24 resultados para IPv6, Denial of Service, Coloured Petri Nets, Risk Analysis, IPv6threats
Resumo:
Reading deficits in students in Grades 4 to 12 are evident in American schools. Informational text is particularly difficult for students. This quasi-experimental study (N=138) investigated sixth-grade students' achievement in social studies using the Reciprocal Mapping instructional routine, compared to sixth-grade students' achievement taught with a traditional approach. The Reciprocal Mapping instructional routine incorporated explicit instruction in text structure using graphic organizers. Students created their own graphic organizers and used them to write about social studies content. The comparison group used a traditional approach, students' reading the textbook and answering questions. Students for this study included sixth-graders in the seven sixth-grade classrooms in two public schools in a small, rural south Florida school district. A focus of this study was to determine the helpfulness of the intervention for at-risk readers. To determine students considered to be at-risk, the researcher used data from the reading portion of the Florida Comprehensive Assessment Test (FCAT), 2011-2012, that considers Level 1 and 2 as at-risk readers. The quasi-experimental study used a pretest-posttest control group design, with students assigned to treatment groups by class. Two teachers at the two rural sites were trained on the Reciprocal Mapping instructional routine and taught students in both the experimental and control groups for an equivalent amount of time over a 5-week period. Results of the 3 x 2 factorial ANCOVA found a significant positive difference favoring the experimental group's social studies achievement as compared to that of the comparison group as measured by the pre/post unit test from the social studies series (McGraw-Hill, 2013), when controlling for initial differences in students' reading FCAT scores. Interactions for high-risk struggling readers were investigated using the significance level p < .05. Due to no significant interaction the main effects of treatment were interpreted. The pretest was used as a covariate and the multivariate analysis was found to be significant. Therefore, analysis of covariance was run on each of the dependent variable as a follow-up. Reciprocal Mapping was found to be significant in posttest scores, independent of gender and level of risk, and while holding the pretest scores constant. Findings showed there was a significant difference in the performance of the high-risk reading students taught with the Reciprocal Mapping intervention who scored statistically better than students in the control group. Further study findings showed that teacher fidelity of implementation of the treatment had a statistically significant relationship in predicting posttest scores when controlling for pretest scores. Study results indicated that improving students' use of text structure through the Reciprocal Mapping instructional routine positively supported sixth-grade students' social studies achievement.
Resumo:
The purpose of this study was to determine the flooding potential of contaminated areas within the White Oak Creek watershed in the Oak Ridge Reservation in Tennessee. The watershed was analyzed with an integrated surface and subsurface numerical model based on MIKE SHE/MIKE 11 software. The model was calibrated and validated using five decades of historical data. A series of simulations were conducted to determine the watershed response to 25 year, 100 year and 500 year precipitation forecasts; flooding maps were generated for those events. Predicted flood events were compared to Log Pearson III flood flow frequency values for validation. This investigation also provides an improved understanding of the water fluxes between the surface and subsurface subdomains as they affect flood frequencies. In sum, this study presents crucial information to further assess the environmental risks of potential mobilization of contaminants of concern during extreme precipitation events.
Resumo:
Males and age group 1 to 5 years show a much higher risk for childhood acute lymphoblastic leukemia (ALL). We performed a case-only genome-wide association study (GWAS), using the Illumina Infinium HumanCoreExome Chip, to unmask gender- and age-specific risk variants in 240 non-Hispanic white children with ALL recruited at Texas Children’s Cancer Center, Houston, Texas. Besides statistically most significant results, we also considered results that yielded the highest effect sizes. Existing experimental data and bioinformatic predictions were used to complement results, and to examine the biological significance of statistical results. Our study identified novel risk variants for childhood ALL. The SNP, rs4813720 (RASSF2), showed the statistically most significant gender-specific associations (P < 2 x 10-6). Likewise, rs10505918 (SOX5) yielded the lowest P value (P < 1 x 10-5) for age-specific associations, and also showed the statistically most significant association with age-at-onset (P < 1 x 10-4). Two SNPs, rs12722042 and 12722039, from the HLA-DQA1 region yielded the highest effect sizes (odds ratio (OR) = 15.7; P = 0.002) for gender-specific results, and the SNP, rs17109582 (OR = 12.5; P = 0.006), showed the highest effect size for age-specific results. Sex chromosome variants did not appear to be involved in gender-specific associations. The HLA-DQA1 SNPs belong to DQA1*01:07and confirmed previously reported male-specific association with DQA1*01:07. Twenty one of the SNPs identified as risk markers for gender- or age-specific associations were located in the transcription factor binding sites and 56 SNPs were non-synonymous variants, likely to alter protein function. Although bioinformatic analysis did not implicate a particular mechanism for gender- and age-specific associations, RASSF2 has an estrogen receptor-alpha binding site in its promoter. The unknown mechanisms may be due to lack of interest in gender- and age-specificity in associations. These results provide a foundation for further studies to examine the gender- and age-differential in childhood ALL risk. Following replication and mechanistic studies, risk factors for one gender or age group may have a potential to be used as biomarkers for targeted intervention for prevention and maybe also for treatment.
Resumo:
Memory deficits and executive dysfunction are highly prevalent among HIV-infected adults. These conditions can affect their quality of life, antiretroviral adherence, and HIV risk behaviors. Several factors have been suggested including the role of genetics in relation to HIV disease progression. This dissertation aimed to determine whether genetic differences in HIV-infected individuals were correlated with impaired memory, cognitive flexibility and executive function and whether cognitive decline moderated alcohol use and sexual transmission risk behaviors among HIV-infected alcohol abusers participating in an NIH-funded clinical trial comparing the efficacy of the adapted Holistic Health Recovery Program (HHRP-A) intervention to a Health Promotion Control (HPC) condition in reducing risk behaviors. ^ A total of 267 individuals were genotyped for polymorphisms in the dopamine and serotonin gene systems. Results yielded significant associations for TPH2, GALM, DRD2 and DRD4 genetic variants with impaired executive function, cognitive flexibility and memory. SNPs TPH2 rs4570625 and DRD2 rs6277 showed a risk association with executive function (odds ratio = 2.5, p = .02; 3.6, p = .001). GALM rs6741892 was associated with impaired memory (odds ratio = 1.9, p = .006). At the six-month follow-up, HHRP-A participants were less likely to report trading sex for food, drugs and money (20.0%) and unprotected insertive or receptive oral (11.6%) or vaginal and/or anal sex (3.2%) than HPC participants (49.4%, p^
Resumo:
Memory deficits and executive dysfunction are highly prevalent among HIV-infected adults. These conditions can affect their quality of life, antiretroviral adherence, and HIV risk behaviors. Several factors have been suggested including the role of genetics in relation to HIV disease progression. This dissertation aimed to determine whether genetic differences in HIV-infected individuals were correlated with impaired memory, cognitive flexibility and executive function and whether cognitive decline moderated alcohol use and sexual transmission risk behaviors among HIV-infected alcohol abusers participating in an NIH-funded clinical trial comparing the efficacy of the adapted Holistic Health Recovery Program (HHRP-A) intervention to a Health Promotion Control (HPC) condition in reducing risk behaviors. A total of 267 individuals were genotyped for polymorphisms in the dopamine and serotonin gene systems. Results yielded significant associations for TPH2, GALM, DRD2 and DRD4 genetic variants with impaired executive function, cognitive flexibility and memory. SNPs TPH2 rs4570625 and DRD2 rs6277 showed a risk association with executive function (odds ratio = 2.5, p = .02; 3.6, p = .001). GALM rs6741892 was associated with impaired memory (odds ratio = 1.9, p = .006). At the six-month follow-up, HHRP-A participants were less likely to report trading sex for food, drugs and money (20.0%) and unprotected insertive or receptive oral (11.6%) or vaginal and/or anal sex (3.2%) than HPC participants (49.4%, p
Resumo:
Males and age group 1 to 5 years show a much higher risk for childhood acute lymphoblastic leukemia (ALL). We performed a case-only genome-wide association study (GWAS), using the Illumina Infinium HumanCoreExome Chip, to unmask gender- and age-specific risk variants in 240 non-Hispanic white children with ALL recruited at Texas Children’s Cancer Center, Houston, Texas. Besides statistically most significant results, we also considered results that yielded the highest effect sizes. Existing experimental data and bioinformatic predictions were used to complement results, and to examine the biological significance of statistical results. ^ Our study identified novel risk variants for childhood ALL. The SNP, rs4813720 (RASSF2), showed the statistically most significant gender-specific associations (P < 2 x 10-6). Likewise, rs10505918 (SOX5) yielded the lowest P value (P < 1 x 10-5 ) for age-specific associations, and also showed the statistically most significant association with age-at-onset (P < 1 x 10-4). Two SNPs, rs12722042 and 12722039, from the HLA-DQA1 region yielded the highest effect sizes (odds ratio (OR) = 15.7; P = 0.002) for gender-specific results, and the SNP, rs17109582 (OR = 12.5; P = 0.006), showed the highest effect size for age-specific results. Sex chromosome variants did not appear to be involved in gender-specific associations. ^ The HLA-DQA1 SNPs belong to DQA1*01:07and confirmed previously reported male-specific association with DQA1*01:07. Twenty one of the SNPs identified as risk markers for gender- or age-specific associations were located in the transcription factor binding sites and 56 SNPs were non-synonymous variants, likely to alter protein function. Although bioinformatic analysis did not implicate a particular mechanism for gender- and age-specific associations, RASSF2 has an estrogen receptor-alpha binding site in its promoter. The unknown mechanisms may be due to lack of interest in gender- and age-specificity in associations. These results provide a foundation for further studies to examine the gender- and age-differential in childhood ALL risk. Following replication and mechanistic studies, risk factors for one gender or age group may have a potential to be used as biomarkers for targeted intervention for prevention and maybe also for treatment.^
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.
Resumo:
In this study we have identified key genes that are critical in development of astrocytic tumors. Meta-analysis of microarray studies which compared normal tissue to astrocytoma revealed a set of 646 differentially expressed genes in the majority of astrocytoma. Reverse engineering of these 646 genes using Bayesian network analysis produced a gene network for each grade of astrocytoma (Grade I–IV), and ‘key genes’ within each grade were identified. Genes found to be most influential to development of the highest grade of astrocytoma, Glioblastoma multiforme were: COL4A1, EGFR, BTF3, MPP2, RAB31, CDK4, CD99, ANXA2, TOP2A, and SERBP1. All of these genes were up-regulated, except MPP2 (down regulated). These 10 genes were able to predict tumor status with 96–100% confidence when using logistic regression, cross validation, and the support vector machine analysis. Markov genes interact with NFkβ, ERK, MAPK, VEGF, growth hormone and collagen to produce a network whose top biological functions are cancer, neurological disease, and cellular movement. Three of the 10 genes - EGFR, COL4A1, and CDK4, in particular, seemed to be potential ‘hubs of activity’. Modified expression of these 10 Markov Blanket genes increases lifetime risk of developing glioblastoma compared to the normal population. The glioblastoma risk estimates were dramatically increased with joint effects of 4 or more than 4 Markov Blanket genes. Joint interaction effects of 4, 5, 6, 7, 8, 9 or 10 Markov Blanket genes produced 9, 13, 20.9, 26.7, 52.8, 53.2, 78.1 or 85.9%, respectively, increase in lifetime risk of developing glioblastoma compared to normal population. In summary, it appears that modified expression of several ‘key genes’ may be required for the development of glioblastoma. Further studies are needed to validate these ‘key genes’ as useful tools for early detection and novel therapeutic options for these tumors.
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.