2,253 research outputs found
New Reports of Exotic and Native Ambrosia and Bark Beetle Species (Coleoptera: Curculionidae: Scolytinae) From Ohio
In a 2007 survey of ambrosia and bark beetles (Coleoptera: Curculionidae: Scolytinae) along a transect in northeastern Ohio, we collected six exotic and three native species not previously reported from the state. These species include the exotic ambrosia beetles Ambrosiodmus rubricollis (Eichhoff), Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Xyleborus californicus Wood, Xyleborus pelliculosusEichhoff, and Xylosandrus crassiusculus (Motschulsky). The native ambrosia beetle Corthylus columbianus Hopkins, and the native bark beetles Dryocoetes autographus (Ratzeburg) and Hylastes tenuis Eichhoff are also reported from Ohio for the first time. Our study suggests a northward range expansion for five of the six exotic species including, X. crassiusculus, which is an important pest of nursery and orchard crops in the southeastern United States
Effect of feedback on the control of a two-level dissipative quantum system
We show that it is possible to modify the stationary state by a feedback
control in a two-level dissipative quantum system. Based on the geometric
control theory, we also analyze the effect of the feedback on the time-optimal
control in the dissipative system governed by the Lindblad master equation.
These effects are reflected in the function and
that characterize the optimal trajectories, as well as the
switching function and which characterize the switching
point in time for the time-optimal trajectory.Comment: 5 pages, 5 figure
Voice Hacking Proof of Concept: Using Smartphones to Spread Ransomware to Traditional PCs
This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, spreading a ransomware-like application to those PCs, and executing it remotely. In addition to describing the proof-of-concept attack in detail, the authors propose several remedies individuals and organizations can use to prevent such attacks
Child support judgments: comparing public policy to the public's policy
Any child support regime necessarily makes policy choices about how parental income should be shared between the two parental households. Those choices involve balancing the claims of the child, the claims of the custodial parent for help with the expense of providing for the child, and the claims of the support obligor for autonomy in deciding how to spend his own earnings. That balancing task is complicated by the fact that the child and the custodial parent necessarily share a living standard, so that any child support transfer, large or small, will unavoidably benefit the custodial parent as well as the child. This article reports the findings of an empirical study designed to reveal how the British public believe this balance should be struck. It then compares the public’s preferred policies to the policy choices implicit in the current UK child support schedule. It concludes that there are important gaps between the two, and recommends that consideration be given to amending the current UK law to better align it with the public’s values on these matters
Limiting Behaviour of the Mean Residual Life
In survival or reliability studies, the mean residual life or life expectancy
is an important characteristic of the model. Here, we study the limiting
behaviour of the mean residual life, and derive an asymptotic expansion which
can be used to obtain a good approximation for large values of the time
variable. The asymptotic expansion is valid for a quite general class of
failure rate distributions--perhaps the largest class that can be expected
given that the terms depend only on the failure rate and its derivatives.Comment: 19 page
Design and Performance of a Simple Interferometer for Wind Tunnel Measurements
The design of an interferometer with a 3 1/2" diameter light
field and its application to a continuously operating 4" x 10" supersonic wind tunnel are discussed. The main features of this interferometer are (1) its very law cost compared to previous designs, (2) its light weight and flexibility, (3) a simple device permitting the instrument to be used also as a Schlieren system, and (4) its unique feature of passing both light beams through the test section to minimize the effect of the side wall boundary
layers in the interferograms
- …