3,760 research outputs found

    Occurrence of a Gynandromorphic Bombus bimaculatus (Hymenoptera: Apidae) in Southeastern Ohio

    Get PDF
    Herein, we introduce the first reported case of gynandromorphy in the bumblebee Bombus bimaculatus (Cresson) (Hymenoptera: Apidae), a relatively common North American species found east of the Mississippi River. The specimen was collected in Marietta, Ohio as part of a bee diversity assessment project for Washington County. Gynanders exhibit discrete male and female characters in a single individual. We discuss the potential causes of gynandromorphy exhibited by this specimen, which has differing antennal segments (12 and 13), facial maculation, abdominal hair coloration, and the presence of a corbicula – secondary sex characters that are characteristic for the genus Bombus

    High resolution fourier domain optical coherence tomography at 2 microns for painted objects

    Get PDF
    Optical Coherence Tomography has been successfully applied to the non-invasive imaging of subsurface microstructure of a variety of materials from biological tissues to painted objects of art. One of the limitations of the technique is the low depth of penetration due to the strong scattering and absorption in the material. Previous studies found that for paint materials, the optimum window for large depth of penetration is around 2.2 microns. This is also true for many other materials with low water content. We have previously demonstrated OCT systems in this wavelength regime for imaging with improved depth of penetration. In this paper, we present an improved 2 micron high resolution Fourier domain OCT system using a broadband supercontinuum source. The system achieved a depth resolution of 9 microns in air (or 6 microns in paint or any polymer)

    Applying search theory to determine the feasibility of eradicating an invasive population in natural environments

    Get PDF
    The detectability of invasive organisms influences the feasibility of eradicating an infestation. Search theory offers a framework for defining and measuring detectability, taking account of searcher ability, biological factors and the search environment. In this paper, search theory concepts are incorporated into a population model, and the costs of search and control are calculated as functions of the amount of search effort (the decision variable). Simulations are performed on a set of weed scenarios in a natural environment, involving different combinations of plant longevity, seed longevity and plant fecundity. Results provide preliminary estimates of the cost and duration of eradication programs to assist in prioritising weeds for control. The analysis shows that the success of an eradication program depends critically on the detectability of the target plant, the effectiveness of the control method, the labour requirements for search and control, and the germination rate of the plant.bioeconomics, invasive species, operations research, population dynamics, weed control, Resource /Energy Economics and Policy,

    The bass viol in the mixed consort

    Get PDF
    A glance at the only surviving printed part-book for the bass viol from the set mixed consort books of Thomas Morley (1599/1611) is rather a disappointment. In many pieces role for that instrument is limited to that of sustaining the bass line of the lute, especially in the repeated passages where the lute is given elaborate divisions. However the manuscript books for the Walsingham Consort Books and more particularly the Cambridge Consort Books associated with Mathew Holmes and Richard Reade reveal a more varied role. In some piece, and especially those of Richard Allison and Daniel Bacheler, the bass viol alternates with the bandora in providing a bass line for subgroupings among the remaining four instruments. As Sydney Beck pointed out in the 1959 introduction to his edition of Morley’s Book, there are a few pieces, notably Lachrimae Pavin and James, His Galliard in the Cambridge Consort bass viol book that give alternative elaborate divisions for the bass viol. This paper explores the musical roles the bass viol is given in the surviving sources of mixed consort music, and considers how the bass viol player might supply simultaneous divisions to enliven the more mundane bass lines of much of the surviving repertoire

    Modulation and Recognition of Nucleic Acid Structures

    Get PDF
    The fidelity of an organism’s genome is central to biology. DNA, however, is constantly being damaged and modified by a variety of sources. As a result of these changes, repair enzymes, polymerases, and other interrogating biomolecules must be able to recognize, repair, and adapt to a multitude of different structures and dynamics presented. Manipulation of natural systems via the development and introduction of novel bases and DNA structures only adds to this complexity. In addition, specific RNA sequences are becoming more prevalent therapeutic and diagnostic targets. These include retroviruses and other viruses that maintain their genome with RNA. Unlike DNA, RNA poses a unique challenge as targets due to their highly diverse secondary and tertiary structures. In this manuscript, three different nucleic acid systems were chosen to investigate how intramolecular and intermolecular interactions impact their own structure as well as giving further insight into how nucleic acids are recognized and distorted by interrogating damage specific enzymes as well as structure specific proteins

    An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems

    Full text link
    Vulnerability management strategy, from both organizational and public policy perspectives, hinges on an understanding of the supply of undiscovered vulnerabilities. If the number of undiscovered vulnerabilities is small enough, then a reasonable investment strategy would be to focus on finding and removing the remaining undiscovered vulnerabilities. If the number of undiscovered vulnerabilities is and will continue to be large, then a better investment strategy would be to focus on quick patch dissemination and engineering resilient systems. This paper examines a paradigm, namely that the number of undiscovered vulnerabilities is manageably small, through the lens of mathematical concepts from the theory of computing. From this perspective, we find little support for the paradigm of limited undiscovered vulnerabilities. We then briefly support the notion that these theory-based conclusions are relevant to practical computers in use today. We find no reason to believe undiscovered vulnerabilities are not essentially unlimited in practice and we examine the possible economic impacts should this be the case. Based on our analysis, we recommend vulnerability management strategy adopts an approach favoring quick patch dissemination and engineering resilient systems, while continuing good software engineering practices to reduce (but never eliminate) vulnerabilities in information systems
    corecore