14,995 research outputs found

    Mathematical Modelling of Chemical Diffusion through Skin using Grid-based PSEs

    Get PDF
    A Problem Solving Environment (PSE) with connections to remote distributed Grid processes is developed. The Grid simulation is itself a parallel process and allows steering of individual or multiple runs of the core computation of chemical diffusion through the stratum corneum, the outer layer of the skin. The effectiveness of this Grid-based approach in improving the quality of the simulation is assessed

    Activity and social interactions in a wideranging specialist scavenger, the Tasmanian devil (Sarcophilus harrisii), revealed by animalborne video collars

    Get PDF
    Observing animals directly in the field provides the most accurate understanding of animal behaviour and resource selection. However, making prolonged observation of undisturbed animals is difficult or impossible for many species. To overcome this problem for the Tasmanian devil (Sarcophilus harrisii), a cryptic and nocturnal carnivore, we developed animal-borne video collars to investigate activity patterns, foraging behaviour and social interactions. We collected 173 hours of footage from 13 individual devils between 2013 and 2017. Devils were active mostly at night, and resting was the most common behaviour in all diel periods. Devils spent more time scavenging than hunting and exhibited opportunistic and flexible foraging behaviours. Scavenging occurred mostly in natural vegetation but also in anthropogenic vegetation and linear features (roads and fence lines). Scavenging frequency was inversely incremental with size e.g. small carcasses were scavenged most frequently. Agonistic interactions with conspecifics occurred most often when devils were traveling but also occurred over carcasses or dens. Interactions generally involved vocalisations and brief chases without physical contact. Our results highlight the importance of devils as a scavenger in the Tasmanian ecosystem, not just of large carcasses for which devils are well known but in cleaning up small items of carrion in the bush. Our results also show the complex nature of intraspecific interactions, revealing greater detail on the context in which interactions occur. In addition, this study demonstrates the benefits of using animal-borne imaging in quantifying behaviour of elusive, nocturnal carnivores not previously seen using conventional field methods

    Human capability evaluation approach for cybersecurity in critical industrial infrastructure

    Get PDF
    Every organization is as frail as its frailest human link in the cyber security of Industry Control System (ICS), which is without predisposition to conceivable technological solutions for enforcing security. Noticeably, human-involved systems are becoming more chaotic, and gravely under attacks due to irregular actions or inactions of human entities in the constituent chain. Many industrial cyber-attacks have successfully defeated technological security solutions through preying on human weaknesses in knowledge and skills, and manipulating insiders within organizations into unsuspectingly delivering entry and access to sensitive industrial assets. In order to help enterprises assess the level of employees’ cyber security awareness and responsiveness, and enhance ICS Cyber security knowledge and skills for ICS protection, a Workforce Cyber Security Capability evaluation model is presented, and theoretically validated. A capability evaluation will allow industries to have a better understanding of the potential state of consciousness, readiness and diagnostic abilities of the industries; thus improve the prevention, detection, and response to any cyber-specific incidents

    Why is temperature sensitivity important for the success of common respiratory viruses?

    Get PDF
    This review explores the idea that temperature sensitivity is an important factor in determining the success of respiratory viruses as human parasites. The review discusses several questions. What is viral temperature sensitivity? At what range of temperatures are common respiratory viruses sensitive? What is the mechanism for their temperature sensitivity? What is the range of temperature along the human airway? What is it that makes respiratory viruses such successful parasites of the human airway? What is the role of temperature sensitivity in respiratory zoonoses? A definition of temperature sensitivity is proposed, as “the property of a virus to replicate poorly or not at all, at the normal body temperature of the host (restrictive temperature), but to replicate well at the lower temperatures found in the upper airway of the host (permissive temperature).” Temperature sensitivity may influence the success of a respiratory virus in several ways. Firstly; by restricting the infection to the upper airways and reducing the chance of systemic infection that may reduce host mobility and increase mortality, and thus limit the spread of the virus. Secondly; by causing a mild upper airway illness with a limited immune response compared to systemic infection, which means that persistent herd immunity does not develop to the same extent as with systemic infections, and re‐infection may occur later. Thirdly; infection of the upper airway triggers local reflex rhinorrhea, coughing and sneezing which aid the exit of the virus from the host and the spread of infection in the community

    Recurrent herpes zoster in the Shingles Prevention Study: Are second episodes caused by the same varicella-zoster virus strain?

    Get PDF
    Herpes zoster (HZ) is caused by reactivation of varicella zoster virus (VZV) that established latency in sensory and autonomic neurons during primary infection. In the Shingles Prevention Study (SPS), a large efficacy trial of live attenuated Oka/Merck zoster vaccine (ZVL), PCR-confirmed second episodes of HZ occurred in two of 660 placebo and one of 321 ZVL recipients with documented HZ during a mean follow-up of 3.13 years. An additional two ZVL recipients experienced a second episode of HZ in the Long-Term Persistence Substudy. All episodes of HZ were caused by wild-type VZV. The first and second episodes of HZ occurred in different dermatomes in each of these five participants, with contralateral recurrences in two. Time between first and second episodes ranged from 12 to 28 months. One of the five participants, who was immunocompetent on study enrollment, was immunocompromised at the onset of his first and second episodes of HZ. VZV DNA isolated from rash lesions from the first and second episodes of HZ was used to sequence the full-length VZV genomes. For the unique-sequence regions of the VZV genome, we employed target enrichment of VZV DNA, followed by deep sequencing. For the reiteration regions, we used PCR amplification and Sanger sequencing. Our analysis and comparison of the VZV genomes from the first and second episodes of HZ in each of the five participants indicate that both episodes were caused by the same VZV strain. This is consistent with the extraordinary stability of VZV during the replication phase of varicella and the subsequent establishment of latency in sensory ganglia throughout the body. Our observations also indicate that VZV is stable during the persistence of latency and the subsequent reactivation and replication that results in HZ
    corecore