55 resultados para Threat conditioning
Resumo:
Although discussions are underway within the Action Team 14 of the United Nations COPUOS, there is currently no concerted international plan addressing the impact threat from near-Earth objects (NEOs) and how to organize, prepare and implement mitigation measures. We report on a new international project to address impact hazard mitigation issues, being the subject of a proposal submitted to the European Commission in response to the 2011 FP7 Call "Prevention of impacts from near-Earth objects on our planet". Our consortium consists of 13 research institutes, universities, and industrial partners from 6 countries and includes leading US and Russian space organizations. The primary aim of the project, NEOShield, is to investigate in detail the three most promising mitigation techniques: the kinetic impactor, blast deflection,and the gravity tractor, and devise feasible demonstration missions. Furthermore, we will investigate options for an international strategy for implementation when an actual impact threat arises. The NEOShield project was formally accepted by the European Commission on 17 November 2011 and funded with a total of 5.8 million Euros for a period of 3.5 years. The kick-off meeting took place at the DLR Institute of Planetary Research, Berlin, in January 2012. In this paper we present a brief overview of the planned scope of the project.
Resumo:
Genetic analysis on populations of European ash (Fraxinus excelsior) throughout Ireland was carried out to determine the levels and patterns of genetic diversity in naturally seeded trees in ash woodlands and hedgerows, with the aim of informing conservation and replanting strategies in the face of potential loss of trees as a result of ash dieback. Samples from 33 sites across Northern Ireland and three sites in the Republic of Ireland were genotyped for eight nuclear and ten chloroplast microsatellites. Levels of diversity were high (mean A R = 10.53; mean H O = 0.709; mean H E = 0.765) and were similar to those in Great Britain and continental Europe, whilst levels of population genetic differentiation based on nuclear microsatellites were extremely low (Φ ST = 0.0131). Levels of inbreeding (mean F IS = 0.067) were significantly lower than those reported for populations from Great Britain. Fine-scale analysis of seed dispersal indicated potential for dispersal over hundreds of metres. Our results suggest that ash woodlands across Ireland could be treated as a single management unit, and thus native material from anywhere in Ireland could be used as a source for replanting. In addition, high potential for dispersal has implications for recolonization processes post-ash dieback (Chalara fraxinea) infection, and could aid in our assessment of the capacity of ash to shift its range in response to global climate change.
Resumo:
In many CCTV and sensor network based intelligent surveillance systems, a number of attributes or criteria are used to individually evaluate the degree of potential threat of a suspect. The outcomes for these attributes are in general from analytical algorithms where data are often pervaded with uncertainty and incompleteness. As a result, such individual threat evaluations are often inconsistent, and individual evaluations can change as time elapses. Therefore, integrating heterogeneous threat evaluations with temporal influence to obtain a better overall evaluation is a challenging issue. So far, this issue has rarely be considered by existing event reasoning frameworks under uncertainty in sensor network based surveillance. In this paper, we first propose a weighted aggregation operator based on a set of principles that constraints the fusion of individual threat evaluations. Then, we propose a method to integrate the temporal influence on threat evaluation changes. Finally, we demonstrate the usefulness of our system with a decision support event modeling framework using an airport security surveillance scenario.
Resumo:
Acute leukaemias in relapse after allogeneic stem cell transplantation (SCT) respond poorly to donor leucocyte infusions (DLI) compared with chronic myeloid leukaemia (CML), at least in part because of faster disease kinetics. Fludarabine-containing 'non-myeloablative' chemotherapy followed by further allo SCT may offer more rapid and effective disease control. We report 14 patients with relapse after allo SCT for acute leukaemia [seven acute myeloid leukaemia (AML), five acute lymphoblastic leukaemia (ALL)] or refractory anaemia with excess blasts in transformation (RAEB-t, n = 2) treated with fludarabine, high-dose cytosine arabinoside (ara-C) and granulocyte colony-simulating factor (G-CSF) with (n = 10) or without (n = 2) idarubicin (FLAG +/- Ida) or DaunoXome (FLAG-X) (n = 2) and second allo SCT from the original donor. Donors were fully human leucocyte antigen (HLA) -matched in 13 cases with a single class A mismatch in one. Actuarial overall survival was 60% and disease-free survival was 26% at 58 months. Remissions after the second SCT were longer than those after the first bone marrow transplantation (BMT) in eight of the 13 assessable patients to date. Haematopoietic recovery was rapid. Transplants were well tolerated with no treatment-related deaths. The major complication was graft-versus-host disease (GvHD, acute >/= grade II-2 cases, chronic - eight cases, two limited, six extensive) although there have been no deaths attributable to this. FLAG +/- Ida and second allo SCT is a safe and useful approach and may be more effective than DLI in the treatment of acute leukaemias relapsing after conventional allo SCT.
Resumo:
Graft-versus-host disease (GVHD) remains a significant complication in patients undergoing allogeneic stem cell transplantation (SCT) using a reduced intensity conditioning regimen. Although T-cell depletion (TCD) reduces the risk of GVHD after a myeloablative conditioning regimen, it is associated with an increased risk of graft failure. We have therefore examined whether TCD compromises engraftment using a fludarabine-based conditioning regimen. Fifteen patients have been transplanted using such a regimen of whom 13 underwent ex vivo TCD. All but one patient demonstrated durable engraftment and no patient receiving a TCD product developed severe GVHD. Thus, TCD may play a role in GvHD prophylaxis using such regimens.
Resumo:
App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model (PBSM) for Android does not address this threat, as it is rather limited to mitigating risks due to individual apps. This paper presents a technique for assessing the threat of collusion for apps, which is a first step towards quantifying collusion risk, and allows us to narrow down to candidate apps for collusion, which is critical given the high volume of Android apps available. We present our empirical analysis using a classified corpus of over 29000 Android apps provided by Intel Security.
Resumo:
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.