2,253 research outputs found

    New Reports of Exotic and Native Ambrosia and Bark Beetle Species (Coleoptera: Curculionidae: Scolytinae) From Ohio

    Get PDF
    In a 2007 survey of ambrosia and bark beetles (Coleoptera: Curculionidae: Scolytinae) along a transect in northeastern Ohio, we collected six exotic and three native species not previously reported from the state. These species include the exotic ambrosia beetles Ambrosiodmus rubricollis (Eichhoff), Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Xyleborus californicus Wood, Xyleborus pelliculosusEichhoff, and Xylosandrus crassiusculus (Motschulsky). The native ambrosia beetle Corthylus columbianus Hopkins, and the native bark beetles Dryocoetes autographus (Ratzeburg) and Hylastes tenuis Eichhoff are also reported from Ohio for the first time. Our study suggests a northward range expansion for five of the six exotic species including, X. crassiusculus, which is an important pest of nursery and orchard crops in the southeastern United States

    Effect of feedback on the control of a two-level dissipative quantum system

    Full text link
    We show that it is possible to modify the stationary state by a feedback control in a two-level dissipative quantum system. Based on the geometric control theory, we also analyze the effect of the feedback on the time-optimal control in the dissipative system governed by the Lindblad master equation. These effects are reflected in the function ΔA(x⃗)\Delta_A(\vec{x}) and ΔB(x⃗)\Delta_B(\vec{x}) that characterize the optimal trajectories, as well as the switching function Φ(t)\Phi(t) and θ(t),\theta(t), which characterize the switching point in time for the time-optimal trajectory.Comment: 5 pages, 5 figure

    Discrimination in a Rank Order Contest: Evidence from the NFL Draft

    Get PDF

    Voice Hacking Proof of Concept: Using Smartphones to Spread Ransomware to Traditional PCs

    Get PDF
    This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, spreading a ransomware-like application to those PCs, and executing it remotely. In addition to describing the proof-of-concept attack in detail, the authors propose several remedies individuals and organizations can use to prevent such attacks

    Child support judgments: comparing public policy to the public's policy

    Get PDF
    Any child support regime necessarily makes policy choices about how parental income should be shared between the two parental households. Those choices involve balancing the claims of the child, the claims of the custodial parent for help with the expense of providing for the child, and the claims of the support obligor for autonomy in deciding how to spend his own earnings. That balancing task is complicated by the fact that the child and the custodial parent necessarily share a living standard, so that any child support transfer, large or small, will unavoidably benefit the custodial parent as well as the child. This article reports the findings of an empirical study designed to reveal how the British public believe this balance should be struck. It then compares the public’s preferred policies to the policy choices implicit in the current UK child support schedule. It concludes that there are important gaps between the two, and recommends that consideration be given to amending the current UK law to better align it with the public’s values on these matters

    Limiting Behaviour of the Mean Residual Life

    Full text link
    In survival or reliability studies, the mean residual life or life expectancy is an important characteristic of the model. Here, we study the limiting behaviour of the mean residual life, and derive an asymptotic expansion which can be used to obtain a good approximation for large values of the time variable. The asymptotic expansion is valid for a quite general class of failure rate distributions--perhaps the largest class that can be expected given that the terms depend only on the failure rate and its derivatives.Comment: 19 page

    Design and Performance of a Simple Interferometer for Wind Tunnel Measurements

    Get PDF
    The design of an interferometer with a 3 1/2" diameter light field and its application to a continuously operating 4" x 10" supersonic wind tunnel are discussed. The main features of this interferometer are (1) its very law cost compared to previous designs, (2) its light weight and flexibility, (3) a simple device permitting the instrument to be used also as a Schlieren system, and (4) its unique feature of passing both light beams through the test section to minimize the effect of the side wall boundary layers in the interferograms
    • …
    corecore