40 resultados para ATTACKS
em CentAUR: Central Archive University of Reading - UK
Resumo:
The pea aphid, Acyrthosiphon pisum Harris (Hemiptera: Aphididae) is found in red and green color morphs. Previous work has suggested that the aphidiine parasitoid Aphidius ervi Haliday preferentially attacks green pea aphids in the field. It is not clear whether these results reflect a real preference, or some unknown clonal difference, such as in immunity, between the aphids used in the previous studies. We used three susceptibility-matched pairs of red and green morph pea aphid clones to test for preferences. In a no-choice situation, the parasitoids attacked equal proportions of each color morph. When provided with a choice, A. ervi was significantly more likely to oviposit into colonies formed from green morphs when the neighboring colony was formed from red morph aphids. In contrast, red morphs were less likely to be attacked when their neighboring colony was of the green morph. By preferentially attacking green colonies, A. ervi may reduce the likelihood of intraguild predation, as it is suggested that visually foraging predators preferentially attack red aphid colonies. Furthermore, if this host choice behavior is replicated in the field, we speculate that color morphs of the pea aphid may interact indirectly through their shared natural enemies, leading to intraspecific apparent competition.
Resumo:
An extensive set of machine learning and pattern classification techniques trained and tested on KDD dataset failed in detecting most of the user-to-root attacks. This paper aims to provide an approach for mitigating negative aspects of the mentioned dataset, which led to low detection rates. Genetic algorithm is employed to implement rules for detecting various types of attacks. Rules are formed of the features of the dataset identified as the most important ones for each attack type. In this way we introduce high level of generality and thus achieve high detection rates, but also gain high reduction of the system training time. Thenceforth we re-check the decision of the user-to- root rules with the rules that detect other types of attacks. In this way we decrease the false-positive rate. The model was verified on KDD 99, demonstrating higher detection rates than those reported by the state- of-the-art while maintaining low false-positive rate.
Resumo:
Since the terrorist attacks of September 11, 2001, international law has had to grapple with the fundamental challenges that large-scale violence carried out by non-State actors poses to the traditional inter- State orientation of international law. Questions related to the “adequacy” and “effectiveness” of international humanitarian law, international human rights law and the law related to the use of force have been particularly pronounced. This paper focuses on the international humanitarian law implications of American drone attacks in northwest Pakistan. A highly-advanced modality of modern warfare, armed drones highlight the possibilities, problems, prospects and pitfalls of high-tech warfare. How is the battlefield to be defined and delineated geographically and temporally? Who can be targeted, and by whom? Ultimately, this paper concludes that American drone attacks in northwest Pakistan are not unlawful as such under international humanitarian law, though, like any tactical decision in the context of asymmetric warfare, they should be continuously and closely monitored according to the dictates of law with sensitivity to facts on the ground.
Resumo:
Anti-spoofing is attracting growing interest in biometrics, considering the variety of fake materials and new means to attack biometric recognition systems. New unseen materials continuously challenge state-of-the-art spoofing detectors, suggesting for additional systematic approaches to target anti-spoofing. By incorporating liveness scores into the biometric fusion process, recognition accuracy can be enhanced, but traditional sum-rule based fusion algorithms are known to be highly sensitive to single spoofed instances. This paper investigates 1-median filtering as a spoofing-resistant generalised alternative to the sum-rule targeting the problem of partial multibiometric spoofing where m out of n biometric sources to be combined are attacked. Augmenting previous work, this paper investigates the dynamic detection and rejection of livenessrecognition pair outliers for spoofed samples in true multi-modal configuration with its inherent challenge of normalisation. As a further contribution, bootstrap aggregating (bagging) classifiers for fingerprint spoof-detection algorithm is presented. Experiments on the latest face video databases (Idiap Replay- Attack Database and CASIA Face Anti-Spoofing Database), and fingerprint spoofing database (Fingerprint Liveness Detection Competition 2013) illustrate the efficiency of proposed techniques.
Resumo:
This article analyses the counter-terrorist operations carried out by Captain (later Major General) Orde Wingate in Palestine in 1938, and considers whether these might inform current operations. Wingate's Special Night Squads were formed from British soldiers and Jewish police specifically to counter terrorist and sabotage attacks. Their approach escalated from interdicting terrorist gangs to pre-emptive attacks on suspected terrorist sanctuaries to reprisal attacks after terrorist atrocities. They continued the British practice of using irregular units in counter-insurgency, which was sustained into the postwar era and contributed to the evolution of British Special Forces. Wingate's methods proved effective in pacifying terrorist-infested areas and could be applied again, but only in the face of 'friction' arising from changes in cultural attitudes since the 1930s, and from the political-strategic context of post-2001 counter-insurgent and counter-terrorist operations. In some cases, however, public opinion might not preclude the use of some of Wingate's techniques.
Resumo:
1. Insect predators often aggregrate to patches of high prey density and use prey chemicals as cues for oviposition. If prey have mutualistic guardians such as ants, however, then these patches may be less suitable for predators. 2. Ants often tend aphids and defend them against predators such as ladybirds. Here, we show that ants can reduce ladybird performance by destroying eggs and physically attacking larvae and adults. 3. Unless ladybirds are able to defend against ant attacks they are likely to have adaptations to avoid ants. We show that Adalia bipunctata ladybirds not only move away from patches with Lasius niger ants, but also avoid laying eggs in these patches. Furthermore, ladybirds not only respond to ant presence, but also detect ant semiochemicals and alter oviposition strategy accordingly. 4. Ant semiochemicals may signal the extent of ant territories allowing aphid predators to effectively navigate a mosaic landscape of sub-optimal patches in search of less well-defended prey. Such avoidance probably benefits both ants and ladybirds, and the semiochemicals could be regarded as a means of cooperative communication between enemies. 5. Overall, ladybirds respond to a wide range of positive and negative oviposition cues that may trade-off with each other and internal motivation to determine the overall oviposition strategy.
Resumo:
Emerging parasitoids of aphids encounter secondary plant chemistry from cues left by the mother parasitoid at oviposition and from the plant-feeding of the host aphid. In practice, however, it is secondary plant cheinistry oil the Surface of the aphid mummy which influences parasitoid olfactory behaviour. Offspring of Aphidius colemani reared oil Myzus persicae on artificial diet did no distinguish between the odours of bean and cabbage, but showed a clear preference for cabbage odour if sinigrin had been painted oil the back of the mummy. Similarly Aphidius rhopalosiphi reared on Metopolophium dirhodum on wheat preferred the odour of wheat plants grown near tomato plants to odour of wheat alone if the wheat plants oil which they had been reared had been exposed to the volatiles of nearby tomato plants. Aphidius rhopalosiphi reared on M dirhodum, and removed from the mummy before emergence, showed a preference for the odour of a different wheat cultivar if they had contacted a mummy from that cultivar, and similar results were obtained with A. colemani naturally emerged from M. persicae mummies. Aphidius colemani emerged from mummies oil one crucifer were allowed to contact in sequence (for 45 min each) mummies from two different crucifers. The mumber of attacks made in 10 min oil M. persicae was always significantly higher when aphids were feeding oil the same plant as the origin of the last MUMMY offered, or oil the second plant if aphids feeding on the third plant were not included. Chilling emerged A. colemani for 24 h at 5 degrees C appeared to erase the imprint of secondary plant chemistry, and they no longer showed host plant odour preferences in the olfactometer. When the parasitoids were chilled after three Successive mummy experiences, memory of the last experience appeared at least temporarily erased and preference was then shown for the chemistry of the second experience.
Resumo:
The development of cancer in humans and animals is a multistep process. The complex series of cellular and molecular changes participating in cancer development are mediated by a diversity of endogenous and exogenous stimuli. One type of endogenous damage is that arising from intermediates of oxygen (dioxygen) reduction - oxygen-free radicals (OFR), which attacks not only the bases but also the deoxyribosyl backbone of DNA. Thanks to improvements in analytical techniques, a major achievement in the understanding of carcinogenesis in the past two decades has been the identification and quantification of various adducts of OFR with DNA. OFR are also known to attack other cellular components such as lipids, leaving behind reactive species that in turn can couple to DNA bases. Endogenous DNA lesions are genotoxic and induce mutations. The most extensively studied lesion is the formation of 8-OH-dG. This lesion is important because it is relatively easily formed and is mutagenic and therefore is a potential biomarker of carcinogenesis. Mutations that may arise from formation of 8-OH-dG involve GC. TA transversions. In view of these findings, OFR are considered as an important class of carcinogens. The effect of OFR is balanced by the antioxidant action of non-enzymatic antioxidants as well as antioxidant enzymes. Non-enzymatic antioxidants involve vitamin C, vitamin E, carotenoids (CAR), selenium and others. However, under certain conditions, some antioxidants can also exhibit a pro-oxidant mechanism of action. For example, beta-carotene at high concentration and with increased partial pressure of dioxygen is known to behave as a pro-oxidant. Some concerns have also been raised over the potentially deleterious transition metal ion-mediated (iron, copper) pro-oxidant effect of vitamin C. Clinical studies mapping the effect of preventive antioxidants have shown surprisingly little or no effect on cancer incidence. The epidemiological trials together with in vitro experiments suggest that the optimal approach is to reduce endogenous and exogenous sources of oxidative stress, rather than increase intake of anti-oxidants. In this review, we highlight some major achievements in the study of DNA damage caused by OFR and the role in carcinogenesis played by oxidatively damaged DNA. The protective effect of antioxidants against free radicals is also discussed.
Resumo:
Olive oil is a key component of the traditional Mediterranean diet; a diet that may explain the low rate of cardiovascular disease (CVD) in Southern European. (Extra virgin) Olive oil is a good source of monounsaturated fatty acids (MUFA) and phenolic compounds, both of which have been investigated for their effects on plasma lipids and lipoproteins, measures of oxidation and factors related to thrombosis. This issue aims to summarise the current understanding of the effects of such dietary components on the haemostatic system and subsequent risk of CVD. To date, evidence suggests that diets rich in MUFA and thus in olive oil attenuate the thrombotic response via a reduction in platelet aggregation and in postprandial FVII levels. Thrombosis is a key event in causing heart attacks and strokes, which if modulated by diet could pose a cost-effective way of reducing CVD incidence in populations that adhere to MUFA/olive oil-rich diets long-term.
Resumo:
Complement-mediated inflammation exacerbates the tissue injury of ischaemic necrosis in heart attacks and strokes, the most common causes of death in developed countries. Large infarct size increases immediate morbidity and mortality and, in survivors of the acute event, larger non-functional scars adversely affect long-term prognosis. There is thus an important unmet medical need for new cardioprotective and neuroprotective treatments. We have previously shown that human C-reactive protein (CRP), the classical acute-phase protein that binds to ligands exposed in damaged tissue and then activates complement(1), increases myocardial and cerebral infarct size in rats subjected to coronary or cerebral artery ligation, respectively(2,3). Rat CRP does not activate rat complement, whereas human CRP activates both rat and human complement(4). Administration of human CRP to rats is thus an excellent model for the actions of endogenous human CRP2,3. Here we report the design, synthesis and efficacy of 1,6-bis(phosphocholine)-hexane as a specific small-molecule inhibitor of CRP. Five molecules of this palindromic compound are bound by two pentameric CRP molecules, crosslinking and occluding the ligand-binding B-face of CRP and blocking its functions. Administration of 1,6-bis(phosphocholine)-hexane to rats undergoing acute myocardial infarction abrogated the increase in infarct size and cardiac dysfunction produced by injection of human CRP. Therapeutic inhibition of CRP is thus a promising new approach to cardioprotection in acute myocardial infarction, and may also provide neuroprotection in stroke. Potential wider applications include other inflammatory, infective and tissue-damaging conditions characterized by increased CRP production, in which binding of CRP to exposed ligands in damaged cells may lead to complement-mediated exacerbation of tissue injury.
Resumo:
Threatening intrusive images are central to posttraumatic stress disorder. It has been suggested that intrusive imagery in the context of a sense of threat leads to the development and persistence of posttraumatic stress symptoms. This study investigates London school children's (N = 76; age 10-11 years) self-reported posttraumatic stress symptoms in response to viewing the attacks of September 11, 2001 on television. Assessments were made at two time points. A minority of participants reported moderate-severe symptoms with functional impairment at 2 months (14.5%) and 6 months (9.2%) after viewing the September 11events. After controlling for symptom stability, persistent symptoms were associated with peri-traumatic factors, notably perceiving that one's life was in danger. The combined effect of intrusive imagery and peri-traumatic life threat was associated with symptom persistence. Assessments of intrusive image content via checklist and free-report indicated that the images were directly related to September 11 and were fairly stable over time. Implications for treating children's intrusive images following stressful events are explored. (C) 2007 Elsevier Ltd. All rights reserved.
Resumo:
This paper represents the first step in an on-going work for designing an unsupervised method based on genetic algorithm for intrusion detection. Its main role in a broader system is to notify of an unusual traffic and in that way provide the possibility of detecting unknown attacks. Most of the machine-learning techniques deployed for intrusion detection are supervised as these techniques are generally more accurate, but this implies the need of labeling the data for training and testing which is time-consuming and error-prone. Hence, our goal is to devise an anomaly detector which would be unsupervised, but at the same time robust and accurate. Genetic algorithms are robust and able to avoid getting stuck in local optima, unlike the rest of clustering techniques. The model is verified on KDD99 benchmark dataset, generating a solution competitive with the solutions of the state-of-the-art which demonstrates high possibilities of the proposed method.