886 resultados para Pearl Harbor (Hawaii), Attack on, 1941
Resumo:
The task of expression undertaken by the performer falls largely on the right hand of guitarist. Aware of this fact, past and present masters have left their contributions to the development of right hand technique. It is clear, with rare exceptions, that educational and interpretative proposals, so far, have addressed the attack on the strings from the flexion of the fingers. This work, however, presents a technical resource called imalt, including in the attack action, the extension movement. Some techniques used in specific circumstances, such as the dedillo, the alzapúa, the tremulo and the rasgueado also use extension movements in the attack. They are put in perspective with the imalt providing a panoramic view of their individual characteristics. The use of imalt in the traditional guitar repertoire is exemplified in Villa Lobos, Ponce and Brouwer. Three pieces were composed for this work: Shravana, Alegoria and Vandana. Compositional techniques such as melodic contour applying and ostinato have been reviewed and used in the preparation of these compositions. A detailed record of compositional trajectory is presented. Therefore, the Model for the Compositional Process Accompaniment according Silva (2007) is used. Some events that have left the imalt in evidence are reported, as the launch and distribution of the Compact Disc (CD) Imalt, publishing scores and interviews. Finally is presented concluding comments, pointing possibilities opened up by this work.
Resumo:
In 1972, the five years program 'Basic investigations for exploration of deep sea mineral resources' was laid out by the Agency of Industrial Science and Technology, Ministry of International Trade and Industry. The Geological Survey of Japan and the National Research Institute of Pollution and Resources undertook the first survey project. The survey team consisted of four geologists and a surveyor of the Geological Survey of Japan, and a mechanical, engineer and four mining engineers of National Research Institute of Polution and Resources. The survey started on November 11 using the "Bosei Maru" survey vessel (1100 tons) chartered from Tokai University. The cruise departed from Shimizu harbor to the Ponape and Guam islands, and terminated at the harbor of departure on December 11. The surveyed area was mainly covered the Mariana basin and the Magellan seamounts, and fifteen bottom samples were collected during the cruise. Ferromanganese nodules were obtained at several stations at a depth over 5000m.
Resumo:
The neoliberal period was accompanied by a momentous transformation within the US health care system. As the result of a number of political and historical dynamics, the healthcare law signed by President Barack Obama in 2010 ‑the Affordable Care Act (ACA)‑ drew less on universal models from abroad than it did on earlier conservative healthcare reform proposals. This was in part the result of the influence of powerful corporate healthcare interests. While the ACA expands healthcare coverage, it does so incompletely and unevenly, with persistent uninsurance and disparities in access based on insurance status. Additionally, the law accommodates an overall shift towards a consumerist model of care characterized by high cost sharing at time of use. Finally, the law encourages the further consolidation of the healthcare sector, for instance into units named “Accountable Care Organizations” that closely resemble the health maintenance organizations favored by managed care advocates. The overall effect has been to maintain a fragmented system that is neither equitable nor efficient. A single payer universal system would, in contrast, help transform healthcare into a social right.
Resumo:
El artículo examina los conceptos de Monumentos, Sitios y Museos conmemorativos a nivel internacional. Se comienza con la terminología de historia contemporánea como un término que se desarrolló y amplió desde 1950. La historia contemporánea influye también en el campo de las Bellas Artes. Los monumentos conmemorativos o sitios de la memoria en lugares auténticos son de gran importancia para la concienciación. En combinación con los museos tienen la posibilidad de recoger diversos objetos como fuentes escritas, artefactos, fotografías y registros de la historia oral como testimonios de los antiguos acontecimientos. En cuanto a los museos, esto se refleja particularmente en las concepciones de los museos para la Guerra y la Paz, los museos de la Memoria sobre el Genocidio, y los museos de Movimientos de Resistencia. Un artefacto particular del ataque terrorista del 11 de septiembre de 2001 es la Karyatide del famoso artista alemán Fritz Koenig, ahora colocado en el Battery Park al sur de Manhattan. Por último, el Memorial y Museo Nacional 11 de Septiembre se explica junto con su arquitectura, la idea de “Ausencia Reflexionada” y la Misión de la Memoria para el futuro.
Resumo:
Starting from a descriptive analysis of the main attacks by Daesh in Tunisia, this article examines the nature and evolution of the terrorist organization in this North African country. Thus, it examines the characteristics and vicissitudes of the attack on the Bardo Museum in March 2015, the attack on the Susa beach in June 2015, the bombing of the Presidential Guard in November 2015 and, finally, the military offensive against the town of Ben Gardane in March 2016. In addition, it presents some previous facts that are relevant in this research, such as the important presence of Tunisian foreign fighters in Syria or Libya, and, in particular, the threat of Daesh in Libya to the Tunisian State
Resumo:
The consequence of sulfate attack on geopolymer concrete, made from an alkali activated natural pozzolan (AANP) has been studied in this paper. Changes in the compressive strength, expansion and capillary water absorption of specimens have been investigated combined with phases determination by means of X-ray diffraction. At the end of present investigation which was to evaluate the performance of natural alumina silica based geopolymer concrete in sodium and magnesium sulfate solution, the loss of compressive strength and percentage of expansion of AANP concrete was recorded up to 19.4% and 0.074, respectively.
Resumo:
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Resumo:
Mode of access: Internet.
Resumo:
Joseph J. Mansfield, chairman.
Resumo:
Due to increased complexity, scale, and functionality of information and telecommunication (IT) infrastructures, every day new exploits and vulnerabilities are discovered. These vulnerabilities are most of the time used by ma¬licious people to penetrate these IT infrastructures for mainly disrupting business or stealing intellectual pro¬perties. Current incidents prove that it is not sufficient anymore to perform manual security tests of the IT infra¬structure based on sporadic security audits. Instead net¬works should be continuously tested against possible attacks. In this paper we present current results and challenges towards realizing automated and scalable solutions to identify possible attack scenarios in an IT in¬frastructure. Namely, we define an extensible frame¬work which uses public vulnerability databases to identify pro¬bable multi-step attacks in an IT infrastructure, and pro¬vide recommendations in the form of patching strategies, topology changes, and configuration updates.
Resumo:
Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resist passive adversaries who can observe the whole authentication session between the human user and the remote server. In this paper we show that PAS is insecure against both brute force attack and a probabilistic attack. In particular, we show that its security against brute force attack was strongly overestimated. Furthermore, we introduce a probabilistic attack, which can break part of the password even with a very small number of observed authentication sessions. Although the proposed attack cannot completely break the password, it can downgrade the PAS system to a much weaker system similar to common OTP (one-time password) systems.
Resumo:
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.
Resumo:
Phoracantha longicorn beetles are endemic to Australia, and some species have become significant pests of eucalypts worldwide, yet little is known about their host plant interactions and factors influencing tree susceptibility in Australia. Here, we investigate the host relationships of Phoracantha solida (Blackburn, 1894) on four eucalypt taxa (one pure species and three hybrid families), examining feeding site physical characteristics including phloem thickness, density, and moisture content, and host tree factors such as diameter, height, growth, taper, and survival. We also determine the cardinal and vertical (within-tree) and horizontal (between-tree) spatial distribution of borers. Fewer than 10% of P. solida attacks were recorded from the pure species (Corymbia citriodora subsp. variegate (Hook)), and this taxon also showed the highest survival, phloem thickness, relative growth rate, and bark:wood area. For the two most susceptible taxa, borer severity was negatively correlated with moisture content, and positively related to phloem density. Borers were nonrandomly and nonuniformly distributed within trees, and were statistically aggregated in 32% of plots. More attacks were situated on the northern side of the tree than the other aspects, and most larvae fed within the lower 50 cm of the bole, with attack height positively correlated with severity. Trees with borers had more dead neighbors, and more bored neighbors, than trees without borers, while within plots, borer incidence and severity were positively correlated. Because the more susceptible taxa overlapped with less susceptible taxa for several physical tree factors, the role of primary and secondary chemistries in determining host suitability needs to be investigated. Nevertheless, taxon, moisture content, phloem density, tree size, and mortality of neighboring trees appeared the most important physical characteristics influencing host suitability for P. solida at this site.