2,942 research outputs found
Combining Plant Pathogenic Fungi and the Leaf-Mining Fly, Hydrellia pakistanae, Increases Damage to Hydrilla
Four fungal species, F71PJ
Acremonium
sp., F531
Cylindrocarpon
sp., F542,
Botrytis
sp., and F964
Fusarium culmorum
[Wm. G. Sm.] Sacc. were recovered from hydrilla [
Hydrilla
verticillata
(L. f.) Royle] shoots or from soil and water surrounding
hydrilla growing in ponds and lakes in Florida and
shown to be capable of killing hydrilla in a bioassay. The isolates
were tested singly and in combination with the leaf-mining
fly,
Hydrellia pakistanae
(Diptera: Ephydridae), for their
capability to kill or severely damage hydrilla in a bioassay
Antisynthetase Syndrome Complicating the Course of Established Case with Rheumatoid Arthritis:A Rare and Under-recognized Overlapping Disease
A 52-year-old male patient developed RA in March 2009 at the age of 43, with symmetric polyarthritis and active synovitis affecting hands, knees, ankles and both feet without symptoms or signs suggestive of extra-articular features. Laboratory investigations showed negative RF and positive anti-CCP antibodies, negative ANA, negative anti-dsDNA antibodies; the X-rays of both hands showed typical erosive changes in RA and fulfilled the new ACR/EULAR (2010) criteria of RA. The patient achieved remission on a combination of DMARDs. He did well until January 2017 when he developed acute onset of progressive chest pain, dyspnea, and acute respiratory failure. High-resolution CT of the lung showed extensive areas of ground glass veiling, and interstitial subpleural infiltrates were found consistent with aggressive interstitial lung disease (ILD). Autoantibodies against extractable nuclear antigens were screened and showed positive results for anti-RO and anti-Jo1 autoantibodies. The positive anti-Jo1was an expression of anti-synthetase syndrome complicating the RA course and explained the rapidly aggressive course of ILD
Resonant THz sensor for paper quality monitoring using THz fiber Bragg gratings
We report fabrication of THz fiber Bragg gratings (TFBG) using CO2 laser
inscription on subwavelength step-index polymer fibers. A fiber Bragg grating
with 48 periods features a ~4 GHz-wide stop band and ~15 dB transmission loss
in the middle of a stop band. The potential of such gratings in design of
resonant sensor for monitoring of paper quality is demonstrated. Experimental
spectral sensitivity of the TFBG-based paper thickness sensor was found to be ~
-0.67 GHz / 10 um. A 3D electromagnetic model of a Bragg grating was used to
explain experimental findings
Low-Loss THz Waveguide Bragg Grating using a Two-Wire Waveguide and a Paper Grating
We propose a novel kind of the low-loss THz Waveguide Bragg Grating (TWBG)
fabricated using plasmonic two-wire waveguide and a micromachined paper grating
for potential applications in THz communications. Two TWBGs were fabricated
with different periods and lengths. Transmission spectra of these TWBGs show 17
dB loss and 14 dB loss in the middle of their respective stop bands at 0.637
THz and 0.369 THz. Insertion loss of 1-4 dB in the whole 0.1-0.7 THz region was
also measured. Finally, TWBG modal dispersion relation, modal loss and field
distributions were studied numerically, and low-loss, high coupling efficiency
operation of TWBGs was confirmed
Cloud-based Quadratic Optimization with Partially Homomorphic Encryption
The development of large-scale distributed control systems has led to the
outsourcing of costly computations to cloud-computing platforms, as well as to
concerns about privacy of the collected sensitive data. This paper develops a
cloud-based protocol for a quadratic optimization problem involving multiple
parties, each holding information it seeks to maintain private. The protocol is
based on the projected gradient ascent on the Lagrange dual problem and
exploits partially homomorphic encryption and secure multi-party computation
techniques. Using formal cryptographic definitions of indistinguishability, the
protocol is shown to achieve computational privacy, i.e., there is no
computationally efficient algorithm that any involved party can employ to
obtain private information beyond what can be inferred from the party's inputs
and outputs only. In order to reduce the communication complexity of the
proposed protocol, we introduced a variant that achieves this objective at the
expense of weaker privacy guarantees. We discuss in detail the computational
and communication complexity properties of both algorithms theoretically and
also through implementations. We conclude the paper with a discussion on
computational privacy and other notions of privacy such as the non-unique
retrieval of the private information from the protocol outputs
- …