240 resultados para attack


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Migraine is a debilitating neurovascular disorder, with a substantial genetic component. The exact cause of a migraine attack is unknown; however cortical hyperexcitability is thought to play a role. As Gamma-aminobutyric Acid (GABA) is the major inhibitory neurotransmitter in the brain, malfunctioning of this system may be a cause of the hyperexcitability. To date, there has been limited research examining the gene expression or genetics of GABA receptors in relation to migraine. The aim of our study was to determine if GABA receptors play a role in migraine by investigating their gene expression using profile in migraine affected individuals and non-affected controls by Q-PCR. Gene expression of GABA(A) receptor subunit isoforms (GABRA3, GABRB3, GABRQ) and GABA(B) receptor 2 (GABBR2) was quantified in mRNA obtained from peripheral blood leukocytes from 28 migraine subjects and 22 healthy control subjects. Analysis of results showed that two of the tested genes, GABRA3 and GABBR2, were significantly down regulated in migraineurs (P=0.018; P=0.017), compared to controls. Results from the other tested genes did not show significant gene expression variation. The results indicate that there may be specific GABA receptor gene expression variation in migraine, particularly involving the GABRA3 and GABBR2 genes. This study also identifies GABRA3 and GABBR2 as potential biomarkers to select migraineurs that may be more responsive to GABA agonists with future investigations in this area warranted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Essential hypertension is a common multifactorial trait that results in a significantly increased risk for heart attack and stroke. The condition has a genetic basis, although at present the number of genes is unknown. In order to identify such genes, we are utilising a linkage scanning approach using microsatellite markers and affected sibships. Here we provide evidence for the location of at least one hypertension susceptibility locus on chromosome 17. Analysis of 177 affected sibpairs gave evidence for significant excess allele sharing to D17S949 (SPLINK: P=0.0029; MAPMAKER SIBS: P=0.0033; ASPEX: P=0.0061; GENEHUNTER: P=0.0096; ANALYZE (SIBPAIR): P=0.0025) on 17q22–24, with significant allele sharing also indicated for an additional marker, D17S799 (SPLINK: P=0.025; MAPMAKER SIBS: P= 0.025) located close to the centromere. Since these two genomic regions are well separated, our results indicate that there may be more than one chromosome 17 locus affecting human blood pressure. Moreover, further investigation of this chromosome, utilizing a polymorphism within the promoter of the iNOS candidate gene, NOS2A, revealed both increased allele sharing among sibpairs (SPLINK: P=0.02; ASPEX: P=0.00004) and positive association (P= 0.034) of NOS2A to essential hypertension. Hence these results indicate that chromosome 17 and, more specifically, the NOS2A gene may play a role in human essential hypertension.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fruit flies are the insects which cause maggots in your backyard fruit and vegetables. They are not just a nuisance to gardeners, but the single greatest insect threat to commercial and subsistence fruit growers throughout Asia, Australia and the Pacific. Queensland fruit fly, the focus of this PhD, costs Australia an estimated $100million per year. I focused specifically on how Queensland fruit fly uses different commercial citrus varieties. I identified specific plant related mechanisms which increase a fruit’s resistance to fruit fly attack. This information can be used by plant breeders to make fruit less prone to fruit fly damage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Migraine is classified by the World Health Organization (WHO) as being one of the top 20 most debilitating diseases. According to the neurovascular hypothesis, neuroinflammation may promote the activation and sensitisation of meningeal nociceptors, inducing the persistent throbbing headache characterized in migraine. The tumor necrosis factor (TNF) gene cluster, made up of TNFα, lymphotoxin α (LTA), and lymphotoxin β (LTB), has been implicated to influence the intensity and duration of local inflammation. It is thought that sterile inflammation mediated by LTA, LTB, and TNFα contributes to threshold brain excitability, propagation of neuronal hyperexcitability and thus initiation and maintenance of a migraine attack. Previous studies have investigated variants within the TNF gene cluster region in relation to migraine susceptibility, with largely conflicting results. The aim of this study was to expand on previous research and utilize a large case-control cohort and range of variants within the TNF gene cluster to investigate the role of the TNF gene cluster in migraine. Nine single nucleotide polymorphisms (SNPs) were selected for investigation as follows: rs1800683, rs2229094, rs2009658, rs2071590, rs2239704, rs909253, rs1800630, rs1800629, and rs3093664. No significant association with migraine susceptibility was found for any of the SNPs tested, with further testing according to migraine subtype and gender also showing no association for disease risk. Haplotype analysis showed that none of the tested haplotypes were significantly associated with migraine.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An electropolishing method has been developed for preparing sharp needles from polycrystalline YBa2Cu3O7-δ by modifying a recipe for TEM specimen preparation. The method is characterized by a polishing temperature of below 0°C, a non-acidic electrolyt and an even removal of the constituent phases. An approach was employed of combining I-V measurements for polishing process and microscopical observation of surface morphology in finding optimum polishing conditions. TEM evidenced that no preferential attack appeared to grain boundaries. X-ray diffractometry and electron diffraction implied that no change in oxygen content occurred during electropolishing. The sharpness of the tip was examined by field-ion microscopy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Railway Bridges deteriorate over time due to different critical factors including, flood, wind, earthquake, collision, and environment factors, such as corrosion, wear, termite attack, etc. In current practice, the contributions of the critical factors, towards the deterioration of railway bridges, which show their criticalities, are not appropriately taken into account. In this paper, a new method for quantifying the criticality of these factors will be introduced. The available knowledge as well as risk analyses conducted in different Australian standards and developed for bridge-design will be adopted. The analytic hierarchy process (AHP) is utilized for prioritising the factors. The method is used for synthetic rating of railway bridges developed by the authors of this paper. Enhancing the reliability of predicting the vulnerability of railway bridges to the critical factors, will be the significant achievement of this research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stress corrosion cracking (SCC) is a well known form of environmental attack in low carat gold jewellery. It is desirable to have a quick, easy and cost effective way to detect SCC in alloys and prevent them from being used and later failing in their application. A facile chemical method to investigate SCC of 9 carat gold alloys is demonstrated. It involves a simple application of tensile stress to a wire sample in a corrosive environment such as 1–10 % FeCl3 which induces failure in less than 5 minutes. In this study three quaternary (Au, Ag, Cu and Zn) 9 carat gold alloy compositions were investigated for their resistance to SCC and the relationship between time to failure and processing conditions is studied. It is envisaged that the use of such a rapid and facile screening procedure at the production stage may readily identify alloy treatments that produce jewellery that will be susceptible to SCC in its lifetime.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Throughout Australia (and in comparable urban contexts around the world) public spaces may be said to be under attack by developers and also attempts by civic authorities to regulate, restrict, rebrand and reframe them. A consequence of the increasingly security driven, privatised and surveilled nature of public space is the exclusion and displacement of those considered flawed and unwelcome in the ‘spectacular’ consumption spaces of many major urban centres. In the name of urban regeneration, processes of securitisation, ‘gentrification’ and creative cities discourses can refashion public space as sites of selective inclusion and exclusion. In this context of monitoring and control procedures, children and young people’s use of space in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to the social order, requiring various forms of punitive and/or remedial action. This paper discusses developments in the surveillance, governance and control of public space used by children and young people in particular and the capacity for their displacement and marginality, diminishing their sense of place and belonging, and right to public space as an expression of their civil, political and social citizenship(s).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Maritime terrorism is one of the main maritime security issues in the contemporary world. The threat of maritime terrorism is more apparent than ever in the post-September 11 era. Although maritime terrorism is an old issue, the disastrous events of 11 September 2001 brought this issue again onto the global agenda. This incident brought to the forefront the longstanding concerns that terrorists could severely disrupt the global maritime supply chain by using shipping containers or vessels to attack major business centres, port facilities and offshore installations. A number of international criminal law studies have been conducted to identify international legal challenges in maritime security. Some of these works have critically examined the international legal framework for maritime security and identified the lacunas in the existing system. Some of these writings have also identified that emerging maritime terrorism issues are prompting States to introduce some stringent measures. Although the international legal regime related to maritime terrorism is a well-researched area, very little research work has explored the legal issues related to State responsibility for maritime terrorism. This article argues that, although the United Nations Convention on the Law of the Sea (UNCLOS) provisions related to maritime piracy may not be applicable for some dimensions of maritime violence, different provisions of UNCLOS may relevant in identifying State responsibility for maritime terrorism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.