69 resultados para Preimage attack
Resumo:
Interest in sustainable farming methods that rely on alternatives to conventional synthetic fertilizers and pesticides is increasing. Sustainable farming methods often utilize natural populations of predatory and parasitic species to control populations of herbivores, which may be potential pest species. We investigated the effects of several types of fertilizer, including those typical of sustainable and conventional farming systems, on the interaction between a herbivore and parasitoid. The effects of fertilizer type on percentage parasitism, parasitoid performance, parasitoid attack behaviour and responses to plant volatiles were examined using a model Brassica system, consisting of Brassica oleracea var capitata, Plutella xylostella (Lepidoptera) larvae and Cotesia vestalis (parasitoid). Percentage parasitism was greatest for P. xylostella larvae feeding on plants that had received either a synthetic ammonium nitrate fertilizer or were unfertilized, in comparison to those receiving a composite fertilizer containing hoof and horn. Parasitism was intermediate on plants fertilized with an organically produced animal manure. Male parasitoid tibia length showed the same pattern as percentage parasitism, an indication that offspring performance was maximized on the treatments preferred by female parasitoids for oviposition. Percentage parasitism and parasitoid size were not correlated with foliar nitrogen concentration. The parasitoids did not discriminate between hosts feeding on plants in the four fertilizer treatments in parasitoid behaviour assays, but showed a preference for unfertilized plants in olfactometer experiments. The percentage parasitism and tibia length results provide support for the preference–performance hypothesis
Resumo:
This article focuses on one particular factor that is of crucial importance to all self-defence actions. It is a factor that is almost always present in the application and appraisal of the right, but one that is not always explicitly engaged with: time. There are various ratione temporis elements underpinning the lawful exercise of the right of self-defence, and questions related to the timing of both an attack being responded to in self-defence and the response itself are notably controversial. The self-defence timeline is therefore charted, and the key legal debates encountered along its trajectory are identified. In particular, there is a focus on three temporal ‘stages’ of the right of self-defence: (i) the much-debated question of preventative forms of self-defence (the ‘before’); (ii) the timeliness of a state's defensive action, or what is sometimes called the need for the response to be ‘immediate’ (the ‘during’); and (iii) the duration of self-defence actions, including the crucial issue of when they must end (the ‘after’). The aim of this article is not to break new substantive ground with regard to these ‘stages’ as such, but is, rather, to draw together the temporal strands of self-defence in a more focused manner than is often the case in the literature.
Resumo:
Platelets are involved in the maintenance of haemostasis but their inappropriate activation leads to thrombosis, a principal trigger for heart attack and ischemic stroke. Although platelets circulate in isolation, upon activation they accumulate or aggregate together to form a thrombus, where they function in a coordinated manner to prevent loss of blood and control wound repair. Recent reports indicate that the stability and functions of a thrombus are maintained through sustained, contact dependent signalling between platelets. Given the role of gap junctions in the coordination of tissue responses, it was hypothesized that gap junctions may be present within a thrombus and mediate intercellular communication between platelets. Therefore studies were performed to explore the presence and functions of connexins in platelets. In this brief review, the roles of hemichannels and gap junctions in the control of thrombosis and haemostasis and the future directions for this research will be discussed.
Resumo:
Anti-spoofing is attracting growing interest in biometrics, considering the variety of fake materials and new means to attack biometric recognition systems. New unseen materials continuously challenge state-of-the-art spoofing detectors, suggesting for additional systematic approaches to target anti-spoofing. By incorporating liveness scores into the biometric fusion process, recognition accuracy can be enhanced, but traditional sum-rule based fusion algorithms are known to be highly sensitive to single spoofed instances. This paper investigates 1-median filtering as a spoofing-resistant generalised alternative to the sum-rule targeting the problem of partial multibiometric spoofing where m out of n biometric sources to be combined are attacked. Augmenting previous work, this paper investigates the dynamic detection and rejection of livenessrecognition pair outliers for spoofed samples in true multi-modal configuration with its inherent challenge of normalisation. As a further contribution, bootstrap aggregating (bagging) classifiers for fingerprint spoof-detection algorithm is presented. Experiments on the latest face video databases (Idiap Replay- Attack Database and CASIA Face Anti-Spoofing Database), and fingerprint spoofing database (Fingerprint Liveness Detection Competition 2013) illustrate the efficiency of proposed techniques.
Resumo:
Multibiometrics aims at improving biometric security in presence of spoofing attempts, but exposes a larger availability of points of attack. Standard fusion rules have been shown to be highly sensitive to spoofing attempts – even in case of a single fake instance only. This paper presents a novel spoofing-resistant fusion scheme proposing the detection and elimination of anomalous fusion input in an ensemble of evidence with liveness information. This approach aims at making multibiometric systems more resistant to presentation attacks by modeling the typical behaviour of human surveillance operators detecting anomalies as employed in many decision support systems. It is shown to improve security, while retaining the high accuracy level of standard fusion approaches on the latest Fingerprint Liveness Detection Competition (LivDet) 2013 dataset.
Resumo:
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.
Resumo:
Summary 1. A trophic cascade occurs when predators directly decrease the densities, or change the behaviour, of herbivores and thus indirectly increase plant productivity. The predator–herbivore– plant context is well known, but some predators attack species beneficial to plants (e.g. pollinators) and/or enemies of herbivores (e.g. parasites), and their role in the dynamics of mutualisms remains largely unexplored. 2. We surveyed the predatory ant species and studied predation by the dominant ant species, the weaver ant Oecophylla smaragdina, associated with the fig tree Ficus racemosa in southwest China. We then tested the effects of weaver ants on the oviposition behaviour of pollinating and non-pollinating fig wasps in an ant-exclusion experiment. The effects of weaver ants on fig wasp community structure and fig seed production were then compared between trees with and without O. smaragdina. 3. Oecophylla smaragdina captured more non-pollinating wasps (Platyneura mayri) than pollinators as the insects arrived to lay eggs. When ants were excluded, more non-pollinators laid eggs into figs and fewer pollinators entered figs. Furthermore, trees with O. smaragdina produced more pollinator offspring and fewer non-pollinator offspring, shifting the community structure significantly. In addition, F. racemosa produced significantly more seeds on trees inhabited by weaver ants. 4. Oecophylla smaragdina predation reverses the dominance of the two commonest wasp species at the egg-laying stage and favours the pollinators. This behavioural pattern is mirrored by wasp offspring production, with pollinators’ offspring dominating figs produced by trees inhabited by weaver ants, and offspring of the non-pollinator P. mayri most abundant in figs on trees inhabited by other ants. 5. Overall, our results suggest that predation by weaver ants limits the success of the non-pollinating P. mayri and therefore indirectly benefits the mutualism by increasing the reproductive success of both the pollinators and the plant. Predation is thus a key functional factor that can shape the community structure of a pollinator-plant mutualistic system. Key-words: competitive release, fig wasp, mutualism, predation, predator-exclusion experiment, trophic cascade
Resumo:
Understanding patterns in predator:prey systems and the mechanisms that underlie trophic interactions provides a basis for predicting community structure and the delivery of natural pest control services. The functional response of predators to prey density is a fundamental measure of interaction strength and its characterisation is essential to understanding these processes. We used mesocosm experiments to quantify the functional responses of five ground beetle species that represent common generalist predators of north-west European arable agriculture. We investigated two mechanisms predicted to be key drivers of trophic interactions in natural communities: predator:prey body size ratio and multiple predator effects. Our results show regularities in foraging patterns characteristic of similarly sized predators. Ground beetle attack rates increased and handling times decreased as the predator:prey body-mass ratio rose. Multiple predator effects on total prey consumption rates were sensitive to the identity of the interacting species but not prey density. The extent of interspecific interactions may be a result of differences in body mass between competing beetle species. Overall these results add to the growing evidence for the importance of size in determining trophic interactions and suggest that body mass could offer a focus on which to base the management of natural enemy assemblages.
Resumo:
Hannah is a 30 year old single mother with two young children. She is of Chinese descent and moved to the UK six years ago; she has a good level of English. Recently her mother suffered a heart attack, which prompted Hannah’s first visit to the general practitioner (GP). Meanwhile Hannah performed a predictive genetic test independently through an online company, which showed an increased risk of developing cardiovascular disease (CVD); she has the ɛ4 variant of the APOE gene. The company has recommended a daily supplement and dietary changes. Blood tests showed raised blood lipids and her GP referred Hannah to a dietitian for lifestyle management. Hannah is very concerned and anxious about her health.