914 resultados para Distinguishing Attack
Resumo:
We present a continuous time target zone model of speculative attacks. Contrary to most of the literature that considers the certainty case, i.e., agents know for sure the Central Bank behavior in the future, we build uncertainty into the madel in two different ways. First, we consider the case in whicb the leveI of reserves at which the central bank lets the regime collapse is uncertain. Alternatively, we ana1ize the case in which, with some probability, the government may cbange its policy reducing the initially positive trend in domestic credito In both cases, contrary to the case of a fixed exchange rate regime, speculators face a cost of launching a tentative attack that may not succeed. Such cost induces a delay and may even prevent its occurrence. At the time of the tentative attack, the exchange rate moves either discretely up, if the attack succeeds, or down, if it fails. The remlts are consistent with the fact that, typically, an attack involves substantial profits and losses for the speculators. In particular, if agents believed that the government will control fiscal imbalances in the future, or alternatively, if they believe the trend in domestic credit to be temporary, the attack is postponed even in the presence of a signal of an imminent collapse. Finally, we aIso show that the timing of a speculative attack increases with the width of the target zone.
Resumo:
An important challenge in the crime literature is to isolate causal effects of police on crime. Following a terrorist attack on the main Jewish center in the city of Buenos Aires, Argentina, in July 1994, all Jewish institutions (including schools, synagogues, and clubs) were given 24-hour police protection. Thus, this hideous event induced a geographical allocation of police forces that can be presumed to be exogenous in a crime regression. Using data on the location of car thefts before and after the terrorist attack, we find a large deterrent effect of observable police presence on crime. The effect is local, with little or no appreciable impact outside the narrow area in which the police are deployed.
Resumo:
Testamos o efeito do isolamento social sobre a agressividade no peixe amazônico, Astronotus ocellatus. Dez peixes juvenis foram transferidos de um aquário de agrupamento (60 x 60 x 40 cm) contendo 15 indivíduos (sem discriminação de sexo) para um aquário de isolamento (50 x 40 x 40 cm). A agressividade foi testada por meio de ataques e exibições direcionadas à imagem do peixe no espelho. O comportamento foi filmado durante 10 min em 4 momentos: 30 min, 1 dia, 5 dias e 15 dias após o isolamento. Nós analisamos a motivação agressiva por meio da latência para início do comportamento agonístico e pela freqüência dos ataques totais e específicos direcionados ao espelho. A latência para o comportamento agonístico reduziu ao longo do isolamento e houve uma tendência de aumento da freqüência de mouth fighting (um ataque de alta intensidade de agressão), mostrando-nos um aumento na motivação agressiva. Os resultados estão de acordo com os encontrados para ciclídeos juvenís de Haplochromis burtoni, mas discordam com os encontrados para Pterophylum scalare (acará bandeira). Sugerimos que o aumento da agressividade em A. ocellatus pode ser mediado pelo efeito de exposição prévia, da residência prévia ou por processos envolvendo reconhecimento de co-específicos.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
The authors report a massive attack by Pseudomyrmex ants on a human who touched a Triplaria - novice tree (Triplaris spp). The ants naturally live in these trees and their stings cause intense pain and discrete to moderate local inflammation. The problem is common in sonic Brazilian regions and can be prevented by identifying the trees.
Resumo:
I report some observations of a Chestnut-bellied Euphonia (Euphonia pectoralis) nest in a lowland Atlantic Forest of southeastern Brazil during the early nestling period. During 7.5 hours of observations, the nest was attended 46.3% of the time, 45.6% by the female and 0.7% by the male. Unattended periods lasted 16-38 min. Parents visited the nest most of the time together at 36-59 min intervals. There were 1.06 feeding visits per nestling per hour. The two nestlings in the nest ended up preyed upon by army ants (Labidus praedator, Ecitoninae). The low height of the nest (0.8 m) may have facilitated its detection by the ants.
Resumo:
Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.
Resumo:
A 55-year-old man was attacked by a Brazilian tapir (Tapirus terrestris) after surprising and stabbing the animal in his corn plantation. The victim received deep bites in the thighs, neck, and cervical areas, resulting in severe hemorrhage and death. This is the first report of a tapir incident resulting in death and is of interest because of the severity of the contusions and lacerations caused by the provoked animal.
Resumo:
The study was carried out at the UNESP Rio Claro campus (SP), where biotests consisting of simulated ant attacks were performed in colonies of Mischocyttarus cerberus. The behaviors of the wasps were recorded with a camcorder, for further analysis. This analysis was done using the Mann-Whitney U test and the Principal Component Analysis. In the pre-emergence development stage, colonies with a single foundress defend the nest only after the first larvae appear. When there are only eggs in the nest, the wasp abandons the nest. Before leaving, the wasp rubs its gaster against the nest, releasing the ant repellent secretion. When the nest contains larvae or larvae and pupae, the foundress defends the colony, vibrating its wings, pumping her abdomen and biting the ant.
Resumo:
(Chemical Equation Presented) The reaction between the benzohydroxamate anion (BHO-) and bis(2,4-dinitrophenyl)phosphate (BDNPP) has been examined kinetically, and the products were characterized by mass and NMR spectroscopy. The nucleophilic attack of BHO- follows two reaction paths: (i) at phosphorus, giving an unstable intermediate that undergoes a Lossen rearrangement to phenyl isocyanate, aniline, diphenylurea, and O-phenylcarbamyl benzohydroxamate; and (ii) on the aromatic carbon, giving an intermediate that was detected but slowly decomposes to aniline and 2,4-dinitrophenol. Thus, the benzohydroxamate anion can be considered a self-destructive molecular scissor since it reacts and loses its nucleophilic ability. © 2009 American Chemical Society.
Resumo:
We report a case of a bather injured by a swordfish in shallow water off the coast of southern Brazil. The victim suffered multiple injuries from the fish's bill, including a puncture wound of his left knee and the tip of the bill remaining as a foreign body. The victim made a full recovery after field management and conservative care. The potential factors leading to this most unusual attack are discussed. © 2009 Wilderness Medical Society.
Resumo:
We describe a fatal attack by a black caiman (Melanosuchus niger) on an 11-year-old child with comments on the reptile's aggression mechanisms and the conditions under which this kind of incident takes place in the Amazon region. © 2011 Wilderness Medical Society.