3,760 research outputs found
Occurrence of a Gynandromorphic Bombus bimaculatus (Hymenoptera: Apidae) in Southeastern Ohio
Herein, we introduce the first reported case of gynandromorphy in the bumblebee Bombus bimaculatus (Cresson) (Hymenoptera: Apidae), a relatively common North American species found east of the Mississippi River. The specimen was collected in Marietta, Ohio as part of a bee diversity assessment project for Washington County. Gynanders exhibit discrete male and female characters in a single individual. We discuss the potential causes of gynandromorphy exhibited by this specimen, which has differing antennal segments (12 and 13), facial maculation, abdominal hair coloration, and the presence of a corbicula – secondary sex characters that are characteristic for the genus Bombus
Recommended from our members
Non-invasive imaging of subsurface paint layers with optical coherence tomography
Optical coherence tomography (OCT) systems are fast scanning infrared Michelson interferometers designed for the non-invasive examination of the interiors of the eye and subsurface structures of biological tissues. OCT has recently been applied to the non-invasive examinations of the stratigraphy of paintings and museum artefacts. So far this is the only technique capable of imaging non-invasively the subsurface structure of paintings and painted objects. Unlike the traditional method of paint cross-section examination where sampling is required, the non-invasive and non-contact nature of the technique enables the examination of the paint cross-section anywhere on a painting, as there is no longer an issue with conservation ethics regarding the taking of samples from historical artefacts. A range of applications of the technique including the imaging of stratigraphy of paintings and painted artefacts, the imaging of underdrawings to the analysis of the optical properties of paint and varnish layers is presented. Future projects on the application of OCT to art conservation are discussed
High resolution fourier domain optical coherence tomography at 2 microns for painted objects
Optical Coherence Tomography has been successfully applied to the non-invasive imaging of subsurface microstructure of a variety of materials from biological tissues to painted objects of art. One of the limitations of the technique is the low depth of penetration due to the strong scattering and absorption in the material. Previous studies found that for paint materials, the optimum window for large depth of penetration is around 2.2 microns. This is also true for many other materials with low water content. We have previously demonstrated OCT systems in this wavelength regime for imaging with improved depth of penetration. In this paper, we present an improved 2 micron high resolution Fourier domain OCT system using a broadband supercontinuum source. The system achieved a depth resolution of 9 microns in air (or 6 microns in paint or any polymer)
Applying search theory to determine the feasibility of eradicating an invasive population in natural environments
The detectability of invasive organisms influences the feasibility of eradicating an infestation. Search theory offers a framework for defining and measuring detectability, taking account of searcher ability, biological factors and the search environment. In this paper, search theory concepts are incorporated into a population model, and the costs of search and control are calculated as functions of the amount of search effort (the decision variable). Simulations are performed on a set of weed scenarios in a natural environment, involving different combinations of plant longevity, seed longevity and plant fecundity. Results provide preliminary estimates of the cost and duration of eradication programs to assist in prioritising weeds for control. The analysis shows that the success of an eradication program depends critically on the detectability of the target plant, the effectiveness of the control method, the labour requirements for search and control, and the germination rate of the plant.bioeconomics, invasive species, operations research, population dynamics, weed control, Resource /Energy Economics and Policy,
The bass viol in the mixed consort
A glance at the only surviving printed part-book for the bass viol from the set mixed consort books of Thomas Morley (1599/1611) is rather a disappointment. In many pieces role for that instrument is limited to that of sustaining the bass line of the lute, especially in the repeated passages where the lute is given elaborate divisions. However the manuscript books for the Walsingham Consort Books and more particularly the Cambridge Consort Books associated with Mathew Holmes and Richard Reade reveal a more varied role. In some piece, and especially those of Richard Allison and Daniel Bacheler, the bass viol alternates with the bandora in providing a bass line for subgroupings among the remaining four instruments. As Sydney Beck pointed out in the 1959 introduction to his edition of Morley’s Book, there are a few pieces, notably Lachrimae Pavin and James, His Galliard in the Cambridge Consort bass viol book that give alternative elaborate divisions for the bass viol. This paper explores the musical roles the bass viol is given in the surviving sources of mixed consort music, and considers how the bass viol player might supply simultaneous divisions to enliven the more mundane bass lines of much of the surviving repertoire
Modulation and Recognition of Nucleic Acid Structures
The fidelity of an organism’s genome is central to biology. DNA, however, is constantly being damaged and modified by a variety of sources. As a result of these changes, repair enzymes, polymerases, and other interrogating biomolecules must be able to recognize, repair, and adapt to a multitude of different structures and dynamics presented. Manipulation of natural systems via the development and introduction of novel bases and DNA structures only adds to this complexity. In addition, specific RNA sequences are becoming more prevalent therapeutic and diagnostic targets. These include retroviruses and other viruses that maintain their genome with RNA. Unlike DNA, RNA poses a unique challenge as targets due to their highly diverse secondary and tertiary structures. In this manuscript, three different nucleic acid systems were chosen to investigate how intramolecular and intermolecular interactions impact their own structure as well as giving further insight into how nucleic acids are recognized and distorted by interrogating damage specific enzymes as well as structure specific proteins
An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems
Vulnerability management strategy, from both organizational and public policy
perspectives, hinges on an understanding of the supply of undiscovered
vulnerabilities. If the number of undiscovered vulnerabilities is small enough,
then a reasonable investment strategy would be to focus on finding and removing
the remaining undiscovered vulnerabilities. If the number of undiscovered
vulnerabilities is and will continue to be large, then a better investment
strategy would be to focus on quick patch dissemination and engineering
resilient systems. This paper examines a paradigm, namely that the number of
undiscovered vulnerabilities is manageably small, through the lens of
mathematical concepts from the theory of computing. From this perspective, we
find little support for the paradigm of limited undiscovered vulnerabilities.
We then briefly support the notion that these theory-based conclusions are
relevant to practical computers in use today. We find no reason to believe
undiscovered vulnerabilities are not essentially unlimited in practice and we
examine the possible economic impacts should this be the case. Based on our
analysis, we recommend vulnerability management strategy adopts an approach
favoring quick patch dissemination and engineering resilient systems, while
continuing good software engineering practices to reduce (but never eliminate)
vulnerabilities in information systems
- …