575 research outputs found

    Climate-controlled root zone parameters show potential to improve water flux simulations by land surface models

    Get PDF
    The root zone storage capacity (Sr) is the maximum volume of water in the subsurface that can potentially be accessed by vegetation for transpiration. It influences the seasonality of transpiration as well as fast and slow runoff processes. Many studies have shown that Sr is heterogeneous as controlled by local climate conditions, which affect vegetation strategies in sizing their root system able to support plant growth and to prevent water shortages. Root zone parameterization in most land surface models does not account for this climate control on root development and is based on lookup tables that prescribe the same root zone parameters worldwide for each vegetation class. These lookup tables are obtained from measurements of rooting structure that are scarce and hardly representative of the ecosystem scale. The objective of this research is to quantify and evaluate the effects of a climate-controlled representation of Sr on the water fluxes modeled by the Hydrology Tiled ECMWF Scheme for Surface Exchanges over Land (HTESSEL) land surface model. Climate-controlled Sr is estimated here with the “memory method” (MM) in which Sr is derived from the vegetation's memory of past root zone water storage deficits. Sr,MM is estimated for 15 river catchments over Australia across three contrasting climate regions: tropical, temperate and Mediterranean. Suitable representations of Sr,MM are implemented in an improved version of HTESSEL (Moisture Depth – MD) by accordingly modifying the soil depths to obtain a model Sr,MD that matches Sr,MM in the 15 catchments. In the control version of HTESSEL (CTR), Sr,CTR is larger than Sr,MM in 14 out of 15 catchments. Furthermore, the variability among the individual catchments of Sr,MM (117–722 mm) is considerably larger than of Sr,CTR (491–725 mm). The climate-controlled representation of Sr in the MD version results in a significant and consistent improvement of the modeled monthly seasonal climatology (1975–2010) and interannual anomalies of river discharge compared with observations. However, the effects on biases in long-term annual mean river discharge are small and mixed. The modeled monthly seasonal climatology of the catchment discharge improved in MD compared to CTR: the correlation with observations increased significantly from 0.84 to 0.90 in tropical catchments, from 0.74 to 0.86 in temperate catchments and from 0.86 to 0.96 in Mediterranean catchments. Correspondingly, the correlations of the interannual discharge anomalies improve significantly in MD from 0.74 to 0.78 in tropical catchments, from 0.80 to 0.85 in temperate catchments and from 0.71 to 0.79 in Mediterranean catchments. The results indicate that the use of climate-controlled Sr,MM can significantly improve the timing of modeled discharge and, by extension, also evaporation fluxes in land surface models. On the other hand, the method has not been shown to significantly reduce long-term climatological model biases over the catchments considered for this study.</p

    A novel hybrid password authentication scheme based on text and image

    Get PDF
    Considering the popularity and wide deployment of text passwords, we predict that they will be used as a prevalent authentication mechanism for many years to come. Thus, we have carried out studies on mechanisms to enhance text passwords. These studies suggest that password space and memorability should be improved, with an additional mechanism based on images. The combination of text and images increases resistance to some password attacks, such as brute force and observing attacks. We propose a hybrid authentication scheme integrating text and recognition-based graphical passwords. This authentication scheme can reduce the phishing attacks because if users are deceived to share their key passwords, there is still a chance to save the complete password as attackers do not know the users' image preferences. In addition to the security aspect, the proposed authentication scheme increases memorability as it does not require users to remember long and complex passwords. Thus, with the proposed scheme users will be able to create strong passwords without sacrificing usability. The hybrid scheme also offers an enjoyable sign-in/log-in experience to users

    The effects of soaking for DNA recovery on the striation patterns of fired cartridge cases

    Full text link
    © 2019, © 2019 Australian Academy of Forensic Sciences. The recovery of trace DNA from fired cartridge cases has recently gained increased interest throughout the literature, with a variety of methods currently being explored. Soaking fired cartridge cases in a lysis buffer holds potential in producing meaningful DNA profiles; however, chemical interactions between the lysis buffer and brass cartridge cases may limit the efficacy of this method. This preliminary study examines the effects of soaking on the microscopic striation detail of brass and nickel 9 mm Parabellum (9 mmP) calibre and.22 Long Rifle (.22LR) calibre fired cartridge cases. Headstamp and coarse striation patterns on 9 mmP fired cartridge cases and finer striation patterns along the outer wall of.22LR fired cartridge cases were microscopically examined prior to and following soaking. Soaking was performed by submerging the fired cartridge cases in 380 µl of ATL buffer (Qiagen, Germany) for 20 minutes. Microscopic analysis of brass and nickel 9 mmP and.22LR fired cartridge cases showed that coarse and fine striation detail remain unaffected following soaking. These results indicate that comparative ballistics examinations may be performed following DNA recovery using the soaking method

    Prevalence of sensitization to the predatory mite Amblyseius cucumeris as a new occupational allergen in horticulture

    Get PDF
    Background: Protection against thrips, a common pest in bell pepper horticulture is effectively possible without pesticides by using the commercially available predatory mite Amblyseius cucumeris (Ac). The prevalence of sensitization to Ac among exposed greenhouse employees and its clinical relevance was studied. Methods: Four hundred and seventytwo employees were asked to fill in a questionnaire and were tested on location. Next to RAST, skin prick tests (SPTs) were performed with common inhalant allergens, the storage mite Tyrophagus putrescentiae (Tp) which serves as a temporary food source during the cultivation process and Ac. Furthermore, nasal challenge tests with Ac were carried out in 23 sensitized employees. Results: SPTs positive to Ac were found in 109 employees (23%). Work-related symptoms were reported by 76.1%. Sensitization to Tp was found in 62 employees of whom 48 were also sensitized to Ac. Immunoglobulin (Ig)E-mediated allergy to inhalant allergens appeared to be an important risk factor for sensitization to Ac. Employees with rhinitis symptoms showed a significantly higher response to all Ac doses during the nasal challenge test compared with employees without rhinitis symptoms. Conclusions: The predatory mite Ac is a new occupational allergen in horticulture which can cause an IgE-mediated allergy in exposed employees. It is biologically active on the mucous membranes of the nose and therefore clinically relevant for the development of work-related symptoms

    Harnessing RNA sequencing for global, unbiased evaluation of two new adjuvants for dendritic-cell immunotherapy

    Get PDF
    Effective stimulation of immune cells is crucial for the success of cancer immunotherapies. Current approaches to evaluate the efficiency of stimuli are mainly defined by known flow cytometry-based cell activation or cell maturation markers. This method however does not give a complete overview of the achieved activation state and may leave important side effects unnoticed. Here, we used an unbiased RNA sequencing (RNA-seq)-based approach to compare the capacity of four clinical-grade dendritic cell (DC) activation stimuli used to prepare DC-vaccines composed of various types of DC subsets; the already clinically applied GM-CSF and Frühsommer meningoencephalitis (FSME) prophylactic vaccine and the novel clinical grade adjuvants protamine-RNA complexes (pRNA) and CpG-P. We found that GM-CSF and pRNA had similar effects on their target cells, whereas pRNA and CpG-P induced stronger type I interferon (IFN) expression than FSME. In general, the pathways most affected by all stimuli were related to immune activity and cell migration. GM-CSF stimulation, however, also induced a significant increase of genes related to nonsense-mediated decay, indicating a possible deleterious effect of this stimulus. Taken together, the two novel stimuli appear to be promising alternatives. Our study demonstrates how RNA-seq based investigation of changes in a large number of genes and gene groups can be exploited for fast and unbiased, global evaluation of clinical-grade stimuli, as opposed to the general limited evaluation of a pre-specified set of genes, by which one might miss important biological effects that are detrimental for vaccine efficacy

    cDC2 plasticity and acquisition of a DC3-like phenotype mediated by IL-6 and PGE2 in a patient-derived colorectal cancer organoids model

    Get PDF
    Metastatic colorectal cancer (CRC) is highly resistant to therapy and prone to recur. The tumor-induced local and systemic immunosuppression allows cancer cells to evade immunosurveillance, facilitating their proliferation and dissemination. Dendritic cells (DCs) are required for the detection, processing, and presentation of tumor antigens, and subsequently for the activation of antigen-specific T cells to orchestrate an effective antitumor response. Notably, successful tumors have evolved mechanisms to disrupt and impair DC functions, underlining the key role of tumor-induced DC dysfunction in promoting tumor growth, metastasis initiation, and treatment resistance. Conventional DC type 2 (cDC2) are highly prevalent in tumors and have been shown to present high phenotypic and functional plasticity in response to tumor-released environmental cues. This plasticity reverberates on both the development of antitumor responses and on the efficacy of immunotherapies in cancer patients. Uncovering the processes, mechanisms, and mediators by which CRC shapes and disrupts cDC2 functions is crucial to restoring their full antitumor potential. In this study, we use our recently developed 3D DC-tumor co-culture system to investigate how patient-derived primary and metastatic CRC organoids modulate cDC2 phenotype and function. We first demonstrate that our collagen-based system displays extensive interaction between cDC2 and tumor organoids. Interestingly, we show that tumor-corrupted cDC2 shift toward a CD14+ population with defective expression of maturation markers, an intermediate phenotype positioned between cDC2 and monocytes, and impaired T-cell activating abilities. This phenotype aligns with the newly defined DC3 (CD14(+) CD1c(+) CD163(+)) subset. Remarkably, a comparable population was found to be present in tumor lesions and enriched in the peripheral blood of metastatic CRC patients. Moreover, using EP2 and EP4 receptor antagonists and an anti-IL-6 neutralizing antibody, we determined that the observed phenotype shift is partially mediated by PGE2 and IL-6. Importantly, our system holds promise as a platform for testing therapies aimed at preventing or mitigating tumor-induced DC dysfunction. Overall, our study offers novel and relevant insights into cDC2 (dys)function in CRC that hold relevance for the design of therapeutic approaches

    CROO: A universal infrastructure and protocol to detect identity fraud

    Get PDF
    Identity fraud (IDF) may be defined as unauthorized exploitation of credential information through the use of false identity. We propose CROO, a universal (i.e. generic) infrastructure and protocol to either prevent IDF (by detecting attempts thereof), or limit its consequences (by identifying cases of previously undetected IDF). CROO is a capture resilient one-time password scheme, whereby each user must carry a personal trusted device used to generate one-time passwords (OTPs) verified by online trusted parties. Multiple trusted parties may be used for increased scalability. OTPs can be used regardless of a transaction’s purpose (e.g. user authentication or financial payment), associated credentials, and online or on-site nature; this makes CROO a universal scheme. OTPs are not sent in cleartext; they are used as keys to compute MACs of hashed transaction information, in a manner allowing OTP-verifying parties to confirm that given user credentials (i.e. OTP-keyed MACs) correspond to claimed hashed transaction details. Hashing transaction details increases user privacy. Each OTP is generated from a PIN-encrypted non-verifiable key; this makes users’ devices resilient to off-line PIN-guessing attacks. CROO’s credentials can be formatted as existing user credentials (e.g. credit cards or driver’s licenses)
    corecore