WorldWideScience

Sample records for hide beetle dermestes

  1. The attraction of virgin female hide beetles (Dermestes maculatus to cadavers by a combination of decomposition odour and male sex pheromones

    Directory of Open Access Journals (Sweden)

    von Hoermann Christian

    2012-08-01

    Full Text Available Abstract Introduction The hide beetle Dermestes maculatus (Coleoptera: Dermestidae feeds as an adult and larva on decomposing animal remains and can also be found on human corpses. Therefore, forensic entomological questions with regard to when and how the first receptive females appear on carcasses are important, as the developmental stages of their larvae can be used to calculate the post-mortem interval. To date, we know that freshly emerged males respond to the cadaver odour of post-bloated carcasses (approximately 9 days after death at Tmean = 27°C, being attracted by benzyl butyrate. This component occurs at its highest concentration at this stage of decay. The aim of our study was to determine the principle of attraction of virgin females to the feeding and breeding substrate. For this purpose, we tested the response of these females to headspace samples of piglet cadavers and male sex pheromones [(Z9-unsaturated fatty acid isopropyl esters] in a Y-olfactometer. Because we expected that such an odour combination is of importance for virgin female attraction, we tested the following two questions: 1 Are virgin female hide beetles attracted by a combination of cadaver odour and male sex pheromones? 2 During which decomposition stage do the first virgin females respond to cadaver odour when combined with male sex pheromones? Results We found that young virgin females were attracted to the cadaver by a combination of cadaver odour and male sex pheromones. Neither cadaver odour alone nor male sex pheromones alone was significantly more attractive than a solvent control. Our results also gave a weak indication that the first young virgin females respond as early as the post-bloating stage to its associated decomposition odour when combined with male sex pheromones. Conclusions Our results indicate that freshly emerged males possibly respond to cadaver odour and visit carcasses before virgin females. Being attracted to cadavers when male sex

  2. Influence of substrate and relative humidity on the efficacy of three entomopathogenic fungi for the hide beetle, Dermestes maculatus

    Science.gov (United States)

    Dermestes maculatus is carrion feeder that is also a pest of poultry houses, museums, silkworm culture, and many stored foods. The Hypocreales, Beauveria bassiana, Metarhizium anisopliae, and Isaria fumosorosea, were tested for efficacy against D. maculatus larvae on concrete, plastic, leather, and ...

  3. EFFECT OF INFESTATION OF Dermestes maculatus on the ...

    African Journals Online (AJOL)

    Olusola Fasunwon

    2011-12-07

    Dec 7, 2011 ... assessment was based on weight and proximate analysis differences ... populations of matured larvae have damaged wooden structural .... The Dermestes maculatus (hide beetles) were picked with a soft (moist) camel hair.

  4. The infestation of Dermestes ater (De Geer) on a human corpse in Malaysia.

    Science.gov (United States)

    Kumara, T K; Abu Hassan, A; Che Salmah, M R; Bhupinder, S

    2009-04-01

    A human corpse at an advanced stage of decomposition was found in a house in the residential area of Bukit Mertajam, Penang, Malaysia. Entomological specimens were collected during the post-mortem and the live specimens were subsequently reared at room temperature. The time of death was estimated to have been 14 days previous to the discovery of the body based on the police investigation. Both adult and larvae of the beetle Dermestes ater (De Geer) were found to be infesting the corpse and from the stage of decomposition of the body and the estimated time of death it would appear that infestation may have begun at a relatively early stage of decomposition.

  5. Modification of postmortem wounds by Dermestes maculatus (Coleoptera: Dermestidae) activity: A preliminary study.

    Science.gov (United States)

    Zanetti, Noelia I; Ferrero, Adriana A; Centeno, Néstor D

    2015-11-01

    The purpose of this analysis was to evaluate the effects of insect activity on hacking trauma which was inflicted with a small cleaver and a razor blade under controlled conditions. Three pig hooves were each subjected to a blow with a small cleaver and a cut with a razor blade prior to insect exposure. We used Dermestes maculatus DeGeer 1774 species. These beetles made principally depressions and destruction on both wounds, and bites were observed on the edges of the wounds. As time passed and insects fed and refuge, chop marks were deformed and disappeared, taking this less than a month. Thus, D. maculatus could mask postmortem wounds and probably premortem wounds, and so the cause of death. Copyright © 2015 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  6. When ontogeny reveals what phylogeny hides: gain and loss of horns during development and evolution of horned beetles.

    Science.gov (United States)

    Moczek, Armin P; Cruickshank, Tami E; Shelby, Andrew

    2006-11-01

    How ecological, developmental and genetic mechanisms interact in the genesis and subsequent diversification of morphological novelties is unknown for the vast majority of traits and organisms. Here we explore the ecological, developmental, and genetic underpinnings of a class of traits that is both novel and highly diverse: beetle horns. Specifically, we focus on the origin and diversification of a particular horn type, those protruding from the pronotum, in the genus Onthophagus, a particularly speciose and morphologically diverse genus of horned beetles. We begin by documenting immature development of nine Onthophagus species and show that all of these species express pronotal horns in a developmentally transient fashion in at least one or both sexes. Similar to species that retain their horns to adulthood, transient horns grow during late larval development and are clearly visible in pupae. However, unlike species that express horns as adults, transient horns are resorbed during pupal development. In a large number of species this mechanisms allows fully horned pupae to molt into entirely hornless adults. Consequently, far more Onthophagus species appear to possess the ability to develop pronotal horns than is indicated by their adult phenotypes. We use our data to expand a recent phylogeny of the genus Onthophagus to explore how the widespread existence of developmentally transient horns alters our understanding of the origin and dynamics of morphological innovation and diversification in this genus. We find that including transient horn development into the phylogeny dramatically reduces the number of independent origins required to explain extant diversity patters and suggest that pronotal horns may have originated only a few times, or possibly only once, during early Onthophagus evolution. We then propose a new and previously undescribed function for pronotal horns during immature development. We provide histological as well as experimental data that

  7. Involvement of larder beetles (Coleoptera: Dermestidae) on human cadavers: a review of 81 forensic cases.

    Science.gov (United States)

    Charabidze, Damien; Colard, Thomas; Vincent, Benoit; Pasquerault, Thierry; Hedouin, Valery

    2014-11-01

    From 1994 to 2013, French forensic entomology laboratories investigated 1,093 cases. Larder beetles (Coleoptera: Dermestidae) were observed in 81 (7.5%) of these cases. To describe and analyze these 81 cases, eight parameters were used: city, location (indoor or outdoor), decay stage (fresh, decay, or dry), dermestid species and instar (adults and/or larvae), presence of living calliphorid larvae, presence of calliphorid pupae or adults, and presence of other necrophagous species. Eight Dermestidae species were observed: Dermestes frischii (42% of cases), Dermestes undulatus (35.8%), Dermestes peruvianus (12.3%), Dermestes lardarius (9.9%), Dermestes haemorrhoidalis (8.6%), Dermestes maculatus (7.4%), Dermestes bicolor (3.7%), and Dermestes ater (1.2%). Larder beetles primarily developed on human cadavers in outdoor locations in areas with a dry climate and were never reported in oceanic areas (which are characterized by frequent rainfall and high ambient humidity). The number of dermestid species on a single corpse never exceeded three. Typically, one species was found per corpse. Species differed between indoor and outdoor cases, with D. frischii and D. undulatus dominant in outdoor cases, while D. peruvianus dominant in indoor cases. Calliphoridae was found in 88% of the cases, while Hydrotaea and Piophilidae were observed 40% of the time. Regarding Coleoptera, Necrobia spp. (Coleoptera: Cleridae) was observed in 46% of the cases. Lastly, we observed a typical decomposition pattern, with preferential feeding areas on the face, hands, and feet (i.e., the extremities). Pupation chambers on or inside the bones were not observed.

  8. Determination of fluoxetine in Dermestes maculatus (Coleoptera: Dermestidae) by a spectrophotometric method.

    Science.gov (United States)

    Zanetti, Noelia I; Ferrero, Adriana A; Centeno, Néstor D

    2016-12-01

    The aims of this study were to detect and quantify fluoxetine, an antidepressant, from entomological samples. Larvae, pupae and adults of Dermestes maculatus (Coleoptera, Dermestidae) were reared on pig muscle previously treated with fluoxetine. The concentration selected, 2000mg/kg, emulates a fluoxetine overdose lethal to humans and laboratory animals. Thirty larvae on the fourth and fifth stages, 50 adults and several exuviae were analyzed for fluoxetine content. Detection of fluoxetine was performed by UV spectrophotometry at 270 and 277nm. All developmental stages of D. maculatus and exuviae were positive for fluoxetine. We also quantified the drug and no significant differences were found either between the days or the stages in the general model, but at 277nm a tendency of the concentration to decrease with time was observed. Concentrations of fluoxetine at 277nm were almost equal or greater than those at 270nm. This is the first study to detect and quantify fluoxetine from entomological samples and, in particular, from D. maculatus beetles. Copyright © 2016 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.

  9. Effects of Different Temperatures on the Development of Dermestes Frischii and Dermestes Undulatus (Coleoptera, Dermestidae): Comparison Between Species.

    Science.gov (United States)

    Lambiase, Simonetta; Murgia, Giulia; Sacchi, Roberto; Ghitti, Michele; di Lucia, Valeria

    2017-06-20

    Dermestidae could be useful in forensic investigations to assess the PMI as adults and larvae colonize dried remains. We reared two species of Dermestidae (Dermestes frischii and Dermestes undulatus) to understand the effects of different temperatures on the length of their whole life cycle and on their immature stages. Both species were reared at 23°C ± 0.5, RH 75% and at 26°C ± 0.5, 75% RH. Our result shows that the temperature is the main factor that influences the development of those species; in fact, increasing temperature leads to a shorter development cycle (59.8 ± 0.5 and 38.1 ± 0.2 for D. frischii; 50.6 ± 0.6 and 36.2 ± 0.2 for D. undulatus). Furthermore, we found that the number of the molts before the pupa decreases from 5-7 to 5-6 for D. frischii and from 4-6 to 4-5 for D. undulatus, respectively, at 23°C and 26°C. © 2017 American Academy of Forensic Sciences.

  10. Treatment with a neem seed extract (MiteStop®) of beetle larvae parasitizing the plumage of poultry.

    Science.gov (United States)

    Walldorf, Volker; Mehlhorn, Heinz; Al-Quraishy, Saleh; Al-Rasheid, Khaled A S; Abdel-Ghaffar, Fathy; Mehlhorn, Julia

    2012-02-01

    Beetles of the species Alphitobius diaperinus, Dermestes bicolor, and Dermestes lardarius may transmit severe agents of diseases on poultry and may in addition harm as larvae the skin and feathers thus leading to severe economic losses. The present study deals with a control measurement using a neem seed extract (MiteStop®) being diluted with tap water. It was shown that spraying of a 1:33 dilution kills both larvae and adults of these part-time parasites as was previously shown for other parasites such as mites, ticks, and blood sucking or biting insects.

  11. The Insecticidal Activity of Tea Tree Oil (Melaleuca Alternifolia Against the Common Pest in Mummies (Dermestes Maculatus

    Directory of Open Access Journals (Sweden)

    Gomaa ABDEL-MAKSOUD

    2013-09-01

    Full Text Available Egyptian mummies show different signs of deterioration caused by insects, such as missing parts, gaps and accumulated dust. Dermestes maculatus is one of the serious pests that cause damage to Egyptian mummies. To assess the insecticidal activity of tea tree oil against the larvae of the museum insect pest Dermestes maculatus (isolated from Egyptian mummies we tested it under different concentration and treatment times by the bioassay methods. Our results showed that tea tree oil diluted in ethanol was highly toxic to Dermestes maculatus larvae. Insecticidal activity depended on both concentration and exposure time. By increasing the concentration level and the exposure time we obtained a higher mortality rate.

  12. Dermestes peruvianus Laporte (Coleoptera, Dermestidae: primeiro registro para o Nordeste do Brasil

    Directory of Open Access Journals (Sweden)

    Wellington Santos

    2012-12-01

    Abstract. Dermestes peruvianus Laporte is a species with records in South America from Peru, Bolivia, Chile, Argentina and Brazil (Southeastern region. During a survey of insect fauna associated with pig carcasses in an area of Caatinga, in São José dos Cordeiros, state of Paraíba, Brazil (7°28’19’’S; 36°53’40”W, in October 2010 and February 2011 were collected three specimens of D. peruvianus being the first record of the species to the Northeastern Brazil.

  13. Reversible Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Dhananjay Yadav

    2012-03-01

    Full Text Available Reversible data hiding is a technique that is used to hide data inside an image. The data is hidden in such a way that the exact or original data is not visible. The hidden data can be retrieved as and when required. There are several methods that are used in reversible data hiding techniques like Watermarking, Lossless embedding and encryption. In this paper we present a review of reversible watermarking techniques and show different methods that are used to get reversible data hiding technique with higher embedding capacity and invisible objects. Watermark need not be hidden. Watermarking can be applied to 1. Images, 2. Text, 3. Audio/video, 4. Software.

  14. Hiding Information under Speech

    Science.gov (United States)

    2005-12-12

    as it arrives in real time, and it disappears as fast as it arrives. Furthermore, our cognitive process for translating audio sounds to the meaning... steganography , whose goal is to make the embedded data completely undetectable. In addi- tion, we must dismiss the idea of hiding data by using any...therefore, an image has more room to hide data; and (2) speech steganography has not led to many money-making commercial businesses. For these two

  15. HIDE: HI Data Emulator

    Science.gov (United States)

    Akeret, Joel; Seehars, Sebastian; Chang, Chihway; Monstein, Christian; Amara, Adam; Refregier, Alexandre

    2016-07-01

    HIDE (HI Data Emulator) forward-models the process of collecting astronomical radio signals in a single dish radio telescope instrument and outputs pixel-level time-ordered-data. Written in Python, HIDE models the noise and RFI modeling of the data and with its companion code SEEK (ascl:1607.020) provides end-to-end simulation and processing of radio survey data.

  16. Hiding dependence-discovery of F-hiding laws and system laws

    Institute of Scientific and Technical Information of China (English)

    Zhou Houyong; Huang Shunliang; Shi Kaiquan

    2009-01-01

    Function one direction S-rough sets have dynamic characteristics and law characteristics. By using the function one direction S-rough sets, this article presents the concepts of the f-hiding law, F-hiding law, f-hiding law dependence and F-hiding law dependence. Based on the concepts above, this article proposes the hiding-dependence theorem of f-hiding laws, the hiding-dependence theorem of F-hiding laws, the hiding-dependence separation theorem, the hiding dependencs-discovery principle of unknown laws. Finally, the application of the hiding dependence of hiding laws in the discovery of system laws is given.

  17. Bark Beetles

    OpenAIRE

    Davis, Ryan S.; McAvoy, Darren

    2012-01-01

    Bark beetles are one of the most destructive forest pests in the world. They are different than the larger longhorned and roundheaded/metallic woodboring beetles commonly infesting the inner wood of trees. The largest bark beetle, the red turpentine beetle (Dendroctonus valens), reaches only 8.3 mm in length. Because of their tiny size, bark beetles are not effective tree killers as individuals.

  18. Use of larder beetles (Coleoptera: Dermestidae) to deflesh human jaws.

    Science.gov (United States)

    Charabidze, D; Colard, T; Becart, A; Hedouin, V

    2014-01-01

    We describe new experimental data for the defleshing of human bones using larder beetles (Dermestes haemorrhoidalis) (Küster, 1852). Although the ability of larder beetles to feed on vertebrate remains has been, and still is, used by taxidermists to deflesh skulls and bones, this method has never been documented from a quantitative perspective and has over time become ignored in most forensic anthropology or odontology laboratories. To promote the rational and efficient use of this method, we performed experiments to estimate the quantity of food consumed by larvae. From the 2nd instar to nymphosis, each larva consumed a mean of 0.13±0.03 g of dry beef muscle. We then used 100±50 D. haemorrhoidalis adults and 100±50 larvae to deflesh human maxillae and mandibles sampled within a forensic context (victim identification). Each sample was weighed and photographed before, during and after the experiment. According to our experiments, 20-25 days were sufficient to completely deflesh all of the samples. We concluded that a small number of larder beetles can be used to efficiently deflesh human jaws. According to this result, the use of larder beetles appears to be an inexpensive, simple and efficient way to clean mandibles and maxillae. Furthermore, this method is DNA-safe (compared to usual maceration techniques) and thus allows the samples to be used for subsequent DNA and drug analyses.

  19. The Effect of Temperature and Laboratory Rearing Conditions on the Development of Dermestes maculatus (Coleoptera: Dermestidae).

    Science.gov (United States)

    Zanetti, Noelia I; Visciarelli, Elena C; Centeno, Néstor D

    2016-03-01

    Experiments were conducted to study the life cycle of Dermestes maculatus and to establish the total developmental time and the developmental time of immature stages, in relation with six different temperatures. We also analyzed the variations in size, morphology, and other indicators of temporal variation during life cycle of D. maculatus, in relation with temperature. One hundred larvae were selected per experiment, reared individually. The remaining larvae were reared to evaluate and establish temporal variations among the instars (length, cephalic width, and dry weight). In all trials, survivorship was greater than 50% and seven larval instars were found. Data of the average developmental time of immature stages and of the total cycle, at different temperatures, are provided. This is of relevance when estimating particularly, a minimum PMI. No relation between morphometric parameters and temperature was found, suggesting that other random factors may have been involved. Thus, this indicates that the method of isomegalen diagrams could not be used for calculating PMI. © 2015 American Academy of Forensic Sciences.

  20. Biological Strategies of Dermestes maculatus DeGeer (Coleoptera: Dermestidae) at Larval Stages in Different Temperatures.

    Science.gov (United States)

    Zanetti, N I; Visciarelli, E C; Centeno, N D

    2016-12-01

    The intraspecific variation in larval instars is a widely distributed phenomenon amongst holometabolous insects. Several factors can affect the number of instars, such as temperature, humidity, and density. Only a few references could be found in the literature because the invariability in the number of larval instars is considered normal, and the issue has raised little to no interest. Despite this, no study to date has intended to assess or focus on the larval development. Here, we analyzed the effect of different rearing temperature on the larval stage of Dermestes maculatus DeGeer (Coleoptera: Dermestidae). The results indicated that at all temperatures, L5 represented a decisive point for individuals as well as the other later larval instars, because the next step to follow was to pupate or molt to the next larval instar. Furthermore, there were mainly two populations, L5 and L6, although in different proportions according to temperature. We also found that at a greater number of instars, the larval development at all temperatures lasted longer. Moreover, the exponential model was the best adjustment in the developmental time of all populations as well as for the accumulated developmental time of L1-L4. Thus, we conclude that random factors such as genetics could probably cause interspecific variability in D. maculatus larval development.

  1. Hide receives the Bowie Medal

    Science.gov (United States)

    Dickey, Jean O.; Hide, Raymond

    The 1997 William Bowie Medal, given by AGU for outstanding contributions to fundamental geophysics and for unselfish cooperation in research, was presented to Raymond Hide at the AGU Spring Meeting Honor Ceremony on May 28 in Baltimore. The award citation and Hide's response are given here.

  2. Necrophagous beetles associated with carcasses in a semi-arid environment in northeastern Brazil: implications for forensic entomology.

    Science.gov (United States)

    Mayer, Ana C G; Vasconcelos, Simão D

    2013-03-10

    Data on the ecology and bionomics of necrophagous beetles are scarce in tropical countries despite their relevance in forensic investigations. We performed a survey on the diversity and temporal pattern of colonization of beetles on pig carcasses in a fragment of dry forest in northeastern Brazil. We collected 1550 adults of diverse feeding habits from 12 families, of which 96% had necrophagous and/or copro-necrophagous habits and belonged to four families: Dermestidae, Scarabaeidae, Cleridae and Trogidae. Three species, Dermestes maculatus, Necrobia rufipes and Omorgus suberosus are reported for the first time with an expanded geographical distribution that includes the semi-arid region in Brazil. Adult beetles were collected as early as 24h after death. One endemic species, Deltochilum verruciferum, stood out in terms of numerical dominance and temporal occurrence during different stages of decomposition. Its intimate association with carrion emphasizes their potential role in forensic entomology in the region.

  3. Dermestid Beetles

    OpenAIRE

    Hodgson, Erin W.; Coats, Katherine; Roe, Alan H.

    2008-01-01

    Dermestid beetles are in the family Dermestidae and order Coleoptera. These beetles are sometimes called larder beetles or carpet beetles. Adults range from 1 to 12 mm in length and have variable body coloration. In general, they are hairy, dark-colored, elongated, and have clubbed antennae. The larvae are light brown and can be up to 13 mm long. Many larvae have spines, called setae, on the back of the abdomen that are helpful with identification. Dermestid larvae and adults have chewing mou...

  4. Beneficial Insects: Beetles

    OpenAIRE

    Hodgson, Erin W.; Patterson, Ron

    2007-01-01

    There are many beneficial beetles in Utah besides lady beetles or ladybugs. Beetles can significantly reduce common insect and weed problems and in some cases eliminate the need for chemical control. Examples of beneficial beetles include: ground beetles, rove beetles, tiger beetles and tortoise beetles. Many of these beetles are native to Utah, while others have been purposely introduced to help control damage from exotic insect and weed pests.

  5. Pre-slaughter, slaughter and post-slaughter defects of skins and hides at the Sheba Tannery and Leather Industry, Tigray region, northern Ethiopia.

    Science.gov (United States)

    Kahsay, Tesfay; Negash, Guesh; Hagos, Yohannes; Hadush, Birhanu

    2015-08-21

    Skins and hides are perishable resources that can be damaged by parasitic diseases and human error, which result in downgrading or rejection. This study was conducted to identify defect types and to determine their prevalence in pickled sheep and wet blue goat skins and wet blue hides. Each selected skin or hide was examined for defects in natural light and the defects were graded according to established quality criteria in Ethiopian standard manuals. Major defects were captured by digital photography. The major pre-slaughter defects included scratches (64.2%), cockle (ekek) (32.8%), wounds or scars (12.6%), lesions from pox or lumpy skin disease (6.1%), poor substance (5%), branding marks (2.3%) and tick bites (1.5%). The presence of grain scratches in wet blue hides (76.3%) was significantly higher than in pickled sheep (67.2%) and wet blue goat (59.1%) skins. The major slaughter defects included flay cuts or scores, holes, poor pattern and vein marks, with a higher occurrence in wet blue goat skins (28.7%; P < 0.001) than in wet blue hides (22.8%) and pickled sheep skins (11.1%). The most prevalent postslaughter defects were grain cracks (14.9%), hide beetle damage (8%), damage caused by heat or putrefaction (3.7%) and machine-induced defects (0.5%). Grain cracks (27.04%) and hide beetle damage (13.9%) in wet blue goat skins were significantly more common than in wet blue hides and pickled sheep skins. These defects cause depreciation in the value of the hides and skins. Statistically significant (P < 0.001) higher rejection rates were recorded for wet blue hides (82.9%) than for pickled sheep skins (18.3%) and wet blue goat skins (8.5%). Improved animal health service delivery, effective disease control strategies and strong collaboration between stakeholders are suggested to enhance the quality of skins and hides.

  6. Information Hiding Techniques: A Tutorial Review

    CERN Document Server

    Thampi, Sabu M

    2008-01-01

    The purpose of this tutorial is to present an overview of various information hiding techniques. A brief history of steganography is provided along with techniques that were used to hide information. Text, image and audio based information hiding techniques are discussed. This paper also provides a basic introduction to digital watermarking.

  7. Integrated Association Rules Complete Hiding Algorithms

    Directory of Open Access Journals (Sweden)

    Mohamed Refaat Abdellah

    2017-01-01

    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  8. Beetles (Insecta, Coleoptera) associated with pig carcasses exposed in a Caatinga area, Northeastern Brazil.

    Science.gov (United States)

    Santos, W E; Alves, A C F; Creão-Duarte, A J

    2014-08-01

    The species richness, abundance and seasonality of Coleoptera fauna associated with pig carcasses exposed in a Caatinga area were examined. Tray, pitfall and modified Shannon traps were settled together to collect these insects during two seasons (dry and rainy). 4,851 beetles were collected, belonging to 19 families and 88 species. Staphylinidae (2,184) and Histeridae (1,264) were the most abundant families and accounted for 71.1% of the specimens collected. Scarabaeidae (15) showed the highest species richness. The most abundant species were Atheta iheringi Bernhauer, 1908 (Staphylinidae) (1,685), Euspilotus sp. (Histeridae) (461), Stelidota geminata (Say, 1825) (Nitidulidae) (394), Xerosaprinus diptychus (Marseul, 1855) (Histeridae) (331) and Dermestes maculatus De Geer, 1774 (Dermestidae). Amongst these species, X. diptychus showed to be strongly influenced by seasonality, since 96.1% of the specimens were collected during the dry season.

  9. Beetles (Insecta, Coleoptera associated with pig carcasses exposed in a Caatinga area, Northeastern Brazil

    Directory of Open Access Journals (Sweden)

    WE Santos

    Full Text Available The species richness, abundance and seasonality of Coleoptera fauna associated with pig carcasses exposed in a Caatinga area were examined. Tray, pitfall and modified Shannon traps were settled together to collect these insects during two seasons (dry and rainy. 4,851 beetles were collected, belonging to 19 families and 88 species. Staphylinidae (2,184 and Histeridae (1,264 were the most abundant families and accounted for 71.1% of the specimens collected. Scarabaeidae (15 showed the highest species richness. The most abundant species were Atheta iheringi Bernhauer, 1908 (Staphylinidae (1,685, Euspilotus sp. (Histeridae (461, Stelidota geminata (Say, 1825 (Nitidulidae (394, Xerosaprinus diptychus(Marseul, 1855 (Histeridae (331 and Dermestes maculatus De Geer, 1774 (Dermestidae. Amongst these species, X. diptychus showed to be strongly influenced by seasonality, since 96.1% of the specimens were collected during the dry season.

  10. Mountain Pine Beetle

    Science.gov (United States)

    Gene D. Amman; Mark D. McGregor; Robert E. Jr. Dolph

    1989-01-01

    The mountain pine beetle, Dendroctonus ponderosae Hopkins, is a member of a group of beetles known as bark beetles: Except when adults emerge and attack new trees, the mountain pine beetle completes its life cycle under the bark. The beetle attacks and kills lodgepole, ponderosa, sugar, and western white pines. Outbreaks frequently develop in lodgepole pine stands that...

  11. A Block Based Adaptive Video Data Hiding Method Using Forbidden Zone Data Hiding

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2013-01-01

    -Data hiding is a process of embedding information into some sort of host media. Especially video data hiding has become an important research topic as it is complex when compared data hiding process in other media. This paper proposes a new method based on erasure correction capability of RA codes...... using forbidden zone data hiding. This method finds suitable host signals that are useful for data hiding. The proposed method also overcomes the problems of frame drop and inserts attacks. The simulation results reveal that this video data hiding framework can be used in data hiding applications...... of the real world. Key Words – RA codes, selective embedding, watermarking, forbidden zone data hiding, simulation, selective embedding, erasure handling, block partitioning...

  12. Water beetles

    OpenAIRE

    Foster, G. N.; Nelson, B H; O'Connor, Á.

    2009-01-01

    EXECUTIVE SUMMARY: Based on ca 37,000 records for Ireland, 244 taxa of beetle are evaluated for their conservation status using the International Union for the Conservation of Nature (IUCN) regional criteria. Of the wetland species, eight are considered to be regionally extinct, eight critically endangered, eleven endangered, twenty two vulnerable, twenty four near threatened, and the rest at lower risk, of least concern or data‐deficient. Ninety‐three taxa are mapped. The importance of h...

  13. Linear and Nonlinear Oblivious Data Hiding

    Directory of Open Access Journals (Sweden)

    Akansu Ali N

    2004-01-01

    Full Text Available The majority of the existing data hiding schemes are based on the direct-sequence (DS modulation where a low-power random sequence is embedded into the original cover signal to represent hidden information. In this paper, we investigate linear and nonlinear modulation approaches in digital data hiding. One typical DS modulation algorithm is explored and its optimal oblivious detector is derived. The results expose its poor cover noise suppression as the hiding signature signal always has much lower energy than the cover signal. A simple nonlinear algorithm, called set partitioning, is proposed and its performance is analyzed. Analysis and simulation studies further demonstrate improvements over the existing schemes.

  14. Recent Advances in Information Hiding and Applications

    CERN Document Server

    Huang, Hsiang-Cheh; Jain, Lakhmi; Zhao, Yao

    2013-01-01

    This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:   Image data hiding scheme based on vector quantization and image graph coloring The copyright protection system for Android platform Reversible data hiding ICA-based image and video watermarking Content-based invariant image watermarking Single bitmap block truncation coding of color images using cat swarm optimization Genetic-based wavelet packet watermarking for copyright protection Lossless text steganography in compression coding Fast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography scheme Video watermarking with shot detection

  15. Hiding Information into Palette-Based Image

    Institute of Scientific and Technical Information of China (English)

    WU Hong-tao; ZHU Bo-cheng; YANG Yi-xian

    2005-01-01

    After pointing out the weakness of the known palette-based image information hiding by palette matrix,a new spacial effective robust information hiding algorithm is proposed,which can resist the operation of ‘select all’,‘copy’,‘paste’ from cover to original,and can resist gently modification the palette matrix,and can resist the image format changed between true color image and palette-based image.The hiding capacity can reach 25% of the number of pixel index matrix.Due to the advisement of information hiding security an update algorithm is proposed at the end of the paper,with the capacity reduced and vision effect increased.

  16. 'Medical Tattoos' Help Hide Surgical Scars

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_161132.html 'Medical Tattoos' Help Hide Surgical Scars Pigments can restore more ... scars from cancer surgeries may benefit from "medical tattoos" that can help restore some of the skin's ...

  17. Evaluation of a barrier to inhibit lesser mealworm (Coleoptera: Tenebrionidae) and dermestidae movement in high-rise, caged-layer poultry facilities.

    Science.gov (United States)

    Kaufman, Phillip E; Reasor, Colleen; Murray, Kathleen D; Waldron, J Keith; Rutz, Donald A

    2005-10-01

    An evaluation of a mechanical barrier to prevent movement of adult and larval lesser mealworm, Alphitobius diaperinus (Panzer); larder beetle, Dermestes lardarius L.; and hide beetle, Dermestes maculatus De Geer was conducted in caged-layer poultry facilities in New York and Maine. The barrier, a plastic collar wrapped around building support posts, proved highly effective at preventing movement of adult lesser mealworms. Significantly more lesser mealworm larvae were recovered from cardboard collar beetle traps placed below both washed and unwashed barriers than from traps placed above washed and unwashed barriers. Similarly, significantly more adult Dermestes were recovered from traps placed below washed barriers than from above both washed and unwashed barriers. The level of fly specking on the barrier was found to have no significant impact on the numbers of adult lesser mealworms and adult and larval Dermestes recovered either above or below barriers. Fly specking level did significantly impact the numbers of lesser mealworm larvae recovered above the barrier. Although washed barriers provided the greatest deterrent to adult lesser mealworms, the presence of the barrier, regardless of the level of fly specking, provided a significant deterrent to beetle climbing success. Washed barriers further reduced climbing success by lesser mealworm larvae by 17%, Dermestes adults by 7-28%, and Dermestes larvae by 33-38%. The high level of climbing observed by adult lesser mealworms suggests that the impact of adult beetle movement toward birds should be considered in its importance in building damage, disease transmission, feed infestation, and bird productivity and health. Observations on cost and maintenance of the barrier are discussed.

  18. Pre-slaughter, slaughter and post-slaughter defects of skins and hides at the Sheba Tannery and Leather Industry, Tigray region, northern Ethiopia

    Directory of Open Access Journals (Sweden)

    Tesfay Kahsay

    2015-02-01

    Full Text Available Skins and hides are perishable resources that can be damaged by parasitic diseases and human error, which result in downgrading or rejection. This study was conducted to identify defect types and to determine their prevalence in pickled sheep and wet blue goat skins and wet blue hides. Each selected skin or hide was examined for defects in natural light and the defects were graded according to established quality criteria in Ethiopian standard manuals. Major defects were captured by digital photography. The major pre-slaughter defects included scratches (64.2%, cockle (ekek (32.8%, wounds or scars (12.6%, lesions from pox or lumpy skin disease (6.1%, poor substance (5%, branding marks (2.3% and tick bites (1.5%. The presence of grain scratches in wet blue hides (76.3% was significantly higher than in pickled sheep (67.2% and wet blue goat (59.1% skins. The major slaughter defects included flay cuts or scores, holes, poor pattern and vein marks, with a higher occurrence in wet blue goat skins (28.7%; P < 0.001 than in wet blue hides (22.8% and pickled sheep skins (11.1%. The most prevalent postslaughter defects were grain cracks (14.9%, hide beetle damage (8%, damage caused by heat or putrefaction (3.7% and machine-induced defects (0.5%. Grain cracks (27.04% and hide beetle damage (13.9% in wet blue goat skins were significantly more common than in wet blue hides and pickled sheep skins. These defects cause depreciation in the value of the hides and skins. Statistically significant (P < 0.001 higher rejection rates were recorded for wet blue hides (82.9% than for pickled sheep skins (18.3% and wet blue goat skins (8.5%. Improved animal health service delivery, effective disease control strategies and strong collaboration between stakeholders are suggested to enhance the quality of skins and hides.

  19. Hiding robot inertia using resonance.

    Science.gov (United States)

    Vallery, Heike; Duschau-Wicke, Alexander; Riener, Robert

    2010-01-01

    To enable compliant training modes with a rehabilitation robot, an important prerequisite is that any undesired human-robot interaction forces caused by robot dynamics must be avoided, either by an appropriate mechanical design or by compensating control strategies. Our recently proposed control scheme of "Generalized Elasticities" employs potential fields to compensate for robot dynamics, including inertia, beyond what can be done using closed-loop force control. In this paper, we give a simple mechanical equivalent using the example of the gait rehabilitation robot Lokomat. The robot consists of an exoskeleton that is attached to a frame around the patient's pelvis. This frame is suspended by a springloaded parallelogram structure. The mechanism allows vertical displacement while providing almost constant robot gravity compensation. However, inertia of the device when the patient's pelvis moves up and down remains a source of large interaction forces, which are reflected in increased ground reaction forces. Here, we investigate an alternative suspension: To hide not only gravity, but also robot inertia during vertical pelvis motion, we suspend the robot frame by a stiff linear spring that allows the robot to oscillate vertically at an eigenfrequency close to the natural gait frequency. This mechanism reduces human-robot interaction forces, which is demonstrated in pilot experimental results.

  20. Fully Traversable Wormholes Hiding Charge

    CERN Document Server

    Guendelman, Eduardo

    2012-01-01

    The charge-hiding effect by a wormhole, which was studied for the case where gravity/gauge-field system is self-consistently interacting with a charged lightlike brane (LLB) as a matter source, is now studied for the case of a time like brane. From the demand that no surfaces of infinite coordinate time redshift appear in the problem we are lead now to a completly traversable wormhole space, according to not only the traveller that goes through the wormhole (as was the case for the LLB), but also to a static external observer, this requires negative surface energy density for the shell sitting at the throat of the wormhole. We study a gauge field subsystem which is of a special non-linear form containing a square-root of the Maxwell term and which previously has been shown to produce a QCD-like confining gauge field dynamics in flat space-time. The condition of finite energy of the system or asymptotic flatness on one side of the wormhole implies that the charged object sitting at the wormhole throat expels a...

  1. Data Hiding in JPEG Images

    Directory of Open Access Journals (Sweden)

    Sushil Kumar

    2009-07-01

    perceptibility [5, 1].We shall use digital images as the cover object in this paper inwhich we embed the hidden information. The challenge ofusing steganography in cover images is to hide as much data aspossible with the least noticeable difference in the stego-image.Steganographic algorithms operate on basically three types ofimages: Raw images (i.e., bmp format, Palette based images(i.e., GIF images and JPEG images. JPEG images areroutinely used in Steganographic algorithms due to the mostpopular lossy image compression method. Usually it is foundthat an algorithm used to hide large amounts of informationtypically result in lower perceptibility (i.e., greater change tothe image appearance and a more robust algorithm result intolower embedding capacity. The JPEG image generation firstdecomposed the input image into a number of 8 x 8 blocks.Then DCT of each block are computed and the resultant DCTcoefficient matrix is quantized using a standard quantizationtable. Finally the inverse DCT of quantized coefficient matrixare evaluated and the final JPEG image is obtained afterrounding the values.

  2. Steganography An Art of Hiding Data

    CERN Document Server

    Channalli, Shashikala

    2009-01-01

    In today's world the art of sending & displaying the hidden information especially in public places, has received more attention and faced many challenges. Therefore, different methods have been proposed so far for hiding information in different cover media. In this paper a method for hiding of information on the billboard display is presented. It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. In this paper we propose a new form of steganography, on-line hiding of information on the output screens of the instrument. This method can be used for announcing a secret message in public place. It can be extended to other means such as electronic advertising board around sports stadium, railway station or airport. This method of steganography is very similar to image steganography and video steganography. Pr...

  3. Short term preservation of hide using vacuum: influence on properties of hide and of processed leather.

    Science.gov (United States)

    Gudro, Ilze; Valeika, Virgilijus; Sirvaitytė, Justa

    2014-01-01

    The objective of this work was to investigate vacuum influence on hide preservation time and how it affects hide structure. It was established that vacuum prolongs the storage time without hide tissue putrefaction up to 21 days when the storage temperature is 4°C. The microorganisms act for all storage times, but the action is weak and has no observable influence on the quality of hide during the time period mentioned. The hide shrinkage temperature decrease is negligible, which shows that breaking of intermolecular bonds does not occur. Optical microscopy, infrared spectroscopy and differential scanning calorimetry also did not show any structural changes which can influence the quality of leather produced from such hide. The qualitative indexes of wet blue processed under laboratory conditions and of leather produced during industrial trials are presented. Indexes such as chromium compounds exhaustion, content of chromium in leather, content of soluble matter in dichloromethane, strength properties, and shrinkage temperature were determined. Properties of the leather produced from vacuumed hide under industrial conditions conformed to the requirements of shoe upper leather.

  4. Bark beetle management guidebook

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-31

    This guidebook is designed to provide a background to bark beetle management practices consistent with the British Columbia Forest Practices Code, as well as specific practices for managing mountain pine beetle (Dendroctonus ponderosae), spruce beetle (Dendroctonus rufipennis), and Douglas-fir beetle (Dendroctonus pseudotsugae). It describes their general biology and distribution in British Columbia, their life cycles and population dynamics, and symptoms of bark beetle attack. General management strategies presented include prevention (a long-term approach), suppression, holding actions, and salvage. Strategies appropriate to specific bark beetles include aerial surveys, ground detection, baiting, harvesting, and use of insecticides. The guidebook includes brief mention of other bark beetles (Scolytids and other Dendroctonus species) and a glossary.

  5. Reversible Data Hiding Based on DNA Computing

    Directory of Open Access Journals (Sweden)

    Bin Wang

    2017-01-01

    Full Text Available Biocomputing, especially DNA, computing has got great development. It is widely used in information security. In this paper, a novel algorithm of reversible data hiding based on DNA computing is proposed. Inspired by the algorithm of histogram modification, which is a classical algorithm for reversible data hiding, we combine it with DNA computing to realize this algorithm based on biological technology. Compared with previous results, our experimental results have significantly improved the ER (Embedding Rate. Furthermore, some PSNR (peak signal-to-noise ratios of test images are also improved. Experimental results show that it is suitable for protecting the copyright of cover image in DNA-based information security.

  6. Preparation of biobased sponges from un-tanned hides

    Science.gov (United States)

    One of our research endeavors to address ongoing challenges faced by the U.S. hide and leather industries is to develop innovative uses and novel biobased products from hides to improve prospective markets and to secure a viable future for hides and leather industries. We had previously investigate...

  7. Hiding an Inconvenient Truth : Lies and Vagueness

    NARCIS (Netherlands)

    Serra Garcia, M.; van Damme, E.E.C.; Potters, J.J.M.

    2010-01-01

    When truth conflicts with e¢ ciency, can verbal communication destroy efficiency? Or are lies or vagueness used to hide inconvenient truths? We consider a sequential 2-player public good game in which the leader has private information about the value of the public good. This value can be low, high,

  8. Hiding levitating objects above a ground plane

    DEFF Research Database (Denmark)

    Zhang, Jingjing; Luo, Yu; Mortensen, Asger

    2010-01-01

    An approach to hiding objects levitating above a conducting sheet is suggested in this paper. The proposed device makes use of isotropic negative-refractive-index materials without extreme material parameters, and creates an illusion of a remote conducting sheet. Numerical simulations are perform...

  9. An Approach to Hide Secret Speech Information

    Institute of Scientific and Technical Information of China (English)

    WU Zhi-jun; DUAN Hai-xin; LI Xing

    2006-01-01

    This paper presented an approach to hide secret speech information in code excited linear prediction(CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information hiding and extracting for the purpose of secure speech communication. The secret speech is coded in 2.4Kb/s mixed excitation linear prediction (MELP), which is embedded in CELP type public speech. The ABS algorithm adopts speech synthesizer in speech coder. Speech embedding and coding are synchronous, i.e. a fusion of speech information data of public and secret. The experiment of embedding 2.4 Kb/s MELP secret speech in G.728 scheme coded public speech transmitted via public switched telephone network (PSTN) shows that the proposed approach satisfies the requirements of information hiding, meets the secure communication speech quality constraints, and achieves high hiding capacity of average 3.2 Kb/s with an excellent speech quality and complicating speakers' recognition.

  10. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  11. An Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography

    CERN Document Server

    Mukhopadhyay, Debajyoti; Ghosh, Surjya; Biswas, Sudipto; Chakraborty, Poulami

    2011-01-01

    A crypto system can be used to encrypt messages sent between two communicating parties so that an eavesdropper who overhears the encrypted messages will not be able to decode them. The paper mainly concentrates on the method in which the substitution technique of steganography can been used to hide data in a 24-bit bitmap file. Popular audio hiding techniques based on methods of steganography is also discussed here.

  12. Information Hiding Using Improper Frame Padding

    CERN Document Server

    Jankowski, Bartosz; Szczypiorski, Krzysztof

    2010-01-01

    Hiding information in network traffic may lead to leakage of confidential information. In this paper we introduce a new steganographic system: the PadSteg (Padding Steganography). To authors' best knowledge it is the first information hiding solution which represents interprotocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communication. PadSteg utilizes ARP and TCP protocols together with an Etherleak vulnerability (improper Ethernet frame padding) to facilitate secret communication for hidden groups in LANs (Local Area Networks). Basing on real network traces we confirm that PadSteg is feasible in today's networks and we estimate what steganographic bandwidth is achievable while limiting the chance of disclosure. We also point at possible countermeasures against PadSteg.

  13. Estimation of Information Hiding Algorithms and Parameters

    Science.gov (United States)

    2007-02-21

    growing false positives. 15. SUBJECT TERMS Information hiding, reverse-engineering, steganography , steganalysis, watermarking 16. SECURITY...specialist in breaking a covert communication system given very little information. Since it is likely for steganography to be used on very large...multimedia files, e.g. audio and video, there are substantial issues to be addressed on the implementation end of such a system as well as the theoretical

  14. The Classroom Animal: Flour Beetles.

    Science.gov (United States)

    Kramer, David C.

    1988-01-01

    Describes the flour beetle, "Tribolium confusum," and its life cycle, habitat, culturing requirements, and some possible uses of this beetle as a classroom animal. Discusses what children could learn from flour beetles. Explains how to get rid of beetles found in foods at home. (CW)

  15. S-rough sets and the discovery of F-hiding knowledge

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Singular rough sets (S-rough sets) have three classes of forms: one-directional S-rough sets, dual of one-directional S-rough sets, and two-directional S-rough sets. Dynamic, hereditary, mnemonic, and hiding properties are the basic characteristics of S-rough sets. By using the S-rough sets, the concepts of f-hiding knowledge, F-hiding knowledge, hiding degree, and hiding dependence degree are given. Then, both the hiding theorem and the hiding dependence theorem of hiding knowledge are proposed. Finally, an application of hiding knowledge is discussed.

  16. Aportaciones corológicas de la colección del Museu de Ciències Naturals de Barcelona a la fauna iberobalear del género Dermestes Linnaeus, 1758 (Coleoptera, Dermestidae

    Directory of Open Access Journals (Sweden)

    Prieto, M.

    2013-09-01

    Full Text Available Chorological contributions from the Natural History Museum of Barcelona collection to the Ibero-Balearic fauna of the genus Dermestes Linnaeus, 1758 (Coleoptera, Dermestidae Chorological information of 15 Ibero-Balearic species of the genus Desmestes Linnaeus, 1758 is provided. Data were obtained from the review of 635 specimens housed in the entomological collection of the Natural History Museum of Barcelona. All examined material is listed, and the distributions are discussed taking into account the collection records and bibliographical sources. The distribution areas for most species have been extended.

  17. Minimax eigenvector decomposition for data hiding

    Science.gov (United States)

    Davidson, Jennifer

    2005-09-01

    Steganography is the study of hiding information within a covert channel in order to transmit a secret message. Any public media such as image data, audio data, or even file packets, can be used as a covert channel. This paper presents an embedding algorithm that hides a message in an image using a technique based on a nonlinear matrix transform called the minimax eigenvector decomposition (MED). The MED is a minimax algebra version of the well-known singular value decomposition (SVD). Minimax algebra is a matrix algebra based on the algebraic operations of maximum and addition, developed initially for use in operations research and extended later to represent a class of nonlinear image processing operations. The discrete mathematical morphology operations of dilation and erosion, for example, are contained within minimax algebra. The MED is much quicker to compute than the SVD and avoids the numerical computational issues of the SVD because the operations involved only integer addition, subtraction, and compare. We present the algorithm to embed data using the MED, show examples applied to image data, and discuss limitations and advantages as compared with another similar algorithm.

  18. Augmented Reality Marker Hiding with Texture Deformation.

    Science.gov (United States)

    Kawai, Norihiko; Sato, Tomokazu; Nakashima, Yuta; Yokoya, Naokazu

    2016-10-19

    Augmented reality (AR) marker hiding is a technique to visually remove AR markers in a real-time video stream. A conventional approach transforms a background image with a homography matrix calculated on the basis of a camera pose and overlays the transformed image on an AR marker region in a real-time frame, assuming that the AR marker is on a planar surface. However, this approach may cause discontinuities in textures around the boundary between the marker and its surrounding area when the planar surface assumption is not satisfied. This paper proposes a method for AR marker hiding without discontinuities around texture boundaries even under nonplanar background geometry without measuring it. For doing this, our method estimates the dense motion in the marker's background by analyzing the motion of sparse feature points around it, together with a smooth motion assumption, and deforms the background image according to it. Our experiments demonstrate the effectiveness of the proposed method in various environments with different background geometries and textures.

  19. Enhancement of LSB based Steganography for Hiding Image in Audio

    OpenAIRE

    Pradeep Kumar Singh; R.K.Aggrawal

    2010-01-01

    In this paper we will take an in-depth look on steganography by proposing a new method of Audio Steganography. Emphasize will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method for data hiding in audio.

  20. Selective Redundancy Removal: A Framework for Data Hiding

    Directory of Open Access Journals (Sweden)

    Ugo Fiore

    2010-02-01

    Full Text Available Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs. Such redundancy may be removed by means of optimization software. Redundancy removal, if applied selectively, enables information hiding. This work introduces Selective Redundancy Removal (SRR as a framework for hiding data. An example application of the framework is given in terms of hiding information in HTML documents. Non-uniformity across documents may raise alarms. Nevertheless, selective application of optimization techniques might be due to the legitimate use of optimization software not supporting all the optimization methods, or configured to not use all of them.

  1. Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures

    CERN Document Server

    Mazurczyk, Wojciech; Zander, Sebastian; Houmansadr, Amir; Szczypiorski, Krzysztof

    2016-01-01

    Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. This book provides the fundamental concepts, terminology, and classifications of information hiding in communication networks along with its historical background. Information Hiding In Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures begins with introducing data concealment methods and their evolution. Chapter two discusses the existing terminology and describes the model for hidden communication and related communication scenarios. Chapters three to five present the main classes of information hiding in communication networks accompanied by a discussion of their robustness and undetectability. The book concludes with a discussion of potential countermeasures against information hiding techniques, which includes different types of mechanisms for the detection, limitation and prevention of covert co munication channels.

  2. What do dung beetles eat?

    DEFF Research Database (Denmark)

    Holter, Peter; Scholtz, Clarke H.

    2007-01-01

    Most adult coprophagous beetles feed on fresh dung of mammalian herbivores, confining ingestion to small particles with measured maximum diameters from 2-5 to 130 µm, according to body size and kind of beetle. This study explores benefits and costs of selective feeding in a ‘typical' dung beetle ...

  3. Where is hbar Hiding in Entropic Gravity?

    CERN Document Server

    Chen, Pisin

    2011-01-01

    The entropic gravity scenario recently proposed by Erik Verlinde reproduced the Newton's law of purely classical gravity yet the key assumptions of this approach all have quantum mechanical origins. This is atypical for emergent phenomena in physics, where the underlying, more fundamental physics often reveals itself as corrections to the leading classical behavior. So one naturally wonders: where is hbar hiding in entropic gravity? To address this question, we first revisit the idea of holographic screen as well as entropy and its variation law in order to obtain a self-consistent approach to the problem. Next we argue that when dealing with quantum gravity issues the generalized uncertainty principle (GUP) should be the more appropriate foundation. Indeed based on GUP it has been demonstrated that the black hole Bekenstein entropy area law must be modified not only in the strong but also in the weak gravity regime. In the weak gravity limit, such a GUP modified entropy exhibits a logarithmic correction term...

  4. Hiding secret data into a carrier image

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2012-06-01

    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  5. Hiding Quantum Information in the Perfect Code

    CERN Document Server

    Shaw, Bilal A

    2010-01-01

    We present and analyze a protocol for quantum steganography where the sender (Alice) encodes her steganographic information into the error syndromes of the perfect (five-qubit) quantum error-correcting code, and sends it to the receiver (Bob) over a depolarizing channel. Alice and Bob share a classical secret key, and hide quantum information in such a way that to an eavesdropper (Eve) without access to the secret key, the quantum message looks like an innocent codeword with a typical sequence of quantum errors. We calculate the average rate of key consumption, and show how the protocol improves in performance as information is spread over multiple codeword blocks. Alice and Bob utilize different encodings to optimize the average number of steganographic bits that they can send to each other while matching the error statistics of the depolarizing channel.

  6. The Beetle comparator implementation

    CERN Document Server

    Van Beuzekom, M G

    2003-01-01

    Measurements of the comparator thresholds on a Beetle 1.1 chip show large variations. The width of the threshold distribution is several tenths of a MIP signal for a 300 µm silicon detector, which is more than can be corrected for by individual threshold settings. Monte Carlo simulations of the production-process parameters have been performed to track the cause of this large offset spread. The main cause of the offset variation is the spread in the threshold voltage of the MOSFETs. Since this cannot easily be solved by a change in the design of the comparator as such, the solution is to increase the range of the individual threshold settings while maintaining the same resolution. This implies an increase in the number of bits for the individual thresholds. The note describes measurements and simulations for the Beetle versions 1.1 and 1.2, and the changes in the design for the Beetle 1.3.

  7. Multimedia Data Hiding and Authentication via Halftoning and Coordinate Projection

    Directory of Open Access Journals (Sweden)

    Wu Chai Wah

    2002-01-01

    Full Text Available We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is demonstrated. The image authentication scheme is based on the data hiding scheme and can detect, localize, and repair the tampered area of the image. Furthermore, the self-repairing feature of the authentication scheme has a hologram-like quality; any portion of the image can be used to reconstruct the entire image, with a greater quality of reconstruction as the portion size increases.

  8. Mechanical properties of biobased films prepared from collagen solutions derived from bovine hides

    Science.gov (United States)

    The most valuable byproducts of the meat packing industry are hides. The U.S. is the world’s 3rd largest hide producing country and currently produces approximately 35 million cattle hides annually. Due to fierce competition in global markets, the American leather and hides industry is facing chal...

  9. Hide and New in the Pi-Calculus

    Directory of Open Access Journals (Sweden)

    Marco Giunti

    2012-08-01

    Full Text Available In this paper, we enrich the pi-calculus with an operator for confidentiality (hide, whose main effect is to restrict the access to the object of the communication, thus representing confidentiality in a natural way. The hide operator is meant for local communication, and it differs from new in that it forbids the extrusion of the name and hence has a static scope. Consequently, a communication channel in the scope of a hide can be implemented as a dedicated channel, and it is more secure than one in the scope of a new. To emphasize the difference, we introduce a spy context that represents a side-channel attack and breaks some of the standard security equations for new. To formally reason on the security guarantees provided by the hide construct, we introduce an observational theory and establish stronger equivalences by relying on a proof technique based on bisimulation semantics.

  10. A Data-reversible Hiding Algorithm in WSNs

    Directory of Open Access Journals (Sweden)

    Jia CHEN

    2013-09-01

    Full Text Available In view of the phenomenon that data-hiding algorithm is easy to be detected by inspecting tool SPAM when carrying information, random insertion and histogram modification are adapted in the data hiding. A data-reversible hiding algorithm in WSNs is put forward. By collecting and referring sub-graph, calculating data fusion algorithm that can protect the data’s completion and privacy and analyzing the reversible hiding data algorithm research, the inspection of SPAM. Finally MATLAB7.0 exploitation is adopted to stimulate the analysis of experiment. The result shows that compared with Kim algorithm, the algorithm is safer to prevent the SPAM inspection and is more suitable for information transfer.

  11. Legionnaires' Hiding in Hospital, Nursing Home Plumbing Systems: CDC

    Science.gov (United States)

    ... gov/news/fullstory_166302.html Legionnaires' Hiding in Hospital, Nursing Home Plumbing Systems: CDC Effective water management, sanitation programs can reduce the risk of exposure to this deadly bacteria To use the sharing ...

  12. A Simple Image Encoding Method with Data Lossless Information Hiding

    OpenAIRE

    Zhi-Hui Wang; Chin-Chen Chang; Ming-Chu Li; Tzu-Chuen Lu

    2011-01-01

    In this paper, we propose a simple reversible data hiding method in the spatial domain for block truncation coding (BTC) compressed grayscale images. The BTC method compresses a block of a grayscale image to a bitmap and a pair of quantization numbers. The proposed method first embeds secret bits into a block by changing the order of those two quantization numbers. The compression rate is not enlarged by this embedding scheme. To further improve the hiding capacity, the proposed method embeds...

  13. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  14. A chaos-based approach for information hiding security

    OpenAIRE

    Bahi, Jacques M.; Guyeux, Christophe

    2010-01-01

    This paper introduces a new framework for data hiding security. Contrary to the existing ones, the approach introduced here is not based on probability theory. In this paper, a scheme is considered as secure if its behavior is proven unpredictable. The objective of this study is to enrich the existing notions of data hiding security with a new rigorous and practicable one. This new definition of security is based on the notion of topological chaos. It could be used to reinforce the confidence...

  15. Let’s play hide and seek!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    This week, we would like you to play a small online game called “Virtual Hide & Seek”. The rules are simple: some of our colleagues have published some sensitive or confidential documents on CERN’s central services like Indico, CDS, EDMS or TWiki, as well as on our many websites. Your mission, should you choose to accept it: find them!   If you provide us with documents marked “confidential”, “classified”, “sensitive”, or containing plain text operational passwords, you can win a book on computer security. There are only few conditions: these documents must be visible from outside CERN, must not require a CERN account in order to access them, and must not belong to you or have a direct link with your work. Have fun! But seriously, are you sure that your documents are really properly protected? We regularly find confidential documents stored on one of the CERN central  services and w...

  16. Book Review: No Place To Hide

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2007-03-01

    Full Text Available O'Harrow, R., Jr. (2006. No Place To Hide. New York: Free Press. 352 pages, ISBN: 0-7432-8705-3 (paper, US$26Reviewed by Gary C. Kessler (gary.kessler@champlain.eduPersonal privacy and the protection of personal identifying information are of concern to all of us. Innumerable articles and conferences address our loss of privacy, either through the sale of consumer databases or our own inattention. Opinions vary from "You have no privacy; get over it" to "This is the end of civil liberties as we know them." We teach people to safely maneuver on the Internet and minimize their exposure to bogus sites set up to steal their identity, warn users about the dangers of phishing and posting personal information on social network sites, use firewalls to protect our databases, and enact laws such as the Health Insurance Portability and Accountability Act (HIPAA and the Family Educational Rights and Privacy Act (FERPA to protect information.(see PDF for full review

  17. [Rapid quantification of total nitrogen and end-point determination of hide melting in manufacturing of donkey-hide gelatin].

    Science.gov (United States)

    Han, Hai-Fan; Zhang, Lu; Zhang, Yan; Li, Wen-Long; Qu, Hai-Bin

    2014-03-01

    Hide melting presents itself as one of the most critical processes in the production of donkey-hide gelatin. Here a NIR-based method was established for the rapid analysis of in-process hide melting solutions as well as for end-point determination of this process. Near infrared (NIR) spectra of hide melting solutions were collected in transflective mode. With the contents of total nitrogen determined by the Kjeldahl method as reference values, partial least squares regression (PLSR) was employed to build calibration models between NIR spectra and total nitrogen. Model parameters including wavelength range and PLS factors were optimized to achieve best model performance. Based on the contents of total nitrogen predicted by calibration model, end point of hide melting was determined. The constructed PLS model gave a high correlation coefficient (R2) of 0.991 3 and a root mean square error of prediction (RMSEP) of 0.807 g x L(-1). With the predicted total nitrogen and predefined limit, decisions concerning the proper times of melting were made. This research demonstrated that NIR transflectance spectroscopy could be used to expeditiously determine the contents of total nitrogen which was subsequently chosen as the indictor for determining the end-point of hide melting. The proposed procedure may help avoid unnecessary raw material or energy consumption.

  18. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Directory of Open Access Journals (Sweden)

    Andreas Wilke

    Full Text Available Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  19. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Science.gov (United States)

    Wilke, Andreas; Minich, Steven; Panis, Megane; Langen, Tom A; Skufca, Joseph D; Todd, Peter M

    2015-01-01

    Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed) patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching) times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  20. Alkali-free method of hide preparation for tanning

    Directory of Open Access Journals (Sweden)

    V. Valeika

    2012-06-01

    Full Text Available Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming up to strongly acid (pickling. This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. During both processes, unhairing and oxidative treatment, the opening of the derma structure occurs: 13.3-14.6g of non-collagen proteins are removed and amount of dermatan sulphate decreases by 35%. The hide obtained can be chromed directly after the above processes and subsequent treatment with sodium chloride solution omitted conventional pickling. The pH of the hide varies in the range of 8.3-3.7 during the processes of preparation for tanning.

  1. Hiding image to video: A new approach of LSB replacement

    Directory of Open Access Journals (Sweden)

    Saurabh Singh,

    2010-12-01

    Full Text Available Steganography has become great area of interest for researchers as need for secure transaction of information is increasing day by day. Information may be text, image, audio or video. Steganography is a technique in which required information is hided in any other information such that the second information does not change significantly and it appears the same as original. This paper presents a novel approach of hiding image in a video. The proposed algorithm is replacing one LSB of each pixel in video frames. It becomes very difficult for intruder to guess that an image is hidden in the video as individual frames are very difficult to analyze in a video running at 30 frames per second. The process of analysis has been made more difficult by hiding each row of image pixels in multiple frames of the video, so intruder cannot even try to unhide image until he get full video.

  2. EFFICIENT METHOD FOR HIDING DATA BY PIXEL INTENSITY

    Directory of Open Access Journals (Sweden)

    M.Shobana

    2013-02-01

    Full Text Available Data communication substructure has become more universal that there is absolutely no favoritism between different types of data in the carry plane of communication with each and every one skilled to carry it through the public data networks. Steganography technique is used to hide or embed data into an image or audio or video. Here the cover object used is an image. In the existing method for hiding and extraction of information from the given image three kinds of algorithm are used, based on its data and index channel of an image. In the proposed system, three kinds of hiding technique are implemented with some modifications in the logic level. Third algorithm is designed using color channels, based on its intensity. This technique would boost up the number of bits embedding in the image. The accomplishment of all the three algorithms are analyzed and the efficient one is taken into consideration while implementing in FPGA.

  3. Capacity bounds and constructions for reversible data-hiding

    Science.gov (United States)

    Kalker, Ton; Willems, Frans M. J.

    2003-06-01

    An undesirable side effect of many watermarking and data-hiding schemes is that the host signal into which auxiliary data is embedded is distorted. Finding an optimal balance between the amount of information embedded and the induced distortion is therefore an active field of research. In recent years, with the rediscovery of Costa's seminal paper Writing on Dirty Paper, there has been considerable progress in understanding the fundamental limits of the capacity versus distortion of watermarking and data-hiding schemes. For some applications, however, no distortion resulting from auxiliary data, however small, is allowed. In these cases the use of reversible data-hiding methods provide a way out. A reversible data-hiding scheme is defined as a scheme that allows complete and blind restoration (i.e. without additional signaling) of the original host data. Practical reversible data-hiding schemes have been proposed by Fridrich et al., but little attention has been paid to the theoretical limits. Some first results on the capacity of reversible watermarking schemes have been derived. The reversible schemes considered in most previous papers have a highly fragile nature: in those schemes, changing a single bit in the watermarked data would prohibit recovery of both the original host signal as well as the embedded auxiliary data. It is the purpose of this paper to repair this situation and to provide some first results on the limits of robust reversible data-hiding. Admittedly, the examples provided in this paper are toy examples, but they are indicative of more practical schemes that will be presented in subsequent papers.

  4. Selective adsorption of tannins onto hide collagen fibres

    Institute of Scientific and Technical Information of China (English)

    LIAO; Xuepin(廖学品); LU; Zhongbing(陆忠兵); SHI; Bi(石碧)

    2003-01-01

    Hide collagen of animals is used to prepare adsorbent material and its adsorption properties to tannins are investigated. It is indicated that the collagen fibres has excellent adsorption selectivity and high adsorption capacity to tannins. The adsorption rate of tannins is more than 90% whilst less than 10% of functional components are retained by the adsorbent. The adsorption mechanism of tannins onto hide collagen fibres is hydrogen-bonding association. Freundlich model can be used to describe the adsorption isotherms, and the pseudo-second-order rate model can be used to describe adsorption kinetics.

  5. Competitively coupled maps for hiding secret visual information

    Science.gov (United States)

    Vaidelys, M.; Ziaukas, P.; Ragulskis, M.

    2016-02-01

    A novel digital image hiding scheme based on competitively coupled maps is presented in this paper. Self-organizing patterns produced by an array of non-diffusively coupled nonlinear maps are exploited to conceal the secret. The secret image is represented in the form of a dot-skeleton representation and is embedded into a spatially homogeneous initial state far below the noise level. Self-organizing patterns leak the secret image at a predefined set of system parameters. Computational experiments are used to demonstrate the effectiveness and the security of the proposed image hiding scheme.

  6. 9 CFR 95.6 - Untanned hides and skins; importations permitted subject to restrictions.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Untanned hides and skins; importations... ENTRY INTO THE UNITED STATES § 95.6 Untanned hides and skins; importations permitted subject to restrictions. Hides or skins offered for importation which do not meet the conditions or requirements of §...

  7. 9 CFR 95.5 - Untanned hides and skins; requirements for unrestricted entry.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Untanned hides and skins; requirements... ENTRY INTO THE UNITED STATES § 95.5 Untanned hides and skins; requirements for unrestricted entry. Untanned hides and/or skins of cattle, buffalo, sheep, goats, other ruminants, and swine which do not...

  8. The physical properties, morphology and viscoelasticity of biobased sponges prepared from un-tanned hides

    Science.gov (United States)

    One of our research endeavors to address ongoing challenges faced by the U.S. hide and leather industries is to develop innovative uses and novel biobased products from hides to improve prospective markets and to secure a viable future for hides and leather industries. We had previously investigate...

  9. The prediction of leather mechanical properties from airborne ultrasonic testing of hides

    Science.gov (United States)

    High quality, clean, and well-preserved hides are paramount for competitiveness in both domestic and export markets. Currently, hides are visually inspected and ranked for quality and sale price, which is not reliable when hair is present on the hides. Advanced technologies are needed to nondestru...

  10. Performance Analysis of Data Hiding in MPEG-4 AAC Audio

    Institute of Scientific and Technical Information of China (English)

    XU Shuzheng; ZHANG Peng; WANG Pengjun; YANG Huazhong

    2009-01-01

    A high capacity data hiding technique was developed for compressed digital audio.As perceptual audio coding has become the accepted technology for storage and transmission of audio signals,compressed audio information hiding enables robust,imperceptible transmission of data within audio signals,thus allowing valuable information to be attached to the content,such as the song title,lyrics,composer's name,and artist or property rights related data.This paper describes simultaneous low bitrate encoding and information hiding for highly compressed audio signals.The information hiding is implemented in the quantization process of the audio content which improves robustness,signal quality,and security.The imperceptibility of the embedded data is ensured based on the masking property of the human auditory system (HAS).The robustness and security are evaluated by various attacking algorithms.Tests with an extended MPEG4 advanced audio coding (AAC) encoder confirm that the method is robust to the regular and singular groups method (RS) and sample pair analysis (SPA) attacks as well as other statistical steganalysis method attacks.

  11. DCT Based Secret Image Hiding In Video Sequence

    Directory of Open Access Journals (Sweden)

    M. Suresh Kumar

    2014-08-01

    Full Text Available Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave. As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.

  12. Video Steganography: Text Hiding In Video By LSB Substitution

    Directory of Open Access Journals (Sweden)

    Kamred Udham Singh

    2014-05-01

    Full Text Available The development of high speed computer networks and Internet has increased the easiness of Information Communication. In contrast with Analog media and Digital media provide several different advantages such as high quality, simple editing, high loyalty copying and authenticity. But in the field of data communication this type of development has increased the fear of sneaking the data while sending data from the sender to the receiver. Due to this reason Information Security is main problem of Data Communication. Steganography plays an important role in field of Information Security. Video and images are very common choice for hiding data. It is very important for effective and successful embedding process to select appropriate pixels in the video frames, which are used to store the secret data. We use video based Steganography because of large size and memory requirements. Hiding information in a carrier file we use least significant bit (LSB insertion technique. In Least significant bit (LSB insertion technique, for hiding information we change LSB of video file with the information bits .This paper will focus on hiding information in specific frames of the video and in specific position of the frame by LSB substitution.

  13. Hide And Seek GPS And Geocaching In The Classroom

    Science.gov (United States)

    Lary, Lynn M.

    2004-01-01

    In short, geocaching is a high-tech, worldwide treasure hunt (geocaches can now be found in more than 180 countries) where a person hides a cache for others to find. Generally, the cache is some type of waterproof container that contains a log book and an assortment of goodies, such as lottery tickets, toys, photo books for cachers to fill with…

  14. Powdered hide model for vegetable tanning II. hydrolyzable tannin

    Science.gov (United States)

    Vegetable tannages employ both condensed and hydrolyzable tannins. As part of our exploration of tanning mechanisms, we reported last year on interactions of the condensed tannin, quebracho, with powdered hide. In this study, the interactions of chestnut extract, a hydrolyzable tannin, with powdere...

  15. Near Reversible Data Hiding Scheme for images using DCT

    Directory of Open Access Journals (Sweden)

    T. Bhaskar

    2015-11-01

    Full Text Available Certain level of modifications to the original content can be acceptable. These schemes are called nearreversible. It has emerging application in remote sensing. In remote sensing application the image is captured while monitoring the damaged regions in the natural disasters such as tsunami, volcanic eruption, etc. Instead of more alterations to the pixels or coefficients here we go for less alterations , low hiding capacity and complexity that exhibit while reversible data hiding. There exist a few near reversible hiding schemes which address the limitations to the triangular trade-off that exists between capacity, robustness and visual quality characteristics. However, for achieving better vision of image, there is a need for near reversible data hiding schemes. Therefore, the traditional metric PSNR are not sufficient to assess the distorted image when the data is embedded in image for assessing the better visual quality of the image with hidden data we present a HVS based metrics like PSNR-HVS, MSSIM. Using DCT evaluates the overall image quality

  16. PALM and STORM: what hides beyond the Rayleigh limit?

    CSIR Research Space (South Africa)

    Henriques, R

    2009-06-01

    Full Text Available -1 Biotechnol. J. 2009, 4, 846?857 Review PALM and STORM: What hides beyond the Rayleigh limit? Ricardo Henriques1 and Musa M. Mhlanga1,2 1 Gene Expression and Biophysics Unit, Instituto de Medicina Molecular, Faculdade de Medicina Universidade de...

  17. Video Data Hiding for Managing Privacy Information in Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Hail MichaelW

    2009-01-01

    Full Text Available From copyright protection to error concealment, video data hiding has found usage in a great number of applications. In this work, we introduce the detailed framework of using data hiding for privacy information preservation in a video surveillance environment. To protect the privacy of individuals in a surveillance video, the images of selected individuals need to be erased, blurred, or re-rendered. Such video modifications, however, destroy the authenticity of the surveillance video. We propose a new rate-distortion-based compression-domain video data hiding algorithm for the purpose of storing that privacy information. Using this algorithm, we can safeguard the original video as we can reverse the modification process if proper authorization can be established. The proposed data hiding algorithm embeds the privacy information in optimal locations that minimize the perceptual distortion and bandwidth expansion due to the embedding of privacy data in the compressed domain. Both reversible and irreversible embedding techniques are considered within the proposed framework and extensive experiments are performed to demonstrate the effectiveness of the techniques.

  18. Quiz Games as a model for Information Hiding

    OpenAIRE

    Bank, Bernd; Heintz, Joos; Matera, Guillermo; Montana, Jose L.; Pardo, Luis M.; Paredes, Andres Rojas

    2015-01-01

    We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game. It allows in a uniform way to prove exponential lower bounds for several complexity problems of elimination theory.

  19. Frequent Itemset Hiding Algorithm Using Frequent Pattern Tree Approach

    Science.gov (United States)

    Alnatsheh, Rami

    2012-01-01

    A problem that has been the focus of much recent research in privacy preserving data-mining is the frequent itemset hiding (FIH) problem. Identifying itemsets that appear together frequently in customer transactions is a common task in association rule mining. Organizations that share data with business partners may consider some of the frequent…

  20. Frequent Itemset Hiding Algorithm Using Frequent Pattern Tree Approach

    Science.gov (United States)

    Alnatsheh, Rami

    2012-01-01

    A problem that has been the focus of much recent research in privacy preserving data-mining is the frequent itemset hiding (FIH) problem. Identifying itemsets that appear together frequently in customer transactions is a common task in association rule mining. Organizations that share data with business partners may consider some of the frequent…

  1. Joint data-hiding and rate-distortion optimization for H.264/AVC videos

    Science.gov (United States)

    Lin, Yih-Chuan; Li, Jung-Hong

    2012-07-01

    We address video data-hiding on the context-adaptive variable-length coding domain of the H.264/AVC standard. It is challenging to maintain a minimum variation of rate-distortion performance when hiding data in compressed videos by slightly modifying one or more transform coefficients of prediction residual data. The fluctuant variation of rate-distortion performance is especially serious in the case of hiding data in H.264/AVC compressed videos due to the thorough use of various prediction modes. Most current video data-hiding schemes concentrate on hiding messages in video intra (I)-frames to mitigate performance degradation at the expense of limited hiding capacity and applicability. Unlike most previous video data-hiding schemes, this paper considers data-hiding schemes on both I- and predicted (P)-frames of videos. We first investigate the possible ways used to suppress the significant degradation of the rate-distortion performance for hiding data in H.264/AVC videos. Based on the investigation, a hybrid video data-hiding scheme is designed to perform the classification of 4×4 residual blocks according to the characteristics of each block and to hide message data differently in each classified block in order to reduce the performance degradation caused by the data-hiding process. The block classification is based on the magnitude of the last non-zero coefficient and the coefficient difference energy of each block to select suitable blocks that are capable of contributing less degradation of coding performance for hiding additional messages. Moreover, the proposed data-hiding algorithm is incorporated with the rate-distortion optimization loop of the H.264/AVC encoder to provide further degradation suppression on the output bit-rate and decoded quality. From experiments on several well-known test videos, it can be seen that the proposed data-hiding scheme demonstrates improved efficiency on video quality and output bit-rate compared to other similar methods.

  2. Beetle wings are inflatable origami

    Science.gov (United States)

    Chen, Rui; Ren, Jing; Ge, Siqin; Hu, David

    2015-11-01

    Beetles keep their wings folded and protected under a hard shell. In times of danger, they must unfold them rapidly in order for them to fly to escape. Moreover, they must do so across a range of body mass, from 1 mg to 10 grams. How can they unfold their wings so quickly? We use high-speed videography to record wing unfolding times, which we relate to the geometry of the network of blood vessels in the wing. Larger beetles have longer unfolding times. Modeling of the flow of blood through the veins successfully accounts for the wing unfolding speed of large beetles. However, smaller beetles have anomalously short unfolding times, suggesting they have lower blood viscosity or higher driving pressure. The use of hydraulics to unfold complex objects may have implications in the design of micro-flying air vehicles.

  3. Genetics of Ophraella leaf beetles

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This proposal is to collect samples of each species of Ophraella leaf beetle encountered, not to exceed 50 specimens per species, for genetic analysis using DNA...

  4. Charles Darwin, beetles and phylogenetics.

    Science.gov (United States)

    Beutel, Rolf G; Friedrich, Frank; Leschen, Richard A B

    2009-11-01

    Here, we review Charles Darwin's relation to beetles and developments in coleopteran systematics in the last two centuries. Darwin was an enthusiastic beetle collector. He used beetles to illustrate different evolutionary phenomena in his major works, and astonishingly, an entire sub-chapter is dedicated to beetles in "The Descent of Man". During his voyage on the Beagle, Darwin was impressed by the high diversity of beetles in the tropics, and he remarked that, to his surprise, the majority of species were small and inconspicuous. However, despite his obvious interest in the group, he did not get involved in beetle taxonomy, and his theoretical work had little immediate impact on beetle classification. The development of taxonomy and classification in the late nineteenth and earlier twentieth century was mainly characterised by the exploration of new character systems (e.g. larval features and wing venation). In the mid-twentieth century, Hennig's new methodology to group lineages by derived characters revolutionised systematics of Coleoptera and other organisms. As envisioned by Darwin and Ernst Haeckel, the new Hennigian approach enabled systematists to establish classifications truly reflecting evolution. Roy A. Crowson and Howard E. Hinton, who both made tremendous contributions to coleopterology, had an ambivalent attitude towards the Hennigian ideas. The Mickoleit school combined detailed anatomical work with a classical Hennigian character evaluation, with stepwise tree building, comparatively few characters and a priori polarity assessment without explicit use of the outgroup comparison method. The rise of cladistic methods in the 1970s had a strong impact on beetle systematics. Cladistic computer programs facilitated parsimony analyses of large data matrices, mostly morphological characters not requiring detailed anatomical investigations. Molecular studies on beetle phylogeny started in the 1990s with modest taxon sampling and limited DNA data. This has

  5. Charles Darwin, beetles and phylogenetics

    Science.gov (United States)

    Beutel, Rolf G.; Friedrich, Frank; Leschen, Richard A. B.

    2009-11-01

    Here, we review Charles Darwin’s relation to beetles and developments in coleopteran systematics in the last two centuries. Darwin was an enthusiastic beetle collector. He used beetles to illustrate different evolutionary phenomena in his major works, and astonishingly, an entire sub-chapter is dedicated to beetles in “The Descent of Man”. During his voyage on the Beagle, Darwin was impressed by the high diversity of beetles in the tropics, and he remarked that, to his surprise, the majority of species were small and inconspicuous. However, despite his obvious interest in the group, he did not get involved in beetle taxonomy, and his theoretical work had little immediate impact on beetle classification. The development of taxonomy and classification in the late nineteenth and earlier twentieth century was mainly characterised by the exploration of new character systems (e.g. larval features and wing venation). In the mid-twentieth century, Hennig’s new methodology to group lineages by derived characters revolutionised systematics of Coleoptera and other organisms. As envisioned by Darwin and Ernst Haeckel, the new Hennigian approach enabled systematists to establish classifications truly reflecting evolution. Roy A. Crowson and Howard E. Hinton, who both made tremendous contributions to coleopterology, had an ambivalent attitude towards the Hennigian ideas. The Mickoleit school combined detailed anatomical work with a classical Hennigian character evaluation, with stepwise tree building, comparatively few characters and a priori polarity assessment without explicit use of the outgroup comparison method. The rise of cladistic methods in the 1970s had a strong impact on beetle systematics. Cladistic computer programs facilitated parsimony analyses of large data matrices, mostly morphological characters not requiring detailed anatomical investigations. Molecular studies on beetle phylogeny started in the 1990s with modest taxon sampling and limited DNA data

  6. Low doses of the common alpha-cypermethrin insecticide affect behavioural thermoregulation of the non-targeted beneficial carabid beetle Platynus assimilis (Coleoptera: Carabidae).

    Science.gov (United States)

    Merivee, Enno; Tooming, Ene; Must, Anne; Sibul, Ivar; Williams, Ingrid H

    2015-10-01

    Sub-lethal effects of pesticides on behavioural endpoints are poorly investigated in non-targeted beneficial carabids. Conspicuous changes in locomotor activity of carabids exposed to sub-lethal doses of neurotoxic insecticides suggest that many other behaviours of these insects might be severely injured as well. We hypothesize that behavioural thermoregulation of carabids may be affected by low doses of neurotoxic pyrethroid insecticide alpha-cypermethrin which may have direct deleterious consequences for the fitness and populations of the beetles in the field. Automated video tracking of the carabid beetle Platynus assimilis Paykull (Coleoptera: Carabidae) on an experimental thermal mosaic arena using EthoVision XT Version 9 software (Noldus Information Technology, Wageningen, The Netherlands) showed that brief exposure to alpha-cypermethrin at sub-lethal concentrations (0.1-10mgL(-1)) drastically reduces the ability of the beetles for behavioural thermoregulation. At noxious high temperature, a considerable number of the beetles died due to thermo-shock. Other intoxicated beetles that survived exposure to high temperature displayed behavioural abnormalities. During heating of the arena from 25 to 45°C, insecticide treated beetles showed a significant fall in tendency to hide in a cool shelter (20°C) and prolonged exposure to noxious high temperatures, accompanied by changes in locomotor activity. Next day after insecticide treatment the beetles recovered from behavioural abnormalities to a large extent but they still were considerably longer exposed to noxious high temperatures compared to the negative control beetles. Our results demonstrated that behavioural thermoregulation is a sensitive and important etho-toxicological biomarker in ground-dwelling carabids. Prolonged exposure to unfavourably high temperatures has an array of negative effects decreasing fitness and survival of these insects at elevated thermal conditions with deep temperature gradients

  7. Optical image hiding based on computational ghost imaging

    Science.gov (United States)

    Wang, Le; Zhao, Shengmei; Cheng, Weiwen; Gong, Longyan; Chen, Hanwu

    2016-05-01

    Imaging hiding schemes play important roles in now big data times. They provide copyright protections of digital images. In the paper, we propose a novel image hiding scheme based on computational ghost imaging to have strong robustness and high security. The watermark is encrypted with the configuration of a computational ghost imaging system, and the random speckle patterns compose a secret key. Least significant bit algorithm is adopted to embed the watermark and both the second-order correlation algorithm and the compressed sensing (CS) algorithm are used to extract the watermark. The experimental and simulation results show that the authorized users can get the watermark with the secret key. The watermark image could not be retrieved when the eavesdropping ratio is less than 45% with the second-order correlation algorithm, whereas it is less than 20% with the TVAL3 CS reconstructed algorithm. In addition, the proposed scheme is robust against the 'salt and pepper' noise and image cropping degradations.

  8. Hiding a Realistic Object Using a Broadband Terahertz Invisibility Cloak

    CERN Document Server

    Zhou, Fan; Cao, Wei; Stuart, Colin T; Gu, Jianqiang; Zhang, Weili; Sun, Cheng

    2011-01-01

    The invisibility cloak has been a long-standing dream for many researchers over the decades. The introduction of transformational optics has revitalized this field by providing a general method to design material distributions to hide the subject from detection. By transforming space and light propagation, a three-dimensional (3D) object is perceived as having a reduced number of dimensions, in the form of points, lines, and thin sheets, making it "undetectable" judging from the scattered field. Although a variety of cloaking devices have been reported at microwave and optical frequencies, the spectroscopically important Terahertz (THz) domain remains unexplored. Moreover, due to the difficulties in fabricating cloaking devices that are optically large in all three dimensions, hiding realistic 3D objects has yet to be demonstrated. Here, we report the first experimental demonstration of a 3D THz cloaking device fabricated using a scalable Projection Microstereolithography process. The cloak operates at a broa...

  9. Steganography Algorithm to Hide Secret Message inside an Image

    CERN Document Server

    Ibrahim, Rosziati

    2011-01-01

    In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (SIS) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the PSNR (Peak signal-to-noise ratio) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.

  10. The effect of media on knowledge hiding in entrepreneurial firms

    DEFF Research Database (Denmark)

    Labafi, Somayeh; Khajeheian, Datis; Williams, Idongesit

    2017-01-01

    in a qualitative study. Thematic analysis is used to analyze transcribed interview data from employees in a software company in Iran. The findings of the analysis show that media richness significantly impacts on organizational learning and influences on knowledge hiding behavior in employees. This article...... suggests that entrepreneurs and managers of small firms should provide employees’ access to rich media content as well as established organizational learning as part of their organizational culture........ For this reason, factors that influence on the tendency of employees to expose and use their knowledge would be appreciated by managers of organizations. This paper investigates the effect of the media on knowledge hiding in organizations. The investigation is done with the aid of a conceptual framework...

  11. Robust color image hiding method in DCT domain

    Institute of Scientific and Technical Information of China (English)

    LI Qing-zhong; YU Chen; CHU Dong-sheng

    2006-01-01

    This paper presents a robust color image hiding method based on YCbCr color system in discrete cosine transform (DCT) domain,which can hide a secret color image behind a public color cover image and is compatible with the international image compression standard of JPEG.To overcome the grave distortion problem in the restored secret image,this paper proposes a new embedding scheme consisting of reasonable partition of a pixel value and sign embedding.Moreover,based on human visual system (HVS) and fuzzy theory,this paper also presents a fuzzy classification method for DCT sub-blocks to realize the adaptive selection of embedding strength.The experimental results show that the maximum distortion error in pixel value for the extracted secret image is ±1.And the color cover image can provide good quality after embedding large amount of data.

  12. Hiding an image in cascaded Fresnel digital holograms

    Institute of Scientific and Technical Information of China (English)

    Shaogeng Deng; Liren Liu; Haitao Lang; Weiqing Pan; Dong Zhao

    2006-01-01

    @@ A system of two separated computer-generated holograms termed cascaded Fresnel digital holography (CFDH) is proposed and its application to hiding information is demonstrated by a computer simulation experiment. The technique is that the reconstructed image is the result of the wave Fresnel diffractionof two sub-holograms located at different distances from the imaging plane along the illuminating beam. The two sub-holograms are generated by an iterative algorithm based on the projection onto convex sets. In the application to the hiding of optical information, the information to be hidden is encoded into thesub-hologram which is multiplied by the host image in the input plane, the other sub-hologram in the filterplane is used for the deciphering key, the hidden image can be reconstructed in the imaging plane of the CFDH setup.

  13. A dynamical model for bark beetle outbreaks.

    Science.gov (United States)

    Křivan, Vlastimil; Lewis, Mark; Bentz, Barbara J; Bewick, Sharon; Lenhart, Suzanne M; Liebhold, Andrew

    2016-10-21

    Tree-killing bark beetles are major disturbance agents affecting coniferous forest ecosystems. The role of environmental conditions on driving beetle outbreaks is becoming increasingly important as global climatic change alters environmental factors, such as drought stress, that, in turn, govern tree resistance. Furthermore, dynamics between beetles and trees are highly nonlinear, due to complex aggregation behaviors exhibited by beetles attacking trees. Models have a role to play in helping unravel the effects of variable tree resistance and beetle aggregation on bark beetle outbreaks. In this article we develop a new mathematical model for bark beetle outbreaks using an analogy with epidemiological models. Because the model operates on several distinct time scales, singular perturbation methods are used to simplify the model. The result is a dynamical system that tracks populations of uninfested and infested trees. A limiting case of the model is a discontinuous function of state variables, leading to solutions in the Filippov sense. The model assumes an extensive seed-bank so that tree recruitment is possible even if trees go extinct. Two scenarios are considered for immigration of new beetles. The first is a single tree stand with beetles immigrating from outside while the second considers two forest stands with beetle dispersal between them. For the seed-bank driven recruitment rate, when beetle immigration is low, the forest stand recovers to a beetle-free state. At high beetle immigration rates beetle populations approach an endemic equilibrium state. At intermediate immigration rates, the model predicts bistability as the forest can be in either of the two equilibrium states: a healthy forest, or a forest with an endemic beetle population. The model bistability leads to hysteresis. Interactions between two stands show how a less resistant stand of trees may provide an initial toe-hold for the invasion, which later leads to a regional beetle outbreak in the

  14. Biological pest control in beetle agriculture.

    Science.gov (United States)

    Aanen, Duur K; Slippers, Bernard; Wingfield, Michael J

    2009-05-01

    Bark beetles are among the most destructive tree pests on the planet. Their symbiosis with fungi has consequently been studied extensively for more than a century. A recent study has identified actinomycete bacteria that are associated with the southern pine beetle and produce specific antibiotics against an antagonist of the beetles' mutualistic fungus. In addition to highlighting the ecological complexity of bark-beetle-microbial symbioses, this work reveals a potential source of novel antibiotics.

  15. Early Cretaceous angiosperms and beetle evolution

    OpenAIRE

    Bo eWang; Haichun eZhang; Edmund eJarzembowski

    2013-01-01

    The Coleoptera (beetles) constitute almost one–fourth of all known life-forms on earth. They are also among the most important pollinators of flowering plants, especially basal angiosperms. Beetle fossils are abundant, almost spanning the entire Early Cretaceous, and thus provide important clues to explore the co-evolutionary processes between beetles and angiosperms. We review the fossil record of some Early Cretaceous polyphagan beetles including Tenebrionoidea, Scarabaeoidea, Curculionoide...

  16. A NEW APPROACH FOR HIDING DATA USING B-BOX

    Directory of Open Access Journals (Sweden)

    Dr. Saad Abdual azize AL_ani

    2013-11-01

    Full Text Available Digital Images and video encryption play an important role in today’s multimedia world. Many encryption schemes have been proposed to provide a security for digital images. This paper designs an efficient cryptosystem for video. Our method can achieve two goals; the first goal is to design a height security for hiding a data in video, the second goal is to design a computational complexity cryptosystem.

  17. Unitary embedding for data hiding with the SVD

    Science.gov (United States)

    Bergman, Clifford; Davidson, Jennifer

    2005-03-01

    Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Most current steganography algorithms insert data in the spatial or transform domains; common transforms include the discrete cosine transform, the discrete Fourier transform, and discrete wavelet transform. In this paper, we present a data-hiding algorithm that exploits a decomposition representation of the data instead of a frequency-based transformation of the data. The decomposition transform used is the singular value decomposition (SVD). The SVD of a matrix A is a decomposition A= USV' in which S is a nonnegative diagonal matrix and U and V are orthogonal matrices. We show how to use the orthogonal matrices in the SVD as a vessel in which to embed information. Several challenges were presented in order to accomplish this, and we give effective information-hiding using the SVD can be just as effective as using transform-based techniques. Furthermore, different problems arise when using the SVD than using a transform-based technique. We have applied the SVD to image data, but the technique can be formulated for other data types such as audio and video.

  18. Steganographic Techniques of Data Hiding Using Digital Images (Review Paper

    Directory of Open Access Journals (Sweden)

    Babloo Saha

    2012-01-01

    Full Text Available Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography’s goal is to hide the very existence of embedded data so as not to arouse an eavesdropper’s suspicion. For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, and all of them have their respective pros and cons. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance. applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper intends to give thorough understanding and evolution of different existing digital image steganography techniques of data hiding in spatial, transform and compression domains. It covers and integrates recent research work without going in to much detail of steganalysis, which is the art and science of defeating steganography.Defence Science Journal, 2012, 62(1, pp.11-18, DOI:http://dx.doi.org/10.14429/dsj.62.1436

  19. High Capacity data hiding using LSB Steganography and Encryption

    Directory of Open Access Journals (Sweden)

    Shamim Ahmed Laskar

    2013-01-01

    Full Text Available The network provides a method of communication to distribute information to the masses. With the growthof data communication over computer network, the security of information has become a major issue.Steganography and cryptography are two different data hiding techniques. Steganography hides messagesinside some other digital media. Cryptography, on the other hand obscures the content of the message. Wepropose a high capacity data embedding approach by the combination of Steganography andcryptography. In the process a message is first encrypted using transposition cipher method and then theencrypted message is embedded inside an image using LSB insertion method. The combination of these twomethods will enhance the security of the data embedded. This combinational methodology will satisfy therequirements such as capacity, security and robustness for secure data transmission over an open channel.A comparative analysis is made to demonstrate the effectiveness of the proposed method by computingMean square error (MSE and Peak Signal to Noise Ratio (PSNR. We analyzed the data hiding techniqueusing the image performance parameters like Entropy, Mean and Standard Deviation. The stego imagesare tested by transmitting them and the embedded data are successfully extracted by the receiver. The mainobjective in this paper is to provide resistance against visual and statistical attacks as well as highcapacity.

  20. Data Hiding Techniques Using Prime and Natural Numbers

    CERN Document Server

    Dey, Sandipan; Bandyopadhyay, Bijoy; Sanyal, Sugata

    2010-01-01

    In this paper, a few novel data hiding techniques are proposed. These techniques are improvements over the classical LSB data hiding technique and the Fibonacci LSB data-hiding technique proposed by Battisti et al. \\cite{r1}. The classical LSB technique is the simplest, but using this technique it is possible to embed only in first few bit-planes, since image quality becomes drastically distorted when embedding in higher bit-planes. Battisti et al. \\cite{r1} proposed an improvement over this by using Fibonacci decomposition technique and generating a different set of virtual bit-planes all together, thereby increasing the number of bit-planes. In this paper, first we mathematically model and generalize this particular approach of virtual bit-plane generation. Then we propose two novel embedding techniques, both of which are special-cases of our generalized model. The first embedding scheme is based on decomposition of a number (pixel-value) in sum of prime numbers, while the second one is based on decompositi...

  1. Hiding Data in Images Using New Random Technique

    Directory of Open Access Journals (Sweden)

    Obaida Mohammad Awad Al-Hazaimeh

    2012-07-01

    Full Text Available Steganography is the art of hiding the fact that communication is taking place by hiding information in other information. In the field of Data Communication, Steganography play a major role. The transmission of information via the Internet may expose it to detect and theft. Some solution to be discussed is how to passing information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. We focus on the Least Significant Bit (LSB technique which is the most common Steganographic technique is employed in this paper. An improvement to this technique is suggested by randomly inserting the bits of the message in the image to produce more secured system. In this paper, the security goals were enhanced via a proposed cryptosystems to maintain the security on the Cover-image. The proposed solution consists of a simple, but strong to hiding the text data and the human eye would be unable to notice the hidden data in the Stego-image.

  2. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

    Directory of Open Access Journals (Sweden)

    Keita Emura

    2014-01-01

    Full Text Available If there are many displaced workers in a company, then a person who goes for job hunting might not select this company. That is, the number of members who quit is quite negative information. Similarly, in revocable group signature schemes, if one knows (or guesses the number of revoked users (say r, then one may guess the reason behind such circumstances, and it may lead to harmful rumors. However, no previous revocation procedure can achieve hiding r. In this paper, we propose the first revocable group signature scheme, where r is kept hidden, which we call r-hiding revocable group signature. To handle this property, we newly define the security notion called anonymity with respect to the revocation which guarantees the unlinkability of revoked users.

  3. Function S-rough sets and security-authentication of hiding law

    Institute of Scientific and Technical Information of China (English)

    SHI KaiQuan; ZHAO JianLi

    2008-01-01

    Function S-rough sets are defined by R-function equivalence class,which have dynamic characteristic.Function S-rough sets have dynamic characteristic,law characteristic and law-hiding characteristic.Function S-rough sets can generate f-hiding law and f-hiding law.By engrafting,crossing,and penetrating between the information security theory and function S-rough sets,the security hiding and the authentication of f-hiding law and f-hiding law are given respectively in this paper.The fusion and share between function S-rough sets and information secu-rity theory is a new research direction of the application of information law in in-formation system.

  4. The Beetle Reference Manual

    CERN Document Server

    Van Bakel, N; Van den Brand, J F J; Feuerstack-Raible, M; Harnew, N; Hofmann, W; Knöpfle, K-T; Löchner, S; Schmelling, M; Sexauer, E; Smale, N J; Trunk, U; Verkooijen, H

    2001-01-01

    This paper details the port de nitions, electrical speci cations, modes of operation and programming sequences of the 128 channel readout chip Beetle . The chip is developed for the LHCb experiment and ful lls the requirements of the silicon vertex detector, the inner tracker, the pile-up veto trigger and the RICH detector in case of multianode photomultiplier readout. It integrates 128 channels with low-noise charge-sensitive preampli ers and shapers. The risetime of the shaped pulse is 25 ns with a 30% remainder of the peak voltage after 25 ns. A comparator per channel with con gurable polarity provides a binary signal. Four adjacent comparator channels are being ORed and brought o chip via LVDS ports. Either the shaper or comparator output is sampled with the LHC-bunch-crossing frequency of 40 MHz into an analogue pipeline with a programmable latency of max. 160 sampling intervalls and an integrated derandomizing bu er of 16 stages. For analog readout data is multiplexed with up to 40 MHz onto 1 or 4 ports...

  5. Hiding message into DNA sequence through DNA coding and chaotic maps.

    Science.gov (United States)

    Liu, Guoyan; Liu, Hongjun; Kadir, Abdurahman

    2014-09-01

    The paper proposes an improved reversible substitution method to hide data into deoxyribonucleic acid (DNA) sequence, and four measures have been taken to enhance the robustness and enlarge the hiding capacity, such as encode the secret message by DNA coding, encrypt it by pseudo-random sequence, generate the relative hiding locations by piecewise linear chaotic map, and embed the encoded and encrypted message into a randomly selected DNA sequence using the complementary rule. The key space and the hiding capacity are analyzed. Experimental results indicate that the proposed method has a better performance compared with the competing methods with respect to robustness and capacity.

  6. Partitioning and Scheduling DSP Applications with Maximal Memory Access Hiding

    Directory of Open Access Journals (Sweden)

    Sha Edwin Hsing-Mean

    2002-01-01

    Full Text Available This paper presents an iteration space partitioning scheme to reduce the CPU idle time due to the long memory access latency. We take into consideration both the data accesses of intermediate and initial data. An algorithm is proposed to find the largest overlap for initial data to reduce the entire memory traffic. In order to efficiently hide the memory latency, another algorithm is developed to balance the ALU and memory schedules. The experiments on DSP benchmarks show that the algorithms significantly outperform the known existing methods.

  7. A New Images Hiding Scheme Based on Chaotic Sequences

    Institute of Scientific and Technical Information of China (English)

    LIU Nian-sheng; GUO Dong-hui; WU Bo-xi; Parr G

    2005-01-01

    We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of covert image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).

  8. Text Hiding Based on True Color Image Classification

    OpenAIRE

    Shahd Abdul-Rhman Hasso

    2012-01-01

    In this work a new approach was built to apply k-means algorithm on true colored images (24bit images) which are usually treated by researchers as three image (RGB) that are classified to 15 class maximum only. We find the true image as 24 bit and classify it to more than 15 classes. As we know k-means algorithm classify images to many independent classes or features and we could increase the class number therefore we could hide information in the classes or features that have minimum number ...

  9. Approaches to Computer Modeling of Phosphate Hide-Out.

    Science.gov (United States)

    1984-06-28

    phosphate acts as a buffer to keep pH at a value above which acid corrosion occurs . and below which caustic corrosion becomes significant. Difficulties are...ionization of dihydrogen phosphate : HIPO - + + 1PO, K (B-7) H+ + - £Iao 1/1, (B-8) H , PO4 - + O- - H0 4 + H20 K/Kw (0-9) 19 * Such zero heat...OF STANDARDS-1963-A +. .0 0 0 9t~ - 4 NRL Memorandum Report 5361 4 Approaches to Computer Modeling of Phosphate Hide-Out K. A. S. HARDY AND J. C

  10. [Blister beetle dermatitis: Dermatitis linearis].

    Science.gov (United States)

    Dieterle, R; Faulde, M; Erkens, K

    2015-05-01

    Several families of beetles cause toxic reactions on exposed human skin. Cantharidin provokes nearly asymptomatic vesicles and blisters, while pederin leads to itching and burning erythema with vesicles and small pustules, later crusts. Paederi are attracted by fluorescent light especially after rain showers and cause outbreaks in regions with moderate climate. Clinical findings and patient history lead to the diagnosis: dermatitis linearis.

  11. Raising Beetles in a Classroom.

    Science.gov (United States)

    Hackett, Erla

    This guide is designed to provide elementary school teachers with a harmless, inexpensive, clean, odorless, and easy-to-care-for insect-rearing project for the classroom. The following topics are included: (1) instructions for the care and feeding of the beetle larvae; (2) student activities for observing larval characteristics and behavior…

  12. Data Security by Preprocessing the Text with Secret Hiding

    Directory of Open Access Journals (Sweden)

    Ajit Singh

    2012-06-01

    Full Text Available With the advent of the Internet, an open forum, the massive increase in the data travel across networkmake an issue for secure transmission. Cryptography is the term that involves many encryption method to make data secure. But the transmission of the secure data is an intricate task. Steganography here comes with effect of transmission without revealing the secure data. The research paper provide the mechanism which enhance the security of data by using a crypto+stegano combination to increase the security level without knowing the fact that some secret data is sharing across networks. In the firstphase data is encrypted by manipulating the text using the ASCII codes and some random generated strings for the codes by taking some parameters. Steganography related to cryptography forms the basisfor many data hiding techniques. The data is encrypted using a proposed approach and then hide the message in random N images with the help of perfect hashing scheme which increase the security of the message before sending across the medium. Thus the sending and receiving of message will be safe and secure with an increased confidentiality.

  13. A Study of Various Steganographic Techniques Used for Information Hiding

    Directory of Open Access Journals (Sweden)

    C.P.Sumathi

    2013-12-01

    Full Text Available The art of information hiding has received much att ention in the recent years as security of informati on has become a big concern in this internet era. As shari ng of sensitive information via a common communicat ion channel has become inevitable, Steganography – the art and science of hiding information has gained much attention. We are also surrounded by a world of secret communi cation, where people of all types are transmitting information as innocent as an encrypte d credit card number to an online-store and as insidious as a terrorist plot to hijackers. Stegano graphy derives from the Greek word steganos, meanin g covered or secret, and graphy (writing or drawing [1]. Steganography is a technology where modern da ta compression, information theory, spread spectrum, a nd cryptography technologies are brought together t o satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various tec hniques used in steganography and to identify areas in which thi s technique can be applied, so that the human race can be benefited at large

  14. A Novel Image Data Hiding Scheme with Diamond Encoding

    Directory of Open Access Journals (Sweden)

    Wu Hsien-Chu

    2009-01-01

    Full Text Available A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment is proposed. The proposed method is the extension of the exploiting modification direction (EMD embedding scheme. First, the process of embedding partitions the cover image into nonoverlapping blocks of two consecutive pixels and transforms the secret messages to a series of -ary digits. For each block, the diamond encoding technique is applied to calculate the diamond characteristic value, and one secret -ary digit is concealed into the diamond characteristic value. The diamond characteristic value is modified to secret digit and it can be obtained by adjusting pixel values in a block. This scheme is designed in such a way that the distortion of each block after diamond encoding is never out of the embedding parameter , and the block capacity is equal to . The diamond encoding provides an easy way to produce a more perceptible result than those yielded by simple least-significant-bit substitution methods. The embedded secret data can be extracted without the original cover image. Experimental results have demonstrated that the proposed method is capable of hiding more secret data while keeping the stego-image quality degradation imperceptible.

  15. Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography

    CERN Document Server

    Ganesh, Vijay; Rinard, Martin

    2012-01-01

    We propose a novel approach to improving software security called Cryptographic Path Hardening, which is aimed at hiding security vulnerabilities in software from attackers through the use of provably secure and obfuscated cryptographic devices to harden paths in programs. By "harden" we mean that certain error-checking if-conditionals in a given program P are replaced by equivalent" we mean that adversaries cannot use semi-automatic program analysis techniques to reason about the hardened program paths and thus cannot discover as-yet-unknown errors along those paths, except perhaps through black-box dictionary attacks or random testing (which we can never prevent). Other than these unpreventable attack methods, we can make program analysis aimed at error-finding "provably hard" for a resource-bounded attacker, in the same sense that cryptographic schemes are hard to break. Unlike security-through-obscurity, in Cryptographic Path Hardening we use provably-secure crypto devices to hide errors and our mathemati...

  16. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  17. A secure and robust information hiding technique for covert communication

    Science.gov (United States)

    Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.

    2015-08-01

    The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.

  18. Oedemerid blister beetle dermatosis: a review.

    Science.gov (United States)

    Nicholls, D S; Christmas, T I; Greig, D E

    1990-05-01

    Blister beetle dermatosis is a distinctive vesiculobullous eruption that occurs after contact with three major groups of beetles (Order: Coleoptera). It is caused by a vesicant chemical contained in the body fluids of the beetles. The smallest and least known family is the Oedemeridae. Although there are few references in the medical literature, blister beetle dermatosis caused by oedemerids may be more common and widespread than currently recognized. The best known family is the Meloidae with numerous species worldwide causing blistering. The vesicant chemical in both Oedemeridae and Meloidae is cantharidin. The third group of blister beetles includes species of the genus Paederus (Family: Staphylinidae). The clinicopathologic picture differs because this genus contains a different vesicant agent, pederin. The clinicopathologic features of oedemerid blister beetle dermatosis are described. The world medical and relevant entomologic literature is reviewed.

  19. 9 CFR 95.24 - Methods for disinfection of hides, skins, and other materials.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Methods for disinfection of hides... ENTRY INTO THE UNITED STATES § 95.24 Methods for disinfection of hides, skins, and other materials... subjected to disinfection by methods found satisfactory and approved from time to time by the Deputy...

  20. A method for removing adobe-type manure from hides using an oxidizing agent

    Science.gov (United States)

    Adobe-type (hardened) manure attached to bovine hair is a major source of meat contamination, hide quality deterioration, and devalued leather products. Therefore, it is important to develop cleaning solutions that can rapidly remove adobe-type manure to improve the quality of hides delivered to tan...

  1. Tactical deception to hide sexual behaviour : macaques use distance, not visibility

    NARCIS (Netherlands)

    Overduin-de Vries, A. M.; Spruijt, B. M.; de Vries, H.; Sterck, E. H. M.

    2015-01-01

    Although tactical deception (TD) may be employed to hide sexual behaviour, there is as yet no firm evidence for it. Hiding may be guided by cognitive mechanisms consistent with either no, low or high level TD, such as exploiting male peripheral positions (no TD), creating distance (TD level 1) or hi

  2. A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement

    Directory of Open Access Journals (Sweden)

    Khushboo Lapa Patwari

    2016-09-01

    Full Text Available In present world demand of high quality images, security of the information on internet is one of the most important issues of research. Data hiding is a method of hiding a useful information by embedding it on another image (cover image to provide security and only the authorize person is able to extract the original information from the embedding data. This paper is a review which describes several different algorithms for Reversible Data Hiding (RDH. Previous literature has shown that histogram modification, histogram equalization (HE and interpolation are the most common methods for data hiding. To improve security these methods are used in encrypted images. This paper is a comprehensive study of all the major reversible data hiding approaches implemented as found in the literature.

  3. Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography

    CERN Document Server

    Sarmah, Dipti Kapoor

    2010-01-01

    Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptography techniques available; among them AES is one of the most powerful techniques. In Steganography we have various techniques in different domains like spatial domain, frequency domain etc. to hide the message. It is very difficult to detect hidden message in frequency domain and for this domain we use various transformations like DCT, FFT and Wavelets etc. In this project we are developing a system where we develop a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module. In Cryptography we are using AES algorithm to encrypt a message and a part of the message is hidden in DCT of an image; remaining part of the message is used to generate two secret keys which make this system highly secured. Keyword: Cryptography, Steganography, S...

  4. From the turtle to the beetle

    OpenAIRE

    Romagosa Carrasquer, Bernat

    2016-01-01

    Beetle Blocks is a visual, blocks-based programming language/environment for 3D design and fabrication, implemented on top of Berkeley Snap! and the ThreeJS 3D graphics library. Beetle Blocks programs move a graphical beetle around a 3D world, where it can place 3D shapes, extrude its path as a tube and generate geometry in other ways. The resulting 3D geometry can be exported as a 3D-printable file. Beetle Blocks also aims to offer a cloud system and social platform meant to provide the comm...

  5. Pheromone production in bark beetles.

    Science.gov (United States)

    Blomquist, Gary J; Figueroa-Teran, Rubi; Aw, Mory; Song, Minmin; Gorzalski, Andrew; Abbott, Nicole L; Chang, Eric; Tittiger, Claus

    2010-10-01

    The first aggregation pheromone components from bark beetles were identified in 1966 as a mixture of ipsdienol, ipsenol and verbenol. Since then, a number of additional components have been identified as both aggregation and anti-aggregation pheromones, with many of them being monoterpenoids or derived from monoterpenoids. The structural similarity between the major pheromone components of bark beetles and the monoterpenes found in the host trees, along with the association of monoterpenoid production with plant tissue, led to the paradigm that most if not all bark beetle pheromone components were derived from host tree precursors, often with a simple hydroxylation producing the pheromone. In the 1990 s there was a paradigm shift as evidence for de novo biosynthesis of pheromone components began to accumulate, and it is now recognized that most bark beetle monoterpenoid aggregation pheromone components are biosynthesized de novo. The bark beetle aggregation pheromones are released from the frass, which is consistent with the isoprenoid aggregation pheromones, including ipsdienol, ipsenol and frontalin, being produced in midgut tissue. It appears that exo-brevocomin is produced de novo in fat body tissue, and that verbenol, verbenone and verbenene are produced from dietary α-pinene in fat body tissue. Combined biochemical, molecular and functional genomics studies in Ips pini yielded the discovery and characterization of the enzymes that convert mevalonate pathway intermediates to pheromone components, including a novel bifunctional geranyl diphosphate synthase/myrcene synthase, a cytochrome P450 that hydroxylates myrcene to ipsdienol, and an oxidoreductase that interconverts ipsdienol and ipsdienone to achieve the appropriate stereochemistry of ipsdienol for pheromonal activity. Furthermore, the regulation of these genes and their corresponding enzymes proved complex and diverse in different species. Mevalonate pathway genes in pheromone producing male I. pini

  6. Evaluation of three formulations of Beauveria bassiana for control of lesser mealworm and hide beetle in Georgia poultry houses

    Science.gov (United States)

    Initial screening of 12 Beauveria bassiana (Balsamo) Vuillemin isolates against larvae of the lesser mealworm (Alphitobius diaperinus[Panzer]) resulted in the selection of two isolates, GHA and 707, for further testing under field conditions. Three formulations of each strain were prepared: an EC, ...

  7. Mother-young recognition in goitered gazelle during hiding period.

    Science.gov (United States)

    Blank, D A; Yang, W

    2017-09-01

    The mother-young recognition process is crucial for the growth and survival of progeny. In "follower" ungulate species, vocal and visual cues have been found to play a leading role in the mother-young identification process from the first days postpartum, with olfactory cues also important in establishing the initial selective mother-young bond immediately after birth. In "hider" species, however, much less has been documented of mother-young recognition behaviors, especially in their natural habitat. In this paper, we investigated this process in goitered gazelle (Gazella subgutturosa), a typical hider species, in its native environment in Kazakhstan. Over the course of our study period, we investigated the behaviors of 257 females with twins and 158 females with singles through visual observations. We found that within the first month after birth, when females spend only a short time with their young, mothers recognized their fawns using mostly olfactory cues, while vision was used to locate their hiding offspring. Fawns vocalized very rarely, producing only distress calls that did not seem intended for individual identification. Licking of young by their mothers was observed frequently, not only during the first week after birth, when this action was very important for fawn stimulation for a number of physiological functions, but for several weeks after (until one month of age), when licking lost its physiological importance and likely became more of a recognition procedure. Fawns did not recognize their mothers at all, either through vision or vocalizations, since during their first weeks after birth, they responded to any gazelle that approached their hiding area. By a month after birth, when mothers and fawns began to stay together for longer periods of time, their recognition process became more enhanced, and in addition to olfactory cues, the mother and her young began to use more and more visual cues for longer distance identification, as well as

  8. Unusual coloration in scarabaeid beetles

    Energy Technology Data Exchange (ETDEWEB)

    Brink, D J [Department of Physics, University of Pretoria, Pretoria 0002 (South Africa); Berg, N G van der [Department of Physics, University of Pretoria, Pretoria 0002 (South Africa); Prinsloo, L C [Department of Physics, University of Pretoria, Pretoria 0002 (South Africa); Hodgkinson, I J [Department of Physics, University of Otago, Dunedin (New Zealand)

    2007-04-07

    In this paper we investigate the reflection of circularly polarized light from the exocuticle of the scarabaeid beetle Gymnopleurus virens. Reflection spectra are deeply modulated, exhibiting a number of relatively narrow well-defined peaks, which differ from previously studied specimens. By comparing model calculations and electron microscopy work with the recorded spectra, we can propose the presence of specific structural defects responsible for the unusual spectra.

  9. Unusual coloration in scarabaeid beetles

    Science.gov (United States)

    Brink, D. J.; van der Berg, N. G.; Prinsloo, L. C.; Hodgkinson, I. J.

    2007-04-01

    In this paper we investigate the reflection of circularly polarized light from the exocuticle of the scarabaeid beetle Gymnopleurus virens. Reflection spectra are deeply modulated, exhibiting a number of relatively narrow well-defined peaks, which differ from previously studied specimens. By comparing model calculations and electron microscopy work with the recorded spectra, we can propose the presence of specific structural defects responsible for the unusual spectra.

  10. Hiding Secret Information in Movie Clip: A Steganographic Approach

    CERN Document Server

    Sahoo, G

    2011-01-01

    Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the internet. One of the key methods for establishing hidden communication is steganography. Modern day steganography mainly deals with hiding information within files like image, text, html, binary files etc. These file contains small irrelevant information that can be substituted for small secret data. To store a high capacity secret data these carrier files are not very supportive. To overcome the problem of storing the high capacity secret data with the utmost security fence, we have proposed a novel methodology for concealing a voluminous data with high levels of security wall by using movie clip as a carrier file.

  11. An efficient steganography method for hiding patient confidential information.

    Science.gov (United States)

    Al-Dmour, Hayat; Al-Ani, Ahmed; Nguyen, Hung

    2014-01-01

    This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI).

  12. Analysis Of Aspects Of Messages Hiding In Text Environments

    Directory of Open Access Journals (Sweden)

    Afanasyeva Olesya

    2015-09-01

    Full Text Available In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE, which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is used concept of semantic parameters of words coordination and semantic value of separate word. Are used well-known methods of determination of values of these parameters. This allows moving from quality level to quantitative level analysis of text fragments semantics during their modification by word substitution. Invisibility of embedded messages is ensured by providing preset values of the semantic cooperation parameter deviations.

  13. Reversible Data Hiding In Encrypted Images Using Improved Encryption Technique

    Directory of Open Access Journals (Sweden)

    Balika J. Chelliah

    2015-11-01

    Full Text Available Recently more and more attention is paid to reversible data hiding (RDH in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content‟s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be some errors on data extraction and/or image restoration. In this paper we propose a different scheme which attains real reversibility by reserving room before encryption with a traditional RDH algorithm, and then encrypting the data and embedding the data in the encrypted image, which is encrypted using a new proposed algorithm. The proposed method can achieve real reversibility that is data extraction and image recoveries are free of any error.

  14. Reversible Data Hiding In Encrypted Images Using Improved Encryption Technique

    Directory of Open Access Journals (Sweden)

    Mr. Balika J. Chelliah

    2014-03-01

    Full Text Available Recently more and more attention is paid to reversible data hiding (RDH in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content‟s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be some errors on data extraction and/or image restoration. In this paper we propose a different scheme which attains real reversibility by reserving room before encryption with a traditional RDH algorithm, and then encrypting the data and embedding the data in the encrypted image, which is encrypted using a new proposed algorithm. The proposed method can achieve real reversibility that is data extraction and image recoveries are free of any error.

  15. A Security Enhanced Robust Steganography Algorithm for Data Hiding

    Directory of Open Access Journals (Sweden)

    Siddharth Singh

    2012-05-01

    Full Text Available In this paper, a new robust steganography algorithm based on discrete cosine transform (DCT, Arnold transform and chaotic system is proposed. The chaotic system is used to generate a random sequence to be used for spreading data in the middle frequency band DCT coefficient of the cover image. The security is further enhanced by scrambling the secret data using Arnold Cat map before embedding. The recovery process is blind. A series of experiments is conducted to prove the security and robustness of the proposed algorithm. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression, addition of noise, low pass filtering and cropping attacks as compared to other existing algorithms for data hiding in the DCT domain.

  16. Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates

    Directory of Open Access Journals (Sweden)

    Alawi A. Al-Saggaf

    2013-04-01

    Full Text Available By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, we develop a general fuzzy commitment scheme called an ordinary fuzzy commitment scheme (OFCS, in which many fuzzy commitment schemes with variety complexity assumptions is constructed. The scheme is provably statistical hiding (the advisory gets almost no statistically advantages about the secret message. The efficiency of our scheme offers different security assurance, and the trusted third party is not involved in the exchange of commitment.The characteristic of our scheme makes it useful for biometrics systems. If the biometrics template is compromised, then there is no way to use it directly again even in secure biometrics systems. This paper combines biometrics and OFCS to achieve biometric protection scheme using smart cards with renewability of protected biometrics template property.

  17. Accountable Metadata-Hiding Escrow: A Group Signature Case Study

    Directory of Open Access Journals (Sweden)

    Kohlweiss Markulf

    2015-06-01

    Full Text Available A common approach to demands for lawful access to encrypted data is to allow a trusted third party (TTP to gain access to private data. However, there is no way to verify that this trust is well placed as the TTP may open all messages indiscriminately. Moreover, existing approaches do not scale well when, in addition to the content of the conversation, one wishes to hide one’s identity. Given the importance of metadata this is a major problem. We propose a new approach in which users can retroactively verify cryptographically whether they were wiretapped. As a case study, we propose a new signature scheme that can act as an accountable replacement for group signatures, accountable forward and backward tracing signatures.

  18. Universal Steganalysis of Data Hiding in Grayscale Images

    Institute of Scientific and Technical Information of China (English)

    HUANG Ji-feng; LIN Jia-jun

    2007-01-01

    This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Attacking the suspicious images using the quantization method, we can obtain statistically different from embedded-and-quantization attacked images and from quantization attacked-but-not-embedded sources. We have developed a technique based on one-class SVM for discriminating between cover-images and stego-images. Simulation results show our approach is able to distinguish between cover and stego images with reasonable accuracy.

  19. A Lossless Data Hiding Technique based on AES-DWT

    Directory of Open Access Journals (Sweden)

    Gustavo Fernandaacute;ndez Torres2

    2012-09-01

    Full Text Available In this paper we propose a new data hiding technique. The new technique uses steganography and cryptography on images with a size of 256x256 pixels and an 8-bit grayscale format. There are design restrictions such as a fixed-size cover image, and reconstruction without error of the hidden image. The steganography technique uses a Haar-DWT (Discrete Wavelet Transform with hard thresholding and LSB (Less Significant Bit technique on the cover image. The algorithms used for compressing and ciphering the secret image are lossless JPG and AES, respectively. The proposed technique is used to generate a stego image which provides a double type of security that is robust against attacks. Results are reported for different thresholds levels in terms of PSNR.

  20. Multi-Bit Data Hiding Scheme for Compressing Secret Messages

    Directory of Open Access Journals (Sweden)

    Wen-Chung Kuo

    2015-11-01

    Full Text Available The goal of data hiding techniques usually considers two issues, embedding capacity and image quality. Consequently, in order to achieve high embedding capacity and good image quality, a data hiding scheme combining run-length encoding (RLE with multi-bit embedding is proposed in this paper. This work has three major contributions. First, the embedding capacity is increased 62% because the secret message is compressed before embedding into the cover image. Secondly, the proposed scheme keeps the multi-bit generalized exploiting modification direction (MGEMD characteristics, which are effective to reduce modified pixels in the cover image and to maintain good stego image quality. Finally, the proposed scheme can prevent modern steganalysis methods, such as RS steganalysis and SPAM (subtractive pixel adjacency matrix, and is compared to MiPOD (minimizing the power of the optimal detector scheme. From our simulation results and security discussions, we have the following results: First, there are no perceivable differences between the cover images and stego images from human inspection. For example, the average PSNR of stego images is about 44.61 dB when the secret message (80,000 bits is embedded for test cover images (such as airplane, baboon, Lena of size 512×512. Secondly, Appl. Sci. 2015, 5 1034 on average, 222,087 pixels were not modified after embedding for the cover image. That is to say, 12% less pixels are modified as compared to the MGEMD method. From the performance discussions, the proposed scheme achieves high embedding capacity and good image quality, but also maintains stego image security.

  1. Mites associated with bark beetles and their hyperphoretic ophiostomatoid fungi

    Science.gov (United States)

    Richard W. Hofstetter; John Moser; Stacy Blomquist

    2014-01-01

    The role that mites play in many ecosystems is often overlooked or ignored. Within bark beetle habitats, more than 100 mite species exist and they have important impacts on community dynamics, ecosystem processes, and biodiversity of bark beetle systems. Mites use bark beetles to access and disperse among beetle-infested trees and the associations may range from...

  2. Sensitive plant (Mimosa pudica) hiding time depends on individual and state.

    Science.gov (United States)

    Reed-Guy, Sarah; Gehris, Connor; Shi, Meng; Blumstein, Daniel T

    2017-01-01

    The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  3. Sensitive plant (Mimosa pudica hiding time depends on individual and state

    Directory of Open Access Journals (Sweden)

    Sarah Reed-Guy

    2017-07-01

    Full Text Available The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  4. STUDY ON AUDIO INFORMATION HIDING METHOD BASED ON MODIFIED PHASE PARTITION

    Institute of Scientific and Technical Information of China (English)

    Tong Ming; Hao Chongyang; Liu Xiaojun; Chen Yanpu

    2005-01-01

    Hiding efficiency of traditional audio information hiding methods is always low since the sentience similarity cannot be guaranteed. A new audio information hiding method is proposed in this letter which can impose the insensitivity with the audio phase for auditory and realize the information hiding through specific algorithm in order to modify local phase within the auditory perception. The algorithm is to introduce the operation of "set 1" and "set 0" for every phase vectors, then the phases must lie on the boundary of a phase area after modified. If it lies on "1" boundary, it comes by set 1 operation. If it lies on "0" boundary, it comes by set 0 operation. The results show that, compared with the legacy method, the proposed method has better auditory similarity, larger information embedding capacity and lower code error rate. As a kind of blind detect method, it fits for application scenario without channel interference.

  5. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  6. An evaluation of selected methods for the decontamination of cattle hides prior to skinning.

    Science.gov (United States)

    Small, A; Wells-Burr, B; Buncic, S

    2005-02-01

    The effectiveness of different decontamination treatments in reducing microbial loads on cattle hides was assessed. The 10-s hide treatments were conducted using a wet-and-dry vacuum cleaner filled with one of the liquids (heated to 50 °C) indicated below, followed or not by 10-min drying in the air. Also, the hide was clipped, followed or not by 10-s singeing using a hand-held blowtorch. Before and after each decontamination treatment, the hide was sampled (100 cm(2) areas) by a sponge-swabbing method to compare the total viable counts of bacteria (TVC). The largest bacterial reduction (Psanitizer solution (10% Betane Plus) resulted in significant reductions of 1.80 (Pefficacy of these treatments in the reduction of specific pathogens under commercial conditions.

  7. Motivation to hide emotion and children's understanding of the distinction between real and apparent emotions.

    Science.gov (United States)

    Gosselin, Pierre; Warren, Madeleine; Diotte, Michèle

    2002-12-01

    The authors investigated the extent to which children's understanding of the distinction between real and apparent emotions varied according to the motivation to hide emotions. Children, aged 6-7 and 10-11 years, were read stories designed to elicit either prosocial or self-protective motivated display rules and were asked to predict the facial expressions the protagonists would make to hide felt emotions. Children were found to understand the distinction between real and apparent emotions very well, independently of the type of motivation. Contrary to predictions, boys understood this distinction better than did girls when the motivation to hide positive emotions was prosocial. Children perceived neutralization as the most appropriate strategy to hide felt emotions, followed by masking.

  8. Insight into error hiding: exploration of nursing students' achievement goal orientations.

    Science.gov (United States)

    Dunn, Karee E

    2014-02-01

    An estimated 50% of medication errors go unreported, and error hiding is costly to hospitals and patients. This study explored one issue that may facilitate error hiding. Descriptive statistics were used to examine nursing students' achievement goal orientations in a high-fidelity simulation course. Results indicated that although this sample of nursing students held high mastery goal orientations, they also held moderate levels of performance-approach and performance-avoidance goal orientations. These goal orientations indicate that this sample is at high risk for error hiding, which places the benefits that are typically gleaned from a strong mastery orientation at risk. Understanding variables, such as goal orientation, that can be addressed in nursing education to reduce error hiding is an area of research that needs to be further explored. This article discusses the study results and evidence-based instructional practices for this sample's achievement goal orientation profile.

  9. 16 CFR 1630.61 - Hide carpets and rugs-alternative washing procedure.

    Science.gov (United States)

    2010-01-01

    ... natural “lay” of the hair structure for ten complete strokes. (8) Place test specimen in a circulating... wool or hair attached to the hide with no synthetic fibers and (2) have been treated with a fire...

  10. 16 CFR 1631.61 - Hide carpets and rugs-alternative washing procedure.

    Science.gov (United States)

    2010-01-01

    ... natural “lay” of the hair structure for ten complete strokes. (8) Place test specimen in a circulating... wool or hair attached to the hide with no synthetic fibers and (2) have been treated with a fire...

  11. DNA-based cryptographic methods for data hiding in DNA media.

    Science.gov (United States)

    Marwan, Samiha; Shawish, Ahmed; Nagaty, Khaled

    2016-12-01

    Information security can be achieved using cryptography, steganography or a combination of them, where data is firstly encrypted using any of the available cryptography techniques and then hid into any hiding medium. Recently, the famous genomic DNA has been introduced as a hiding medium, known as DNA steganography, due to its notable ability to hide huge data sets with a high level of randomness and hence security. Despite the numerous cryptography techniques, to our knowledge only the vigenere cipher and the DNA-based playfair cipher have been combined with the DNA steganography, which keeps space for investigation of other techniques and coming up with new improvements. This paper presents a comprehensive analysis between the DNA-based playfair, vigenere, RSA and the AES ciphers, each combined with a DNA hiding technique. The conducted analysis reports the performance diversity of each combined technique in terms of security, speed, hiding capacity in addition to both key size and data size. Moreover, this paper proposes a modification of the current combined DNA-based playfair cipher technique, which makes it not only simple and fast but also provides a significantly higher hiding capacity and security. The conducted extensive experimental studies confirm such outstanding performance in comparison with all the discussed combined techniques. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  12. Hiding effort to gain a competitive advantage: Evidence from China.

    Science.gov (United States)

    Zhao, Li; Heyman, Gail D

    2016-06-06

    Previous studies with Western populations have shown that adolescents' tendency to downplay their academic effort is affected by two kinds of motives: ability-related motives (e.g., to appear competent) and social approval motives (e.g., to be popular). In this research, we test for the presence of additional competition-related motives in China, a culture placing strong emphasis on academic competition. Study 1 (N = 150) showed that, in response to a scenario in which a hard-working high-school junior hid effort from classmates, the most highly endorsed explanation was "to influence others to work less hard to maintain a competitive advantage." Study 2 (N = 174) revealed that competition-related explanations were endorsed relatively more often when the speaker and audience had similar academic rankings. This tendency was most evident when both speaker and audience were top performers, and when this was the case, participants' desire to demonstrate superiority over others was a positive predictor of endorsement of competition-related motives. Study 3 (N = 137) verified that competition-related motives were more strongly endorsed among Chinese participants than U.S. These results suggest that at least in cultures that emphasize academic competition and in contexts where competition is salient, hiding effort is often about attempting to gain strategic advantage. © 2016 International Union of Psychological Science.

  13. Steganographic Approach for Data Hiding using LSB Techniques

    Directory of Open Access Journals (Sweden)

    Baluram Nagaria , Ashish Parikh ,Sandeep Mandliya ,Neeraj shrivastav

    2012-12-01

    Full Text Available Today’s all the multimedia work done via internet so it’s an urgent need to protect the data from malicious attacks. This lead to the research in the area of Digital watermarking and cryptography which intends to protect the copyright information of the intellectuals. In this paper a DCT based steganography scheme is proposed which provides higher resistance to image processing attacks such as JPEG compression, noise, rotation, translation etc Steganography has been implemented In MATLAB7.6 using basic image processing techniques. Steganography is the technique of hiding confidential information within any media. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect confidential information But we have design a simulator in which we have transmit our data via mail or LAN. For securing the data, this will be password protected. For design this simulator we have encrypted our data and after that without password we will not decrypted the data. Our all conclusion is that we will secure our information. The difference between the two is in the appearance in the processed output; the output of Steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention. In this paper, we have tried to elucidate the different approaches towards implementation of Steganography using ‘multimedia’ file (text, static image, audio and video and Network IP datagram as cover.

  14. Experimental Test of Quantum No-Hiding Theorem

    CERN Document Server

    Samal, Jharana Rani; Kumar, Anil

    2010-01-01

    Linearity and unitarity are two fundamental tenets of quantum theory. Any consequence that follows from these must be respected in the quantum world. The no-cloning theorem and the no-deleting theorem are the consequences of the linearity and the unitarity. Together with the stronger no-cloning theorem they provide permanence to quantum information, thus, suggesting that in the quantum world information can neither be created nor be destroyed. In this sense quantum information is robust, but at the same time it is also fragile because any interaction with the environment may lead to loss of information. Recently, another fundamental theorem was proved, namely, the no-hiding theorem that addresses precisely the issue of information loss. It says that if any physical process leads to bleaching of quantum information from the original system, then it must reside in the rest of the universe with no information being hidden in the correlation between these two subsystems. This has applications in quantum teleporta...

  15. Confidential Data Hiding Using Wavlet Based Ecg Stegnography

    Directory of Open Access Journals (Sweden)

    Malashree K S

    2014-05-01

    Full Text Available With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as Point-of-Care (PoC applications in hospitals around the world. Therefore, huge amount of ECG signal collected by Body Sensor Networks (BSNs from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level etc. and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data is being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this project, a wavelet based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest.

  16. American burying beetle site records : Valentine NWR

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document is specific site records of American burying beetle on Valentine Nationl Wildlife Refuge to date. It includes a map of site location. A discussion...

  17. Polarisation vision: beetles see circularly polarised light.

    Science.gov (United States)

    Warrant, Eric J

    2010-07-27

    It has long been known that the iridescent cuticle of many scarab beetles reflects circularly polarised light. It now turns out that scarabs can also see this light, potentially using it as a covert visual signal.

  18. US Forest Service Western Bark Beetle Strategy

    Data.gov (United States)

    US Forest Service, Department of Agriculture — A map service on the www depicting Western Bark Beetle Strategy (WBBS) activities reported through the U.S. Forest Service FACTS database. Activities include...

  19. APPROACHES TO ENGINEER STABILITY OF BEETLE LUCIFERASES

    Directory of Open Access Journals (Sweden)

    Mikhail I. Koksharov

    2012-09-01

    Full Text Available Luciferase enzymes from fireflies and other beetles have many important applications in molecular biology, biotechnology, analytical chemistry and several other areas. Many novel beetle luciferases with promising properties have been reported in the recent years. However, actual and potential applications of wild-type beetle luciferases are often limited by insufficient stability or decrease in activity of the enzyme at the conditions of a particular assay. Various examples of genetic engineering of the enhanced beetle luciferases have been reported that successfully solve or alleviate many of these limitations. This mini-review summarizes the recent advances in development of mutant luciferases with improved stability and activity characteristics. It discusses the common limitations of wild-type luciferases in different applications and presents the efficient approaches that can be used to address these problems.

  20. Approaches to engineer stability of beetle luciferases

    Directory of Open Access Journals (Sweden)

    Mikhail Koksharov

    2012-09-01

    Full Text Available Luciferase enzymes from fireflies and other beetles have many important applications in molecular biology, biotechnology, analytical chemistry and several other areas. Many novel beetle luciferases with promising properties have been reported in the recent years. However, actual and potential applications of wild-type beetle luciferases are often limited by insufficient stability or decrease in activity of the enzyme at the conditions of a particular assay. Various examples of genetic engineering of the enhanced beetle luciferases have been reported that successfully solve or alleviate many of these limitations. This mini-review summarizes the recent advances in development of mutant luciferases with improved stability and activity characteristics. It discusses the common limitations of wild-type luciferases in different applications and presents the efficient approaches that can be used to address these problems.

  1. Longhorned beetles (Coleoptera: Cerambycidae from Chhattisgarh, India

    Directory of Open Access Journals (Sweden)

    A. Majumder

    2014-01-01

    Full Text Available An inventory of longhorned beetles of Chhattisgarh state has been attempted for the first time resulting in the enumeration of 10 species belonging to 8 genera and 6 tribes under 2 subfamilies. The descriptions of these species and distribution in Chhattisgarh and India are provided. Being economically important, the present account on longhorned beetles is important as it might help the state forest authorities to adopt control measures to minimize damage caused by these insects.

  2. New longhorn beetles (Coleoptera: Cerambycidae from Serbia

    Directory of Open Access Journals (Sweden)

    Pil Nataša

    2005-01-01

    Full Text Available The most recent data (Ilić, 2005 indicate the presence of 245 longhorn beetle species (Coleoptera: Cerambycidae in Serbia. Not included in the mentioned publication, the following five species should be added to the list: Cortodera discolor Fairmaire, 1866; Stenopterus similatus Holzschuh 1979; Chlorophorus aegyptiacus (Fabricius, 1775; Agapanthia osmanlis (Reiche, 1858; Agapanthia maculicornis (Gyllenhal, 1817 (Pil and Stojanović in press. A total number of 250 species are presently known for the Serbian longhorn beetle fauna.

  3. Symbiont diversification in ambrosia beetles: Diversity of fungi associated with exotic scolytine beetles

    Science.gov (United States)

    In virtually every forest habitat, ambrosia beetles (Coleoptera: Curculionidae: Scolytinae, Platypodinae) plant and maintain symbiotic fungus gardens inside dead or dying wood. Some introduced ambrosia beetles aggressively attack live trees and can damage tree crops, lumber, and native woody plant t...

  4. Information Hiding and Countermeasures%信息隐藏技术及其攻击方法

    Institute of Scientific and Technical Information of China (English)

    吴树峰; 黄刘生; 卢继军; 陈国良

    2003-01-01

    Information Hiding Technology has a long history. With the development of Digital Technology,it has become a newly evolved discipline and a hot research area. Since the first Information Hiding Workshop held in 1996 ,thetechnology has been widely applied to areas such as multimedia ,signal processing and protection of software Intellectual Property,but the research work in secure communication is relatively fewer. Based on success of developing asteganography tool for communication,this article summarizes the current progress in the research of InformationHiding Technology systematically, and analyzes possible countermeasures against various Information Hiding techniques.

  5. The Costs of Hiding and Faking Emotions: The Case of Extraverts and Introverts.

    Science.gov (United States)

    Seger-Guttmann, Tali; Medler-Liraz, Hana

    2016-01-01

    The present study examined the moderation effects of extraversion on the relationships between hiding and faking emotions, perceived satisfaction from intimate relationships, and reported physical health concerns. Four hundred and four Israeli participants, who were all involved in intimate relationships at the time of the study, responded to the Extraversion scale from the Big-Five Inventory, the DEELS to measure hiding and faking emotions, the SELF to assess physical health concerns, and the short version of the ENRICH to evaluate perceived satisfaction with intimate relationships. The mean age was 32.3 years (SD = 8.2); and the average length of time as a couple was 7.8 years (SD = 8.2). Of the participants, 198 were married (48.5%). The findings indicate that the effect of hiding negative emotions was stronger for perceived satisfaction with intimate relationships and physical health concerns than that for faking positive emotions. Extraverts who showed a higher frequency of hiding their negative emotions were significantly less satisfied with their relationships than introverts and they also tended to report more concerns with their physical health. These results were not found when extraverts reported a high frequency of faking positive emotions. These results are discussed in the context of the trait-behavior-concordance model and stress the importance of distinguishing faking from hiding.

  6. Association Rule Hiding Techniques for Privacy Preserving Data Mining: A Study

    Directory of Open Access Journals (Sweden)

    Gayathiri P

    2015-12-01

    Full Text Available Association rule mining is an efficient data mining technique that recognizes the frequent items and associative rule based on a market basket data analysis for large set of transactional databases. The probability of most frequent data item occurrence of the transactional data items are calculated to present the associative rule that represents the habits of buying products of the customers in demand. Identifying associative rules of a transactional database in data mining may expose the confidentiality and privacy of an organization and individual. Privacy Preserving Data Mining (PPDM is a solution for privacy threats in data mining. This issue is solved using Association Rule Hiding (ARH techniques in Privacy Preserving Data Mining (PPDM. This research work on Association Rule Hiding technique in data mining performs the generation of sensitive association rules by the way of hiding based on the transactional data items. The property of hiding rules not the data makes the sensitive rule hiding process is a minimal side effects and higher data utility technique.

  7. BeetleBase: the model organism database for Tribolium castaneum

    OpenAIRE

    Wang, Liangjiang; Wang, Suzhi; Li, Yonghua; Paradesi, Martin S. R.; Brown, Susan J

    2006-01-01

    BeetleBase () is an integrated resource for the Tribolium research community. The red flour beetle (Tribolium castaneum) is an important model organism for genetics, developmental biology, toxicology and comparative genomics, the genome of which has recently been sequenced. BeetleBase is constructed to integrate the genomic sequence data with information about genes, mutants, genetic markers, expressed sequence tags and publications. BeetleBase uses the Chado data model and software component...

  8. Aquatic beetle species and their distributions in Xinjiang, China

    Institute of Scientific and Technical Information of China (English)

    ZHAO Ling; JIA Feng-long; Tursun Dilbar; ZHENG Zhe-min

    2009-01-01

    The species of aquatic beetles and their distributions in lotic and lentic habitats were investigated during July to August of 2005 and 2006 in Xinjiang Uygur Autonomous Region, China. A total of 66 species belonging to 7 beetle families (Dytiscidae, Gyrinidae, Haliplidae, Helophoridae, Noteridae, Hydraenidae, Hydrophilidae) are recorded, of which 16 are new records of aquatic beetles for China.

  9. Dosage response mortality of Japanese beetle, masked chafer, and June beetle (Coleoptera: Scarabaeidae) adults when exposed to experimental and commercially available granules containing Metarhizium brunneum

    Science.gov (United States)

    Adult beetles of three different white grub species, Japanese beetle, Popillia japonica, June beetle, Phyllophaga spp., and masked chafer, Cyclocephala spp. were exposed to experimental and commercially available granules containing Metarhizium brunneum (Petch) strain F52, to determine susceptibilit...

  10. Managing Communication Latency-Hiding at Runtime for Parallel Programming Languages and Libraries

    CERN Document Server

    Kristensen, Mads Ruben Burgdorff

    2012-01-01

    This work introduces a runtime model for managing communication with support for latency-hiding. The model enables non-computer science researchers to exploit communication latency-hiding techniques seamlessly. For compiled languages, it is often possible to create efficient schedules for communication, but this is not the case for interpreted languages. By maintaining data dependencies between scheduled operations, it is possible to aggressively initiate communication and lazily evaluate tasks to allow maximal time for the communication to finish before entering a wait state. We implement a heuristic of this model in DistNumPy, an auto-parallelizing version of numerical Python that allows sequential NumPy programs to run on distributed memory architectures. Furthermore, we present performance comparisons for eight benchmarks with and without automatic latency-hiding. The results shows that our model reduces the time spent on waiting for communication as much as 27 times, from a maximum of 54% to only 2% of t...

  11. Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)

    CERN Document Server

    Jain, Dhyanendra

    2012-01-01

    Association rule mining is an important data-mining technique that finds interesting association among a large set of data items. Since it may disclose patterns and various kinds of sensitive knowledge that are difficult to find otherwise, it may pose a threat to the privacy of discovered confidential information. Such information is to be protected against unauthorized access. Many strategies had been proposed to hide the information. Some use distributed databases over several sites, data perturbation, clustering, and data distortion techniques. Hiding sensitive rules problem, and still not sufficiently investigated, is the requirement to balance the confidentiality of the disclosed data with the legitimate needs of the user. The proposed approach uses the data distortion technique where the position of the sensitive items is altered but its support is never changed. The size of the database remains the same. It uses the idea of representative rules to prune the rules first and then hides the sensitive rule...

  12. The study results steganography hiding messages in image files as vehicle security software

    Directory of Open Access Journals (Sweden)

    D. O. Navrotskyi

    2012-11-01

    Full Text Available Synergetics of steganographic and cryptographic encryption algorithms, which provide a solid security foundation, is presented in this paper. Hiding messages systems in spatial and frequency domain image are compared and studied by the author. The following questions: Compression scheme JPEG , JPEG – transformation structure, Practical recommendations for hiding data to image files, The method of least significant bits (spatial domain and the DCT coefficients values relative replacement method (frequency domain, Packing and unpacking the hidden message, Visual distortion image changing system parameters are considered.

  13. A statistical hiding algorithm based on self-similar network traffic

    Institute of Scientific and Technical Information of China (English)

    SHA Xue-jun; XU Yu-bin; QIANG Wei

    2008-01-01

    Although the encryption of network packets significantly increases privacy, the density of the traffic can still provide useful information to the observer, and maybe results in the breach of confidentiality. In this paper, we address issues related to hiding information in self-similar network, which is proved to be similar with modem communication network. And a statistical hiding algorithm is proposed for traffic padding. The figures and the comparison of Hurst Parameters before and after traffic padding, show the effective performance of the algorithm.

  14. Reliable Transmission of Audio Streams in Lossy Channels Using Application Level Data Hiding

    Directory of Open Access Journals (Sweden)

    Parag Agarwal

    2008-12-01

    Full Text Available The paper improves the reliability of audio streams in a lossy channel. The mechanism groups audio data samples into source and carrier sets. The carrier set carry the information about the source set which is encoded using data hiding methodology - quantization index modulation. At the receiver side, a missing source data sample can be reconstructed using the carrier set and the remaining source set. Based on reliability constraints a hybrid design combining interleaving and data hiding is presented. Experiments show an improved reliability as compared to forward error correction and interleaving.

  15. INDICATOR AND PATHOGENIC MICROORGANISMS CONTAMINATION OF HIDE OF CATTLE PRESENTED TO FOR SLAUGHTER AND CONTAMINATION OF THE RESULTANT CARCASSES

    Directory of Open Access Journals (Sweden)

    G. Liuzzo

    2011-01-01

    Full Text Available Foodborne pathogens including Escherichia coli O157:H7, Salmonella spp. and Campylobacter spp., can enter the meat chain at multiple points. Animals with excessively dirty hides will represent a risk of cross-contaminations during transport, in the slaughtered house environment and during dressing procedures. The aim of this work was to investigate the relationship among hygiene indicator microorganisms (Enterobacteriaceae and Escherichia coli count, in hide and carcass of cattle presented for slaughter, and different hide cleanliness level in two abattoir (R and F and estimate the prevalence of pathogens Escherichia coli O157:H7, Salmonella spp and Campylobacter spp. in hide and carcass of dirty animals. The results showed that hide Escherichia coli and Enterobacteriaceae count were significantly higher in dirty animals than in clean animals (P<0,05, but carcass contamination were significantly higher in dirty animals than in clean animals only in R abattoir. Escherichia coli O 157:H7 was detected in 19 samples of hide (40,4%, and 2 samples of carcass. Campylobacter jejuni was isolated in 13 samples of hide (25,5% and one sample of carcass. Salmonella spp. were not found in all the samples of hide and carcass.

  16. Small hive beetles survive in honeybee prisons by behavioural mimicry

    Science.gov (United States)

    Ellis, J. D.; Pirk, C. W. W.; Hepburn, H. R.; Kastberger, G.; Elzen, P. J.

    2002-05-01

    We report the results of a simple experiment to determine whether honeybees feed their small hive beetle nest parasites. Honeybees incarcerate the beetles in cells constructed of plant resins and continually guard them. The longevity of incarcerated beetles greatly exceeds their metabolic reserves. We show that survival of small hive beetles derives from behavioural mimicry by which the beetles induce the bees to feed them trophallactically. Electronic supplementary material to this paper can be obtained by using the Springer LINK server located at htpp://dx.doi.org/10.1007/s00114-002-0326-y.

  17. Ground beetles of the Ukraine (Coleoptera, Carabidae).

    Science.gov (United States)

    Putchkov, Alexander

    2011-01-01

    A review of the ground beetles of the Ukrainian fauna is given. Almost 750 species from 117 genera of Carabidae are known to occur in the Ukraine. Approximately 450 species of ground beetles are registered in the Carpathian region. No less than 300 species of ground beetles are found in the forest zone. Approximately 400 species of Carabidae present in the forest-steppe zone are relatively similar in species composition to those in the forest territories. Some 450 species of Carabidae are inhabitants of the steppe zone. Representatives of many other regions of heterogeneous biotopes such as forest, semi desert, intrazonal, etc. can be found in the steppe areas. The fauna of Carabidae (ca. 100 species) of the lowlands of southern Ukraine (sandy biotopes), situated mostly in the Kherson region, is very peculiar. The fauna of the Crimean mountains contains about 300 species. Conservation measures for the Carabidae are discussed.

  18. Ground beetles of the Ukraine (Coleoptera, Carabidae

    Directory of Open Access Journals (Sweden)

    Alexander Putchkov

    2011-05-01

    Full Text Available A review of the ground beetles of the Ukrainian fauna is given. Almost 750 species from 117 genera of Carabidae are known to occur in the Ukraine. Approximately 450 species of ground beetles are registered in the Carpathian region. No less than 300 species of ground beetles are found in the forest zone. Approximately 400 species of Carabidae present in the forest-steppe zone are relatively similar in species composition to those in the forest territories. Some 450 species of Carabidae are inhabitants of the steppe zone. Representatives of many other regions of heterogeneous biotopes such as forest, semi desert, intrazonal, etc. can be found in the steppe areas. The fauna of Carabidae (ca. 100 species of the lowlands of southern Ukraine (sandy biotopes, situated mostly in the Kherson region, is very peculiar. The fauna of the Crimean mountains contains about 300 species. Conservation measures for the Carabidae are discussed.

  19. Dispersal of the spruce beetle, `dendroctonus rufipennis`, and the engraver beetle, `ips perturbatus`, in Alaska. Forest Service research paper

    Energy Technology Data Exchange (ETDEWEB)

    Werner, R.A.; Holsten, E.H.

    1997-09-01

    Mark-release-recapture experiments were performed with spruce beetles (Dendroctonus rufipennis (Kirby)) and Ips engraver beetles (Ips perturbatus (Eichhoff)) to determine distance and direction of dispersal. The recapture rate of beetles marked with fluorescent powder was extremely low. Most I. perturbatus beetles dispersed up to 30 m from their overwintering sites compared to most D. rufipennis, which dispersed from 90 to 300 m. Ips perturbatus beetles were caught up to 90 m and D. rufipennis up to 600 m from the point of release.

  20. Microbe inhibition by Tribolium flour beetles varies with beetle species, strain, sex, and microbe group.

    Science.gov (United States)

    Prendeville, Holly R; Stevens, Lori

    2002-06-01

    Tribolium flour beetles produce defensive compounds, including quinones, putatively aimed at deterring predators and inhibiting microbes. Here we examine how effective the defensive secretions of Tribolium confusum and T. castaneum are at inhibiting growth of various microbes and how this varies with species, geographic strain, and sex of the beetles. We explore differences at both the kingdom and species level of common flour microbes in their susceptibility to defensive compounds. Beetle species and strains vary in their ability to inhibit microbial growth. In addition, microbes vary in their sensitivity to the beetles' defense compounds. The capability to suppress microbial growth is likely under stabilizing selection with optimum quinone production varying among populations and may be dependent on several environmental factors including temperature, humidity, and predators.

  1. Studies on tiger beetles : 84. Additions to the tiger beetle fauna of Sulawesi, Indonesia (Coleoptera: Cicindelidae)

    NARCIS (Netherlands)

    Cassola, F.

    1996-01-01

    Distributional new data are provided for several interesting or poorly known tiger beetle species from Sulawesi, Indonesia. The generic attribution of Wallacedela brendelli Cassola, 1991, is confirmed, and moreover two new species, Wallacedela? problematica spec. nov. and Wallacedela butonensis spec

  2. Volatile Organic Compounds Emitted by Fungal Associates of Conifer Bark Beetles and their Potential in Bark Beetle Control.

    Science.gov (United States)

    Kandasamy, Dineshkumar; Gershenzon, Jonathan; Hammerbacher, Almuth

    2016-09-01

    Conifer bark beetles attack and kill mature spruce and pine trees, especially during hot and dry conditions. These beetles are closely associated with ophiostomatoid fungi of the Ascomycetes, including the genera Ophiostoma, Grosmannia, and Endoconidiophora, which enhance beetle success by improving nutrition and modifying their substrate, but also have negative impacts on beetles by attracting predators and parasites. A survey of the literature and our own data revealed that ophiostomatoid fungi emit a variety of volatile organic compounds under laboratory conditions including fusel alcohols, terpenoids, aromatic compounds, and aliphatic alcohols. Many of these compounds already have been shown to elicit behavioral responses from bark beetles, functioning as attractants or repellents, often as synergists to compounds currently used in bark beetle control. Thus, these compounds could serve as valuable new agents for bark beetle management. However, bark beetle associations with fungi are very complex. Beetle behavior varies with the species of fungus, the stage of the beetle life cycle, the host tree quality, and probably with changes in the emission rate of fungal volatiles. Additional research on bark beetles and their symbiotic associates is necessary before the basic significance of ophiostomatoid fungal volatiles can be understood and their applied potential realized.

  3. Hiding an Inconvenient Truth : Lies and Vagueness (Revision of DP 2008-107)

    NARCIS (Netherlands)

    Serra Garcia, M.; van Damme, E.E.C.; Potters, J.J.M.

    2010-01-01

    When truth conflicts with efficiency, can verbal communication destroy efficiency? Or are lies or vagueness used to hide inconvenient truths? We consider a sequential 2-player public good game in which the leader has private information about the value of the public good. This value can be low, high

  4. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT algorithm and the greedy approach in terms of execution time and three side effects.

  5. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  6. Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

    Directory of Open Access Journals (Sweden)

    Rhythm Katira

    2013-04-01

    Full Text Available The rise in the use of internet, secure transmission of the data has become an utmost priority. Steganography makes the data invisible by hiding it in the multimedia such as image, audio or video file and thereby covering for its existence. In this project we use prediction error (PE technique steganography and Least Significant Bit (LSB substitution method to hide data in the image. As we do PE expansion method it can lead to expansion of pixels like it can lead to pixel value above 255. In order to solve this problem, we restricted the pixel values between 15 and 240.The PSNR was high at low threshold values. The hiding capacity increased with increase in threshold with a reasonable decrease in PSNR. There was 2dB difference then other methods because of high data hiding capacity. Also we have used knight’s tour for increasing the security of data hidden. In comparison to other methodology, this methodology proves to be better and more effective.

  7. A NOVEL APPROACH OF SECURE COMMUNICATION BASED ON THE TECHNIQUE OF SPEECH INFORMATION HIDING

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    The proposed secure communication approach adopts the proposed algorithm of Analysis-BySynthesis (ABS) speech information hiding to establish a Secret Speech Subliminal Channel (SSSC) for speech secure communication over PSTN (Public Switched Telephone Network), and employs the algorithm of ABS speech information extracting to recovery the secret information. This approach is more reliable, covert and securable than traditional and chaotic secure communication.

  8. Effect of hiding places, straw and territory on agression in group-housed rabbit does

    NARCIS (Netherlands)

    Rommers, J.M.; Reuvekamp, B.F.J.; Gunnink, H.; Jong, de I.C.

    2014-01-01

    Group-housing of rabbit does may be preferred from welfare point of view. However, group-housing causes agonistic behaviour which may cause severe injuries. Severe injuries may be prevented by offering hiding places for attacked does. Providing enrichment (straw) may reduce agonistic behaviour by at

  9. Tiger beetle's pursuit of prey depends on distance

    Science.gov (United States)

    Noest, Robert; Wang, Jane

    2015-03-01

    Tiger beetles are fast predators capable of chasing prey under closed-loop visual guidance. We investigated their control system using high-speed digital recordings of beetles chasing a moving prey dummy in a laboratory arena. Analysis reveals that the beetle uses a proportional control law in which the angular position of the prey relative to the beetle's body axis drives the beetle's angular velocity with a delay of about 28 ms. The system gain is shown to depend on the beetle-prey distance in a pattern indicating three hunting phases over the observed distance domain. We show that to explain this behavior the tiger beetle must be capable of visually determining the distance to its target and using that to adapt the gain in its proportional control law. We will end with a discussion on the possible methods for distance detection by the tiger beetle and focus on two of them. Motion parallax, using the natural head sway induced by the walking gait of the tiger beetle, is shown to have insufficient distance range. However elevation in the field of vision, using the angle with respect to the horizon at which a target is observed, has a much larger distance range and is a prime candidate for the mechanism of visual distance detection in the tiger beetle.

  10. Tenebrionid Beetles of the West Indies

    NARCIS (Netherlands)

    Marcuzzi, Giorgio

    1962-01-01

    The present paper deals with the results of my investigations regarding the tenebrionid beetles of the Antilles, north of Trinidad. For this work, use has been made of the magnificent collections assembled by Dr. P. WAGENAAR HUMMELINCK, of a number of specimens gathered by Dr. H. J. MAC GILLAVRY as

  11. Chirality determines pheromone activity for flour beetles

    Science.gov (United States)

    Levinson, H. Z.; Mori, K.

    1983-04-01

    Olfactory perception and orientation behaviour of female and male flour beetles ( Tribolium castaneum, T. confusum) to single stereoisomers of their aggregation pheromone revealed maximal receptor potentials and optimal attraction in response to 4R,8R-(-)-dimethyldecanal, whereas its optical antipode 4S,8S-(+)-dimethyldecanal was found to be inactive in this respect. Female flour beetles of both species were ≈ 103 times less attracted to 4R,8S-(+)- and 4S,8R-(-)-dimethyldecanal than to 4R,8R-(-)-dimethyldecanal, while male flour beetles failed to respond to the R,S-(+)- and S,R-(-)-stereoisomers. Pheromone extracts of prothoracic femora from unmated male flour beetles elicited higher receptor potentials in the antennae of females than in those of males. The results suggest that the aggregation pheromone emitted by male T. castaneum as well as male T. confusum has the stereochemical structure of 4R,8R-(-)-dimethyl-decanal, which acts as sex attractant for the females and as aggregant for the males of both species.

  12. Isolation of pristionchus nematodes from beetles.

    Science.gov (United States)

    Rae, Robbie; Schlager, Benjamin; Sommer, Ralf J

    2008-10-01

    INTRODUCTIONIn this procedure, nematodes disembark from a beetle carcass and feed on Escherichia coli OP50. The nematodes are then monitored for a few days and identified using simple morphological characteristics. This method is rapid, easy, and biased for Pristionchus species.

  13. Cuticle formation and pigmentation in beetles.

    Science.gov (United States)

    Noh, Mi Young; Muthukrishnan, Subbaratnam; Kramer, Karl J; Arakane, Yasuyuki

    2016-10-01

    Adult beetles (Coleoptera) are covered primarily by a hard exoskeleton or cuticle. For example, the beetle elytron is a cuticle-rich highly modified forewing structure that shields the underlying hindwing and dorsal body surface from a variety of harmful environmental factors by acting as an armor plate. The elytron comes in a variety of colors and shapes depending on the coleopteran species. As in many other insect species, the cuticular tanning pathway begins with tyrosine and is responsible for production of a variety of melanin-like and other types of pigments. Tanning metabolism involves quinones and quinone methides, which also act as protein cross-linking agents for cuticle sclerotization. Electron microscopic analyses of rigid cuticles of the red flour beetle, Tribolium castaneum, have revealed not only numerous horizontal chitin-protein laminae but also vertically oriented columnar structures called pore canal fibers. This structural architecture together with tyrosine metabolism for cuticle tanning is likely to contribute to the rigidity and coloration of the beetle exoskeleton.

  14. The Japanese jewel beetle : a painter's challenge

    NARCIS (Netherlands)

    Schenk, F.; Wilts, B.D.; Stavenga, D.G.

    2013-01-01

    Colours as dynamic as the metallic-like hues adorning the Japanese jewel beetle have never been captured on canvas before. Unlike, and unmatched by, the chemical pigments of the artist's palette, the effect is generated by layered microstructures that refract and reflect light to make colour visible

  15. The Japanese jewel beetle : a painter's challenge

    NARCIS (Netherlands)

    Schenk, F.; Wilts, B.D.; Stavenga, D.G.

    2013-01-01

    Colours as dynamic as the metallic-like hues adorning the Japanese jewel beetle have never been captured on canvas before. Unlike, and unmatched by, the chemical pigments of the artist's palette, the effect is generated by layered microstructures that refract and reflect light to make colour

  16. Floral associations of cyclocephaline scarab beetles.

    Science.gov (United States)

    Moore, Matthew Robert; Jameson, Mary Liz

    2013-01-01

    The scarab beetle tribe Cyclocephalini (Coleoptera: Scarabaeidae: Dynastinae) is the second largest tribe of rhinoceros beetles, with nearly 500 described species. This diverse group is most closely associated with early diverging angiosperm groups (the family Nymphaeaceae, magnoliid clade, and monocots), where they feed, mate, and receive the benefit of thermal rewards from the host plant. Cyclocephaline floral association data have never been synthesized, and a comprehensive review of this ecological interaction was necessary to promote research by updating nomenclature, identifying inconsistencies in the data, and reporting previously unpublished data. Based on the most specific data, at least 97 cyclocephaline beetle species have been reported from the flowers of 58 plant genera representing 17 families and 15 orders. Thirteen new cyclocephaline floral associations are reported herein. Six cyclocephaline and 25 plant synonyms were reported in the literature and on beetle voucher specimen labels, and these were updated to reflect current nomenclature. The valid names of three unavailable plant host names were identified. We review the cyclocephaline floral associations with respect to inferred relationships of angiosperm orders. Ten genera of cyclocephaline beetles have been recorded from flowers of early diverging angiosperm groups. In contrast, only one genus, Cyclocephala, has been recorded from dicot flowers. Cyclocephaline visitation of dicot flowers is limited to the New World, and it is unknown whether this is evolutionary meaningful or the result of sampling bias and incomplete data. The most important areas for future research include: (1) elucidating the factors that attract cyclocephalines to flowers including floral scent chemistry and thermogenesis, (2) determining whether cyclocephaline dicot visitation is truly limited to the New World, and (3) inferring evolutionary relationships within the Cyclocephalini to rigorously test vicarance hypotheses

  17. Research on the methods of optical image hiding based on double random phase encoding and digital holography

    Science.gov (United States)

    Xu, Hongsheng; Sang, Nong

    2011-12-01

    Optical information hiding system has many features such as high processing speed, high parallel, high encryption dimension and high speed of optical transformation and related operations, more advantages than digital method in some way. But it has not adequate security, and enough combination with techniques of digital image processing. So on basis of analyzing existing image hiding and analyzing techniques, we give out the idea. We should adopt idea of virtual optics on the way of all-digital simulation to do research of optical image hiding and analyzing methods based on optical image processing technique especially technique of double random phase encoding and digital holography.

  18. The potency of plant extracts as antimicrobials for the skin or hide preservation

    Science.gov (United States)

    Suparno, Ono; Afifah, Amalia; Panandita, Tania; Marimin, Purnawati, Rini

    2017-03-01

    Preservation of skin or hide uses antimicrobial that will be disposed in wastewater in the skin or hide processing resulting in the environmental pollution. Extracts of some types of plants contain some antimicrobial substances which are potential to be used as biocides for the preservation of skin or hide and are more environmentally friendly. The objectives of this study were to determine the phytochemical contents of moringa, cucumber tree or wuluh starfruit, cherry, and white leadtree or lamtoro leaves and to analyse the antibacterial activities of the plant extracts against microorganisms that cause spoilage of skin or hide. Phytochemical constituents of the dried plant leaves were extracted by 70% ethanol. The resulting extracts were analysed their phytochemical contents and antimicrobial activities against gram negative and gram positive bacteria (inhibition zone test) by well diffusion method, the minimum inhibitory concentration (MIC), and the minimum bactericidal concentration (MBC). Phytochemical test showed that the four leaf extracts contained alkaloids, saponins, tannins, flavonoids, steroids, and glycosides. The inhibition zones of the extracts against Escherichia coli were 5 mm for moringa leaf, 6 mm for cucumber tree leaf, 12 mm for cherry leaf, and 17 mm for white leadtree leaf. Inhibition zone of the extracts against Staphylococcus aureus were 2.5 mm for moringa leaf, 7 mm for cucumber tree leaf, 7.3 mm for cherry leaf, and 13 mm for white leadtree leaf. Inhibition zones of the extracts against Bacillus subtilis were 8 mm for moringa leaf, 9 mm for cucumber tree starfruit leaf, 14 mm for cherry leaf, and 15 mm for white leadtree leaf. The best MIC and MBC tests were demonstrated by white leadtree leaf extract against E. coli found at concentration of 1500 µg/ml, against S. aureus at concentration of 3000 µg/ml, and against B. subtilis at concentration of 3000 µg/ml. The ethanol extract of white leadtree leaf had the best antibacterial activity

  19. Comparison of methods for the enumeration of enterohemorrhagic Escherichia coli from veal hides and carcasses

    Directory of Open Access Journals (Sweden)

    Brandon E Luedtke

    2015-09-01

    Full Text Available The increased association of enterohemorrhagic Escherichia coli (EHEC with veal calves has led the United States Department of Agriculture Food Safety and Inspection Service to report results of veal meat contaminated with the Top 7 serogroups separately from beef cattle. However, detection methods that can also provide concentration for determining the prevalence and abundance of EHEC associated with veal are lacking. Here we compared the ability of qPCR and a molecular based most probable number assay (MPN to detect and enumerate EHEC from veal hides at the abattoir and the resulting pre-intervention carcasses. In addition, digital PCR (dPCR was used to analyze select samples. The qPCR assay was able to enumerate total EHEC in 32% of the hide samples with a range of approximately 34 to 91,412 CFUs/100 cm2 (95% CI 4-113,460 CFUs/100 cm2. Using the MPN assay, total EHEC was enumerable in 48% of the hide samples and ranged from approximately 1 to greater than 17,022 CFUs/100 cm2 (95% CI 0.4-72,000 CFUs/100 cm2. The carcass samples had lower amounts of EHEC with a range of approximately 4 to 275 CFUs/100 cm2 (95% CI 3-953 CFUs/100 cm2 from 17% of samples with an enumerable amount of EHEC by qPCR. For the MPN assay, the carcass samples ranged from 0.1 to 1 CFUs/100 cm2 (95% CI 0.02-4 CFUs/100 cm2 from 29% of the samples. The correlation coefficient between the qPCR and MPN enumeration methods indicated a moderate relation (R2=0.39 for the hide samples while the carcass samples had no relation (R2=0.002, which was likely due to most samples having an amount of total EHEC below the reliable limit of quantification for qPCR. Interestingly, after enrichment, 81% of the hide samples and 94% of the carcass samples had a detectable amount of total EHEC by qPCR. From our analysis, the MPN assay provided a higher percentage of enumerable hide and carcass samples, however determining an appropriate dilution range and the limited throughput offer additional

  20. The bacterial community of entomophilic nematodes and host beetles.

    Science.gov (United States)

    Koneru, Sneha L; Salinas, Heilly; Flores, Gilberto E; Hong, Ray L

    2016-05-01

    Insects form the most species-rich lineage of Eukaryotes and each is a potential host for organisms from multiple phyla, including fungi, protozoa, mites, bacteria and nematodes. In particular, beetles are known to be associated with distinct bacterial communities and entomophilic nematodes. While entomopathogenic nematodes require symbiotic bacteria to kill and reproduce inside their insect hosts, the microbial ecology that facilitates other types of nematode-insect associations is largely unknown. To illuminate detailed patterns of the tritrophic beetle-nematode-bacteria relationship, we surveyed the nematode infestation profiles of scarab beetles in the greater Los Angeles area over a five-year period and found distinct nematode infestation patterns for certain beetle hosts. Over a single season, we characterized the bacterial communities of beetles and their associated nematodes using high-throughput sequencing of the 16S rRNA gene. We found significant differences in bacterial community composition among the five prevalent beetle host species, independent of geographical origin. Anaerobes Synergistaceae and sulphate-reducing Desulfovibrionaceae were most abundant in Amblonoxia beetles, while Enterobacteriaceae and Lachnospiraceae were common in Cyclocephala beetles. Unlike entomopathogenic nematodes that carry bacterial symbionts, insect-associated nematodes do not alter the beetles' native bacterial communities, nor do their microbiomes differ according to nematode or beetle host species. The conservation of Diplogastrid nematodes associations with Melolonthinae beetles and sulphate-reducing bacteria suggests a possible link between beetle-bacterial communities and their associated nematodes. Our results establish a starting point towards understanding the dynamic interactions between soil macroinvertebrates and their microbiota in a highly accessible urban environment.

  1. Explaining the saproxylic beetle diversity of a protected Mediterranean area

    OpenAIRE

    Micó, Estefanía; García López, Alejandra; Brustel, Hervé; Padilla, Ascension; Galante, Eduardo

    2013-01-01

    Saproxylic beetle diversity is high at the Cabañeros National Park (central Spain), where woodland habitats exhibit remarkable heterogeneity. Our aim was to explain the diversity of saproxylic beetles, focusing on species turnover among mature woodland types. We surveyed five woodland types that represented the heterogeneity of the park’s woodland habitats. Beetles were collected using window traps over a period of 20 months. The Jaccard Similarity Index was used as indirect value of beta div...

  2. Monkey and dung beetle activities influence soil seed bank structure

    OpenAIRE

    Feer, François; Ponge, Jean-François; Jouard, Sylvie; Gomez, Doris

    2013-01-01

    International audience; In Neotropical forests, dung beetles act as efficient secondary dispersers of seeds that are dispersed primarily by red howler monkeys. Here, we investigated the origins of soil seed bank variability in relation to monkey and dung beetle activity, to assess the impact of dung beetles on seed fate, and their adaptability to resource availability. This question is important to better understand the process of tree regeneration, and is especially timely in the current con...

  3. Allozyme gene diversities in some leaf beetles (Coleoptera: Chrysomelidae).

    Science.gov (United States)

    Krafsur, E S

    1999-08-01

    Gene diversity at allozyme loci was investigated in the bean leaf beetle, Ceratoma trifurcata Forster; the elm leaf beetle, Xanthogaleruca luteola (Muller); the cottonwood leaf beetle, Chrysomela scripta Fabricus; the western corn rootworm, Diabrotica virgifera virgifera LeConte; the southern corn rootworm, also called the spotted cucumber beetle, D. undecimpunctata howardi Baker; the northern corn rootworm, D. barberi Smith and Lawrence; and the Colorado potato beetle, Leptinotarsa decemlineata (Say). Six of these species are economically important pests of crops and display adaptive traits that may correlate with genetic diversity. Gene diversity H(E) in bean leaf beetles was 17.7 +/- 4.0% among 32 loci. In western corn rootworms, H(E) = 4.8 +/- 2.0% among 36 loci, and in spotted cucumber beetles, H(E) = 11.9 +/- 2.7% among 39 loci. Diversity among 27 loci was 10.5 +/- 4.3% in the Colorado potato beetle. The data were compared with gene diversity estimates from other leaf beetle species in which heterozygosities varied from 0.3 to 21% and no correlation was detected among heterozygosities, geographic ranges, or population densities. Distributions of single-locus heterozygosities were consistent with selective neutrality of alleles.

  4. Colorado potato beetle toxins revisited: evidence the beetle does not sequester host plant glycoalkaloids.

    Science.gov (United States)

    Armer, Christine A

    2004-04-01

    The Colorado potato beetle feeds only on glycoalkaloid-laden solanaceous plants, appears to be toxic to predators, and has aposematic coloration, suggesting the beetle may sequester alkaloids from its host plants. This study tested 4th instars and adults, as well as isolated hemolymph and excrement, to determine if the beetles sequester, metabolize, or excrete alkaloids ingested from their host plants. HPLC analysis showed: that neither the larvae nor the adults sequestered either solanine or chaconine from potato foliage; that any alkaloids in the beetles were at concentrations well below 1 ppm; and that alkaloids were found in the excrement of larvae at approximately the same concentrations as in foliage. Analysis of alkaloids in the remains of fed-upon leaflet halves plus excreta during 24 hr feeding by 4th instars, as compared to alkaloids in the uneaten halves of the leaflets, showed that equal amounts of alkaloids were excreted as were ingested. The aposematic coloration probably warns of a previously-identified toxic dipeptide instead of a plant-derived alkaloid, as the Colorado potato beetle appears to excrete, rather than sequester or metabolize, the alkaloids from its host plants.

  5. iBeetle-Base: a database for RNAi phenotypes in the red flour beetle Tribolium castaneum.

    Science.gov (United States)

    Dönitz, Jürgen; Schmitt-Engel, Christian; Grossmann, Daniela; Gerischer, Lizzy; Tech, Maike; Schoppmeier, Michael; Klingler, Martin; Bucher, Gregor

    2015-01-01

    The iBeetle-Base (http://ibeetle-base.uni-goettingen.de) makes available annotations of RNAi phenotypes, which were gathered in a large scale RNAi screen in the red flour beetle Tribolium castaneum (iBeetle screen). In addition, it provides access to sequence information and links for all Tribolium castaneum genes. The iBeetle-Base contains the annotations of phenotypes of several thousands of genes knocked down during embryonic and metamorphic epidermis and muscle development in addition to phenotypes linked to oogenesis and stink gland biology. The phenotypes are described according to the EQM (entity, quality, modifier) system using controlled vocabularies and the Tribolium morphological ontology (TrOn). Furthermore, images linked to the respective annotations are provided. The data are searchable either for specific phenotypes using a complex 'search for morphological defects' or a 'quick search' for gene names and IDs. The red flour beetle Tribolium castaneum has become an important model system for insect functional genetics and is a representative of the most species rich taxon, the Coleoptera, which comprise several devastating pests. It is used for studying insect typical development, the evolution of development and for research on metabolism and pest control. Besides Drosophila, Tribolium is the first insect model organism where large scale unbiased screens have been performed.

  6. What is Next in Bark Beetle Phylogeography?

    Directory of Open Access Journals (Sweden)

    Dimitrios N. Avtzis

    2012-05-01

    Full Text Available Bark beetle species within the scolytid genera Dendroctonus, Ips, Pityogenes and Tomicus are known to cause extensive ecological and economical damage in spruce and pine forests during epidemic outbreaks all around the world. Dendroctonus ponderosae poses the most recent example having destroyed almost 100,000 km2 of conifer forests in North America. The success and effectiveness of scolytid species lies mostly in strategies developed over the course of time. Among these, a complex system of semiochemicals promotes the communication and aggregation on the spot of infestation facilitating an en masse attack against a host tree’s defenses; or an association with fungi that evolved either in the form of nutrition (ambrosia fungi or even by reducing the resistance of host trees (blue-stain fungi. Although often specific to a tree genus or species, some bark beetles are polyphagous and have the ability to switch on to new hosts and extend their host range (i.e., between conifer genera such as Pityogenes chalcographus or even from conifer to deciduous trees as Polygraphus grandiclava. A combination of these capabilities in concert with life history or ecological traits explains why bark beetles are considered interesting subjects in evolutionary studies. Several bark beetle species appear in phylogeographic investigations, in an effort to improve our understanding of their ecology, epidemiology and evolution. In this paper investigations that unveil the phylogeographic history of bark beetles are reviewed. A close association between refugial areas and postglacial migration routes that insects and host trees have followed in the last 15,000 BP has been suggested in many studies. Finally, a future perspective of how next generation sequencing will influence the resolution of phylogeographic patterns in the coming years is presented. Utilization of such novel

  7. Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression.

    Science.gov (United States)

    Zhang, Weiming; Hu, Xiaocheng; Li, Xiaolong; Yu, Nenghai

    2013-07-01

    State-of-the-art schemes for reversible data hiding (RDH) usually consist of two steps: first construct a host sequence with a sharp histogram via prediction errors, and then embed messages by modifying the histogram with methods, such as difference expansion and histogram shift. In this paper, we focus on the second stage, and propose a histogram modification method for RDH, which embeds the message by recursively utilizing the decompression and compression processes of an entropy coder. We prove that, for independent identically distributed (i.i.d.) gray-scale host signals, the proposed method asymptotically approaches the rate-distortion bound of RDH as long as perfect compression can be realized, i.e., the entropy coder can approach entropy. Therefore, this method establishes the equivalency between reversible data hiding and lossless data compression. Experiments show that this coding method can be used to improve the performance of previous RDH schemes and the improvements are more significant for larger images.

  8. Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation

    Directory of Open Access Journals (Sweden)

    Marghny Mohamed

    2011-01-01

    Full Text Available The least significant bit (LSB embedding method is one of the most commonly used techniques; it targets the LSB'sof the host image to hide the data. This paper deals with three main steganography challenges (i.e. capacity, imperceptibility,and security. This is achieved by hybrid data hiding scheme incorporates LSB technique with a key-permutation method. Thepaper also proposes an optimal key permutation method using genetic algorithms for best key selection. Both normal andoptimized methods are tested with standard images, varying both data size as well as key space. Final experimental resultsshow decrement in computation time when increasing number of keys, at the same time system security improves.

  9. Parallel steganography framework for hiding a color image inside stereo images

    Science.gov (United States)

    Munoz-Ramirez, David O.; Ponomaryov, Volodymyr I.; Reyes-Reyes, Rogelio; Cruz-Ramos, Clara

    2017-05-01

    In this work, a robust steganography framework to hide a color image into a stereo images is proposed. The embedding algorithm is performed via Discrete Cosine Transform (DCT) and Quantization Index Modulation-Dither Modulation (QIM-DM) hiding the secret data. Additionally, the Arnold's Cat Map Transform is applied in order to scramble the secret color image, guaranteeing better security and robustness of the proposed system. Novel framework has demonstrated better performance against JPEG compression attacks among other existing approaches. Besides, the proposed algorithm is developed taking into account the parallel paradigm in order to be implemented in multi-core CPU increasing the processing speed. The results obtained by the proposed framework show high values of PSNR and SSIM, which demonstrate imperceptibility and sufficient robustness against JPEG compression attacks.

  10. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    Directory of Open Access Journals (Sweden)

    Ari Shawakat Tahir

    2015-12-01

    Full Text Available The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had been used in encryption process. The proposed system has been implemented in NetBeans 7.3 software uses image and data in different size to find the system’s speed.

  11. An Attribute-Based Signcryption Scheme and Its Application in Information Hiding

    Institute of Scientific and Technical Information of China (English)

    PENG Changgen; WANG Weiru; TIAN Youliang; YUAN Zhilong

    2016-01-01

    In order to provide a secure, reliable and flexible way to hide information, a new attribute-based signcryption scheme based on ciphertext-policy and its se-curity proof are presented. This scheme not only can simul-taneously fulfil both authentication and confidentiality in an efficient way, but also implements a hierarchical decryp-tion in one group and also between different groups accord-ing to user’s authority (different users satisfying the same access structure can be considered as a group). We provide a solution to information hiding using our proposed scheme which can embed ciphertext into a carrier. Because the hi-erarchical decryption property, different users will obtain different message from the same carrier. Illegal user can not get any information without private key because mes-sage existed in the carrier is ciphertext. Such solution can be applied in sharing important message under the public network.

  12. A data hiding approach for the self-security of iris recognition

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Attacks to biometric data are the primary danger to the self-security of biometrics.To improve the iris feature template data security,a data hiding approach based on bit streams is proposed,in which an iris feature template is embedded into a face image. The proposed approach is applicable to present dominant techniques of iris recognition.With the low computation cost and the zero decoding-error-rate,this data hiding approach,embedding target biometric data into other biometric data for improving the security of target data in identity recognition,data storage and transmission,can deceive attackers more effectively.Furthermore,it does not degrade the iris recognition performances.Experimental results prove that the proposed approach can be used to protect iris feature templates and enhance the security of the iris recognition system itself.

  13. New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files

    CERN Document Server

    Alanazi, Hamdan O; Zaidan, B B; Jalab, Hamid A; AL-Ani, Zaidoon Kh

    2010-01-01

    With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important, Another problem with digital document and video is that undetectable modifications can be made with very simple and widely available equipment, which put the digital material for evidential purposes under question .With the large flood of information and the development of the digital format Information hiding considers one of the techniques which used to protect the important information. The main goals for this paper, provides a general overview of the New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files.

  14. 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing

    CERN Document Server

    Tsai, Pei-Wei; Huang, Hsiang-Cheh

    2017-01-01

    This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .

  15. A new method for high-capacity information hiding in video robust against temporal desynchronization

    Science.gov (United States)

    Mitekin, Vitaly; Fedoseev, Victor A.

    2015-02-01

    This paper presents a new method for high-capacity information hiding in digital video and algorithms of embedding and extraction of hidden information based on this method. These algorithms do not require temporal synchronization to provide robustness against both malicious and non-malicious frame dropping (temporal desynchronization). At the same time, due to randomized distribution of hidden information bits across the video frames, the proposed method allows to increase the hiding capacity proportionally to the number of frames used for information embedding. The proposed method is also robust against "watermark estimation" attack aimed at estimation of hidden information without knowing the embedding key or non-watermarked video. Presented experimental results demonstrate declared features of this method.

  16. Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms

    Directory of Open Access Journals (Sweden)

    Xu-Ren Luo

    2011-05-01

    Full Text Available In recent years, reversible data hiding has attracted much more attention than before. Reversibilitysignifies that the original media can be recovered without any loss from the marked media afterextracting the embedded message. This paper presents a new method that adopts two-level wavelettransform and exploits the feature of large wavelet coefficient variance to achieve the goal of highcapacity with imperceptibility. Our method differs from those of previous ones in which the waveletcoefficients histogram not gray-level histogram is manipulated. Besides, clever shifting rules areintroduced into histogram to avoid the decimal problem in pixel values after recovery to achievereversibility. With small alteration of the wavelet coefficients in the embedding process, and therefore lowvisual distortion is obtained in the marked image. In addition, an important feature of our design is thatthe use of threshold is much different from previous studies. The results indicate that our design issuperior to many other state-of-the-art reversible data hiding schemes.

  17. Insect Pests and Integrated Pest Management in Museums, Libraries and Historic Buildings

    OpenAIRE

    Pascal Querner

    2015-01-01

    Insect pests are responsible for substantial damage to museum objects, historic books and in buildings like palaces or historic houses. Different wood boring beetles (Anobium punctatum, Hylotrupes bajulus, Lyctus sp. or introduced species), the biscuit beetle (Stegobium paniceum), the cigarette beetle (Lasioderma serricorne), different Dermestides (Attagenus sp., Anthrenus sp., Dermestes sp., Trogoderma sp.), moths like the webbing clothes moth (Tineola bisselliella), Silverfish (Lepisma sacc...

  18. Behavioral niche partitioning in a sympatric tiger beetle assemblage and implications for the endangered Salt Creek tiger beetle

    OpenAIRE

    Brosius, Tierney R.; Higley, Leon G.

    2013-01-01

    How behavioral patterns are related to niche partitioning is an important question in understanding how closely related species within ecological communities function. Behavioral niche partitioning associated with thermoregulation is well documented in tiger beetles as a group. Co-occurring species of salt flat tiger beetles have adapted many thermoregulatory behaviors to cope with this harsh ecosystem. On first examination these beetles appear to occur in overlapping microhabitats and theref...

  19. Application of Modified Digital Halftoning Techniques to Data Hiding in Personalized Stamps

    Institute of Scientific and Technical Information of China (English)

    Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao

    2004-01-01

    The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.

  20. Suitability of the RGB Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Ante Poljicak

    2010-06-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data  hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  1. C#实现窗口自动隐藏%Form Automatically Hide with C#

    Institute of Scientific and Technical Information of China (English)

    涂显政

    2012-01-01

      该文介绍了如何利用C#语言,实现靠屏边窗口自动隐藏及鼠标指向后自动弹出。%  Mark a form with C#, the form can automatically hide when it close the edge of screen and it can recover to nor⁃mal when mouse point on it.

  2. Hiding Two Binary Images in Grayscale BMP Image via Five Modulus Method

    Directory of Open Access Journals (Sweden)

    Firas A. Jassim

    2014-05-01

    Full Text Available The aim of this study is to hide two binary BMP images in a single BMP grayscale image. The widespread technique in image steganography is to hide one image (stego image into another (cover image. The proposed novel method is to hide two binary images into one grayscale bitmap cover image. First of all, the proposed technique starts with transforming all grayscale cover image pixels into multiples of five using Five Modulus Method (FMM. Clearly, any modulus of five is either 0, 1, 2, 3, or 4. The transformed FMM cover image could be treated as a good host for carrying data. Obviously, it is known that the pixel value for the binary image is either 0 or 1. Therefore, by concatenating the two binary images, the composite results are 00, 01, 10 and 11. In fact, these concatenated values could be mapped using simple mapping that assigns a positive integer value such as 1 for 00, 2 for 01, 3 for 10 and 4 for 11. Consequently, a new matrix will be constructed that contains a number varying from 1 to 4 only. Fortunately, the four integer values are the same as the previously mentioned reminders of division by 5, hence, adding these four integers to the transformed FMM cover image. On the recipient side, a reverse process will be implemented to extract the two binary images. In terms of PSNR values, the cover image and the two extracted stego images have acceptable PSNR values, which yields that the proposed method is very efficient in information hiding.

  3. Suitability of the rgb Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Lidija Mandić

    2010-01-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  4. Lehr's fields of campaniform sensilla in beetles (Coleoptera): functional morphology. III. Modification of elytral mobility or shape in flying beetles.

    Science.gov (United States)

    Frantsevich, Leonid; Gorb, Stanislav; Radchenko, Vladimir; Gladun, Dmytro

    2015-03-01

    Some flying beetles have peculiar functional properties of their elytra, if compared with the vast majority of beetles. A "typical" beetle covers its pterothorax and the abdomen from above with closed elytra and links closed elytra together along the sutural edges. In the open state during flight, the sutural edges diverge much more than by 90°. Several beetles of unrelated taxa spread wings through lateral incisions on the elytra and turn the elytron during opening about 10-12° (Cetoniini, Scarabaeus, Gymnopleurus) or elevate their elytra without partition (Sisyphus, Tragocerus). The number of campaniform sensilla in their elytral sensory field is diminished in comparison with beetles of closely related taxa lacking that incision. Elytra are very short in rove beetles and in long-horn beetles Necydalini. The abundance of sensilla in brachyelytrous long-horn beetles Necydalini does not decrease in comparison with macroelytrous Cerambycinae. Strong reduction of the sensory field was found in brachyelytrous Staphylinidae. Lastly, there are beetles lacking the linkage of the elytra down the sutural edge (stenoelytry). Effects of stenoelytry were also not uniform: Oedemera and flying Meloidae have the normal amount of sensilla with respect to their body size, whereas the sensory field in the stenoelytrous Eulosia bombyliformis is 5-6 times less than in chafers of the same size but with normally linking broad elytra.

  5. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  6. Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients

    Science.gov (United States)

    Zhang, Xiaoqiang; Wang, Z. Jane

    2013-10-01

    Digital watermarking and data hiding are important tools for digital rights protection of media data. Spread spectrum (SS)-based watermarking and data-hiding approaches are popular due to their outstanding robustness, but their security might not be sufficient. To improve the security of SS, a SS-based image data-hiding approach is proposed by encrypting the discrete cosine transform coefficients of the host image with the piecewise linear chaotic map, before the operation of watermark embedding. To evaluate the performance of the proposed approach, simulations and analyses of its robustness and security are carried out. The average bit-error-rate values on 100 real images from the Berkeley segmentation dataset under the JPEG compression, additive Gaussian noise, salt and pepper noise, and cropping attacks are reported. Experimental results show that the proposed approach can maintain the high robustness of traditional SS schemes and, meanwhile, also improve the security. The proposed approach can extend the key space of traditional SS schemes from 10 to 10 and thus can resist brute-force attack and unauthorized detection watermark attack.

  7. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution

    Directory of Open Access Journals (Sweden)

    H. Yang

    2009-12-01

    Full Text Available Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs substitution is proposed in this paper. The scheme exploits the brightness, edges, and texture masking of the host image to estimate the number k of LSBs for data hiding. Pixels in the noise non-sensitive regions are embedded by a k-bit LSB substitution with a lager value of k than that of the pixels in noise sensitive regions. Moreover, an optimal pixel adjustment process is used to enhance stego-image visual quality obtained by simple LSB substitution method. To ensure that the adaptive number k of LSBs remains unchanged after pixel modification, the LSBs number is computed by the high-order bits rather than all the bits of the image pixel value. The theoretical analyses and experiment results show that the proposed method achieves higher embedding capacity and better stegoimage quality compared with some existing LSB methods.

  8. Pengaruh hide poison dan formalin terhadap sifat kulit dalam pengawet kulit kambing secara dikeringkan

    Directory of Open Access Journals (Sweden)

    Ignatius Sunaryo

    1991-06-01

    Full Text Available The objective of this study is know the effect of ide poison and formaline in the dried curing of goat skin. This study used 199 goat skins that were devided into seven groups od curing. Each group consisted of 17 goat skins. Those groups were : 3 groups of dried curing by hide poison of 0,1%, 0,3% and 0,5%; 3 groups of dried curing by formaline of 1%, 3% and 5%; and 1 groups of dried curing without any preserevation agent as control. After having stored for about 4 months, those skins then to be analized. Physical and chemical analysis werw carried out to evaluate the quality of the skin. Completely randomized design by Duncan’s test was used to analyze the dta. Based on this statistical analysis we can know that: the effect of hide poson in the dried curing of goat skins was the best. The quality of goat skins that were cured by hide poison was as follows : - the average tensile strength was the highest (886,30 kg/CM2, - the average of stretch was the lowest (14,50%, - the average iof hardness was the highest (201,90 kg/2,54 Cm, - the water content was the lowest (20%, and the damage was the smallest (10%.

  9. Design a Weight Based sorting distortion algorithm using Association rule Hiding for Privacy Preserving Data mining

    Directory of Open Access Journals (Sweden)

    R.Sugumar

    2011-12-01

    Full Text Available The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful tool for discovering relationships which are hidden in large database. Association rules hiding algorithms get strong an efficient performance for protecting confidential and crucial data. Data modification and rule hiding is one of the most important approaches for secure data. The objective of the proposed Weight Based Sorting Distortion (WBSD algorithm is to distort certain data which satisfies a particular sensitive rule. Then hide those transactions which support a sensitive rule and assigns them a priority and sorts them in ascending order according to the priority value of each rule. Then it uses these weights to compute the priority value for each transaction according to how weak the rule is that a transaction supports. Data distortion is one of the important methods to avoid this kind of scalability issues

  10. Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition

    Directory of Open Access Journals (Sweden)

    Hyunho Kang

    2015-03-01

    Full Text Available In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria Committee of Japan. This committee was established in 2011 with the aim of establishing standard evaluation criteria for robust watermarks. In this study, we developed an information hiding method that satisfies the IHC evaluation criteria. The proposed method uses the difference of the frequency coefficients derived from a discrete cosine transform or a discrete wavelet transform. The algorithm employs a statistical analysis to find the best positions in the frequency domains for watermark insertion. In particular, we use the BCH (Bose-Chaudhuri-Hocquenghem (511,31,109 code to error correct the watermark bits and the BCH (63,16,11 code as the sync signal to withstand JPEG (Joint Photographic Experts Group compression and cropping attacks. Our experimental results showed that there were no errors in 10 HDTV-size areas after the second decompression. It should be noted that after the second compression, the file size should be less than 1 25 of the original size to satisfy the IHC evaluation criteria.

  11. Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images.

    Science.gov (United States)

    Al-Qershi, Osamah M; Khoo, Bee Ee

    2011-02-01

    Authenticating medical images using watermarking techniques has become a very popular area of research, and some works in this area have been reported worldwide recently. Besides authentication, many data-hiding techniques have been proposed to conceal patient's data into medical images aiming to reduce the cost needed to store data and the time needed to transmit data when required. In this paper, we present a new hybrid watermarking scheme for DICOM images. In our scheme, two well-known techniques are combined to gain the advantages of both and fulfill the requirements of authentication and data hiding. The scheme divides the images into two parts, the region of interest (ROI) and the region of non-interest (RONI). Patient's data are embedded into ROI using a reversible technique based on difference expansion, while tamper detection and recovery data are embedded into RONI using a robust technique based on discrete wavelet transform. The experimental results show the ability of hiding patient's data with a very good visual quality, while ROI, the most important area for diagnosis, is retrieved exactly at the receiver side. The scheme also shows some robustness against certain levels of salt and pepper and cropping noise.

  12. Efficient blind decoders for additive spread spectrum embedding based data hiding

    Science.gov (United States)

    Valizadeh, Amir; Wang, Z. Jane

    2012-12-01

    This article investigates efficient blind watermark decoding approaches for hidden messages embedded into host images, within the framework of additive spread spectrum (SS) embedding based for data hiding. We study SS embedding in both the discrete cosine transform and the discrete Fourier transform (DFT) domains. The contributions of this article are multiple-fold: first, we show that the conventional SS scheme could not be applied directly into the magnitudes of the DFT, and thus we present a modified SS scheme and the optimal maximum likelihood (ML) decoder based on the Weibull distribution is derived. Secondly, we investigate the improved spread spectrum (ISS) embedding, an improved technique of the traditional additive SS, and propose the modified ISS scheme for information hiding in the magnitudes of the DFT coefficients and the optimal ML decoders for ISS embedding are derived. We also provide thorough theoretical error probability analysis for the aforementioned decoders. Thirdly, sub-optimal decoders, including local optimum decoder (LOD), generalized maximum likelihood (GML) decoder, and linear minimum mean square error (LMMSE) decoder, are investigated to reduce the required prior information at the receiver side, and their theoretical decoding performances are derived. Based on decoding performances and the required prior information for decoding, we discuss the preferred host domain and the preferred decoder for additive SS-based data hiding under different situations. Extensive simulations are conducted to illustrate the decoding performances of the presented decoders.

  13. Atlas of Iberian water beetles (ESACIB database).

    Science.gov (United States)

    Sánchez-Fernández, David; Millán, Andrés; Abellán, Pedro; Picazo, Félix; Carbonell, José A; Ribera, Ignacio

    2015-01-01

    The ESACIB ('EScarabajos ACuáticos IBéricos') database is provided, including all available distributional data of Iberian and Balearic water beetles from the literature up to 2013, as well as from museum and private collections, PhD theses, and other unpublished sources. The database contains 62,015 records with associated geographic data (10×10 km UTM squares) for 488 species and subspecies of water beetles, 120 of them endemic to the Iberian Peninsula and eight to the Balearic Islands. This database was used for the elaboration of the "Atlas de los Coleópteros Acuáticos de España Peninsular". In this dataset data of 15 additional species has been added: 11 that occur in the Balearic Islands or mainland Portugal but not in peninsular Spain and an other four with mainly terrestrial habits within the genus Helophorus (for taxonomic coherence). The complete dataset is provided in Darwin Core Archive format.

  14. Medically important beetles (insecta: coleoptera) of Iran

    OpenAIRE

    MR Nikbakhtzadeh; TIRGARI, S.

    2008-01-01

    This study focused on coleopteran species that are responsible for the emergence of recent cases of dermatological manifestations in Iran. To the best of our knowledge, five species of the family Meloidae and nine species of the genus Paederus are by far the only beetles recognized as medically important in Iran. The staphylinids consists of Paederus ilsae, P. iliensis, P. fuscipes, P. kalalovae, P. balcanicus, P. lenkoranus, P. littoralis, P. carpathicus, P. nigricornis, while the meloids ar...

  15. Tenebrio beetles use magnetic inclination compass

    Science.gov (United States)

    Vácha, Martin; Drštková, Dana; Půžová, Tereza

    2008-08-01

    Animals that guide directions of their locomotion or their migration routes by the lines of the geomagnetic field use either polarity or inclination compasses to determine the field polarity (the north or south direction). Distinguishing the two compass types is a guideline for estimation of the molecular principle of reception and has been achieved for a number of animal groups, with the exception of insects. A standard diagnostic method to distinguish a compass type is based on reversing the vertical component of the geomagnetic field, which leads to the opposite reactions of animals with two different compass types. In the present study, adults of the mealworm beetle Tenebrio molitor were tested by means of a two-step laboratory test of magnetoreception. Beetles that were initially trained to memorize the magnetic position of the light source preferred, during the subsequent test, this same direction, pursuant geomagnetic cues only. In the following step, the vertical component was reversed between the training and the test. The beetles significantly turned their preferred direction by 180°. Our results brought until then unknown original findings that insects, represented here by the T. molitor species, use—in contrast to another previously researched Arthropod, spiny lobster—the inclination compass.

  16. HIDE & SEEK: End-to-end packages to simulate and process radio survey data

    Science.gov (United States)

    Akeret, J.; Seehars, S.; Chang, C.; Monstein, C.; Amara, A.; Refregier, A.

    2017-01-01

    As several large single-dish radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these datasets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system-from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing single-dish radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single-dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal. The two packages can be used separately or together depending on the application. Their modular and flexible nature allows easy adaptation to other instruments and datasets. We describe the basic architecture of the two packages and examine in detail the noise and RFI modeling in HIDE, as well as the implementation of gain calibration and RFI mitigation in SEEK. We then apply HIDE &SEEK to forward-model a Galactic survey in the frequency range 990-1260 MHz based on data taken at the Bleien Observatory. For this survey, we expect to cover 70% of the full sky and achieve a median signal-to-noise ratio of approximately 5-6 in the cleanest channels including systematic uncertainties. However, we also point out the potential challenges of high RFI contamination and baseline removal when examining the early data from the Bleien Observatory. The fully documented HIDE &SEEK packages are available at http://hideseek.phys.ethz.ch/ and are published

  17. Proceedings from the Third Workshop on Genetics of Bark Beetles and Associated Microorganisms

    Science.gov (United States)

    Barbara Bentz; Anthony Cognato; Kenneth Raffa

    2007-01-01

    These proceedings provide a synopsis of the Third Workshop on Genetics of Bark Beetles and Association Microorganisms, which was held May 20-2, 2006 in Asheville, NC. Twenty- five participants from five countries attended the meeting. The proceedings are structured into four parts: Phylogenetics of Bark Beetles, Population Genetics of Bark Beetles, Bark Beetle Gene...

  18. Chemical ecology and lure development for redbay ambrosia beetle

    Science.gov (United States)

    The exotic redbay ambrosia beetle, Xyleborus glabratus Eichhoff, has become a serious invasive pest in the U.S., currently established in nine southeastern states. Female beetles are the primary vectors of a pathogenic fungus (Raffaelea lauricola) that causes laurel wilt. This lethal vascular dise...

  19. Origin and Diversification of Dung Beetles in Madagascar

    DEFF Research Database (Denmark)

    Miraldo, Andreia; Wirta, Helena; Hanski, Ilkka

    2011-01-01

    and diversification of Malagasy dung beetles. Based on molecular phylogenies, the extant dung beetles originate from eight colonizations, of which four have given rise to extensive radiations. These radiations have occurred in wet forests, while the few extant species in the less successfulradiations occur in open...

  20. Formulating entompathogens for control of boring beetles in avocado orchards

    Science.gov (United States)

    A foam formulation of Beauveria bassiana was adapted to control boring beetles in avocado orchards. The two geographically independent avocado growing areas in the United States are threatened by emerging diseases vectored by boring beetles. In the California growing region, Fusarium dieback is vect...

  1. Bark beetle outbreaks in western North America: causes and consequences

    Science.gov (United States)

    Bentz, Barbara; Logan, Jesse; MacMahon, James A.; Allen, Craig D.; Ayres, Matt; Berg, Edward E; Carroll, Allan; Hansen, Matt; Hicke, Jeff H.; Joyce, Linda A.; Macfarlane, Wallace; Munson, Steve; Negron, Jose; Paine, Tim; Powell, Jim; Raffa, Kenneth; Regniere, Jacques; Reid, Mary; Romme, Bill; Seybold, Steven J.; Six, Diana; Vandygriff, Jim; Veblen, Tom; White, Mike; Witcosky, Jeff; Wood, David

    2005-01-01

    Since 1990, native bark beetles have killed billions of trees across millions of acres of forest from Alaska to northern Mexico. Although bark beetle infestations are a regular force of natural change in forested ecosystems, several of the current outbreaks, which are occurring simultaneously across western North America, are the largest and most severe in recorded history.

  2. Efficacy of plant extracts against the cowpea beetle, Callosobruchus maculatus

    NARCIS (Netherlands)

    Boeke, S.J.; Barnaud, B.; Loon, van J.J.A.; Kossou, D.K.; Huis, van A.; Dicke, M.

    2004-01-01

    Traditionally used African plant powders, with a known effect against the cowpea beetle Callosobruchus maculatus in stored cowpea, were extracted with water. The extracts, 13 volatile oils, 2 non-volatile oils and 8 slurries, were evaluated for their toxic and repellent effects against the beetle. A

  3. Callosobruchus maculatus: A Seed Beetle with a Future in Schools.

    Science.gov (United States)

    Dockery, Michael

    1997-01-01

    Recommends the use of seed beetles for studying animal behavior and provides suggestions for practical and project assignments. Sources for obtaining the beetles and a list of the equipment needed for their study and maintenance are provided. Answers to common concerns are addressed. (DDR)

  4. Endocrine control of exaggerated traits in rhinoceros beetles

    Science.gov (United States)

    Juvenile hormone (JH) is a key insect growth regulator involved in modulating phenotypically plastic traits in insects such as caste determination in eusocial species, wing polymorphisms in aphids, and mandible size in stag beetle. Male stag beetles have sexually-dimorphic, condition-dependent expre...

  5. Changes in food resources and conservation of scarab beetles

    DEFF Research Database (Denmark)

    Carpaneto, Giuseppe Maria; Mazziotta, Adriano; Piattella, Emanuele

    2005-01-01

    The aim of the research was to show how a change in land use influences the structure of a dung beetle assemblage and affect its conservation. In the Pineto Urban Regional Park (Rome), dog dung is the sole food resource currently available for scarab dung beetles, after the recent removal of wild...

  6. Interactions among the mountain pine beetle, fires, and fuels

    Science.gov (United States)

    Michael J. Jenkins; Justin B. Runyon; Christopher J. Fettig; Wesley G. Page; Barbara J. Bentz

    2014-01-01

    Bark beetle outbreaks and wildfires are principal drivers of change in western North American forests, and both have increased in severity and extent in recent years. These two agents of disturbance interact in complex ways to shape forest structure and composition. For example, mountain pine beetle, Dendroctonus ponderosae Hopkins, epidemics alter forest fuels with...

  7. Method for continuously rearing Coccinella lady beetles (Coleoptera: Coccinellidae)

    Science.gov (United States)

    Coccinella novemnotata L., the ninespotted lady beetle, and Coccinella transversoguttata richardsoni Brown, the transverse lady beetle, are predatory species whose abundance has declined significantly over the last few decades in North America. An ex situ system for continuously rearing these two b...

  8. Microorganisms in the gut of beetles: evidence from molecular cloning.

    Science.gov (United States)

    Zhang, Ning; Suh, Sung-Oui; Blackwell, Meredith

    2003-11-01

    We have regularly cultured yeasts from the gut of certain beetles in our ongoing research. In this study cloned PCR products amplified from the gut contents of certain mushroom-feeding and wood-ingesting beetles in four families (Erotylidae, Tenebrionidae, Ciidae, and Passalidae) were sequenced and compared with culture results. Cultural techniques detected some yeasts present in the gut of the beetles, including a Pichia stipitis-like yeast associated with wood-ingesting passalid beetles. Clone sequences similar to several ascomycete yeasts and Malassezia restricta, a fastidious basidiomycetous yeast requiring special growth media, however, were not detected by culturing. Unexpectedly, phylogenetic analysis of additional clone sequences discovered from passalid beetles showed similarity to members of the Parabasalia, protists known from other wood-ingesting insects, termites, and wood roaches. Examination of all gut regions of living passalids, however, failed to reveal parabasalids, and it is possible that they were parasites in the gut tissue present in low numbers.

  9. Spruce Beetle Biology, Ecology and Management in the Rocky Mountains: An Addendum to Spruce Beetle in the Rockies

    Directory of Open Access Journals (Sweden)

    Michael J. Jenkins

    2014-01-01

    Full Text Available Spruce beetle outbreaks have been reported in the Rocky Mountains of western North America since the late 1800s. In their classic paper, Spruce Beetle in the Rockies, Schmid and Frye reviewed the literature that emerged from the extensive outbreaks in Colorado in the 1940s. A new wave of outbreaks has affected Rocky Mountain subalpine spruce-fir forests beginning in the mid-1980s and continuing to the present. These outbreaks have spurred another surge of basic and applied research in the biology, ecology and management of spruce and spruce beetle populations. This paper is a review of literature on spruce beetle focusing on work published since the late 1970s and is intended as an addendum to Spruce Beetle in the Rockies.

  10. Negative feedbacks on bark beetle outbreaks: widespread and severe spruce beetle infestation restricts subsequent infestation.

    Science.gov (United States)

    Hart, Sarah J; Veblen, Thomas T; Mietkiewicz, Nathan; Kulakowski, Dominik

    2015-01-01

    Understanding disturbance interactions and their ecological consequences remains a major challenge for research on the response of forests to a changing climate. When, where, and how one disturbance may alter the severity, extent, or occurrence probability of a subsequent disturbance is encapsulated by the concept of linked disturbances. Here, we evaluated 1) how climate and forest habitat variables, including disturbance history, interact to drive 2000s spruce beetle (Dendroctonus rufipennis) infestation of Engelmann spruce (Picea engelmannii) across the Southern Rocky Mountains; and 2) how previous spruce beetle infestation affects subsequent infestation across the Flat Tops Wilderness in northwestern Colorado, which experienced a severe landscape-scale spruce beetle infestation in the 1940s. We hypothesized that drought and warm temperatures would promote infestation, whereas small diameter and non-host trees, which may reflect past disturbance by spruce beetles, would inhibit infestation. Across the Southern Rocky Mountains, we found that climate and forest structure interacted to drive the 2000s infestation. Within the Flat Tops study area we found that stands infested in the 1940s were composed of higher proportions of small diameter and non-host trees ca. 60 years later. In this area, the 2000s infestation was constrained by a paucity of large diameter host trees (> 23 cm at diameter breast height), not climate. This suggests that there has not been sufficient time for trees to grow large enough to become susceptible to infestation. Concordantly, we found no overlap between areas affected by the 1940s infestation and the current infestation. These results show a severe spruce beetle infestation, which results in the depletion of susceptible hosts, can create a landscape template reducing the potential for future infestations.

  11. Negative feedbacks on bark beetle outbreaks: widespread and severe spruce beetle infestation restricts subsequent infestation.

    Directory of Open Access Journals (Sweden)

    Sarah J Hart

    Full Text Available Understanding disturbance interactions and their ecological consequences remains a major challenge for research on the response of forests to a changing climate. When, where, and how one disturbance may alter the severity, extent, or occurrence probability of a subsequent disturbance is encapsulated by the concept of linked disturbances. Here, we evaluated 1 how climate and forest habitat variables, including disturbance history, interact to drive 2000s spruce beetle (Dendroctonus rufipennis infestation of Engelmann spruce (Picea engelmannii across the Southern Rocky Mountains; and 2 how previous spruce beetle infestation affects subsequent infestation across the Flat Tops Wilderness in northwestern Colorado, which experienced a severe landscape-scale spruce beetle infestation in the 1940s. We hypothesized that drought and warm temperatures would promote infestation, whereas small diameter and non-host trees, which may reflect past disturbance by spruce beetles, would inhibit infestation. Across the Southern Rocky Mountains, we found that climate and forest structure interacted to drive the 2000s infestation. Within the Flat Tops study area we found that stands infested in the 1940s were composed of higher proportions of small diameter and non-host trees ca. 60 years later. In this area, the 2000s infestation was constrained by a paucity of large diameter host trees (> 23 cm at diameter breast height, not climate. This suggests that there has not been sufficient time for trees to grow large enough to become susceptible to infestation. Concordantly, we found no overlap between areas affected by the 1940s infestation and the current infestation. These results show a severe spruce beetle infestation, which results in the depletion of susceptible hosts, can create a landscape template reducing the potential for future infestations.

  12. Predatory aquatic beetles, suitable trace elements bioindicators.

    Science.gov (United States)

    Burghelea, Carmen I; Zaharescu, Dragos G; Hooda, Peter S; Palanca-Soler, Antonio

    2011-05-01

    Predatory aquatic beetles are common colonizers of natural and managed aquatic environments. While as important components of the aquatic food webs they are prone to accumulate trace elements, they have been largely neglected from metal uptake studies. We aim to test the suitability of three dytiscid species, i.e.Hydroglyphus pusillus, Laccophilus minutus and Rhantus suturalis, as trace elements (Al, As, Cd, Co, Cu, Fe, Mn, Mo, Ni, Pb, Se and Zn) bioindicators. The work was carried out in a case area representing rice paddies and control sites (reservoirs) from an arid region known for its land degradation (Monegros, NE Spain). Categorical principal component analysis (CATPCA) was tested as a nonlinear approach to identify significant relationships between metals, species and habitat conditions so as to examine the ability of these species to reflect differences in metal uptake. Except Se and As, the average concentrations of all other elements in the beetles were higher in the rice fields than in the control habitats. The CATPCA determined that H. pusillus had high capacity to accumulate Fe, Ni and Mn regardless of the habitat type, and hence may not be capable of distinguishing habitat conditions with regards to these metals. On the other hand, L. minutus was found less sensitive for Se in non-managed habitats (i.e. reservoirs), while R. suturalis was good in accumulating Al, Mo and Pb in rice fields. The latter seems to be a promising bioindicator of metal enrichment in rice fields. We conclude that predatory aquatic beetles are good candidates for trace elements bioindication in impacted and non-impacted environments and can be used in environmental monitoring studies. CATPCA proved to be a reliable approach to unveil trends in metal accumulation in aquatic invertebrates according to their habitat status.

  13. Sensor and Actuator Fault-Hiding Reconfigurable Control Design for a Four-Tank System Benchmark

    DEFF Research Database (Denmark)

    Hameed, Ibrahim; El-Madbouly, Esam I; Abdo, Mohamed I

    2015-01-01

    Fault detection and compensation plays a key role to fulfill high demands for performance and security in today's technological systems. In this paper, a fault-hiding (i.e., tolerant) control scheme that detects and compensates for actuator and sensor faults in a four-tank system benchmark...... Invariant (LTI) system where virtual sensors and virtual actuators are used to correct faulty performance through the use of a pre-fault performance. Simulation results showed that the developed approach can handle different types of faults and able to completely and instantly recover the original system...

  14. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-01

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  15. Importance of Secondary Metabolites for Leaf Beetles (Coleoptera: Chrysomelidae

    Directory of Open Access Journals (Sweden)

    A. N. EKİZ

    2014-06-01

    Full Text Available Leaf beetles (Chrysomelidae are one of the most diverse families of herbivorous insects. Many of them are important agricultural pests and cause remarkable loss of crop and money as well. Plant leaves and roots are primary food source of both larva and adults of leaf beetles. Plants produce many secondary metabolites in reaction to herbivore insects. It is a well-known phenomenon that quantity and variety of secondary metabolites in plant leaves may change in response to insect attacks. Herbivore insects have to deal with such defensive secondary chemicals and overcome either by detoxifying or storing them. Accordingly, many specialist herbivores coevolved with their host plant. Certain phenolic glycosides may reduce leaf beetle feeding. Condensed tannins are anti-herbivore defenses against leaf chewing beetles, including leaf beetles. Flavonoid compounds are feeding deterrents for many flea leaf beetles. Cinnamic acid derivatives are other known feeding deterrents for leaf beetles. Secondary metabolites quantity and nutritional quality of host plants are not only important for feeding but also for providing enemy-free space and suitable oviposition sites.

  16. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  17. Epigenetic Mechanisms Underlying Developmental Plasticity in Horned Beetles

    Directory of Open Access Journals (Sweden)

    Sophie Valena

    2012-01-01

    Full Text Available All developmental plasticity arises through epigenetic mechanisms. In this paper we focus on the nature, origins, and consequences of these mechanisms with a focus on horned beetles, an emerging model system in evolutionary developmental genetics. Specifically, we introduce the biological significance of developmental plasticity and summarize the most important facets of horned beetle biology. We then compare and contrast the epigenetic regulation of plasticity in horned beetles to that of other organisms and discuss how epigenetic mechanisms have facilitated innovation and diversification within and among taxa. We close by highlighting opportunities for future studies on the epigenetic regulation of plastic development in these and other organisms.

  18. Photonic nanoarchitectures of biologic origin in butterflies and beetles

    Energy Technology Data Exchange (ETDEWEB)

    Biro, L.P., E-mail: biro@mfa.kfki.h [Research Institute for Technical Physics and Materials Science, H-1525 Budapest, POB 49 (Hungary)

    2010-05-25

    Photonic nanoarchitectures occurring in butterflies and beetles, which produce structural color in the visible range of the electromagnetic spectrum by the selective reflection of light, are investigated under the aspect of being used as possible 'blueprints' for artificial, bioinspired nanoarchitectures. The role of order and disorder and of regularity/irregularity in photonic nanoarchitectures of biologic origin is discussed. Three recent case studies are briefly reviewed for butterflies (Albulina metallica, Cyanophrys remus, Troides magellanus) and three for beetles (Hoeplia coerulea, Chrysochroa vittata, Charidotella egregia). The practical realization of bioinspired artificial structures is discussed for the A. metallica butterfly and for the C. vittata beetle.

  19. Phylogeny of world stag beetles (Coleoptera: Lucanidae) reveals a Gondwanan origin of Darwin's stag beetle.

    Science.gov (United States)

    Kim, Sang Il; Farrell, Brian D

    2015-05-01

    Stag beetles (family Lucanidae Latreille, 1804) are one of the earliest branching lineages of scarab beetles that are characterized by the striking development of the male mandibles. Despite stag beetles' popularity among traditional taxonomists and amateur collectors, there has been almost no study of lucanid relationships and evolution. Entomologists, including Jeannel (1942), have long recognized resemblance between the austral stag beetles of the tribes Chiasognathini, Colophonini, Lamprimini, Pholidotini, Rhyssonotini, and Streptocerini, but this hypothesis of their close relationship across the continents has never been tested. To gain further insight into lucanid phylogeny and biogeography, we reconstructed the first molecular phylogeny of world stag beetles using DNA sequences from mitochondrial 16S rDNA, nuclear 18S and 28S rDNA, and the nuclear protein-coding (NPC) gene wingless for 93 lucanid species representing all extant subfamilies and 24 out of the 27 tribes, together with 14 representative samples of other early branching scarabaeoid families and two staphyliniform beetle families as outgroups. Both Bayesian inference (BI) and maximum likelihood inference (MLI) strongly supported the monophyly of Lucanidae sensu lato that includes Diphyllostomatidae. Within Lucanidae sensu stricto, the subfamilies Lucaninae and Lampriminae appeared monophyletic under both methods of phylogenetic inferences; however, Aesalinae and Syndesinae were found to be polyphyletic. A time-calibrated phylogeny based on five fossil data estimated the origin of crown group Lucanidae as circa 160 million years ago (MYA). Divergence between the Neotropical and Australasian groups of the Chiasognathini was estimated to be circa 47MYA, with the South African Colophonini branching off from the ancient Chiasognathini lineage around 87MYA. Another Gondwanan relationship was recovered between the Australasian Eucarteria and the Neotropical Casignetus, which diverged circa 58MYA. Lastly

  20. Toxicity of Monoterpene Structure, Diversity and Concentration to Mountain Pine Beetles, Dendroctonus ponderosae: Beetle Traits Matter More.

    Science.gov (United States)

    Reid, Mary L; Sekhon, Jagdeep K; LaFramboise, Lanielle M

    2017-03-03

    A high diversity of plant defenses may be a response to herbivore diversity or may be collectively more toxic than single compounds, either of which may be important for understanding insect-plant associations. Monoterpenes in conifers are particularly diverse. We tested the fumigant toxicity of four monoterpenes, alone and in combination, to mountain pine beetles, Dendroctonus ponderosae, in the context of the beetles' individual body traits. Chemical structures of tested monoterpene hydrocarbons had modest effects on beetle survival, mass loss, water content and fat content, with (R)-(+)-limonene tending to be more toxic than (-)-α-pinene, (-)-β-pinene, and (+)-3-carene. Monoterpene diversity (all qualitative combinations of one to four monoterpenes) did not affect toxicity. Concentration (0 to 1200 ppm) of individual monoterpenes was a strong determinant of toxicity. Beetle body size and body condition index strongly and positively affected survival during monoterpene treatments. Larger beetles in better condition lost proportionally less mass during exposure, where proportion mass loss negatively affected survivorship. Toxicity was much more associated with water loss than with fat loss, suggesting that a main cost of detoxification is excretion, a process that has received little attention. These results provide insight into the determinants of beetle success in historic and novel hosts that differ in monoterpene composition and concentration. We also suggest that water availability will affect beetle success directly through their ability to tolerate detoxification as well as indirectly through host responses to drought.

  1. Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding

    Science.gov (United States)

    Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei

    The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

  2. Directionally hiding objects and creating illusions above a carpet-like device by reflection holography

    Science.gov (United States)

    Cheng, Qiluan; Wu, Kedi; Shi, Yile; Wang, Hui; Wang, Guo Ping

    2015-02-01

    Realization of a perfect invisibility cloak still challenges the current fabricating technologies. Most experiments, if not all, are hence focused on carpet cloaks because of their relatively low requirements to material properties. Nevertheless, present invisibility carpets are used to hide beneath objects. Here, we report a carpet-like device to directionally conceal objects and further to create illusions above it. The device is fabricated through recording a reflection hologram of objects and is used to produce a time-reversed signal to compensate for the information of the objects and further to create light field of another object so as to realize both functions of hiding the objects and creating illusions, respectively. The carpet-like device can work for macroscopic objects at visible wavelength as the distance between objects and device is at decimeter scale. Our carpet-like device to realizing invisibility and creating illusions may provide a robust way for crucial applications of magic camouflaging and anti-detection etc.

  3. Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm

    Directory of Open Access Journals (Sweden)

    Ching-Yu Yang

    2012-01-01

    Full Text Available This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.

  4. Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding

    CERN Document Server

    Bahi, Jacques M; Guyeux, Christophe; Wang, Qianxue

    2011-01-01

    Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern. The discovery of new pseudo-random number generators with a strong level of security is a field of research in full expansion, due to the fact that numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we described a generator based on chaotic iterations which behaves chaotically as defined by Devaney. In this paper which is an extension of the work presented at the conference Internet`10, the proposal is to improve the speed, the security, and the evaluation of this generator, to make its use more relevant in the Internet security context. In order to do so, a comparative study between various generators is carried out and statistical results are improved. Finally, an application in the information hiding framework is presented with details, to give an illustrative example of the use of such a gener...

  5. HIDE & SEEK: End-to-End Packages to Simulate and Process Radio Survey Data

    CERN Document Server

    Akeret, Joel; Chang, Chihway; Monstein, Christian; Amara, Adam; Refregier, Alexandre

    2016-01-01

    As several large radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these data sets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system - from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal....

  6. Secure Reversible Data Hiding in Encrypted Images by Allocating Memory before Encryption via Security keys

    Directory of Open Access Journals (Sweden)

    Priya Jambhulkar

    2015-11-01

    Full Text Available Digital image and information embedding system have number of important multimedia applications. Recently, attention is paid to reversible data hiding (RDH in encrypted images is more, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content’s confidentiality. RDH is a technique used to hide data inside image for high security in such a way that original data is not visible. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this paper, we propose another method in which we simply encrypt an image without its header by using our own algorithm. And thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.

  7. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  8. Temporal cloak with large fractional hiding window at telecommunication data rate

    Science.gov (United States)

    Zhou, Feng; Dong, Jianji; Yan, Siqi; Yang, Ting

    2017-04-01

    We design and experimentally investigate a temporal cloak scheme using ultrashort pulse compression and time-domain Fraunhofer diffraction. An input continuous-wave probe beam is compressed to ultrashort pulse train based on self-phase modulation effect and chirp compensation using single mode fiber. Accordingly, wide temporal gaps appear to act as the cloaking windows. The train of ultrashort pulses can be converted to continuous wave after experiencing enough dispersion, indicating that the temporal gaps are closed. Thus, any time events will be hidden in the temporal gaps from observers. In our study, we demonstrated a temporal cloak system, which is able to hide 88% of the whole time period and cloak pseudorandom digital data at a bitrate of 10 Gbit/s. The relationships of cloaking window fraction versus pump power and the condition of cloaking off are also investigated. These results present a new feasible way towards obtaining a high-fractional cloaking window at telecommunication data rate and hiding real-world messages.

  9. Hide unhairing and characterization of commercial enzymes used in leather manufacture

    Directory of Open Access Journals (Sweden)

    A Dettmer

    2011-09-01

    Full Text Available The enzymatic treatment of hides in tannery processes is a promising technology. However, the reaction kinetics of commercial enzymes available to the leather industry are not fully understood and their activities have been mainly determined with model proteins such as casein as substrate, which are not of direct relevance for cattle hides. Therefore, it is important to determine their activities on collagen and keratin, the main proteins of skin, in order to use these enzymes in leather processing. This work describes the study of five proteases, used commercially in tanneries, to assess their ability to act upon collagen and keratin and to determine their unhairing. Results showed that all commercial enzymes tested had more activity on collagen than on keratin. Unhairing was also tested and four out of the five enzymes tested showed some unhairing activity. Optima of the temperature and pH of the enzymes were very similar for all five enzymes, with maximal activities around 55ºC and pH 9 to 12, respectively.

  10. Modified Approach for Hiding Sensitive Association Rules for Preserving Privacy in Database

    Directory of Open Access Journals (Sweden)

    Tania Banerjee

    2014-03-01

    Full Text Available Data mining is the process of analyzing large database to find useful patterns. The term pattern refers to the items which are frequently occurring in set of transaction. The frequent patterns are used to find association between sets of item. The efficiency of mining association rules and confidentiality of association rule is becoming one of important area of knowledge discovery in database. This paper is organized into two sections. In the system Apriori algorithm is being presented that efficiently generates association rules. These reduces unnecessary database scan at time of forming frequent large item sets .We have tried to give contribution to improved Apriori algorithm by hiding sensitive association rules which are generated by applying improved Apriori algorithm on supermarket database. In this paper we have used novel approach that strategically modifies few transactions in transaction database to decrease support and confidence of sensitive rule without producing any side effects. Thus in the paper we have efficiently generated frequent item set sets by applying Improved Apriori algorithm and generated association rules by applying minimum support and minimum confidence and then we went one step further to identify sensitive rules and tried to hide them without any side effects to maintain integrity of data without generating spurious rules.

  11. Double Hiding Information in Color Image File Based on Classical LSB Method

    Directory of Open Access Journals (Sweden)

    Aymen Mudheher Badr

    2014-07-01

    Full Text Available This study presents a two principles, Cryptography and Steganography, each tow methods work separately from the other to ensure a secure content. We are developed an algorithm to increase the safety and reliability of the copyrights of the images or books (etc. that published on the internet by providing a watermark image (as logo hiding inside the original file that we want product it. Firstly reading image (the logo image, convert it to binary and encrypted it by using EX-OR with a secret key and embedding it inside a gray image in the LSB (in the 1st and hiding first key in the 2nd bit and the second key in the 3rd bit, then we embedding them in the LSB of Original image in RGB to be protected. The two secret keys, first one as an encryption key and the second key using as signature (data that have been taken from the cover image (original to make sure the reliability of the image transmitted via the Internet.

  12. A one-time pad encryption method combining full-phase image encryption and hiding

    Science.gov (United States)

    Li, Jiaosheng; Xiong, Jiaxiang; Zhang, Qinnan; Zhong, Liyun; Zhou, Yunfei; Li, Jun; Lu, Xiaoxu

    2017-08-01

    A one-time pad encryption method combining full-phase image encryption and hiding is proposed. Firstly, original images are encoded in the phase and encrypted by phase keys loaded on the phase-only liquid crystal spatial light modulator, where the phase keys can be distributed using a quantum key distribution method. Subsequently, a host image is introduced to produce a reference wave, and overlap with an object wave to form an interferogram. Finally, based on phase-shifting interferometry, we can achieve the above encrypted image hiding. Both the simulation and experiment research demonstrate the feasibility of the proposed method, meanwhile the key and the encrypted image can be changed randomly, so the proposed system reveals the high flexibility, anti-attack ability and can be used to implement the one-time pad to achieve absolute secure transmission with the quantum key distribution method. Moreover, system security will be improved due to the fact that encryption information hidden in the host image can be treated as background noise, which does not attract the attention of the attacker.

  13. A REVIEW ON HEAVY METALS CONTENTS IN HIDE, SKIN AND PROCESSED LEATHERS

    Directory of Open Access Journals (Sweden)

    KOIZHAIGANOVA Meruyert

    2016-05-01

    Full Text Available Heavy metals are metals with high atomic weight which can be deposited in soil, water, plants and animals. It is generally known that mammal tissues are good bioindicators of trace elements, including heavy metals. Heavy metal analysis serves to identify and quantify the elements that are a potential hazard to the consumer after varying levels of contact. Usage area of leather is increasingly expanding in these days and it has also become a material requested and demanded by effect of fashion. Leather must protect its appearance and physical stability and also be problem-free in ecological terms and harmless to human health. There is a lack of data concerning the content of toxic elements in raw hide and skin of animals. Mainly information concerning metals content, including toxic ones, in processed leathers may be found in the literature. The aim of the present study was to review and compare the content of some heavy metals in raw hide, skin and the processed leathers in order to evaluate their accumulation and transition to the end-up product.

  14. Dew condensation on desert beetle skin.

    Science.gov (United States)

    Guadarrama-Cetina, J; Mongruel, A; Medici, M-G; Baquero, E; Parker, A R; Milimouk-Melnytchuk, I; González-Viñas, W; Beysens, D

    2014-11-01

    Some tenebrionind beetles inhabiting the Namib desert are known for using their body to collect water droplets from wind-blown fogs. We aim to determine whether dew water collection is also possible for desert insects. For this purpose, we investigated the infra-red emissivity, and the wetting and structural properties, of the surface of the elytra of a preserved specimen of Physasterna cribripes (Tenebrionidæ) beetle, where the macro-structure appears as a series of "bumps", with "valleys" between them. Dew formation experiments were carried out in a condensation chamber. The surface properties (infra-red emissivity, wetting properties) were dominated by the wax at the elytra surface and, to a lower extent, its micro-structure. We performed scanning electron microscope on histological sections and determined the infra-red emissivity using a scanning pyrometer. The emissivity measured (0.95±0.07 between 8-14 μm) was close to the black body value. Dew formation occurred on the insect's elytra, which can be explained by these surface properties. From the surface coverage of the condensed drops it was found that dew forms primarily in the valleys between the bumps. The difference in droplet nucleation rate between bumps and valleys can be attributed to the hexagonal microstructure on the surface of the valleys, whereas the surface of the bumps is smooth. The drops can slide when they reach a critical size, and be collected at the insect's mouth.

  15. Cuticle hydrocarbons in saline aquatic beetles

    Directory of Open Access Journals (Sweden)

    María Botella-Cruz

    2017-07-01

    Full Text Available Hydrocarbons are the principal component of insect cuticle and play an important role in maintaining water balance. Cuticular impermeability could be an adaptative response to salinity and desiccation in aquatic insects; however, cuticular hydrocarbons have been poorly explored in this group and there are no previous data on saline species. We characterized cuticular hydrocarbons of adults and larvae of two saline aquatic beetles, namely Nebrioporus baeticus (Dytiscidae and Enochrus jesusarribasi (Hydrophilidae, using a gas chromatograph coupled to a mass spectrometer. The CHC profile of adults of both species, characterized by a high abundance of branched alkanes and low of unsaturated alkenes, seems to be more similar to that of some terrestrial beetles (e.g., desert Tenebrionidae compared with other aquatic Coleoptera (freshwater Dytiscidae. Adults of E. jesusarribasi had longer chain compounds than N. baeticus, in agreement with their higher resistance to salinity and desiccation. The more permeable cuticle of larvae was characterized by a lower diversity in compounds, shorter carbon chain length and a higher proportion of unsaturated hydrocarbons compared with that of the adults. These results suggest that osmotic stress on aquatic insects could exert a selection pressure on CHC profile similar to aridity in terrestrial species.

  16. Efficacy of octenidine hydrochloride for reducing Escherichia coli O157:H7, Salmonella spp., and Listeria monocytogenes on cattle hides.

    Science.gov (United States)

    Baskaran, Sangeetha Ananda; Upadhyay, Abhinav; Upadhyaya, Indu; Bhattaram, Varunkumar; Venkitanarayanan, Kumar

    2012-06-01

    The efficacy of octenidine hydrochloride (OH; 0.025, 0.15, and 0.25%) for inactivating Escherichia coli O157:H7, Salmonella spp., and Listeria monocytogenes on cattle hides was investigated at 23°C in the presence and absence of bovine feces. All tested concentrations of OH were effective in decreasing more than 5.0 log CFU of bacteria/cm(2) in 5 min (P < 0.01). The results suggest that OH could be used to decontaminate cattle hides; however, further studies under commercial settings are necessary to validate these results.

  17. Evaluation of bacteriophage application to cattle in lairage at beef processing plants to reduce Escherichia coli O157:H7 prevalence on hides and carcasses

    Science.gov (United States)

    Escherichia coli O157:H7 is a major food safety concern for the beef industry. Several studies have provided evidence that cattle hides are the main source of beef carcass contamination during processing and that reductions in the E. coli O157:H7 load on the hides of cattle entering processing faci...

  18. Flexible Wing Kinematics of a Free-Flying Beetle (Rhinoceros Beetle Trypoxylus Dichotomus)

    Institute of Scientific and Technical Information of China (English)

    Tien Van Truong; Tuyen Quang Le; Doyoung Byun; Hoon Choel Park; Minjun Kim

    2012-01-01

    Detailed 3-Dimensional (3D) wing kinematics was experimentally presented in free flight of a beetle,Trypoxylus dichotomus,which has a pair of elytra (forewings) and flexible hind wings.The kinematic parameters such as the wing tip trajectory,angle of attack and camber deformation were obtained from a 3D reconstruction technique that involves the use of two synchronized high-speed cameras to digitize various points marked on the wings.Our data showed outstanding characteristics of deformation and flexibility of the beetle's hind wing compared with other measured insects,especially in the chordwise and spanwise directions during flapping motion.The hind wing produced 16% maximum positive camber deformation during the downstroke.It also experienced twisted shape showing large variation of the angle of attack from the root to the tip during the upstroke.

  19. Monitoring of saproxylic beetles in Croatia: following the path of the stag beetle

    Directory of Open Access Journals (Sweden)

    Luka Katušić

    2017-07-01

    Full Text Available As a member of the European Union, Croatia is obliged to report on the conservation status of 220 animal non-bird species listed in the annexes of the Habitats Directive (92/43/EEC, for which purpose a monitoring system is being established. Concerning saproxylic beetles, seven species present in its territory have to be monitored: Lucanus cervus, Cerambyx cerdo, Morimus funereus, Rhysodes sulcatus, Cucujus cinnaberinus, Rosalia alpina and Osmoderma eremita complex. Out of these species, a monitoring programme has only been established for Lucanus cervus, which partially includes participation of non-experts. In 2015 and 2016, a public campaign was organised in order to collect observations of Lucanus cervus and two other saproxylic beetles that are easily recognisable by the public: Morimus funereus and Rosalia alpina. Data gathered through this campaign serve as an addition to the mapping activities and monitoring of the species’ range. So far, more than 650 citizen observations have been collected, providing data on species presence in 216 10×10 km2 grid cells intended for reporting on the species’ range. Besides the public campaign, since 2014, public institutions for managing nature protected values have been involved in population monitoring for which they received education through several workshops. Altogether, 21 sites have been included in the monitoring of the stag beetle so far. Data collected for Lucanus cervus on standard transects, by tree and ground pitfall traps and tree trunk surveys at night will be discussed. To the present time, eight public institutions have been involved in stag beetle population monitoring and the number has been continuously increasing.

  20. A survey of carrion beetles on Seier National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Seier National Wildlife Refuge personnel conducted an inventory of flora and fauna found on the Refuge in 2011. The federally endangered American burying beetle...

  1. Pheromone Chemistry of the Smaller European Elm Bark Beetle.

    Science.gov (United States)

    Beck, Keith

    1978-01-01

    Discusses the aggregation pheromone of the smaller European elm bark beetle, Scolytus multistriatus (Marsham), with emphasis on information that could be used in the classroom as a practical application of organic chemistry. (Author/GA)

  2. Physiological benefits of nectar-feeding by a predatory beetle

    Science.gov (United States)

    Extrafloral nectar is an important food source for many animals, including predatory lady beetles (Coleoptera: Coccinellidae), although the physiological benefits of nectar consumption are poorly understood for most consumers. Under laboratory conditions, we confined new females of Coleomegilla macu...

  3. The artificial beetle, or a brief manifesto for engineered biomimicry

    Science.gov (United States)

    Bartl, Michael H.; Lakhtakia, Akhlesh

    2015-03-01

    The artificial beetle is possibly the Holy Grail for practitioners of engineered biomimicry. An artificial beetle could gather and relay data and images from compromised environments on earth and other planets to decision makers. It could also be used for surveillance of foes and friends alike, and will require ethical foresight and oversight. What would it take to develop an artificial beetle? Several biotemplating techniques can be harnessed for the replication of external structural features of beetle bodies, and thus preserve functionalities such as coloration of the exoskeleton and the hydrophobicity of wings. The body cavity must host a power supply, motors to move the wings for flight, sensors to capture ambient conditions and images, and data transmitters and receivers to communicate with a remote command center. All of these devices must be very small and reliable.

  4. Mechanical properties of the beetle elytron, a biological composite material

    Science.gov (United States)

    We determined the relationship between composition and mechanical properties of elytral (modified forewing) cuticle of the beetles Tribolium castaneum and Tenebrio molitor. Elytra of both species have similar mechanical properties at comparable stages of maturation (tanning). Shortly after adult ecl...

  5. Untwisting the polarization properties of light reflected by scarab beetles

    Science.gov (United States)

    McDonald, Luke T.; Finlayson, Ewan D.; Vukusic, Peter

    2015-03-01

    The spectral and angle-dependent optical properties of two scarab beetle species belonging to the genus Chrysina are presented. The species display broadband reflectivity and selectively reflect left-circularly polarized light. We use electron microscopy to detail the left-handed, twisted lamellar structure present in these biological systems and imaging scatterometry to characterize their bidirectional reflectance distribution function. We show that the broadband nature of the beetles' reflectance originates due to the range of pitch dimensions found in the structure.

  6. Defense by foot adhesion in a beetle (Hemisphaerota cyanea)

    OpenAIRE

    Eisner, Thomas; Aneshansley, Daniel J.

    2000-01-01

    The beetle Hemisphaerota cyanea (Chrysomelidae; Cassidinae) responds to disturbance by activating a tarsal adhesion mechanism by which it secures a hold on the substrate. Its tarsi are oversized and collectively bear some 60,000 adhesive bristles, each with two terminal pads. While walking, the beetle commits but a small fraction of the bristles to contact with the substrate. But when assaulted, it presses its tarsi flatly down, thereby touching ground with all or nearly all of the bristles. ...

  7. Pulpability of beetle-killed spruce. Forest Service research paper

    Energy Technology Data Exchange (ETDEWEB)

    Scott, G.M.; Bormett, D.W.; Sutherland, N.R.; Abubakr, S.; Lowell, E.

    1996-08-01

    Infestation of the Dendroctonus rufipennis beetle has resulted in large stands of dead and dying timber on the Kenai Peninsula in Alaska. Tests were conducted to evaluate the value of beetle-killed spruce as pulpwood. The results showed that live and dead spruce wood can be pulped effectively. The two least deteriorated classes and the most deteriorated class of logs had similar characteristics when pulped; the remaining class had somewhat poorer pulpability.

  8. Medically important beetles (insecta: coleoptera of Iran

    Directory of Open Access Journals (Sweden)

    MR Nikbakhtzadeh

    2008-01-01

    Full Text Available This study focused on coleopteran species that are responsible for the emergence of recent cases of dermatological manifestations in Iran. To the best of our knowledge, five species of the family Meloidae and nine species of the genus Paederus are by far the only beetles recognized as medically important in Iran. The staphylinids consists of Paederus ilsae, P. iliensis, P. fuscipes, P. kalalovae, P. balcanicus, P. lenkoranus, P. littoralis, P. carpathicus, P. nigricornis, while the meloids are Mylabris impressa, M. guerini, Muzimes iranicus, Alosimus smyrnensis and Epicauta sharpi. Most cases of linear dermatitis in this country occur in areas bordering the Caspian Sea. This problem is caused by beetles of the genus Paederus which are present as adults from mid-April to October with particularly high incidences from May to August. Fars (in southern Iran ranks second in number of cases of insect-induced dermatitis. The third major region in which this type of dermatitis has been recorded is Hamedan Province, in the west of the country. Meloid dermatitis showed its highest severity in 2001, when a considerable number of patients sought medical help in Toyserkan and Nahavand counties. New cases of skin blistering were reported along the Persian Gulf coast and the agent was identified as Epicauta sharpi (Coleoptera: Meloidae. In all these regions, it was observed that recorded cases of lesions coincided precisely with the yearly peaks of the beetles. Paederus fuscipes and P. kalalovae are the predominant species along the Caspian Sea shore. It appears that P. fuscipes is homogeneously distributed throughout the Caspian Sea region while the distribution of the other species is more irregular. Paederus fuscipes is probably the major agent that causes linear dermatitis in northern Iran. Whereas this disease is a rural difficulty in the south, mainly in villages or small towns, it is an urban problem in northern provinces along the Caspian Sea shore

  9. Spectral information as an orientation cue in dung beetles

    Science.gov (United States)

    el Jundi, Basil; Foster, James J.; Byrne, Marcus J.; Baird, Emily; Dacke, Marie

    2015-01-01

    During the day, a non-uniform distribution of long and short wavelength light generates a colour gradient across the sky. This gradient could be used as a compass cue, particularly by animals such as dung beetles that rely primarily on celestial cues for orientation. Here, we tested if dung beetles can use spectral cues for orientation by presenting them with monochromatic (green and UV) light spots in an indoor arena. Beetles kept their original bearing when presented with a single light cue, green or UV, or when presented with both light cues set 180° apart. When either the UV or the green light was turned off after the beetles had set their bearing in the presence of both cues, they were still able to maintain their original bearing to the remaining light. However, if the beetles were presented with two identical green light spots set 180° apart, their ability to maintain their original bearing was impaired. In summary, our data show that ball-rolling beetles could potentially use the celestial chromatic gradient as a reference for orientation. PMID:26538537

  10. Fungal associates of the lodgepole pine beetle, Dendroctonus murrayanae.

    Science.gov (United States)

    Six, Diana L; de Beer, Z Wilhelm; Duong, Tuan A; Carroll, Allan L; Wingfield, Michael J

    2011-08-01

    Bark beetles are well known vectors of ophiostomatoid fungi including species of Ophiostoma, Grosmannia and Ceratocystis. In this study, the most common ophiostomatoid fungi associated with the lodgepole pine beetle, Dendroctonus murrayanae, were characterized. Pre-emergent and post-attack adult beetles were collected from lodgepole pines at four sites in British Columbia, Canada. Fungi were isolated from these beetles and identified using a combination of morphology and DNA sequence comparisons of five gene regions. In all four populations, Grosmannia aurea was the most common associate (74-100% of all beetles) followed closely by Ophiostoma abietinum (29-75%). Other fungi isolated, in order of their relative prevalence with individual beetles were an undescribed Leptographium sp. (0-13%), Ophiostoma ips (0-15%), Ophiostoma piliferum (0-11%), a Pesotum sp. (0-11%) and Ophiostoma floccosum (0-1%). Comparisons of the DNA sequences of Leptographium strains isolated in this study, with ex-type isolates of G. aurea, Grosmannia robusta, Leptographium longiclavatum, and Leptographium terebrantis, as well as with sequences from GenBank, revealed a novel lineage within the Grosmannia clavigera complex. This lineage included some of the D. murrayane isolates as well as several isolates from previous studies referred to as L. terebrantis. However, the monophyly of this lineage is not well supported and a more comprehensive study will be needed to resolve its taxonomic status as one or more novel taxa.

  11. Prey preference and host suitability of the predatory and parasitoid carabid beetle, Lebia grandis, for several species of Leptinotarsa beetles

    OpenAIRE

    Donald C. Weber; Rowley, Daniel L.; Greenstone, Matthew H.; Athanas, Michael M.

    2006-01-01

    Lebia grandis (Coleoptera: Carabidae), recorded as a parasitoid only on Colorado potato beetle, Leptinotarsa decemlineata (Coleoptera: Chrysomelidae), is capable of parasitizing the false potato beetle, L. juncta, and also L. haldemani. Historical records show that L. decemlineata, while the only recorded host, was not present in much of the original range of L. grandis, and may not have been its host prior to its expansion into eastern North America, where L. juncta is endemic. Our laborator...

  12. Non-blind Data hiding for RGB images using DCT-based fusion and H.264 compression concepts

    Directory of Open Access Journals (Sweden)

    Safwat Hamad

    Full Text Available Steganography is the field of research that provides innovative solutions to the problem of secure data communication. In this paper, a non-blind data hiding technique is proposed which is based on data fusion between both the cover and the secret images. ...

  13. Sex chromosome rearrangements in Polyphaga beetles.

    Science.gov (United States)

    Dutrillaux, A M; Dutrillaux, B

    2009-01-01

    The presence of a parachute sex chromosome bivalent (Xyp) at metaphase I of male meiosis is a well-known characteristic of Coleoptera, present in almost all families of this order and assumed to represent their ancestral sex chromosome formula. Sex chromosomes appear to be manifold more frequently involved in inter-chromosomal rearrangements than the average of the nine autosomal pairs usually forming their karyotype. This leads to various formulae such as neo-sex, multiple sex and perhaps unique sex chromosomes. These rearrangements alter the intimate association between sex chromosomes and nucleolar proteins, which are usual components of the Xyp. Different situations, selected in a series of 125 mitotic and meiotic cytogenetic studies of Polyphaga beetle species, are reported and discussed, with the aim to improve our knowledge on the mechanisms of sex chromosome rearrangements, the relationships with nucleoli and the consequences on dosage compensation and chromosome segregation.

  14. Intraguild predation and native lady beetle decline.

    Directory of Open Access Journals (Sweden)

    Mary M Gardiner

    Full Text Available Coccinellid communities across North America have experienced significant changes in recent decades, with declines in several native species reported. One potential mechanism for these declines is interference competition via intraguild predation; specifically, increased predation of native coccinellid eggs and larvae following the introduction of exotic coccinellids. Our previous studies have shown that agricultural fields in Michigan support a higher diversity and abundance of exotic coccinellids than similar fields in Iowa, and that the landscape surrounding agricultural fields across the north central U.S. influences the abundance and activity of coccinellid species. The goal of this study was to quantify the amount of egg predation experienced by a native coccinellid within Michigan and Iowa soybean fields and explore the influence of local and large-scale landscape structure. Using the native lady beetle Coleomegilla maculata as a model, we found that sentinel egg masses were subject to intense predation within both Michigan and Iowa soybean fields, with 60.7% of egg masses attacked and 43.0% of available eggs consumed within 48 h. In Michigan, the exotic coccinellids Coccinella septempunctata and Harmonia axyridis were the most abundant predators found in soybean fields whereas in Iowa, native species including C. maculata, Hippodamia parenthesis and the soft-winged flower beetle Collops nigriceps dominated the predator community. Predator abundance was greater in soybean fields within diverse landscapes, yet variation in predator numbers did not influence the intensity of egg predation observed. In contrast, the strongest predictor of native coccinellid egg predation was the composition of edge habitats bordering specific fields. Field sites surrounded by semi-natural habitats including forests, restored prairies, old fields, and pasturelands experienced greater egg predation than fields surrounded by other croplands. This study shows

  15. Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding.

    Science.gov (United States)

    Mehra, Isha; Nishchal, Naveen K

    2014-03-10

    Image fusion is a popular method which provides better quality fused image for interpreting the image data. In this paper, color image fusion using wavelet transform is applied for securing data through asymmetric encryption scheme and image hiding. The components of a color image corresponding to different wavelengths (red, green, and blue) are fused together using discrete wavelet transform for obtaining a better quality retrieved color image. The fused color components are encrypted using amplitude- and phase-truncation approach in Fresnel transform domain. Also, the individual color components are transformed into different cover images in order to result disguising information of input image to an attacker. Asymmetric keys, Fresnel propagation parameters, weighing factor, and three cover images provide enlarged key space and hence enhanced security. Computer simulation results support the idea of the proposed fused color image encryption scheme.

  16. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach

    Directory of Open Access Journals (Sweden)

    A.A. Mohamed

    2014-07-01

    Full Text Available Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography is a difficult problem to solve. In this paper, we proposed a new promised steganographic algorithm for Arabic text based on features of Arabic text. The focus is on more secure algorithm and high capacity of the carrier. Our extensive experiments using the proposed algorithm resulted in a high capacity of the carrier media. The embedding capacity rate ratio of the proposed algorithm is high. In addition, our algorithm can resist traditional attacking methods since it makes the changes in carrier text as minimum as possible.

  17. ENTROPY BASED DATA HIDING ON DOCUMENT IMAGES APPLIED ON DRDM APPROACH

    Directory of Open Access Journals (Sweden)

    Sadia Aslam

    2013-03-01

    Full Text Available This paper presents a data hiding application for document images providing security. Document images should be in bitmap format as well as grayscale in nature otherwise the developed system will automatically change it to grayscale. The system accepts any grayscale document image as an input and applies the developed technique on it. Developed technique is based on Entropy Based that selects the suitable areas in an image for that data insertion purpose. Output produced by the system is the processed document that is data embedded. Processed document should not look different from the original image means its visual quality should be high. The system is successfully tested for the test cases generated to check the effectiveness, quality and validation of the system. The system is developed using Matlab 7.7.0 (R2008b for the development of front end as well as the back end.

  18. Costly hide and seek pays: Unexpected consequences of deceit in a social dilemma

    CERN Document Server

    Szolnoki, Attila

    2014-01-01

    Deliberate deceptiveness intended to gain an advantage is commonplace in human and animal societies. In a social dilemma, an individual may only pretend to be a cooperator to elicit cooperation from others, while in reality he is a defector. With this as motivation, we study a simple variant of the evolutionary prisoner's dilemma game entailing deceitful defectors and conditional cooperators that lifts the veil on the impact of such two-faced behavior. Defectors are able to hide their true intentions at a personal cost, while conditional cooperators are probabilistically successful at identifying defectors and act accordingly. By focusing on the evolutionary outcomes in structured populations, we observe a number of unexpected and counterintuitive phenomena. We show that deceitful behavior may fare better if it is costly, and that a higher success rate of identifying defectors does not necessarily favor cooperative behavior. These results are rooted in the spontaneous emergence of cycling dominance and spatia...

  19. HIDES spectroscopy of bright detached eclipsing binaries from the $Kepler$ field - I. Single-lined objects

    CERN Document Server

    Hełminiak, K G; Kambe, E; Kozłowski, S K; Sybilski, P; Ratajczak, M; Maehara, H; Konacki, M

    2016-01-01

    We present results of our spectroscopic observations of nine detached eclipsing binaries (DEBs), selected from the $Kepler$ Eclipsing Binary Catalog, that only show one set of spectral lines. Radial velocities (RVs) were calculated from the high resolution spectra obtained with the HIDES instrument, attached to the 1.88-m telescope at the Okayama Astrophysical Observatory, and from the public APOGEE archive. In our sample we found five single-lined binaries, with one component dominating the spectrum. The orbital and light curve solutions were found for four of them, and compared with isochrones, in order to estimate absolute physical parameters and evolutionary status of the components. For the fifth case we only update the orbital parameters, and estimate the properties of the unseen star. Two other systems show orbital motion with a period known from the eclipse timing variations (ETVs). For these we obtained parameters of outer orbits, by translating the ETVs to RVs of the centre of mass of the eclipsing ...

  20. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  1. An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security

    CERN Document Server

    Farouk, Hala A

    2011-01-01

    The hybrid hiding encryption algorithm, as its name implies, embraces concepts from both steganography and cryptography. In this exertion, an improved micro-architecture Field Programmable Gate Array (FPGA) implementation of this algorithm is presented. This design overcomes the observed limitations of a previously-designed micro-architecture. These observed limitations are: no exploitation of the possibility of parallel bit replacement, and the fact that the input plaintext was encrypted serially, which caused a dependency between the throughput and the nature of the used secret key. This dependency can be viewed by some as vulnerability in the security of the implemented micro-architecture. The proposed modified micro-architecture is constructed using five basic modules. These modules are; the message cache, the message alignment module, the key cache, the comparator, and at last the encryption module. In this work, we provide comprehensive simulation and implementation results. These are: the timing diagra...

  2. Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem

    CERN Document Server

    Kabetta, Herman; Suyoto,

    2012-01-01

    In many recent years, the programming world has been introduced about a new programming language for designing websites, it is CSS that can be be used together with HTML to develop a web interface. And now, these two programming languages as if inseparably from each other. As a client-side scripting, CSS is visible by all users as the original script, but it can not be granted changed. Website is a tool of information disseminator throughout the world, this is certainly can be used to a secret communication by using CSS as a message hider. This paper proposed a new scheme using web tools like CSS for hiding informations. This is a secret communication mechanism using text steganography techniques that is embedded messages on CSS files and is further encrypted using RSA as a public key cryptographic algorithm.

  3. Perfectly secure steganography: Hiding information in the quantum noise of a photograph

    Science.gov (United States)

    Sanguinetti, Bruno; Traverso, Giulia; Lavoie, Jonathan; Martin, Anthony; Zbinden, Hugo

    2016-01-01

    We show that it is possible to hide information perfectly within a photograph. The proposed protocol works by selecting each pixel value from two images that differ only by shot noise. Pixel values are never modified, but only selected, making the resulting stego image provably indistinguishable from an untampered image, and the protocol provably secure. We demonstrate that a perfect steganographic protocol is also a perfectly secure cryptographic protocol, and therefore has at least the same requirements: a truly random key as long as the message. In our system, we use a second image as the key, satisfying length requirements, and the randomness is provided by the naturally occurring quantum noise which is dominant in images taken with modern sensors. We conclude that, given a photograph, it is impossible to tell whether it contains any hidden information.

  4. Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload

    Directory of Open Access Journals (Sweden)

    Zhaoxia Yin

    2014-01-01

    Full Text Available This paper proposes a separable reversible data-hiding scheme in encrypted image which offers high payload and error-free data extraction. The cover image is partitioned into nonoverlapping blocks and multigranularity encryption is applied to obtain the encrypted image. The data hider preprocesses the encrypted image and randomly selects two basic pixels in each block to estimate the block smoothness and indicate peak points. Additional data are embedded into blocks in the sorted order of block smoothness by using local histogram shifting under the guidance of the peak points. At the receiver side, image decryption and data extraction are separable and can be free to choose. Compared to previous approaches, the proposed method is simpler in calculation while offering better performance: larger payload, better embedding quality, and error-free data extraction, as well as image recovery.

  5. A GA-Based Approach to Hide Sensitive High Utility Itemsets

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. A flexible evaluation function with three factors is designed in the proposed approach to evaluate whether the processed transactions are required to be inserted. Three different weights are, respectively, assigned to the three factors according to users. Moreover, the downward closure property and the prelarge concept are adopted in the proposed approach to reduce the cost of rescanning database, thus speeding up the evaluation process of chromosomes.

  6. Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption

    Directory of Open Access Journals (Sweden)

    Harish G, Smitha Shekar B, Prajwal R, Sunil S Shetty

    2014-07-01

    Full Text Available Recently, more and more attention is paid to reversible data hiding (RDH in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may subject to some errors on data extraction and/or image restoration. Here, a novel method is proposed so as to reserve room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, i.e., data extraction and image recovery are free of any error.

  7. Block Based Information Hiding using Cosine, Hartley, Walsh and Haar Wavelets

    Directory of Open Access Journals (Sweden)

    H. B. Ke kre

    2013-04-01

    Full Text Available Steganography is the art of hiding informationwithin other information in such a way that it ishard or even impossible to tell that it is there. Thereare many different carriers for steganography butthe most popular is digital images. Typically, themessage is embedded within another image knownas a cover image, by tweaking its properties. Theresulting output, known as astego-image isengineered such that it is a near identicalperceptual model of the cover image, but it will alsocontain the hiddenmessage.It is this stego-imagethat is sent between the sender and the receiver.Steganography is a science for invisiblecommunication and play vital role on the networksecurity.To improve the embedding capacity as wellas to have minimum distortion tocarrier media, we

  8. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  9. Optical image hiding based on dual-channel simultaneous phase-shifting interferometry and compressive sensing

    Science.gov (United States)

    Li, Jiaosheng; Zhong, Liyun; Zhang, Qinnan; Zhou, Yunfei; Xiong, Jiaxiang; Tian, Jindong; Lu, Xiaoxu

    2017-01-01

    We propose an optical image hiding method based on dual-channel simultaneous phase-shifting interferometry (DCSPSI) and compressive sensing (CS) in all-optical domain. In the DCSPSI architecture, a secret image is firstly embedded in the host image without destroying the original host's form, and a pair of interferograms with the phase shifts of π/2 is simultaneously generated by the polarization components and captured by two CCDs. Then, the holograms are further compressed sampling to the less data by CS. The proposed strategy will provide a useful solution for the real-time optical image security transmission and largely reducing data volume of interferogram. The experimental result demonstrates the validity and feasibility of the proposed method.

  10. A New Method for Text Hiding in the Image by Using LSB

    Directory of Open Access Journals (Sweden)

    Reza tavoli

    2016-04-01

    Full Text Available an important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data-hiding science which aims to reach a desirable level of security in the exchange of private military and commercial data which is not clear. These approaches can be used as complementary methods of encryption in the exchange of private data.

  11. Alien invasions and the game of hide and seek in Patagonia.

    Directory of Open Access Journals (Sweden)

    Martin Lindegren

    Full Text Available The introduction, establishment and spread of alien species is a major threat to biodiversity and the provision of ecosystem services for human wellbeing. In order to reduce further loss of biodiversity and maintain productive and sustainable ecosystems, understanding the ecological mechanisms underlying species invasions and avoiding potentially harmful effects on native communities is urgently needed, but largely lacking. We here demonstrate, by means of hydroacoustics and advanced spatial modelling, how native fish species as a result of previous exposure to native predators may successfully respond to invasive novel predators through a complicated game of hide and seek, minimizing spatio-temporal overlap with predators, and potentially facilitating coexistence between native prey species (Galaxiids and introduced novel predators (Salmonids in a deep Andean lake, Patagonia.

  12. Study of information hiding algorithm based on GHM and color transfer theory

    Institute of Scientific and Technical Information of China (English)

    REN Shuai; MU De-jun; ZHANG Tao; HU Wei

    2009-01-01

    Taking the feature that the energy of the image would gather and spread on four components (LL2, LH2, HL2 and HH2) in the sub-image atfer first-order GHM multi-wavelet-transform. And by using the color control ability oflαβ color space in color transfer theory (CTT), an information hiding algorithm based on GHM-CTT is proposed. In this way, the robust parameters are embedded in the LL2, the hidden information is set in LH2 and HL2 with RAID4, and fragile sign is set in HH2. The consistence between the embedded data bits' order and the embedded code of the sub-image is improved by using the chaotic mapping and the genetic algorithm. Experimental results indicate that the GHM-CTT can increase the imperceptibility by 15.72% averagely and robustness by 18.89% at least.

  13. Oviposition by small hive beetles elicits hygienic responses from Cape honeybees.

    Science.gov (United States)

    Ellis, J D; Richards, C S; Hepburn, H R; Elzen, P J

    2003-11-01

    Two novel behaviours, both adaptations of small hive beetles ( Aethina tumida Murray) and Cape honeybees ( Apis mellifera capensis Esch.), are described. Beetles puncture the sides of empty cells and oviposit under the pupae in adjoining cells. However, bees detect this ruse and remove infested brood (hygienic behaviour), even under such well-disguised conditions. Indeed, bees removed 91% of treatment brood (brood cells with punctured walls caused by beetles) but only 2% of control brood (brood not exposed to beetles). Only 91% of treatment brood actually contained beetle eggs; the data therefore suggest that bees remove only that brood containing beetle eggs and leave uninfected brood alone, even if beetles have accessed (but not oviposited on) the brood. Although this unique oviposition strategy by beetles appears both elusive and adaptive, Cape honeybees are able to detect and remove virtually all of the infested brood.

  14. Biology, Behavior, and Management of Ambrosia Beetles Attacking Ornamental Nursery Stock

    Science.gov (United States)

    Ambrosia beetles are being increasingly recognized as significant pests of field-grown ornamental nursery stock. Two species are especially problematic in ornamental nurseries, namely the black stem borer, Xylosandrus germanus, and the granulate ambrosia beetle, Xylosandrus crassiusculus. Ambrosia b...

  15. Status Report for South Dakota Refuges: American Burying Beetle Searches, 1995

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This memo describes the efforts made throughout South Dakota attempting to locate American Burying Beetles. No beetles were found, but plans for a 1996 involve a...

  16. 2004 American Burying Beetle Annual Report - Pond Creek National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Survey efforts for the endangered American Burying Beetle at Pond Creek NWR in 2004 are reported from 14 sampling locations on the refuge. American buring beetle was...

  17. Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes

    Directory of Open Access Journals (Sweden)

    Divya Ann Luke

    2014-06-01

    Full Text Available The wireless networks are more sensitive to the Denial-of-Service (DoS attacks. The existing system is based on Spread Spectrum (SS. This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. The main attack present in the wireless network is the selective jamming attack. This type of attack mainly focuses a single node termed as target node. Attacker always tries to block the message sent by the target node. This leads to the Denial-of-Service attack. We are proposing a new method to prevent the selective jamming attack in an internalthreat model. A wormhole is used, which will generate an alarm to indicate the presence of jammer and sent IP address of jammer node to all other nodes in the network. Using a method called packet hiding, we can send message through the network even though a jammer is present. This method is based on the technique called Strong Hiding Commitment Scheme (SHCS. Here, the access point in a network region becomes the wormhole whenever it finds out any node that violates the rules in a particular network region. That node is then considered as a jammer node. The wormhole send s IP address of jammer to all other nodes. Wormhole then prevents the jamming activity of the jammer by encrypting the source ID of message along with the message packet.So that the jammer is unable to identify its target node and the source can forward its message safely through jammer node itself

  18. Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function

    Directory of Open Access Journals (Sweden)

    Najme Maleki

    2014-07-01

    Full Text Available This paper presents two adaptive and non-adaptive data hiding methods for grayscale images based on modulus function. Our adaptive scheme is based on the concept of human vision sensitivity, so the pixels in edge areas than to smooth areas can tolerate much more changes without making visible distortion for human eyes. In our adaptive scheme, the average differencing value of four neighborhood pixels into a block via a threshold secret key determines whether current block is located in edge or smooth area. Pixels in the edge areas are embedded by Q-bit of secret data with a larger value of Q than that of pixels placed in smooth areas. Also in this scholar, we represent one non-adaptive data hiding algorithm. Our non-adaptive scheme, via an error reduction procedure, produces a high visual quality for stego-image. The proposed schemes present several advantages. 1-of aspects the embedding capacity and visual quality of stego-image are scalable. In other words, the embedding rate as well as the image quality can be scaled for practical applications 2-the high embedding capacity with minimal visual distortion can be achieved, 3-our methods require little memory space for secret data embedding and extracting phases, 4-secret keys have used to protect of the embedded secret data. Thus, level of security is high, 5-the problem of overflow or underflow does not occur. Experimental results indicated that the proposed adaptive scheme significantly is superior to the currently existing scheme, in terms of stego-image visual quality, embedding capacity and level of security and also our non-adaptive method is better than other non-adaptive methods, in view of stego-image quality. Results show which our adaptive algorithm can resist against the RS steganalysis attack.

  19. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    Science.gov (United States)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Ding, Qing-Yan; Zhang, Shu-Hui

    2016-06-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. Supported by the National Natural Science Foundation of China under Grant Nos. 61572297, 61303199, 61272514, and 61373131, the Shandong Provincial Natural Science Foundation of China under Grant Nos. ZR2013FM025, ZR2013FQ001, ZR2014FM003, and ZY2015YL018, the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China under Grant Nos. BS2015DX006 and BS2014DX007, the National Development Foundation for Cryptological Research, China under Grant No. MMJJ201401012, the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Funds, and the Shandong Academy of Sciences Youth Fund Project, China under Grant Nos. 2015QN003 and 2013QN007

  20. Hiding a Heavy Higgs Boson at the 7 TeV LHC

    Energy Technology Data Exchange (ETDEWEB)

    Bai, Yang; Fan, JiJi; Hewett, JoAnne L.

    2012-03-20

    A heavy Standard Model Higgs boson is not only disfavored by electroweak precision observables but is also excluded by direct searches at the 7 TeV LHC for a wide range of masses. Here, we examine scenarios where a heavy Higgs boson can be made consistent with both the indirect constraints and the direct null searches by adding only one new particle beyond the Standard Model. This new particle should be a weak multiplet in order to have additional contributions to the oblique parameters. If it is a color singlet, we find that a heavy Higgs with an intermediate mass of 200-300 GeV can decay into the new states, suppressing the branching ratios for the standard model modes, and thus hiding a heavy Higgs at the LHC. If the new particle is also charged under QCD, the Higgs production cross section from gluon fusion can be reduced significantly due to the new colored particle one-loop contribution. Current collider constraints on the new particles allow for viable parameter space to exist in order to hide a heavy Higgs boson. We categorize the general signatures of these new particles, identify favored regions of their parameter space and point out that discovering or excluding them at the LHC can provide important indirect information for a heavy Higgs. Finally, for a very heavy Higgs boson, beyond the search limit at the 7 TeV LHC, we discuss three additional scenarios where models would be consistent with electroweak precision tests: including an additional vector-like fermion mixing with the top quark, adding another U(1) gauge boson and modifying triple-gauge boson couplings.

  1. 通信信息隐藏技术研究%A Research on Communication Information Hiding Technologies

    Institute of Scientific and Technical Information of China (English)

    张松; 冯祺

    2016-01-01

    网络的技术的迅速发展使得通信信息的传输变得更加快捷、方便,与此同时,也为攻击者截获通信信息带来了便利,通信的安全和隐蔽成为一个亟需解决的问题。信息隐藏技术为保证通信的隐蔽性提供了一种新的思路。论文对信息隐藏技术进行分类介绍,给出了信息隐藏技术的模型和基本特征,并分析了信息隐藏技术与隐藏分析技术和密码学之间的关系,最后给出了总结与展望。%The rapid development of network technology enables the transmission of communication information to be ‐come faster and more convenient ,at the same time ,it also makes it easier for attackers to intercept communication informa‐tion .Security and covert communication has become an urgent problem ,information hiding technology provides a new way of thinking to ensure the covert communication .This paper describes the classification of information hiding technology ,and gives the model and the basic characteristics of information hiding ,and analyzes the relationship between information hiding and steganalysis as well as the relationship between information hiding and cryptography ,finally ,gives the summary and outlook future development .

  2. Population Status of Blister Beetle during Monsoon in Victoria Park Reserved Forest, Bhavnagar, Gujarat

    OpenAIRE

    B. M. Gohil; Devendra Solanki

    2013-01-01

    The Blister Beetles are widely distributed in the world. They have serious impacts, whether agronomic, veterinary or medical. The present investigation was carried out to know about population scenario of Blister Beetle in a reserve forest. Blister Beetle has special affinity to some plant species in particular season due to availability of food. In present study density of Blister Beetle was checked in form of density and its affinity towards plant Abutilon theophrastic was measured by RPE i...

  3. Distance and sex determine host plant choice by herbivorous beetles.

    Directory of Open Access Journals (Sweden)

    Daniel J Ballhorn

    Full Text Available BACKGROUND: Plants respond to herbivore damage with the release of volatile organic compounds (VOCs. This indirect defense can cause ecological costs when herbivores themselves use VOCs as cues to localize suitable host plants. Can VOCs reliably indicate food plant quality to herbivores? METHODOLOGY: We determined the choice behavior of herbivorous beetles (Chrysomelidae: Gynandrobrotica guerreroensis and Cerotoma ruficornis when facing lima bean plants (Fabaceae: Phaseolus lunatus with different cyanogenic potential, which is an important constitutive direct defense. Expression of inducible indirect defenses was experimentally manipulated by jasmonic acid treatment at different concentrations. The long-distance responses of male and female beetles to the resulting induced plant volatiles were investigated in olfactometer and free-flight experiments and compared to the short-distance decisions of the same beetles in feeding trials. CONCLUSION: Female beetles of both species were repelled by VOCs released from all induced plants independent of the level of induction. In contrast, male beetles were repelled by strongly induced plants, showed no significant differences in choice behavior towards moderately induced plants, but responded positively to VOCs released from little induced plants. Thus, beetle sex and plant VOCs had a significant effect on host searching behavior. By contrast, feeding behavior of both sexes was strongly determined by the cyanogenic potential of leaves, although females again responded more sensitively than males. Apparently, VOCs mainly provide information to these beetles that are not directly related to food quality. Being induced by herbivory and involved in indirect plant defense, such VOCs might indicate the presence of competitors and predators to herbivores. We conclude that plant quality as a food source and finding a potentially enemy-free space is more important for female than for male insect herbivores

  4. Salmonella recovery from broilers and litter following gavage with Salmonella colonized darkling beetles and larvae.

    Science.gov (United States)

    Transmission of Salmonella to broiler chicks with Salmonella colonized darkling beetles or larvae was evaluated by sampling litter and ceca during growout. In two trials, 1 or 2 day-of-hatch broiler chicks (in a pen of 40) were gavaged with either 4 darkling beetles, 4 beetle larvae, or 0.1 mL pept...

  5. Mountain pine beetle attack in ponderosa pine: Comparing methods for rating susceptibility

    Science.gov (United States)

    David C. Chojnacky; Barbara J. Bentz; Jesse A. Logan

    2000-01-01

    Two empirical methods for rating susceptibility of mountain pine beetle attack in ponderosa pine were evaluated. The methods were compared to stand data modeled to objectively rate each sampled stand for susceptibly to bark-beetle attack. Data on bark-beetle attacks, from a survey of 45 sites throughout the Colorado Plateau, were modeled using logistic regression to...

  6. Mountain pine beetle population sampling: inferences from Lindgren pheromone traps and tree emergence cages

    Science.gov (United States)

    Barbara J. Bentz

    2006-01-01

    Lindgren pheromone traps baited with a mountain pine beetle (Dendroctonus ponderosae Hopkins (Coleoptera: Curculionidae, Scolytinae)) lure were deployed for three consecutive years in lodgepole pine stands in central Idaho. Mountain pine beetle emergence was also monitored each year using cages on infested trees. Distributions of beetles caught in...

  7. Losses of red-cockaded woodpecker cavity trees to southern pine beetles

    Science.gov (United States)

    Richard N. Conner; D. Craig Rudolph

    1995-01-01

    Over an 1 l-year period (1983-1993), we examined the southern pine beetle (Dendroctonus frontalis) infestation rate of single Red-cockaded Woodpecker (Picoides borealis) cavity trees on the Angelina National Forest in Texas. Southern pine beetles infested and killed 38 cavity trees during this period. Typically, within each cavity tree cluster, beetles infested only...

  8. 7 CFR 301.48-6 - Movement of live Japanese beetles.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Movement of live Japanese beetles. 301.48-6 Section... INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE DOMESTIC QUARANTINE NOTICES Japanese Beetle Quarantine and Regulations § 301.48-6 Movement of live Japanese beetles. Regulations requiring a permit for and...

  9. Olfaction in the Colorado beetle at the onset of host plant selection

    NARCIS (Netherlands)

    Visser, J.H.

    1979-01-01

    Long-range olfactory orientation of the adult Colorado beetle was studied in a low- speed wind tunnel. The odour of fully grown potato plants elicits an upwind locomotory response in Colorado beetles (odour-conditioned positive anemotaxis), and increases the beetles' speed of locomotion (direct chem

  10. Direction of interaction between mountain pine beetle (Dendroctonus ponderosae) and resource-sharing wood-boring beetles depends on plant parasite infection.

    Science.gov (United States)

    Klutsch, Jennifer G; Najar, Ahmed; Cale, Jonathan A; Erbilgin, Nadir

    2016-09-01

    Plant pathogens can have cascading consequences on insect herbivores, though whether they alter competition among resource-sharing insect herbivores is unknown. We experimentally tested whether the infection of a plant pathogen, the parasitic plant dwarf mistletoe (Arceuthobium americanum), on jack pine (Pinus banksiana) altered the competitive interactions among two groups of beetles sharing the same resources: wood-boring beetles (Coleoptera: Cerambycidae) and the invasive mountain pine beetle (Dendroctonus ponderosae) (Coleoptera: Curculionidae). We were particularly interested in identifying potential mechanisms governing the direction of interactions (from competition to facilitation) between the two beetle groups. At the lowest and highest disease severity, wood-boring beetles increased their consumption rate relative to feeding levels at moderate severity. The performance (brood production and feeding) of mountain pine beetle was negatively associated with wood-boring beetle feeding and disease severity when they were reared separately. However, when both wood-boring beetles and high severity of plant pathogen infection occurred together, mountain pine beetle escaped from competition and improved its performance (increased brood production and feeding). Species-specific responses to changes in tree defense compounds and quality of resources (available phloem) were likely mechanisms driving this change of interactions between the two beetle groups. This is the first study demonstrating that a parasitic plant can be an important force in mediating competition among resource-sharing subcortical insect herbivores.

  11. DNA barcoding of Japanese click beetles (Coleoptera, Elateridae).

    Science.gov (United States)

    Oba, Yuichi; Ôhira, Hitoo; Murase, Yukio; Moriyama, Akihiko; Kumazawa, Yoshinori

    2015-01-01

    Click beetles (Coleoptera: Elateridae) represent one of the largest groups of beetle insects. Some click beetles in larval form, known as wireworms, are destructive agricultural pests. Morphological identification of click beetles is generally difficult and requires taxonomic expertise. This study reports on the DNA barcoding of Japanese click beetles to enable their rapid and accurate identification. We collected and assembled 762 cytochrome oxidase subunit I barcode sequences from 275 species, which cover approximately 75% of the common species found on the Japanese main island, Honshu. This barcode library also contains 20 out of the 21 potential pest species recorded in Japan. Our analysis shows that most morphologically identified species form distinct phylogenetic clusters separated from each other by large molecular distances. This supports the general usefulness of the DNA barcoding approach for quick and reliable identification of Japanese elaterid species for environmental impact assessment, agricultural pest control, and biodiversity analysis. On the other hand, the taxonomic boundary in dozens of species did not agree with the boundary of barcode index numbers (a criterion for sequence-based species delimitation). These findings urge taxonomic reinvestigation of these mismatched taxa.

  12. Defense by foot adhesion in a beetle (Hemisphaerota cyanea)

    Science.gov (United States)

    Eisner, Thomas; Aneshansley, Daniel J.

    2000-06-01

    Departments of * Neurobiology and Behavior and Agricultural and Biological Engineering, Cornell University, Ithaca, NY 14853 Contributed by Thomas Eisner, April 12, 2000 The beetle Hemisphaerota cyanea (Chrysomelidae; Cassidinae) responds to disturbance by activating a tarsal adhesion mechanism by which it secures a hold on the substrate. Its tarsi are oversized and collectively bear some 60,000 adhesive bristles, each with two terminal pads. While walking, the beetle commits but a small fraction of the bristles to contact with the substrate. But when assaulted, it presses its tarsi flatly down, thereby touching ground with all or nearly all of the bristles. Once so adhered, it can withstand pulling forces of up to 0.8 g (≈60 times its body mass) for 2 min, and of higher magnitudes, up to >3 g, for shorter periods. Adhesion is secured by a liquid, most probably an oil. By adhering, the beetle is able to thwart attacking ants, given that it is able to cling more persistently than the ant persists in its assault. One predator, the reduviid Arilus cristatus, is able to feed on the beetle, possibly because by injecting venom it prevents the beetle from maintaining its tarsal hold.

  13. Flow Visualization of Rhinoceros Beetle (Trypoxylus dichotomus) in Free Flight

    Institute of Scientific and Technical Information of China (English)

    Tien Van Truong; Tuyen Quang Le; Hieu Trung Tran; Hoon Cheol Park; Kwang Joon Yoon; Doyoung Byun

    2012-01-01

    Aerodynamic characteristics of the beetle,Trypoxylus dichotomus,which has a pair of elytra (forewings) and flexible hind wings,are investigated.Visualization experiments were conducted for various flight conditions of a beetle,Trypoxylus dichotomus:free,tethered,hovering,forward and climbing flights.Leading edge,trailing edge and tip vortices on both wings were observed clearly.The leading edge vortex was stable and remained on the top surface of the elytron for a wide interval during the downstroke of free forward flight.Hence,the elytron may have a considerable role in lift force generation of the beetle.In addition,we reveal a suction phenomenon between the gaps of the hind wing and the elytron in upstroke that may improve the positive lift force on the hind wing.We also found the reverse clap-fling mechanism of the T.dichotomus beetle in hovering flight.The hind wings touch together at the beginning of the upstroke.The vortex generation,shedding and interaction give a better understanding of the detailed aerodynamic mechanism of beetle flight.

  14. Coarse woody material has value as habitat for saproxylic beetles

    Energy Technology Data Exchange (ETDEWEB)

    Wood, C.M.; Spence, J.R. [Alberta Univ., Edmonton, AB (Canada). Dept of Renewable Resources; Langor, D.W. [Canadian Forest Service, Northern Forestry Centre, Edmonton, AB (Canada)

    2010-07-01

    Biomass harvesting practices are expected to alter the abundance and natural range of variation in coarse woody material (CWM), which in turn may change soil productivity as well as the hydrological balance and structure of tree stands and habitats needed to ensure forest biodiversity. Ecosystem sustainability should be a main criterion for the development of biomass energy production schemes. Studies in northern Europe indicate that the hyperdiverse saproxylic fauna is sensitive to changes in CWM. Saproxylic beetles are dependent on decaying wood, and play an important role in forest nutrient cycling. Approximately 11 per cent of European saproxylic beetles are at risk of regional extirpation. This study sampled saproxylic beetle species from CWM in mature trembling aspen stands in Alberta. Over 150 species were collected, including 4 species new to science. The study showed that the beetles use numerous CWM habitats and exhibit high habitat specificity. A diversity of CWM substrates are needed to maintain saproxylic beetle habitats. Further research is needed to minimize the loss of species and their ecosystem functions.

  15. Adult cannibalism in an oligophagous herbivore, the Colorado potato beetle.

    Science.gov (United States)

    Booth, Everett; Alyokhin, Andrei; Pinatti, Sarah

    2017-04-01

    Cannibalism, or intraspecific predation, can play a major role in changing individual fitness and population processes. In insects, cannibalism frequently occurs across life stages, with cannibals consuming a smaller or more vulnerable stage. Predation of adult insects on one another is considered to be uncommon. We investigated adult cannibalism in the Colorado potato beetle, Leptinotarsa decemlineata (Say), which is an oligophagous herbivore specializing on plants in family Solanaceae, and an important agricultural pest. Under laboratory conditions, starvation and crowding encouraged teneral adults to feed upon each other, which reduced their weight loss during the period of starvation. However, pupae were attacked and consumed before adults. Injured beetles had a higher probability of being cannibalized than intact beetles. Males were more frequently attacked than females, but that appeared to be a function of their smaller size rather than other gender-specific traits. Cannibalizing eggs at a larval stage did not affect beetle propensity to cannibalize adults at an adult stage. When given a choice between conspecific adults and mealworms, the beetles preferred to eat conspecifics. Cannibalistic behavior, including adult cannibalism, could be important for population persistence in this species. © 2015 Institute of Zoology, Chinese Academy of Sciences.

  16. Dung beetles use the Milky Way for orientation.

    Science.gov (United States)

    Dacke, Marie; Baird, Emily; Byrne, Marcus; Scholtz, Clarke H; Warrant, Eric J

    2013-02-18

    When the moon is absent from the night sky, stars remain as celestial visual cues. Nonetheless, only birds, seals, and humans are known to use stars for orientation. African ball-rolling dung beetles exploit the sun, the moon, and the celestial polarization pattern to move along straight paths, away from the intense competition at the dung pile. Even on clear moonless nights, many beetles still manage to orientate along straight paths. This led us to hypothesize that dung beetles exploit the starry sky for orientation, a feat that has, to our knowledge, never been demonstrated in an insect. Here, we show that dung beetles transport their dung balls along straight paths under a starlit sky but lose this ability under overcast conditions. In a planetarium, the beetles orientate equally well when rolling under a full starlit sky as when only the Milky Way is present. The use of this bidirectional celestial cue for orientation has been proposed for vertebrates, spiders, and insects, but never proven. This finding represents the first convincing demonstration for the use of the starry sky for orientation in insects and provides the first documented use of the Milky Way for orientation in the animal kingdom.

  17. Benzoquinones of the beetles, Tribolium castaneum and Tribolium confusum.

    Science.gov (United States)

    Pappas, P W; Morrison, S E

    1995-08-01

    Tribolium castaneum and T. confusum were washed in HPLC-grade methanol, and the methanolic washes were analyzed by UV spectroscopy, reversed phase HPLC, and GC/MS. The methanolic washes from both species contained methyl-1,4-benzoquinone (MBQ) and ethyl-1,4-benzoquinone (EBQ). The amounts of MBQ recovered from the two species were not significantly different, but the amounts of EBQ and total benzoquinones (MBQ+EBQ) recovered from T. castaneum were significantly greater than for those recovered from T. confusum. The methods described are superior to previous methods for isolating, identifying, and quantifying the benzoquinones in these beetles, since they are relatively simple, fast, do not require handling of the beetles, and are sensitive enough to quantify the benzoquinones of a single beetle.

  18. Observation and modeling of polarized light from scarab beetles

    Science.gov (United States)

    Lowrey, Sam; de Silva, Lakshman; Hodgkinson, Ian; Leader, John

    2007-08-01

    The light reflected from scarab beetles illuminated with unpolarized white light is analyzed ellipsometrically and displayed as the sum of an elliptically polarized spectrum Ip and an unpolarized spectrum Iu. A chirped stack of chiral resonators, each with a characteristic Bragg wavelength and partial realignment of birefringent material to a fixed axis, is proposed as a model for simulation of both reflection and polarization spectra. Possible mechanisms that effectively eliminate impedance mismatch at the air-elytron interface and allow some beetles to exhibit nearly perfect circularly polarized reflections are discussed. Results are presented for three representative beetles, Ischiosopha bifasciata, which is shown to be a narrowband left-circular polarizer; Chrysophora chrysochlora, a broadband left-circular polarizer; and Chrysina woodi, an elliptical polarizer. The methods that are developed are applicable to the more general problem of synthesis of reflectors with prescribed reflection and polarization spectra.

  19. Micro-structure and frictional characteristics of beetle's joint

    Institute of Scientific and Technical Information of China (English)

    DAI; Zhendong; Stanislav; N.; Gorb

    2004-01-01

    Geometric and micro-structure design, tribology properties of beetle joints were experimentally studied, which aimed to enlighten ideas for the joint design of MEMS.The observation by using SEM and microscopy suggested that beetle's joints consist of a concave surface matched with a convex surface. The heads of the beetles, rubbing with flat glass, were tested in fresh and dried statuses and compared with sapphire ball with flat glass. Frictional coefficient of the joint material on glass was significantly lower than that of the sapphire sphere on glass. The material of the joint cuticle for convex surface is rather stiff (the elastic modulus 4.5 Gpa) and smooth. The surface is hydrophobic (the contact angle of distilled water was 88.3° ). It is suggested here that the high stiffness of the joint material and hydrophobicity of the joint surface are parts of the mechanism minimizing friction in insect joints.

  20. Dual-Color Click Beetle Luciferase Heteroprotein Fragment Complementation Assays

    Science.gov (United States)

    Villalobos, Victor; Naik, Snehal; Bruinsma, Monique; Dothager, Robin S.; Pan, Mei-Hsiu; Samrakandi, Mustapha; Moss, Britney; Elhammali, Adnan; Piwnica-Worms, David

    2010-01-01

    Summary Understanding the functional complexity of protein interactions requires mapping biomolecular complexes within the cellular environment over biologically-relevant time scales. Herein we describe a novel set of reversible, multicolored heteroprotein complementation fragments based on various firefly and click beetle luciferases that utilize the same substrate, D-luciferin. Luciferase heteroprotein fragment complementation systems enabled dual-color quantification of two discreet pairs of interacting proteins simultaneously or two distinct proteins interacting with a third shared protein in live cells. Using real-time analysis of click beetle green and click beetle red luciferase heteroprotein fragment complementation applied to β-TrCP, an E3-ligase common to the regulation of both β-catenin and IκBα, GSK3β was identified as a novel candidate kinase regulating IκBα processing. These dual-color protein interaction switches may enable directed dynamic analysis of a variety of protein interactions in living cells. PMID:20851351

  1. Phenotypic mixing and hiding may contribute to memory in viral quasispecies

    Directory of Open Access Journals (Sweden)

    Novella Isabel S

    2003-06-01

    Full Text Available Abstract Background In a number of recent experiments with food-and-mouth disease virus, a deleterious mutant, RED, was found to avoid extinction and remain in the population for long periods of time. Since RED characterizes the past evolutionary history of the population, this observation was called quasispecies memory. While the quasispecies theory predicts the existence of these memory genomes, there is a disagreement between the expected and observed mutant frequency values. Therefore, the origin of quasispecies memory is not fully understood. Results We propose and analyze a simple model of complementation between the wild type virus and a mutant that has an impaired ability of cell entry, the likely cause of fitness differences between wild type and RED mutants. The mutant will go extinct unless it is recreated from the wild type through mutations. However, under phenotypic mixing-and-hiding as a mechanism of complementation, the time to extinction in the absence of mutations increases with increasing multiplicity of infection (m.o.i.. If the RED mutant is constantly recreated by mutations, then its frequency at equilibrium under selection-mutation balance also increases with increasing m.o.i. At high m.o.i., a large fraction of mutant genomes are encapsidated with wild-type protein, which enables them to infect cells as efficiently as the wild type virions, and thus increases their fitness to the wild-type level. Moreover, even at low m.o.i. the equilibrium frequency of the mutant is higher than predicted by the standard quasispecies model, because a fraction of mutant virions generated from wild-type parents will also be encapsidated by wild-type protein. Conclusions Our model predicts that phenotypic hiding will strongly influence the population dynamics of viruses, particularly at high m.o.i., and will also have important effects on the mutation-selection balance at low m.o.i. The delay in mutant extinction and increase in mutant

  2. Multivariate intralocus sexual conflict in seed beetles.

    Science.gov (United States)

    Berger, David; Berg, Elena C; Widegren, William; Arnqvist, Göran; Maklakov, Alexei A

    2014-12-01

    Intralocus sexual conflict (IaSC) is pervasive because males and females experience differences in selection but share much of the same genome. Traits with integrated genetic architecture should be reservoirs of sexually antagonistic genetic variation for fitness, but explorations of multivariate IaSC are scarce. Previously, we showed that upward artificial selection on male life span decreased male fitness but increased female fitness compared with downward selection in the seed beetle Callosobruchus maculatus. Here, we use these selection lines to investigate sex-specific evolution of four functionally integrated traits (metabolic rate, locomotor activity, body mass, and life span) that collectively define a sexually dimorphic life-history syndrome in many species. Male-limited selection for short life span led to correlated evolution in females toward a more male-like multivariate phenotype. Conversely, males selected for long life span became more female-like, implying that IaSC results from genetic integration of this suite of traits. However, while life span, metabolism, and body mass showed correlated evolution in the sexes, activity did not evolve in males but, surprisingly, did so in females. This led to sexual monomorphism in locomotor activity in short-life lines associated with detrimental effects in females. Our results thus support the general tenet that widespread pleiotropy generates IaSC despite sex-specific genetic architecture.

  3. Hiding Secret Text in Quick Response Code and Transforming the Position of the Secret Data using Rotation Transformation

    Directory of Open Access Journals (Sweden)

    V. Ramya

    2014-05-01

    Full Text Available In order to provide high security and safety in the field of information hiding, this study proposes a novel technology using Steganography. An exotic steganographic algorithm, is used in this study, which Hides the secret text data in a 2D plane (Here, in our case let the 2D plane be the QR code, after encryption and the position of the secret data will be changed using rotation transformation. The proposed algorithm has been tested under various imperceptibility characters such as PSNR, MSE, Human Vision Quality Metrics and Histograms are compared to both cover image and the stego image. This novel algorithm shows Lower MSE, higher PSNR values and it is evident that the proposed algorithm is robust to JPEG attacks.

  4. Photochemical oxidant injury and bark beetle coleoptera scolytidae infestation of ponderosa pine. I. Incidence of bark beetle infestation in injured trees

    Energy Technology Data Exchange (ETDEWEB)

    Stark, R.W.; Miller, P.R.; Cobb, F.W. Jr.; Wood, D.L.; Parmeter, J.R. Jr.

    1968-05-01

    A total of 107 beetle-killed and 963 nearest-neighbor ponderosa pines were examined to determine the association between severity of atmospheric pollution injury and infestation by bark beetles. Trees exhibiting advanced symptoms of pollution injury were most frequently infested by the western pine beetle, Dendroctonus brevicomis, and the mountain pine beetle, D. ponderosae. The degree of injury and incidence of bark beetle infestation were not related to total height, diameter, length of live and dead crown or crown class. As severity of oxidant injury increased, live crown ratio decreased and incidence of bark beetle infestation increased. One hundred noninfested trees in each of three disease categories, advanced, intermediate, and healthy, were examined for evidence of prior beetle attacks. Thirty-six percent of the advanced-diseased trees versus only 5% of the healthy trees were attacked. Thus, the beetles may discriminate between healthy and diseased trees at a distance, upon contact with the host, or both. These studies indicate strongly that atmospheric pollution injury predisposes ponderosa pine to bark beetle infestations. 3 references, 7 tables.

  5. Changes in food resources and conservation of scarab beetles

    DEFF Research Database (Denmark)

    Carpaneto, Giuseppe Maria; Mazziotta, Adriano; Piattella, Emanuele

    2005-01-01

    The aim of the research was to show how a change in land use influences the structure of a dung beetle assemblage and affect its conservation. In the Pineto Urban Regional Park (Rome), dog dung is the sole food resource currently available for scarab dung beetles, after the recent removal of wild...... showed a high percentage of tunnellers, probably because of the food shortage and, for dog scats, of the high dehydration rate. A comparison with other Roman scarab communities enhanced that: (1) the change in food resource determined a higher difference in species composition respect to other parameters...

  6. Transgenic resistance of eggplants to the Colorado potato beetle

    OpenAIRE

    1999-01-01

    The subject of this thesis is the use of transgenic plant resistance as a method to control the Colorado potato beetle, Leptinotarsa decemlineata Say in eggplant. The gene conferring resistance is coding for a Cry3B toxin and it is a synthetic version of a wild-type gene originally obtained from the soil bacterium Bacillus thuringiensis Berl.Eggplant cultivations are constantly attacked by a number of serious pests (e.g. the fruit and shoot borer, the Colorado potato beetle, soil-borne fungi)...

  7. Approaches to mimic the metallic sheen in beetles

    DEFF Research Database (Denmark)

    Lenau, Torben Anker; Aggerbeck, Martin; Nielsen, Steffen

    2009-01-01

    A range of different beetles exhibits brilliant colours and metallic sheen. One of the most spectacular species is the Plusiotis resplendens from Central America with gold metal appearance. The beetle shells are made from chitin and have a number of unique properties that apart from spectacular...... aesthetic effects include metal sheen from non-metal surfaces combined with electric and thermal insulation. The reflection mechanism has been studied by a number of authors and is well understood. Basically there are 2 different reflection principles. One is the multilayer reflector where alternating...

  8. Climate influences on whitebark pine mortality from mountain pine beetle in the Greater Yellowstone Ecosystem.

    Science.gov (United States)

    Buotte, Polly C; Hicke, Jeffrey A; Preisler, Haiganoush K; Abatzoglou, John T; Raffa, Kenneth F; Logan, Jesse A

    2016-12-01

    Extensive mortality of whitebark pine, beginning in the early to mid-2000s, occurred in the Greater Yellowstone Ecosystem (GYE) of the western USA, primarily from mountain pine beetle but also from other threats such as white pine blister rust. The climatic drivers of this recent mortality and the potential for future whitebark pine mortality from mountain pine beetle are not well understood, yet are important considerations in whether to list whitebark pine as a threatened or endangered species. We sought to increase the understanding of climate influences on mountain pine beetle outbreaks in whitebark pine forests, which are less well understood than in lodgepole pine, by quantifying climate-beetle relationships, analyzing climate influences during the recent outbreak, and estimating the suitability of future climate for beetle outbreaks. We developed a statistical model of the probability of whitebark pine mortality in the GYE that included temperature effects on beetle development and survival, precipitation effects on host tree condition, beetle population size, and stand characteristics. Estimated probability of whitebark pine mortality increased with higher winter minimum temperature, indicating greater beetle winter survival; higher fall temperature, indicating synchronous beetle emergence; lower two-year summer precipitation, indicating increased potential for host tree stress; increasing beetle populations; stand age; and increasing percent composition of whitebark pine within a stand. The recent outbreak occurred during a period of higher-than-normal regional winter temperatures, suitable fall temperatures, and low summer precipitation. In contrast to lodgepole pine systems, area with mortality was linked to precipitation variability even at high beetle populations. Projections from climate models indicate future climate conditions will likely provide favorable conditions for beetle outbreaks within nearly all current whitebark pine habitat in the GYE by

  9. Asymmetric information hiding and noise-free recovery based on rotating analyzer ellipsometry and quick-response code.

    Science.gov (United States)

    Lin, Chao; Shen, Xueju; Wang, Zhisong

    2014-08-01

    We report an asymmetric optical information hiding method based on a rotating analyzer ellipsometry technique. This asymmetric hiding architecture not only avoids the interception of keys during transmission or distribution but also makes the cyphertext more inconspicuous for attackers. A new kind of one-way optical trapdoor function is constructed based on the fact that the state of polarization (SOP) of elliptical polarized light cannot be recovered with only the knowledge of intensity captured after passing through a linear polarizer. Meanwhile, the SOP of a polarization ellipse could be calculated by rotating the polarizer to record two scenes of intensity after it. Introduction of a quick response code as a container leads to noise-free recovery for original information and enhances practicality of the proposed cryptosystem with versatile key sensitivity and fault tolerance capability. Numerical simulation results that support theoretical analysis are presented. Analysis on the relationship between hiding effect or quality of decryption and parameters of the algorithm also is provided.

  10. A place to hide in the home-cage decreases yolk androgen levels and offspring emotional reactivity in Japanese quail.

    Directory of Open Access Journals (Sweden)

    Vanessa Guesdon

    Full Text Available An animal's emotional responses are the result of its cognitive appraisal of a situation. This appraisal is notably influenced by the possibility of an individual to exert control over an aversive event. Although the fact that environment controllability decreases emotional responses in animals is well established, far less is known about its potential trans-generational effects. As the levels of avian yolk hormones can vary according to the mother's environment, we hypothesized that housing environment of mothers would modulate the quality of her eggs and in turn her offspring's behaviour. Two groups of female Japanese quail were constituted: a group that had access to a place to hide in their home-cage (Hd, n = 20 and a group that had nowhere to hide (NoHd, n = 20 when stressed. Both groups were submitted to daily human disturbances for a twenty-day-period. Hd females produced eggs with both less testosterone and androstenedione than did NoHd females. The emotional and social reactivity of Hd females' offspring were lower and their growth was slower than those of NoHd females' offspring. Our results show that a minor difference in housing environment had substantial effects on eggs and offspring. The presence of a shelter probably helped quail to cope with daily human disturbances, producing less reactive offspring. This transgenerational effect caused by an opportunity to hide could lead to applications in care of laboratory animals, conservation biology and animal welfare.

  11. Use of steam condensing at subatmospheric pressures to reduce Escherichia coli O157:H7 numbers on bovine hide.

    Science.gov (United States)

    McEvoy, J M; Doherty, A M; Sheridan, J J; Blair, I S; McDowell, D A

    2001-11-01

    This study used a laboratory-scale apparatus to apply subatmospheric steam to bovine hide pieces inoculated with Escherichia coli O157:H7 in maximum recovery diluent (MRD) and in high-liquid content and low-liquid content fecal suspensions (HLC fecal and LLC fecal, respectively). The survival of the organism in fecal clods, which were stored for 24 days in a desiccated state, was assessed. Inoculated fecal clods were also treated with subatmospheric steam. Steam treatment at 80 +/- 2 degrees C for 20 s reduced E. coli O157:H7 concentrations on hide inoculated to initial concentrations of approximately 7 log10 CFU/g by 5.46 (MRD inoculum), 4.17 (HLC fecal inoculum), and 5.99 (LLC fecal inoculum) log10 CFU/g. The reductions achieved in samples inoculated with LLC feces were larger than in samples inoculated with HLC feces (P Steam treatment (20 s) of 3-day-old clods reduced surviving E. coli O157:H7 numbers from 4.20 log10 CFU/g to below the limit of detection of the assay used (1.20 log10 CFU/g). This study shows that steam condensing at or below 80 +/- 2 degrees C can reduce E. coli O157:H7 when present on bovine hide, reducing the risk of cross contamination to the carcass during slaughter and dressing.

  12. Novel serine keratinase from Caldicoprobacter algeriensis exhibiting outstanding hide dehairing abilities.

    Science.gov (United States)

    Bouacem, Khelifa; Bouanane-Darenfed, Amel; Zaraî Jaouadi, Nadia; Joseph, Manon; Hacene, Hocine; Ollivier, Bernard; Fardeau, Marie-Laure; Bejar, Samir; Jaouadi, Bassem

    2016-05-01

    The current paper reports on the purification of an extracellular thermostable keratinase (KERCA) produced from Caldicoprobacter algeriensis strain TH7C1(T), a thermophilic, anaerobic bacterium isolated from a hydrothermal hot spring in Algeria. The maximum keratinase activity recorded after 24-h of incubation at 50 °C was 21000 U/ml. The enzyme was purified by ammonium sulfate precipitation-dialysis and heat treatment (2h at 50 °C) followed by UNO Q-6 FPLC anion exchange chromatography, and submitted to biochemical characterization assays. Matrix assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF/MS) analysis revealed that the purified enzyme was a monomer with a molecular mass of 33246.10 Da. The sequence of the 23 N-terminal residues of KERCA showed high homology with those of bacterial keratinases. Optimal activity was achieved at pH 7 and 50 °C. The enzyme was completely inhibited by phenylmethanesulfonyl fluoride (PMSF) and diiodopropyl fluorophosphates (DFP), which suggests that it belongs to the serine keratinase family. KERCA displayed higher levels of hydrolysis and catalytic efficiency than keratinase KERQ7 from Bacillus tequilensis strain Q7. These properties make KERCA a potential promising and eco-friendly alternative to the conventional chemicals used for the dehairing of goat, sheep, and bovine hides in the leather processing industry.

  13. Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2015-05-01

    A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.

  14. Performance evaluation of information hiding%信息隐藏性能评价方法

    Institute of Scientific and Technical Information of China (English)

    马秀莹; 林家骏

    2011-01-01

    It is necessary to establish a benchmark for information hiding. Imperceptibility is an important index to evaluate the performance of steganography. Based on HVS model, a new imperceptibility measure CHD for color stego image was proposed. Experimental results show that the quality of stego image calculated by CHD reflects the luminance masking, texture masking and color masking of HVS, and CHD can be used to evaluate the imperceptibility of steganography tools.%建立信息隐藏技术的评价标准十分必要.隐写术的视觉不可感知性是评价隐写术性能的重要指标之一.基于HVS模型,给出不可感知性评价指标CHD.实验结果表明,CHD的判定结果反映了人类视觉的亮度,对比度和色彩掩蔽特性,可以作为隐写术的不可感知性评价指标.

  15. Phenotypic mixing and hiding may contribute to memory in viral quasispecies

    CERN Document Server

    Wilke, C O; Wilke, Claus O.; Novella, Isabel S.

    2003-01-01

    Background. In a number of recent experiments with food-and-mouth disease virus, a deleterious mutant, was found to avoid extinction and remain in the population for long periods of time. This observation was called quasispecies memory. The origin of quasispecies memory is not fully understood. Results. We propose and analyze a simple model of complementation between the wild type virus and a mutant that has an impaired ability of cell entry. The mutant will go extinct unless it is recreated from the wild type through mutations. However, under phenotypic mixing-and-hiding as a mechanism of complementation, the time to extinction in the absence of mutations increases with increasing multiplicity of infection (m.o.i.). The mutant's frequency at equilibrium under selection-mutation balance also increases with increasing m.o.i. At high m.o.i., a large fraction of mutant genomes are encapsidated with wild-type protein, which enables them to infect cells as efficiently as the wild type virions, and thus increases t...

  16. Hiding the system from the user: Moving from complex mental models to elegant metaphors

    Energy Technology Data Exchange (ETDEWEB)

    Curtis W. Nielsen; David J. Bruemmer

    2007-08-01

    In previous work, increased complexity of robot behaviors and the accompanying interface design often led to operator confusion and/or a fight for control between the robot and operator. We believe the reason for the conflict was that the design of the interface and interactions presented too much of the underlying robot design model to the operator. Since the design model includes the implementation of sensors, behaviors, and sophisticated algorithms, the result was that the operator’s cognitive efforts were focused on understanding the design of the robot system as opposed to focusing on the task at hand. This paper illustrates how this very problem emerged at the INL and how the implementation of new metaphors for interaction has allowed us to hide the design model from the user and allow the user to focus more on the task at hand. Supporting the user’s focus on the task rather than on the design model allows increased use of the system and significant performance improvement in a search task with novice users.

  17. New approach for ensuring cloud computing security: using data hiding methods

    Indian Academy of Sciences (India)

    MURAT YESILYURT; YILDIRAY YALMAN

    2016-11-01

    Cloud computing is one of the largest developments occurred in the field of information technology during recent years. This model has become more desirable for all institutions, organizations and also for personal use thanks to the storage of ‘valuable information’ at low costs, access to such information from anywhere in the world as well as its ease of use and low cost. In this paper, the services constituting the cloud architecture and deployment models are examined, and the main factors in the provision of security requirements of all those models as well as points to be taken into consideration are described in detail. In addition, the methods and tools considering how security, confidentiality and integrity of the information or data that formsthe basis of modern technology are implemented in cloud computing architecture are examined. Finally, it is proposed in the paper that the use of data hiding methods in terms of access security in cloud computing architecture and the security of the stored data would be very effective in securing information.

  18. A simple method to hide data loggers safely in observation wells.

    Science.gov (United States)

    Lorenzen, Gunnar; Sprenger, Christoph; Pekdeger, Asaf

    2011-01-01

    Submersible data loggers are widely used for groundwater monitoring, but their application often runs the risk of hardware and data loss through vandalism or theft. During a field study in India, the authors of this article experienced that well locks attract the attention of unauthorized persons and do not provide secure protection in unattended areas. To minimize the risk of losing data loggers, a cheap and simple solution has been invented to hide the instruments and associated attachments below the ground surface, inside observation wells. It relies on attaching the logger to a length of small-diameter pipe that is submerged at the bottom of the well, instead of attaching it to the top of the well. The small-diameter pipe with the logger is connected to a small bottle containing a magnet that floats on the water surface of the well and can be recovered using another bottle also with a magnet. A logger that is concealed in this way is difficult to detect and access without knowledge of the method and adequate removal tools. The system was tested and successfully applied for monitoring shallow observation wells at three field sites in Greater Delhi, India. Copyright © 2010 The Author(s). Journal compilation © 2010 National Ground Water Association.

  19. Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs

    Institute of Scientific and Technical Information of China (English)

    TANG ChunMing; PEI DingYi; WANG XiaoFeng; LIU ZhuoJun

    2008-01-01

    A delegateable signature scheme (DSS) which was first introduced by Barak is mainly based on the non-interactive zero-knowledge proof (NIZK) for preventing the signing verifier from telling which witness (i.e., restricted subset) is being used. However, the scheme is not significantly efficient due to the difficulty of constructing NIZK. We first show that a non-Interactive witness indistinguishable (NIWI) proof sys-tern and a non-interactive witness hiding (NIWH) proof system are easier and more efficient proof models than NIZK in some cases. Furthermore, the witnesses em-ployed in these two protocols (NIWI and NIWT) cannot also be distinguished by the verifiers. Combined with the Σ-protocol, we then construct NlWl and NIWH proofs for any NP statement under the existence of one-way functions and show that each proof is different from those under the existence of trapdoor permutations. Finally, based on our NIWI and NIWH proofs, we construct delegateable signature schemes under the existence of one-way functions, which are more efficient than Barak's scheme under the existence of trapdoor permutations.

  20. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    Science.gov (United States)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Niu, Xin-Xin; Yang, Yi-Xian

    2015-05-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. Project supported by the National Natural Science Foundation of China (Grant Nos. 61303199, 61272514, 61170272, 61121061, and 61411146001), the Shandong Provincial Natural Science Foundation of China (Grant Nos. ZR2013FM025, ZR2013FQ001, and ZR2014FM003), the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China (Grant Nos. BS2013DX010 and BS2014DX007), the Program for New Century Excellent Talents in Universities, China (Grant No. NCET-13-0681), the National Development Foundation for Cryptological Research, China (Grant No. MMJJ201401012), the Fok Ying Tong Education Foundation, China (Grant No. 131067), and the Shandong Academy of Sciences Youth Fund Project, China (Grant No. 2013QN007).

  1. HIDES spectroscopy of bright detached eclipsing binaries from the Kepler field - I. Single-lined objects

    Science.gov (United States)

    Hełminiak, K. G.; Ukita, N.; Kambe, E.; Kozłowski, S. K.; Sybilski, P.; Ratajczak, M.; Maehara, H.; Konacki, M.

    2016-09-01

    We present results of our spectroscopic observations of nine detached eclipsing binaries (DEBs), selected from the Kepler Eclipsing Binary Catalog, that only show one set of spectral lines. Radial velocities (RVs) were calculated from the high-resolution spectra obtained with the HIgh-Dispersion Echelle Spectrograph (HIDES) instrument, attached to the 1.88-m telescope at the Okayama Astrophysical Observatory, and from the public Apache Point Observatory Galactic Evolution Experiment archive. In our sample, we found five single-lined binaries, with one component dominating the spectrum. The orbital and light-curve solutions were found for four of them, and compared with isochrones, in order to estimate absolute physical parameters and evolutionary status of the components. For the fifth case, we only update the orbital parameters, and estimate the properties of the unseen star. Two other systems show orbital motion with a period known from the eclipse timing variations (ETVs). For these we obtained parameters of outer orbits, by translating the ETVs to RVs of the centre of mass of the eclipsing binary, and combining with the RVs of the outer star. Of the two remaining ones, one is most likely a blend of a faint background DEB with a bright foreground star, which lines we see in the spectra, and the last case is possibly a quadruple bearing a sub-stellar mass object. Where possible, we compare our results with literature, especially with results from asteroseismology. We also report possible detections of solar-like oscillations in our RVs.

  2. The significance of anisotropic signals hiding in the type Ia supernovae

    CERN Document Server

    Lin, Hai-Nan; Chang, Zhe

    2016-01-01

    We use two different methods, i.e., dipole-fitting (DF) and hemisphere comparison (HC), to search for the anisotropic signals hiding in the Union2.1 data set. We find that the directions of maximum matter density derived using these two methods are about $114^{\\circ}$ away from each other. We construct four Union2.1-like mock samples to test the statistical significance of these two methods. It is shown that DF method is statistically significant, while HC method is strongly biased by the distribution of data points in the sky. Then we assume that the anisotropy of distance modulus is mainly induced by the anisotropy of matter density, which is modeled to be the dipole form $\\Omega_M=\\Omega_{M0}(1-\\cos\\theta)$. We fit our model to Union2.1, and find that the direction of maximum matter density is well consistent with the direction derived using DF method, but it is very different from the direction previously claimed. Monte Carlo simulations show that our method is statistically more significant than HC metho...

  3. The Core Extrusion Schema-Revised: Hiding Oneself Predicts Severity of Social Interaction Anxiety.

    Science.gov (United States)

    Levinson, Cheri A; Rodebaugh, Thomas L; Lim, Michelle H; Fernandez, Katya C

    2017-01-01

    Cognitive behavioral models of social anxiety disorder (SAD) suggest that fear of negative evaluation is a core fear or vulnerability for SAD. However, why negative evaluation is feared is not fully understood. It is possible that core beliefs contribute to the relationship between fear of negative evaluation and SAD. One of these beliefs may be a core extrusion schema: a constellation of beliefs that one's true self will be rejected by others and therefore one should hide one's true self. In the current study (N = 699), we extended research on the Core Extrusion Schema and created a shortened and revised version of the measure called the Core Extrusion Schema-Revised The Core Extrusion Schema-Revised demonstrated good factor fit for its two subscales (Hidden Self and Rejection of the True Self) and was invariant across gender and ethnicity. The Hidden Self subscale demonstrated excellent incremental validity within the full sample as well as in participants diagnosed with generalized SAD. Specifically, the Hidden Self subscale may help explain severity of social interaction anxiety. This measure could be used with individuals diagnosed with generalized SAD to design exposures targeting these core beliefs.

  4. Hiding the word: examining the relationship between a new measure of religiosity and sexual behavior.

    Science.gov (United States)

    Young, Michael; Denny, George; Penhollow, Tina; Palacios, Rebecca; Morris, Duston

    2015-06-01

    The relationship between religiosity and sexual behavior has been previously investigated, but researchers have not examined the relationship between the intellectual dimension of religiosity and sexual behavior. In this study, we developed an intellectual measure of religiosity, Hiding the Word (HTW), and examined whether it accounted for variation in the sexual behavior of college students, beyond that for which age and a generic measure of religiosity could account. Results showed, after accounting for age and generic religiosity, HTW made a significant contribution to distinguishing between students who had, and those who had not, engaged in various sexual behaviors. For females, this was the case in three of the five behaviors examined (all except receiving oral sex and participating in unprotected penile-vaginal intercourse at most recent sexual encounter), and for males, two of the four behaviors (sexual intercourse and anal intercourse). HTW was less of a factor in accounting for variation in the frequency of participation. For males, HTW was significant for the frequency of participation in penile-vaginal intercourse, receiving oral sex, and the number of sexual partners in the last month. For females, HTW was significant only for the number of sexual partners in the last month. Thus, religiosity, and specifically HTW, seems to play more of a role in determining whether or not a person has participated in behavior, rather than in the frequency of participation.

  5. [Co-adaptation between mites (Arachnida: Klinckowstroemiidae) and Passalidae beetles (Insecta: Coleoptera)].

    Science.gov (United States)

    Villegas-Guzmán, Gabriel A; Francke, Oscar F; Pérez, Tila M; Reyes-Castillo, Pedro

    2012-06-01

    Mites of the family Klinckowstroemiidae establish an association with beetles of the family Passalidae known as phoresy. In order to obtain information about this association, we analyzed the relationship between mites of the family Klinckowstroemiidae and beetles of the family Passalidae, as adult mites have been exclusively collected from host beetles. We examined 1 150 beetles collected in seven states of the Mexican Republic, and found 19 species of klinckowstroemiid mites associated with 168 passalids, that belong to 28 different species in 15 genera. Host specificity between species of both groups does not exist, as one species of passalid beetle can have several different symbionts; conversely, a given mite species can associate with passalid beetles of different species and even of different genera. This way, Odontotaenius zodiacus has been found associated with mites of seven species of the genus Klinckowstroemia. Besides, Klinckowstroemia valdezi is associated with five species of passalids. Furthermore, two and even three different species of mites have been found on one host beetle (synhospitality). The lack of congruence between the phylogenies of the mites and that of the beetles indicates that a process of co-adaptation by colonization is going on, because the association is due to the resources that passalid beetles can offer to the mites, like transportation, food and refuge. Since these resources are not host-specific, the klinckowstroemiid mites can climb onto virtually any species of passalid beetles occurring on the same habitat.

  6. Spatio-Temporal Distribution of Bark and Ambrosia Beetles in a Brazilian Tropical Dry Forest

    Science.gov (United States)

    de Novais, Samuel Matos Antunes; Monteiro, Graziela França; Flechtmann, Carlos Alberto Hector; de Faria, Maurício Lopes; Neves, Frederico de Siqueira

    2016-01-01

    Bark and the ambrosia beetles dig into host plants and live most of their lives in concealed tunnels. We assessed beetle community dynamics in tropical dry forest sites in early, intermediate, and late successional stages, evaluating the influence of resource availability and seasonal variations in guild structure. We collected a total of 763 beetles from 23 species, including 14 bark beetle species, and 9 ambrosia beetle species. Local richness of bark and ambrosia beetles was estimated at 31 species. Bark and ambrosia composition was similar over the successional stages gradient, and beta diversity among sites was primarily determined by species turnover, mainly in the bark beetle community. Bark beetle richness and abundance were higher at intermediate stages; availability of wood was the main spatial mechanism. Climate factors were effectively non-seasonal. Ambrosia beetles were not influenced by successional stages, however the increase in wood resulted in increased abundance. We found higher richness at the end of the dry and wet seasons, and abundance increased with air moisture and decreased with higher temperatures and greater rainfall. In summary, bark beetle species accumulation was higher at sites with better wood production, while the needs of fungi (host and air moisture), resulted in a favorable conditions for species accumulation of ambrosia. The overall biological pattern among guilds differed from tropical rain forests, showing patterns similar to dry forest areas. PMID:27271969

  7. Current status of small hive beetle infestation in the Philippines

    Science.gov (United States)

    The distribution of the small hive beetle (SHB, Aethina tumida) is rapidly expanding. From sub-Saharan Africa where it is considered indigenous, SHB has successfully invaded other continents, is prevalent in Australia and North America, and has recently been introduced into Europe (summarized by FE...

  8. Checklist of the Iranian Ground Beetles (Coleoptera; Carabidae).

    Science.gov (United States)

    Azadbakhsh, Saeed; Nozari, Jamasb

    2015-09-30

    An up-to-date checklist of the ground beetles of Iran is presented. Altogether 955 species and subspecies in 155 genera belonging to 26 subfamilies of Carabidae are reported; 25 taxa are recorded for Iran for the fist time. New localities are listed and some previous distributional records are discussed.

  9. New longhorn beetles (Coleopterta: Cerambycidae from Serbia and Montenegro

    Directory of Open Access Journals (Sweden)

    Pil Nataša

    2005-01-01

    Full Text Available Scientific analysis of longhorn beetles (Coleoptera: Cerambycidae collected on the mountain Fruška Gora from 2000 to 2004 has shown the presence of six new species for the fauna of Serbia and Montenegro. In addition to these four species were new for the fauna of Serbia.

  10. Ambrosia beetles associated with laurel wilt of avocado

    Science.gov (United States)

    Redbay ambrosia beetle, Xyleborus glabratus, is an exotic wood-boring pest first detected in 2002 near Savannah, Georgia. The beetle’s dominant fungal symbiont, Raffaelea lauricola, is the pathogen that causes laurel wilt, a lethal disease of trees in the family Lauraceae. Laurel wilt has since spr...

  11. Transgenic resistance of eggplants to the Colorado potato beetle

    NARCIS (Netherlands)

    Arpaia, S.

    1999-01-01

    The subject of this thesis is the use of transgenic plant resistance as a method to control the Colorado potato beetle, Leptinotarsa decemlineata Say in eggplant. The gene conferring resistance is coding for a Cry3B toxin and it is a synthetic version of a wild-type gene originally obtained from the

  12. Rove Beetles (Coleoptera: Staphylinidae of Lanjak Entimau, Sarawak, East Malaysia

    Directory of Open Access Journals (Sweden)

    Fauziah Abdullah

    2009-01-01

    Full Text Available A study to determine the abundance of rove beetle (Coleoptera: Staphylinidae was conducted from 15 to 28 June, 2008 at the dipterocarp forest of Lanjak Entimau, Sarawak, Malaysia. Collections were made at five sites namely Kawi River, Menyaring II, Satap, Begua and Joh River. A total of 175 rove beetles comprising of 17 species were sampled from all 5 sites of Lanjak Entimau. There was a high abundance (Margalef index, 3.097 and moderate diversity (Simpson diversity index, 0.798 of rove beetles at Lanjak Entimau. Four species were identified to species level, Orphnebius bakerianus Motschulscky, 1858, Eleusis kraatzi LeConte, 1863, Belonuchus quadratu Nordman, 1837, Bledius gracilicornis Casey, 1889. Seven species were identified to genus level Orphnebius sp., Coproporus sp., Paederus sp1, Paederus sp2, Hesperus sp., Lispinus sp., Bledius sp. and six species could not be identified even to genus level. Six unidentified species probably new for Science. Moderate diversity and high abundance of rove beetles at Lanjak Entimau are due to diverse habitats. Some differences in species sampled from peninsular Malaysia is explained in terms of isolation between Sarawak in Borneo island with peninsular Malaysia.

  13. Spruce beetle-induced changes to Engelmann spruce foliage flammability

    Science.gov (United States)

    Wesley G. Page; Michael J. Jenkins; Justin B. Runyon

    2014-01-01

    Intermountain Engelmann spruce (Picea engelmannii Parry ex Engelm) stands affected by the spruce beetle (Dendroctonus rufipennis Kirby) represent a unique and growing fuel complex. In this study, we quantified and compared the changes in moisture content, chemistry, and flammability of foliage from trees in three crown condition classes: unattacked (green [G]),...

  14. The Pied Piper: A Parasitic Beetle's Melodies Modulate Ant Behaviours.

    Directory of Open Access Journals (Sweden)

    Andrea Di Giulio

    Full Text Available Ants use various communication channels to regulate their social organisation. The main channel that drives almost all the ants' activities and behaviours is the chemical one, but it is long acknowledged that the acoustic channel also plays an important role. However, very little is known regarding exploitation of the acoustical channel by myrmecophile parasites to infiltrate the ant society. Among social parasites, the ant nest beetles (Paussus are obligate myrmecophiles able to move throughout the colony at will and prey on the ants, surprisingly never eliciting aggression from the colonies. It has been recently postulated that stridulatory organs in Paussus might be evolved as an acoustic mechanism to interact with ants. Here, we survey the role of acoustic signals employed in the Paussus beetle-Pheidole ant system. Ants parasitised by Paussus beetles produce caste-specific stridulations. We found that Paussus can "speak" three different "languages", each similar to sounds produced by different ant castes (workers, soldiers, queen. Playback experiments were used to test how host ants respond to the sounds emitted by Paussus. Our data suggest that, by mimicking the stridulations of the queen, Paussus is able to dupe the workers of its host and to be treated as royalty. This is the first report of acoustic mimicry in a beetle parasite of ants.

  15. Patterns of saproxylic beetle succession in loblolly pine.

    Science.gov (United States)

    Michael Ulyshen; James Hanula

    2010-01-01

    Patterns of insect succession in dead wood remain unclear, particularly beyond the first several years of decay. In the present study, saproxylic beetles were sampled from loblolly pine (Pinus taeda L.) logs aged between 1 month and 9 years old using both emergence traps attached to logs in the field and rearing bags in the laboratory.

  16. Surveying an endangered saproxylic beetle, Osmoderma eremita, in Mediterranean woodlands

    DEFF Research Database (Denmark)

    Chiari, Stefano; Zauli, Agnese; Mazziotta, Adriano;

    2013-01-01

    . Detection probability and population size estimates were drawn from each of these four capture methods. There were strong differences in detection probability among methods. Despite using pheromone and beetle manipulation, capture histories were not affected by trap-happiness or trap-shyness. Population...

  17. "Sea Turtles" and "Ground Beetles" [Land Turtles] Should Shake Hands

    Science.gov (United States)

    Kan, Da

    2004-01-01

    This article talks about those who come back to China after studies abroad, characterized as "sea turtles" and those scholars who have remained in China to arduously pursue their studies, characterized as "ground beetles". " Sea turtles" are those foreign MBAs and Ph.D.s who are objects of praise, admiration and are…

  18. "Sea Turtles" and "Ground Beetles" [Land Turtles] Should Shake Hands

    Science.gov (United States)

    Kan, Da

    2004-01-01

    This article talks about those who come back to China after studies abroad, characterized as "sea turtles" and those scholars who have remained in China to arduously pursue their studies, characterized as "ground beetles". " Sea turtles" are those foreign MBAs and Ph.D.s who are objects of praise, admiration and are naturally more eye-catching…

  19. The genome of the model beetle and pest Tribolium castaneum

    DEFF Research Database (Denmark)

    Denell, Robin; Gibbs, Richard; Muzny, Donna

    2008-01-01

    Tribolium castaneum is a member of the most species-rich eukaryotic order, a powerful model organism for the study of generalized insect development, and an important pest of stored agricultural products. We describe its genome sequence here. This omnivorous beetle has evolved the ability to inte...

  20. Redbay ambrosia beetle: basic and applied chemical ecology

    Science.gov (United States)

    The invasive redbay ambrosia beetle, Xyleborus glabratus, is an exotic wood-boring pest first detected in the U.S. in 2002 near Savannah, Georgia. Females of X. glabratus vector a fungal pathogen (Raffaelea lauricola) that causes laurel wilt, a lethal disease of trees in the family Lauraceae. Over...

  1. Redbay Ambrosia Beetle (xyleborus glabratus eichoff) (coleoptera: curculionidae)

    Science.gov (United States)

    J.L. Hanula; Albert E. Mayfield

    2014-01-01

    The redbay ambrosia beetle, Xyleborus glabratus Eichoff, and its associated fungus Raffaelea lauricola T.C. Harrl, Fraedrich & Aghgayeva are exotic species, recently invasive to the United States. Together, they cause a vascular wilt disease that is highly destructive to some species in the Lauraceae (Fraedrich et al., 2008). Xyleborus glabratus is a member of the...

  2. Chemical ecology of the redbay ambrosia beetle (Xyleborus glabratus)

    Science.gov (United States)

    The redbay ambrosia beetle, Xyleborus glabratus, is an exotic wood-boring pest first detected in the U.S. in 2002 near Savannah, Georgia. Females of X. glabratus vector a newly-described fungal pathogen (Raffaelea lauricola) that causes laurel wilt, a lethal disease of trees in the family Lauraceae...

  3. Drought induces spruce beetle (Dendroctonus rufipennis) outbreaks across northwestern Colorado.

    Science.gov (United States)

    Hart, Sarah J; Veblen, Thomas T; Eisenhart, Karen S; Jarvis, Daniel; Kulakowski, Dominik

    2014-04-01

    This study examines influences of climate variability on spruce beetle (Dendroctonus rufipennis) outbreak across northwestern Colorado during the period 1650 2011 CE. Periods of broad-scale outbreak reconstructed using documentary records and tree rings were dated to 1843-1860, 1882-1889, 1931-1957, and 2004-2010. Periods of outbreak were compared with seasonal temperature, precipitation, vapor pressure deficit (VPD), the Palmer Drought Severity Index (PDSI), and indices of ocean-atmosphere oscillation that include the El Niño Southern Oscillation (ENSO), Pacific Decadal Oscillation (PDO), and Atlantic Multidecadal Oscillation (AMO). Classification trees showed that outbreaks can be predicted most successfully from above average annual AMO values and above average summer VPD values, indicators of drought across Colorado. Notably, we find that spruce beetle outbreaks appear to be predicted best by interannual to multidecadal variability in drought, not by temperature alone. This finding may imply that spruce beetle outbreaks are triggered by decreases in host tree defenses, which are hypothesized to occur with drought stress. Given the persistence of the AMO, the shift to a positive AMO phase in the late 1990s is likely to promote continued spruce beetle disturbance.

  4. Elytra boost lift, but reduce aerodynamic efficiency in flying beetles.

    Science.gov (United States)

    Johansson, L Christoffer; Engel, Sophia; Baird, Emily; Dacke, Marie; Muijres, Florian T; Hedenström, Anders

    2012-10-07

    Flying insects typically possess two pairs of wings. In beetles, the front pair has evolved into short, hardened structures, the elytra, which protect the second pair of wings and the abdomen. This allows beetles to exploit habitats that would otherwise cause damage to the wings and body. Many beetles fly with the elytra extended, suggesting that they influence aerodynamic performance, but little is known about their role in flight. Using quantitative measurements of the beetle's wake, we show that the presence of the elytra increases vertical force production by approximately 40 per cent, indicating that they contribute to weight support. The wing-elytra combination creates a complex wake compared with previously studied animal wakes. At mid-downstroke, multiple vortices are visible behind each wing. These include a wingtip and an elytron vortex with the same sense of rotation, a body vortex and an additional vortex of the opposite sense of rotation. This latter vortex reflects a negative interaction between the wing and the elytron, resulting in a single wing span efficiency of approximately 0.77 at mid downstroke. This is lower than that found in birds and bats, suggesting that the extra weight support of the elytra comes at the price of reduced efficiency.

  5. Aspects of host-plant relationship of the Colorado beetle

    NARCIS (Netherlands)

    Bongers, W.

    1970-01-01

    Host plant choice, suitability of and conditioning to the host in Leptinotarsa decemlineata SAY were studied under controlled conditions.

    The literature on historical and geographical distribution of the Colorado beetle has been reviewed and an extensive survey is given of the

  6. Interactions between imidacloprid and Metarhizium brunneum on adult Asian longhorned beetles (Anoplophora glabripennis (Motschulsky)) (Coleoptera: Cerambycidae).

    Science.gov (United States)

    Russell, Calum W; Ugine, Todd A; Hajek, Ann E

    2010-11-01

    Anoplophora glabripennis (Motschulsky) (Coleoptera: Cerambycidae), a longhorned beetle species native to Asia, has been introduced into several North American and European cities. Currently eradication and preventive measures are limited to identifying and destroying infested trees and protecting uninfested trees with trunk or soil-injections of the systemic insecticide imidacloprid. Because entomopathogenic fungi like Metarhizium brunneum Petch have been identified as virulent against these beetles we conducted several tests to determine the compatibility of the two agents in combination. Radial hyphal growth and the sporulation capacity of M. brunneum on Sabouraud dextrose agar with yeast were not significantly affected by the presence of imidacloprid. In a 2×3 factorial experiment investigating interactions between exposure to imidacloprid and M. brunneum we observed no effect of imidacloprid alone on beetle survival when beetles were given a single dose of 10 or 100 ppm compared to control insects. We observed a significant effect of exposure to M. brunneum, and a significant interaction between imidacloprid and M. brunneum representing a synergistic effect of dual treatment. Beetles exposed to the fungus alone lived significantly longer compared to insects treated with a single dose of 100 ppm imidacloprid (9.5 vs. 6.5d). Consumption of striped maple twigs by beetles exposed to imidacloprid, across concentrations, was reduced 48% compared to control insects, where as consumption by M. brunneum-exposed beetles was reduced by 16% over the first 6-days of the test period. Beetles fed 100 ppm imidacloprid consumed 32% less over the first 3d compared to beetles not exposed to imidacloprid and thereafter consumed as much as beetles not fed 100 ppm imidacloprid. M. brunneum-exposed beetles consumed significantly less food than control insects throughout the test period, and beetles treated with imidacloprid produced significantly fewer conidia compared to beetles

  7. Fire severity unaffected by spruce beetle outbreak in spruce-fir forests in southwestern Colorado.

    Science.gov (United States)

    Andrus, Robert A; Veblen, Thomas T; Harvey, Brian J; Hart, Sarah J

    2016-04-01

    Recent large and severe outbreaks of native bark beetles have raised concern among the general public and land managers about potential for amplified fire activity in western North America. To date, the majority of studies examining bark beetle outbreaks and subsequent fire severity in the U.S. Rocky Mountains have focused on outbreaks of mountain pine beetle (MPB; Dendroctonus ponderosae) in lodgepole pine (Pinus contorta) forests, but few studies, particularly field studies, have addressed the effects of the severity of spruce beetle (Dendroctonus rufipennis Kirby) infestation on subsequent fire severity in subalpine Engelmann spruce (Picea engelmannii) and subalpine fir (Abies lasiocarpa) forests. In Colorado, the annual area infested by spruce beetle outbreaks is rapidly rising, while MPB outbreaks are subsiding; therefore understanding this relationship is of growing importance. We collected extensive field data in subalpine forests in the eastern San Juan Mountains, southwestern Colorado, USA, to investigate whether a gray-stage (beetle infestation affected fire severity. Contrary to the expectation that bark beetle infestation alters subsequent fire severity, correlation and multivariate generalized linear regression analysis revealed no influence of pre-fire spruce beetle severity on nearly all field or remotely sensed measurements of fire severity. Findings were consistent across moderate and extreme burning conditions. In comparison to severity of the pre-fire beetle outbreak, we found that topography, pre-outbreak basal area, and weather conditions exerted a stronger effect on fire severity. Our finding that beetle infestation did not alter fire severity is consistent with previous retrospective studies examining fire activity following other bark beetle outbreaks and reiterates the overriding influence of climate that creates conditions conducive to large, high-severity fires in the subalpine zone of Colorado. Both bark beetle outbreaks and wildfires

  8. Juvenile hormone regulates extreme mandible growth in male stag beetles.

    Directory of Open Access Journals (Sweden)

    Hiroki Gotoh

    Full Text Available The morphological diversity of insects is one of the most striking phenomena in biology. Evolutionary modifications to the relative sizes of body parts, including the evolution of traits with exaggerated proportions, are responsible for a vast range of body forms. Remarkable examples of an insect trait with exaggerated proportions are the mandibular weapons of stag beetles. Male stag beetles possess extremely enlarged mandibles which they use in combat with rival males over females. As with other sexually selected traits, stag beetle mandibles vary widely in size among males, and this variable growth results from differential larval nutrition. However, the mechanisms responsible for coupling nutrition with growth of stag beetle mandibles (or indeed any insect structure remain largely unknown. Here, we demonstrate that during the development of male stag beetles (Cyclommatus metallifer, juvenile hormone (JH titers are correlated with the extreme growth of an exaggerated weapon of sexual selection. We then investigate the putative role of JH in the development of the nutritionally-dependent, phenotypically plastic mandibles, by increasing hemolymph titers of JH with application of the JH analog fenoxycarb during larval and prepupal developmental periods. Increased JH signaling during the early prepupal period increased the proportional size of body parts, and this was especially pronounced in male mandibles, enhancing the exaggerated size of this trait. The direction of this response is consistent with the measured JH titers during this same period. Combined, our results support a role for JH in the nutrition-dependent regulation of extreme mandible growth in this species. In addition, they illuminate mechanisms underlying the evolution of trait proportion, the most salient feature of the evolutionary diversification of the insects.

  9. Impacts of silvicultural thinning treatments on beetle trap captures and tree attacks during low bark beetle populations in ponderosa pine forests of northern Arizona.

    Science.gov (United States)

    Gaylord, M L; Hofstetter, R W; Wagner, M R

    2010-10-01

    Our research used a combination of passive traps, funnel traps with lures, baited trees, and surveys of long-term thinning plots to assess the impacts of different levels of stand basal area (BA) on bark beetle tree attack and on trap captures of Ips spp., Dendroctonus spp., and their predators. The study occurred at two sites in ponderosa pine, Pinus ponderosa Dougl. ex Laws., forests, from 2004 to 2007 during low bark beetle populations. Residual stand BA ranged from 9.0 to 37.0 m2/ha. More predators and bark beetles were collected in passive traps in stands of lower BA than in stands of higher BA; however, significance varied by species and site, and total number of beetles collected was low. Height of the clear panel passive traps affected trap catches for some species at some sites and years. When pheromone lures were used with funnel traps [Ips pini (Say) lure: lanierone, +03/-97 ipsdienol], we found no significant difference in trap catches among basal area treatments for bark beetles and their predators. Similarly, when trees were baited (Dendroctonus brevicomis LeConte lure: myrcene, exo-brevicomin and frontalin), we found no significant difference for days to first bark beetle attack. Surveys of long-term thinning treatments found evidence of bark beetle attacks only in unthinned plots (approximately 37 m2/ha basal area). We discuss our results in terms of management implications for bark beetle trapping and control.

  10. Efficacy of fipronil for protecting individual pines from mortality attributed to attack by western pine beetle and mountain pine beetle (Coleoptera: Curculionidae, Scolytinae)

    Science.gov (United States)

    C.J. Fettig; A.S. Munson; C.I. Jorgenson; D.M. and Grosman

    2010-01-01

    Bark beetles (Coleoptera: C~rculionidae, Scolytinae) are commonly recognized as important tree mortality agents in coniferous forests of the western U.S. Most species feed on the phloem and cambium, or xylem tissue of woody plants; and a few are recognized as the most destructive of all forest insect pests. The last decade has seen elevated levels of bark beetle caused...

  11. Nonhost angiosperm volatiles and verbenone protect individual ponderosa pines from attack by western pine beetle and red turpentine beetle (Coleoptera: Curculionidae, Scolytinae)

    Science.gov (United States)

    Christopher J. Fettig; Christopher P. Dabney; Stepehen R. McKelvey; Dezene P.W. Huber

    2008-01-01

    Nonhost angiosperm volatiles (NAV) and verbenone were tested for their ability to protect individual ponderosa pines, Pinus ponderosa Dougl. ex. Laws., from attack by western pine beetle (WPB), Dendroctonus brevicomis LeConte, and red turpentine beetle (RTB), Dendroctonus valens LeConte (Coleoptera: Curculionidae, Scolytinae). A combination of (

  12. Assessing theory of mind nonverbally in those with intellectual disability and ASD: the penny hiding game.

    Science.gov (United States)

    San José Cáceres, Antonia; Keren, Noa; Booth, Rhonda; Happé, Francesca

    2014-10-01

    Individuals with autism spectrum disorder (ASD) and low intellectual/language abilities are often omitted from experimental studies because of the challenges of testing these individuals. It is vital to develop appropriate and accessible tasks so that this significant part of the spectrum is not neglected. The theory of mind (ToM) has been extensively assessed in ASD, predominantly in relatively high-functioning individuals with reasonable language skills. This study aims to assess the ToM abilities of a sample of 132 participants with intellectual disability (ID) with and without ASD, matched in verbal mental age (VMA) and chronological age, using a naturalistic and nonverbal deception task: the Penny Hiding Game (PHG). The relationship between performance on the PHG and everyday adaptation was also studied. The PHG proved accessible to most participants, suggesting its suitability for use with individuals with low cognitive skills, attentional problems, and limited language. The ASD + ID group showed significantly more PHG errors, and fewer tricks, than the ID group. PHG performance correlated with Vineland adaptation scores for both groups. VMA was a major predictor of passing the task in both groups, and participants with ASD + ID required, on average, 2 years higher VMA than those with ID only, to achieve the same level of PHG success. VMA moderated the association between PHG performance and real-life social skills for the ASD + ID more than the ID group, suggesting that severely impaired individuals with ASD may rely on verbal ability to overcome their social difficulties, whereas individuals with ID alone may use more intuitive social understanding both in the PHG and everyday situations. © 2014 International Society for Autism Research, Wiley Periodicals, Inc.

  13. Information hiding techniques for infrared images: exploring the state-of-the art and challenges

    Science.gov (United States)

    Pomponiu, Victor; Cavagnino, Davide; Botta, Marco; Nejati, Hossein

    2015-10-01

    The proliferation of Infrared technology and imaging systems enables a different perspective to tackle many computer vision problems in defense and security applications. Infrared images are widely used by the law enforcement, Homeland Security and military organizations to achieve a significant advantage or situational awareness, and thus is vital to protect these data against malicious attacks. Concurrently, sophisticated malware are developed which are able to disrupt the security and integrity of these digital media. For instance, illegal distribution and manipulation are possible malicious attacks to the digital objects. In this paper we explore the use of a new layer of defense for the integrity of the infrared images through the aid of information hiding techniques such as watermarking. In this context, we analyze the efficiency of several optimal decoding schemes for the watermark inserted into the Singular Value Decomposition (SVD) domain of the IR images using an additive spread spectrum (SS) embedding framework. In order to use the singular values (SVs) of the IR images with the SS embedding we adopt several restrictions that ensure that the values of the SVs will maintain their statistics. For both the optimal maximum likelihood decoder and sub-optimal decoders we assume that the PDF of SVs can be modeled by the Weibull distribution. Furthermore, we investigate the challenges involved in protecting and assuring the integrity of IR images such as data complexity and the error probability behavior, i.e., the probability of detection and the probability of false detection, for the applied optimal decoders. By taking into account the efficiency and the necessary auxiliary information for decoding the watermark, we discuss the suitable decoder for various operating situations. Experimental results are carried out on a large dataset of IR images to show the imperceptibility and efficiency of the proposed scheme against various attack scenarios.

  14. Population structure of mountain pine beetle symbiont Leptographium longiclavatum and the implication on the multipartite beetle-fungi relationships.

    Directory of Open Access Journals (Sweden)

    Clement Kin-Ming Tsui

    Full Text Available Over 18 million ha of forests have been destroyed in the past decade in Canada by the mountain pine beetle (MPB and its fungal symbionts. Understanding their population dynamics is critical to improving modeling of beetle epidemics and providing potential clues to predict population expansion. Leptographium longiclavatum and Grosmannia clavigera are fungal symbionts of MPB that aid the beetle to colonize and kill their pine hosts. We investigated the genetic structure and demographic expansion of L. longiclavatum in populations established within the historic distribution range and in the newly colonized regions. We identified three genetic clusters/populations that coincide with independent geographic locations. The genetic profiles of the recently established populations in northern British Columbia (BC and Alberta suggest that they originated from central and southern BC. Approximate Bayesian Computation supports the scenario that this recent expansion represents an admixture of individuals originating from BC and the Rocky Mountains. Highly significant correlations were found among genetic distance matrices of L. longiclavatum, G. clavigera, and MPB. This highlights the concordance of demographic processes in these interacting organisms sharing a highly specialized niche and supports the hypothesis of long-term multipartite beetle-fungus co-evolutionary history and mutualistic relationships.

  15. Population structure of mountain pine beetle symbiont Leptographium longiclavatum and the implication on the multipartite beetle-fungi relationships.

    Science.gov (United States)

    Tsui, Clement Kin-Ming; Farfan, Lina; Roe, Amanda D; Rice, Adrianne V; Cooke, Janice E K; El-Kassaby, Yousry A; Hamelin, Richard C

    2014-01-01

    Over 18 million ha of forests have been destroyed in the past decade in Canada by the mountain pine beetle (MPB) and its fungal symbionts. Understanding their population dynamics is critical to improving modeling of beetle epidemics and providing potential clues to predict population expansion. Leptographium longiclavatum and Grosmannia clavigera are fungal symbionts of MPB that aid the beetle to colonize and kill their pine hosts. We investigated the genetic structure and demographic expansion of L. longiclavatum in populations established within the historic distribution range and in the newly colonized regions. We identified three genetic clusters/populations that coincide with independent geographic locations. The genetic profiles of the recently established populations in northern British Columbia (BC) and Alberta suggest that they originated from central and southern BC. Approximate Bayesian Computation supports the scenario that this recent expansion represents an admixture of individuals originating from BC and the Rocky Mountains. Highly significant correlations were found among genetic distance matrices of L. longiclavatum, G. clavigera, and MPB. This highlights the concordance of demographic processes in these interacting organisms sharing a highly specialized niche and supports the hypothesis of long-term multipartite beetle-fungus co-evolutionary history and mutualistic relationships.

  16. Outbreaks of three leaf beetles species in Salix plantations; Insektsskadegoerelse i Salixodlingar - bladbaggar

    Energy Technology Data Exchange (ETDEWEB)

    Hoeglund, Solveig; Eklund, Karin; Bjoerkman, Christer [Swedish Univ. of Agricultural Sciences, Uppsala (Sweden). Dept. of Entomology

    1999-07-01

    Several species of leaf beetles (Coleoptera: Chrysomelidae) have caused economic damage in coppiced willow plantations in Britain. In Sweden we have observed outbreaks of three species; Phratora vulgatissima, Galerucella lineola and Lochmaea caprea. One feature of leaf beetles is that both adults and larvae feed on plants. The adults make holes in willow leaves when feeding whereas larvae skeletonize the leaves by eating on the leaf underside. Willows attacked by high densities of P. vulgatissima may show a yield loss of up to 40%. Leaf beetles have a large reproduction capacity. Each female can lay 10-20 eggs per day for several weeks. Without natural control the beetles would be very common in plantations. The egg and the first larval stages seem to be the most vulnerable to predation. With more knowledge about the biology of leaf beetle enemies it will perhaps be possible to use natural biological control programs as a method for managing these beetles.

  17. Interpatch movement of the red milkweed beetle, Tetraopes tetraophthalmus: individual responses to patch size and isolation.

    Science.gov (United States)

    Matter, Stephen F

    1996-03-01

    Individual movement patterns and the effects of host plant patch size and isolation on patch occupancy were examined for red milkweed beetles, Tetraopes tetraophthalmus, residing in a heterogeneous landscape. Male beetles were found to move both more often and farther between host plant patches than female beetles, and this difference affected the patterns of patch occupancy observed. Overall, unoccupied milkweed patches were smaller and more isolated than patches occupied by beetles. Patches uninhabited by females tended to be more isolated, but not necessarily smaller, than patches with female beetles, indicating that females may be affected more by patch isolation than patch size. Presence of male beetles on patches showed a stronger response to patch size than to patch isolation. Differences in movement between males and females illustrate the need for demographically based dispersal data. Comparisons of Tetraopes interpatch movement patterns between landscapes composed of patches of different size revealed that landscapes with overall smaller patches may have greater rates of interpatch movement.

  18. Small beetle, large-scale drivers: how regional and landscape factors affect outbreaks of the European spruce bark beetle

    Science.gov (United States)

    Seidl, Rupert; Müller, Jörg; Hothorn, Torsten; Bässler, Claus; Heurich, Marco; Kautz, Markus

    2016-01-01

    Summary 1. Unprecedented bark beetle outbreaks have been observed for a variety of forest ecosystems recently, and damage is expected to further intensify as a consequence of climate change. In Central Europe, the response of ecosystem management to increasing infestation risk has hitherto focused largely on the stand level, while the contingency of outbreak dynamics on large-scale drivers remains poorly understood. 2. To investigate how factors beyond the local scale contribute to the infestation risk from Ips typographus (Col., Scol.), we analysed drivers across seven orders of magnitude in scale (from 103 to 1010 m2) over a 23-year period, focusing on the Bavarian Forest National Park. Time-discrete hazard modelling was used to account for local factors and temporal dependencies. Subsequently, beta regression was applied to determine the influence of regional and landscape factors, the latter characterized by means of graph theory. 3. We found that in addition to stand variables, large-scale drivers also strongly influenced bark beetle infestation risk. Outbreak waves were closely related to landscape-scale connectedness of both host and beetle populations as well as to regional bark beetle infestation levels. Furthermore, regional summer drought was identified as an important trigger for infestation pulses. Large-scale synchrony and connectivity are thus key drivers of the recently observed bark beetle outbreak in the area. 4. Synthesis and applications. Our multiscale analysis provides evidence that the risk for biotic disturbances is highly dependent on drivers beyond the control of traditional stand-scale management. This finding highlights the importance of fostering the ability to cope with and recover from disturbance. It furthermore suggests that a stronger consideration of landscape and regional processes is needed to address changing disturbance regimes in ecosystem management. PMID:27041769

  19. Darkling beetle populations (Tenebrionidae) of the Hanford site in southcentral Washington

    Energy Technology Data Exchange (ETDEWEB)

    Rogers, L.E.; Woodley, N.; Sheldon, J.K.; Uresk, V.A.

    1978-02-01

    This 3-yr study documents the taxonomic composition, relative abundance, and seasonal distribution of darkling beetles occupying the Hanford Site in southcentral Washington. A taxonomic key and species diagnosis are provided to assist in identification by the nonspecialist. Analysis of food plant availability and selection serves to identify transfer pathways through beetle populations and permits construction of food web diagrams depicting the flow of materials through the darkling beetle component.

  20. Tiger Beetles' (Coleoptera: Carabidae, Cicindelinae) pupal stage: current state of knowledge and future perspectives.

    Science.gov (United States)

    Roza, André S; Mermudes, José R M

    2017-01-26

    The tiger beetles (Carabidae: Cicindelinae) include about 2,822 species and 120 genera around the world. They are one of the most widely studied families of Coleoptera. However, the knowledge about their immature stages is incipient and usually restricted to the larval stages. Pupal characteristics have been among the most ignored aspects of tiger beetle biology. Here we compile and update the current knowledge of tiger beetle pupae.

  1. Social encapsulation of beetle parasites by Cape honeybee colonies (Apis mellifera capensis Esch.)

    Science.gov (United States)

    Neumann, P.; Pirk, C. W. W.; Hepburn, H. R.; Solbrig, A. J.; Ratnieks, F. L. W.; Elzen, P. J.; Baxter, J. R.

    2001-05-01

    Worker honeybees (Apis mellifera capensis) encapsulate the small hive beetle (Aethina tumida), a nest parasite, in propolis (tree resin collected by the bees). The encapsulation process lasts 1-4 days and the bees have a sophisticated guarding strategy for limiting the escape of beetles during encapsulation. Some encapsulated beetles died (4.9%) and a few escaped (1.6%). Encapsulation has probably evolved because the small hive beetle cannot easily be killed by the bees due to its hard exoskeleton and defensive behaviour.

  2. Ethanol injection of ornamental trees facilitates testing insecticide efficacy against ambrosia beetles (Coleoptera: Curculionidae: Scolytinae).

    Science.gov (United States)

    Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Ranger, Christopher M; Youssef, Nadeer N

    2013-02-01

    Exotic ambrosia beetles are damaging pests in ornamental tree nurseries in North America. The species Xylosandrus crassiusculus (Motshulsky) and Xylosandrus germanus (Blandford) are especially problematic. Management of these pests relies on preventive treatments of insecticides. However, field tests of recommended materials on nursery trees have been limited because of unreliable attacks by ambrosia beetles on experimental trees. Ethanol-injection of trees was used to induce colonization by ambrosia beetles to evaluate insecticides and botanical formulations for preventing attacks by ambrosia beetles. Experiments were conducted in Ohio, Tennessee, and Virginia. Experimental trees injected with ethanol had more attacks by ambrosia beetles than uninjected control trees in all but one experiment. Xylosandrus crassiusculus and X. germanus colonized trees injected with ethanol. In most experiments, attack rates declined 8 d after ethanol-injection. Ethanol-injection induced sufficient pressure from ambrosia beetles to evaluate the efficacy of insecticides for preventing attacks. Trunk sprays of permethrin suppressed cumulative total attacks by ambrosia beetles in most tests. Trunk sprays of the botanical formulations Armorex and Veggie Pharm suppressed cumulative total attacks in Ohio. Armorex, Armorex + Permethrin, and Veggie Pharm + Permethrin suppressed attacks in Tennessee. The bifenthrin product Onyx suppressed establishment of X. germanus in one Ohio experiment, and cumulative total ambrosia beetle attacks in Virginia. Substrate drenches and trunk sprays of neonicotinoids, or trunk sprays of anthranilic diamides or tolfenpyrad were not effective. Ethanol-injection is effective for inducing attacks and ensuring pressure by ambrosia beetles for testing insecticide efficacy on ornamental trees.

  3. Polarizing properties and structure of the cuticle of scarab beetles from the Chrysina genus

    Science.gov (United States)

    Fernández del Río, Lía; Arwin, Hans; Järrendahl, Kenneth

    2016-07-01

    The optical properties of several scarab beetles have been previously studied but few attempts have been made to compare beetles in the same genus. To determine whether there is any relation between specimens of the same genus, we have studied and classified seven species from the Chrysina genus. The polarization properties were analyzed with Mueller-matrix spectroscopic ellipsometry and the structural characteristics with optical microscopy and scanning electron microscopy. Most of the Chrysina beetles are green colored or have a metallic look (gold or silver). The results show that the green-colored beetles polarize reflected light mainly at off-specular angles. The gold-colored beetles polarize light left-handed near circular at specular reflection. The structure of the exoskeleton is a stack of layers that form a cusplike structure in the green beetles whereas the layers are parallel to the surface in the case of the gold-colored beetles. The beetle C. gloriosa is green with gold-colored stripes along the elytras and exhibits both types of effects. The results indicate that Chrysina beetles can be classified according to these two major polarization properties.

  4. Investigation of the Beetle.1.1 chip in the X7 testbeam

    CERN Document Server

    Van Bakel, N; Bulten, H J; Jans, E; Ketel, T; Klous, S; Snoek, H; Verkooijen, H

    2003-01-01

    Two Beetle1.1 chips, bonded to a Hamamatsu PR01 VELO Phi-detector, have been tested for the first time in a testbeam. The main goal was to measure the signal to noise ratio of the Beetle1.1 connected to a prototype VELO Phi-detector. Furthermore we investigated the general behaviour of the Beetle1.1 to adapt the design of the chip if desirable. This note presents the measured S/N numbers as well as some features and characteristics (e.g. rise time, spillover) of the Beetle1.1 chip.

  5. Checklist of leaf beetles (Coleoptera: Chrysomelidae) from the state of Morelos, Mexico.

    Science.gov (United States)

    Niño-Maldonado, Santiago; Sánchez-Reyes, Uriel Jeshua; Clark, Shawn M; Toledo-Hernández, Victor Hugo; Corona-López, Angélica María; Jones, Robert W

    2016-03-07

    We record 116 genera and 366 species of Chrysomelidae from the state of Morelos, Mexico. This represents an increase of 9.3% in the species richness of these beetles for the state. Also, Morelos is currently the third most diverse state in leaf beetles within Mexico, with 16.78% of total species recorded for the country. The most diverse genera were Calligrapha, Disonycha, Blepharida, Leptinotarsa, Cryptocephalus, Systena, Alagoasa, Diabrotica and Pachybrachis, each with more than eight species. Most of these genera contain large, showy beetles. When the chrysomelid fauna is more fully understood, some of the genera of tiny beetles will likely prove to be more diverse.

  6. Population Dynamics of Bean Leaf Beetle, Cerotoma trifurcata (Coleoptera: Chrysomelidae on Edamame Soybean Plants In Nebraska

    Directory of Open Access Journals (Sweden)

    Bamphitlhi Tiroesele

    2013-02-01

    Full Text Available Edamame soybeans are a speciality food item for fresh and processed markets and they are harvested at a physiologically immature (R6 stage. Bean leaf beetle, Cerotoma trifurcata, is a sporadic pest of soybean in Nebraska, however, its pest status and abundance has increased in the recent years due to an increase in soybean acreage. This was a field experiment aimed at determining the population growth rate of bean leaf beetle on two edamame soybean cultivars, ‘Butterbeans’ and ‘Envy,’ at two planting dates during 2004 and 2005 in Nebraska. The population growth of beetles was significantly higher on 'Butterbeans' than on 'Envy' for both the first and second planting periods in both 2004 and 2005 seasons. The beetle infestation differences were noticed on plants at the late reproductive growth stages, R5 and R6. Additionally, the beetle infestation on 'Butterbeans' growth stages in 2004 and 2005 was significantly different for the first and second planting dates. On average, the beetles were higher on plants at the late reproductive stages than the other stages for first and second planting periods. Similarly, ‘Envy’ growth stages showed significant difference in beetle infestation during the first and second planting dates. Significantly high beetle infestations were observed at the vegetative growth stages. The study revealed that population growth of bean leaf beetles on edamame soybeans is affected by the planting date, season and cultivar choice.

  7. Repeated evolution of crop theft in fungus-farming ambrosia beetles.

    Science.gov (United States)

    Hulcr, Jiri; Cognato, Anthony I

    2010-11-01

    Ambrosia beetles, dominant wood degraders in the tropics, create tunnels in dead trees and employ gardens of symbiotic fungi to extract nutrients from wood. Specificity of the beetle-fungus relationship has rarely been examined, and simple vertical transmission of a specific fungal cultivar by each beetle species is often assumed in literature. We report repeated evolution of fungal crop stealing, termed mycocleptism, among ambrosia beetles. The mycocleptic species seek brood galleries of other species, and exploit their established fungal gardens by tunneling through the ambient mycelium-laden wood. Instead of carrying their own fungal sybmbionts, mycocleptae depend on adopting the fungal assemblages of their host species, as shown by an analysis of fungal DNA from beetle galleries. The evidence for widespread horizontal exchange of fungi between beetles challenges the traditional concept of ambrosia fungi as species-specific symbionts. Fungus stealing appears to be an evolutionarily successful strategy. It evolved independently in several beetle clades, two of which have radiated, and at least one case was accompanied by a loss of the beetles' fungus-transporting organs. We demonstrate this using the first robust phylogeny of one of the world's largest group of ambrosia beetles, Xyleborini.

  8. Presence and diversity of Streptomyces in Dendroctonus and sympatric bark beetle galleries across North America.

    Science.gov (United States)

    Hulcr, Jiri; Adams, Aaron S; Raffa, Kenneth; Hofstetter, Richard W; Klepzig, Kier D; Currie, Cameron R

    2011-05-01

    Recent studies have revealed several examples of intimate associations between insects and Actinobacteria, including the Southern Pine Beetle Dendroctonus frontalis and the Spruce Beetle Dendroctonus rufipennis. Here, we surveyed Streptomyces Actinobacteria co-occurring with 10 species of Dendroctonus bark beetles across the United States, using both phylogenetic and community ecology approaches. From these 10 species, and 19 other scolytine beetles that occur in the same trees, we obtained 154 Streptomyces-like isolates and generated 16S sequences from 134 of those. Confirmed 16S sequences of Streptomyces were binned into 36 distinct strains using a threshold of 0.2% sequence divergence. The 16S rDNA phylogeny of all isolates does not correlate with the distribution of strains among beetle species, localities, or parts of the beetles or their galleries. However, we identified three Streptomyces strains occurring repeatedly on Dendroctonus beetles and in their galleries. Identity of these isolates was corroborated using a house-keeping gene sequence (efTu). These strains are not confined to a certain species of beetle, locality, or part of the beetle or their galleries. However, their role as residents in the woodboring insect niche is supported by the repeated association of their 16S and efTu from across the continent, and also having been reported in studies of other subcortical insects.

  9. ECOLOGICAL SUCCESSION PATTERN OF THE INSECT SPECIES ASSOCIATED WITH THE CARCASS OF THE FREE-RANGING URBAN DOG, Canis domesticus (L.: A TOOL FOR FORENSIC ENTOMOLOGY

    Directory of Open Access Journals (Sweden)

    FARZANA PERVEEN

    2013-01-01

    Full Text Available The free-ranging urban dog, Canis domesticus (L. carcass decomposition in tropical region, i.e., Takht-i-Bahi, Mardan, Khyber Pakhtunkhwa, Pakistan during 15-25 May 2011 was characterized by 5 stages, i.e., fresh (12 h, bloated (13-48 h, active (49-96 h, advanced (97-144 h and dry (145-265 h and the ecological succession pattern of insect species collected were identified into 11 species of 3 orders. The insect species associated with the carcass of C. domesticus found that the blow flies, Chrysomya rufifacies (Macquart and house fly, Musca domestica (Linnaeus, 1758 were found in the fresh, bloat and active decay stages. However, the blow fly, C. megacephala (Fabricius; flesh fly, Parasarcophaga ruficornis (Meigen and the hornet wasp, Vespa orientalis (Linnaeus were existed in the fresh and bloat stages. Moreover, cheese fly, Piophila casei (Linnaeus was found bloat and active decay stages. Further, the hide beetle, Dermestes maculates (Geer, clown beetle, Hister sp. (Gullenhal; ham beetle, Necrobia rufipes (Fabricus and skin beetle, Trox sp. (Harold completed their life cycle in active decay, advance decay and dry stages. Furthermore, the jummper ant, Myrmecia pilosula (Smith was collected from only fresh stage. The specimens of insect species were collected minimum 0.8% of V. orientalis and maximum 21.3% of 2 species, i.e., C. rufifacies and M. domestica. The temperature, humidity and rainfalls were found affected insect larvae, pupae and adults, and rate of decomposition of C. domesticus. The average temperature, humidity and rainfalls were 35.34±1.54, 38.8% and 3.8 mm, respectively, of 11 experimental days. This research will be helpful for forensic entomologist for a case study of death to investigate of crimes in tropical region of Pakistan.

  10. Salimicrobium salexigens sp. nov., a moderately halophilic bacterium from salted hides.

    Science.gov (United States)

    de la Haba, Rafael R; Yilmaz, Pinar; Sánchez-Porro, Cristina; Birbir, Meral; Ventosa, Antonio

    2011-09-01

    Two Gram-positive, moderately halophilic bacteria, designated strains 29CMI(T) and 53CMI, were isolated from salted hides. Both strains were non-motile, strictly aerobic cocci, growing in the presence of 3-25% (w/v) NaCl (optimal growth at 7.5-12.5% [w/v] NaCl), between pH 5.0 and 10.0 (optimal growth at pH 7.5) and at temperatures between 15 and 40°C (optimal growth at 37°C). Phylogenetic analysis based on 16S rRNA gene sequence comparison showed that both strains showed a similarity of 98.7% and were closely related to species of the genus Salimicrobium, within the phylum Firmicutes. Strains 29CMI(T) and 53CMI exhibited 16S rRNA gene sequence similarity values of 97.9-97.6% with Salimicrobium album DSM 20748(T), Salimicrobium halophilum DSM 4771(T), Salimicrobium flavidum ISL-25(T) and Salimicrobium luteum BY-5(T). The DNA G+C content was 50.7mol% and 51.5mol% for strains 29CMI(T) and 53CMI, respectively. The DNA-DNA hybridization between both strains was 98%, whereas the values between strain 29CMI(T) and the species S. album CCM 3517(T), S. luteum BY-5(T), S. flavidum ISL-25(T) and S. halophilum CCM 4074(T) were 45%, 28%, 15% and 10%, respectively, showing unequivocally that strains 29CMI(T) and 53CMI constitute a new genospecies. The major cellular fatty acids were anteiso-C(15:0), anteiso-C(17:0), iso-C(15:0) and iso-C(14:0). The main respiratory isoprenoid quinone was MK-7, although small amounts of MK-6 were also found. The polar lipids of the type strain consist of diphosphatidylglycerol, phosphatidylglycerol, one unidentified phospholipid and one glycolipid. The peptidoglycan type is A1γ, with meso-diaminopimelic acid as the diagnostic diamino acid. On the basis of the phylogenetic analysis, and phenotypic, genotypic and chemotaxonomic characteristics, we propose strains 29CMI(T) and 53CMI as a novel species of the genus Salimicrobium, with the name Salimicrobium salexigens sp. nov. The type strain is 29CMI(T) (=CECT 7568(T)=JCM 16414(T)=LMG 25386(T)).

  11. An inordinate fondness for Fusarium: Phylogenetic diversity of fusaria cultivated by Euwallacea ambrosia beetles on avocado and other plant hosts

    Science.gov (United States)

    Ambrosia beetle fungiculture represents one of the most ecologically and evolutionarily successful symbioses. Here we document the evolution of a clade within Fusarium associated with ambrosia beetles in the genus Euwallacea (Coleoptera: Scolytinae). Ambrosia Fusarium Clade (AFC) symbionts are unusu...

  12. Genome of the Asian longhorned beetle (Anoplophora glabripennis), a globally significant invasive species, reveals key functional and evolutionary innovations at the beetle-plant interface.

    Science.gov (United States)

    McKenna, Duane D; Scully, Erin D; Pauchet, Yannick; Hoover, Kelli; Kirsch, Roy; Geib, Scott M; Mitchell, Robert F; Waterhouse, Robert M; Ahn, Seung-Joon; Arsala, Deanna; Benoit, Joshua B; Blackmon, Heath; Bledsoe, Tiffany; Bowsher, Julia H; Busch, André; Calla, Bernarda; Chao, Hsu; Childers, Anna K; Childers, Christopher; Clarke, Dave J; Cohen, Lorna; Demuth, Jeffery P; Dinh, Huyen; Doddapaneni, HarshaVardhan; Dolan, Amanda; Duan, Jian J; Dugan, Shannon; Friedrich, Markus; Glastad, Karl M; Goodisman, Michael A D; Haddad, Stephanie; Han, Yi; Hughes, Daniel S T; Ioannidis, Panagiotis; Johnston, J Spencer; Jones, Jeffery W; Kuhn, Leslie A; Lance, David R; Lee, Chien-Yueh; Lee, Sandra L; Lin, Han; Lynch, Jeremy A; Moczek, Armin P; Murali, Shwetha C; Muzny, Donna M; Nelson, David R; Palli, Subba R; Panfilio, Kristen A; Pers, Dan; Poelchau, Monica F; Quan, Honghu; Qu, Jiaxin; Ray, Ann M; Rinehart, Joseph P; Robertson, Hugh M; Roehrdanz, Richard; Rosendale, Andrew J; Shin, Seunggwan; Silva, Christian; Torson, Alex S; Jentzsch, Iris M Vargas; Werren, John H; Worley, Kim C; Yocum, George; Zdobnov, Evgeny M; Gibbs, Richard A; Richards, Stephen

    2016-11-11

    Relatively little is known about the genomic basis and evolution of wood-feeding in beetles. We undertook genome sequencing and annotation, gene expression assays, studies of plant cell wall degrading enzymes, and other functional and comparative studies of the Asian longhorned beetle, Anoplophora glabripennis, a globally significant invasive species capable of inflicting severe feeding damage on many important tree species. Complementary studies of genes encoding enzymes involved in digestion of woody plant tissues or detoxification of plant allelochemicals were undertaken with the genomes of 14 additional insects, including the newly sequenced emerald ash borer and bull-headed dung beetle. The Asian longhorned beetle genome encodes a uniquely diverse arsenal of enzymes that can degrade the main polysaccharide networks in plant cell walls, detoxify plant allelochemicals, and otherwise facilitate feeding on woody plants. It has the metabolic plasticity needed to feed on diverse plant species, contributing to its highly invasive nature. Large expansions of chemosensory genes involved in the reception of pheromones and plant kairomones are consistent with the complexity of chemical cues it uses to find host plants and mates. Amplification and functional divergence of genes associated with specialized feeding on plants, including genes originally obtained via horizontal gene transfer from fungi and bacteria, contributed to the addition, expansion, and enhancement of the metabolic repertoire of the Asian longhorned beetle, certain other phytophagous beetles, and to a lesser degree, other phytophagous insects. Our results thus begin to establish a genomic basis for the evolutionary success of beetles on plants.

  13. The 3D lightweight structural characteristics of the beetle forewing.

    Science.gov (United States)

    Chen, Jinxiang; Tuo, Wanyong; Guo, Zhensheng; Yan, Lili

    2017-02-01

    The present paper renewedly expounds upon the characteristics of the 3D lightweight structure of beetle forewings and notes that two biomimetic structures (models) that have appeared in recent years do not comply with these characteristics based on a comparison of the structures of the biological prototypes. The first model features transverse tubules based on observations of circular holes in cross-sectional figures of the Cybister forewing. The second is a biomimetic spherical cavity model with hollow trabeculae that reportedly exhibits superior mechanical properties because its structures are most similar to the biological prototype. Finally, a false biomimetic proposition that the mechanical properties of biomimetic structures with "fiber winding" patterns are superior to those of structures constructed of pure "epoxy" is also noted. Hopefully, the present study can serve to improve the state of research on biomimetic applications of beetle forewing structures.

  14. Structural origin of circularly polarized iridescence in jeweled beetles

    Science.gov (United States)

    Crne, Matija; Sharma, Vivek; Park, Jung O.; Srinivasarao, Mohan

    2010-03-01

    The iridescent metallic green beetle, Chrysina gloriosa, selectively reflects left circularly polarized light. The exoskeleton is decorated by hexagonal cells (˜10 micron) that coexist with pentagons and heptagons. We find that the fraction of hexagons decreases with an increase in curvature. In bright field microscopy, each cell contains a bright yellow core, placed in a greenish cell with yellowish border, but the core disappears in the dark field. Using confocal microscopy, we observe that these cells consist of nearly concentric, nested arcs that lie on surface of a shallow cone. We infer that the patterns are structurally and optically analogous to the focal conic domains formed spontaneously on the free surface of a cholesteric liquid crystal. The microstructure provides the bases for the morphogenesis as well as key insights for emulating the intricate optical response the exoskeleton of scarab beetles.

  15. Image Hiding Technology Based on DCT and Chaos%基于DCT和混沌的图像隐藏技术①

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

      提出一种基于 DCT 和混沌的图像隐藏算法。首先利用混沌系统产生混沌序列对秘密图像进行加密,然后利用DCT变换与混沌序列把秘密图像隐藏到载体图像中。实验结果表明,该算法具有良好的安全性和隐藏效果。%An improved image hiding technology based on DCT and chaos is presented. We use chaotic system to generate one chaotic sequence which is utilized to encrypt the secret image, and then we use DCT and chaotic sequence to realize the secret image hiding in the host image. Simulation results show that the algorithm has good security and hiding effect.

  16. Gene discovery in the horned beetle Onthophagus taurus

    Directory of Open Access Journals (Sweden)

    Yang Youngik

    2010-12-01

    Full Text Available Abstract Background Horned beetles, in particular in the genus Onthophagus, are important models for studies on sexual selection, biological radiations, the origin of novel traits, developmental plasticity, biocontrol, conservation, and forensic biology. Despite their growing prominence as models for studying both basic and applied questions in biology, little genomic or transcriptomic data are available for this genus. We used massively parallel pyrosequencing (Roche 454-FLX platform to produce a comprehensive EST dataset for the horned beetle Onthophagus taurus. To maximize sequence diversity, we pooled RNA extracted from a normalized library encompassing diverse developmental stages and both sexes. Results We used 454 pyrosequencing to sequence ESTs from all post-embryonic stages of O. taurus. Approximately 1.36 million reads assembled into 50,080 non-redundant sequences encompassing a total of 26.5 Mbp. The non-redundant sequences match over half of the genes in Tribolium castaneum, the most closely related species with a sequenced genome. Analyses of Gene Ontology annotations and biochemical pathways indicate that the O. taurus sequences reflect a wide and representative sampling of biological functions and biochemical processes. An analysis of sequence polymorphisms revealed that SNP frequency was negatively related to overall expression level and the number of tissue types in which a given gene is expressed. The most variable genes were enriched for a limited number of GO annotations whereas the least variable genes were enriched for a wide range of GO terms directly related to fitness. Conclusions This study provides the first large-scale EST database for horned beetles, a much-needed resource for advancing the study of these organisms. Furthermore, we identified instances of gene duplications and alternative splicing, useful for future study of gene regulation, and a large number of SNP markers that could be used in population

  17. A checklist of stag beetles (Coleoptera: Scarabaeoidea: Lucanidae) from Iran.

    Science.gov (United States)

    Bartolozzi, Luca; Ghahari, Hassan; Sprecher-Uebersax, Eva; Zilioli, Michele

    2014-11-26

    An updated checklist of the Lucanidae (Coleoptera) from Iran is given. New locality records are listed and some dubious distributional records are discussed. Dorcus vavrai Nonfried, 1905 is placed in synonymy with Dorcus peyronis Reiche and Saulcy, 1856 (new synonymy) The female of Lucanus xerxes Král, 2004 is described. A key for the identification of the Iranian stag beetle species is also provided and all the species are figured.

  18. Modeling Phloem Temperatures Relative to Mountain Pine Beetle Phenology

    OpenAIRE

    Lewis, Matthew Jared

    2011-01-01

    We explore a variety of methods to estimate phloem temperatures from ambient air temperatures suitable for the mountain pine beetle, Dendroctonus ponderosae. A model's ability to induce the same phenology generated from observed phloem temperatures measures its effectiveness rather than a simple reconstruction of phloem temperatures. From a model's phenology results we are able to ascertain whether the model produces a similar amount of developmental energy exhibited by observed phloem temper...

  19. Studies of the Beetle 1.2 Pipeline Homogeneity

    CERN Document Server

    Agari, M; Blouw, J; Schmelling, M; Hofmann, W; Schwingenheuer, B; Pugatch, V; Volyanskyy, D; Jiménez-Otero, S; Tran, M T; Voss, H; Bernhard, R P; Köstner, S; Lehner, F; Lois, C; Needham, M; Steinkamp, O; Straumann, U; Vollhardt, A

    2003-01-01

    The pipeline homogeneity in general and the behaviour of the edge channels of the Beetle 1.2 readout chip [1] were studied with data taken during the Silicon Tracker test beam period in May 2003. A contribution of roughly 10\\% from pipeline inhomogeneities to the strip noise was observed. All channels including the first and the last one were found to be fully functional.

  20. Using malaise traps to sample ground beetles (Coleoptera: Carabidae).

    Energy Technology Data Exchange (ETDEWEB)

    Ulyshen, Michael D., James L. Hanula, and Scott Horn

    2005-01-01

    Pitfall traps provide an easy and inexpensive way to sample ground-dwelling arthropods (Spence and Niemela 1994; Spence et al. 1997; Abildsnes and Tommeras 2000) and have been used exclusively in many studies of the abundance and diversity of ground beetles (Coleoptera: Carabidae). Despite the popularity of this trapping technique, pitfall traps have many disadvantages. For example, they often fail to collect both small (Spence and Niemela 1994) and trap-shy species (Benest 1989), eventually deplete the local carabid population (Digweed et al. 1995), require a species to be ground-dwelling in order to be captured (Liebherr and Mahar 1979), and produce different results depending on trap diameter and material, type of preservative used, and trap placement (Greenslade 1964; Luff 1975; Work et al. 2002). Further complications arise from seasonal patterns of movement among the beetles themselves (Maelfait and Desender 1990), as well as numerous climatic factors, differences in plant cover, and variable surface conditions (Adis 1979). Because of these limitations, pitfall trap data give an incomplete picture of the carabid community and should be interpreted carefully. Additional methods, such as use of Berlese funnels and litter washing (Spence and Niemela 1994), collection from lights (Usis and MacLean 1998), and deployment of flight intercept devices (Liebherr and Mahar 1979; Paarmann and Stork 1987), should be incorporated in surveys to better ascertain the species composition and relative numbers of ground beetles. Flight intercept devices, like pitfall traps, have the advantage of being easy to use and replicate, but their value to carabid surveys is largely unknown. Here we demonstrate the effectiveness of Malaise traps for sampling ground beetles in a bottomland hardwood forest.

  1. Using malaise traps to sample ground beetles (Coleoptera. Carabidae)

    Energy Technology Data Exchange (ETDEWEB)

    Ulyshen, Michael D. [USDA Forest Service, Savannah River, New Ellenton, SC (United States); Hanula, James L. [USDA Forest Service, Savannah River, New Ellenton, SC (United States); Horn, Scott [USDA Forest Service, Savannah River, New Ellenton, SC (United States)

    2012-04-02

    Pitfall traps provide an easy and inexpensive way to sample ground-dwelling arthropods (Spence and Niemela 1994; Spence et al. 1997; Abildsnes and Tommeras 2000) and have been used exclusively in many studies of the abundance and diversity of ground beetles (Coleoptera: Carabidae). Despite the popularity of this trapping technique, pitfall traps have many disadvantages. For example, they often fail to collect both small (Spence and Niemela 1994) and trap-shy species (Benest 1989), eventually deplete the local carabid population (Digweed et al. 1995), require a species to be ground-dwelling in order to be captured (Liebherr and Mahar 1979), and produce different results depending on trap diameter and material, type of preservative used, and trap placement (Greenslade 1964; Luff 1975; Work et al. 2002). Further complications arise from seasonal patterns of movement among the beetles themselves (Maelfait and Desender 1990), as well as numerous climatic factors, differences in plant cover, and variable surface conditions (Adis 1979). Because of these limitations, pitfall trap data give an incomplete picture of the carabid community and should be interpreted carefully. Additional methods, such as use of Berlese funnels and litter washing (Spence and Niemela 1994), collection from lights (Usis and MacLean 1998), and deployment of flight intercept devices (Liebherr and Mahar 1979; Paarmann and Stork 1987), should be incorporated in surveys to better ascertain the species composition and relative numbers of ground beetles. Flight intercept devices, like pitfall traps, have the advantage of being easy to use and replicate, but their value to carabid surveys is largely unknown. Here we demonstrate the effectiveness of Malaise traps for sampling ground beetles in a bottomland hardwood forest.

  2. Urban forests sustain diverse carrion beetle assemblages in the New York City metropolitan area.

    Science.gov (United States)

    Fusco, Nicole A; Zhao, Anthony; Munshi-South, Jason

    2017-01-01

    Urbanization is an increasingly pervasive form of land transformation that reduces biodiversity of many taxonomic groups. Beetles exhibit a broad range of responses to urbanization, likely due to the high functional diversity in this order. Carrion beetles (Order: Coleoptera, Family: Silphidae) provide an important ecosystem service by promoting decomposition of small-bodied carcasses, and have previously been found to decline due to forest fragmentation caused by urbanization. However, New York City (NYC) and many other cities have fairly large continuous forest patches that support dense populations of small mammals, and thus may harbor relatively robust carrion beetle communities in city parks. In this study, we investigated carrion beetle community composition, abundance and diversity in forest patches along an urban-to-rural gradient spanning the urban core (Central Park, NYC) to outlying rural areas. We conducted an additional study comparing the current carrion beetle community at a single suburban site in Westchester County, NY that was intensively surveyed in the early 1970's. We collected a total of 2,170 carrion beetles from eight species at 13 sites along this gradient. We report little to no effect of urbanization on carrion beetle diversity, although two species were not detected in any urban parks. Nicrophorus tomentosus was the most abundant species at all sites and seemed to dominate the urban communities, potentially due to its generalist habits and shallower burying depth compared to the other beetles surveyed. Variation between species body size, habitat specialization, and % forest area surrounding the surveyed sites also did not influence carrion beetle communities. Lastly, we found few significant differences in relative abundance of 10 different carrion beetle species between 1974 and 2015 at a single site in Westchester County, NY, although two of the rare species in the early 1970's were not detected in 2015. These results indicate that

  3. Impact of planting date on sunflower beetle (Coleoptera: Chrysomelidae) infestation, damage, and parasitism in cultivated sunflower.

    Science.gov (United States)

    Charlet, Laurence D; Knodel, Janet J

    2003-06-01

    The sunflower beetle, Zygogramma exclamationis (F.), is the major defoliating pest of sunflower (Helianthus annuus L.). Planting date was evaluated as a potential management tool in a variety of production regions throughout North Dakota from 1997 to 1999, for its impact on sunflower beetle population density of both adults and larvae, defoliation caused by both feeding stages, seed yield, oil content, and larval parasitism in cultivated sunflower. Results from this 3-yr study revealed that sunflower beetle adult and larval populations decreased as planting date was delayed. Delayed planting also reduced defoliation from adult and larval feeding, which is consistent with the lower numbers of the beetles present in the later seeded plots. Even a planting delay of only 1 wk was sufficient to significantly reduce feeding damage to the sunflower plant. Yield reduction caused by leaf destruction of the sunflower beetle adults and larvae was clearly evident in the first year of the study. The other component of sunflower yield, oil content, did not appear to be influenced by beetle feeding. The tachinid parasitoid, Myiopharus macellus (Rheinhard), appeared to be a significant mortality factor of sunflower beetle larvae at most locations regardless of the dates of planting, and was able to attack and parasitize the beetle at various larval densities. The results of this investigation showed the potential of delayed planting date as an effective integrated pest management tactic to reduce sunflower beetle adults, larvae, and their resulting defoliation. In addition, altering planting dates was compatible with biological control of the beetle, because delaying the planting date did not reduce the effectiveness of the parasitic fly, M. macellus, which attacks the sunflower beetle larvae.

  4. Intercrop movement of convergent lady beetle, Hippodamia convergens (Coleoptera: Coccinellidae), between adjacent cotton and alfalfa.

    Science.gov (United States)

    Bastola, Anup; Parajulee, Megha N; Porter, R Patrick; Shrestha, Ram B; Chen, Fa-Jun; Carroll, Stanley C

    2016-02-01

    A 2-year study was conducted to characterize the intercrop movement of convergent lady beetle, Hippodamia convergens Guerin-Meneville (Coleoptera: Coccinellidae) between adjacent cotton and alfalfa. A dual protein-marking method was used to assess the intercrop movement of the lady beetles in each crop. In turns field collected lady beetles in each crop were assayed by protein specific ELISA to quantify the movement of beetles between the crops. Results indicated that a high percentage of convergent lady beetles caught in cotton (46% in 2008; 56% in 2009) and alfalfa (46% in 2008; 71% in 2009) contained a protein mark, thus indicating that convergent lady beetle movement was largely bidirectional between the adjacent crops. Although at a much lower proportion, lady beetles also showed unidirectional movement from cotton to alfalfa (5% in 2008 and 6% in 2009) and from alfalfa to cotton (9% in 2008 and 14% in 2009). The season-long bidirectional movement exhibited by the beetles was significantly higher in alfalfa than cotton during both years of the study. The total influx of lady beetles (bidirectional and unidirectional combined) was significantly higher in alfalfa compared with that in cotton for both years. While convergent lady beetles moved between adjacent cotton and alfalfa, they were more attracted to alfalfa when cotton was not flowering and/or when alfalfa offered more opportunities for prey. This study offers much needed information on intercrop movement of the convergent lady beetle that should facilitate integrated pest management decisions in cotton utilizing conservation biological control. © 2014 Institute of Zoology, Chinese Academy of Sciences.

  5. Urban forests sustain diverse carrion beetle assemblages in the New York City metropolitan area

    Science.gov (United States)

    Fusco, Nicole A.; Zhao, Anthony

    2017-01-01

    Urbanization is an increasingly pervasive form of land transformation that reduces biodiversity of many taxonomic groups. Beetles exhibit a broad range of responses to urbanization, likely due to the high functional diversity in this order. Carrion beetles (Order: Coleoptera, Family: Silphidae) provide an important ecosystem service by promoting decomposition of small-bodied carcasses, and have previously been found to decline due to forest fragmentation caused by urbanization. However, New York City (NYC) and many other cities have fairly large continuous forest patches that support dense populations of small mammals, and thus may harbor relatively robust carrion beetle communities in city parks. In this study, we investigated carrion beetle community composition, abundance and diversity in forest patches along an urban-to-rural gradient spanning the urban core (Central Park, NYC) to outlying rural areas. We conducted an additional study comparing the current carrion beetle community at a single suburban site in Westchester County, NY that was intensively surveyed in the early 1970’s. We collected a total of 2,170 carrion beetles from eight species at 13 sites along this gradient. We report little to no effect of urbanization on carrion beetle diversity, although two species were not detected in any urban parks. Nicrophorus tomentosus was the most abundant species at all sites and seemed to dominate the urban communities, potentially due to its generalist habits and shallower burying depth compared to the other beetles surveyed. Variation between species body size, habitat specialization, and % forest area surrounding the surveyed sites also did not influence carrion beetle communities. Lastly, we found few significant differences in relative abundance of 10 different carrion beetle species between 1974 and 2015 at a single site in Westchester County, NY, although two of the rare species in the early 1970’s were not detected in 2015. These results indicate

  6. Stellar performance: mechanisms underlying Milky Way orientation in dung beetles.

    Science.gov (United States)

    Foster, James J; El Jundi, Basil; Smolka, Jochen; Khaldy, Lana; Nilsson, Dan-Eric; Byrne, Marcus J; Dacke, Marie

    2017-04-05

    Nocturnal dung beetles (Scarabaeus satyrus) are currently the only animals that have been demonstrated to use the Milky Way for reliable orientation. In this study, we tested the capacity of S. satyrus to orient under a range of artificial celestial cues, and compared the properties of these cues with images of the Milky Way simulated for a beetle's visual system. We find that the mechanism that permits accurate stellar orientation under the Milky Way is based on an intensity comparison between different regions of the Milky Way. We determined the beetles' contrast sensitivity for this task in behavioural experiments in the laboratory, and found that the resulting threshold of 13% is sufficient to detect the contrast between the southern and northern arms of the Milky Way under natural conditions. This mechanism should be effective under extremely dim conditions and on nights when the Milky Way forms a near symmetrical band that crosses the zenith. These findings are discussed in the context of studies of stellar orientation in migratory birds and itinerant seals.This article is part of the themed issue 'Vision in dim light'. © 2017 The Author(s).

  7. Is dimethyldecanal a common aggregation pheromone of Tribolium flour beetles?

    Science.gov (United States)

    Arnaud, Ludovic; Lognay, Georges; Verscheure, Marjolaine; Leenaers, Lionel; Gaspar, Charles; Haubruge, Eric

    2002-03-01

    Flour beetles are cosmopolitan and common pests in grain stores and flour mills. Their ability to exploit a wide variety of stored products has contributed to their status as major pests of stored food. Although it was previously reported that the same aggregation pheromone, 4,8-dimethyldecanal (DMD), is shared by three flour beetles species (Tribolium castaneum, T. confusum, and T. freemani), the volatiles released by the other Tribolium species associated with stored products have not yet been examined. In the present study, the volatiles produced by males and females of eight Tribolium species were examined by solid phase microextraction (SPME). SPME samples were analyzed by gas chromatography coupled to mass spectrometry (GC-MS). Experiments were conducted to identify volatiles emitted by the adults of different Tribolium species and to determine whether DMD is a common aggregation pheromone. We observed that DMD is not a common pheromone of the eight species tested, but is common to T. castaneum, T. confusum, T. freemani, and T. madens. Two other volatiles were detected, 1-pentadecene, which is shown here to be a common semiochemical of flour beetles, and 1,6-pentadecadiene, which was detected in five species (T. audax, T. brevicornis, T. destructor, T. freemani, and T. madens).

  8. NUTRITIONAL STUDIES ON THE CONFUSED FLOUR BEETLE, TRIBOLIUM CONFUSUM DUVAL

    Science.gov (United States)

    Chapman, Royal N.

    1924-01-01

    The confused flour beetle (Tribolium confusum) was chosen for this study because it lives in a food which ordinarily contains no living organisms. The death rates are greater in cultures which are handled daily than in those which are not handled but when all are handled alike the results are comparable. The results from experiments with individual beetles in various kinds of flour were plotted with instars (larval stages) on the ordinate and time in days on the abscissa, using the results from control experiments in wheat flour to determine the length of the various instars from an "x = y" formula. The curves of development were found to be straight lines throughout all but the last instar. The curve for the last instar during which the larva transformed deviated from the straight line in certain foods, notably rice flour. When mass cultures were used the death and transformation curves were plotted for each synthetic food. A comparison of the curves from wheat flour and the synthetic foods shows that the first parts of the curves are very much alike in all cases and that a few resemble the control in every respect except that the transformation curve has been moved back for a considerable time. The death curves for the mass cultures are not smooth but show sudden increase in death at approximately the times of molting. These curves may therefore be compared with the records from individual beetles. PMID:19872096

  9. Coffee berry borer joins bark beetles in coffee klatch.

    Directory of Open Access Journals (Sweden)

    Juliana Jaramillo

    Full Text Available Unanswered key questions in bark beetle-plant interactions concern host finding in species attacking angiosperms in tropical zones and whether management strategies based on chemical signaling used for their conifer-attacking temperate relatives may also be applied in the tropics. We hypothesized that there should be a common link in chemical signaling mediating host location by these Scolytids. Using laboratory behavioral assays and chemical analysis we demonstrate that the yellow-orange exocarp stage of coffee berries, which attracts the coffee berry borer, releases relatively high amounts of volatiles including conophthorin, chalcogran, frontalin and sulcatone that are typically associated with Scolytinae chemical ecology. The green stage of the berry produces a much less complex bouquet containing small amounts of conophthorin but no other compounds known as bark beetle semiochemicals. In behavioral assays, the coffee berry borer was attracted to the spiroacetals conophthorin and chalcogran, but avoided the monoterpenes verbenone and α-pinene, demonstrating that, as in their conifer-attacking relatives in temperate zones, the use of host and non-host volatiles is also critical in host finding by tropical species. We speculate that microorganisms formed a common basis for the establishment of crucial chemical signals comprising inter- and intraspecific communication systems in both temperate- and tropical-occurring bark beetles attacking gymnosperms and angiosperms.

  10. Bacterial and fungal symbionts of parasitic Dendroctonus bark beetles.

    Science.gov (United States)

    Dohet, Loïc; Grégoire, Jean-Claude; Berasategui, Aileen; Kaltenpoth, Martin; Biedermann, Peter H W

    2016-09-01

    Bark beetles (Curculionidae: Scolytinae) are one of the most species-rich herbivorous insect groups with many shifts in ecology and host-plant use, which may be mediated by their bacterial and fungal symbionts. While symbionts are well studied in economically important, tree-killing species, little is known about parasitic species whose broods develop in living trees. Here, using culture-dependent and independent methods, we provide a comprehensive overview of the associated bacteria, yeasts and filamentous fungi of the parasitic Dendroctonus micans, D. punctatus and D. valens, and compare them to those of other tree-inhabiting insects. Despite inhabiting different geographical regions and/or host trees, the three species showed similar microbial communities. Enterobacteria were the most prevalent bacteria, in particular Rahnella, Pantoea and Ewingella, in addition to Streptomyces Likewise, the yeasts Candida/Cyberlindnera were the most prominent fungi. All these microorganisms are widespread among tree-inhabiting insects with various ecologies, but their high prevalence overall might indicate a beneficial role such as detoxification of tree defenses, diet supplementation or protection against pathogens. As such, our results enable comparisons of symbiont communities of parasitic bark beetles with those of other beetles, and will contribute to our understanding of how microbial symbioses facilitate dietary shifts in insects.

  11. DETECTION OF DRUGSTORE BEETLES IN 9975 PACKAGES USING ACOUSTIC EMISSIONS

    Energy Technology Data Exchange (ETDEWEB)

    Shull, D.

    2013-03-04

    This report documents the initial feasibility tests performed using a commercial acoustic emission instrument for the purpose of detecting beetles in Department of Energy 9975 shipping packages. The device selected for this testing was a commercial handheld instrument and probe developed for the detection of termites, weevils, beetles and other insect infestations in wooden structures, trees, plants and soil. The results of two rounds of testing are presented. The first tests were performed by the vendor using only the hand-held instrument’s indications and real-time operator analysis of the audio signal content. The second tests included hands-free positioning of the instrument probe and post-collection analysis of the recorded audio signal content including audio background comparisons. The test results indicate that the system is promising for detecting the presence of drugstore beetles, however, additional work would be needed to improve the ease of detection and to automate the signal processing to eliminate the need for human interpretation. Mechanisms for hands-free positioning of the probe and audio background discrimination are also necessary for reliable detection and to reduce potential operator dose in radiation environments.

  12. Rove beetles of medical importance in Brazil (Coleoptera, Staphylinidae, Paederinae

    Directory of Open Access Journals (Sweden)

    Juliana S. Vieira

    2014-09-01

    Full Text Available Rove beetles of medical importance in Brazil (Coleoptera, Staphylinidae, Paederinae. The rove beetles of the genus Paederus Fabricius, 1775 are the most important group within Coleoptera causing dermatitis around the world. The medical importance of Paederus depends on its toxic hemolymph released when these beetles are crushed on human skin. The effects are mainly dermatitis linearis and some sporadic cases of conjunctivitis. In Brazil seven species of Paederus are known to cause dermatitis: P. amazonicus Sharp, 1876, P. brasiliensis Erichson, 1840, P. columbinus Laporte, 1835, P. ferus Erichson, 1840, P. mutans Sharp, 1876, P. protensus Sharp, 1876 stat. rev., and Paederus rutilicornis Erichson, 1840. Paederus mutans and P. protensus are for the first time recorded as of medical importance, whereas the record of P. rutilicornis in Brazil is doubtful. All seven species are redescribed and a dichotomous key is provided. The geographic distributions of all species are documented. The results provided here include the most recent and relevant taxonomic revision of Paederus of the Neotropical region, the first identification key for Brazilian species and the increase of recorded species of medical importance in the world.

  13. 图像隐藏算法的MATLAB实现%Realization of image hiding algorithm based on MATLAB

    Institute of Scientific and Technical Information of China (English)

    宫海梅

    2016-01-01

    根据HVS的特性,人类视觉系统对高位信号敏感,去掉图像最低几个位并不会造成画面质量的明显下降,视觉系统就无法感觉到信号的存在,提出了四比特图像信息替换算法实现图像隐藏,运用MATLAB软件进行算法实现,嵌入信息后的载体图像与原始图像视觉效果基本一致,有效解决了图像信息隐藏问题。%According to the characteristics of HVS, The human visual system is sensitive to the high signal. To remove the image of the least number of bits does not cause a significant decline in the quality of picture, the visual system can not feel the existence of the signal. In this paper, four bit image information replacement algorithm is proposed to realize the image hiding, MATLAB software is used to realize the algorithm. The carrier image after embedding information is basically consistent with the original image, effectively solve the problem of image information hiding.

  14. A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding

    CERN Document Server

    Dey, Sandipan; Sane, Suneeta; Sanyal, Sugata

    2010-01-01

    In this paper, we suggest a lower and an upper bound for the Generalized Fibonacci-p-Sequence, for ?different values of p. The Fibonacci-p-Sequence is a generalization of the Classical Fibonacci Sequence. We ?first show that the ratio of two consecutive terms in generalized Fibonacci sequence converges to a p-degree polynomial and then use this result to prove the bounds for generalized Fibonacci-p sequence, thereby generalizing the exponential bounds for classical Fibonacci Sequence. Then we show how these results can be used to prove efficiency for data hiding techniques using generalized Fibonacci sequence. These steganographic techniques use generalized Fibonacci-p-Sequence for increasing number available of bit-planes to hide data, so that more and more data can be hidden into the higher bit-planes of any pixel without causing much distortion of the cover image. This bound can be used as a theoretical proof for efficiency of those techniques, for instance it explains why more and more data can be hidden ...

  15. An Internal Data Non-hiding Type Real-time Kernel and its Application to the Mechatronics Controller

    Science.gov (United States)

    Yoshida, Toshio

    For the mechatronics equipment controller that controls robots and machine tools, high-speed motion control processing is essential. The software system of the controller like other embedded systems is composed of three layers software such as real-time kernel layer, middleware layer, and application software layer on the dedicated hardware. The application layer in the top layer is composed of many numbers of tasks, and application function of the system is realized by the cooperation between these tasks. In this paper we propose an internal data non-hiding type real-time kernel in which customizing the task control is possible only by change in the program code of the task side without any changes in the program code of real-time kernel. It is necessary to reduce the overhead caused by the real-time kernel task control for the speed-up of the motion control of the mechatronics equipment. For this, customizing the task control function is needed. We developed internal data non-cryptic type real-time kernel ZRK to evaluate this method, and applied to the control of the multi system automatic lathe. The effect of the speed-up of the task cooperation processing was able to be confirmed by combined task control processing on the task side program code using an internal data non-hiding type real-time kernel ZRK.

  16. Pre-treatment assemblages of wood-boring beetles (Coleoptera: Buprestidae, Cerambycidae) of the hardwood ecosystem experiment

    Science.gov (United States)

    Jeffrey D. Holland; John T. Shukle; Hossam Eldien M. Abdel Moniem; Thomas W. Mager; Kapil R. Raje; Kyle Schnepp; Shulin. Yang

    2013-01-01

    Longhorned beetles are a diverse and important group of insects in forest ecosystems; several species attack weakened or stressed trees, relatively few attack healthy trees, and most species use only dead and decomposing wood. We surveyed longhorned beetles and metallic wood-boring beetles using four different types of traps at 36 Hardwood Ecosystem Experiment (Indiana...

  17. Entomopathogenic fungi in predatory beetles (Col: Carabidae and Staphylinidae) from agricultural fields

    DEFF Research Database (Denmark)

    Steenberg, T; Langer, V; Esbjerg, P

    1995-01-01

    Prevalence of entomopathogenic fungi was studied in overwintering ground beetles (Col.: Carabidae) and rove beetles (Col.: Staphylinidae) collected from fields of lucerne, white cabbage and white cabbage undersown with white clover. In general infection levels in adult ground beetles and rove bee...... (Zygomycetes: Entomophthorales). Two individuals of Anotylus rugosus were found to have a dual infection of Zoophthora philonthi and Beauveria bassiana...

  18. Natural flightless morphs of the ladybird beetle Adalia bipunctata improve biological control of aphids on single plants

    NARCIS (Netherlands)

    Lommen, S.T.E.; Middendorp, C.W.; Luijten, C.A.; Schelt, van J.; Brakefield, P.M.; Jong, de P.W.

    2008-01-01

    The challenge of using ladybird beetles for biological control of insect pests such as aphids is that the adult beetles tend to fly away from the host plants. Therefore, flightless ladybirds might improve biocontrol. There are several artificial ways to obtain flightless beetles, but it may be prefe

  19. Predicting live and dead basal area in bark beetle-affected forests from discrete-return LiDAR

    Science.gov (United States)

    Andrew T. Hudak; Ben Bright; Jose Negron; Robert McGaughey; Hans-Erik Andersen; Jeffrey A. Hicke

    2012-01-01

    Recent bark beetle outbreaks in western North America have been widespread and severe. High tree mortality due to bark beetles affects the fundamental ecosystem processes of primary production and decomposition that largely determine carbon balance (Kurz et al. 2008, Pfeifer et al. 2011, Hicke et al. 2012). Forest managers need accurate data on beetle-induced tree...

  20. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2010-12-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  1. Tribolium confusum (confused flour beetle, rice flour beetle)--an occupational allergen in bakers: demonstration of IgE antibodies.

    Science.gov (United States)

    Schultze-Werninghaus, G; Zachgo, W; Rotermund, H; Wiewrodt, R; Merget, R; Wahl, R; Burow, G; zur Strassen, R

    1991-01-01

    Specific IgE to proteins from Tribolium confusum (TC), a flour beetle, was detected in 9/125 sera of subjects exposed to rye and wheat flour. TC RAST was not inhibited by Dermatophagoides pteronyssinus, rye or wheat flour. Immunoblot experiments showed specific binding to three proteins from adult TC or pupae, not present in rye or wheat flour. These findings suggest that TC might act as an occupational allergen in a proportion of bakers.

  2. Improving the microbiological safety of veal: validation of hot water rinse plus lactic acid spray in combination with scalding for hide-on carcasses to control Shiga-toxin producing Escherichia coli (STEC)

    Science.gov (United States)

    Bob veal calves (n=6) were assigned to six hide-on carcass treatments for each of 5 replications. Primary treatments were no-scald, scald, or scalding with chemical; secondary treatments were no-treatment control or lactic acid. Hides were inoculated with non-pathogenic rifampicin-resistant Escheric...

  3. Assessing meteorological key factors influencing crop invasion by pollen beetle (

    Directory of Open Access Journals (Sweden)

    Jürgen Junk

    2016-09-01

    Full Text Available The pollen beetle, Meligethes aeneus F. (Coleoptera: Nitidulidae, is a severe pest of winter oilseed rape. A phenological model to forecast the first spring invasion of crops in Luxembourg by M. aeneus was developed in order to provide a tool for improving pest management and for assessing the potential effects of climate change on this pest. The model was derived using long-term, multi-site observational datasets of pollen beetle migration and meteorological data, as the timing of crop invasion is determined mainly by meteorological variables. Daily values of mean air and soil temperature, accumulated sunshine duration and precipitation were used to create a threshold-based model to forecast crop invasion. Minimising of the root mean squared error (RMSE of predicted versus observed migration dates was used as the quality criterion for selecting the optimum combination of threshold values for meteorological variables. We identified mean air temperature 8.0 °C, mean soil temperature 4.6 °C, and sunshine duration of 3.4 h as the best threshold values, with a cut-off of 1 mm precipitation and with no need for persistence of those conditions for more than one day (RMSE=9.3days$RMSE=9.3\\,\\text{days}$. Only in six out of 30 cases, differences between observed and predicted immigration dates were >5$>5$ days. In the future, crop invasion by pollen beetles will probably be strongly affected by changes in air temperature and precipitation related to climate change. We used a multi-model ensemble of 15 regional climate models driven by the A1B emission scenario to assess meteorological changes in two 30‑year future periods, near future (2021–2050 and far future (2069–2098 in comparison with the reference period (1971–2000. Air temperature and precipitation were predicted to increase in the first three months of each year, both in the near future and the far future. The pollen beetle migration model indicated that this change would

  4. Infection of Tribolium beetles with a tapeworm: variation in susceptibility within and between beetle species and among genetic strains.

    Science.gov (United States)

    Yan, G; Norman, S

    1995-02-01

    Host susceptibility and resistance to parasites are often hypothesized to be genetically variable traits. We tested 2 species of Tribolium flour beetles for among-strain variation in susceptibility to the rat tapeworm Hymenolepis diminuta. Twelve genetic strains of Tribolium confusum and 11 strains of Tribolium castaneum were examined. We found T. castaneum was more susceptible to the tapeworm than T. confusum. There was significant among-strain and between-sex variation for both beetle species in infection intensity and prevalence. Among-vial variation was marginally significant. These results add to evidence that host susceptibility to a parasite is a genetically variable trait. We view these results as important findings for understanding natural selection on host-parasite interactions. Traits that are genetically variable can respond to natural selection. Thus, if a beetle's susceptibility to the tapeworm is correlated with fitness and heritable, susceptibility can evolve. Susceptibility is likely to be pleiotropic and have important consequences on issues ranging from parasite transmission to host species interactions and community structure.

  5. Prey preference and host suitability of the predatory and parasitoid carabid beetle, Lebia grandis, for several species of Leptinotarsa beetles.

    Science.gov (United States)

    Weber, Donald C; Rowley, Daniel L; Greenstone, Matthew H; Athanas, Michael M

    2006-01-01

    Lebia grandis (Coleoptera: Carabidae), recorded as a parasitoid only on Colorado potato beetle, Leptinotarsa decemlineata (Coleoptera: Chrysomelidae), is capable of parasitizing the false potato beetle, L. juncta, and also L. haldemani. Historical records show that L. decemlineata, while the only recorded host, was not present in much of the original range of L. grandis, and may not have been its host prior to its expansion into eastern North America, where L. juncta is endemic. Our laboratory comparisons suggest that L. juncta, the presumptive original host, best supports the development of the parasitoid larval L. grandis, based on 43.6% successful emergence of the adult carabid parasitoid, compared to 11.5% from the two other Leptinotarsa species. L. grandis adults accept eggs and larvae of all 3 Leptinotarsa species as adult food. Naive, newly-emerged adults show no preference when presented the 3 species of third-instar larvae, which they consume at a mean rate of 3.3 per day, a rate which does not differ significantly by sex, larval host, or weight at emergence. When presented with equal amounts by weight of the 3 species of Leptinotarsa eggs, such adults consume the equivalent of 23.0 L. decemlineata eggs per day, with consumption of L. juncta eggs 67% higher by weight than L. decemlineata consumption. Insight into the biotic and abiotic limitations on L. grandis should aid in determining its potential for suppression of Colorado potato beetle by biological control in diverse agroecosystems.

  6. Mountain pine beetle in high-elevation five-needle white pine ecosystems

    Science.gov (United States)

    Barbara Bentz; Elizabeth Campbell; Ken Gibson; Sandra Kegley; Jesse Logan; Diana Six

    2011-01-01

    Across western North America mountain pine beetle, Dendroctonus ponderosae (Coleoptera: Curculionidae, Scolytinae), populations are growing at exponential rates in pine ecosystems that span a wide range of elevations. As temperature increased over the past several decades, the flexible, thermally-regulated life-history strategies of mountain pine beetle have allowed...

  7. Effectiveness of hand removal for small-scale management of Japanese beetles (Coleoptera: Scarabaeidae).

    Science.gov (United States)

    Switzer, Paul V; Cumming, Ryan M

    2014-02-01

    Hand removal is often recommended as a method for small-scale control of Japanese beetles (Popillia japonica Newman). In this study, we investigated the effectiveness of daily hand removal for controlling damage by Japanese beetles on grape plants. We also investigated whether the timing of the removal (at 0800, 1400, or 1900 hours, or at all 3 periods) influenced the effectiveness of the technique. We found that hand removal significantly lowered the number of beetles on, and consequently the damage to, grape plants relative to nonremoval controls. Of the single removal treatments, removal of beetles at 1900 hours was most effective, with results similar to removing beetles three times per day. The majority of beetles removed from plants during the experiment were female, a pattern that matches our understanding of aggregation formation behavior in the species, and which may serve to enhance the benefits of hand removal. Hand removal seems to work by decreasing the number of feeding beetles, which in turn reduces the release of aggregation kairomones from the plant, and subsequently decreases the attractiveness of the plant to future beetles.

  8. Factors influencing bark beetle outbreaks after forest fires on the Iberian Peninsula.

    Science.gov (United States)

    Lombardero, María J; Ayres, Matthew P

    2011-10-01

    Fires are among the most globally important disturbances in forest ecosystems. Forest fires can be followed by bark beetle outbreaks. Therefore, the dynamic interactions between bark beetle outbreaks and fire appear to be of general importance in coniferous forests throughout the world. We tested three hypotheses of how forest fires in pine ecosystems (Pinus pinaster Alton and P. radiata D. Don) in Spain could alter the population dynamics of bark beetles and influence the probability of further disturbance from beetle outbreaks: fire could affect the antiherbivore resin defenses of trees, change their nutritional suitability, or affect top-down controls on herbivore populations. P. radiata defenses decreased immediately after fire, but trees with little crown damage soon recovered with defenses higher than before. Fire either reduced or did not affect nutritional quality of phloem and either reduced or had no effect on the abundance, diversity, and relative biomass of natural enemies. After fire, bark beetle abundance increased via rapid aggregation of reproductive adults on scorched trees. However, our results indicate that for populations to increase to an outbreak situation, colonizing beetles must initiate attacks before tree resin defenses recover, host trees must retain enough undamaged phloem to facilitate larval development, and natural enemies should be sufficiently rare to permit high beetle recruitment into the next generation. Coincidence of these circumstances may promote the possibility of beetle populations escaping to outbreak levels.

  9. Chemical ecology and serendipity: Developing attractants for Florida ambrosia beetle pests.

    Science.gov (United States)

    Two exotic ambrosia beetles have become established in southern Florida: Xyleborus glabratus, the redbay ambrosia beetle (RAB), and Euwallacea fornicatus, the tea shot hole borer (TSHB). Both pests vector pathogenic fungal symbionts; the former for laurel wilt and the latter for Fusarium dieback d...

  10. Integrating kaolin clay for ambrosia beetle (Coleoptera: Curculionidae: Scolytinae) management in ornamental tree nurseries

    Science.gov (United States)

    Abstract Invasive ambrosia beetles (Coleoptera: Curculionidae) are an important pest problem at ornamental tree nurseries. Available chemical measures are not completely effective, and due to the length of the beetle dispersal period and product breakdown, repeated treatments can become costly in ...

  11. Inquiry-based Investigation in Biology Laboratories: Does Neem Provide Bioprotection against Bean Beetles?

    Science.gov (United States)

    Pearce, Amy R.; Sale, Amanda Lovelace; Srivatsan, Malathi; Beck, Christopher W.; Blumer, Lawrence S.; Grippo, Anne A.

    2013-01-01

    We developed an inquiry-based biology laboratory exercise in which undergraduate students designed experiments addressing whether material from the neem tree ("Azadirachta indica") altered bean beetle ("Callosobruchus maculatus") movements and oviposition. Students were introduced to the bean beetle life cycle, experimental…

  12. A foam formulation of an entomopathogenic fungus for control of boring beetles in avocado orchards

    Science.gov (United States)

    A foam formulation of Beauveria bassiana was adapted to control boring beetles in avocado orchards. The two geographically independent avocado growing areas in the United States are threatened by emerging diseases vectored by boring beetles. In the California growing region, Fusarium dieback is vect...

  13. Longevity and viability of Taenia solium eggs in the digestive system of the beetle Ammophorus rubripes

    Directory of Open Access Journals (Sweden)

    Luis Antonio Gomez-Puerta

    Full Text Available The present study evaluated the capacity of Ammophorus rubripes beetles to carry Taenia solium eggs, in terms of duration and viability of eggs in their digestive system. One hundred beetles were distributed into five polyethylene boxes, and then they were infected with T. solium eggs. Gravid proglottids of T. solium were crushed and then mixed with cattle feces. One gram of this mixture was placed in each box for 24 hours, after which each group of beetles was transferred into a new clean box. Then, five beetles were dissected every three days. Time was strongly associated with viability (r=0.89; P<0.001 and the calculated time to cero viability is 36 days. The eggs in the intestinal system of each beetle were counted and tested for viability. Taenia solium eggs were present in the beetle's digestive system for up to 39 days (13th sampling day out of 20, gradually reducing in numbers and viability, which was 0 on day 36 post-infection. Egg viability was around 40% up to day 24 post-infection, with a median number of eggs of 11 per beetle at this time. Dung beetles may potentially contribute towards dispersing T. solium eggs in endemic areas.

  14. A Phloem Sandwich Unit for Observing Bark Beetles, Associated Predators, and Parasites

    Science.gov (United States)

    Donald N. Kim; Mitchel C. Miller

    1981-01-01

    This paper describes a phloem sandwich that allows observation of parent beetles, their brood, and associates within the inner bark, and permits observation of predator and parasite behavior on the bark surface. The construction of the unit permits the introduction of multiple pairs of beetles into a single sandwich.

  15. Hilltopping on termitaries by the Indochinese tiger beetle, Heptodonta analis (Cincindelidae)

    Institute of Scientific and Technical Information of China (English)

    WILLIAMH.SCHAEDLA

    2005-01-01

    Spot surveys conducted during the early part of the monsoon season in northeastern Thailand indicated territorial hilltopping on termitaries by the tiger beetle,Heptodonta analis. Such behavior has not been reported for this genus. Unlike other tiger beetles, H. analis may take advantage of termitaries adventitiously, without specializing on them.

  16. Analysis of cellulase and polyphenol oxidase production by southern pine beetle associated fungi

    Science.gov (United States)

    Abduvali Valiev; Zumrut B. Ogel; Dier D. Klepzig

    2009-01-01

    In this study, the production of extracellular enzymes by fungi associated with southern pine beetle was investigated for the first time. Cellulase and polyphenol oxidase production were analyzed for three beetle associated fungi. Only the mutualistic symbiont Entomocorticium sp. A was found to produce cellulases and polyphenol oxidase....

  17. Genetic differentiation between resistance phenotypes in the phytophagous flea beetle, Phyllotreta nemorum

    NARCIS (Netherlands)

    Jong, de P.W.; Breuker, C.J.; Vos, de H.; Vermeer, K.M.C.A.; Oku, K.; Verbaarschot, P.G.H.; Nielsen, J.K.; Brakefield, P.M.

    2009-01-01

    The flea beetle Phyllotreta nemorum L. (Coleoptera: Chrysomelidae) is genetically polymorphic for resistance against the defences of one of its host plants, Barbarea vulgaris R.Br. (Brassicales: Brassicaceae). Whereas resistant flea beetles are able to use B. vulgaris as well as other cruciferous pl

  18. Biological Aspects for Forecasting of the Cabbage Stem Flea Beetle, Psylliodes chrysocephala L

    DEFF Research Database (Denmark)

    Mathiasen, Helle

    Summary The cabbage stem flea beetle (CSFB), Psylliodes chrysocephala L. (Coleoptera: Chrysomelidae), is a serious pest in winter oilseed rape (WOSR) Brassica napus L. with variation in abundance and damage between years. The adult beetles invade fields at the time of crop emergence and cause...

  19. Effectiveness of insecticide-incorporated bags to control stored-product beetles

    Science.gov (United States)

    Adults of seven stored-product beetle species were exposed on the inside and outside surfaces of polypropylene polymer bags incorporated with the insecticide deltamethrin (approx. concentration of 3,000 ppm; ZeroFly® Storage Bags (3g/kg). Beetles were exposed for 60, 120, and 180 min, and 1, 3 and 5...

  20. Got Dung? Resource Selection by Dung Beetles in Neotropical Forest Fragments and Cattle Pastures.

    Science.gov (United States)

    Bourg, A; Escobar, F; MacGregor-Fors, I; Moreno, C E

    2016-10-01

    Both the impact of habitat modification on the food preferences of species and its impact on ecosystem functioning are poorly understood. In this study, we analyzed food selection by dung beetles in 80 tropical forest fragments and their adjacent cattle pastures in the Los Tuxtlas Biosphere Reserve, Mexico. Ten pitfall traps were placed at each site, half baited with human dung and the other half with fish carrion. We assessed dung beetle food selection and classified any specialization in resource use quantitatively using a multinomial classification model. We collected 15,445 beetles belonging to 42 species, 8747 beetles (38 species) in forest fragments and 6698 beetles (29 species) in cattle pastures. Twenty-five species were present in both habitats. Of all the beetles captured, 76% were caught in dung traps (11,727 individuals) and 24% in carrion traps (3718 individuals). We found 21 species of dung specialists, 7 carrion specialists, 8 generalists, and 6 species too rare to classify. The bait most frequently selected by beetles in this study was dung in both forests and pastures. Specialists tended to remain specialists in both habitats, while generalists tended to change their selection of bait type depending on the habitat. In summary, our results show that replacing forests with cattle pastures modifies the patterns of resource selection by dung beetles and this could affect ecosystem functioning.

  1. Traditional African plant products to protect stored cowpeas against insect damage : the battle against the beetle

    NARCIS (Netherlands)

    Boeke, S.J.

    2002-01-01

    Seeds of the cowpea plant, Vigna unguiculata , a tropical crop, are very susceptible to attack by the cowpea beetle. This specialist beetle needs only the beans to reproduce rapidly.Most farmers in West Africa have few possibilities to treat the beans and they face their stored supply

  2. Diesel fuel oil for increasing mountain pine beetle mortality in felled logs

    Science.gov (United States)

    S. A. Mata; J. M. Schmid; D. A. Leatherman

    2002-01-01

    Diesel fuel oil was applied to mountain pine beetle (Dendroctonus ponderosae Hopkins) infested bolts of ponderosa pine (Pinus ponderosa Lawson) in early June. Just prior to the fuel oil application and 6 weeks later, 0.5 ft2 bark samples were removed from each bolt and the numbers of live beetles counted....

  3. Jumping without using legs: the jump of the click-beetles (Elateridae is morphologically constrained.

    Directory of Open Access Journals (Sweden)

    Gal Ribak

    Full Text Available To return to their feet, inverted click-beetles (Elateridae jump without using their legs. When a beetle is resting on its dorsal side, a hinge mechanism is locked to store elastic energy in the body and releases it abruptly to launch the beetle into the air. While the functional morphology of the jumping mechanism is well known, the level of control that the beetle has over this jumping technique and the mechanical constraints governing the jumps are not entirely clear. Here we show that while body rotations in air are highly variable, the jumps are morphologically constrained to a constant "takeoff" angle (79.9°±1.56°, n = 9 beetles that directs 98% of the jumping force vertically against gravity. A physical-mathematical model of the jumping action, combined with measurements from live beetle, imply that the beetle may control the speed at takeoff but not the jumping angle. In addition, the model shows that very subtle changes in the exact point of contact with the ground can explain the vigorous rotations of the body seen while the beetle is airborne. These findings suggest that the evolution of this unique non-legged jumping mechanism resulted in a jumping technique that is capable of launching the body high into the air but it is too constrained and unstable to allow control of body orientation at landing.

  4. Estimating the probability of mountain pine beetle red-attack damage

    Science.gov (United States)

    Michael A Wulder; J. C. White; Barbara J Bentz; M. F. Alvarez; N. C. Coops

    2006-01-01

    Accurate spatial information on the location and extent of mountain pine beetle infestation is critical for the planning of mitigation and treatment activities. Areas of mixed forest and variable terrain present unique challenges for the detection and mapping of mountain pine beetle red-attack damage, as red-attack has a more heterogeneous distribution under these...

  5. Bark beetles and fungal associates colonizing white spruce in the Great Lakes region.

    Science.gov (United States)

    Kirsten E. Haberkern; Barbara L. Illman; Kenneth F. Raffa

    2002-01-01

    We examined the major bark beetles and associated fungi colonizing subcortical tissues of white spruce (Picea glauca (Moench) Voss) in the Great Lakes region. Trees were felled at one northwestern Wisconsin site in a preliminary study in 1997 and at 10 sites throughout northern Wisconsin, Minnesota, and Michigan in 1998. Fungal isolations were made from beetles...

  6. Genetics and characteristics of a pigmentation defective laboratory strain of the lady beetle, Coleomegilla maculata

    Science.gov (United States)

    Beetles in the family Coccinellidae, commonly known as ladybugs, lady beetles, or ladybirds, are easily identifiable and popular beneficial insects. The species complex Coleomegilla maculata is commonly found in North American agroecosystems and widespread on the North American continent. It is impo...

  7. A system for harvesting eggs from the pink-spotted lady beetle

    Science.gov (United States)

    We describe a system for harvesting eggs from a predatory insect, the pink spotted lady beetle. Coleomegilla maculata De Geer (Coleoptera: Coccinellidae). Adult beetles placed in square transparent containers that included oviposition substrates hanging from the top of the cage deposited eggs on t...

  8. Evaluation of traps used to monitor southern pine beetle aerial populations and sex ratios

    Science.gov (United States)

    James T. Cronin; Jane L. Hayes; Peter. Turchin

    2000-01-01

    Various kinds of traps have been employed to monitor and forecast population trends of the southern pine beetle (Dendroctonus frontalis Zimmermann; Coleoptera: Scolytidae), but their accuracy in assessing pine-beetle abundance and sex ratio in the field has not been evaluated directly.In trus study, we...

  9. Traditional African plant products to protect stored cowpeas against insect damage : the battle against the beetle

    NARCIS (Netherlands)

    Boeke, S.J.

    2002-01-01

    Seeds of the cowpea plant, Vigna unguiculata , a tropical crop, are very susceptible to attack by the cowpea beetle. This specialist beetle needs only the beans to reproduce rapidly.

    Most farmers in West Africa have few

  10. Significantly higher Carabid beetle (Coleoptera: Carabidae) catch in conventionally than in organically managed Christmas tree plantations

    DEFF Research Database (Denmark)

    Bagge, Søren; Lund, Malthe; Rønn, Regin;

    2012-01-01

    Carabid beetles play an important role as consumers of pest organisms in forestry and agriculture. Application of pesticides may negatively affect abundance and activity of carabid beetles, thus reducing their potential beneficial effect. We investigated how abundance and diversity of pitfall...

  11. Linking Increasing Drought Stress to Scots Pine Mortality and Bark Beetle Infestations

    Directory of Open Access Journals (Sweden)

    Matthias Dobbertin

    2007-01-01

    Full Text Available In the dry Swiss Rhone Valley, Scots pine forests have experienced increased mortality in recent years. It has commonly been assumed that drought events and bark beetles fostered the decline, however, whether bark beetle outbreaks increased in recent years and whether they can be linked to drought stress or increasing temperature has never been studied.

  12. Biogeochemistry of beetle-killed forests: Explaining a weak nitrate response

    Science.gov (United States)

    Charles C. Rhoades; James H. McCutchan; Leigh A. Cooper; David Clow; Thomas M. Detmer; Jennifer S. Briggs; John D. Stednick; Thomas T. Veblen; Rachel M. Ertz; Gene E. Likens; William M. Lewis

    2013-01-01

    A current pine beetle infestation has caused extensive mortality of lodgepole pine (Pinus contorta) in forests of Colorado and Wyoming; it is part of an unprecedented multispecies beetle outbreak extending from Mexico to Canada. In United States and European watersheds, where atmospheric deposition of inorganic N is moderate to low (<10 kg�ha�y), disturbance of...

  13. Jumping mechanisms and performance in beetles. I. Flea beetles (Coleoptera: Chrysomelidae: Alticini).

    Science.gov (United States)

    Nadein, Konstantin; Betz, Oliver

    2016-07-01

    The present study analyses the anatomy, mechanics and functional morphology of the jumping apparatus, the performance and the kinematics of the natural jump of flea beetles (Coleoptera: Chrysomelidae: Galerucinae: Alticini). The kinematic parameters of the initial phase of the jump were calculated for five species from five genera (average values from minimum to maximum): acceleration 0.91-2.25 (×10(3)) m s(-2), velocity 1.48-2.80 m s(-1), time to take-off 1.35-2.25 ms, kinetic energy 2.43-16.5 µJ, G: -force 93-230. The jumping apparatus is localized in the hind legs and formed by the femur, tibia, femoro-tibial joint, modified metafemoral extensor tendon, extensor ligament, tibial flexor sclerite, and extensor and flexor muscles. The primary role of the metafemoral extensor tendon is seen in the formation of an increased attachment site for the extensor muscles. The rubber-like protein resilin was detected in the extensor ligament, i.e. a short, elastic element connecting the extensor tendon with the tibial base. The calculated specific joint power (max. 0.714 W g(-1)) of the femoro-tibial joint during the jumping movement and the fast full extension of the hind tibia (1-3 ms) suggest that jumping is performed via a catapult mechanism releasing energy that has beforehand been stored in the extensor ligament during its stretching by the extensor muscles. In addition, the morphology of the femoro-tibial joint suggests that the co-contraction of the flexor and the extensor muscles in the femur of the jumping leg is involved in this process.

  14. Colours and metallic sheen in beetle shells - A biomimetic search for material structuring principles causing light interference

    DEFF Research Database (Denmark)

    Lenau, Torben Anker; Barfoed, Michael

    2008-01-01

    are long lasting as some of the beetles we have studied at the zoological museum are more than 200 years old and have colours and brightness as if they were still alive. Furthermore, the beetles in nature are part of sustainable ecosystems, which means that they are made from renewable materials...... that are broken down and recycled when the beetle dies. Beetles also possess another and very attractive property: Their metallic look originates from structures in organic materials which is both electrically and thermal insulating. The industrial perspective is to be able to manufacture products with attractive...... industrially manufactured beetle-like surfaces with properties such as sustainability, aesthetics, insulation, durability etc....

  15. Fighting while parasitized: can nematode infections affect the outcome of staged combat in beetles?

    Science.gov (United States)

    Vasquez, David; Willoughby, Anna; Davis, Andrew K

    2015-01-01

    The effects of non-lethal parasites may be felt most strongly when hosts engage in intense, energy-demanding behaviors. One such behavior is fighting with conspecifics, which is common among territorial animals, including many beetle species. We examined the effects of parasites on the fighting ability of a saproxylic beetle, the horned passalus (Odontotaenius disjunctus, Family: Passalidae), which is host to a non-lethal nematode, Chondronema passali. We pitted pairs of randomly-chosen (but equally-weighted) beetles against each other in a small arena and determined the winner and aggression level of fights. Then we examined beetles for the presence, and severity of nematode infections. There was a non-significant tendency (p = 0.065) for the frequency of wins, losses and draws to differ between beetles with and without C. passali; non-parasitized individuals (n = 104) won 47% of their fights while those with the parasite (n = 88) won 34%, a 13% difference in wins. The number of nematodes in a beetle affected the outcome of fights between infected and uninfected individuals in an unexpected fashion: fighting ability was lowest in beetles with the lowest (p = 0.033), not highest (p = 0.266), nematode burdens. Within-fight aggression was highest when both beetles were uninfected and lowest when both were infected (p = 0.034). Collectively, these results suggest the nematode parasite, C. passali, is associated with a modest reduction in fighting ability in horned passalus beetles, consistent with the idea that parasitized beetles have lower energy available for fighting. This study adds to a small but growing body of evidence showing how parasites negatively influence fighting behavior in animals.

  16. Fighting while parasitized: can nematode infections affect the outcome of staged combat in beetles?

    Directory of Open Access Journals (Sweden)

    David Vasquez

    Full Text Available The effects of non-lethal parasites may be felt most strongly when hosts engage in intense, energy-demanding behaviors. One such behavior is fighting with conspecifics, which is common among territorial animals, including many beetle species. We examined the effects of parasites on the fighting ability of a saproxylic beetle, the horned passalus (Odontotaenius disjunctus, Family: Passalidae, which is host to a non-lethal nematode, Chondronema passali. We pitted pairs of randomly-chosen (but equally-weighted beetles against each other in a small arena and determined the winner and aggression level of fights. Then we examined beetles for the presence, and severity of nematode infections. There was a non-significant tendency (p = 0.065 for the frequency of wins, losses and draws to differ between beetles with and without C. passali; non-parasitized individuals (n = 104 won 47% of their fights while those with the parasite (n = 88 won 34%, a 13% difference in wins. The number of nematodes in a beetle affected the outcome of fights between infected and uninfected individuals in an unexpected fashion: fighting ability was lowest in beetles with the lowest (p = 0.033, not highest (p = 0.266, nematode burdens. Within-fight aggression was highest when both beetles were uninfected and lowest when both were infected (p = 0.034. Collectively, these results suggest the nematode parasite, C. passali, is associated with a modest reduction in fighting ability in horned passalus beetles, consistent with the idea that parasitized beetles have lower energy available for fighting. This study adds to a small but growing body of evidence showing how parasites negatively influence fighting behavior in animals.

  17. Sapwood Stored Resources Decline in Whitebark and Lodgepole Pines Attacked by Mountain Pine Beetles (Coleoptera: Curculionidae).

    Science.gov (United States)

    Lahr, Eleanor C; Sala, Anna

    2016-12-01

    Recent outbreaks of forest insects have been directly linked to climate change-induced warming and drought, but effects of tree stored resources on insects have received less attention. We asked whether tree stored resources changed following mountain pine beetle (Dendroctonus ponderosae Hopkins) attack and whether they affected beetle development. We compared initial concentrations of stored resources in the sapwood of whitebark pine (Pinus albicaulis Engelmann) and lodgepole pine (Pinus contorta Douglas ex. Louden) with resource concentrations one year later, in trees that were naturally attacked by beetles and trees that remained unattacked. Beetles did not select host trees based on sapwood resources-there were no consistent a priori differences between attacked versus unattacked trees-but concentrations of nonstructural carbohydrate (NSC), lipids, and phosphorus declined in attacked trees, relative to initial concentrations and unattacked trees. Whitebark pine experienced greater resource declines than lodgepole pine; however, sapwood resources were not correlated with beetle success in either species. Experimental manipulation confirmed that the negative effect of beetles on sapwood and phloem NSC was not due to girdling. Instead, changes in sapwood resources were related to the percentage of sapwood with fungal blue-stain. Overall, mountain pine beetle attack affected sapwood resources, but sapwood resources did not contribute directly to beetle success; instead, sapwood resources may support colonization by beetle-vectored fungi that potentially accelerate tree mortality. Closer attention to stored resource dynamics will improve our understanding of the interaction between mountain pine beetles, fungi, and host trees, an issue that is relevant to our understanding of insect range expansion under climate change.

  18. Colonization of Artificially Stressed Black Walnut Trees by Ambrosia Beetle, Bark Beetle, and Other Weevil Species (Coleoptera: Curculionidae) in Indiana and Missouri.

    Science.gov (United States)

    Reed, Sharon E; Juzwik, Jennifer; English, James T; Ginzel, Matthew D

    2015-12-01

    Thousand cankers disease (TCD) is a new disease of black walnut (Juglans nigra L.) in the eastern United States. The disease is caused by the interaction of the aggressive bark beetle Pityophthorus juglandis Blackman and the canker-forming fungus, Geosmithia morbida M. Kolarik, E. Freeland, C. Utley & Tisserat, carried by the beetle. Other insects also colonize TCD-symptomatic trees and may also carry pathogens. A trap tree survey was conducted in Indiana and Missouri to characterize the assemblage of ambrosia beetles, bark beetles, and other weevils attracted to the main stems and crowns of stressed black walnut. More than 100 trees were girdled and treated with glyphosate (Riverdale Razor Pro, Burr Ridge, Illinois) at 27 locations. Nearly 17,000 insects were collected from logs harvested from girdled walnut trees. These insects represented 15 ambrosia beetle, four bark beetle, and seven other weevil species. The most abundant species included Xyleborinus saxeseni Ratzburg, Xylosandrus crassiusculus Motschulsky, Xylosandrus germanus Blandford, Xyleborus affinis Eichhoff, and Stenomimus pallidus Boheman. These species differed in their association with the stems or crowns of stressed trees. Multiple species of insects were collected from individual trees and likely colonized tissues near each other. At least three of the abundant species found (S. pallidus, X. crassiusculus, and X. germanus) are known to carry propagules of canker-causing fungi of black walnut. In summary, a large number of ambrosia beetles, bark beetles, and other weevils are attracted to stressed walnut trees in Indiana and Missouri. Several of these species have the potential to introduce walnut canker pathogens during colonization.

  19. Effect of larval growth conditions on adult body mass and long-distance flight endurance in a wood-boring beetle: Do smaller beetles fly better?

    Science.gov (United States)

    Brown, Stav; Soroker, Victoria; Ribak, Gal

    2017-04-01

    The tropical fig borer, Batocera rufomaculata De Geer, is a large beetle that is a pest on a number of fruit trees, including fig and mango. Adults feed on the leaves and twigs and females lay their eggs under the bark of the tree. The larvae bore into the tree trunk, causing substantial damage that may lead to the collapse and death of the host tree. We studied how larval development under inferior feeding conditions (experienced during development in dying trees) affects flight endurance in the adult insect. We grew larvae either in their natural host or on sawdust enriched with stale fig tree twigs. Flight endurance of the adults was measured using a custom-built flight-mill. Beetles emerging from the natural host were significantly larger but flew shorter distances than beetles reared on less favourable substrates. There was no difference in the allometric slope of wing area with body mass between the beetles groups; however flight muscle mass scaled with total body mass with an exponent significantly lower than 1.0. Hence, smaller beetles had proportionally larger flight muscles. These findings suggest that beetles that developed smaller as a result from poor nutritional conditions in deteriorating hosts, are better equipped to fly longer distances in search of a new host tree.

  20. Quantitative characterization of cantharidin in the false blister beetle, Oedemera podagrariae ventralis, of the southern slopes of Mount Elborz, Iran.

    Science.gov (United States)

    Abtahi, S M; Nikbakhtzadeh, M R; Vatandoost, H; Mehdinia, A; Rahimi-Foroshani, A; Shayeghi, M

    2012-01-01

    Cantharidin, a potent vesicant and antifeedant agent, is produced by two families of beetles, Meloidae and Oedemeridae (Coleoptera). In this study, the cantharidin content of oedemerid beetles of central Iran was investigated using the GC-MS method. Cantharidin in both sexes of Oedemera podagrariae ventralis Meïneïtrieãs (Oedemeridae) was found in an average of 3.89 µg/beetle in males and 21.68 µg/beetle in females, which are amounts sufficient to irritate human skin. The average of cantharidin in virgin and coupled beetles was 1.35 and 1.62 (µg cantharidin/mg of beetle) respectively. Females had five to six times more cantharidin in their bodies than males, but there was no significant difference between the amount of cantharidin in virgin and coupled females. The results of this study revealed the production of cantharidin in both sexes of beetle.