3,081 research outputs found

    Migration Patterns

    Get PDF

    Release of captive-raised Eastern hellbenders (Cryptobranchus alleganiensis) to test the success of a chytrid vaccine and new cage design

    Get PDF
    Researchers and managers commonly apply captive-raising and reintroductions of animals to offset losses due to worldwide amphibian declines. Recent declines in the Eastern hellbender (Cryptobranchus alleganiensis alleganiensis) have resulted in several reintroductions that have had little success. There is evidence that chytridiomycosis (chytrid), a disease caused by the fungus Batrachochytrium dendrobatidis (Bd), may negatively affect hellbenders post-release. Further, excessive post-release movement may result in movement away from suitable habitat and increased risk of predation which can have negative effects on the survival of released hellbenders. Caging captive-raised animals can be effective for limiting excessive post-release movement. This study tested a new chytrid vaccine and release method involving a new temporary cage design. Twenty captive-raised hellbenders were released into a stream in the Allegheny River drainage in June 2017. Half of these hellbenders were vaccinated. Five vaccinated and five unvaccinated hellbenders were released into cages that were removed in September 2017. The other half (five vaccinated, five unvaccinated) were released directly into the stream. Hellbenders were located daily using radio telemetry and tested for Bd weekly for the remainder of the study period. Overall, the 118-day study resulted in 30% survival. The vaccine was unsuccessful; all hellbenders tested positive for Bd at some point during the summer. After cage removal, caged hellbenders moved as much as uncaged, but this caging method may have contributed to greater survival for hellbenders in the caged treatment group. These findings suggest that chytridiomycosis is a major issue for survival of head-started hellbenders in NYS, and that caging during release may require further investigation

    Space shuttle electromagnetic environment experiment. Phase A: Definition study

    Get PDF
    Methods for carrying out measurements of earth electromagnetic environment using the space shuttle as a measurement system platform are herein reported. The goal is to provide means for mapping intentional and nonintentional emitters on earth in the frequency range 0.4 to 40 GHz. A survey was made of known emitters using available data from national and international regulatory agencies, and from industry sources. The spatial distribution of sources, power levels, frequencies, degree of frequency re-use, etc., found in the survey, are here presented. A concept is developed for scanning the earth using a directive antenna whose beam is made to rotate at a fixed angle relative to the nadir; the illuminated area swept by the beam is of the form of cycloidal annulus over a sphere. During the beam's sojourn over a point, the receiver sweeps in frequency over ranges in the order of octave width using sweeping filter bandwidths sufficient to give stable readings

    Space shuttle electromagnetic environment experiment. Phase A: Definition study

    Get PDF
    A program is discussed which develops a concept for measuring the electromagnetic environment on earth with equipment on board an orbiting space shuttle. Earlier work on spaceborne measuring experiments is reviewed, and emissions to be expected are estimated using, in part, previously gathered data. General relations among system parameters are presented, followed by a proposal on spatial and frequency scanning concepts. The methods proposed include a nadir looking measurement with small lateral scan and a circularly scanned measurement looking tangent to the earth's surface at the horizon. Antenna requirements are given, assuming frequency coverage from 400 MHz to 40 GHz. For the low frequency range, 400-1000 MHz, a processed, thinned array is proposed which will be more fully analyzed in the next phase of the program. Preliminary hardware and data processing requirements are presented

    Asymptotic information leakage under one-try attacks

    Get PDF
    We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability in information hiding systems modelled as noisy channels. Specifically, we assume the attacker can make a single guess after observing n independent executions of the system, throughout which the secret information is kept fixed. We show that the asymptotic behaviour of quantities (a) and (b) can be determined in a simple way from the channel matrix. Moreover, simple and tight bounds on them as functions of n show that the convergence is exponential. We also discuss feasible methods to evaluate the rate of convergence. Our results cover both the Bayesian case, where a prior probability distribution on the secrets is assumed known to the attacker, and the maximum-likelihood case, where the attacker does not know such distribution. In the Bayesian case, we identify the distributions that maximize the leakage. We consider both the min-entropy setting studied by Smith and the additive form recently proposed by Braun et al., and show the two forms do agree asymptotically. Next, we extend these results to a more sophisticated eavesdropping scenario, where the attacker can perform a (noisy) observation at each state of the computation and the systems are modelled as hidden Markov models

    Quantitative information flow, with a view

    Get PDF
    We put forward a general model intended for assessment of system security against passive eavesdroppers, both quantitatively ( how much information is leaked) and qualitatively ( what properties are leaked). To this purpose, we extend information hiding systems ( ihs ), a model where the secret-observable relation is represented as a noisy channel, with views : basically, partitions of the state-space. Given a view W and n independent observations of the system, one is interested in the probability that a Bayesian adversary wrongly predicts the class of W the underlying secret belongs to. We offer results that allow one to easily characterise the behaviour of this error probability as a function of the number of observations, in terms of the channel matrices defining the ihs and the view W . In particular, we provide expressions for the limit value as n → ∞, show by tight bounds that convergence is exponential, and also characterise the rate of convergence to predefined error thresholds. We then show a few instances of statistical attacks that can be assessed by a direct application of our model: attacks against modular exponentiation that exploit timing leaks, against anonymity in mix-nets and against privacy in sparse datasets
    corecore