scholarly journals New Diaptomidae records (Crustacea: Copepoda: Calanoida: Diaptomidae) in the Neotropical region

Check List ◽  
2013 ◽  
Vol 9 (4) ◽  
pp. 700 ◽  
Author(s):  
Daniel Previattelli ◽  
Gilmar Perbiche-Neves ◽  
Edinaldo Nelson dos Santos-Silva

TIn this study we present 208 new diaptomids records, including 36 species from 10 genera. They are the result of new samplings as well as of the revision of samples from previous surveys from various localities in the Neotropical Region. In an attempt to clear elucidate about the species ranges we gathered all biogeographically important data and present them here, with comments about the relevance of each record to the understanding of the distribution of the group.

2016 ◽  
Vol 47 (1) ◽  
pp. 33-52 ◽  
Author(s):  
G.C. Queiroz ◽  
M.C. Mendonça

The study of the Poduromorpha fauna of a sample from Paraná State, Brazil, and multiple samples from high altitude mountains of Southeast Brazil provided important data on Hypogastruridae, including a new record for Brazil ofCeratophysella engadinensis(Gisin 1949) and two new species belonging toXenyllaTullberg 1869,X. manuelaesp.n. andX. wandaesp.n. These last present a pair of remarkable creased cuticular structures on abdominal tergite IV, apparently unique among the genus. In addition, a new species of Pseudachorutinae,Cephalachorutes anneaesp.n., is the first Neotropical record ofCephalachorutesBedos & Deharveng 1991, corroborating its holotropical distribution. The set of characteristics displayed by this new species required the expansion of the genus diagnosis.


Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


2020 ◽  
Vol 29 (2) ◽  
pp. 278-283
Author(s):  
S.G. Ermilov

The oribatid mite subgenus Scheloribates (Topobates) Grandjean, 1958, is recorded from the Neotropical region for the first time. A new species of this subgenus is described from the leaf litter collected in Cayo Agua Island, Panama. Scheloribates (Topobates) panamaensis sp. nov. differs from its related species by the very large body size and presence of a strong ventrodistal process on the leg femora II–IV.


Author(s):  
Дмитрий Валериевич Судаков ◽  
Олег Валериевич Судаков ◽  
Людмила Валентиновна Кретинина ◽  
Наталья Владимировна Якушева ◽  
Артём Николаевич Шевцов

Статья посвящена построению прогноза эффективности реконструктивных вмешательств на магистральных нервах предплечья в зависимости от протяженности дефекта нервной ткани и особенностей последующего периода реабилитации пациентов. Данная тематика является весьма актуальной, так как с каждым годом во всем мире наблюдается определенный рост случаев травм различного генеза магистральных нервных стволов, которые затем нередко приводят к временной нетрудоспособности и даже инвалидности пациентов. Реконструктивная микрохирургия многие десятилетия пытается решить целый ряд проблем аутотрансплантации нервных стволов и повысить ее общую эффективность. Но из-за определенных проблем связанных с финансированием, некоторые вопросы трансплантологии и реабилитации остаются нерешенными и в настоящий момент. Все это придает представленной работе важное значение не только медицинского, но и социально - экономического плана. Целью работы стала попытка построения прогноза восстановительных операций на нервной ткани, с учетом объема пораженных структур и периода реабилитации. Объектами исследования стало 180 больных, которым по той или иной причине, осуществлялась реконструктивная операция на одном из магистральных нервов предплечья. Все пациенты были разделены на 3 группы по 60 человек, в зависимости от протяженности дефекта магистрального нерва: до 4 см, от 4 до 8 см и от 8 до 12 см. Последующее разделение внутри каждой группы на подгруппы производилось в зависимости от определенного поврежденного нерва (лучевой, локтевой, срединный). В работе изучалось течение раннего послеоперационного воспалительного процесса, с определением бактериальной микрофлоры в ране. Изучались и отдаленные последствия оперативного вмешательства. Своеобразной новизной для данной тематики в целом, стало выявление последующего установления инвалидности пациентов. Кроме того, важные данные были получены и по срокам реабилитации и частичного или полного восстановления утраченных функций по срокам в зависимости от размеров восстанавливаемого дефекта и от наличия или отсутствия необходимой реабилитации. Полученные в работе данные могут представлять интерес не только для врачей хирургов и травматологов, но и для организаторов здравоохранения, позволяя производить прогнозы по выздоровлению пациентов в каждой определенной клинической ситуации The article is devoted to the construction of a forecast of the effectiveness of reconstructive interventions on the main nerves of the forearm, depending on the length of the defect in the nervous tissue and the characteristics of the subsequent period of rehabilitation of patients. This topic is very relevant, since every year all over the world there is a certain increase in cases of injuries of various origins of the main nerve trunks, which then often lead to temporary disability and even disability of patients. For many decades, reconstructive microsurgery has been trying to solve a number of problems of autotransplantation of nerve trunks and improve its overall efficiency. But due to certain problems associated with funding, some issues of transplantation and rehabilitation remain unresolved at the moment. All this gives the presented work important not only medical, but also socio - economic importance. The aim of this work was to attempt to predict restorative operations on the nervous tissue, taking into account the volume of the affected structures and the period of rehabilitation. The objects of the study were 180 patients who, for one reason or another, underwent a reconstructive operation on one of the main nerves of the forearm. All patients were divided into 3 groups of 60 people, depending on the length of the main nerve defect: up to 4 cm, from 4 to 8 cm, and from 8 to 12 cm. Subsequent division within each group into subgroups was performed depending on the specific damaged nerve ( radial, ulnar, median). The work studied the course of the early postoperative inflammatory process, with the determination of bacterial microflora in the wound. The long-term consequences of surgery were also studied. A peculiar novelty for this topic as a whole was the identification of the subsequent establishment of disability in patients. In addition, important data were obtained on the timing of rehabilitation and partial or complete restoration of lost functions in terms of timing, depending on the size of the restored defect and on the presence or absence of the necessary rehabilitation. The data obtained in this work may be of interest not only for surgeons and traumatologists, but also for healthcare organizers, allowing them to make predictions about the recovery of patients in each specific clinical situation


Author(s):  
Maryam Hammami ◽  
Hatem Bellaaj

The Cloud storage is the most important issue today. This is due to a rapidly changing needs and a huge mass of varied and important data to back up. In this paper, we describe a work in progress and propose a flexible system architecture for data storage in the Cloud. This system is centered on the Data Manager module. This module provides various functions such as the dispersion of data in fragments, encryption and storage of fragments... etc. This architecture proves to be very relevant. It ensures consistency between different components. On the other hand, it ensures the security and availability of data.


Genes ◽  
2021 ◽  
Vol 12 (7) ◽  
pp. 1017
Author(s):  
Mohammed Bakkali ◽  
Rubén Martín-Blázquez ◽  
Mercedes Ruiz-Estévez ◽  
Manuel A. Garrido-Ramos

We sequenced the sporophyte transcriptome of Killarney fern (Vandenboschia speciosa (Willd.) G. Kunkel). In addition to being a rare endangered Macaronesian-European endemism, this species has a huge genome (10.52 Gb) as well as particular biological features and extreme ecological requirements. These characteristics, together with the systematic position of ferns among vascular plants, make it of high interest for evolutionary, conservation and functional genomics studies. The transcriptome was constructed de novo and contained 36,430 transcripts, of which 17,706 had valid BLAST hits. A total of 19,539 transcripts showed at least one of the 7362 GO terms assigned to the transcriptome, whereas 6547 transcripts showed at least one of the 1359 KEGG assigned terms. A prospective analysis of functional annotation results provided relevant insights on genes involved in important functions such as growth and development as well as physiological adaptations. In this context, a catalogue of genes involved in the genetic control of plant development, during the vegetative to reproductive transition, in stress response as well as genes coding for transcription factors is given. Altogether, this study provides a first step towards understanding the gene expression of a significant fern species and the in silico functional and comparative analyses reported here provide important data and insights for further comparative evolutionary studies in ferns and land plants in general.


Author(s):  
J R Santos-Mallet ◽  
T D Balthazar ◽  
A A Oliveira ◽  
W A Marques ◽  
A Q Bastos ◽  
...  

Abstract The aim of the present study was to describe the morphology of the eggs of Culex (Culex) saltanensis Dyar that occurs in the Neotropical region. Eggs of the Cx. (Cux.) saltanensis were collected at the Mata Atlântica FIOCRUZ campus, fixed in 1% osmium tetroxide, prepared for mounting on metal supports, observed under a scanning electron microscope, and described morphologically. The eggs had a coniform shape with a length of approximately 0.5 mm (505–510 µm) and a width in the median portion of 117 µm (113–123 µm). Upper portion is lined with tubers of irregular shape and varying sizes (0.64–1.31 µm), located on a cross-linked matrix forming bands observed under optical microscopy. The micropyle is encased in a necklace of approximately 6.6-µm plates arranged in a flower-like shape. Comparing Cx. (Cux.) saltanensis eggs with several species of different genera, important divergent characteristics can be observed. However, this study points to the need for new descriptions of eggs of species belonging to the same subgenus in order to analyze if there will be differences between them. Culex (Cux.) saltanensis eggs have particular characteristics not observed in eggs of other Culicidae genera.


Symmetry ◽  
2021 ◽  
Vol 13 (8) ◽  
pp. 1444
Author(s):  
Guojia Li ◽  
Lin You

In recent years, blockchain has triggered an upsurge in the application of decentralized models and has received more and more attention. For convenience and security considerations, in blockchain applications, users usually use wallets to manage digital assets. The most important data stored in the wallet is the user’s private key, which is also the only identification of the ownership of the encrypted digital assets. Once the private key is lost or stolen, it will bring irreparable losses. We proposed a consortium blockchain wallet scheme based on dual-threshold key protection secret-sharing. By splitting and storing the user’s wallet private key using a secret-sharing method, we can protect our private keys safely and effectively. Our scheme is based on the application scenario of the consortium blockchain. The peers preset by the consortium blockchain store the user’s wallet private key shadow shares, reasonably integrate storage resources, and enhance the solution’s anti-attack ability by setting double thresholds.


2021 ◽  
Author(s):  
Shan Huang ◽  
Marlee A. Tucker ◽  
Anne G. Hertel ◽  
Alison Eyres ◽  
Jörg Albrecht
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document