2,942 research outputs found

    Combining Plant Pathogenic Fungi and the Leaf-Mining Fly, Hydrellia pakistanae, Increases Damage to Hydrilla

    Get PDF
    Four fungal species, F71PJ Acremonium sp., F531 Cylindrocarpon sp., F542, Botrytis sp., and F964 Fusarium culmorum [Wm. G. Sm.] Sacc. were recovered from hydrilla [ Hydrilla verticillata (L. f.) Royle] shoots or from soil and water surrounding hydrilla growing in ponds and lakes in Florida and shown to be capable of killing hydrilla in a bioassay. The isolates were tested singly and in combination with the leaf-mining fly, Hydrellia pakistanae (Diptera: Ephydridae), for their capability to kill or severely damage hydrilla in a bioassay

    Antisynthetase Syndrome Complicating the Course of Established Case with Rheumatoid Arthritis:A Rare and Under-recognized Overlapping Disease

    Get PDF
    A 52-year-old male patient developed RA in March 2009 at the age of 43, with symmetric polyarthritis and active synovitis affecting hands, knees, ankles and both feet without symptoms or signs suggestive of extra-articular features. Laboratory investigations showed negative RF and positive anti-CCP antibodies, negative ANA, negative anti-dsDNA antibodies; the X-rays of both hands showed typical erosive changes in RA and fulfilled the new ACR/EULAR (2010) criteria of RA. The patient achieved remission on a combination of DMARDs. He did well until January 2017 when he developed acute onset of progressive chest pain, dyspnea, and acute respiratory failure. High-resolution CT of the lung showed extensive areas of ground glass veiling, and interstitial subpleural infiltrates were found consistent with aggressive interstitial lung disease (ILD). Autoantibodies against extractable nuclear antigens were screened and showed positive results for anti-RO and anti-Jo1 autoantibodies. The positive anti-Jo1was an expression of anti-synthetase syndrome complicating the RA course and explained the rapidly aggressive course of ILD

    Resonant THz sensor for paper quality monitoring using THz fiber Bragg gratings

    Full text link
    We report fabrication of THz fiber Bragg gratings (TFBG) using CO2 laser inscription on subwavelength step-index polymer fibers. A fiber Bragg grating with 48 periods features a ~4 GHz-wide stop band and ~15 dB transmission loss in the middle of a stop band. The potential of such gratings in design of resonant sensor for monitoring of paper quality is demonstrated. Experimental spectral sensitivity of the TFBG-based paper thickness sensor was found to be ~ -0.67 GHz / 10 um. A 3D electromagnetic model of a Bragg grating was used to explain experimental findings

    Low-Loss THz Waveguide Bragg Grating using a Two-Wire Waveguide and a Paper Grating

    Full text link
    We propose a novel kind of the low-loss THz Waveguide Bragg Grating (TWBG) fabricated using plasmonic two-wire waveguide and a micromachined paper grating for potential applications in THz communications. Two TWBGs were fabricated with different periods and lengths. Transmission spectra of these TWBGs show 17 dB loss and 14 dB loss in the middle of their respective stop bands at 0.637 THz and 0.369 THz. Insertion loss of 1-4 dB in the whole 0.1-0.7 THz region was also measured. Finally, TWBG modal dispersion relation, modal loss and field distributions were studied numerically, and low-loss, high coupling efficiency operation of TWBGs was confirmed

    Gender Equity in Interscholastic Sports: A Case Study

    Get PDF

    Cloud-based Quadratic Optimization with Partially Homomorphic Encryption

    Get PDF
    The development of large-scale distributed control systems has led to the outsourcing of costly computations to cloud-computing platforms, as well as to concerns about privacy of the collected sensitive data. This paper develops a cloud-based protocol for a quadratic optimization problem involving multiple parties, each holding information it seeks to maintain private. The protocol is based on the projected gradient ascent on the Lagrange dual problem and exploits partially homomorphic encryption and secure multi-party computation techniques. Using formal cryptographic definitions of indistinguishability, the protocol is shown to achieve computational privacy, i.e., there is no computationally efficient algorithm that any involved party can employ to obtain private information beyond what can be inferred from the party's inputs and outputs only. In order to reduce the communication complexity of the proposed protocol, we introduced a variant that achieves this objective at the expense of weaker privacy guarantees. We discuss in detail the computational and communication complexity properties of both algorithms theoretically and also through implementations. We conclude the paper with a discussion on computational privacy and other notions of privacy such as the non-unique retrieval of the private information from the protocol outputs
    • …
    corecore