256 research outputs found

    Factors Influencing Arthropod Diversity on Green Roofs

    Get PDF
    Green roofs have potential for providing substantial habitat to plants, birds, and arthropod species that are not well supported by other urban habitats. Whereas the plants on a typical green roof are chosen and planted by people, the arthropods that colonize it can serve as an indicator of the ability of this novel habitat to support a diverse community of organisms. The goal of this observational study was to determine which physical characteristics of a roof or characteristics of its vegetation correlate with arthropod diversity on the roof. We intensively sampled the number of insect families on one roof with pitfall traps and also measured the soil arthropod species richness on six green roofs in the Boston, MA area. We found that the number of arthropod species in soil, and arthropod families in pitfall traps, was positively correlated with living vegetation cover. The number of arthropod species was not significantly correlated with plant diversity, green roof size, distance from the ground, or distance to the nearest vegetated habitat from the roof. Our results suggest that vegetation cover may be more important than vegetation diversity for roof arthropod diversity, at least for the first few years after establishment. Additionally, we found that even green roofs that are small and isolated can support a community of arthropods that include important functional groups of the soil food web

    Fine-scale substrate heterogeneity does not affect arthropod communities on green roofs

    Get PDF
    Green roofs, which are roofs with growing substrate and vegetation, can provide habitat for arthropods in cities. Maintaining a diversity of arthropods in an urban environment can enhance the functions they fill, such as pest control and soil development. Theory suggests that the creation of a heterogeneous environment on green roofs would enhance arthropod diversity. Several studies have examined how arthropod diversity can be enhanced on green roofs, and particularly whether substrate properties affect the arthropod community, but a gap remains in identifying the effect of substrate heterogeneity within a green roof on the arthropod community. In this paper, it is hypothesized that creating heterogeneity in the substrate would directly affect the diversity and abundance of some arthropod taxa, and indirectly increase arthropod diversity through increased plant diversity. These hypotheses were tested using green roof plots in four treatments of substrate heterogeneity: (1) homogeneous dispersion; (2) mineral heterogeneity—with increased tuff concentration in subplots; (3) organic heterogeneity—with decreased compost concentrations in subplots; (4) both mineral and organic heterogeneity. Each of the four treatments was replicated twice on each of three roofs (six replicates per treatment) in a Mediterranean region. There was no effect of substrate heterogeneity on arthropod diversity, abundance, or community composition, but there were differences in arthropod communities among roofs. This suggests that the location of a green roof, which can differ in local climatic conditions, can have a strong effect on the composition of the arthropod community. Thus, arthropod diversity may be promoted by building green roofs in a variety of locations throughout a city, even if the roof construction is similar on all roofs

    Coherently aligned nanoparticles within a biogenic single crystal: A biological prestressing strategy

    Get PDF
    In contrast to synthetic materials, materials produced by organisms are formed in ambient conditions and with a limited selection of elements. Nevertheless, living organisms reveal elegant strategies for achieving specific functions, ranging from skeletal support to mastication, from sensors and defensive tools to optical function. Using state-of-the-art characterization techniques, we present a biostrategy for strengthening and toughening the otherwise brittle calcite optical lenses found in the brittlestar Ophiocoma wendtii This intriguing process uses coherent nanoprecipitates to induce compressive stresses on the host matrix, functionally resembling the Guinier-Preston zones known in classical metallurgy. We believe that these calcitic nanoparticles, being rich in magnesium, segregate during or just after transformation from amorphous to crystalline phase, similarly to segregation behavior from a supersaturated quenched alloy

    Testing for Fictive Learning in Decision-Making Under Uncertainty

    Get PDF
    We conduct two experiments where subjects make a sequence of binary choices between risky and ambiguous binary lotteries. Risky lotteries are defined as lotteries where the relative frequencies of outcomes are known. Ambiguous lotteries are lotteries where the relative frequencies of outcomes are not known or may not exist. The trials in each experiment are divided into three phases: pre-treatment, treatment and post-treatment. The trials in the pre-treatment and post-treatment phases are the same. As such, the trials before and after the treatment phase are dependent, clustered matched-pairs, that we analyze with the alternating logistic regression (ALR) package in SAS. In both experiments, we reveal to each subject the outcomes of her actual and counterfactual choices in the treatment phase. The treatments differ in the complexity of the random process used to generate the relative frequencies of the payoffs of the ambiguous lotteries. In the first experiment, the probabilities can be inferred from the converging sample averages of the observed actual and counterfactual outcomes of the ambiguous lotteries. In the second experiment the sample averages do not converge. If we define fictive learning in an experiment as statistically significant changes in the responses of subjects before and after the treatment phase of an experiment, then we expect fictive learning in the first experiment, but no fictive learning in the second experiment. The surprising finding in this paper is the presence of fictive learning in the second experiment. We attribute this counterintuitive result to apophenia: “seeing meaningful patterns in meaningless or random data.” A refinement of this result is the inference from a subsequent Chi-squared test, that the effects of fictive learning in the first experiment are significantly different from the effects of fictive learning in the second experiment

    Asynchronous Byzantine Agreement with Subquadratic Communication

    Get PDF
    Understanding the communication complexity of Byzantine agreement (BA) is a fundamental problem in distributed computing. In particular, as protocols are run with a large number of parties (as, e.g., in the context of blockchain protocols), it is important to understand the dependence of the communication on the number of parties nn. Although adaptively secure BA protocols with o(n2)o(n^2) communication are known in the synchronous and partially synchronous settings, no such protocols are known in the fully asynchronous case. We show here an asynchronous BA protocol with subquadratic communication tolerating an adaptive adversary who can corrupt f0f0). One variant of our protocol assumes initial setup done by a trusted dealer, after which an unbounded number of BA executions can be run; alternately, we can achieve subquadratic amortized communication with no prior setup. We also show that some form of setup is needed for (non-amortized) subquadratic BA tolerating Θ(n)\Theta(n) corrupted parties. As a contribution of independent interest, we show a secure-computation protocol in the same threat model that has o(n2)o(n^2) communication when computing no-input functionalities with short output (e.g., coin tossing)

    Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback

    Get PDF
    Protocols for secure Multi-Party Computation (MPC) can be classified according to the underlying communication model. Two prominent communication models considered in the literature are the synchronous and asynchronous models, which considerably differ in terms of the achievable security guarantees. Synchronous MPC protocols can achieve the optimal corruption threshold n/2n/2 and allow every party to give input, but become completely insecure when synchrony assumptions are violated. On the other hand, asynchronous MPC protocols remain secure under arbitrary network conditions, but can tolerate only n/3n/3 corruptions and parties with slow connections unavoidably cannot give input. A natural question is whether there exists a protocol for MPC that can tolerate up to ts<n/2t_s < n/2 corruptions under a synchronous network and ta<n/3t_a < n/3 corruptions even when the network is asynchronous. We answer this question by showing tight feasibility and impossibility results. More specifically, we show that such a protocol exists if and only if ta+2ts<nt_a + 2t_s < n and the number of inputs taken into account under an asynchronous network is at most ntsn-t_s

    Black-Box Transformations from Passive to Covert Security with Public Verifiability

    Get PDF
    In the context of secure computation, protocols with security against covert adversaries ensure that any misbehavior by malicious parties will be detected by the honest parties with some constant probability. As such, these protocols provide better security guarantees than passively secure protocols and, moreover, are easier to construct than protocols with full security against active adversaries. Protocols that, upon detecting a cheating attempt, allow the honest parties to compute a certificate that enables third parties to verify whether an accused party misbehaved or not are called publicly verifiable. In this work, we present the first generic compilers for constructing two-party protocols with covert security and public verifiability from protocols with passive security. We present two separate compilers, which are both fully blackbox in the underlying protocols they use. Both of them only incur a constant multiplicative factor in terms of bandwidth overhead and a constant additive factor in terms of round complexity on top of the passively secure protocols they use. The first compiler applies to all two-party protocols that have no private inputs. This class of protocols covers the important class of preprocessing protocols that are used to setup correlated randomness among parties. We use our compiler to obtain the first secret-sharing based two-party protocol with covert security and public verifiability. Notably, the produced protocol achieves public verifiability essentially for free when compared with the best known previous solutions based on secret-sharing that did not provide public verifiability Our second compiler constructs protocols with covert security and public verifiability for arbitrary functionalities from passively secure protocols. It uses our first compiler to perform a setup phase, which is independent of the parties\u27 inputs as well as the protocol they would like to execute. Finally, we show how to extend our techniques to obtain multiparty computation protocols with covert security and public verifiability against arbitrary constant fractions of corruptions

    An ex-vivo Human Intestinal Model to Study Entamoeba histolytica Pathogenesis

    Get PDF
    Amoebiasis (a human intestinal infection affecting 50 million people every year) is caused by the protozoan parasite Entamoeba histolytica. To study the molecular mechanisms underlying human colon invasion by E. histolytica, we have set up an ex vivo human colon model to study the early steps in amoebiasis. Using scanning electron microscopy and histological analyses, we have established that E. histolytica caused the removal of the protective mucus coat during the first two hours of incubation, detached the enterocytes, and then penetrated into the lamina propria by following the crypts of Lieberkühn. Significant cell lysis (determined by the release of lactodehydrogenase) and inflammation (marked by the secretion of pro-inflammatory molecules such as interleukin 1 beta, interferon gamma, interleukin 6, interleukin 8 and tumour necrosis factor) were detected after four hours of incubation. Entamoeba dispar (a closely related non-pathogenic amoeba that also colonizes the human colon) was unable to invade colonic mucosa, lyse cells or induce an inflammatory response. We also examined the behaviour of trophozoites in which genes coding for known virulent factors (such as amoebapores, the Gal/GalNAc lectin and the cysteine protease 5 (CP-A5), which have major roles in cell death, adhesion (to target cells or mucus) and mucus degradation, respectively) were silenced, together with the corresponding tissue responses. Our data revealed that the signalling via the heavy chain Hgl2 or via the light chain Lgl1 of the Gal/GalNAc lectin is not essential to penetrate the human colonic mucosa. In addition, our study demonstrates that E. histolytica silenced for CP-A5 does not penetrate the colonic lamina propria and does not induce the host's pro-inflammatory cytokine secretion
    corecore