nuclear power plant Generic Aging Lessons Learned (GALL). Main report and appendix A

    Energy Technology Data Exchange (ETDEWEB)

    Kaza, K.E.; Diercks, D.R.; Holland, J.W.; Choi, S.U. [and others

    1996-12-01

    The purpose of this generic aging lessons learned (GALL) review is to provide a systematic review of plant aging information in order to assess materials and component aging issues related to continued operation and license renewal of operating reactors. Literature on mechanical, structural, and thermal-hydraulic components and systems reviewed consisted of 97 Nuclear Plant Aging Research (NPAR) reports, 23 NRC Generic Letters, 154 Information Notices, 29 Licensee Event Reports (LERs), 4 Bulletins, and 9 Nuclear Management and Resources Council Industry Reports (NUMARC IRs) and literature on electrical components and systems reviewed consisted of 66 NPAR reports, 8 NRC Generic Letters, 111 Information Notices, 53 LERs, 1 Bulletin, and 1 NUMARC IR. More than 550 documents were reviewed. The results of these reviews were systematized using a standardized GALL tabular format and standardized definitions of aging-related degradation mechanisms and effects. The tables are included in volume s 1 and 2 of this report. A computerized data base has also been developed for all review tables and can be used to expedite the search for desired information on structures, components, and relevant aging effects. A survey of the GALL tables reveals that all ongoing significant component aging issues are currently being addressed by the regulatory process. However, the aging of what are termed passive components has been highlighted for continued scrutiny. This document is Volume 1, consisting of the executive summary, summary and observations, and an appendix listing the GALL literature review tables.

  11. Nuclear power plant Generic Aging Lessons Learned (GALL). Main report and appendix A

    International Nuclear Information System (INIS)

    Kasza, K.E.; Diercks, D.R.; Holland, J.W.; Choi, S.U.

    1996-12-01

    The purpose of this generic aging lessons learned (GALL) review is to provide a systematic review of plant aging information in order to assess materials and component aging issues related to continued operation and license renewal of operating reactors. Literature on mechanical, structural, and thermal-hydraulic components and systems reviewed consisted of 97 Nuclear Plant Aging Research (NPAR) reports, 23 NRC Generic Letters, 154 Information Notices, 29 Licensee Event Reports (LERs), 4 Bulletins, and 9 Nuclear Management and Resources Council Industry Reports (NUMARC IRs) and literature on electrical components and systems reviewed consisted of 66 NPAR reports, 8 NRC Generic Letters, 111 Information Notices, 53 LERs, 1 Bulletin, and 1 NUMARC IR. More than 550 documents were reviewed. The results of these reviews were systematized using a standardized GALL tabular format and standardized definitions of aging-related degradation mechanisms and effects. The tables are included in volumes 1 and 2 of this report. A computerized data base has also been developed for all review tables and can be used to expedite the search for desired information on structures, components, and relevant aging effects. A survey of the GALL tables reveals that all ongoing significant component aging issues are currently being addressed by the regulatory process. However, the aging of what are termed passive components has been highlighted for continued scrutiny. This document is Volume 1, consisting of the executive summary, summary and observations, and an appendix listing the GALL literature review tables

  12. Characterization of the bile and gall bladder microbiota of healthy pigs.

    Science.gov (United States)

    Jiménez, Esther; Sánchez, Borja; Farina, Annarita; Margolles, Abelardo; Rodríguez, Juan M

    2014-12-01

    Bile is a biological fluid synthesized in the liver, stored and concentrated in the gall bladder (interdigestive), and released into the duodenum after food intake. The microbial populations of different parts of mammal's gastrointestinal tract (stomach, small and large intestine) have been extensively studied; however, the characterization of bile microbiota had not been tackled until now. We have studied, by culture-dependent techniques and a 16S rRNA gene-based analysis, the microbiota present in the bile, gall bladder mucus, and biopsies of healthy sows. Also, we have identified the most abundant bacterial proteins in the bile samples. Our data show that the gall bladder ecosystem is mainly populated by members of the phyla Proteobacteria, Firmicutes, and Bacteroidetes. Furthermore, fluorescent in situ hybridization (FISH) and transmission electron microscopy (TEM) allowed us to visualize the presence of individual bacteria of different morphological types, in close association with either the epithelium or the erythrocytes, or inside the epithelial cells. Our work has generated new knowledge of bile microbial profiles and functions and might provide the basis for future studies on the relationship between bile microbiota, gut microbiota, and health. © 2014 The Authors. MicrobiologyOpen published by John Wiley & Sons Ltd.

  13. Langevin dynamics encapsulate the microscopic and emergent macroscopic properties of midge swarms

    Science.gov (United States)

    2018-01-01

    In contrast to bird flocks, fish schools and animal herds, midge swarms maintain cohesion but do not possess global order. High-speed imaging techniques are now revealing that these swarms have surprising properties. Here, I show that simple models found on the Langevin equation are consistent with this wealth of recent observations. The models predict correctly that large accelerations, exceeding 10 g, will be common and they predict correctly the coexistence of core condensed phases surrounded by dilute vapour phases. The models also provide new insights into the influence of environmental conditions on swarm dynamics. They predict that correlations between midges increase the strength of the effective force binding the swarm together. This may explain why such correlations are absent in laboratory swarms but present in natural swarms which contend with the wind and other disturbances. Finally, the models predict that swarms have fluid-like macroscopic mechanical properties and will slosh rather than slide back and forth after being abruptly displaced. This prediction offers a promising avenue for future experimentation that goes beyond current quasi-static testing which has revealed solid-like responses. PMID:29298958

  14. Galled by the Gallbladder?: Your Tiny, Hard-Working Digestive Organ

    Science.gov (United States)

    ... Galled by the Gallbladder? Your Tiny, Hard-Working Digestive Organ En español Send us your comments Most ... among the most common and costly of all digestive system diseases. By some estimates, up to 20 ...

  15. Non-destructive study of iron gall inks in manuscripts

    Science.gov (United States)

    Duh, Jelena; Krstić, Dragica; Desnica, Vladan; Fazinić, Stjepko

    2018-02-01

    The aim of this research is to establish an effective procedure of iron gall ink characterization using complementary non-destructive methods. By this, it is possible to better understand correlation of chemical composition of the inks and the state of preservation of iron gall ink manuscripts, as well as the effects of conservation treatment performed upon them. This study was undertaken on a bound 16th century manuscript comprised of different types of paper and ink from the National and University Library in Zagreb. Analytical methods used included Particle Induced X-ray Emission (PIXE) and X-ray Fluorescence (XRF). Paper fibers were identified by optical microscopy and the degradation state, as well as ink differentiation, transit metal migrations and detection of stains, with ultraviolet (UV) and infrared (IR) photography. The techniques applied on original writing materials gave important information about paper and ink composition, its preservation state and efficiency of conservation treatment performed upon them.

  16. Silencing Agrobacterium oncogenes in transgenic grapevine results in strain-specific crown gall resistance.

    Science.gov (United States)

    Galambos, A; Zok, A; Kuczmog, A; Oláh, R; Putnoky, P; Ream, W; Szegedi, E

    2013-11-01

    Grapevine rootstock transformed with an Agrobacterium oncogene-silencing transgene was resistant to certain Agrobacterium strains but sensitive to others. Thus, genetic diversity of Agrobacterium oncogenes may limit engineering crown gall resistance. Crown gall disease of grapevine induced by Agrobacterium vitis or Agrobacterium tumefaciens causes serious economic losses in viticulture. To establish crown gall-resistant lines, somatic proembryos of Vitis berlandieri × V. rupestris cv. 'Richter 110' rootstock were transformed with an oncogene-silencing transgene based on iaaM and ipt oncogene sequences from octopine-type, tumor-inducing (Ti) plasmid pTiA6. Twenty-one transgenic lines were selected, and their transgenic nature was confirmed by polymerase chain reaction (PCR). These lines were inoculated with two A. tumefaciens and three A. vitis strains. Eight lines showed resistance to octopine-type A. tumefaciens A348. Resistance correlated with the expression of the silencing genes. However, oncogene silencing was mostly sequence specific because these lines did not abolish tumorigenesis by A. vitis strains or nopaline-type A. tumefaciens C58.

  17. Dehydration, rehydration and overhydration alter patterns of gene expression in the Antarctic midge, Belgica antarctica

    Science.gov (United States)

    We investigated molecular responses elicited by three types of dehydration (fast, slow and cryoprotective), rehydration and overhydration in larvae of the Antarctic midge, Belgica antarctica. The larvae spend most the year encased in ice but during the austral summer are vulnerable to summer storms,...

  18. Population Dynamics of Native Parasitoids Associated with the Asian Chestnut Gall Wasp (Dryocosmus kuriphilus in Italy

    Directory of Open Access Journals (Sweden)

    Tiziana Panzavolta

    2018-01-01

    Full Text Available Native parasitoids may play an important role in biological control. They may either support or hinder the effectiveness of introduced nonnative parasitoids released for pest control purposes. Results of a three-year survey (2011–2013 of the Asian chestnut gall wasp (ACGW Dryocosmus kuriphilus Yasumatsu (Hymenoptera: Cynipidae populations and on parasitism rates by native indigenous parasitoids (a complex of chalcidoid hymenopterans in Italian chestnut forests are given. Changes in D. kuriphilus gall size and phenology were observed through the three years of study. A total of 13 species of native parasitoids were recorded, accounting for fluctuating parasitism rates. This variability in parasitism rates over the three years was mainly due to the effect of Torymus flavipes (Walker (Hymenoptera: Torymidae, which in 2011 accounted for 75% of all parasitoid specimens yet decreased drastically in the following years. This strong fluctuation may be related to climatic conditions. Besides, our data verified that parasitoids do not choose host galls based on their size, though when they do parasitize smaller ones, they exploit them better. Consequently, ACGWs have higher chances of surviving parasitism if they are inside larger galls.

  19. Anatomical and phenological implications of the relationship between Schinus polygama (Cav.) (Cabrera) and the galling insect Calophya rubra (Blanchard).

    Science.gov (United States)

    Guedes, L M; Aguilera, N; Ferreira, B G; Becerra, J; Hernández, V; Isaias, R M S

    2018-05-01

    The success of galling insects could be determined by synchronisation with host plant phenology and climate conditions, ensuring suitable oviposition sites for gall induction and food resources for their survival. The anatomical, histochemical and phenological synchronisation strategies between Calophya rubra (Blanchard) (Hemiptera: Psylloidea) and its host, the evergreen plant Schinus polygama (Cav.) (Cabrera) (Anacardiaceae), in the Mediterranean climate of southern Chile was evaluated and compared to that of the congeneric C. cf. duvauae (Scott) from Brazil and closely related host plant S. engleri in a subtropical climate. Anatomical, histometric, histochemical and vegetative phenology studies of the stem and galls were conducted from June 2015 to December 2016. Based on the anatomical, histometric and histochemical analysis, the conical stem gall traits imply gains over the non-galled stem toward the galling insect survival, but the maintenance of phellem, secretory ducts and pith indicate conservative developmental traits that cannot be manipulated by C. rubra. Our results indicate that the conditions of the Mediterranean climate zone limit C. rubra immature activity during unfavourable periods, probably determining a diapause period and a univoltine life cycle, which are peculiarities of the S. polygama- C. rubra system. The synchronisation between development and seasonality confers peculiarities to the S. polygama- C. rubra system in the Mediterranean climate zone. © 2018 German Society for Plant Sciences and The Royal Botanical Society of the Netherlands.

  20. Diverse filters to sense: great variability of antennal morphology and sensillar equipment in gall-wasps (Hymenoptera: Cynipidae.

    Directory of Open Access Journals (Sweden)

    Carlo Polidori

    Full Text Available Comparative studies on antennal sensillar equipment in insects are largely lacking, despite their potential to provide insights into both ecological and phylogenetic relationships. Here we present the first comparative study on antennal morphology and sensillar equipment in female Cynipoidea (Hymenoptera, a large and diverse group of wasps, with special reference to the so-called gall-wasps (Cynipidae. A SEM analysis was conducted on 51 species from all extant cynipoid families and all cynipid tribes, and spanning all known life-histories in the superfamily (gall-inducers, gall-inquilines, and non-gall associated parasitoids. The generally filiform, rarely clavate, antennal flagellum of Cynipoidea harbours overall 12 types of sensilla: s. placoidea (SP, two types of s. coeloconica (SCo-A, SCo-B, s. campaniformia (SCa, s. basiconica (SB, five types of s. trichoidea (ST-A, B, C, D, E, large disc sensilla (LDS and large volcano sensilla (LVS. We found a great variability in sensillar equipment both among and within lineages. However, few traits seem to be unique to specific cynipid tribes. Paraulacini are, for example, distinctive in having apical LVS; Pediaspidini are unique in having ≥3 rows of SP, each including 6-8 sensilla per flagellomere, and up to 7 SCo-A in a single flagellomere; Eschatocerini have by far the largest SCo-A. Overall, our data preliminarily suggest a tendency to decreased numbers of SP rows per flagellomere and increased relative size of SCo-A during cynipoid evolution. Furthermore, SCo-A size seems to be higher in species inducing galls in trees than in those inducing galls in herbs. On the other hand, ST seem to be more abundant on the antennae of herb-gallers than wood-gallers. The antennal morphology and sensillar equipment in Cynipoidea are the complex results of different interacting pressures that need further investigations to be clarified.

  1. Insect-induced effects on plants and possible effectors used by galling and leaf-mining insects to manipulate their host-plant.

    Science.gov (United States)

    Giron, David; Huguet, Elisabeth; Stone, Graham N; Body, Mélanie

    2016-01-01

    Gall-inducing insects are iconic examples in the manipulation and reprogramming of plant development, inducing spectacular morphological and physiological changes of host-plant tissues within which the insect feeds and grows. Despite decades of research, effectors involved in gall induction and basic mechanisms of gall formation remain unknown. Recent research suggests that some aspects of the plant manipulation shown by gall-inducers may be shared with other insect herbivorous life histories. Here, we illustrate similarities and contrasts by reviewing current knowledge of metabolic and morphological effects induced on plants by gall-inducing and leaf-mining insects, and ask whether leaf-miners can also be considered to be plant reprogrammers. We review key plant functions targeted by various plant reprogrammers, including plant-manipulating insects and nematodes, and functionally characterize insect herbivore-derived effectors to provide a broader understanding of possible mechanisms used in host-plant manipulation. Consequences of plant reprogramming in terms of ecology, coevolution and diversification of plant-manipulating insects are also discussed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. New records of non-biting midges (Diptera: Chironomidae, Orthocladiinae from Mallorca, Spain

    Directory of Open Access Journals (Sweden)

    Viktor Baranov

    2016-09-01

    Full Text Available Ten species of non-biting midges belonging to the subfamily Orthocladiinae were found in samples from predominantly madicolous habitats in Mallorca, Spain. One species, Bryophaenocladius nidorum (Edwards, 1929, has not previously been recorded from Spain, while Smittia pratorum (Goetghebuer, 1927, Bryophaenocladius inconstans (Brundin, 1947, Orthocladius (O. maius Goetghebuer, 1942, Paracladius conversus (Walker, 1856 and Paraphaenocladius impensus (Walker, 1856 are recorded for the first time from the Balearic Islands.

  3. The mono - and sesquiterpene content of aphid-induced galls on Pistacia palaestina is not a simple reflection of their composition in intact leaves.

    Science.gov (United States)

    Rand, Karin; Bar, Einat; Ben-Ari, Matan; Lewinsohn, Efraim; Inbar, Moshe

    2014-06-01

    Pistacia palaestina Boiss. (Anacardiaceae), a sibling species of P. terebinthus also known as turpentine tree or terebinth tree, is common in the Levant region. The aphid Baizongia pistaciae L. manipulates the leaves of the plant to form large galls, which provide both food and protection for its developing offspring. We analyzed the levels and composition of mono-and sesquiterpenes in both leaves and galls of ten naturally growing trees. Our results show that monoterpene hydrocarbons are the main constituents of P. palaestina leaves and galls, but terpene levels and composition vary among trees. Despite this inter-tree variation, terpene levels and compositions in galls from different trees resemble each other more than the patterns displayed by leaves from the same trees. Generally, galls contain 10 to 60 fold higher total terpene amounts than leaves, especially of the monoterpenes α-pinene and limonene. Conversely, the leaves generally accumulate more sesquiterpenes, in particular E-caryophyllene, germacrene D and δ-cadinene, in comparison to galls. Our results clearly show that the terpene pattern in the galls is not a simple reflection of that of the leaves and suggest that aphids have a strong impact on the metabolism of their host plant, possibly for their own defense.

  4. Franz Joseph Gall and music: The faculty and the bump

    NARCIS (Netherlands)

    Eling, P.A.T.M.; Finger, S.; Whitaker, H.A.

    2015-01-01

    The traditional story maintains that Franz Joseph Gall's (1758-1828) scientific program began with his observations of schoolmates with bulging eyes and good verbal memories. But his search to understand human nature, in particular individual differences in capacities, passions, and tendencies, can

  5. Molecular identification of bloodmeals from biting midges (Diptera: Ceratopogonidae; Culicoides Latreille) in Denmark

    DEFF Research Database (Denmark)

    Lassen, Sandra Boline; Nielsen, Søren A; Skovgård, Henrik

    2011-01-01

    engorged biting midges, and hosts were identified in 115 of 125 analysed specimens (90%). Cow, roe deer, horse, mallard and wood pigeon were identified as hosts. The most abundant host species was cow, which constituted 73.9% of the total identified bloodmeals, but the common wood pigeon was found...

  6. ultrasound mis-diagnosis of biliary sludge as a gall bladder

    African Journals Online (AJOL)

    drclement

    SUMMARY. Background: Cholecystosonography is the Ultrasound examination of the gall bladder and ducts. It has the advantage of not using ionising radiation, but may be operator dependent. Thus misinterpretation of the images may sometimes occur especially in the untrained hands. Case Report: A 24 year old male.

  7. Morphological abnormalities in gall-forming aphids in a radiation-contaminated area near Fukushima Daiichi: selective impact of fallout?

    Science.gov (United States)

    Akimoto, Shin-ichi

    2014-01-01

    To evaluate the impact of fallout from the Fukushima Daiichi Nuclear Power Plant accident on organisms, this study compared the morphology and viability of gall-forming aphids between the Fukushima population and control populations from noncontaminated areas. This study, in particular, focused on the morphology of first-instar gall formers derived from the first sexual reproduction after the accident. Of 164 first instars from Tetraneura sorini galls collected 32 km from Fukushima Daiichi in spring 2012, 13.2% exhibited morphological abnormalities, including four conspicuously malformed individuals (2.4%). In contrast, in seven control areas, first instars with abnormal morphology accounted for 0.0–5.1% (on average, 3.8%). The proportions of abnormalities and mortality were significantly higher in Fukushima than in the control areas. Similarly, of 134 first instars from T. nigriabdominalis galls, 5.9% exhibited morphological abnormalities, with one highly malformed individual. However, of 543 second-generation larvae produced in T. sorini galls, only 0.37% had abnormalities, suggesting that abnormalities found in the first generation were not inherited by the next generation. Although investigation is limited to one study site, this result suggests that radioactive contamination had deleterious effects on embryogenesis in eggs deposited on the bark surface, but a negligible influence on the second generation produced in closed galls. Furthermore, analysis of both species samples collected in spring 2013 indicated that the viability and healthiness of the aphids were significantly improved compared to those in the 2012 samples. Thus, the results of this study suggest the possibility that a reduced level of radiation and/or selection for radiation tolerance may have led to the improved viability and healthiness of the Fukushima population. PMID:24634721

  8. Life inside a gall: closeness does not favour horizontal transmission of Rickettsia between a gall wasp and its parasitoid.

    Science.gov (United States)

    Gualtieri, Liberata; Nugnes, Francesco; Nappo, Anna G; Gebiola, Marco; Bernardo, Umberto

    2017-07-01

    The incidence of horizontal transmission as a route for spreading symbiont infections is still being debated, but a common view is that horizontal transfers require intimate between-species relationships. Here we study a system that meets ideal requirements for horizontal transmission: the gall wasp Leptocybe invasa and its parasitoid Quadrastichus mendeli (Hymenoptera: Eulophidae). These wasps belong to the same subfamily, spend most of their lives inside the same minute gall and are both infected by Rickettsia, a maternally inherited endosymbiotic bacteria that infects several arthropods, sometimes manipulating their reproduction, like inducing thelytokous parthenogenesis in L. invasa. Despite intimate contact, close phylogenetic relationship and the parasitoid's host specificity, we show that host and parasitoid do not share the same Rickettsia. We provide indirect evidence that Rickettsia infecting Q. mendeli may be inducing thelytokous parthenogenesis, as the symbiont is densely present in the reproductive apparatus and is vertically transmitted. Phylogenetic analyses based on 16S and gltA placed this symbiont in the leech group. The confirmed and presumed parthenogenesis-inducing Rickettsia discovered so far only infect eulophid wasps, and belong to three different groups, suggesting multiple independent evolution of the parthenogenesis inducing phenotype. We also show some degree of cospeciation between Rickettsia and their eulophid hosts. © FEMS 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  9. Variations in the Spatial Distribution of Gall Bladder Cancer: A Call ...

    African Journals Online (AJOL)

    adjusted incidence rates (AAR) of certain cancers in specific geographical regions within ... which is second to the highest (Chile) in the world and AAR of carcinoma gall bladder .... Conflict of Interest: None declared. 4. Asmarian NS, Ruzitalab ...

  10. Solitary brain metastasis as an initial manifestation of gall bladder carcinoma

    Directory of Open Access Journals (Sweden)

    Kamlesh Kumar Harsh

    2015-01-01

    Full Text Available Gallbladder cancer is a common malignancy in Northern India, and it accounts for 2-4% of all malignant gastrointestinal tumors. It is an aggressive tumor with early dissemination to liver and lymph nodes and associated with poor prognosis. Systemic metastases from gall bladder carcinoma (Ca frequently occur; however, metastatic involvement of the central nervous system is rare and late manifestation and remains an ominous sign. Initial presentation of gall bladder Ca with brain metastasis is rare. We report a case of 65-year-old women who initially presented with a solitary brain metastasis from an adenocarcinoma of the gallbladder, which was diagnosed incidentally when the patient presented with headache, vomiting, and right temporal region swelling. Palliative chemotherapy and cranial radiotherapy were prescribed. She is symptom-free from 3 months after the completion of the treatment.

  11. Male gender and sonographic gall bladder wall thickness: important predictable factors for empyema and gangrene in acute cholecystitis

    International Nuclear Information System (INIS)

    Khan, M.L.U.; Jawed, M.; Shaikh, U.; Abbassi, M.R.

    2014-01-01

    Objective: To underline the status of male gender and gall bladder wall thickness as significant risk factors for acute cholecystitis complications. Methods: The retrospective study, with purposive sampling of the patients of acute cholecystits in age above 18 years, who were operated within 10 days of onset of symptoms, was conducted at the Department of Surgery, Dow University Hospital, Karachi, by reviewing the patients' medical record from March 2010 to August 2012. Correlation of incidence of acute cholecystitis complications (empyema and gangrene) to male gender and to the sonographic gall bladder wall thickness more than 4.5mm was analysed using SPSS 16. Result: Out of 62 patients, 8 (13%) patients had gangrene while 10 (16.12%) had empyema. Overall, there were 21 (33.87%) males in the study. Ten (47.6%) of the male patients developed empyema or gangrene of the gall bladder as a complication of acute cholecystitis. Of the 41 (66.12%) female patients, only 8 (19.5%) developed these complications. There were 22 (35.48%) cases of gall bladders with sonographic wall thickness more than 4.5mm who were operated for acute cholecystitis. Of them, 16 (72.7%) had empyema or gangrene. Conclusion: Male gender and sonographic gall bladder wall thickness more than 4.5mm were statistically significant risk factors for suspicion of complicated acute cholecystitis (empyema/gangrene) and by using these risk factors, we can prioritise patients for surgery in the emergency room. (author)

  12. Local and latitudinal variation in abundance: the mechanisms shaping the distribution of an ecosystem engineer.

    Science.gov (United States)

    Crutsinger, Gregory M; Gonzalez, Angélica L; Crawford, Kerri M; Sanders, Nathan J

    2013-01-01

    Ecological processes that determine the abundance of species within ecological communities vary across space and time. These scale-dependent processes are especially important when they affect key members of a community, such as ecosystem engineers that create shelter and food resources for other species. Yet, few studies have examined the suite of processes that shape the abundance of ecosystem engineers. Here, we evaluated the relative influence of temporal variation, local processes, and latitude on the abundance of an engineering insect-a rosette-galling midge, Rhopalomyia solidaginis (Diptera: Cecidomyiidae). Over a period of 3-5 years, we studied the density and size of galls across a suite of local experiments that manipulated genetic variation, soil nutrient availability, and the removal of other insects from the host plant, Solidago altissima (tall goldenrod). We also surveyed gall density within a single growing season across a 2,300 km latitudinal transect of goldenrod populations in the eastern United States. At the local scale, we found that host-plant genotypic variation was the best predictor of rosette gall density and size within a single year. We found that the removal of other insect herbivores resulted in an increase in gall density and size. The amendment of soil nutrients for four years had no effect on gall density, but galls were smaller in carbon-added plots compared to control and nitrogen additions. Finally, we observed that gall density varied several fold across years. At the biogeographic scale, we observed that the density of rosette gallers peaked at mid-latitudes. Using meta-analytic approaches, we found that the effect size of time, followed by host-plant genetic variation and latitude were the best predictors of gall density. Taken together, our study provides a unique comparison of multiple factors across different spatial and temporal scales that govern engineering insect herbivore density.

  13. Distribution of gall crabs inhabiting mushroom corals on Semporna reefs, Malaysia

    NARCIS (Netherlands)

    van der Meij, Sancia E. T.; Hoeksema, Bert W.

    Coral reef cryptofauna forms an important component of tropical marine biodiversity, consisting primarily of invertebrates dwelling in and on corals. During a survey carried out around the Semporna peninsula (Sabah, NE Borneo), the occurrence of gall crabs inhabiting mushroom corals was examined on

  14. Co-occurrence of pathogenic and non-pathogenic Fusarium decemcellulare and Lasiodiplodia theobromae isolates in cushion galls disease of cacao (Theobroma cacao L.

    Directory of Open Access Journals (Sweden)

    Castillo Daynet Sosa del

    2016-04-01

    Full Text Available Flowery cushion gall of cacao is a disease complex with six types. Fusarium decemcellulare have been isolated from both flowery and green point galls and recognized as the etiological agent of the disease. In the present work we: i identified by ITS-rDNA sequencing and/or taxonomy the cultivable fungal species or Operative Taxonomic Units (OTUs associated with the five symptoms of cushion galls in cacao from Venezuela, and ii determined the gall inducing capacity on cacao peeled seeds after 45 days of inoculation with suspensions of mycelia/ spores from distinct isolate types. The whole isolate collection rendered an abundance of 113 isolates with a richness of 39 OTUs (27 and eight identified at the species or genera levels, respectively, and in unidentified fungi. The dominant recovered species (≈36% were F. decemcellulare and Lasiodiplodia theobromae. Some isolates of F. decemcellulare, L. theobromae, F. equiseti, Fusarium spp., F. solani, F. incarnatum, Rhizocthonia solani and Penicillium sp. were pathogenic. Some other isolates of the first six mentioned taxa behave as non-pathogenic. Furthermore, pathogenic and non-pathogenic isolates can also co-occur within a single plant and gall type. Moreover, 2-5 species within a single gall symptom in a single tree were identified (not necessarily at the same point in the tree, indicating a broad diversity of co-occurring taxa.

  15. Torix group Rickettsia are widespread in Culicoides biting midges (Diptera: Ceratopogonidae), reach high frequency and carry unique genomic features.

    Science.gov (United States)

    Pilgrim, Jack; Ander, Mats; Garros, Claire; Baylis, Matthew; Hurst, Gregory D D; Siozios, Stefanos

    2017-10-01

    There is increasing interest in the heritable bacteria of invertebrate vectors of disease as they present novel targets for control initiatives. Previous studies on biting midges (Culicoides spp.), known to transmit several RNA viruses of veterinary importance, have revealed infections with the endosymbiotic bacteria, Wolbachia and Cardinium. However, rickettsial symbionts in these vectors are underexplored. Here, we present the genome of a previously uncharacterized Rickettsia endosymbiont from Culicoides newsteadi (RiCNE). This genome presents unique features potentially associated with host invasion and adaptation, including genes for the complete non-oxidative phase of the pentose phosphate pathway, and others predicted to mediate lipopolysaccharides and cell wall modification. Screening of 414 Culicoides individuals from 29 Palearctic or Afrotropical species revealed that Rickettsia represent a widespread but previously overlooked association, reaching high frequencies in midge populations and present in 38% of the species tested. Sequence typing clusters the Rickettsia within the Torix group of the genus, a group known to infect several aquatic and hematophagous taxa. FISH analysis indicated the presence of Rickettsia bacteria in ovary tissue, indicating their maternal inheritance. Given the importance of biting midges as vectors, a key area of future research is to establish the impact of this endosymbiont on vector competence. © 2017 The Authors. Environmental Microbiology published by Society for Applied Microbiology and John Wiley & Sons Ltd.

  16. Occurrence and gall characterization in a fragment of Seasonal Semideciduous Forest in Telêmaco Borba, Paraná, Brazil

    Directory of Open Access Journals (Sweden)

    Patrícia de Oliveira Santos

    2015-12-01

    Full Text Available Galls surveys in Paraná are scarce and most sampling efforts in Brazil have still been concentrated on Cerrado regions. In this context, the present study investigated an area of semideciduous forest of Fazenda Monte Alegre in Telêmaco Borba, in order to contribute to the knowledge of galls in the state. Samples were collected on a 300m long track and 5m width, through active search up to two meters high. Fourty-one morphotypes were found, thirteen of which were identified to the host plant species level, ten according to level of genus, ten to family level and eight morphotypes were not identified. Among the identified families, Solanaceae, Asteraceae, Euphorbiaceae, Bignoniaceae, Melastomataceae and Leguminosae-Fabaceae represented the greatest quantity of morphotypes. Most of them occurred on the leaf (39%, 98.6% are entomogenous. 70.7% are glabrous, and as for the shape, most of them were classified as globular (43.9%. As for the way galls grouping on host plants, 46.3% showed up in isolation, and 53.7% in groupings. This study has contributed to enrich the knowledge on galls in the state of Paraná and for the Atlantic Forest Biome.

  17. Spatial and temporal variation in the abundance of Culicoides biting midges (Diptera: Ceratopogonidae) in nine European countries

    DEFF Research Database (Denmark)

    Cuellar, Ana Carolina; Kjær, Lene Jung; Kirkeby, Carsten Thure

    2018-01-01

    Biting midges of the genus Culicoides (Diptera: Ceratopogonidae) are vectors of bluetongue virus (BTV), African horse sickness virus and Schmallenberg virus (SBV). Outbreaks of both BTV and SBV have affected large parts of Europe. The spread of these diseases depends largely on vector distributio...

  18. The cause, incidence and severity of a new gall damage on ...

    African Journals Online (AJOL)

    develop Integrated Pest Management (IPM) strategies against the new Eucalyptus pest. Key words: Alien insects, Galls. Leptocybe invasa, pest management, tree plantation. Introduction. Tree growing is important to many ... refugee settlements in Uganda to protect the environment while ensuring sustainable supply of tree ...

  19. inheritance of resistance to sesame gall midge in uganda abstract

    African Journals Online (AJOL)

    ACSS

    Ngetta Zonal Agricultural Research development Institute (ZARDI) in ... African Crop Science Journal by African Crop Science Society is licensed ..... Journal of Applied Biosciences 18:967-975. ... International Journal of Plant Breeding 7.

  20. Testing Optimal Foraging Theory Using Bird Predation on Goldenrod Galls

    Science.gov (United States)

    Yahnke, Christopher J.

    2006-01-01

    All animals must make choices regarding what foods to eat, where to eat, and how much time to spend feeding. Optimal foraging theory explains these behaviors in terms of costs and benefits. This laboratory exercise focuses on optimal foraging theory by investigating the winter feeding behavior of birds on the goldenrod gall fly by comparing…

  1. A new species of Stenodiplosis (Diptera: Cecidomyiidae) on Spartina grasses (Poaceae) with notes on its biology and its parasitoid Tetrastichus bromi (Hymenoptera: Eulophidae).

    Science.gov (United States)

    López, J Manuel Perilla; Johnson, Paul J; Gagné, Raymond J; Boe, Arvid

    2015-12-09

    Stenodiplosis spartinae Gagné new species (Diptera: Cecidomyiidae) is described from eastern South Dakota and coastal North Carolina, and compared with other American congeners. The known host plants are Spartina alterniflora and S. pectinata. The larva is a seed predator of the ovule and immature caryopsis of the host plant. Adult activity is from the early emergence of the host inflorescence through anthesis. Oviposition occurs in the floret with eggs laid under the edges of the palea and lemma. The larva apparently overwinters in dehisced spikelets in the soil among rhizomes of S. pectinata, with pupation in late spring. Laboratory emergence and field activity of the adults suggest a potentialsecond or third generation developing on late emerging inflorescences. Larval feeding does not induce external color or shape changes in the spikelet. Apparently all three instars are ectoparasitized by Tetrastichus bromi Kostyukov (Hymenoptera: Eulophidae) that was probably introduced to North America in the late 1800's and is inculcated into parasitoid guilds of several Stenodiplosis species. Resource partitioning appears to occur between the gall midge and early instars of Aethes spartinana Barnes and McDunnough (Lepidoptera: Tortricidae) that feed on maturing caryopses. The feeding of this gall midge and the moth probably account for most of the reduced seed production in both natural and agronomic populations of S. pectinata.

  2. Yeast transformation mediated by Agrobacterium strains harboring an Ri plasmid: comparative study between GALLS of an Ri plasmid and virE of a Ti plasmid.

    Science.gov (United States)

    Kiyokawa, Kazuya; Yamamoto, Shinji; Sato, Yukari; Momota, Naoto; Tanaka, Katsuyuki; Moriguchi, Kazuki; Suzuki, Katsunori

    2012-07-01

    Agrobacterium strains containing a Ti plasmid can transfer T-DNA not only to plants but also to fungi, including the yeast Saccharomyces cerevisiae. However, no Agrobacterium strain harboring an Ri plasmid has been evaluated in fungal transformation. Some Ri plasmids have GALLS , instead of virE1 and virE2. GALLS protein can functionally substitute in plant transformation for a structurally different protein VirE2. In this study, we compared the yeast transformation ability among Agrobacterium donors: a strain containing a Ti plasmid, strains harboring either an agropine-type or a mikimopine-type Ri plasmid, and a strain having a modified Ri plasmid supplemented with a Ti plasmid type virE operon. Agrobacterium strains possessing GALLS transformed yeast cells far less efficiently than the strain containing virE operon. Production of GALLS in recipient yeast cells improved the yeast transformation mediated by an Agrobacterium strain lacking neither GALLS nor virE operon. A reporter assay to detect mobilization of the proteins fused with Cre recombinase revealed that VirE2 protein is much more abundant in yeast cells than GALLS. Based on these results, we concluded that the low yeast transformability mediated by Agrobacterium strains having the Ri plasmid is because of low amount of mobilized GALLS in yeast cells. © 2012 The Authors Journal compilation © 2012 by the Molecular Biology Society of Japan/Blackwell Publishing Ltd.

  3. Exploring the utility of DNA barcoding in species delimitation of Polypedilum (Tripodura) non-biting midges (Diptera: Chironomidae).

    Science.gov (United States)

    Song, Chao; Wang, Qian; Zhang, Ruilei; Sun, Bingjiao; Wang, Xinhua

    2016-02-16

    In this study, we tested the utility of the mitochondrial gene cytochrome c oxidase subunit 1 (CO1) as the barcode region to deal with taxonomical problems of Polypedilum (Tripodura) non-biting midges (Diptera: Chironomidae). The 114 DNA barcodes representing 27 morphospecies are divided into 33 well separated clusters based on both Neighbor Joining and Maximum Likelihood methods. DNA barcodes revealed an 82% success rate in matching with morphospecies. The selected DNA barcode data support 37-64 operational taxonomic units (OTUs) based on the methods of Automatic Barcode Gap Discovery (ABGD) and Poisson Tree Process (PTP). Furthermore, a priori species based on consistent phenotypic variations were attested by molecular analysis, and a taxonomical misidentification of barcode sequences from GenBank was found. We could not observe a distinct barcode gap but an overlap ranged from 9-12%. Our results supported DNA barcoding as an ideal method to detect cryptic species, delimit sibling species, and associate different life stages in non-biting midges.

  4. Gall mite inspection on dormant black currant buds using machine vision

    DEFF Research Database (Denmark)

    Nielsen, M. R.; Stigaard Laursen, Morten; Jonassen, M. S.

    2013-01-01

    This paper presents a novel machine vision-based approach detecting and mapping gall mite infection in dormant buds on black currant bushes. A vehicle was fitted with four cameras and RTK-GPS. Results compared automatic detection to human decisions based on the images, and by mapping the results...

  5. Correlation between Copper, Zinc and some lipids in serum, bile and stones of patients with gall stone disease

    International Nuclear Information System (INIS)

    Abu-Farsakh, F.

    1997-01-01

    Measurements of Cu, Zn and some lipid concentrations were carried out in serum, bile and gall stone samples collected from 76 patients undergoing surgery for removal of gall stones. The results showed that Cu and Zn were present in micromolar concentration in bile (average Cu concentration = 13.4 ± 0.92, average Zn concentration = 13.4 ± 1.05) and gall stones (average Cu concentration = 2.8 ± 0.16, average Zn concentration = 1.8 ± 0.16 mmol/ g stone). Cross-tabulation of the results showed significant positive linear correlations (p< 0.01) between stone Zn vs. bile cholesterol (r = 0.253), stone Zn vs. bile bilirubin (r = 0.396) (in mixed stones only). This suggested that the more hydrophobic the bile sample, the more Zn co-precipitate with cholesterol or bilirubin. (author). 17 refs., 3 tabs

  6. 77 FR 21813 - Changes to the Generic Aging Lessons Learned (GALL) Report Revision 2 AMP XI.M41, “Buried and...

    Science.gov (United States)

    2012-04-11

    ... NUCLEAR REGULATORY COMMISSION [NRC-2012-0055] Changes to the Generic Aging Lessons Learned (GALL) Report Revision 2 AMP XI.M41, ``Buried and Underground Piping and Tanks'' AGENCY: Nuclear Regulatory... Guidance (LR-ISG), LR-ISG-2011-03, ``Changes to GALL Report Revision 2 Aging Management Program (AMP) XI...

  7. A new genus and species of Lasiopteridi (Diptera, Cecidomyiidae on Haplopappus foliosus (Asteraceae from Chile

    Directory of Open Access Journals (Sweden)

    Valéria Cid Maia

    Full Text Available ABSTRACT A new genus and species of gall midge, Haplopappusmyia gregaria, is described and illustrated (larva, pupa, male, and female. This species induces apical galls on Haplopappus foliosus (Asteraceae, an endemic shrub from central Chile. The specimens were collected at La Ligua Municipality, Petorca Province, Valparaiso region, Chile, during spring of 2011-2014. This area corresponds to one of the fifth Mediterranean Matorral biome, considered among Earth's biodiversity hotspots. The new genus is characterized by presenting lateral margin of antennal scape with a mesal reentrance; four-segmented palpus, one-toothed tarsal claws, R5 straight, reaching C anterior to wing apex; male seventh and eighth tergites lacking sclerotization mesally, beyond proximal margin; presence of trichoid sensilla on the abdominal terga and sterna of both sexes, protrusible ovipositor with elongate fused cerci, and larva with 4 pairs of setose terminal papillae.

  8. The investigation of preparations diluent cholestrol stones of gall-bladder and bile-ducts

    International Nuclear Information System (INIS)

    Kadirov, A.Kh.; Khaydarov, K.Kh.; Giyosov, A.Sh.

    2000-01-01

    In this chapter of book authors made conclusion that developed synthesis methods can be used at receiving new bile acids derivatives and they can find use as medical products in particular as preparations diluent gall-cholesteric stones

  9. surgery of the gall-bladder and the commo bile-duct* 1

    African Journals Online (AJOL)

    The surgical treatment of diseases of the gall-bladder consists largely of the treatment of stones and their complications. There is a voluminous literature on gallstones, but its analysis would serve little purpose in this paper. It is of greater value to analyse one's own experience, to discuss how we can diagnose lesions of.

  10. Larvae and Nests of Aculeate Hymenoptera (Hymenoptera: Aculeata) Nesting in Reed Galls Induced by Lipara spp. (Diptera: Chloropidae) with a Review of Species Recorded. Part II.

    Science.gov (United States)

    Astapenková, Alena; Heneberg, Petr; Bogusch, Petr

    2017-01-01

    The ability of aculeate Hymenoptera to utilize wetlands is poorly understood, and descriptions of their nests and developmental stages are largely absent. Here we present results based on our survey of hymenopterans using galls induced by Lipara spp. flies on common reed Phragmites australis in the years 2015-2016. We studied 20,704 galls, of which 9,446 were longitudinally cut and the brood from them reared in the laboratory, while the remaining 11,258 galls reared in rearing bags also in laboratory conditions. We recorded eight species that were previously not known to nest in reed galls: cuckoo wasps Chrysis rutilans and Trichrysis pumilionis, solitary wasps Stenodynerus chevrieranus and Stenodynerus clypeopictus, and bees Pseudoanthidium tenellum, Stelis punctulatissima, Hylaeus communis and Hylaeus confusus. Forty five species of Hymenoptera: Aculeata are known to be associated with reed galls, of which 36 make their nests there, and the other are six parasitoids of the family Chrysididae and three cuckoo bees of the genus Stelis. Of these species, Pemphredon fabricii and in southern Europe also Heriades rubicola are very common in reed galls, followed by Hylaeus pectoralis and two species of the genus Trypoxylon. We also found new host-parasite associations: Chrysis angustula in nests of Pemphredon fabricii, Chrysis rutilans in nests of Stenodynerus clypeopictus, Trichrysis pumilionis in nests of Trypoxylon deceptorium, and Stelis breviuscula in nests of Heriades rubicola. We provide new descriptions of the nests of seven species nesting in reed galls and morphology of mature larvae of eight species nesting in reed galls and two parasitoids and one nest cleptoparasite. The larvae are usually very similar to those of related species but possess characteristics that make them easy to distinguish from related species. Our results show that common reeds are not only expansive and harmful, but very important for many insect species associated with habitats

  11. Ellagitannins, gallotannins, and gallo-ellagitannins from the galls of Tamarix aphylla.

    Science.gov (United States)

    Orabi, Mohamed A A; Yoshimura, Morio; Amakura, Yoshiaki; Hatano, Tsutomu

    2015-07-01

    Chromatographic separation of an aqueous acetone extract of the galls from Tamarix aphylla using gels resulted in isolation of an ellagitannin, phyllagallin M1 (13), a gallo-ellagitannin, phyllagallin D1 (14), and four gallotannins, phyllagallin M2 (15) and phyllagallins D2-D4 (16-18), in addition to four known ellagitannins and three phenolics of lower molecular weight structurally related to hydrolyzable tannins. The structures of the six new tannins were elucidated based on spectroscopic and chemical data. Among the phenolics, flavogallonic acid dilactone (8), which is presumed to be biogenetically produced by C-C oxidative coupling of an ellagic acid unit with a galloyl residue, shows an exceptional oxidative pattern of gallic acid residues in plants of the family Tamaricaceae. Although the ellagitannin tamarixellagic acid (4) was reported to be a constituent of the galls of T. aphylla, such compounds with anomalous location of the DHDG moiety at O-3 on the glucopyranose core have not been observed among the tannins of tamaricaceous plants. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. BAY K 8644-induced oscillations in rabbit gall-bladder transepithelial potential difference

    DEFF Research Database (Denmark)

    Hansen, C P; Holstein-Rathlou, N H; Frederiksen, O

    1986-01-01

    The effects of the Ca2+-channel activator BAY K 8644 (a novel dihydropyridine) on transepithelial potential difference (Pd), electrical resistance (Rt), and unidirectional Na+-fluxes were studied in the rabbit gall-bladder. It was observed that BAY K 8644 at concentrations between 10(-7) and 10...

  13. Electronic nose as an innovative tool for the diagnosis of grapevine crown gall

    Energy Technology Data Exchange (ETDEWEB)

    Blasioli, S., E-mail: sonia.blasioli@unibo.it [Dipartimento di Scienze e Tecnologie Agroambientali, Universita di Bologna, V.le Fanin, 44, 40127 Bologna (Italy); Biondi, E., E-mail: erbiondi@tin.it [Dipartimento di Scienze e Tecnologie Agroambientali, Universita di Bologna, V.le Fanin, 44, 40127 Bologna (Italy); Braschi, I., E-mail: ilaria.braschi@unibo.it [Dipartimento di Scienze e Tecnologie Agroambientali, Universita di Bologna, V.le Fanin, 44, 40127 Bologna (Italy); Mazzucchi, U., E-mail: umberto.mazzucchi@unibo.it [Dipartimento di Scienze e Tecnologie Agroambientali, Universita di Bologna, V.le Fanin, 44, 40127 Bologna (Italy); Bazzi, C., E-mail: carlo.bazzi@unibo.it [Dipartimento di Scienze e Tecnologie Agroambientali, Universita di Bologna, V.le Fanin, 44, 40127 Bologna (Italy); Gessa, C.E., E-mail: carloemanuele.gessa@unibo.it [Dipartimento di Scienze e Tecnologie Agroambientali, Universita di Bologna, V.le Fanin, 44, 40127 Bologna (Italy)

    2010-07-05

    For the first time, a portable electronic nose was used to discriminate between healthy and galled grapevines, experimentally inoculated with two tumourigenic strains of Agrobacterium vitis. The volatile profile of target cutting samples was analysed by headspace solid phase microextraction coupled with gas chromatography-mass spectrometry. Spectra from tumoured samples revealed the presence of styrene which is compatible with decarboxylation of cinnamic acid involved in secondary metabolism of plants. Principal Component Analysis confirmed the difference in volatile profiles of infected vines and their healthy controls. Linear Discriminant Analysis allowed the correct discrimination between healthy and galled grapevines (83.3%, cross-validation). Although a larger number of samples should be analysed to create a more robust model, our results give novel interesting clues to go further with research on the diagnostic potential of this innovative system associated with multi-dimensional chemometric techniques.

  14. Forest insects and diseases in Fundy National Park in 1992. Technical note No. 276. Annual publication

    Energy Technology Data Exchange (ETDEWEB)

    Cormier, J.R.; McPhee, D.A.

    1993-01-01

    Personnel of the Forest Insect and Disease Survey regularly survey national parks for forest insect and disease conditions. This document discusses briefly some of the conditions encountered in Fundy National Park in 1992, including insects and diseases found throughout the Park that are likely to recur: Balsam gall midge, balsam twig aphid, birch casebearer, gypsy moth, porcupines, sirococcus shoot blight, white pine weevil, whitespotted sawyer beetle, yellowheaded spruce sawfly, leaf blister of yellow birch, snow damage, yellow witches' broom of balsam fir, and fall webworm.

  15. Testing the Role of Habitat Isolation among Ecologically Divergent Gall Wasp Populations

    Directory of Open Access Journals (Sweden)

    Scott P. Egan

    2012-01-01

    Full Text Available Habitat isolation occurs when habitat preferences lower the probability of mating between individuals associated with differing habitats. While a potential barrier to gene flow during ecological speciation, the effect of habitat isolation on reproductive isolation has rarely been directly tested. Herein, we first estimated habitat preference for each of six populations of the gall wasp Belonocnema treatae inhabiting either Quercus virginiana or Q. geminata. We then estimated the importance of habitat isolation in generating reproductive isolation between B. treatae populations that were host specific to either Q. virginiana or Q. geminata by measuring mate preference in the presence and absence of the respective host plants. All populations exhibited host preference for their native plant, and assortative mating increased significantly in the presence of the respective host plants. This host-plant-mediated assortative mating demonstrates that habitat isolation likely plays an important role in promoting reproductive isolation among populations of this host-specific gall former.

  16. Migration Monitoring of Blackcurrant Gall Mite (Cecidophyopsis ribis Westw. from Buds to Leaves on Several Blackcurrant (Ribes nigrum L. Cultivars

    Directory of Open Access Journals (Sweden)

    Piotrowski Wojciech

    2016-12-01

    Full Text Available The blackcurrant gall mite (Cecidophyopsis ribis is the most important pest of blackcurrant crops. Over recent years withdrawal from plant protection programmes of chemical products (endosulfan and amitraz used for the control of this pest in Poland, has led to an observed increase in population numbers. In 2013, fenpiroxymate (Ortus 05 SC became registered for control of this pest. It is deemed best that chemical protection should be used during the migration period; when big gall mites emerge from buds in search of new buds. The studies were carried out in a plantation of blackcurrants during 2011-2013. The assessment of migration of the blackcurrant gall mite was carried out on the cultivars ‘Ben Hope’, ‘Ben Alde’r, ‘Ojeby’n and ‘Ruben’. Every year, from selected cultivars buds were collected. They were then placed on blackcurrant leaves within Petri dishes. After one, three and five days of placing buds on the leaves, the estimated number of eriophyid mites on the leaves was calculated. The data has shown a very useful method for monitoring blackcurrant gall mite, which can be used in calculating the treatment dates for this pest. Also, the data has shown that differences in the periods of migration of the mite are dependent on the cultivar and time of flowering. Among the cultivars observed the least susceptible to colonization by the blackcurrant gall mite was a Polish cultivar ‘Ruben’, while the most susceptible cultivar was ‘Ben Hope’.

  17. ERGO Jazz Session võõrustab Chris Gall Triot. Vennad Urbid ajakohaste lauludega

    Index Scriptorium Estoniae

    2008-01-01

    14. septembril alustab Jazzkaar koostöös ERGO Kindlustusega uut sarja ERGO Jazz Session, mille avaesinejaks on Chris Gall Trio (kontserdid 14. sept.Kumu auditooriumis ja 15. sept. Tartus Athena keskuses). Vendade Urbide kontserdist "Aeg" 13. sept. Vanemuise kontserdimajas

  18. Biting rates and developmental substrates for biting midges (Diptera: Ceratopogonidae) in Iquitos, Peru.

    Science.gov (United States)

    Mercer, David R; Spinelli, Gustavo R; Watts, Douglas M; Tesh, Robert B

    2003-11-01

    Biting midges (Diptera: Ceratopogonidae) were collected at 16 periurban and rural sites around Iquitos, Peru, between 17 October 1996 and 26 May 1997. Culicoides paraensis (Goeldi), the principal vector of Oropouche virus, was the most commonly collected species (9,086 flies) with Culicoides insinuatus Wirth & Blanton second (7,229 flies). Although both species were collected at all sampling sites (linear (distance surveyed approximately 25 km), C. paraensis dominated at northern collection sites (> 90%), whereas C. insinuatus prevailed at southern collection sites (> 60%). C. paraensis were collected from human sentinels at a constant rate throughout daylight hours, at similar rates during wet and dry months, and regardless of rainfall. Larval developmental substrates for C. paraensis included decaying platano (Musa x paradisiaca L. [Musaceae]) stems, stumps, flowers, fruits, and debris beneath platano trees as well as from soil beneath a fruiting mamay (Syzygium malaccense Merr. & Perry [Myrtaceae] ) tree and organic-rich mud along a lake shoreline. C. insinuatus adults likewise emerged from decaying platano and organic-rich mud along a lake shoreline, but also from debris accumulated in the axils of aguaje (Mauritia flexuosa L. [Palmae]) fronds and decaying citrus fruit. Despite high numbers of biting adults near putative substrates, adults of neither species emerged from other decomposing plant material, soil, phytotelmata, or artificial containers. Because both species of biting midges emerged in high numbers from all parts of platano (ubiquitous in Iquitos), it will be challenging to control them through sanitation.

  19. Chironomid midges (Diptera, chironomidae) show extremely small genome sizes.

    Science.gov (United States)

    Cornette, Richard; Gusev, Oleg; Nakahara, Yuichi; Shimura, Sachiko; Kikawada, Takahiro; Okuda, Takashi

    2015-06-01

    Chironomid midges (Diptera; Chironomidae) are found in various environments from the high Arctic to the Antarctic, including temperate and tropical regions. In many freshwater habitats, members of this family are among the most abundant invertebrates. In the present study, the genome sizes of 25 chironomid species were determined by flow cytometry and the resulting C-values ranged from 0.07 to 0.20 pg DNA (i.e. from about 68 to 195 Mbp). These genome sizes were uniformly very small and included, to our knowledge, the smallest genome sizes recorded to date among insects. Small proportion of transposable elements and short intron sizes were suggested to contribute to the reduction of genome sizes in chironomids. We discuss about the possible developmental and physiological advantages of having a small genome size and about putative implications for the ecological success of the family Chironomidae.

  20. The effect of high frequency sound on Culicoides numbers collected with suction light traps

    Directory of Open Access Journals (Sweden)

    Gert J. Venter

    2012-04-01

    Full Text Available Culicoides midges (Diptera: Ceratopogonidae, are involved in the transmission of various pathogens that cause important diseases of livestock worldwide. The use of insect repellents to reduce the attack rate of these insects on livestock could play an important role as part of an integrated control programme against diseases transmitted by these midges. The objective of this study was to determine whether high frequency sound has any repellent effect on Culicoides midges. The number of midges collected with 220 V Onderstepoort white light traps fitted with electronic mosquito repellents (EMRs, emitting 5-20 KHz multi-frequency sound waves, was compared with that of two untreated traps. Treatments were rotated in two replicates of a 4 x 4 randomised Latin square design. Although fewer midges were collected in the two traps fitted with EMRs, the average number collected over eight consecutive nights was not significantly different. The EMRs also had no influence on any of the physiological groups of Culicoides imicola Kieffer or the species composition of the Culicoides population as determined with light traps. The results indicate that high frequency sound has no repellent effect on Culicoides midges. There is therefore no evidence to support their promotion or use in the protection of animals against pathogens transmitted by Culicoides midges.

  1. Bringing gay and lesbian activism to the White House: Midge Costanza and the National Gay Task Force Meeting.

    Science.gov (United States)

    Mattingly, Doreen J; Boyd, Ashley

    2013-01-01

    In March 1977, President Carter's Assistant Margaret "Midge" Costanza made history by meeting with representatives from the National Gay Task Force (NGTF) to hear their grievances about discriminatory federal policies. The effects of the meeting were many, including changes in policies of the Bureau of Prisons and the Public Health Service. It also initiated policy discussions that would continue for decades and contributed to the incorporation of gay rights within the Democratic Party. Midge Costanza was fundamental to the process. It was her decision to hold the meeting and to advocate on behalf of the NGTF, and she bore many of the meeting's political costs. In this article we make use of Costanza's own papers and multiple interviews with her to closely analyze Costanza's role in the historic meeting. In addition to adding detail to its politics and policy impacts of the meeting, we also look at her complex motivations for holding such a controversial meeting. Costanza maintained until her death in 2010 that she was motivated by her feminism and overall commitment to social justice, rather than her own identity or experiences.

  2. A new species of Procontarinia (Diptera: Cecidomyiidae) damaging fruit of mango, Mangifera indica (Anacardiaceae), in China.

    Science.gov (United States)

    Jiao, Ke-Long; Wang, Hao; Wei, De-Wei; Mo, Jian-You; Wang, Yuan-Hong; Bu, Wen-Jun; Kolesik, Peter

    2018-04-23

    Larvae of a previously unknown species of gall midge were found feeding on young fruit of mango, Mangifera indica (Anacardiaceae), in Guangxi Autonomous Region in southern China, causing severe damage to the crop. The new species is named Procontarinia fructiculi Jiao, Wang, Bu Kolesik, its morphology is described, the basic biology is given, and the Cytochrome Oxidase subunit I (COI) mitochondrial gene segment is sequenced and compared to other congeners. Procontarinia contains now 16 described species, each feeding on mango. All but three species cause variously shaped galls on leaves, while P. mangiferae (Felt) malforms inflorescence and young leaves, and two species feed on fruit - P. frugivora Gagné causing deep lesions and P. fructiculi sp. nov. tunnel-like holes. Of the two fruit-feeding species, P. frugivora is confined to the Philippines while the new species has thus far been recorded only from southern China.

  3. The demonstration of gall stones by sonography and radiography

    International Nuclear Information System (INIS)

    Gladisch, R.; Deininger, H.K.; Staedtische Kliniken Darmstadt

    1983-01-01

    Eighty-seven unselected gall stones were examined radiologically and by ultrasound in vitro. No relationship of diagnostic value could be established between the amount of calcification and stone demonstration, the sonogram being influenced by the size of the stone, its surface contour and its position in the ultrasound beam. Sonography is therefore not suitable for selecting those patients on whom litholysis could be carried out. Sonography appears to be useful only in a negative way by establishing the exact size of the concretion. (orig.) [de

  4. Spontaneous Perforation of Common Bile Duct: A Rare Presentation of Gall Stones Disease

    Directory of Open Access Journals (Sweden)

    Duminda Subasinghe

    2016-01-01

    Full Text Available Background. Spontaneous perforation of the extrahepatic biliary system is a rare presentation of gall stones. Very few cases of bile duct perforation have been reported in adults. It is rarely suspected or correctly diagnosed preoperatively. Case Presentation. A 66-year-old female presented at the surgical emergency with 3 days’ history of severe upper abdominal pain with distension and repeated episodes of vomiting, as she had evidence of generalized peritonitis and underwent an exploratory laparotomy. A single 0.5 cm × 0.5 cm free perforation was present on the anterolateral surface of the common bile duct at the junction of cystic duct. A cholecystectomy and the CBD exploration were performed. Conclusion. Spontaneous perforation of the extrahepatic bile duct is a rare but important presentation of gall stones in adults. Therefore, awareness of the clinical presentation, expert ultrasound examination, and surgery are important aspects in the management.

  5. Effects of exposure to azaarenes on emergence and mouthpart development in the midge Chironomus riparius (Diptera: Chironomidae)

    Energy Technology Data Exchange (ETDEWEB)

    Bleeker, E.A.J.; Leslie, H.A.; Groenendijk, D.; Plans, M.; Admiraal, W.

    1999-08-01

    Adverse effects of azaarenes on emergence and mouthpart development of the midge Chironomus riparius were analyzed using six closely related three-ringed isomers and metabolites. Effects on growth rate were examined by comparing the average day of emergence of exposed midges with that of controls. Fluctuating asymmetry (FA) in the pecten epipharyngis was examined as a measure of developmental abnormality. Delayed emergence was found at concentrations as low as 2% of the acute LC50, so emergence day appears to be a useful sensitive parameter to quantity life cycle effects. No differences in FA were found between exposed and control larvae, although, in other studies, all compounds have been proven to be genotoxic. The differences in FA were found between exposed and control larvae, although, in other studies, all compounds have been proven to be genotoxic. The differences in the genotoxic and FA-inducing properties of these compounds indicate that different mechanisms are involved in expressing these adverse effects. This study also illustrates that the choice of the morphological parameter strongly influences the results of developmental disturbance analyses and thus the risk qualification of a potentially hazardous compound.

  6. Host Genetics and Environment Drive Divergent Responses of Two Resource Sharing Gall-Formers on Norway Spruce: A Common Garden Analysis.

    Science.gov (United States)

    Axelsson, E Petter; Iason, Glenn R; Julkunen-Tiitto, Riitta; Whitham, Thomas G

    2015-01-01

    A central issue in the field of community genetics is the expectation that trait variation among genotypes play a defining role in structuring associated species and in forming community phenotypes. Quantifying the existence of such community phenotypes in two common garden environments also has important consequences for our understanding of gene-by-environment interactions at the community level. The existence of community phenotypes has not been evaluated in the crowns of boreal forest trees. In this study we address the influence of tree genetics on needle chemistry and genetic x environment interactions on two gall-inducing adelgid aphids (Adelges spp. and Sacchiphantes spp.) that share the same elongating bud/shoot niche. We examine the hypothesis that the canopies of different genotypes of Norway spruce (Picea abies L.) support different community phenotypes. Three patterns emerged. First, the two gallers show clear differences in their response to host genetics and environment. Whereas genetics significantly affected the abundance of Adelges spp. galls, Sacchiphantes spp. was predominately affected by the environment suggesting that the genetic influence is stronger in Adelges spp. Second, the among family variation in genetically controlled resistance was large, i.e. fullsib families differed as much as 10 fold in susceptibility towards Adelges spp. (0.57 to 6.2 galls/branch). Also, the distribution of chemical profiles was continuous, showing both overlap as well as examples of significant differences among fullsib families. Third, despite the predicted effects of host chemistry on galls, principal component analyses using 31 different phenolic substances showed only limited association with galls and a similarity test showed that trees with similar phenolic chemical characteristics, did not host more similar communities of gallers. Nonetheless, the large genetic variation in trait expression and clear differences in how community members respond to host

  7. Host Genetics and Environment Drive Divergent Responses of Two Resource Sharing Gall-Formers on Norway Spruce: A Common Garden Analysis.

    Directory of Open Access Journals (Sweden)

    E Petter Axelsson

    Full Text Available A central issue in the field of community genetics is the expectation that trait variation among genotypes play a defining role in structuring associated species and in forming community phenotypes. Quantifying the existence of such community phenotypes in two common garden environments also has important consequences for our understanding of gene-by-environment interactions at the community level. The existence of community phenotypes has not been evaluated in the crowns of boreal forest trees. In this study we address the influence of tree genetics on needle chemistry and genetic x environment interactions on two gall-inducing adelgid aphids (Adelges spp. and Sacchiphantes spp. that share the same elongating bud/shoot niche. We examine the hypothesis that the canopies of different genotypes of Norway spruce (Picea abies L. support different community phenotypes. Three patterns emerged. First, the two gallers show clear differences in their response to host genetics and environment. Whereas genetics significantly affected the abundance of Adelges spp. galls, Sacchiphantes spp. was predominately affected by the environment suggesting that the genetic influence is stronger in Adelges spp. Second, the among family variation in genetically controlled resistance was large, i.e. fullsib families differed as much as 10 fold in susceptibility towards Adelges spp. (0.57 to 6.2 galls/branch. Also, the distribution of chemical profiles was continuous, showing both overlap as well as examples of significant differences among fullsib families. Third, despite the predicted effects of host chemistry on galls, principal component analyses using 31 different phenolic substances showed only limited association with galls and a similarity test showed that trees with similar phenolic chemical characteristics, did not host more similar communities of gallers. Nonetheless, the large genetic variation in trait expression and clear differences in how community members

  8. Characterization of Viral Communities of Biting Midges and Identification of Novel Thogotovirus Species and Rhabdovirus Genus

    Directory of Open Access Journals (Sweden)

    Sarah Temmam

    2016-03-01

    Full Text Available More than two thirds of emerging viruses are of zoonotic origin, and among them RNA viruses represent the majority. Ceratopogonidae (genus Culicoides are well-known vectors of several viruses responsible for epizooties (bluetongue, epizootic haemorrhagic disease, etc.. They are also vectors of the only known virus infecting humans: the Oropouche virus. Female midges usually feed on a variety of hosts, leading to possible transmission of emerging viruses from animals to humans. In this context, we report here the analysis of RNA viral communities of Senegalese biting midges using next-generation sequencing techniques as a preliminary step toward the identification of potential viral biohazards. Sequencing of the RNA virome of three pools of Culicoides revealed the presence of a significant diversity of viruses infecting plants, insects and mammals. Several novel viruses were detected, including a novel Thogotovirus species, related but genetically distant from previously described tick-borne thogotoviruses. Novel rhabdoviruses were also detected, possibly constituting a novel Rhabdoviridae genus, and putatively restricted to insects. Sequences related to the major viruses transmitted by Culicoides, i.e., African horse sickness, bluetongue and epizootic haemorrhagic disease viruses were also detected. This study highlights the interest in monitoring the emergence and circulation of zoonoses and epizooties using their arthropod vectors.

  9. Characterization of Viral Communities of Biting Midges and Identification of Novel Thogotovirus Species and Rhabdovirus Genus

    Science.gov (United States)

    Temmam, Sarah; Monteil-Bouchard, Sonia; Robert, Catherine; Baudoin, Jean-Pierre; Sambou, Masse; Aubadie-Ladrix, Maxence; Labas, Noémie; Raoult, Didier; Mediannikov, Oleg; Desnues, Christelle

    2016-01-01

    More than two thirds of emerging viruses are of zoonotic origin, and among them RNA viruses represent the majority. Ceratopogonidae (genus Culicoides) are well-known vectors of several viruses responsible for epizooties (bluetongue, epizootic haemorrhagic disease, etc.). They are also vectors of the only known virus infecting humans: the Oropouche virus. Female midges usually feed on a variety of hosts, leading to possible transmission of emerging viruses from animals to humans. In this context, we report here the analysis of RNA viral communities of Senegalese biting midges using next-generation sequencing techniques as a preliminary step toward the identification of potential viral biohazards. Sequencing of the RNA virome of three pools of Culicoides revealed the presence of a significant diversity of viruses infecting plants, insects and mammals. Several novel viruses were detected, including a novel Thogotovirus species, related but genetically distant from previously described tick-borne thogotoviruses. Novel rhabdoviruses were also detected, possibly constituting a novel Rhabdoviridae genus, and putatively restricted to insects. Sequences related to the major viruses transmitted by Culicoides, i.e., African horse sickness, bluetongue and epizootic haemorrhagic disease viruses were also detected. This study highlights the interest in monitoring the emergence and circulation of zoonoses and epizooties using their arthropod vectors. PMID:26978389

  10. Contrast media in gall bladder diagnostics

    International Nuclear Information System (INIS)

    Schindler, G.; Frommhold, W.

    1982-01-01

    The justification of conventional X-ray diagnostic of bile ducts is repeatedly questioned by newer examination techniques like sonography and ERC. The indication for oral cholesgraphy is derived from its high-specifity of its statements for gall bladder diagnostic, that is as high as with sonography and does not depend on the experience of the investigator. The importance of the the void exposure is undoubted with correspondence of medicamentary litholysis for calcite identification. Furthermore, Choleocystic kineticals like Ceruletid let recognize better hyper plastic choleocysts like adenomyomatoses. The intravenous choleocyst-cholangiography posesses a clearly limited indication scheme even after introduction of sonography and ERC. The infusion method yields a better compatibility of the contrast medium with a simultaneous increased representation quality of the bile duct, that can be increased by a consequent application of the layer exposure technique. (orig.) [de

  11. Can sonography define the chemical composition of gall stones

    International Nuclear Information System (INIS)

    Frentzel-Beyme, B.; Faehndrich, R.; Arnan-Thiele, B.

    1983-01-01

    Eight sonographic patterns caused by gall stones are described. In an attempt to explain these different appearances, 62 stones were analysed chemically and physically. The chemical composition of the stones did not correlate with their sonographic pattern. Cholesterol stones cannot be recognised as such by sonography. The formation of an acoustic shadow depends largely on the position of the stone within the acoustic beam. It therefore follows that the examination must be done by keeping the focal plane of the transducer in proper relationship to the stone. (orig.) [de

  12. Studies on biting midges of the genus Culicoides in the Suez Canal Zone.

    Science.gov (United States)

    Morsy, T A; Bebars, M A; Sabry, A H; Ahmed, M M; Abdel Fattah, S A

    1989-06-01

    The importance of the biting midges of the genus Culicoides being in their role as vector of non periodic filarial worms of the genus Mansonella and Dipetalonema to man and pathogenic virus to livestock. Besides, their painful bite may disappear within an hour or cause an appreciable systemic reaction. In this paper, the four species recorded in the Suez Canal Zone (C. schultzei, C. puncticollis, C. pallidipennis & C. distinctipennis) were redescribed. Also, the hours of activity of the most common and abundant species, C. schultzei was studied. C. neavei Austin, 1912, representing a new record in Egypt.

  13. Quantification of Circulating Free DNA as a Diagnostic Marker in Gall Bladder Cancer.

    Science.gov (United States)

    Kumari, Swati; Tewari, Shikha; Husain, Nuzhat; Agarwal, Akash; Pandey, Anshuman; Singhal, Ashish; Lohani, Mohtashim

    2017-01-01

    Gall bladder Carcinoma (GBC) is the fifth most common cancer of the digestive tract and frequently diagnosed in late stage of disease. Estimation of circulating free DNA (cfDNA) in serum has been applied as a "liquid biopsy" in several deep seated malignancies. Its value in diagnosis of gall bladder carcinoma has not been studied. The present study was designed to assess the role of cfDNA in the diagnosis of GBC and correlate levels with the TNM stage. Serum was collected from 34 patients with GBC and 39 age and sex matched controls including 22 cholecystitis and 17 healthy individuals. Serum cfDNA levels were measured through quantitative polymerase chain reaction (qPCR) by amplification of β-globin gene. Performance of the assay was calculated through the receiver operating characteristic (ROC) curve. The cfDNA level was significantly lower in healthy controls and cholecystitis (89.32 ± 59.76 ng/ml, 174.21 ± 99.93 ng/ml) compared to GBC (1245.91 ± 892.46 ng/ml, p = <0.001). The cfDNA level was significantly associated with TNM stage, lymph node involvement and jaundice (0.002, 0.027, and 0.041, respectively). Area under curve of ROC analysis for cancer group versus healthy and cholecystitis group was 1.00 and 0.983 with sensitivity of 100 %, 88.24 % and specificity of 100 % respectively. Quantitative analysis of cfDNA may distinguish cholecystitis and gall bladder carcinoma and may serve as new diagnostic, noninvasive marker adjunct to imaging for the diagnosis of GBC.

  14. Functional validation of Apoptosis Genes IAP1 and DRONC in midgut tissue of the biting midge Culicoides sonorensis (Diptera: Ceratopogonidae) by RNAi

    Science.gov (United States)

    Background: Culicoides biting midges transmit multiple ruminant viruses, including bluetongue virus and epizootic hemorrhagic disease virus, causing significant economic burden worldwide due to trade restrictions and production loss. To limit the spread of these viruses, control strategies focus on ...

  15. Multiple stressor effects on water quality in Poplar Bay, Lake of the Woods, Canada: a midge-based assessment of hypolimnetic oxygen conditions over the last two centuries

    Directory of Open Access Journals (Sweden)

    Jamie C. Summers

    2012-01-01

    Full Text Available Chironomid and Chaoborus (midge remains preserved in a dated sediment core from Poplar Bay, Lake of the Woods (LOW, Ontario, Canada, were used to assess the effects of multiple stressors (e.g., recent warming and shoreline development on water quality over the past ~200 years. As monitoring data for LOW do not extend beyond recent decades, paleolimnological methods are used to reconstruct long-term limnological trends and to establish pre-disturbance conditions. The effects of recent warming and shoreline development on Poplar Bay water quality are examined using an index of hypolimnetic oxygen (O2 status based on the ratio of Chaoborus to chironomid remains (chaob:chir and a midge-inferred volume-weighted hypolimnetic oxygen (VWHO model. Our paleolimnological data indicate that hypolimnetic [O2] in Poplar Bay have been historically hypoxic (1-4 mg O2 L-1 but have declined further (generally <2 mg O2 L-1 over the last few decades. Significant relationships between air temperature and midge data indicate that substantial warming starting in the late-1970s has triggered a marked response in the midge assemblages that pre-dates the onset of cottage development (mid-1990s. These findings complement a diatom-based study on the same sediment core, likewise suggesting that recent warming has played a prominent role in structuring limnetic communities. However, it is likely that the full, compounded effects of recent warming and shoreline development have not yet been realized. Our study highlights the complexity of multiple stressor systems, such as Poplar Bay, and emphasizes the benefits of using multiple, independent lines of paleoenvironmental evidence in gaining a more complete understanding of historical water quality.

  16. Understory host plant and insect gall diversity changes across topographic habitats differing in nutrient and water stress in the Brazilian Amazon rainforest

    OpenAIRE

    JULIÃO, Genimar Rebouças; ALMADA, Emmanuel Duarte; COSTA, Flávia Regina Capellotto; CARNEIRO, Marco Antônio Alves; FERNANDES, G. Wilson

    2017-01-01

    ABSTRACT Topographic gradients in terra firme forests are associated with pronounced changes in soil texture, soil nutrients and distance to the water-table, thereby creating different hydric and nutritional conditions for plants and their associated herbivore community. The aim of this study was to investigate galling species and host plant richness and gall species composition across topographic habitats differing in nutrient and water stress in the Brazilian Amazon rainforest. Nineteen 250...

  17. Resistance to Root Galling Caused by the Powdery Scab Pathogen Spongospora subterranea in Potato

    Science.gov (United States)

    Potato selections (clones and commercial cultivars) were examined for resistance to root galling, caused by the powdery scab pathogen Spongospora subterranea in 7 field trials conducted between 2003 and 2007 in the states of Washington (WA) and Idaho (ID). In 2003, Shepody demonstrated the highest l...

  18. Mosquitoes and Culicoides biting midges: vector range and the influence of climate change.

    Science.gov (United States)

    Elbers, A R W; Koenraadt, C J M; Meiswinkel, R

    2015-04-01

    Vector-borne animal diseases pose a continuous and substantial threat to livestock economies around the globe. Increasing international travel, the globalisation of trade, and climate change are likely to play a progressively more important role in the introduction, establishment and spread of arthropod-borne pathogens worldwide. A review of the literature reveals that many climatic variables, functioning singly or in combination, exert varying effects on the distribution and range of Culicoides vector midges and mosquitoes. For example, higher temperatures may be associated with increased insect abundance--thereby amplifying the risk of disease transmission--but there are no indications yet of dramatic shifts occurring in the geographic range of Culicoides midges. However, the same cannot be said for mosquitoes: over the last few decades, multiple Asian species have established themselves in Europe, spread and are unlikely to ever be eradicated. Research on how insects respond to changes in climate is still in its infancy. The authors argue that we need to grasp how other annectant changes, such as extremes in precipitation (drought and flooding), may affect the dispersal capability of mosquitoes. Models are useful for assessing the interplay between mosquito vectors expanding their range and the native flora and fauna; however, ecological studies employing classical mark-release-recapture techniques remain essential for addressing fundamental questions about the survival and dispersal of mosquito species, with the resulting parameters fed directly into new-generation disease transmission models. Studies on the eventual impact of mosquitoes on animal and human health should be tackled through large-scale integrated research programmes. Such an approach calls for more collaborative efforts, along the lines of the One Health Initiative.

  19. The authority and types for the hackberry gall psyllid genus Pachypsylla (Riley) (Hemiptera-Homoptera: Psyllidae)

    Science.gov (United States)

    The nomenclatural problems with the hackberry gall psyllid species names are rectified. The genus Pachypsylla Riley, 1883, type species, Psylla venusta Osten-Sacken, includes 14 nominal species. These are: Pachypsylla venusta (Osten-Sacken, 1861); P. celtidismamma Riley, 1875; P. celtidisgemma Ri...

  20. Pharmacognostic studies of insect gall of Quercus infectoria Olivier (Fagaceae)

    Institute of Scientific and Technical Information of China (English)

    Savitri Shrestha; Vasuki Srinivas Kaushik; Ravi Shankara Birur Eshwarappa; Sundara Rajan Subaramaihha; Latha Muuaiah Ramanna; Dhananjaya Bhadrapura Lakkappa

    2014-01-01

    Objective:To study the detailed pharmacognostic profile of galls of Quercus infectoria Olivier (Q. infectoria olivier) (Fagaceae), an important medicinal plant used in the Indian system of medicine. Methods: Samples of galls of Q. infectoria were studied by macroscopical, microscopical, physiochemical, phytochemical, fluorescence analysis and othjer methods for standardization as recommended by WHO. Results:Macroscopically, the crude drug is globose with horny appearances on external surface (1.4-2.3 cm in length and 1-1.5 cm in diameter), with greyish-brown to brownish-black in colour externally and dark brown buff colored. Surface is smooth with numerous horny protuberances giving rough touch, and with unpleasant odour. Microscopically, a wide zone of radially elongated parenchyma cells between upper and lower epidermis were found. The vascular strands were present at all places and radially elongated sclerides touched the lower epidermis. In physico-chemical studies, the moisture, total ash, acid insoluble ash, alcohol soluble, water soluble, petroleum ether, chloroform extractive value and tannin content were found to be 2.790, 5.020, 0.110, 38.780, 41.210, 0.402, 1.590 and 49.200 percentage respectively. Preliminary phytochemical screening showed the presence of phenols, flavonoids, steroids, triterpenes, tannins, saponins and alkaloids. Conclusions:The results of the present study serve as a valuable source of information and provide suitable standards for identification of this medicinally important plant drug material for future investigations and applications.

  1. Two new herb gall wasps from Spain, including the description of a new species of Aulacidea Ashmead, 1897 (Hymenoptera, Cynipidae, “Aylacini” inducing galls on Serratula nudicaulis L. DC (Asteraceae

    Directory of Open Access Journals (Sweden)

    Nieves-Aldrey, J. L.

    2012-12-01

    Full Text Available Two new species of herb gall wasps are recorded from Spain, which induce galls on flower heads of Serratula nudicaulis L. DC (Asteraceae. Isocolus serratulae (Mayr, 1882 is recorded for the first time in Spain, while a new species of Aulacidea Ashmead, 1897, Aulacidea pilarae sp. n., is described. This new species is similar to Aulacidea serratulae Diakontschuk, 1984, which is found throughout Oriental Europe. However, those two congeneric species may be distinguished by the morphology of the adults.Se citan dos nuevas especies de avispas de las agallas en plantas herbáceas para España. Las dos especies inducen agallas en cabezuelas florales de Serratula nudicaulis L. DC (Asteraceae y se han encontrado en el valle del Lozoya (Madrid, España Central. Isocolus serratulae (Mayr, 1882 se cita por primera vez para la Península Ibérica y se describe una especie nueva de Aulacidea Ashmead, 1897: A. pilarae sp. n. La nueva especie es similar a Aulacidea serratulae Diakontschuk, 1984 citada de Europa oriental, diferenciándose por la morfología de los adultos.

  2. Gall inducing arthropods from a seasonally dry tropical forest in Serra do Cipó, Brazil Artrópodes indutores de galhas em Floresta Sazonal Tropical Seca da Serra do Cipó, Brasil

    Directory of Open Access Journals (Sweden)

    Marcel Serra Coelho

    2009-01-01

    Full Text Available Highly diverse forms of galling arthropods can be identified in much of southeastern Brazil's vegetation. Three fragments of a Seasonally Dry Tropical Forest (SDTF located in the southern range of the Espinhaço Mountains were selected for study in the first survey of galling organisms in such tropical vegetation. Investigators found 92 distinct gall morphotypes on several organs of 51 host plant species of 19 families. Cecidomyiidae (Diptera was the most prolific gall-inducing species, responsible for the largest proportion of galls (77% observed. Leaves were the most frequently galled plant organ (63%, while the most common gall morphotype was of a spherical shape (30%. The two plant species, Baccharis dracunculifolia (Asteraceae and Celtis brasiliensis (Cannabaceae, presented the highest number of gall morphtypes, displaying an average of 5 gall morphotypes each. This is the first study of gall-inducing arthropods and their host plant species ever undertaken in a Brazilian SDTF ecosystem. Given the intense human pressure on SDTFs, the high richness of galling arthropods, and implied floral host diversity found in this study indicates the need for an increased effort to catalogue the corresponding flora and fauna, observe their intricate associations and further understand the implications of such rich diversity in these stressed and vulnerable ecosystems.Artrópodes indutores de galhas são muito ricos em espécies nas formações vegetais no sudeste do Brasil. Três fragmentos de Floresta Sazonal Tropical Seca (FSTS foram selecionados nas montanhas do sudeste da cadeia do Espinhaço para a primeira pesquisa de organismos indutores de galhas nesse tipo de vegetação. Encontramos 92 morfotipos distintos de galhas em vários órgãos de 51 espécies de plantas hospedeiras pertencentes à 19 famílias. A maioria das galhas (77% foi induzida pela família Cecidomyiidae (Diptera. A folha foi o órgão mais atacado (63%, enquanto o morfotipo mais

  3. CHANGES OF GLYCEROL CONTENT IN DIAPAUSE LARVAEOF THE ORANGE WHEAT BLOSSOM MIDGE, SITODIPLOSIS MOSELLANA (GEHIN) IN VARIOUS SEASONS

    Institute of Scientific and Technical Information of China (English)

    Jun-xiangWu; FengYuan

    2004-01-01

    The glycerol contents in diapause larvae of the orange wheat blossom midge, Sitodiplosis mosellana (Gehin), collected from various seasons, were measured. The results showed that there was less glycerol content in larvae during living on the wheat head. Content of glycerol began to increase significantly when the larvae left the wheat head and entered the soil. A change trend of upper- lower- upper- lower in larvae glycerol contents during diapause in soil was observed from June to April of next year. More glycerol could be examined in larvae collected in summer and winter than in spring and autumn. There was not more glycerol in cocooned larvae than that in non-cocooned larvae during various seasons from the point of statistics. Comparing the glycerol content of larvae being diapause in the first year with that of larvae in the second year, there was yet no obvious difference when larvae were collected in the same season belonged to different years. Therefore, it is shown that the content of glycerol in larvae of the wheat midge in diapause is affected mainly by the seasons or diapause intensity.

  4. Moonlight receptor of the '1-h-midge' Clunio marinus studied by micro-XRF

    International Nuclear Information System (INIS)

    Falkenberg, G; Wellenreuther, G; Alraun, P; Fleissner, Ge; Fleissner, Gue; Neumann, D

    2013-01-01

    Melanin is a pigment widely occurring in animals, plants, fungi and algae. It does not only colour skin, hair and eyes but serves mainly as photoprotectant and prevents overload with minerals induced by inflammations, infections and degenerative diseases. Therefore, the mechanisms underlying melanisation gained increasing interest in the field of biomedical research and clinic. So far, the processes of melanogenesis are only partly analysed, nearly nothing is known on a putative switch between melanins of different types. Here we offer a model organism to study these mechanisms as part of a naturally cycling change of transparency of the retinal shielding pigment. A marine midge, Clunio marinus, living in coastal regions, underlies a complex timing of its development by solar and lunar climatic periodicities, which synchronise biological clocks. The question was how the animals can discriminate changing sunlight from moonlight intensities. For the first time, we could show a 'moonlight window' in the larval ocelli of this midge, and propose a hypothesis on the underlying mechanisms. Driven by a lunar clock the image forming ocelli become transparent and convert during moonlit nights to a sensitive photometer, which can record the dynamics of environmental light. High resolution X-ray fluorescence (XRF) measurements of the distribution of trace minerals in single melanosomes combined with their fine structural details in various states of the lunar cycle provide a first insight into the enzymatic pathways for the generation of a dark melanin (like eumelanin) and a light coloured melanin (like phaeomelanin). Essential advantage of this approach is the spatial and temporal resolution of the metals associated with melanisation processes, which could never before be demonstrated in these details. The data may stimulate further research projects in biomedicine

  5. Endophagy of biting midges attacking cavity-nesting birds

    Czech Academy of Sciences Publication Activity Database

    Votýpka, Jan; Synek, P.; Svobodová, M.

    2009-01-01

    Roč. 23, č. 3 (2009), s. 277-280 ISSN 0269-283X R&D Projects: GA MŠk(CZ) LC06009 Institutional research plan: CEZ:AV0Z60220518 Keywords : Culicoides pictipennis * Culicoides truncorum * endophagy * nest box * population dynamics * transmission * vectors * Moravia Subject RIV: EG - Zoology Impact factor: 2.092, year: 2009

  6. Induction of leafy galls in Acacia mearnsii De Wild seedlings infected by Rhodococcus fascians

    Directory of Open Access Journals (Sweden)

    Marguerite Quoirin

    2004-07-01

    Full Text Available Plantlets of blackwattle (Acacia mearnsii De Wild were inoculated with the bacterium Rhodococcus fascians and cultured in vitro. Leafy galls appeared at the cotyledonary nodes in 75% of the infected plants. The galls were separated from the plants and cultured on a medium containing three-quarters-strength MS salts (Murashige and Skoog, 1962, MS vitamins, 2% sucrose and an antibiotic (cephalothin, supplemented with or without 0.2% activated charcoal. Histological studies conducted from the sixth to the twenty-second day after plant infection revealed the presence of newly formed meristematic centers, first in the axillary region, then on the petioles and lamina of the leaflets around the apical meristem. Approximately 37% of the galls developed one shoot with both concentrations of cephalothin.Plantas recém germinadas de acácia negra (Acacia mearnsii De Wild. foram inoculadas com a bactéria Rhodococcus fascians e cultivadas in vitro. Galhas cobertas por folhas apareceram na altura do nó cotiledonar em 75% das plantas infectadas. As galhas foram separadas das plantas e cultivadas num meio de cultura contendo os sais do meio MS (Murashige e Skoog, 1962 reduzidos a 3/4, as vitaminas do mesmo meio, 2% de sacarose e um antibiótico (cefalotina, adicionado ou não de 0,2% de carvão ativo. Estudos histológicos realizados entre o sexto e o vigésimo segundo dia depois da inoculação, revelaram a presença de centros meristemáticos novos, primeiro nas regiões axilares, em seguida nos pecíolos e limbos dos folíolos ao redor do meristema apical. Aproximadamente 37% das galhas desenvolveram um broto na presença de cefalotina.

  7. Isothermal Amplification and Lateral-Flow Assay for Detecting Crown-Gall-Causing Agrobacterium spp.

    Science.gov (United States)

    Fuller, Skylar L; Savory, Elizabeth A; Weisberg, Alexandra J; Buser, Jessica Z; Gordon, Michael I; Putnam, Melodie L; Chang, Jeff H

    2017-09-01

    Agrobacterium is a genus of soilborne gram-negative bacteria. Members carrying oncogenic plasmids can cause crown gall disease, which has significant economic costs, especially for the orchard and nursery industries. Early and rapid detection of pathogenic Agrobacterium spp. is key to the management of crown gall disease. To this end, we designed oligonucleotide primers and probes to target virD2 for use in a molecular diagnostic tool that relies on isothermal amplification and lateral-flow-based detection. The oligonucleotide tools were tested in the assay and evaluated for detection limit and specificity in detecting alleles of virD2. One set of primers that successfully amplified virD2 when used with an isothermal recombinase was selected. Both tested probes had detection limits in picogram amounts of DNA. Probe 1 could detect all tested pathogenic isolates that represented most of the diversity of virD2. Finally, the coupling of lateral-flow detection to the use of these oligonucleotide primers in isothermal amplification helped to reduce the onerousness of the process, and alleviated reliance on specialized tools necessary for molecular diagnostics. The assay is an advancement for the rapid molecular detection of pathogenic Agrobacterium spp.

  8. Gall bladder carcinoma with ampullary carcinoma: A rare case of double malignancy

    Directory of Open Access Journals (Sweden)

    Praveer Rai

    2013-01-01

    Full Text Available Simultaneous double cancers in the biliary system are rare. Most are associated with pancreaticobiliary maljunction (PBM. However, it can occur in patients without PBM. Differentiation between these events is important since these two mechanistic origins imply different stages of disease, as well as different subsequent treatments and prognoses. Herein, we report a case of ampullary carcinoma associated with gall bladder carcinoma diagnosed nonoperatively and palliated with biliary metal stenting.

  9. Wing pattern variation in the Patagonian biting midge, Forcipomyia (Forcipomyia multipicta Ingram & Macfie (Diptera, Ceratopogonidae

    Directory of Open Access Journals (Sweden)

    Gustavo R. SPINELLI

    2012-01-01

    Full Text Available Examination of the type-series and non-type specimens of the Patagonian biting midge, Forcipomyia (Forcipomyia multipicta Ingram & Macfie (Diptera: Ceratopogonidae, revealed considerable variation in wing patterns of both sexes. One pattern includes several distinct light spot areas, whereas another pattern (e.g, in the holotype only features marginal light spots in cell r3, while other light spots are barely perceptible or absent. The cause(s of the differential lack of dark macrotrichia in certain areas of the wing membrane in specimens of some series could not be attributed either to their age, sex, or method of preservation.

  10. Galling arthropod diversity in adjacent swamp forests and restinga vegetation in Rio Grande do Sul, Brazil.

    Science.gov (United States)

    Mendonça, Milton De S; Piccardi, Hosana M F; Jahnke, Simone M; Dalbem, Ricardo V

    2010-01-01

    Galling arthropods create plant structures inside which they find shelter. Factors acting on galler diversity are still being discussed, with this fauna considered more diverse in xeric than mesic environments (higrothermic stress hypothesis, HSH), and also in more plant diverse sites. Here we compare galler abundance (N), equitability (E), species richness (S) and composition between adjacent restinga (xeric) and swamp forests (mesic) in Parque Estadual de Itapeva (29°21' S, 49°45' W), Rio Grande do Sul, southern Brazil. Five trails, two in swamp forest and three in restingas, were sampled four times each (January/December 2005). After an effort of 60h/person, 621 galled plant individuals belonging to 104 gall morphotypes were recorded. This suggests a high galler diversity for the Park, comparable to the richest places known. No differences were found for N, E or S between restingas and swamp forests. However, faunal composition differs significantly between the vegetation types. The dominant (most abundant) species are different in either vegetation type, and are rare or absent on the other vegetation type. Such species composition analysis is still largely ignored for gallers, and stresses the fact that the HSH cannot explain this pattern, since the latter is based on preferences by the ovipositing galler for xeric sites instead of mesic ones. The two habitats differ in microclimate, but species richness, as would be predicted by the HSH, does not differ. This small scale pattern can perhaps be attributed to biogeographic processes on larger scales, as suggested by the resource synchronisation hypothesis.

  11. Contaminated sediments and bioassay responses of three macroinvertebrates, the midge larva Chironomus riparius, the water louse Asellus aquaticus and the mayfly nymph Ephoron virgo

    NARCIS (Netherlands)

    Lange, de H.J.; Haas, de E.M.; Maas, H.; Peeters, E.T.H.M.

    2005-01-01

    Bioassays are widely used to estimate ecological risks of contaminated sediments. We compared the results of three whole sediment bioassays, using the midge larva Chironomus riparius, the water louse Asellus aquaticus, and the mayfly nymph Ephoron virgo. We used sediments from sixteen locations in

  12. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  13. Vicarious visualization of gall bladder on 99mTc ethylene dicysteine renal dynamic study

    International Nuclear Information System (INIS)

    Arora, Geetanjali; Damle, Nishikant A.; Tripathi, Madhavi; Bal, Chandrasekhar; Praveen Kumar

    2012-01-01

    Though the hepatobiliary excretion of Technetium-99m ethylene dicysteine ( 99m Tc-EC) is very low and usually does not effect image interpretation on routine posterior imaging, the possibility of visualization of the gall bladder should be kept in mind while reporting the 99m Tc-EC scan especially, when anterior imaging is performed as in renal transplant patients. (author)

  14. Egg parasitoids (Hymenoptera: Mymaridae and Trichogrammatidae) of the gall-making leafhopper Scenergates viridis (Hemiptera: Cicadellidae) from Uzbekistan, with taxonomic notes on the Palaearctic species of Aphelinoidea.

    Science.gov (United States)

    Rakitov, Roman; Triapitsyn, Serguei V

    2013-01-01

    A new species of the Aphelinoidea Girault (Hymenoptera: Trichogrammatidae), A. (Aphelinoidea) sariq Triapitsyn & Rakitov sp. n., is described from Uzbekistan. Both sexes were reared from eggs of the only known truly gall-making leafhopper, Scenergates viridis (Vilbaste), laid inside its galls on camelthorn, Alhagi maurorum Medikus; additional females were found dead inside the galls. Aphelinoidea sariq is the only known species of the nominate subgenus of Aphelinoidea whose body color is predominantly yellow. Taxonomic notes on other Palaearctic species of Aphelinoidea are provided; A. scythica Fursov, syn. n. is synonymized underA. (Aphelinoidea) turanica S. Trjapitzin. Another trichogrammatid, Par-acentrobia (Paracentrobia) sp., was reared from eggs of S. viridis in much smaller numbers. Also described from the same locality and host is Gonatocerus (Lymaenon) mitjaevi Triapitsyn & Rakitov sp. n. (Hymenoptera: Mymaridae).

  15. Chaves para classificação de galhas de Cecidomyiidae (Diptera em Myrtaceae na Restinga da Barra de Maricá, Rio de Janeiro Keys to separation of Cecidomyiidae (Diptera galls on Myrtaceae at Restinga da Barra de Maricá, Rio de Janeiro

    Directory of Open Access Journals (Sweden)

    Valéria Cid Maia

    1995-01-01

    Full Text Available Keys to Cecidomyiidae galls occuring on Myrtaceae by genus of the host plant, in alphabetical order, are presented. Data on gall makers, predators and inquilinous species are given, as well as illustrations of the galls.

  16. Efficacy of Eucalyptus cinerea as a Source of Bioactive Compounds for Curative Biocontrol of Crown Gall Caused by Agrobacterium tumefaciens Strain B6

    Directory of Open Access Journals (Sweden)

    Yosra Kahla

    2017-01-01

    Full Text Available This research investigated the Eucalyptus cinerea leaves efficiency in the Agrobacterium tumefaciens biocontrol, the causative agent of crown gall. GC-MS analysis of the essential oil (EO showed that the main components were 1,8-cineole (61% and camphene (15.13%. Thanks to its polyphenols, flavonoids, quinones, terpenoids, alkaloids, and tannins richness, the EtOAc-F exhibited the most potent antibacterial activity in vitro. Indeed, compared to the other fractions, it has the lowest MIC and MBC values of 0.312 mg/mL and 2.5 mg/mL, respectively. The GC-MS analysis of EtOAc-F confirmed its richness in antibacterial compounds including gallic acid (7.18%, shikimic acid (5.07%, and catechin (3.12%. The time-kill curve assay of EtOAc-F (2.5 mg/mL showed a potent bactericidal effect after 20 min of direct contact with A. tumefaciens. In planta experiments, gall weights were significantly reduced when EtOAc-F was applied at 0.625 and 2.5 mg/wounds. Besides, the disease reduction rates in gall weight were 95% and 97.5%, respectively. Interestingly, no phytotoxic effect was observed since tomato seeds germinated in the presence of the different concentrations of EtOAc-F. These results suggest that EtOAc-F has a good potential to be a curative biocontrol agent for crown gall disease.

  17. Antibiosis and bmyB Gene Presence As Prevalent Traits for the Selection of Efficient Bacillus Biocontrol Agents against Crown Gall Disease

    Directory of Open Access Journals (Sweden)

    Olfa Frikha-Gargouri

    2017-08-01

    Full Text Available This study aimed to improve the screening method for the selection of Bacillus biocontrol agents against crown gall disease. The relationship between the strain biocontrol ability and their in vitro studied traits was investigated to identify the most important factors to be considered for the selection of effective biocontrol agents. In fact, previous selection procedure relying only on in vitro antibacterial activity was shown to be not suitable in some cases. A direct plant-protection strategy was performed to screen the 32 Bacillus biocontrol agent candidates. Moreover, potential in vitro biocontrol traits were investigated including biofilm formation, motility, hemolytic activity, detection of lipopeptide biosynthetic genes (sfp, ituC and bmyB and production of antibacterial compounds. The obtained results indicated high correlations of the efficiency of the biocontrol with the reduction of gall weight (p = 0.000 and the antibacterial activity in vitro (p = 0.000. Moreover, there was strong correlations of the efficiency of the biocontrol (p = 0.004 and the reduction in gall weight (p = 0.000 with the presence of the bmyB gene. This gene directs the synthesis of the lipopeptide bacillomycin belonging to the iturinic family of lipopeptides. These results were also confirmed by the two-way hierarchical cluster analysis and the correspondence analysis showing the relatedness of these four variables. According to the obtained results a new screening procedure of Bacillus biocontrol agents against crown gall disease could be advanced consisting on two step selection procedure. The first consists on selecting strains with high antibacterial activity in vitro or those harbouring the bmyB gene. Further selection has to be performed on tomato plants in vivo. Moreover, based on the results of the biocontrol assay, five potent strains exhibiting high biocontrol abilities were selected. They were identified as Bacillus subtilis or Bacillus

  18. Insetos galhadores associados a duas espécies de plantas invasoras de áreas urbanas e peri-urbanas Galling insects associated with two species of ruderal plants in urban and peri urban areas

    Directory of Open Access Journals (Sweden)

    Genimar R. Julião

    2005-03-01

    que áreas verdes em espaços urbanos são de fundamental importância na manutenção da diversidade de insetos.Insects have been considered as important bioindicators of environmental changes and habitat quality. In spite of its sessile habit, easy localization, abundance and host specificity, insects that induce galls have not been utilized in studies of this nature. It was investigated the suitability of gall-inducing insects associated to two ruderal host plant species (Baccharis dracunculifolia and Vernonia polyanthes: Asteraceae as bioindicators of habitat quality. The following questions were addressed: (i is gall-inducing insect diversity influenced by different types of land use?; (ii are the responses of galling insect communities different between host plants?; (iii how does the biotic and physical features of the biotope influence the gall-inducing insect diversity? It was found 6,226 galls, belonging to six galling insect species on V. polyanthes and 11 galling species on B. dracunculifolia. No difference was found in galling species richness among land use types. Nevertheless, gall-forming insect abundance was statistically different among the biotopes studied. Insect galls were more numerous in biotopes with lower urbanization levels. Gall abundance showed a strong and positive relationship with the percentage of vegetal cover. Gall-forming insect communities on both host species showed differential responses to the different land use types. The results suggest that three factors may be involved with galling insect diversity in urban areas: (i habitat structure in the biotope; (ii resource abundance (host plant abundance and distribution; and (iii frequency and intensity of management in reserves, parks, city squares, wastelands found at a given urban area.

  19. New distribution records of the gall crab Opecarcinus cathyae van der Meij, 2014 (Decapoda: Brachyura: Cryptochiridae) from the Red Sea, Maldives and Japan

    KAUST Repository

    Meij, Sancia E. T.

    2016-11-12

    The gall crab Opecarcinus cathyae van der Meij, 2014 has been reported from various localities in Indonesia and Malaysia. Recent surveys in the Red Sea, Maldives and Japan yielded additional specimens of O. cathyae, considerably expanding the known distribution range of this species to the east and west. The identity of O. cathyae was confirmed based on COI sequence data, revealing identical haplotypes for the Red Sea, Maldivian and Japanese material and three haplotypes in the Indonesian material. Opecarcinus cathyae has one of the widest known recorded distribution ranges for all gall crab species.

  20. New distribution records of the gall crab Opecarcinus cathyae van der Meij, 2014 (Decapoda: Brachyura: Cryptochiridae) from the Red Sea, Maldives and Japan

    KAUST Repository

    Meij, Sancia E. T.; Benzoni, Francesca; Berumen, Michael L.; Naruse, Tohru

    2016-01-01

    The gall crab Opecarcinus cathyae van der Meij, 2014 has been reported from various localities in Indonesia and Malaysia. Recent surveys in the Red Sea, Maldives and Japan yielded additional specimens of O. cathyae, considerably expanding the known distribution range of this species to the east and west. The identity of O. cathyae was confirmed based on COI sequence data, revealing identical haplotypes for the Red Sea, Maldivian and Japanese material and three haplotypes in the Indonesian material. Opecarcinus cathyae has one of the widest known recorded distribution ranges for all gall crab species.

  1. Biliary peritonitis due to gall bladder perforation after percutaneous nephrolithotomy

    Directory of Open Access Journals (Sweden)

    Nikhil Ranjan

    2015-01-01

    Full Text Available A 19-year-old male patient underwent right percutaneous nephrolithotomy (PNL for right renal 1.5 × 1.5 cm lower pole stone. The procedure was completed uneventfully with complete stone clearance. The patient developed peritonitis and shock 48 h after the procedure. Exploratory laparotomy revealed a large amount of bile in the abdomen along with three small perforations in the gall bladder (GB and one perforation in the caudate lobe of the liver. Retrograde cholecystectomy was performed but the patient did not recover and expired post-operatively. This case exemplifies the high mortality of GB perforation after PNL and the lack of early clinical signs.

  2. Gallé, une vie au tournant du siècle.

    Directory of Open Access Journals (Sweden)

    Isabelle Debilly

    2004-05-01

    Full Text Available La collection Découvertes de Gallimard propose un nouveau volume dédié à Émile Gallé, le magicien du verre . Il s’agit là déjà, du 446 e numéro de cette collection destinée à l’origine aux adolescents. Ce principe a été en grande partie abandonné, même si l’on trouve encore les volumes de cette collection dans les rayons « jeunesse » de certaines librairies. Le grand public a depuis longtemps plébiscité ces ouvrages qui présentent une riche iconographie, ...

  3. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  4. Financial cost to institutions on patients waiting for gall bladder disease surgery.

    Science.gov (United States)

    Waqas, Ahmed; Qasmi, Shahzad Ahmed; Kiani, Faran; Raza, Ahmed; Khan, Khizar Ishtiaque; Manzoor, Shazia

    2014-01-01

    The aim of this study was to determine the financial costs to institution on patients waiting for gall bladder disease surgery and suggest measures to reduce them. This multi-centre prospective descriptive survey was performed on all patients who underwent an elective cholecystectomy by three consultants at secondary care hospitals in Pakistan between Jan 2010 to Jan 2012. Data was collected on demographics, the duration of mean waiting time, specific indications and nature of disease for including the patients in the waiting list, details of emergency re-admissions while awaiting surgery, investigations done, treatment given and expenditures incurred on them during these episodes. A total of 185 patients underwent elective open cholecystectomy. The indications for listing the patients for surgery were biliary colic in 128 patients (69%), acute cholecystitis in 43 patients (23%), obstructive jaundice in 8 patients (4.5%) and acute pancreatitis in 6 patients (3.2%). 146 (78.9%) and 39 (21.1%) of patients were listed as outdoor electives and indoor emergencies respectively. Of the 185 patients, 54 patients (29.2%) were re-admitted. Financial costs in Pakistani rupees per episode of readmission were 23050 per episode in total and total money spent on all readmissions was Rs. 17,05,700/-. Financial costs on health care institutions due to readmissions in patients waiting for gall bladder disease surgery are high. Identifying patients at risk for these readmissions and offering them early laparoscopic cholecystectomy is very important.

  5. Entomophytophagy ('Sequential Predatory, then Phytophagous Behaviour' in an Indian Braconid 'Parasitoid' Wasp (Hymenoptera: Specialized Larval Morphology, Biology and Description of a New Species.

    Directory of Open Access Journals (Sweden)

    A P Ranjith

    Full Text Available The vast majority of braconid wasps are parasitoids of other insects. Although a few cases of pure phytophagy (primary gall production and seed predation are known, no previous entomophytophagous species (i.e. ones that display entomophagy and phytophagy sequentially, has been discovered among braconids. We describe the detailed biology and specialized larval morphology for the first confirmed entomophytophagous braconid species. Leaf galls on Garuga pinnata Roxb. (Burseraceae in India, induced by the psyllid, Phacopteron lentiginosum Buckton (Hemiptera: Psylloidea, Phacopteronidae were sampled throughout a period of several months and found to suffer a high level of attack by a new species Bracon garugaphagae Ranjith & Quicke which is here described and illustrated. The wasps oviposit singly into the galls without paralysing the psyllids. The larvae first attack psyllid nymphs which they seek out within the gall, kill them with a single bite and consume them. Unique dorsal abdominal tubercles, with eversible tips present on the abdominal segments of the larvae that are used to help maintain larval position while feeding, are illustrated. After consuming all available prey, the larvae continue feeding on gall tissue until mature enough to spin cocoons and pupate. The new species illustrates, for the first time, a possible intermediate stage in the evolution of pure phytophagy within the Braconidae. Interestingly, the two unrelated seed predator Bracon species are also associated with Burseraceae, perhaps indicating that this plant family is particularly suited as a food for braconine wasps.

  6. Entomophytophagy ('Sequential Predatory, then Phytophagous Behaviour') in an Indian Braconid 'Parasitoid' Wasp (Hymenoptera): Specialized Larval Morphology, Biology and Description of a New Species.

    Science.gov (United States)

    Ranjith, A P; Quicke, Donald L J; Saleem, U K A; Butcher, Buntika A; Zaldívar-Riverón, Alejandro; Nasser, M

    2016-01-01

    The vast majority of braconid wasps are parasitoids of other insects. Although a few cases of pure phytophagy (primary gall production and seed predation) are known, no previous entomophytophagous species (i.e. ones that display entomophagy and phytophagy sequentially), has been discovered among braconids. We describe the detailed biology and specialized larval morphology for the first confirmed entomophytophagous braconid species. Leaf galls on Garuga pinnata Roxb. (Burseraceae) in India, induced by the psyllid, Phacopteron lentiginosum Buckton (Hemiptera: Psylloidea, Phacopteronidae) were sampled throughout a period of several months and found to suffer a high level of attack by a new species Bracon garugaphagae Ranjith & Quicke which is here described and illustrated. The wasps oviposit singly into the galls without paralysing the psyllids. The larvae first attack psyllid nymphs which they seek out within the gall, kill them with a single bite and consume them. Unique dorsal abdominal tubercles, with eversible tips present on the abdominal segments of the larvae that are used to help maintain larval position while feeding, are illustrated. After consuming all available prey, the larvae continue feeding on gall tissue until mature enough to spin cocoons and pupate. The new species illustrates, for the first time, a possible intermediate stage in the evolution of pure phytophagy within the Braconidae. Interestingly, the two unrelated seed predator Bracon species are also associated with Burseraceae, perhaps indicating that this plant family is particularly suited as a food for braconine wasps.

  7. Phenological relationships between two insect galls and their host plants: Aspidosperma australe and A. spruceanum (Apocynaceae Relações fenológicas entre duas galhas induzidas por insetos e suas plantas hospedeiras: Aspidosperma australe e A. spruceanum (Apocynaceae

    Directory of Open Access Journals (Sweden)

    Priscila Tolentino Campos

    2010-09-01

    Full Text Available Although gall diversity in the Neotropical region is immense, comparative studies on the phenology of host plants and their galls are scarce. Gall systems generally require high levels of phenological synchrony between the associated organisms. The relationships between the phenology of two leaf galls induced by an unidentified Cecidomyiidae in Aspidosperma spruceanum Benth. ex Müell. Arg. and by Pseudophacopteron sp. in A. australe Müell. Arg. were investigated. The investigation was performed on ten individuals per species in 15-day intervals taking into consideration the percentage of galled leaves. In a one-year study, three distinct phenophases for the leaf galls and four phenophases for host plants were observed. The maximum percentage of leaf galls (80% on A. australe occurred just after the peak of leaf sprouting. In A. spruceanum, the percentage of leaf galls was always over 50%, which can be related to continuous leaf production and gall induction in this species. In both species, developing galls were observed over the entire year, indicating multivoltinism. The ability to induce galls at young and mature sites seems to be a good strategy for galling species survivorship.Embora a diversidade de galhas na região neotropical seja grande, poucos são os estudos fenológicos comparando a fenologia das espécies hospedeiras com aquela das galhas. O desenvolvimento de galhas geralmente requer alta sincronia fenológica entre os organismos associados. A relação entre a fenologia de duas galhas foliares induzidas por um Cecidomyiidae e Aspidosperma spruceanum Benth. ex Müell. Arg. e de uma espécie de Pseudophacopteron sp. e A. australe Müell. Arg. foram investigadas. O trabalho foi realizado em dez indivíduos de cada espécie em intervalos quinzenais, levando em consideração a percentagem de folhas galhadas. Durante um ano, foram observadas três fenofases distintas para as galhas foliares e quatro fenofases para a hospedeira. A

  8. Tournament ABC analysis of the western Palaearctic population history of an oak gall wasp, Synergus umbraculus.

    Science.gov (United States)

    Stone, Graham N; White, Sarah C; Csóka, György; Melika, George; Mutun, Serap; Pénzes, Zsolt; Sadeghi, S Ebrahim; Schönrogge, Karsten; Tavakoli, Majid; Nicholls, James A

    2017-12-01

    Approximate Bayesian computation (ABC) is a powerful and widely used approach in inference of population history. However, the computational effort required to discriminate among alternative historical scenarios often limits the set that is compared to those considered more likely a priori. While often justifiable, this approach will fail to consider unexpected but well-supported population histories. We used a hierarchical tournament approach, in which subsets of scenarios are compared in a first round of ABC analyses and the winners are compared in a second analysis, to reconstruct the population history of an oak gall wasp, Synergus umbraculus (Hymenoptera, Cynipidae) across the Western Palaearctic. We used 4,233 bp of sequence data across seven loci to explore the relationships between four putative Pleistocene refuge populations in Iberia, Italy, the Balkans and Western Asia. We compared support for 148 alternative scenarios in eight pools, each pool comprising all possible rearrangements of four populations over a given topology of relationships, with or without founding of one population by admixture and with or without an unsampled "ghost" population. We found very little support for the directional "out of the east" scenario previously inferred for other gall wasp community members. Instead, the best-supported models identified Iberia as the first-regional population to diverge from the others in the late Pleistocene, followed by divergence between the Balkans and Western Asia, and founding of the Italian population through late Pleistocene admixture from Iberia and the Balkans. We compare these results with what is known for other members of the oak gall community, and consider the strengths and weaknesses of using a tournament approach to explore phylogeographic model space. © 2017 The Authors. Molecular Ecology Published by John Wiley & Sons Ltd.

  9. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  10. Cationic lipid-formulated DNA vaccine against hepatitis B virus: immunogenicity of MIDGE-Th1 vectors encoding small and large surface antigen in comparison to a licensed protein vaccine.

    Directory of Open Access Journals (Sweden)

    Anne Endmann

    Full Text Available Currently marketed vaccines against hepatitis B virus (HBV based on the small (S hepatitis B surface antigen (HBsAg fail to induce a protective immune response in about 10% of vaccinees. DNA vaccination and the inclusion of PreS1 and PreS2 domains of HBsAg have been reported to represent feasible strategies to improve the efficacy of HBV vaccines. Here, we evaluated the immunogenicity of SAINT-18-formulated MIDGE-Th1 vectors encoding the S or the large (L protein of HBsAg in mice and pigs. In both animal models, vectors encoding the secretion-competent S protein induced stronger humoral responses than vectors encoding the L protein, which was shown to be retained mainly intracellularly despite the presence of a heterologous secretion signal. In pigs, SAINT-18-formulated MIDGE-Th1 vectors encoding the S protein elicited an immune response of the same magnitude as the licensed protein vaccine Engerix-B, with S protein-specific antibody levels significantly higher than those considered protective in humans, and lasting for at least six months after the third immunization. Thus, our results provide not only the proof of concept for the SAINT-18-formulated MIDGE-Th1 vector approach but also confirm that with a cationic-lipid formulation, a DNA vaccine at a relatively low dose can elicit an immune response similar to a human dose of an aluminum hydroxide-adjuvanted protein vaccine in large animals.

  11. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  12. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  13. Description of the immature stages of the weevil Anthonomus vis Clark (Coleoptera, Curculionidae, inquiline into the gall of Leandra aurea (Melastomataceae

    Directory of Open Access Journals (Sweden)

    Daniela de Cassia Bená

    2013-12-01

    Full Text Available Description of the immature stages of the weevil Anthonomus vis Clark (Coleoptera, Curculionidae, inquiline into the gall of Leandra aurea (Melastomataceae. The third instar larva and the pupa of Anthonomus vis Clark, 1992 are described and illustrated, based upon specimens collected in the Serra de São José, Tiradentes, in Minas Gerais, southeastern Brazil. The species was previously known from the type series collected in the states of Amapá and Pará. Comparisons with the larva and pupa of A. grandis Boheman, 1843 and A. monostigma Champion, 1903 are included. The larvae of A. vis live as inquilines in the galls induced by a species of momphid moths (Lepidoptera, Momphidae in the stems of Leandra aurea (Cham. Cogn. (Melastomataceae.

  14. Developing climate resilient rice through genomics assisted breeding

    Directory of Open Access Journals (Sweden)

    Valarmathi Muthu

    2017-10-01

    Full Text Available Rice is one of the major cereal food crops whose production has to be doubled to achieve the projected demand [1] and current yield trends are not sufficient to meet the projected growth in production. Increasing the rice production by 30% during 2030 needs overcoming challenges viz., yield plateau, declining land, water and labor resources and predicted effects of global climate change. Development of high performance rice genotypes with enhanced yield potential and resilience to climate change will help in sustained increase in rice production. Deployment of genomic technologies can accelerate development and delivery of improved germplasm with enhanced resilience and adaptability [2, 3]. In this context, the present study was undertaken with an aim of developing rice genotypes pyramided with QTLs/genes controlling tolerance against various biotic and abiotic stresses viz., bacterial leaf blight (xa13, Xa21, blast (Pi9, Gall midge (Gm4, drought (qDTY1.1 qDTY2.1, submergence (Sub1 and salinity (Saltol. CBMAS14065 an elite culture harboring QTLs controlling tolerance against drought, salinity and submergence was crossed with a donor harboring BLB, Blast and Gall midge resistant genes. True F1s were backcrossed with CBMAS14065 and BC1F1 progenies were subjected to foreground selection using markers linked to the target traits. Superior plants (18 of BC1F1 generation were subjected to background selection which revealed 71.42 - 86.90% recurrent parent (CBMAS14065 genome recovery. Selected BC1F1 plants were advanced to BC2F1 generation backcrossing with CBMAS14065. In BC2F1 generation, through foreground selection 6-8 QTL/gene positive plants have been selected and advanced for further evaluation. The superior lines with desired QTLs/genes will be subjected to rigorous phenotypic evaluation against target stresses and advanced further.

  15. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  16. Pyrosequencing reveals the predominance of Pseudomonadaceae in gut microbiome of a Gall Midge

    Science.gov (United States)

    Gut microbes are known to play various roles in insects such as digestion of inaccessible nutrients, synthesis of deficient amino acids, and interaction with ecological environments, including host plants. Here, we analyzed the gut microbiome in Hessian fly, a serious pest of wheat. A total of 3,654...

  17. Evaluating the Antimicrobial Activity of Methonolic Extract of Rhus Succedanea Leaf Gall

    Directory of Open Access Journals (Sweden)

    Savitri Shrestha

    2013-12-01

    Full Text Available Introduction: The worldwide increased bacterial resistance to antibiotics and the undesirable side effects associated with constant use of synthetic drugs has prompted the search for novel antimicrobial agents, particularly those manufactured from plants. This study is designed to ascertain the antibacterial potential of Rhus succedanea leaf gall extracts on the growth of gram-positive and gram–negative bacteria. Methods: The methanolic and hexane extract of different concentrations (100, 250, and 500 μg/ml were prepared and their antibacterial efficacy was tested against clinical isolates of Escherichia coli, Salmonella typhi, Micrococcus luteus, and Staphylococcus aureus using agar well diffusion method and the size of inhibition zone was measured in millimeters. Results: The methanol and hexane extracts differed significantly in their antimicrobial activity with methanol extract showing a potent inhibitory activity in the range of 16±2 to 23±1, which was almost equal to the values of ciprofloxacin (25±3, used as a standard. Further, the methanol extract was mostly potent and effective in inhibiting the growth of gram-negative bacteria, namely, E. coli, when compared to gram –positive bacteria stains, which are responsible for antimicrobial activities. The phytochemical screening showed positive results for the presence of steroids, triterpenes, alkaloids, and carbohydrates. Conclusion: The potent antibacterial activity of Rhus succedanea leaf gall extracts indicates its useful therapeutic application against bacterial infection. Furthermore, this study indicates that the extract might be exploited as natural drug for the treatment of infectious diseases and could be useful in understanding the relations between traditional cures and current medications.

  18. Biology and harmfulness of Brassica pod midge (Dasineura brassicae Winn. in winter oilseed rape

    Directory of Open Access Journals (Sweden)

    Draga Graora

    2015-04-01

    Full Text Available The Brassica pod midge (Dasineura brassicae Winn. is an important pest in oilseed rape (Brasica napus L.. It develops two generations per year and overwinters in the larval stage in cocoons in soil. Immigration of the first generation adults lasted from the beginning of April until the end of May. Larvae developed in pods from mid-April to mid-June, causing pod deformation and cracking, which resulted in premature falling out of seeds and yield reduction. Pod damage amounted to 11.6%. The emergence of the second generation adults was detected at the end of May and in the first ten days of June. D. brassicae was found to lay eggs in healthy pods and no correlation was found with the cabbage seed weevil, Ceutorhynchus assimilis Paykull.

  19. Production of anticandidal cotton textiles treated with oak gall extract

    Directory of Open Access Journals (Sweden)

    Ahmed A. Tayel

    Full Text Available Candida albicans, one of the most dreadful fungal pathogens threatening humans, could not be easily prevented. The anticandidal activity of oak gall extract, Quercus infectoria (QIE, was investigated as a potential natural alternative to synthetic and chemical fungicides. QIE anticandidal potentiality was confirmed using both qualitative and quantitative assays. Cotton textiles were treated with QIE and then evaluated as anticandidal fabrics. QIE-treated textiles had a potent anticandidal activity, which could completely inhibit the inoculated C. albicans cells. The durability of anticandidal activity in QIE-treated textiles almost completely disappeared after the fourth laundering cycle. QIE could be recommended, however, as a potent anticandidal agent for preparing antiseptic solutions and emulsions and as a finishing agent for manufacturing anticandidal disposable diapers and hygienic clothes.

  20. Sonographic Analysis of the Collapsed Gall Bladder

    International Nuclear Information System (INIS)

    Han, Sang Suk; Choi, Jae Young; Choi, Seok Jin; Eun, Chung Ki; Nam, Kyung Jin; Lee, Jeong Mi

    1996-01-01

    their underlying pathologies were as follows : gall stone(10), hepatitis(5),ascites(3), and cholecystitis(2). According to our results, we can conclude that US is very accurate to diagnose gall stone in cases showing stony echo or acoustic shadow even in the collapsed gallbladder but it is nearly impossible to differentiate underlying pathologies in cases without such findings and the possibility of re-expansion of GB must be considered before the final decision of surgical treatment for any collapsed gallbladder

  1. Insetos indutores de galhas da porção sul da Cadeia do Espinhaço, Minas Gerais, Brasil Gall inducing insects from southern portion of the Espinhaço Range, Minas Gerais, Brazil

    Directory of Open Access Journals (Sweden)

    Marco Antonio A. Carneiro

    2009-12-01

    Full Text Available A riqueza de insetos galhadores é maior nas latitudes intermediárias em hábitats quentes e com vegetação esclerófila sob estresse hídrico e de nutrientes. Em regiões tropicais, os campos rupestres são indicados como hábitats ricos em espécies de insetos galhadores. Neste trabalho, foram descritas as galhas induzidas por insetos e suas plantas hospedeiras na porção sul da Cadeia do Espinhaço, sudeste do Brasil. Foram selecionados 60 sítios em seis regiões ao longo na porção sul da Cadeia do Espinhaço no estado de Minas Gerais. Em cada sítio 100 plantas foram amostradas totalizando 6.000 plantas censuradas ao longo de um gradiente altitudinal de 668 a 1860m. Foram encontrados 241 morfotipos de galhas em 142 espécies de plantas distribuídas em 29 famílias e de um total de 384 espécies de plantas amostradas. As famílias mais ricas em espécies de insetos galhadores foram Asteraceae (42%, principalmente espécies do gênero Baccharis. A maior parte das galhas (85% foi induzida por insetos da família Cecidomyiidae seguidos por Lepidoptera (4% e Homoptera (3%. Os ramos foram os órgãos mais freqüentemente atacados (72% enquanto que os morfotipos mais comuns foram o elíptico (37% e o globóide (36%. A espécie de planta hospedeira que apresentou mais morfotipos de galhas foi Baccharis pseudomyriocephala com 10 galhas distintas. Este estudo sustenta a afirmativa que campos rupestres apresentam uma elevada riqueza em espécies de insetos galhadores.Galling species richness is higher at intermediate latitudes on warm habitats and sclerophyllous vegetation under water and nutrient stress. In the tropical region, galling species richness is higher in rupestrian fields. Here the gall-inducing insects and their host plants of the southern portion of the Espinhaço range, southeastern Brazil are described. 60 study sites from six distinct regions along the Espinhaço range, at Minas Gerais state were selected. In each study site 100

  2. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  3. A Key to the Pupal Exuviae of the Midges (Diptera: Chironomidae) of Everglades National Park, Florida

    Science.gov (United States)

    Jacobsen, Richard E.

    2008-01-01

    A key has been developed for identifying the pupal exuviae of 132 taxa of chironomid midges collected in Everglades National Park, as well as 18 additional species from freshwater habitats adjacent to the Park. Descriptions and illustrations are based upon voucher specimens from extensive collections of chironomid pupal exuviae for faunal surveys and biomonitoring research conducted in ENP and surrounding freshwater areas from 1998 to 2007. The key includes taxonomic comments for confirming identifications, as well as brief summaries of the distribution and ecology of each species in southern Florida waters. Information is also provided on the morphology of chironomid pupal exuviae, recommended references for identifying pupal exuviae, techniques for making slides, and methods to confirm proper identification.

  4. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  5. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  6. Innervation of Extrahepatic Biliary Tract, With Special Reference to the Direct Bidirectional Neural Connections of the Gall Bladder, Sphincter of Oddi and Duodenum in Suncus murinus, in Whole-Mount Immunohistochemical Study.

    Science.gov (United States)

    Yi, S-Q; Ren, K; Kinoshita, M; Takano, N; Itoh, M; Ozaki, N

    2016-06-01

    Sphincter of Oddi dysfunction is one of the most important symptoms in post-cholecystectomy syndrome. Using either electrical or mechanical stimulation and retrogradely transported neuronal dyes, it has been demonstrated that there are direct neural pathways connecting gall bladder and the sphincter of Oddi in the Australian opossum and the golden hamster. In the present study, we employed whole-mount immunohistochemistry staining to observe and verify that there are two different plexuses of the extrahepatic biliary tract in Suncus murinus. One, named Pathway One, showed a fine, irregular but dense network plexus that ran adhesively and resided on/in the extrahepatic biliary tract wall, and the plexus extended into the intrahepatic area. On the other hand, named Pathway Two, exhibiting simple, thicker and straight neural bundles, ran parallel to the surface of the extrahepatic biliary tract and passed between the gall bladder and duodenum, but did not give off any branches to the liver. Pathway Two was considered to involve direct bidirectional neural connections between the duodenum and the biliary tract system. For the first time, morphologically, we demonstrated direct neural connections between gall bladder and duodenum in S. murinus. Malfunction of the sphincter of Oddi may be caused by injury of the direct neural pathways between gall bladder and duodenum by cholecystectomy. From the viewpoint of preserving the function of the major duodenal papilla and common bile duct, we emphasize the importance of avoiding kocherization of the common bile duct so as to preserve the direct neural connections between gall bladder and sphincter of Oddi. © 2015 Blackwell Verlag GmbH.

  7. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  8. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  9. Relative sensitivity of an amphipod Hyalella azteca, a midge Chironomus dilutus, and a unionid mussel Lampsilis siliquoidea to a toxic sediment

    Science.gov (United States)

    Ingersoll, Christopher G.; Kunz, James L.; Hughes, Jamie P.; Wang, Ning; Ireland, D. Scott; Mount, David R.; Hockett, J. Russell; Valenti, Ted W

    2015-01-01

    The objective of the present study was to evaluate the relative sensitivity of test organisms in exposures to dilutions of a highly toxic sediment contaminated with metals and organic compounds. One dilution series was prepared using control sand (low total organic carbon [TOC; TOC [∼10% TOC, higher binding capacity for contaminants]). Test organisms included an amphipod (Hyalella azteca; 10-d and 28-d exposures), a midge (Chironomus dilutus; 20-d and 48-d exposures started with <1-h-old larvae, and 13-d and 48-d exposures started with 7-d-old larvae), and a unionid mussel (Lampsilis siliquoidea; 28-d exposures). Relative species sensitivity depended on the toxicity endpoint and the diluent. All 3 species were more sensitive in sand dilutions than in West Bearskin Lake sediment dilutions. The <1-h-old C. dilutus were more sensitive than 7-d-old C. dilutus, but replicate variability was high in exposures started with the younger midge larvae. Larval biomass and adult emergence endpoints of C. dilutus exhibited a similar sensitivity. Survival, weight, and biomass of H. azteca were more sensitive endpoints in 28-d exposures than in 10-d exposures. Weight and biomass of L. siliquoidea were sensitive endpoints in both sand and West Bearskin Lake sediment dilutions. Metals, ammonia, oil, and other organic contaminants may have contributed to the observed toxicity.

  10. Analysis of iron gall inks by PIXE

    Energy Technology Data Exchange (ETDEWEB)

    Budnar, Milos [Jozef Stefan Institute, Jamova 39, p.p. 3000, SI-1001 Ljubljana (Slovenia)]. E-mail: milos.budnar@ijs.si; Ursic, Mitja [Jozef Stefan Institute, Jamova 39, p.p. 3000, SI-1001 Ljubljana (Slovenia); Simcic, Jure [Jozef Stefan Institute, Jamova 39, p.p. 3000, SI-1001 Ljubljana (Slovenia); Pelicon, Primoz [Jozef Stefan Institute, Jamova 39, p.p. 3000, SI-1001 Ljubljana (Slovenia); Kolar, Jana [National University Library, Turjaska 1, SI-1000 Ljubljana (Slovenia); Selih, Vid Simon [University of Ljubljana, Faculty of Chemistry and Chemical Technology, Askerceva 5, SI-1000 Ljubljana (Slovenia); Strlic, Matija [University of Ljubljana, Faculty of Chemistry and Chemical Technology, Askerceva 5, SI-1000 Ljubljana (Slovenia)

    2006-02-15

    Micro- or non-destructive analytical approach is an imperative when analysing historical artefacts. Due to its practically non-destructive character, proton induced X-ray spectrometry (PIXE) has become a method of choice for the study of historical documents. In the present paper, use of in-air PIXE method for analysis of iron gall inks applied at handwriting of documents is evaluated. The errors arising from the non-uniform ink deposit, proton penetration depth and size of the proton beam versus width of ink lines, effects of surface roughness, as well as the importance of the PIXE set-up geometry on the accuracy of the results are discussed. It follows that the main problems can be attributed to the fact that PIXE is a surface technique and that the analysis is limited to a small amount of material, while ink deposit on the paper is usually non-uniform in depth as well as on the paper surface. Despite possible systematic uncertainties when applying the PIXE method, good correlation between determinations obtained by PIXE and atomic absorption spectroscopy (AAS) on model samples clearly demonstrate that the errors are well within a reasonable limit of a few percents.

  11. Analysis of iron gall inks by PIXE

    International Nuclear Information System (INIS)

    Budnar, Milos; Ursic, Mitja; Simcic, Jure; Pelicon, Primoz; Kolar, Jana; Selih, Vid Simon; Strlic, Matija

    2006-01-01

    Micro- or non-destructive analytical approach is an imperative when analysing historical artefacts. Due to its practically non-destructive character, proton induced X-ray spectrometry (PIXE) has become a method of choice for the study of historical documents. In the present paper, use of in-air PIXE method for analysis of iron gall inks applied at handwriting of documents is evaluated. The errors arising from the non-uniform ink deposit, proton penetration depth and size of the proton beam versus width of ink lines, effects of surface roughness, as well as the importance of the PIXE set-up geometry on the accuracy of the results are discussed. It follows that the main problems can be attributed to the fact that PIXE is a surface technique and that the analysis is limited to a small amount of material, while ink deposit on the paper is usually non-uniform in depth as well as on the paper surface. Despite possible systematic uncertainties when applying the PIXE method, good correlation between determinations obtained by PIXE and atomic absorption spectroscopy (AAS) on model samples clearly demonstrate that the errors are well within a reasonable limit of a few percents

  12. The Efficient Extraction of Phenolic Compounds from Oak Gall Using a Miniaturized Matrix Solid-Phase Dispersion Method before their HPLC Determination

    Directory of Open Access Journals (Sweden)

    Ahmad Daneshfar

    2017-06-01

    Conclusion: The proposed technique is simple and fast. It substantially reduced the amounts of sample, sorbent and organic solvents required for the extraction. The maximum amounts of the phenolic compounds were found in Qalqaf and Bramazu galls.

  13. Three types of gall-bladder motility at men with chronic cholecystitis and pyelonephritis and accompanying their parameters of kidney excretory function as well as metabolism

    Directory of Open Access Journals (Sweden)

    Oksana M Ivanyts’ka

    2018-04-01

    Full Text Available Background. Previously it has been shown that balneotherapy in the spa Truskavets’ (Ukraїna in men with chronic cholecystitis combined with pyelonephritis causes changes in gall-bladder motility. This is combined with changes in diurese and urinary excretion of metabolites.Individual analysis revealed not only quantitative but also qualitative differences in the postprandial motility of the gall-bladder. The purpose of this study is to identify the parameters of kidney excretory function as well as metabolism under which three types of the gall-bladdermotility skills differ significantly from each other. Materialandmethods. The object of observationwere the same ones 22men aged24-70 years old,who cameto the spaTruskavets’ for the treatment of chronic cholecystitiscombined withpyelonephritis inremission. On thetone and motility of gall-bladder judged byits fasting and postprandial volume (echocamera “Radmir”. In the daily  determined content of oxalate and nitrogen metabolites: creatinine, urea and uric acid, electrolytes: phosphates, chloride, calcium, magnesium, potassium and sodium. Nitrogenous metabolites in plasma of venous blood were determined also. The survey was conducted twice, before and after balneotherapy. Results. The method of cluster analysis has formed three homogeneous cholekinetics groups, namely:normokinesia as well as hypertonic-hyperkinetic and hyperkinetic-hypertonic dyskinesia.The method of discriminatory analysis revealed 13 parameters of daily urine and three parameters of blood, as well as body weight and height, electrokinetic index and Kerdoe’s index, in the totality of which three types of cholekinetics are clearly delineated.Conclusion. The type of postprandial cholekinetics is naturally associated with a number of parameters of the excretory renal function and metabolism.

  14. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  15. Antioxidant, mutagenic and antimutagenic activities of an aqueous extract of Limoniastrum guyonianum gall.

    Science.gov (United States)

    Krifa, Mounira; Bouhlel, Ines; Skandrani, Ines; Chekir-Ghedira, Leila; Ghedira, Kamel

    2014-01-01

    An aqueous extract of Limoniastrum guyonianum gall (G extract) was tested on Salmonella typhimurium to assess its mutagenic and antimutagenic effects. This extract showed no mutagenicity when tested with S. typhimurium strain TA104 either with or without exogenous metabolic activation mixture (S9), whereas our findings revealed that the aqueous gall extract induced a mutagenic effect in S. typhimurium TA1538 when tested in the presence, as well as in the absence, of S9 activation mixture at the concentration of 500 µg/mL. Thus, the same concentration produced a mutagenic effect, when incubated with S. typhimurium TA100 in the presence of metabolic activation mixture. In contrast, our results showed a weak antimutagenic potential of the same extract against sodium azide in the presence of S. typhimurium TA100 and S. typhimurium TA1538 without metabolic activation (S9), whereas, in the presence of S. typhimurium TA104, we obtained a significant inhibition percentage (76.39%) toward 3.25 µg/plate of methylmethanesulfonate. Antimutagenicity against aflatoxin B1, 4-nitro-o-phenylene-diamine and 2-aminoanthracène was significant, with an inhibition percentage of, respectively, 70.63, 99.3 and 63.37% in the presence of, respectively, S. typhimurium TA100, S. typhimurium TA1538 and S. typhimurium TA104 strains at a concentration of 250 µg/plate after metabolic activation (S9). Antioxidant capacity of the tested extract was evaluated using the enzymatic (xanthine/xanthine oxidase assay) and the nonenzymatic (2,2-diphenyl-1-picrylhydrazyl) system. G extract exhibited high antioxidant activity.

  16. Widespread IgE-mediated hypersensitivity in the Sudan to the 'green nimitti' midge, Cladotanytarsus lewisi (Diptera: Chironomidae) II. Identification of a major allergen.

    Science.gov (United States)

    Gad El Rab, M O; Thatcher, D R; Kay, A B

    1980-01-01

    A major allergen has been identified in an aqueous extract of the 'green nimitti' midge, Cladotanytarsus lewisi (Diptera: Chironomidae). Following chromatography on Sephadex G-100 allergenic activity, as assessed by skin ('prick') testing, eluted as two closely related peaks (pools I and II) at about 50% bed volume. When these pools were applied separately to columns of CM-cellulose, activity in each eluted with 0 . 05 M NaCl. Isoelectric focusing of the unfractionated allergen gave a single peak of activity at pI 4 . 3. By SDS--PAGE, biological activity in the whole 'green nimitti' extract and the material eluting from both pools I and II of the Sephadex G-100 column migrated to the same positions and were associated with a molecular size of 15,000--20,000 daltons. Skin test reactivity of the unfractionated material and the Sephadex G-100 pool I and II eluates were all destroyed following incubation with trypsin, chymotrypsin, thermolysin and neuraminidase. These experiments indicate that a major allergen derived from the 'green nimitti' midge, a cause of widespread and severe immediate-type allergy in the Sudan, is an acidic glycoprotein of 15,000--20,000 molecular weight. Images Fig. 3 PMID:7438559

  17. An observational study on the association of nonalcoholic fatty liver disease and metabolic syndrome with gall stone disease requiring cholecystectomy

    Directory of Open Access Journals (Sweden)

    Farah Ahmed

    2017-05-01

    Conclusion: We found association of metabolic syndrome with gallstones and NAFLD. Non alcoholic fatty liver was highly prevalent in our study subjects. Huge percentage of first degree relatives of gall stone patients had gallstones and this relation was more pronounced patients who had associated NAFLD.

  18. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  19. Impacts of Mechanical Macrophyte Removal Devices on Sediment Scouring in Littoral Habitats: II. Experimental Operation in the Littoral Zone of Eau Galle Reservoir, Wisconsin

    National Research Council Canada - National Science Library

    James, William F; Wright, David I; Barko, John W; Eakin, Harry L

    2006-01-01

    ... in Eau Galle Reservoir, Wisconsin. Mechanical macrophyte removal devices are an attractive, low-cost means of removing macrophytes in specific areas without herbicides or repeated mechanical harvesting...

  20. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  1. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  2. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  3. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  4. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  5. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  6. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  7. Shallot aphids, Myzus ascalonicus, in strawberry

    DEFF Research Database (Denmark)

    Enkegaard, Annie; Sigsgaard, Lene; Kristensen, Kristian

    2013-01-01

    The parasitization capacity of 3 parasitoids and the predation capacity of 3 predators towards the shallot aphid, Myzus ascalonicus Doncaster (Homoptera: Aphididae), on strawberry, Fragaria x ananassa Duchesne (Rosales: Rosaceae) cv. Honeoye, were examined in laboratory experiments. In Petri dish...... other parasitoid-induced causes. However, the host feeding rate was reduced to only 1.2 ± 0.8%, and no significant parasitization mortality was observed on strawberry plants, suggesting that host plants interfered with A. abdominalis activity. This parasitoid does not, therefore, seem to be suited...... to either inoculative or inundative biocontrol of shallot aphids in strawberry. The three predators studied were the green lacewing, Chrysoperla carnea Steph. (Neuroptera: Chrysopi-dae), the two-spotted lady beetle, Adalia bipunctata L. (Coleoptera: Coccinellidae), and the gall midge Aphidoletes aphidimyza...

  8. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  9. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  10. Galling Resistance of An Anti-friction Coating on Oil-casing Couplings

    Directory of Open Access Journals (Sweden)

    Zhao Shilong

    2016-01-01

    Full Text Available Generally, oil tubing and casing connections made of carbon steel are connected using phosphate-treated coupling, but high-grade steel oil casing can only be connected using copperized couplings, which are expensive and result in environmental pollution. A new anti-friction coating was prepared by adding suitable amounts of nanoparticles into a highly pure and concentrated nano-copper suspension, with epoxy resin as a binder. Laboratory tests and full-scale make and break tests show that a heterogeneous copper layer is formed after curing when this coating was applied to the phosphate layer surface of couplings made of P110 and P110S casings. This can greatly reduce the make-up torque of casing thread, and can effectively improve or even eliminate galling of high-grade steel oil casing.

  11. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  12. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  13. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  14. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  15. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  16. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  17. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  18. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  19. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  20. Life cycle responses of the midge Chironomus riparius to polycyclic aromatic compound exposure

    Energy Technology Data Exchange (ETDEWEB)

    Paumen, Miriam Leon [Department of Aquatic Ecology and Ecotoxicology, Institute of Biodiversity and Ecosystem Dynamics (IBED), University of Amsterdam, Kruislaan 320, 1098 SM Amsterdam (Netherlands)], E-mail: mleon@science.uva.nl; Borgman, Eefje [Department of Aquatic Ecology and Ecotoxicology, Institute of Biodiversity and Ecosystem Dynamics (IBED), University of Amsterdam, Kruislaan 320, 1098 SM Amsterdam (Netherlands); Kraak, Michiel H.S. [Department of Aquatic Ecology and Ecotoxicology, Institute of Biodiversity and Ecosystem Dynamics (IBED), University of Amsterdam, Kruislaan 320, 1098 SM Amsterdam (Netherlands)], E-mail: castella@science.uva.nl; Gestel, Cornelis A.M. van [Department of Animal Ecology, Institute of Ecological Sciences (IEW), Vrije Universiteit Amsterdam, de Boelelaan 1085, 1081 HV Amsterdam (Netherlands)], E-mail: kees.van.gestel@falw.vu.nl; Admiraal, Wim [Department of Aquatic Ecology and Ecotoxicology, Institute of Biodiversity and Ecosystem Dynamics (IBED), University of Amsterdam, Kruislaan 320, 1098 SM Amsterdam (Netherlands)

    2008-03-15

    During acute exposure, polycyclic aromatic compounds (PACs) act mainly by narcosis, but during chronic exposure the same compounds may exert sublethal life cycle effects. The aim of this study was therefore to evaluate the chronic effects of sediment spiked PACs on the emergence of the midge Chironomus riparius. Three isomer pairs were selected, and 28-day LC{sub 50} values and 50% emergence times (EMt{sub 50}) were determined. Concentration-response relationships were observed for phenanthrene, acridine, phenanthridine and acridone. Anthracene and phenanthridone had no effect on total emergence, but did cause a delay in emergence. Calculated porewater LC{sub 50} values correlated well with logK{sub ow} values, suggesting narcosis as mode of action. In contrast, effect concentrations for delay in emergence (EMt{sub 50}) deviated from narcosis, suggesting a specific mode of action during chronic exposure. It is concluded that emergence is a powerful endpoint to detect life cycle effects of PACs on a key sediment inhabiting invertebrate. - Emergence of Chironomus riparius is a sensitive endpoint to detect life cycle effects of PACs.

  1. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  2. An observational study on the association of nonalcoholic fatty liver disease and metabolic syndrome with gall stone disease requiring cholecystectomy.

    Science.gov (United States)

    Ahmed, Farah; Baloch, Qamaruddin; Memon, Zahid Ali; Ali, Iqra

    2017-05-01

    Recognition of Non alcoholic fatty liver disease (NAFLD) and metabolic syndrome in patients with gallstones undergoing laparoscopic or open cholecystectomy, along with it we will also study the life style of patients with gall stones. Patients with gallstones have associated NAFLD, with concurrent metabolic syndrome and these ailments share similar factors for example obesity, hypertriglyceridemia and diabetes mellitus. Factors like body mass index, gender, raised lipid levels, use of contraceptives and alcohol and having diabetes, physical inactiveness, multiparous women, water with excessive iron content, metabolic syndrome, and NAFLD are accountable factors for gallstones formation. This was a case series done at Surgical Unit 1 of Civil Hospital Karachi. Selective samples of 88 patients were included. Duration was 3 months. We included both sexes with ultrasound proof of gall stone irrespective of cholecystitis. Excluded patients with history of seropositive viral hepatitis, autoimmune and wilson's disease. As these conditions can act as a confounder to our variables. Nafld was present in 62.5%(n = 55) while 28.4% (n = 25) had metabolic syndrome. 26.94% had BMI less than 18, 32.12 had BMI between 18 and 25 and majority had BMI greater than 25 i.e in 40.93%. Of all 46.6% had a family history of cholelithiasis. Gallstone patients with NAFLD reported about their first degree relative being suffering from cholelithiasis at a significant p-value of 0.034 while this was not significant in cases of metabolic syndrome and the p -value was 0.190. We found association of metabolic syndrome with gallstones and NAFLD. Non alcoholic fatty liver was highly prevalent in our study subjects. Huge percentage of first degree relatives of gall stone patients had gallstones and this relation was more pronounced patients who had associated NAFLD.

  3. Plant diversity and galling arthropod diversity searching for taxonomic patterns in an animal-plant interaction in the Neotropics Diversidade de plantas e diversidade de artrópodes galhadores procurando padrões taxonômicos numa interação animal-planta nos Neotrópicos

    Directory of Open Access Journals (Sweden)

    Milton de Souza Mendonça, Jr.

    Full Text Available Gall-inducers are a special guild of endophytic herbivores generating distinct structures known as galls. Gallers are species-specific, as the galls they induce: each gall morphotype is unique. The relationship between plants and gallers is close, and some of the hypotheses to explain galling diversity consider plants directly; others do not. Here I review current diversity hypotheses on galls and their hosts, adding ideas on the interpretation of galler host plant data. The example comes from an ongoing standardised inventory of galls and hosts in Rio Grande do Sul (RS state, southern Brazil. The questions addressed here are whether: a galls occur consistently on some plant taxa in different areas, b these taxa are important for vegetation composition, and c taxon size influences galling richness. Families harbouring more gallers are usually the same throughout the Neotropics (Fabaceae, Myrtaceae, and in RS, Asteraceae, which is not unexpected as these are important components of vegetation. Larger plant families have more galls, a pattern driven by Asteraceae. At lower taxonomic levels, the dominance of a few taxa in galler richness («super-hosts» is higher. Mikania and Eugenia , for example, hold much more galls than others in the RS survey.Os galhadores são uma guilda especial de herbívoros endofíticos geradores de estruturas distintas, as galhas. Galhadores são espécie-específicos, como as galhas que induzem: cada morfotipo de galha é único. A relação entre plantas e galhadores é estreita; algumas das hipóteses para explicar a diversidade de galhadores consideram as plantas diretamente; outras não. Aqui são revistas as correntes hipóteses sobre a diversidade de galhadores e suas hospedeiras, adicionando idéias sobre a interpretação de dados dos hospedeiros. Os exemplos advêm de um inventário de galhas no Estado do Rio Grande do Sul (RS, sul do Brasil. As questões aqui são: a as galhas ocorrem consistentemente em

  4. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  5. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  6. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  7. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  8. Determinants of abundance and effects of blood-sucking flying insects in the nest of a hole-nesting bird.

    Science.gov (United States)

    Tomás, Gustavo; Merino, Santiago; Martínez-de la Puente, Josué; Moreno, Juan; Morales, Judith; Lobato, Elisa

    2008-05-01

    Compared to non-flying nest-dwelling ectoparasites, the biology of most species of flying ectoparasites and its potential impact on avian hosts is poorly known and rarely, if ever, reported. In this study we explore for the first time the factors that may affect biting midge (Diptera: Ceratopogonidae) and black fly (Diptera: Simuliidae) abundances in the nest cavity of a bird, the hole-nesting blue tit Cyanistes caeruleus, and report their effects on adults and nestlings during reproduction. The abundance of biting midges was positively associated with nest mass, parental provisioning effort and abundance of blowflies and black flies, while negatively associated with nestling condition. Furthermore, a medication treatment to reduce blood parasitaemias in adult birds revealed that biting midges were more abundant in nests of females whose blood parasitaemias were experimentally reduced. This finding would be in accordance with these insect vectors attacking preferentially uninfected or less infected hosts to increase their own survival. The abundance of black flies in the population was lower than that of biting midges and increased in nests with later hatching dates. No significant effect of black fly abundance on adult or nestling condition was detected. Blood-sucking flying insects may impose specific, particular selection pressures on their hosts and more research is needed to better understand these host-parasite associations.

  9. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  10. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  11. Gall-forming insects in a lowland tropical rainforest: low species diversity in an extremely specialised quild

    Czech Academy of Sciences Publication Activity Database

    Butterill, Philip T.; Novotný, Vojtěch

    2015-01-01

    Roč. 40, č. 4 (2015), s. 409-419 ISSN 0307-6946 R&D Projects: GA ČR GA13-10486S Grant - others:European Social Fund(CZ) CZ.1.07/2.3.00/20.0064; National Science Foundation(US) DEB 0515678; UK Darwin Initiative for the Survival Species(GB) 14/054 Institutional support: RVO:60077344 Keywords : gall-forming insects * host specificity * Papua New Guinea Subject RIV: EH - Ecology, Behaviour Impact factor: 1.687, year: 2015 http://onlinelibrary.wiley.com/doi/10.1111/een.12198/abstract

  12. 77 FR 14446 - Changes to the Generic Aging Lessons Learned (GALL) Report Revision 2 AMP XI.M41, “Buried and...

    Science.gov (United States)

    2012-03-09

    ...) Report Revision 2 AMP XI.M41, ``Buried and Underground Piping and Tanks'' AGENCY: Nuclear Regulatory...), LR- ISG-2011-03, ``Changes to GALL Report Revision 2 Aging Management Program (AMP) XI.M41, `Buried... Report Revision 2 AMP XI.M41 based on the staff's review of several license renewal applications' buried...

  13. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  14. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  15. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  16. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  17. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  18. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  19. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  20. A novel phytomyxean parasite associated with galls on the bull-kelp Durvillaea antarctica (Chamisso) Hariot.

    Science.gov (United States)

    Goecke, Franz; Wiese, Jutta; Núñez, Alejandra; Labes, Antje; Imhoff, Johannes F; Neuhauser, Sigrid

    2012-01-01

    Durvillaea antarctica (Fucales, Phaeophyceae) is a large kelp of high ecological and economic significance in the Southern Hemisphere. In natural beds along the central coast of Chile (Pacific Ocean), abnormal growth characterized by evident gall development and discolorations of the fronds/thallus was observed. Analysing these galls by light microscopy and scanning electron microscopy revealed the presence of endophytic eukaryotes showing typical characteristics for phytomyxean parasites. The parasite developed within enlarged cells of the subcortical tissue of the host. Multinucleate plasmodia developed into many, single resting spores. The affiliation of this parasite to the Phytomyxea (Rhizaria) was supported by 18S rDNA data, placing it within the Phagomyxida. Similar microorganisms were already reported once 23 years ago, indicating that these parasites are persistent and widespread in D. antarctica beds for long times. The symptoms caused by this parasite are discussed along with the ecological and economic consequences. Phytomyxean parasites may play an important role in the marine ecosystem, but they remain understudied in this environment. Our results demonstrate for the first time the presence of resting spores in Phagomyxida, an order in which resting spores were thought to be absent making this the first record of a phagomyxean parasite with a complete life cycle so far, challenging the existing taxonomic concepts within the Phytomyxea. The importance of the here described resting spores for the survival and ecology of the phagomyxid parasite will be discussed together with the impact this parasite may have on 'the strongest seaweed of the world', which is an important habitat forming and economic resource from the Southern Hemisphere.

  1. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  2. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. Evaluation of Analgesic Activity of the Methanol Extract from the Galls of Quercus infectoria (Olivier in Rats

    Directory of Open Access Journals (Sweden)

    Sook-Ha Fan

    2014-01-01

    Full Text Available The present study aims to investigate the analgesic activity of the methanol extract of the galls of Quercus infectoria in rats using hot plate and tail-flick methods. The extract was administered intraperitoneally at a dose of 20 mg/kg while morphine sulfate and sodium salicylate (10 mg/kg served as standards. The methanol extract exhibited significant analgesic activity in the tail-flick model (P<0.05 by increasing the reaction time of the rats to 8.0 sec at 30 min after treatment in comparison to control (4.4 sec. Morphine sulfate produced a reaction time of 11.9 sec in the same test. At the peak of activity (30 min, the extract produced maximum possible analgesia (MPA of 34.2%, whilst morphine sulfate achieved a peak MPA of 70.9%. No analgesic effects have been observed using sodium salicylate in the tail-flick model. In the same model, the extract and sodium salicylate demonstrated comparable reaction times. Tail-flick is a better method to evaluate analgesic activity as no significant results were observed for all treatments using hot plate with the exception of morphine sulfate, which showed significant results only at 45 and 60 min after treatment. In conclusion, the methanol extract of the galls of Quercus infectoria displayed analgesic activity.

  4. Expression of putative expansin genes in phylloxera (Daktulosphaira vitifoliae Fitch) induced root galls of Vitis spp.

    Science.gov (United States)

    Lawo, N C; Griesser, M; Forneck, A

    Grape phylloxera ( Daktulosphaira vitifoliae Fitch) is a serious global pest in viticulture. The insects are sedentary feeders and require a gall to feed and reproduce. The insects induce their feeding site within the meristematic zone of the root tip, where they stay attached, feeding both intra- and intercellularly, and causing damage by reducing plant vigour. Several changes in cell structure and composition, including increased cell division and tissue swelling close to the feeding site, cause an organoid gall called a nodosity to develop. Because alpha expansin genes are involved in cell enlargement and cell wall loosening in many plant tissues it may be anticipated that they are also involved in nodosity formation. To identify expansin genes in Vitis vinifera cv. Pinot noir , we mined for orthologues genes in a comparative analysis. Eleven putative expansin genes were identified and shown to be present in the rootstock Teleki 5C ( V. berlandieri Planch. x V. riparia Michx.) using specific PCR followed by DNA sequencing. Expression analysis of young and mature nodosities and uninfested root tips were conducted via quantitative real time PCR (qRT-PCR). Up-regulation was measured for three putative expansin genes (VvEXPA15, -A17 and partly -A20) or down-regulation for three other putative genes (VvEXPA7, -A12, -A20) in nodosities. The present study clearly shows the involvement of putative expansin genes in the phylloxera-root interaction.

  5. For t 2 DNA vaccine prevents Forcipomyia taiwana (biting midge) allergy in a mouse model.

    Science.gov (United States)

    Lee, M-F; Song, P-P; Lin, T-M; Chiu, Y-T; Chen, Y-H

    2016-04-01

    Forcipomyia taiwana (biting midge) is the most prevalent allergenic biting insect in Taiwan, and 60% of the exposed subjects develop allergic reactions. Subjects with insect allergy frequently limit their outdoor activities to avoid the annoyingly intense itchy allergic reactions, leading to significant worsening of their quality of life. Allergen-specific immunotherapy is the only known therapy that provides long-term host immune tolerance to the allergen, but is time-consuming and cumbersome. This study tested whether the For t 2 DNA vaccine can prevent allergic symptoms in For t 2-sensitized mice. Two consecutive shots of For t 2 DNA vaccine were given to mice with a 7-day interval before sensitization with recombinant For t 2 proteins, using the two-step sensitization protocol reported previously. The For t 2 DNA vaccine at 50 μg prevented the production of For t 2-specific IgE (P allergy in the future. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  6. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  7. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  8. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  9. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  10. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  11. Comparison of single- and multi-scale models for the prediction of the Culicoides biting midge distribution in Germany

    Directory of Open Access Journals (Sweden)

    Renke Lühken

    2016-05-01

    Full Text Available This study analysed Culicoides presence-absence data from 46 sampling sites in Germany, where monitoring was carried out from April 2007 until May 2008. Culicoides presence-absence data were analysed in relation to land cover data, in order to study whether the prevalence of biting midges is correlated to land cover data with respect to the trapping sites. We differentiated eight scales, i.e. buffer zones with radii of 0.5, 1, 2, 3, 4, 5, 7.5 and 10 km, around each site, and chose several land cover variables. For each species, we built eight single-scale models (i.e. predictor variables from one of the eight scales for each model based on averaged, generalised linear models and two multiscale models (i.e. predictor variables from all of the eight scales based on averaged, generalised linear models and generalised linear models with random forest variable selection. There were no significant differences between performance indicators of models built with land cover data from different buffer zones around the trapping sites. However, the overall performance of multi-scale models was higher than the alternatives. Furthermore, these models mostly achieved the best performance for the different species using the index area under the receiver operating characteristic curve. However, as also presented in this study, the relevance of the different variables could significantly differ between various scales, including the number of species affected and the positive or negative direction. This is an even more severe problem if multi-scale models are concerned, in which one model can have the same variable at different scales but with different directions, i.e. negative and positive direction of the same variable at different scales. However, multi-scale modelling is a promising approach to model the distribution of Culicoides species, accounting much more for the ecology of biting midges, which uses different resources (breeding sites, hosts, etc. at

  12. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  13. First record of Platygaster luteipes Buhl (Hymenoptera Platygastridae) from leaf galls on black pepper along with first report of the species from India

    DEFF Research Database (Denmark)

    Anjana, M.; Rajmohana, K.; Buhl, Peter Neerup

    2016-01-01

    Platygaster luteipes Buhl (Hymenoptera: Platygastridae) is reported for the first time from India. Several specimens of both sexes of the species were reared from the globular galls on mature leaves of black pepper. The hitherto undescribed male of the species is characterized and illustrated....

  14. Long-lasting complete response status of advanced stage IV gall bladder cancer and colon cancer after combined treatment including autologous formalin-fixed tumor vaccine: two case reports.

    Science.gov (United States)

    Imaoka, Yuki; Kuranishi, Fumito; Miyazaki, Tsubasa; Yasuda, Hiroko; Ohno, Tadao

    2017-09-11

    The prognosis of advanced (stage IV) cancer of the digestive organs is very poor. We have previously reported a case of advanced breast cancer with bone metastasis that was successfully treated with combined treatments including autologous formalin-fixed tumor vaccine (AFTV). Herein, we report the success of this approach in advanced stage IV (heavily metastasized) cases of gall bladder cancer and colon cancer. Case 1: A 61-year-old woman with stage IV gall bladder cancer (liver metastasis and lymph node metastasis) underwent surgery in May 2011, including partial resection of the liver. She was treated with AFTV as the first-line adjuvant therapy, followed by conventional chemotherapy. This patient is still alive without any recurrence, as confirmed with computed tomography, for more than 5 years. Case 2: A 64-year-old man with stage IV colon cancer (multiple para-aortic lymph node metastases and direct abdominal wall invasion) underwent non-curative surgery in May 2006. Following conventional chemotherapy, two courses of AFTV and radiation therapy were administered sequentially. This patient has had no recurrence for more than 5 years. We report the success of combination therapy including AFTV in cases of liver-metastasized gall bladder cancer and abdominal wall-metastasized colon cancer. Both patients experienced long-lasting, complete remission. Therefore, combination therapies including AFTV should be considered in patients with advanced cancer of the digestive organs.

  15. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  16. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  17. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  18. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  19. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  20. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  1. Revealing the inventory of type III effectors in Pantoea agglomerans gall-forming pathovars using draft genome sequences and a machine-learning approach.

    Science.gov (United States)

    Nissan, Gal; Gershovits, Michael; Morozov, Michael; Chalupowicz, Laura; Sessa, Guido; Manulis-Sasson, Shulamit; Barash, Isaac; Pupko, Tal

    2018-02-01

    Pantoea agglomerans, a widespread epiphytic bacterium, has evolved into a hypersensitive response and pathogenicity (hrp)-dependent and host-specific gall-forming pathogen by the acquisition of a pathogenicity plasmid containing a type III secretion system (T3SS) and its effectors (T3Es). Pantoea agglomerans pv. betae (Pab) elicits galls on beet (Beta vulgaris) and gypsophila (Gypsophila paniculata), whereas P. agglomerans pv. gypsophilae (Pag) incites galls on gypsophila and a hypersensitive response (HR) on beet. Draft genome sequences were generated and employed in combination with a machine-learning approach and a translocation assay into beet roots to identify the pools of T3Es in the two pathovars. The genomes of the sequenced Pab4188 and Pag824-1 strains have a similar size (∼5 MB) and GC content (∼55%). Mutational analysis revealed that, in Pab4188, eight T3Es (HsvB, HsvG, PseB, DspA/E, HopAY1, HopX2, HopAF1 and HrpK) contribute to pathogenicity on beet and gypsophila. In Pag824-1, nine T3Es (HsvG, HsvB, PthG, DspA/E, HopAY1, HopD1, HopX2, HopAF1 and HrpK) contribute to pathogenicity on gypsophila, whereas the PthG effector triggers HR on beet. HsvB, HsvG, PthG and PseB appear to endow pathovar specificities to Pab and Pag, and no homologous T3Es were identified for these proteins in other phytopathogenic bacteria. Conversely, the remaining T3Es contribute to the virulence of both pathovars, and homologous T3Es were found in other phytopathogenic bacteria. Remarkably, HsvG and HsvB, which act as host-specific transcription factors, displayed the largest contribution to disease development. © 2016 BSPP AND JOHN WILEY & SONS LTD.

  2. A novel phytomyxean parasite associated with galls on the bull-kelp Durvillaea antarctica (Chamisso Hariot.

    Directory of Open Access Journals (Sweden)

    Franz Goecke

    Full Text Available Durvillaea antarctica (Fucales, Phaeophyceae is a large kelp of high ecological and economic significance in the Southern Hemisphere. In natural beds along the central coast of Chile (Pacific Ocean, abnormal growth characterized by evident gall development and discolorations of the fronds/thallus was observed. Analysing these galls by light microscopy and scanning electron microscopy revealed the presence of endophytic eukaryotes showing typical characteristics for phytomyxean parasites. The parasite developed within enlarged cells of the subcortical tissue of the host. Multinucleate plasmodia developed into many, single resting spores. The affiliation of this parasite to the Phytomyxea (Rhizaria was supported by 18S rDNA data, placing it within the Phagomyxida. Similar microorganisms were already reported once 23 years ago, indicating that these parasites are persistent and widespread in D. antarctica beds for long times. The symptoms caused by this parasite are discussed along with the ecological and economic consequences. Phytomyxean parasites may play an important role in the marine ecosystem, but they remain understudied in this environment. Our results demonstrate for the first time the presence of resting spores in Phagomyxida, an order in which resting spores were thought to be absent making this the first record of a phagomyxean parasite with a complete life cycle so far, challenging the existing taxonomic concepts within the Phytomyxea. The importance of the here described resting spores for the survival and ecology of the phagomyxid parasite will be discussed together with the impact this parasite may have on 'the strongest seaweed of the world', which is an important habitat forming and economic resource from the Southern Hemisphere.

  3. Persistent bacteraemia caused by Staphylococcus aureus in the gall bladder.

    Science.gov (United States)

    Yu, Alexander Tin Han; Cun, Tony; Benamu, Esther; Renault, Cybele

    2017-11-08

    Staphylococcus aureus bacteraemia (SAB) remains a complex disease with a high associated morbidity and mortality, especially when it is able to establish an occult nidus safe from antimicrobial eradication. Without rapid identification and intervention, the nidus can cause persistent relapse of disease, morbidity and mortality. Having a high clinical suspicion for the foci of occult S. aureus is important, and awareness of potential sites of infection is critical and can be life-saving.We present a unique case of a 65-year-old man with end-stage renal disease receiving haemodialysis who developed septic shock from SAB. Despite 18 days of appropriate antibiotics, the patient had persistent high-grade bacteraemia until his gall bladder was ultimately percutaneously drained. The day after drainage, he cleared his blood cultures, although he ultimately passed away as he decided to transition his care to focus on comfort measures. © BMJ Publishing Group Ltd (unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  4. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  5. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  6. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  7. Duodeno gastric reflux in peptic ulcer disease: gall bladder emptying provoked by cholecystokinin or a fatty meal

    International Nuclear Information System (INIS)

    Harding, L.K.; Donovan, I.A.; Mosimann, F.; Drumm, J.; Alexander-Williams, J.

    1986-01-01

    A wide range of incidence of diodeno-gastric bile reflux has been reported in patients with duodenal ulcer (DU) or gastric ulcer (GU). Using either 100 units of CCK i/v or a fatty meal of 320 Cal containing 20 g fat to contract the gall bladder, we have investigated the incidence of reflux in 170 subjects: CCK (Control: 20; DU: 60; GU: 19), Meal (Control: 19; DU: 37; GU: 15). The CCK or meal was given in the supine subject 30 minutes after injection of 75 MBq sup(99m)Tc diethyl Hida. Reflux was considered present if labelled bile was seen in the stomach on 3 successive 2 minute gamma camera pictures. The percentage of patients showing reflux was as follows: CCK (Control: 45%; DU: 53%; GU: 58%), Meal (Control: 11%; DU: 24%; GU: 40%). These results have been compared using the Chi-squared test. There was no significant difference in the incidence of reflux between control, DU or GU patients either in the group of patients given CCK or a meal. However, reflux was more common after CCK than the meal in control subjects (p<0.05) and in those with DU (p<0.01) but not in those with GU. We conclude that the stimulus given to contract the gall bladder affects the incidence of reflux, and that any significant difference in reflux incidence of DU or GU patients may become apparent when more patients are studied. (Author)

  8. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  9. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  10. Epidemiology of cancers of the liver, gall bladder, extrahepatic bile duct and pancreas in Nagasaki city from 1973 to 1982 with reference to atomic bomb exposure

    International Nuclear Information System (INIS)

    Takeshima, Fuminao; Shimokawa, Isao; Takashima, Kazuhiko

    1990-01-01

    This epidemiology study included 808 cases of liver cancers, 378 cases of gall bladder and extrahepatic bile duct cancer, and 312 cases of pancreas cancer registered at the Nagasaki Tumor Registry from 1973 to 1982, with emphasis on the relationship of these cancers to radiation exposure. The incidence of liver, gall bladder and extrahepatic bile duct cancer in both sexes tended to be higher in A-bomb survivors than in the nonexposed population, but were particularly significantly higher in male A-bomb survivors in each age-adjusted relative risk group. The incidence of pancreas cancer in females tended to be higher among A-bomb survivors than in the nonexposed population, and age-adjusted relative risk was significantly higher for female A-bomb survivors. No significant differences in relative distribution of histological type between exposed and nonexposed groups was observed. (author)

  11. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  12. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  13. Insects and Related Pests of Trees, Shrubs, and Lawns. MP-25R.

    Science.gov (United States)

    Spackman, Everett W.; Lawson, Fred A.

    This document discusses identification and control of the pests of trees and shrubs. The insects are grouped according to feeding habits and the type of damage caused to plants. Categories include the sucking insects and mites, leaf eating insects, pests attacking trunks and branches, and gall causing insects. (CS)

  14. A massive expansion of effector genes underlies gall-formation in the wheat pest Mayetiola destructor

    DEFF Research Database (Denmark)

    Zhao, Chaoyang; Escalante, Lucio Navarro; Chen, Hang

    2015-01-01

    Gall-forming arthropods are highly specialized herbivores that, in combination with their hosts, produce extended phenotypes with unique morphologies [1]. Many are economically important, and others have improved our understanding of ecology and adaptive radiation [2]. However, the mechanisms...... in plants and E3-ligase-mimicking effectors in plant pathogenic bacteria. SSGP-71 proteins and wheat Skp proteins interact in vivo. Mutations in different SSGP-71 genes avoid the effector-triggered immunity that is directed by the wheat resistance genes H6 and H9. Results point to effectors as the agents...

  15. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  16. Concurrent gall bladder, liver lobe torsion, and bile peritonitis in a German shepherd dog 2 months after gastric dilatation/volvulus gastropexy and splenectomy.

    Science.gov (United States)

    Tubby, Kurtis G

    2013-08-01

    Postmortem examination of a 7-year-old German shepherd dog which had gastric dilatation/volvulus and splenectomy 2 months earlier revealed that the right middle and quadrate liver lobes were diffusely congested and torsed. The gall bladder was grossly distended and torsed along its long axis and there was evidence of bile peritonitis.

  17. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  18. Culicoides (Diptera: Ceratopogonidae) midges, the vectors of African horse sickness virus--a host/vector contact study in the Niayes area of Senegal.

    Science.gov (United States)

    Fall, Moussa; Diarra, Maryam; Fall, Assane G; Balenghien, Thomas; Seck, Momar T; Bouyer, Jérémy; Garros, Claire; Gimonneau, Geoffrey; Allène, Xavier; Mall, Iba; Delécolle, Jean-Claude; Rakotoarivony, Ignace; Bakhoum, Mame T; Dusom, Ange M; Ndao, Massouka; Konaté, Lassana; Faye, Ousmane; Baldet, Thierry

    2015-01-21

    African horse sickness (AHS) is an equine disease endemic to Senegal. The African horse sickness virus (AHSV) is transmitted to the mammalian hosts by midges of the Culicoides Latreille genus. During the last epizootic outbreak of AHS in Senegal in 2007, 1,169 horses died from this disease entailing an estimated cost of 1.4 million euros. In spite of the serious animal health and economic implications of AHS, very little is known about determinants involved in transmission such as contact between horses and the Culicoides species suspected of being its vectors. The monthly variation in host/vector contact was determined in the Niayes area, Senegal, an area which was severely affected by the 2007 outbreak of AHS. A horse-baited trap and two suction light traps (OVI type) were set up at each of five sites for three consecutive nights every month for one year. Of 254,338 Culicoides midges collected 209,543 (82.4%) were female and 44,795 (17.6%) male. Nineteen of the 41 species collected were new distribution records for Senegal. This increased the number of described Culicoides species found in Senegal to 53. Only 19 species, of the 41 species found in light trap, were collected in the horse-baited trap (23,669 specimens) largely dominated by Culicoides oxystoma (22,300 specimens, i.e. 94.2%) followed by Culicoides imicola (482 specimens, i.e. 2.0%) and Culicoides kingi (446 specimens, i.e. 1.9%). Culicoides oxystoma should be considered as a potential vector of AHSV in the Niayes area of Senegal due to its abundance on horses and its role in the transmission of other Culicoides-borne viruses.

  19. The coral genus Caulastraea Dana, 1846 (Scleractinia, Merulinidae) as a new host for gall crabs (Decapoda, Cryptochiridae), with the description of Lithoscaptus tuerkayi sp. nov.

    NARCIS (Netherlands)

    van der Meij, Sancia E. T.

    2017-01-01

    A new gall crab species is described from the stony coral genus Caulastraea, a new host coral genus for Cryptochiridae crabs. Specimens were collected during fieldwork off Kudat (Malaysian Borneo) and Okinawa (Japan). Further material was retrieved from the collections of the Institute of

  20. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  1. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  2. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  3. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  4. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  5. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  6. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  7. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  8. First record of the oak gall wasp genus Neuroterus Hartig, 1840 (Hymenoptera, Cynipidae, Cynipini from Central America with description of three new species from Panama and Costa Rica

    Directory of Open Access Journals (Sweden)

    E. Medianero

    2017-05-01

    Full Text Available Three new species of Neuroterus Hartig, 1840 (Hymenoptera: Cynipidae: Cynipini are described from Panama and Costa Rica: Neuroterus elvisi sp. n., Neuroterus pulchrigalla sp. n., and Neuroterus glandiphilus sp. n. The new species are the first of the genus Neuroterus recorded from Central America and the Neotropical region. The new species induce galls on Quercus bumelioides Liebm. (Fagaceae, sect. Quercus, White Oaks. Additional evidence of the presence of other unidentified species of Neuroterus in the sampled area is presented. Diagnostic morphological characters, gall descriptions, distributions, host plant and other biological data of the new species are given and discussed. http://urn:lsid:zoobank.org:pub:48D0C1E1-1D0C-40D8-B890-FFC85AE7A213

  9. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  10. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  11. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  12. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  13. Insect herbivores associated with Baccharis dracunculifolia (Asteraceae: responses of gall-forming and free-feeding insects to latitudinal variation

    Directory of Open Access Journals (Sweden)

    Marcílio Fagundes

    2011-09-01

    Full Text Available The spatial heterogeneity hypothesis has been invoked to explain the increase in species diversity from the poles to the tropics: the tropics may be more diverse because they contain more habitats and microhabitats. In this paper, the spatial heterogeneity hypothesis prediction was tested by evaluating the variation in richness of two guilds of insect herbivores (gall-formers and free-feeders associated with Baccharis dracunculifolia (Asteraceae along a latitudinal variation in Brazil. The seventeen populations of B. dracunculifolia selected for insect herbivores sampling were within structurally similar habitats, along the N-S distributional limit of the host plant, near the Brazilian sea coast. Thirty shrubs were surveyed in each host plant population. A total of 8 201 galls and 864 free-feeding insect herbivores belonging to 28 families and 88 species were sampled. The majority of the insects found on B. dracunculifolia were restricted to a specific site rather than having ageographic distribution mirroring that of the host plant. Species richness of free-feeding insects was not affected by latitudinal variation corroborating the spatial heterogeneity hypothesis. Species richness of gall-forming insects was positively correlated with latitude, probably because galling insect associated with Baccharris genus radiated in Southern Brazil. Other diversity indices and evenness estimated for both gall-forming and free feeding insect herbivores, did not change with latitude, suggesting a general structure for different assemblages of herbivores associated with the host plant B. dracunculifolia. Thus it is probable that, insect fauna sample in each site resulted of large scale events, as speciation, migration and coevolution, while at local level, the population of these insects is regulated by ecological forces which operate in the system. Rev. Biol. Trop. 59 (3: 1419-1432. Epub 2011 September 01.La hipótesis de heterogeneidad espacial se ha

  14. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  15. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  16. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  17. Field evaluation of the efficacy and safety of a deltamethrin pour on formulation (Butox® 7.5 mg/ml pour on) for the control of Culicoides midges in sheep

    OpenAIRE

    Weiher, Wiebke

    2014-01-01

    Culicoides spp. (Diptera: Ceratopogonidae) are the main vectors of Bluetongue and Schmallenberg virus disease, which are infectious diseases of ruminants. Recently, both viral diseases occurred for the first time in Germany and caused substantial suffering and large economic losses, primarily in sheep flocks. None of the currently available insecticides is registered to control infestations with Culicoides midges in ruminants. This study aimed to assess the safety and efficacy of a pour on fo...

  18. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  19. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  20. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  1. Infection, Reproduction Potential, and Root Galling by Root-knot Nematode Species and Concomitant Populations on Peanut and Tobacco

    Science.gov (United States)

    Hirunsalee, Anan; Barker, K. R.; Beute, M. K.

    1995-01-01

    Single populations of Meloidogyne arenaria races 1 (MA1) and 2 (MA2) and M. hapla (MH), and mixed populations of MA1 + MA2 and MA1 + MH with four inoculum levels of eggs were tested on peanut cv. 'Florigiant' and M. incognita-resistant tobacco cv. 'McNair 373' in a greenhouse experiment. Root infection, female development, and reproduction of MA2 on peanut and MA1 on resistant tobacco were limited at 2 and 6 weeks. MA1, MH, and MA1 + MH on peanut had similar root infection (total parasitic forms per root unit) at both 2 and 6 weeks, and similar female development and reproduction potentials at 6 weeks. MA2 tended to depress root infection, female development, and reproduction of MA1 on peanut. MH had little effect on MA1 on this crop. On tobacco, MA2 population had greater incidence of root infection than did MH at 2 weeks. The two nematode species had similar development in roots at 6 weeks. All of these processes were restricted when either MA2 or MH was present together with MA1. As initial inoculum level of parasitically fit populations increased, relative infection ratio on both peanut and tobacco, and reproduction factor on peanut decreased. Populations that had high infection incidence and reproduction rates induced greater root galling than did other populations. Root galling was suppressed in the presence of antagonistic response between nematode populations. PMID:19277277

  2. A comparative analysis of genetic differentiation across six shared willow host species in leaf- and bud-galling sawflies.

    Directory of Open Access Journals (Sweden)

    Sanna A Leppänen

    Full Text Available Genetic divergence and speciation in plant-feeding insects could be driven by contrasting selection pressures imposed by different plant species and taxa. While numerous examples of host-associated differentiation (HAD have been found, the overall importance of HAD in insect diversification remains unclear, as few studies have investigated its frequency in relation to all speciation events. One promising way to infer the prevalence and repeatability of HAD is to estimate genetic differentiation in multiple insect taxa that use the same set of hosts. To this end, we measured and compared variation in mitochondrial COI and nuclear ITS2 sequences in population samples of leaf-galling Pontania and bud-galling Euura sawflies (Hymenoptera: Tenthredinidae collected from six Salix species in two replicate locations in northern Fennoscandia. We found evidence of frequent HAD in both species complexes, as individuals from the same willow species tended to cluster together on both mitochondrial and nuclear phylogenetic trees. Although few fixed differences among the putative species were found, hierarchical AMOVAs showed that most of the genetic variation in the samples was explained by host species rather than by sampling location. Nevertheless, the levels of HAD measured across specific pairs of host species were not correlated in the two focal galler groups. Hence, our results support the hypothesis of HAD as a central force in herbivore speciation, but also indicate that evolutionary trajectories are only weakly repeatable even in temporally overlapping radiations of related insect taxa.

  3. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  4. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  5. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  6. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  7. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  8. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  9. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  10. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  11. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  12. Trends in cancer of the liver, gall bladder, bile duct, and pancreas in elderly in Denmark, 1980-2012

    DEFF Research Database (Denmark)

    Bjerregaard, Jon Kroll; Mortensen, Michael Bau; Pfeiffer, Per

    2016-01-01

    , mortality, prevalence and relative survival for these cancers.Materials and methods HBP-c was defined as ICD-10 codes C22 (liver), C23-24 (gall bladder), and C25 (pancreas). Data derived from the NORDCAN database with comparable data on cancer incidence, mortality, prevalence and relative survival.......Conclusion As the number of persons aged 80 years or more will increase dramatically in the following years, and our results show a gap in relative survival, it is important to continue to study this population in order to improve management and outcome....

  13. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  14. Klippel-Feil syndrome with associated agenesis of lung and gall bladder presenting with asthma and allergic rhinitis

    International Nuclear Information System (INIS)

    Khanna, Puneet; Panjabi, Chandramani; Shah, Ashok

    2005-01-01

    Klippel-Feil syndrome (KFS), a triad of short neck, limitation of neck movement and low posterior hairline, is characterized by the presence of congenitally fused cervical vertebrae and is often associated with multiple congenital anomalies. A 35-year-old male was referred for evaluation of an 'opaque hemithorax'. This led to a diagnosis of KFS, agenesis of left lung and gall bladder. The patient had history of wheezing dyspnea with nasal symptoms, which were diagnosed as asthma and allergic rhinitis. A high index of suspicion is required to recognize such a patient, and efforts should be made to seek other congenital anomalies. (author)

  15. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  16. Ocorrência e caracterização de galhas entomógenas em uma área de floresta estacional semidecídua em Goiânia, Goiás, Brasil Occurrence and characterization of entomogenous galls in a seasonal semideciduous forest area in Goiânia, Goiás, Brazil

    Directory of Open Access Journals (Sweden)

    Benedito Baptista dos Santos

    2010-03-01

    Full Text Available Em uma área de floresta estacional semidecídua do Campus Samambaia da Universidade Federal de Goiás, Goiânia, Goiás foram coletados 34 tipos de galhas entomógenas, durante o período de 2005-2007. As galhas ocorreram em 20 espécies de plantas de 12 famílias, sendo Leguminosae (9, Styracaceae (6 e Ulmaceae (4 as que apresentaram o maior número de morfotipos de galhas. Galhas foliares e caulinares foram as mais comuns. Em relação à morfologia foram coletadas galhas globóides, discóides, elipsóides, cilíndricas e coniformes. A coloração variou entre o verde, amarela, marrom e vermelha. As galhas estavam agrupadas ou isoladas e eram glabras ou pilosas. Os Cecidomyiidae (Diptera foram os principais cecidógenos e os parasitóides encontrados pertenciam às famílias Eulophidae, Torymidae, Pteromalidae, Encyrtidae (Hymenoptera. Este é o primeiro relato de galhas em quatro espécies de plantas hospedeiras para a região Neotropical.In an area of seasonal semideciduous forest situated on Campus Samambaia of the Universidade Federal de Goiás in Goiânia, Goiás 34 types of insect galls were collected during the period 2005-2007. The galls occurred in 20 species of plants from 12 families, with Leguminosae (9, Styracaceae (6 and Ulmaceae (4 having the greatest number of gall morphotypes. Leaf and stem galls were the most widespread. Concerning gall morphology, the following were collected: globoid, discoidal, ellipsoidal, cylindrical and conical. The colour varied from green to yellow, brown and red. The galls were isolated or grouped and glabrous or pilose. The principal inducers were Cecidomyiidae (Diptera and the parasitoids found were of the families Eulophidae, Torymidae, Pteromalidae, Encyrtidae (Hymenoptera. This is the first report of galls in four species of host plants for the Neotropical region.

  17. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  18. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  19. Systemically applied insecticides for treatment of erythrina gall wasp, quadrastichus erythrinae kim hymenoptera: Eulophidae

    Science.gov (United States)

    Doccola, J.J.; Smith, S.L.; Strom, B.L.; Medeiros, A.C.; Von Allmen, E.

    2009-01-01

    Abstract The erythrina gall wasp (EGW), believed native to Africa, is a recently described species and now serious invasive pest of Erythrina (coral trees) in tropical and subtropical locales. Erythrina are favored ornamental and landscape trees, as well as native members of threatened ecosystems. The EGW is a tiny, highly mobile, highly invasive wasp that deforms (galls) host trees causing severe defoliation and tree death. The first detection of EGW in the United States was in O'ahu, Hawai'i in April 2005. It quickly spread through the Hawai'ian island chain (U.S.) killing ornamental and native Erythrina in as little as two years. At risk are endemic populations of Erythrinaas well as ornamental landscape species in the same genus, the latter of which have already been killed and removed from O'ahu at a cost of more than USD $1 million. Because EGW are so small and spread so quickly, host injury is usually detected before adult wasps are observed, making prophylactic treatments less likely than therapeutic ones. This study evaluates two stem-injected insecticides, imidacloprid (IMA-jet??) and emamectin benzoate, delivered through Arborjet Tree I.V.?? equipment, for their ability to affect E. sandwicensis (wiliwili) canopy demise under severe EGW exposure. IMA-jet, applied at a rate of 0.16 g AI/cm basal diameter (0.4 g AI/in. dia.), was the only effective treatment for maintaining canopy condition of wiliwili trees. Emamectin benzoate, applied at a rate of -0.1 g AI/cm basal diameter (-0.25 g AI/in. dia.), was not effective in this application, although it was intermediate in effect between IMA-jet and untreated trees. The relatively high concentrations of imidacloprid in leaves, and its durability for at least 13 months in native wiliwili growing on a natural, dryland site, suggest that treatment applications against EGW can impact canopy recovery even under suboptimal site and tree conditions. ?? 2009 International Society of Arboriculture.

  20. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  1. Evaluation of a commercially available ELISA kit for quantifying imidacloprid residues in Erthrina sandwicensis leaves for management of the Erythrina gall wasp, Quadrastichus erythrinae Kim.

    Science.gov (United States)

    Joseph Fischer; Brian Strom; Sheri Smith

    2009-01-01

    The erythrina gall wasp (EGW), Quadrastichus erythrinae Kim 2004, was first detected in Hawaii in 2005 and has been infesting and killing Erythrina trees throughout the island chain since. It is believed EGW originated from Africa (Messing et al. 2009). Its host range appears to be limited to Erythrina; its...

  2. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  3. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  4. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  5. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  6. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  7. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  8. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  9. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  10. Evaluation of Blue Gum Chalid Infestation Woodlots in Western Kenya

    International Nuclear Information System (INIS)

    Otuoma, J.; Muchiri, M.N

    2007-01-01

    Blue gum chalcid (BGC) Leptocybe invasa is a gall-forming wasp that belongs to the insect order Hymenoptera, family Eulophidae. It attacks a wide range of Eucalyptus species mostly between the seedling stage and five years of age. BGC causes damage to eucalyptus by forming bump-shaped galls on the leaf midribs, petioles and stems.Twisted and knobbed leaves manifest severe infestation. The aim of this study was to establish the spatial distribution of BGC and extent of host plant damage in Eucalyptus woodlots in Western Kenya. The study was carried out in six permanent sampling plots in Eucalyptus woodlots in Busia, Bungoma, Kakamega and Nyando. Trees were assessed for crown damage by estimating and classifying the density of galls on the leaves into four levels of infestation: low (greater than 50% of foliage canopy with galls and no twisted or knobbed leaves), moderate (greater than 50% of foliage with galls and less than 50% of the leaves twisted and knobbed), high (greater than 50% of the leaves twisted and knobbed, galls on the twigs and some twigs deformed and severe (greater than 50% of the twigs deformed and regeneration foliage observed). An evaluation of the pests' infestation and the extent of host plant damage indicated that, 4% of the trees and severe infestation; 5% high; 20% moderate and 70% low. Approximately 1% of trees died as a result of loss of foliage attributable to severe infestation. Other observations from the study were that the severity of BGC infestation tended to decline as trees grew older and BGC infestation retarded tree growth

  11. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  12. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  13. Metabolomic Profiles of a Midge (Procladius villosimanus, Kieffer Are Associated with Sediment Contamination in Urban Wetlands

    Directory of Open Access Journals (Sweden)

    Katherine J. Jeppe

    2017-12-01

    Full Text Available Metabolomic techniques are powerful tools for investigating organism-environment interactions. Metabolite profiles have the potential to identify exposure or toxicity before populations are disrupted and can provide useful information for environmental assessment. However, under complex environmental scenarios, metabolomic responses to exposure can be distorted by background and/or organismal variation. In the current study, we use LC-MS (liquid chromatography-mass spectrometry and GC-MS (gas chromatography-mass spectrometry to measure metabolites of the midge Procladius villosimanus inhabiting 21 urban wetlands. These metabolites were tested against common sediment contaminants using random forest models and metabolite enrichment analysis. Sediment contaminant concentrations in the field correlated with several P. villosimanus metabolites despite natural environmental and organismal variation. Furthermore, enrichment analysis indicated that metabolite sets implicated in stress responses were enriched, pointing to specific cellular functions affected by exposure. Methionine metabolism, sugar metabolism and glycerolipid metabolism associated with total petroleum hydrocarbon and metal concentrations, while mitochondrial electron transport and urea cycle sets associated only with bifenthrin. These results demonstrate the potential for metabolomics approaches to provide useful information in field-based environmental assessments.

  14. L’INSEGNAMENTO DELLE SCIENZE IN EUROPA: ASPETTI LINGUISTICI A CONFRONTO (ITALIA, DANIMARCA, GALLES

    Directory of Open Access Journals (Sweden)

    Silvia Marianna Bollone

    2015-02-01

    Full Text Available La componente linguistica riveste un ruolo prioritario nell’insegnamento-apprendimento delle scienze, specificamente prescritto dai programmi scolastici attualmente vigenti in Europa e pienamente accolto dalle Indicazioni nazionali per il curricolo della scuola dell'infanzia e del primo ciclo d’istruzione, di cui D.M. 254/2012. Il presente lavoro intende indagare l’incidenza dell’aspetto linguistico-comunicativo nel processo di insegnamento-apprendimento delle scienze nell’ambito di tre differenti contesti europei: l’Italia, la Danimarca e il Galles, nella fascia di età compresa all’incirca tra gli 11 e 14 anni, corrispondente per l’Italia alla Scuola secondaria di primo grado, per la Danimarca ad un segmento della Folkeskole, e per il Galles alla fase iniziale della Secondary School. La ricerca, incentrata su uno specifico argomento del programma di scienze comune ai tre sistemi scolastici, prevede un’analisi dei programmi ministeriali, delle programmazioni degli insegnanti, dei manuali in uso nelle scuole, nell’intento di definire il ruolo assegnato agli aspetti linguistici nell’insegnamento delle scienze sia livello legislativo-istituzionale che nella quotidiana pratica didattica.  Teaching science in Europe: language issues compared (Italy, Denmark, Wales The linguistic component plays a major role in the teaching and learning of science, specifically prescribed by the curriculum currently in force in Europe and fully supported by the National Guidelines for the curriculum in kindergarten and the first cycle of education, regulated by DM 254/2012. This paper aims to investigate the linguistic-communicative impact in the process of teaching and learning science in three different European contexts: Italy, Denmark and Wales in children aged 11 to 14, corresponding in Italy to Middle school, in Denmark to a segment of the Folkeskole, and in Wales to the initial phase of the Secondary school. The research focused on a

  15. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  16. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  17. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  18. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  19. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  20. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  1. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  2. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  3. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  4. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  5. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  6. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  7. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  8. Two new species of sympatric Fergusonina flies (Diptera: Fergusoninidae) from bud galls on high elevation snow gums (Eucalyptus pauciflora Sieb. ex Spreng. complex) in the Australian Alps

    Science.gov (United States)

    Two species of Fergusonina Malloch fly, F. daviesae Nelson sp.n. and F. taylori Nelson sp.n. (Diptera: Fergusoninidae), are described from terminal leaf bud galls on high elevation snow gums (Eucalyptus pauciflora complex) in the Australian Alps. These species occur in sympatry at the six locations...

  9. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  10. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  11. Efeitos da sazonalidade e do tamanho da planta hospedeira na abundância de galhas de Cecidomyiidae (Diptera em Piper arboreum (Piperaceae Effects of seasonality and the size of host plants on abundance of Cecidomyiidae (Diptera galls on Piper arboreum (Piperaceae

    Directory of Open Access Journals (Sweden)

    Walter Santos de Araújo

    2009-06-01

    Full Text Available Este trabalho teve por objetivo verificar se existem efeitos da sazonalidade e do tamanho da planta hospedeira na ocorrência de galhas de Cecidomyiidae (Diptera em Piper arboreum (Piperaceae. O estudo foi conduzido mensalmente de setembro/2006 a agosto/2007, em uma área remanescente de Mata Mesófila Semidecídua em Goiânia, Goiás, Brasil. Em cada coleta, 10 indivíduos da planta hospedeira foram escolhidos aleatoriamente, e a altura, o número total de folhas, o número de folhas com galhas e o número de galhas por folhas foram estimados. A abundância de galhas variou significativamente durante o período de estudo, sendo que a maior abundância foi encontrada no início da estação chuvosa. A altura da planta hospedeira e o número de folhas por indivíduo também estiveram positivamente e significativamente relacionados com a abundância de galhas, uma vez que, plantas maiores oferecem maior disponibilidade de recursos e sítios de oviposição. Os resultados do presente estudo apontam que a sazonalidade pode ser tão determinante na abundância de galhas quanto os padrões arquitetônicos da planta hospedeira. As mudanças sazonais podem influenciar diretamente o desenvolvimento da planta hospedeira e assim, alterar a quantidade e a qualidade dos nutrientes oferecidos aos insetos galhadores.The objective of this work was to verify the effects of seasonality and the size of host plants on occurrence of Cecidomyiidae (Diptera galls on Piper arboreum (Piperaceae. This study was carried out monthly, from September, 2006 to August, 2007, in a remnant area of Semidecidual Forest in Goiânia, Goiás, Brazil. In each survey, 10 individuals of the host plant were chosen randomly, and the height, the total number of leaves, the number of leaves with galls and the number of galls per leaves were estimated. The abundance of galls varied significantly during the study period, being the greatest abundance found at the beginning of the rainy season

  12. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  13. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  14. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  15. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  16. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  17. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  18. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  19. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  20. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  1. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  2. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  3. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  4. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  5. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  6. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  7. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  8. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  9. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  10. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  11. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  12. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  13. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  14. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  15. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  16. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  17. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  18. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  19. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  20. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.