838 resultados para Animal attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fully grown oocytes of Apostichopus japonicus have a cytoplasmic protuberance where the oocyte attaches to the follicle. The protuberance and the oolamina located on the opposite side of the oocyte indicate the animal-vegetal axis. Two pre-meiotic centrosomes are anchored to the protuberance by microtubules between centrosomes and protuberance. After meiosis reinitiation induced by DTT solution, the germinal vesicle (GV) migrates towards the protuberance. The GV breaks down after it migrates to the oocyte membrane on the protuberance side. The protuberance then contracts back into the oocyte and the first polar body extrudes from the site of the former protuberance. The second polar body forms beneath the first. Thus the oocyte protuberance indicates the presumptive animal pole well before maturation of the oocyte.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Os programas de colonização na Amazônia tem chamado atenção de cientistas, autoridades e ambientalistas para o impacto ambiental causado por desmatamentos e queimadas na faixa de fronteira agrícola. O extrativismo vegetal tem sido merecedor de grande atenção por parte destes grupos, mas pouca ênfase tem sido dada ao extrativismo animal. A forma como este é praticado pelas populações ribeirinhas, indígenas e de seringueiros já foi objeto de alguns estudos; porém, os conhecimentos disponíveis sobre extrativismo animal em projeto de colonização em área de fronteira agrícola são inexistentes. Se, o extrativismo animal é pouco conhecido é ainda menos estudado e monitorado quanto ao impacto que exerce sobre a composição e estrutura dos povoamentos e populações faunísticas. Este tópico merece uma avaliação criteriosa, pois a caça é uma atividade tradicional na vida das populações rurais brasileiras, destinando-se principalmente à subsistência das mesmas. Em áreas de fronteira agrícola, onde aproximadamente 70% dos colonos são originários de outros ecossistemas, pouco se sabe sobre o extrativismo animal por eles praticados. Este estudo investigou a utilização dos recursos cinegéticos amazônicos por estes colonos e o impacto que estas atividades causam na fauna amazônica. O município escolhido foi Machadinho d´Oeste, em Rondônia, implantado por um projeto de colonização elaborado pelo INCRA e financiado pelo BANCO MUNDIAL, e que, até 1980, possuía sua área toda florestada e intacta. Hoje, cerca de 20 anos após, tem uma interface agrícola e fauna silvestre , com inter-relações específicas, pouco conhecidas e avaliadas. O conhecimento dessas relações possibilita a adoção de medidas corretas para o monitoramento destas áreas que têm estendido suas fronteiras nos últimos anos.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

2004

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A suposição de que prováveis deficiências de elementos minerais nas pastagens de terra firme do Estado do Amazonas estivessem relacionadas com o denominado "mal de secar", doença que ocorre em bovinos, oportunizou a realização do presente trabalho.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A inviabilidade economica da ensilagem de milho na regiao dos cerrados, devido aos custos muito elevados de insumos necessarios para a sua producao, leva os pecuaristas a ensilar outras forragens. Durante as forragens mais empregadas para ensilagem na regiao, destaca-se o capim-elefante (Pennisetum pupureum Shum) por ser uma graminea de porte grande, de boa producao de massa verde por hectare e bem difundida no meio rural.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we expose an unorthodox adversarial attack that exploits the transients of a system's adaptive behavior, as opposed to its limited steady-state capacity. We show that a well orchestrated attack could introduce significant inefficiencies that could potentially deprive a network element from much of its capacity, or significantly reduce its service quality, while evading detection by consuming an unsuspicious, small fraction of that element's hijacked capacity. This type of attack stands in sharp contrast to traditional brute-force, sustained high-rate DoS attacks, as well as recently proposed attacks that exploit specific protocol settings such as TCP timeouts. We exemplify what we term as Reduction of Quality (RoQ) attacks by exposing the vulnerabilities of common adaptation mechanisms. We develop control-theoretic models and associated metrics to quantify these vulnerabilities. We present numerical and simulation results, which we validate with observations from real Internet experiments. Our findings motivate the need for the development of adaptation mechanisms that are resilient to these new forms of attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent research have exposed new breeds of attacks that are capable of denying service or inflicting significant damage to TCP flows, without sustaining the attack traffic. Such attacks are often referred to as "low-rate" attacks and they stand in sharp contrast against traditional Denial of Service (DoS) attacks that can completely shut off TCP flows by flooding an Internet link. In this paper, we study the impact of these new breeds of attacks and the extent to which defense mechanisms are capable of mitigating the attack's impact. Through adopting a simple discrete-time model with a single TCP flow and a nonoblivious adversary, we were able to expose new variants of these low-rate attacks that could potentially have high attack potency per attack burst. Our analysis is focused towards worst-case scenarios, thus our results should be regarded as upper bounds on the impact of low-rate attacks rather than a real assessment under a specific attack scenario.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Soft-tissue sarcomas (STSs) are rare mesenchymal tumors that arise from muscle, fat and connective tissue. Currently, over 75 subtypes of STS are recognized. The rarity and heterogeneity of patient samples complicate clinical investigations into sarcoma biology. Model organisms might provide traction to our understanding and treatment of the disease. Over the past 10 years, many successful animal models of STS have been developed, primarily genetically engineered mice and zebrafish. These models are useful for studying the relevant oncogenes, signaling pathways and other cell changes involved in generating STSs. Recently, these model systems have become preclinical platforms in which to evaluate new drugs and treatment regimens. Thus, animal models are useful surrogates for understanding STS disease susceptibility and pathogenesis as well as for testing potential therapeutic strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Diabetes mellitus is becoming increasingly prevalent worldwide. Additionally, there is an increasing number of patients receiving implantable devices such as glucose sensors and orthopedic implants. Thus, it is likely that the number of diabetic patients receiving these devices will also increase. Even though implantable medical devices are considered biocompatible by the Food and Drug Administration, the adverse tissue healing that occurs adjacent to these foreign objects is a leading cause of their failure. This foreign body response leads to fibrosis, encapsulation of the device, and a reduction or cessation of device performance. A second adverse event is microbial infection of implanted devices, which can lead to persistent local and systemic infections and also exacerbates the fibrotic response. Nearly half of all nosocomial infections are associated with the presence of an indwelling medical device. Events associated with both the foreign body response and implant infection can necessitate device removal and may lead to amputation, which is associated with significant morbidity and cost. Diabetes mellitus is generally indicated as a risk factor for the infection of a variety of implants such as prosthetic joints, pacemakers, implantable cardioverter defibrillators, penile implants, and urinary catheters. Implant infection rates in diabetic patients vary depending upon the implant and the microorganism, however, for example, diabetes was found to be a significant variable associated with a nearly 7.2% infection rate for implantable cardioverter defibrillators by the microorganism Candida albicans. While research has elucidated many of the altered mechanisms of diabetic cutaneous wound healing, the internal healing adjacent to indwelling medical devices in a diabetic model has rarely been studied. Understanding this healing process is crucial to facilitating improved device design. The purpose of this article is to summarize the physiologic factors that influence wound healing and infection in diabetic patients, to review research concerning diabetes and biomedical implants and device infection, and to critically analyze which diabetic animal model might be advantageous for assessing internal healing adjacent to implanted devices.