Search results for "Crypt"
showing 10 items of 1111 documents
Interactions between bacteria and Cryptosporidium molnari in gilthead sea bream (Sparus aurata) under farm and laboratory conditions
2006
The possible interaction of Cryptosporidium molnari and bacteria in gilthead sea bream (Sparus aurata) was studied. Epidemiological data from a pathological survey under farm conditions were analyzed. In addition, parasite and bacteria burdens were studied in experimental models in which naturally and experimentally parasitized fish were challenged with a particular strain of Vibrio harveyi (H57). All the bacteria species present were studied. Under farm conditions, the parasite was more prevalent when mortality or morbidity cases (study C) occurred than in randomly sampled fish (study B). In study C, parasite abundance was significantly higher in bacteria-negative fish, and total bacteria …
Biosynthesis of fungal melanins and their importance for human pathogenic fungi
2003
For more than 40 years fungi have been known to produce pigments known as melanins. Predominantly these have been dihydroxyphenylalanine (DOPA)-melanin and dihydroxynaphthalene (DHN)-melanin. The biochemical and genetical analysis of the biosynthesis pathways have led to the identification of the genes and corresponding enzymes of the pathways. Only recently have both these types of melanin been linked to virulence in some human pathogenic and phytopathogenic fungi. The absence of melanin in human pathogenic and phytopathogenic fungi often leads to a decrease in virulence. In phytopathogenic fungi such as Magnaporthe grisea and Colletotrichum lagenarium, besides other possible functions in …
Adaptation to iron deficiency in human pathogenic fungi
2020
Iron is an essential micronutrient for virtually all eukaryotic organisms and plays a central role during microbial infections. Invasive fungal diseases are associated with strikingly high rates of mortality, but their impact on human health is usually underestimated. Upon a fungal infection, hosts restrict iron availability in order to limit the growth and virulence of the pathogen. Here, we use two model yeasts, Saccharomyces cerevisiae and Schizosaccharomyces pombe, to delve into the response to iron deficiency of human fungal pathogens, such as Candida glabrata, Candida albicans, Aspergillus fumigatus and Cryptococcus neoformans. Fungi possess common and species-specific mechanisms to a…
Attention Direction in Static and Animated Diagrams
2010
Two key requirements for comprehending a diagram are to parse it into appropriate components and to establish relevant relationships between those components. These requirements can be particularly demanding when the diagram is complex and the viewers are novices in the depicted domain. Lack of domain-specific knowledge for top-down guidance of visual attention prejudices novices' extraction of task-relevant information. Static diagrams designed for novices often include visual cues intended to improve such information extraction. However, because current approaches to cueing tend to be largely intuitive, their effectiveness can be questionable. Further, animated diagrams with their percept…
UVolc: A software platform for measuring volcanic SO2 fluxes
2012
We present here a novel stand-alone software platform, UVolc, for remotely sensed measurement of volcanic SO"2 emission rates. Such data are important diagnostics of activity conditions, with utility in forecasting measures. This code is made user friendly to enable volcanologists, who are not experts in the underlying physics of spectroscopy, to perform their own measurements. The program provides considerable reduction in errors and far greater operating flexibility than existing analogous code, which, unlike UVolc, can only interface with hardware no longer in manufacture. UVolc will be described here, including a presentation of data collected with this program in the field.
Desiccation by Exposure to Space Vacuum or Extremely Dry Deserts: Effect on Microorganisms
2003
General Limits of Growth at Low Water Activities Dormant Life Molecular Events Induced by Desiccation Survival at Extremely Low Water Activity Survival Under Extremely Dry Desert Conditions Keywords: anhydrobiosis; desiccation; extreme environments; freeze-drying; panspermia thesis; space: survival in space; space vacuum; water activity
Communication in new technology based‐firms
2013
PurposeThe paper aims at identifying the main social media applications used by new technology based‐firms (NTBFs) and at calculating the volume of followers they have in each application. It also focuses on the amount of activity generated by the firms in those social networks, identifying the key thematic content of their social media activity, analyzing the ability to create dialogue with their stakeholders and clarifying which style of communication they use.Design/methodology/approachThe paper presents an exploratory study of the use of social media tools by NTBFs, located in Spanish Science Parks, as an important resource network for firms in the corresponding sector. A total of 432 n…
HTTP-level e-commerce data based on server access logs for an online store
2020
Abstract Web server logs have been extensively used as a source of data on the characteristics of Web traffic and users’ navigational patterns. In particular, Web bot detection and online purchase prediction using methods from artificial intelligence (AI) are currently key areas of research. However, in reality, it is hard to obtain logs from actual online stores and there is no common dataset that can be used across different studies. Moreover, there is a lack of studies exploring Web traffic over a longer period of time, due to the unavailability of long-term data from server logs. The need to develop reliable models of Web traffic, Web user navigation, and e-customer behaviour calls for …
The Myths of and Solutions for Android OS Controlled and Secure Environment
2015
<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords">…
Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic
2018
Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…