3 resultados para victim blaming

em Indian Institute of Science - Bangalore - Índia


Relevância:

10.00% 10.00%

Publicador:

Resumo:

A double antibody sandwich enzyme linked immunosorbent assay (ELISA) was developed to detect Echis carinatus venom in various organs (brain, heart, lungs, liver, spleen and kidneys) as well as tissue at the site of injection of mice, at various time intervals (1, 6, 12, 18, 24 h and 12 h intervals up to 72 h) after death. The assay could detect E. carinatus venom levels up to 2.5 ng/ml of tissue homogenate and the venom was detected up to 72 h after death. A highly sensitive and species-specific avidin-biotin microtitre ELISA was also developed to detect venoms of four medically important Indian snakes (Bungarus caeruleus, Naja naja, E. carinatus and Daboia russelli russelli) in autopsy specimens of human victims of snake bite. The assay could detect venom levels as low as 100 pg/ml of tissue homogenate. Venoms were detected in brain, heart, lungs, liver, spleen, kidneys, tissue at the bite area and postmortem blood. In all 12 human victim cadavers tested the culprit species were identified. As observed in mice, tissue at the site of bite area showed the highest concentration of venom and the brain showed the least. Moderate amounts of venoms were found in liver, spleen, kidneys, heart and lungs. Development of a simple, rapid and species-specific diagnostic kit based on this ELISA technique useful to clinicians is discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The inherent temporal locality in memory accesses is filtered out by the L1 cache. As a consequence, an L2 cache with LRU replacement incurs significantly higher misses than the optimal replacement policy (OPT). We propose to narrow this gap through a novel replacement strategy that mimics the replacement decisions of OPT. The L2 cache is logically divided into two components, a Shepherd Cache (SC) with a simple FIFO replacement and a Main Cache (MC) with an emulation of optimal replacement. The SC plays the dual role of caching lines and guiding the replacement decisions in MC. Our pro- posed organization can cover 40% of the gap between OPT and LRU for a 2MB cache resulting in 7% overall speedup. Comparison with the dynamic insertion policy, a victim buffer, a V-Way cache and an LRU based fully associative cache demonstrates that our scheme performs better than all these strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

TCP attacks are the major problem faced by Mobile Ad hoc Networks (MANETs) due to its limited network and host resources. Attacker traceback is a promising solution which allows a victim to identify the exact location of the attacker and hence enables the victim to take proper countermeasure near attack origins, for forensics and to discourage attackers from launching the attacks. However, attacker traceback in MANET is a challenging problem due to dynamic network topology, limited network and host resources such as memory, bandwidth and battery life. We introduce a novel method of TCP attacker Identification in MANET using the Traffic History - MAITH. Based on the comprehensive evaluation based on simulations, we showed that MAITH can successfully track down the attacker under diverse mobile multi-hop network environment with low communication, computation, and memory overhead.