16 resultados para Ataques normandos

em Universidade Federal do Rio Grande do Norte(UFRN)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This participative research interested in the social praxis attempts to understand the moral principles that set the magic rituals and the places of worship of three jurema centers of the potiguar region of Canguaretama. Among other inner particularly aspects of each focused catimbó-jurema center, it is being discussed the collective standards involved in the reliance and fellowship values assumed in the private magical gatherings by the juremeiras leaders and their partners, in contrast to the prestige seeking and the individualism that influence both the symbolic competitions and the witchcraft works that link these agents to the broader catimbozeiro universe of this region. Finally, the moral practices which make part of the juremeiro left-right dualism are investigated based on the understanding that the referred native pantheonic-ritual dichotomy does not necessarily express two moralities substantially adversed in terms of benefits or harms, but a series of moral actions subject to the specular logic of the tit-for tat. Thus, this research seeks to prove that this moral structure of symbolic reciprocity, as well as the witchcraft centrality in the catimbozeiro world, finds a certain causal link in a world view which guiding principle is the ontological evil of the catholic cosmology

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Natural nanoclays are of great interest particularly for the production of polymer-based nanocomposites. In this work, kaolinite clays from two natural deposits in the State of the Rio Grande do Norte and Paraiba were purified with thermal treatment and chemical treatments, and characterized. Front to the gotten data, had been proposals methodologies for elimination or reduction of coarse particle texts, oxide of iron and organic substance. These methodologies had consisted of the combination of operations with thermal treatments, carried through in electric oven, and acid chemical attacks with and hydrogen peroxide. The Analyzers Thermogravimetric was used to examine the thermal stability of the nanoclays. The analysis indicated weight losses at temperatures under 110 ºC and over the temperature range of 350 to 550 ºC. Based on the thermal analysis data, the samples were submitted to a thermal treatment at 500 °C, for 8 h, to remove organic components. The X-ray diffraction patterns indicated that thermal treatment under 500 °C affect the basic structure of kaolinite. The BET surface area measurements ranged from 32 to 38 m2/g for clay samples with thermal treatment and from 36 to 53 m2/g for chemically treated samples. Thus, although the thermal treatment increased the surface area, through the removal of organic components, the effect was not significant and chemical treatment is more efficient, not affect the basic structure of kaolinite, to improve particle dispersion. SEM analysis confirms that the clay is agglomerated forming micron-size particles

Relevância:

10.00% 10.00%

Publicador:

Resumo:

O objetivo do nosso projeto foi determinar as características dos recém nascidos com crises convulsivas internados em unidades de terapia intensiva. Foi realizada uma pesquisa multicêntrica, observacional, prospectiva, cuja população alvo foi os recém nascidos com crises convulsivas internados em unidades de terapia intensiva, envolvendo equipe multidisciplinar constituída por neurologista infantil, neonatologistas, intensivistas pediátricos, enfermeiros, técnicos de enfermagem e fisioterapêutas. As crises foram definidas pelo critério clínico, com classificação de Volpe. Variáveis relacionadas à gestação, ao parto, características dos recém nascidos, aspectos das crises convulsivas e mortalidade foram analisadas. Estatística: descritiva (freqüências, medidas de tendência central e dispersão) e análise (teste de probabilidade, teste de risco e de acurácia). Comparamos as crises clínicas entre os recém nascidos de termo e pretermo e observamos diferenças com significância estatística na idade de início das crises, mais tardia nos prematuros, na etiologia predominante: hemorragia peri-intraventricular no prematuro e encefalopatia hipóxico-isquêmica no termo e tipo clínico de crise, clônica no pretermo e sutil no termo. Os testes de acurácia utilizados para determinar se o tipo clínico de crise convulsiva é predictor da etiologia da mesma não revelaram resultados positivos. Quanto às características associadas à mortalidade de prematuros com crise convulsiva, observamos associação entre ventilação mecânica e pneumonia com a mortalidade. Existem diferenças clínicas quando comparamos os recém nascidos pretermo e de termo com crises convulsivas, confirmando dados da literatura

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Brazilian Constitution aims to regularize the broadest possible the fundamental grounded in the value and supreme principle of human dignity, supporting a Democratic State of Law, to essentially give basic rights to all for a dignified existence. As the result of a historical development, fundamental rights incorporated by legal order represents a real reaction against acts that ignored the dignity of each person in one of these scenarios, especially inserted into the labor relationship, the principle of protection comes to balance and compose such relationship between employers and workers, raising this principle as axiological essence of this subject, based especially on the protection and guarantee of fundamental rights of the worker. For this study, was developed a literature research using books, legislation, legal websites and articles related to the subject, in order to analyze the principle of protection insert in the legal order, properly authoritative on the principle of equality, the social value of the work of human dignity to confer protection to the most vulnerable and admittedly weak of the labor relationship in order to serve the specific regulations legal practical tools and effective protection, against the employer hierarchical power and steering that can not change into abuses and attacks on the fundamental rights of the worker. In conclusion, is not enough, recognizing the vulnerability of the worker, it is necessary to carry out protective legal instruments in line with the the human dignity, consectário logical fundamental rights of workers, to be held in a proportional manner and sometimes flexible, depending on the case. Protection has a beginning and end to ensure that the human dignity that must presuppose a working relationship achieved by orderly and normative power of constitutional norms, with the aim of designing that labor is not an end in itself, but a means to the achievement of the economic advancement by promoting social development and providing necessary support for the increasingly marked impairment of fundamental rights of the worker

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Due to lack of work on the history of Baptist schools in the Northeast region of Brazil, it is important to understand through a historical reconstruction of the Baptist Protestant education. We embarked on this venture as a chance to understand the presence of Protestant schools, and his ideas on Brazilian soil. Our goal is to promote a reflection which has the axial dimension of the Baptists Protestant education, in time, we will place the debate between 1902-1942. The temporal boundaries of 1902-1942 was because 1902 was when he started the American Baptist College of Recife in 1942 and that ends the cycle of managing directors of Americans. Understand the functionality of time a school is justified when we realize that the history of education is the story of a work of self and formation within a framework that has the school as the main support that can enable a reading of reality. We also intend to examine the school culture brought to Brazil by American missionaries and their applicability in the Brazilian cultural-historical context. And just to demonstrate the hypothesis that the educational contribution of Baptists added to the participation of other Protestants promoted advances in Brazilian society. Possibly taking for granted that the Baptists were in possession of the democratic ideals of religious freedom, taken by many representatives and religious version of the republican regime. In addition to promoting a model in Brazil to make different methodological schools, based on the ideals of new school and ethics of the Bible. Our proposed research aims at understanding how North American missionaries settled in Brazil and what were the purposes of adding to the efforts of evangelization to formal education, binomial that justified the establishment of schools. A vision of saving men for evangelization and education of the Devil attack victims over the ethics of Christ

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information is one of the most valuable organization s assets, mainly on a global and highly competitive world. On this scenery there are two antagonists forces: on one side, organizations struggle for keeping protected its information, specially those considered as strategic, on the other side, the invaders, leaded by innumerous reasons - such as hobby, challenge or one single protest with the intention of capturing and corrupting the information of other organizations. This thesis presents the descriptive results of one research that had as its main objective to identify which variables influence the Executives´ and CIOs´ perceptions toward Information Security. In addition, the research also identified the profile of Rio Grande do Norte s organizations and its Executives/CIOs concerning Information Security, computed the level of agreement of the respondents according to NBR ISO/IEC 17799 (Information technology Code of practice for information security management) on its dimension Access Control. The research was based on a model, which took into account the following variables: origin of the organization s capital, sector of production, number of PCs networked, number of employees with rights to network, number of attacks suffered by the organizations, respondent´s positions, education level, literacy on Information Technology and specific training on network. In the goal´s point of view, the research was classified as exploratory and descriptive, and, in relation of the approach, quantitative. One questionnaire was applied on 33 Executives and CIOs of the 50 Rio Grande do Norte s organizations that collected the highest taxes of ICMS - Imposto sobre Circulação de Mercadorias on 2000. After the data collecting, cluster analysis and chi-square statistical tools were used for data analysis. The research made clear that the Executives and CIOs of Rio Grande do Norte s organizations have low level of agreement concerning the rules of the NBR ISO/IEC 17799. It also made evident that the Executives and CIOs have its perception toward Information Security influenced by the number of PCs networked and by the number of attacks suffered by the organizations

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increasing of the number of attacks in the computer networks has been treated with the increment of the resources that are applied directly in the active routers equip-ments of these networks. In this context, the firewalls had been consolidated as essential elements in the input and output control process of packets in a network. With the advent of intrusion detectors systems (IDS), efforts have been done in the direction to incorporate packets filtering based in standards of traditional firewalls. This integration incorporates the IDS functions (as filtering based on signatures, until then a passive element) with the already existing functions in firewall. In opposite of the efficiency due this incorporation in the blockage of signature known attacks, the filtering in the application level provokes a natural retard in the analyzed packets, and it can reduce the machine performance to filter the others packets because of machine resources demand by this level of filtering. This work presents models of treatment for this problem based in the packets re-routing for analysis by a sub-network with specific filterings. The suggestion of implementa- tion of this model aims reducing the performance problem and opening a space for the consolidation of scenes where others not conventional filtering solutions (spam blockage, P2P traffic control/blockage, etc.) can be inserted in the filtering sub-network, without inplying in overload of the main firewall in a corporative network

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless sensors and actuators Networks specified by IEEE 802.15.4, are becoming increasingly being applied to instrumentation, as in instrumentation of oil wells with completion Plunger Lift type. Due to specific characteristics of the environment being installed, it s find the risk of compromising network security, and presenting several attack scenarios and the potential damage from them. It`s found the need for a more detailed security study of these networks, which calls for use of encryption algorithms, like AES-128 bits and RC6. So then it was implement the algorithms RC6 and AES-128, in an 8 bits microcontroller, and study its performance characteristics, critical for embedded applications. From these results it was developed a Hybrid Algorithm Cryptographic, ACH, which showed intermediate characteristics between the AES and RC6, more appropriate for use in applications with limitations of power consumption and memory. Also was present a comparative study of quality of security among the three algorithms, proving ACH cryptographic capability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Attacks to devices connected to networks are one of the main problems related to the confidentiality of sensitive data and the correct functioning of computer systems. In spite of the availability of tools and procedures that harden or prevent the occurrence of security incidents, network devices are successfully attacked using strategies applied in previous events. The lack of knowledge about scenarios in which these attacks occurred effectively contributes to the success of new attacks. The development of a tool that makes this kind of information available is, therefore, of great relevance. This work presents a support system to the management of corporate security for the storage, retrieval and help in constructing attack scenarios and related information. If an incident occurs in a corporation, an expert must access the system to store the specific attack scenario. This scenario, made available through controlled access, must be analyzed so that effective decisions or actions can be taken for similar cases. Besides the strategy used by the attacker, attack scenarios also exacerbate vulnerabilities in devices. The access to this kind of information contributes to an increased security level of a corporation's network devices and a decreased response time to occurring incidents

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present essay has how I aim to analyse the memories of the ex-combatants of Parelhas-RN, specially of the components of the Força de Vigilância e Segurança do Litoral - FVSL, protagonists of the Brazilian participation in the scenery of the Second World war. Along this we looked to understand in which surrounding geographicalpartner these men were living before the War and what were the consequences of a brusque change of space owing to the convocation for the Armed Brazilian Strength in that historical context. The defense of the Brazilian coast during the War was not a so simple task, I have in mind the precariedade logistics of the Armed Strength, the attacks of submarines of the Axle that killed hundreds of civilians and Brazilian soldiers and the net of espionage mounted by Germany in Brazil. Leaving from the notion of collective memory and estrangement in Maurice Halbwachs, we will use the oral history like principal methodology, with the end of rescue these underground memories what also will make possible us the vision realizes that the protagonists themselves have of the event, besides the use of documents, photos, maps and any sort of fountains that make possible us to rebuild the scenery of Parelhas in the beginning of the War and the trajectory of life of his veterans

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Among placental mammals, primates are the only ones to present trichromatic color vision. However, the distribution of trichromacy among primates is not homogeneous: Old World primates shows an uniform trichromacy (with all individuals being trichromats) and New World primates exhibit a color vision polymorphism (with dichromatic males and dichromatic or trichromatic females). Visual ecology studies have investigated which selective pressures may have been responsible for the evolution of trichromacy in primates, diverging from the dichromat standard found in other mammals. Cues associated with foraging and the socio-reproductive status were analyzed, indicating a trichromatic advantage for the rapid detection of visually conspicuous objects against a green background. However, dichromats are characterized by an efficient capture of cryptic and camouflaged stimuli. These advantages regarding phenotype may be responsible for the maintenance of the visual polymorphism in New World primates and for the high incidence of color blindness in humans (standing around 8% in Caucasian men). An important factor that has not yet been experimentally taken into account is the predation risk and its effect on the evolution of trichromacy in primates. To answer this question, we prepared and edited pictures of animals with different coats: oncillas (Leopardus spp.), puma (Puma concolor) and ferret (Galictis cuja). The specimens were taxidermized and the photographs were taken in three different vegetation scenarios (dense forest, cerrado and grassland). The images of the predators were manipulated so that they fit into two categories of stimulus size (small or large). After color calibration and photo editing, these were presented to 40 humans (20 dichromats and 20 trichromats) by a computer program, which presented a set of four photos at a time (one picture containing the taxidermized animal amid the background vegetation and three depicting only the background vegetation) and recorded the response latency and success rate of the subjects. The results show a trichromatic advantage in detecting potential predators. The predator detection was influenced by the background, the predator species, the dimension of the stimulus and the observer s visual phenotype. As humans have a high rate of dyschromatopsias, when compared to wild Catarrhini or human tribal populations, it is possible that the increased rate of dichromats is a result of reduced pressure for rapid predator detection. Since our species came to live in more cohesive groups and resistant to attack by predators, with the advent of agriculture and the formation of villages, it is possible that the lower risk of predation has reduced the selection in favor of trichromats

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The information constitutes one of the most valuable strategic assets for the organization. However, the organizational environment in which it is inserted is very complex and heterogeneous, making emerging issues relevant to the Governance of information technology (IT) and Information Security. Academic Studies and market surveys indicate that the origin of most accidents with the information assets is the behavior of people organization itself rather than external attacks. Taking as a basis the promotion of a culture of safety among users and ensuring the protection of information in their properties of confidentiality, integrity and availability, organizations must establish its Information Security Policy (PSI). This policy is to formalise the guidelines in relation to the security of corporate information resources, in order to avoid that the asset vulnerabilities are exploited by threats and can bring negative consequences to the business. But, for the PSI being effective, it is required that the user have readiness to accept and follow the procedures and safety standards. In the light of this context, the present study aims to investigate what are the motivators extrinsic and intrinsic that affect the willingness of the user to be in accordance with the organization's security policies. The theoretical framework addresses issues related to IT Governance, Information Security, Theory of deterrence, Motivation and Behavior Pro-social. It was created a theoretical model based on the studies of Herath and Rao (2009) and D'Arcy, Hovav and Galletta (2009) that are based on General Deterrence Theory and propose the following influencing factors in compliance with the Policy: Severity of Punishment, Certainty of Detection, Peer Behaviour, Normative Beliefs, Perceived Effectiveness and Moral Commitment. The research used a quantitative approach, descriptive. The data were collected through a questionnaire with 18 variables with a Likert scale of five points representing the influencing factors proposed by the theory. The sample was composed of 391 students entering the courses from the Center for Applied Social Sciences of the Universidade Federal do Rio Grande do Norte. For the data analysis, were adopted the techniques of Exploratory Factor Analysis, Analysis of Cluster hierarchical and nonhierarchical, Logistic Regression and Multiple Linear Regression. As main results, it is noteworthy that the factor severity of punishment is what contributes the most to the theoretical model and also influences the division of the sample between users more predisposed and less prone. As practical implication, the research model applied allows organizations to provide users less prone and, with them, to carry out actions of awareness and training directed and write Security Policies more effective.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The advance of drilling in deeper wells has required more thermostable materials. The use of synthetic fluids, which usually have a good chemical stability, faces the environmental constraints, besides it usually generate more discharge and require a costly disposal treatment of drilled cuttings, which are often not efficient and require mechanical components that hinder the operation. The adoption of aqueous fluids generally involves the use of chrome lignosulfonate, used as dispersant, which provides stability on rheological properties and fluid loss under high temperatures and pressures (HTHP). However, due to the environmental impact associated with the use of chrome compounds, the drilling industry needs alternatives that maintain the integrity of the property and ensure success of the operation in view of the strong influence of temperature on the viscosity of aqueous fluids and polymers used in these type fluids, often polysaccharides, passives of hydrolysis and biological degradation. Therefore, vinyl polymers were selected for this study because they have predominantly carbon chain and, in particular, polyvinylpyrrolidone (PVP) for resisting higher temperatures and partially hydrolyzed polyacrylamide (PHPA) and clay by increasing the system's viscosity. Moreover, the absence of acetal bonds reduces the sensitivity to attacks by bacteria. In order to develop an aqueous drilling fluid system for HTHP applications using PVP, HPAM and clay, as main constituents, fluid formulations were prepared and determined its rheological properties using rotary viscometer of the Fann, and volume filtrate obtained by filtration HTHP following the standard API 13B-2. The new fluid system using polyvinylpyrrolidone (PVP) with high molar weight had higher viscosities, gels and yield strength, due to the effect of flocculating clay. On the other hand, the low molecular weight PVP contributed to the formation of disperse systems with lower values in the rheological properties and fluid loss. Both systems are characterized by thermal stability gain up to around 120 ° C, keeping stable rheological parameters. The results were further corroborated through linear clay swelling tests.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The advance of drilling in deeper wells has required more thermostable materials. The use of synthetic fluids, which usually have a good chemical stability, faces the environmental constraints, besides it usually generate more discharge and require a costly disposal treatment of drilled cuttings, which are often not efficient and require mechanical components that hinder the operation. The adoption of aqueous fluids generally involves the use of chrome lignosulfonate, used as dispersant, which provides stability on rheological properties and fluid loss under high temperatures and pressures (HTHP). However, due to the environmental impact associated with the use of chrome compounds, the drilling industry needs alternatives that maintain the integrity of the property and ensure success of the operation in view of the strong influence of temperature on the viscosity of aqueous fluids and polymers used in these type fluids, often polysaccharides, passives of hydrolysis and biological degradation. Therefore, vinyl polymers were selected for this study because they have predominantly carbon chain and, in particular, polyvinylpyrrolidone (PVP) for resisting higher temperatures and partially hydrolyzed polyacrylamide (PHPA) and clay by increasing the system's viscosity. Moreover, the absence of acetal bonds reduces the sensitivity to attacks by bacteria. In order to develop an aqueous drilling fluid system for HTHP applications using PVP, HPAM and clay, as main constituents, fluid formulations were prepared and determined its rheological properties using rotary viscometer of the Fann, and volume filtrate obtained by filtration HTHP following the standard API 13B-2. The new fluid system using polyvinylpyrrolidone (PVP) with high molar weight had higher viscosities, gels and yield strength, due to the effect of flocculating clay. On the other hand, the low molecular weight PVP contributed to the formation of disperse systems with lower values in the rheological properties and fluid loss. Both systems are characterized by thermal stability gain up to around 120 ° C, keeping stable rheological parameters. The results were further corroborated through linear clay swelling tests.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This participative research interested in the social praxis attempts to understand the moral principles that set the magic rituals and the places of worship of three jurema centers of the potiguar region of Canguaretama. Among other inner particularly aspects of each focused catimbó-jurema center, it is being discussed the collective standards involved in the reliance and fellowship values assumed in the private magical gatherings by the juremeiras leaders and their partners, in contrast to the prestige seeking and the individualism that influence both the symbolic competitions and the witchcraft works that link these agents to the broader catimbozeiro universe of this region. Finally, the moral practices which make part of the juremeiro left-right dualism are investigated based on the understanding that the referred native pantheonic-ritual dichotomy does not necessarily express two moralities substantially adversed in terms of benefits or harms, but a series of moral actions subject to the specular logic of the tit-for tat. Thus, this research seeks to prove that this moral structure of symbolic reciprocity, as well as the witchcraft centrality in the catimbozeiro world, finds a certain causal link in a world view which guiding principle is the ontological evil of the catholic cosmology