105 resultados para Malicious intent
Resumo:
The combination of pegylated interferon (PEG-INF) and ribavirin is currently the best treatment for chronic hepatitis C, providing a sustained virological response (SVR) in 54%-63% of patients. In patients infected with hepatitis C virus (HCV) genotype 1, the SVR rate is 42%-52%. To evaluate the treatment efficacy of this drug combination, we conducted an open, prospective study of 58 consecutive treatment-naive patients infected with HCV genotype 1 and treated at a university hospital, comparing those presenting an SVR (SVRs), nonresponders (NRs), and relapsers (RELs). Among the intent-to-treat patients, an end-of-treatment virological response was achieved in 69 % of the sample as a whole and in 52 % of the SVRs. We found that being an SVR was significantly associated with mild fibrosis (p = 0.04) and with undetectable HCV RNA at weeks 12 and 24 of treatment (p < 0.0001). Comparing the SVR and REL groups, we observed that being older than 40 was significantly associated with being a REL (p = 0.04). Being an NR was found to be associated with severe fibrosis and moderate inflammatory infiltrates (portal or periportal). In the polytomous logistic regression, no independent factors were associated with the REL group when compared with the SVR group. We conclude that RELs and NRs differ in comparison with SVRs. The RELs accounted for 17% of the sample. The HCV RNA test results at weeks 12 and 24 of treatment, although independent predictors of non-response (OR: 4.8 and 8.2, respectively), did not differ between SVRs and RELs.
Resumo:
In this article, an implementation of structural health monitoring process automation based on vibration measurements is proposed. The work presents an alternative approach which intent is to exploit the capability of model updating techniques associated to neural networks to be used in a process of automation of fault detection. The updating procedure supplies a reliable model which permits to simulate any damage condition in order to establish direct correlation between faults and deviation in the response of the model. The ability of the neural networks to recognize, at known signature, changes in the actual data of a model in real time are explored to investigate changes of the actual operation conditions of the system. The learning of the network is performed using a compressed spectrum signal created for each specific type of fault. Different fault conditions for a frame structure are evaluated using simulated data as well as measured experimental data.
Resumo:
The purpose of this study was to compare the efficacy and tolerability of venlafaxine and amitriptyline in outpatients with major depression with or without melancholia. This was an 8-week, multicentre, randomized, double-blind, parallel-group comparison of venlafaxine and amitriptyline. Outpatients with DSM-IV major depression, a minimum score of 20 on the 21-item Hamilton Depression Rating Scale (HAM-D), and depressive symptoms for at least 1 month were eligible. Patients were randomly assigned to venlafaxine or amitriptyline, both drugs titrated to a maximum of 150 mg/day until study day 15. The primary efficacy variables were the final on-therapy scores on the HAM-D, Montgomery-Asberg Depression Rating Scale and Clinical Global Impression severity scales. Data were evaluated on an intent-to-treat basis using the LOCF method. One hundred and 16 patients were randomized, and 115 were evaluated for efficacy. Both drugs showed efficacy in the treatment of depression with or without melancholia. No significant differences were noted between treatments for any efficacy parameter. However, significantly (p < 0.05) more patients in the amitriptyline group had at least one adverse event. These results should support the efficacy and tolerability of venlafaxine in comparison with amitriptyline for treating major depression with or without melancholia.
Resumo:
Fruits have been considered an important feeding resource used not only by frugivorous birds, but also by omnivore and some insectivore species. In the present paper we are reporting the behavior of birds consuming fruits of Davilla rugosa (Dilleniaceae). Handling behavior and visits frequency were analyzed in order to infer about the potential ornithochoric seed dispersal. Focal observations were carried out from October to December 1999 in a cerrado fragment located in São Paulo State, Southeastern Brazil (21°58′S, 47°52′W). In 60 h of field work we recorded 241 visits of 13 passerine bird species consuming the fruits. The mean number of visits per hour and the standard deviation were 4.01 ± 4.88. All of the species were considered potential seed dispersers, since no pulp mashers or seed predators were observed. No temporal difference in visit frequency was found when all of the species were analyzed together or when they were individually considered. Generalist species were responsible for 68.5% of the visits, followed by frugivorous (22.82%) and insectivorous (8.71%). The main potential seed dispersers were Elaenia spp. (Tyrannidae), Tangara cayana (Emberizidae), Empidonomus varius (Tyrannidae), Turdus leucomelas (Muscicapidae) and Vireo chivi (Vireonidae). The high visit frequency observed suggests that D. rugosa fruits may be an important feeding resource for birds in the cerrado ecosystem, in the manner that this plant can be considered in management plans which intent to maintain or rescue bird communities.
Influence of natural fruit juices in removing the smear layer from root surfaces - An in vitro study
Resumo:
Certain elements of a patient's diet may be associated with dentin hypersensitivity. The intent of this study was to evaluate the degree of removal of the smear layer from dentin surfaces by various fruit juices. A smear layer was created on extracted human teeth by manual scaling. The roots were reduced and distributed into 8 experimental groups. Distilled water was the negative control. The juices were applied by 2 methods: topical application and topical application with friction. Specimens were photomicrographed and graded according to an index of smear layer removal. With topical application, all but 2 of the tested substances resulted in significantly greater removal of the smear layer and opening of dentinal tubules than was the case with the negative control (p = 0.05); the exceptions were Gala apple and Italian grape juices, which were no different from the control. For the active application (with friction), most substances removed more smear layer than the control (p < 0.05); Gala apple, Italian grape and orange juices were similar to the control. For each of the tested substances, removal of the smear layer did not differ with the method of application (topical vs. friction; p > 0.05). It is concluded that natural fruit juices can remove the smear layer from dentin surfaces, and the efficacy of this removal varies with the type of juice. © J Can Dent Assoc 2004.
Resumo:
Malware has become a major threat in the last years due to the ease of spread through the Internet. Malware detection has become difficult with the use of compression, polymorphic methods and techniques to detect and disable security software. Those and other obfuscation techniques pose a problem for detection and classification schemes that analyze malware behavior. In this paper we propose a distributed architecture to improve malware collection using different honeypot technologies to increase the variety of malware collected. We also present a daemon tool developed to grab malware distributed through spam and a pre-classification technique that uses antivirus technology to separate malware in generic classes. © 2009 SPIE.
Resumo:
Since Sharir and Pnueli, algorithms for context-sensitivity have been defined in terms of 'valid' paths in an interprocedural flow graph. The definition of valid paths requires atomic call and ret statements, and encapsulated procedures. Thus, the resulting algorithms are not directly applicable when behavior similar to call and ret instructions may be realized using non-atomic statements, or when procedures do not have rigid boundaries, such as with programs in low level languages like assembly or RTL. We present a framework for context-sensitive analysis that requires neither atomic call and ret instructions, nor encapsulated procedures. The framework presented decouples the transfer of control semantics and the context manipulation semantics of statements. A new definition of context-sensitivity, called stack contexts, is developed. A stack context, which is defined using trace semantics, is more general than Sharir and Pnueli's interprocedural path based calling-context. An abstract interpretation based framework is developed to reason about stack-contexts and to derive analogues of calling-context based algorithms using stack-context. The framework presented is suitable for deriving algorithms for analyzing binary programs, such as malware, that employ obfuscations with the deliberate intent of defeating automated analysis. The framework is used to create a context-sensitive version of Venable et al.'s algorithm for analyzing x86 binaries without requiring that a binary conforms to a standard compilation model for maintaining procedures, calls, and returns. Experimental results show that a context-sensitive analysis using stack-context performs just as well for programs where the use of Sharir and Pnueli's calling-context produces correct approximations. However, if those programs are transformed to use call obfuscations, a contextsensitive analysis using stack-context still provides the same, correct results and without any additional overhead. © Springer Science+Business Media, LLC 2011.
Resumo:
Objective: This study aimed to characterize candidates undergo vasectomy in the public health system, Araçatuba- SP and to study related variables. Methods: We surveyed 300 medical patients and vasectomized contacted by telephone to assess several characteristics. The variables analyzed for the study were age, marital status, education, religion, monthly family income and per capita, number of living children, reason for seeking treatment method, contraceptive use, marital relationship quality, decision time (date of intent to perform the procedure) and not because of the procedure. Data were pooled for the analysis of results. Results: The age of the candidates ranged from 23 to 65 years (mean 36.86 years) and average 2.56 living sons. The average monthly family income was R$ 1.079,15, with average per capita income of R$ 249,07. The couple's contraception before the procedure was on account of the woman who used oral anti-conception (84%). The complication rate with the method was around 6.04%, the biggest complication was dehiscence (77.7% of cases of complications), these being mainly during the first 100 cases. Conclusion: Vasectomy is a very effective contraceptive method, with low complication rate and low cost, should be encouraged by the public health system as a means of family planning policy.
Resumo:
Detecting misbehavior (such as transmissions of false information) in vehicular ad hoc networks (VANETs) is a very important problem with wide range of implications, including safety related and congestion avoidance applications. We discuss several limitations of existing misbehavior detection schemes (MDS) designed for VANETs. Most MDS are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners, e.g. for gaining access to a particular lane. It is therefore more important to detect false information than to identify misbehaving nodes. We introduce the concept of data-centric misbehavior detection and propose algorithms which detect false alert messages and misbehaving nodes by observing their actions after sending out the alert messages. With the data-centric MDS, each node can decide whether an information received is correct or false. The decision is based on the consistency of recent messages and new alerts with reported and estimated vehicle positions. No voting or majority decisions is needed, making our MDS resilient to Sybil attacks. After misbehavior is detected, we do not revoke all the secret credentials of misbehaving nodes, as done in most schemes. Instead, we impose fines on misbehaving nodes (administered by the certification authority), discouraging them to act selfishly. This reduces the computation and communication costs involved in revoking all the secret credentials of misbehaving nodes. © 2011 IEEE.
Resumo:
Malicious programs (malware) can cause severe damage on computer systems and data. The mechanism that the human immune system uses to detect and protect from organisms that threaten the human body is efficient and can be adapted to detect malware attacks. In this paper we propose a system to perform malware distributed collection, analysis and detection, this last inspired by the human immune system. After collecting malware samples from Internet, they are dynamically analyzed so as to provide execution traces at the operating system level and network flows that are used to create a behavioral model and to generate a detection signature. Those signatures serve as input to a malware detector, acting as the antibodies in the antigen detection process. This allows us to understand the malware attack and aids in the infection removal procedures. © 2012 Springer-Verlag.
Resumo:
The intent of this paper is to present contributions focused on the analysis and development of harmonic attenuator devices. Among these, highlights here the so-called electromagnetic zero-sequence suppressor. This arrangement consists of a filter and a blocker, both electromagnetic, whose combined operation provides paths for low and high impedance, respectively, which can be conveniently adjusted to the desired performance. In this context, here are present results related to experimental studies that show the behavior of the equipment in front of different operating conditions. The tests were performed on a low-power prototype (1kVA/220V) and the analysis results show the main motivator aspects for the use of these devices. © 2012 IEEE.
Resumo:
The objective of this study was to demonstrate the effectiveness of rugoscopy as a human identification method, even when the patient is submitted to rapid palatal expansion, which in theory would introduce doubt. With this intent, the Rugoscopic Identity was obtained for each subject using the classification formula proposed by Santos based on the intra-oral casts made before and after treatment from patients who were subjected to palatal expansion. The casts were labeled with the patients' initials and randomly arranged for studying. The palatine rugae kept the same patterns in every case studied. The technical error of the intra-evaluator measurement provided a confidence interval of 95%, making rugoscopy a reliable identification method for patients who were submitted to rapid palatal expansion, because even in the presence of intra-oral changes owing to the use of palatal expanders, the palatine rugae retained the biological and technical requirements for the human identification process. © 2012 American Academy of Forensic Sciences.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Pós-graduação em Artes - IA