63 resultados para Interceptive eavesdropping
Resumo:
Group living animals may eavesdrop on signalling interactions between conspecifics and integrate it with their own past social experience in order to optimize the use of relevant information from others. However, little is known about this interplay between public (eavesdropped) and private social information. To investigate it, we first manipulated the dominance status of bystander zebrafish. Next, we either allowed or prevented bystanders from observing a fight. Finally, we assessed their behaviour towards the winners and losers of the interaction, using a custom-made video-tracking system and directional analysis. We found that only dominant bystanders who had seen the fight revealed a significant increase in directional focus (a measure of attention) towards the losers of the fights. Furthermore, our results indicate that information about the fighters' acquired status was collected from the signalling interaction itself and not from post-interaction status cues, which implies the existence of individual recognition in zebrafish. Thus, we show for the first time that zebrafish, a highly social model organism, eavesdrop on conspecific agonistic interactions and that this process is modulated by the eavesdroppers' dominance status. We suggest that this type of integration of public and private information may be ubiquitous in social learning processes.
Resumo:
Angle Class III malocclusion has been a challenge for researchers concerning diagnosis, prognosis and treatment. It has a prevalence of 5% in the Brazilian population, and may have a genetic or environmental etiology. This malocclusion can be classified as dentoalveolar, skeletal or functional, which will determine the prognosis. Considering these topics, the aim of this study was to describe and discuss a clinical case with functional Class III malocclusion treated by a two-stage approach (interceptive and corrective), with a long-term follow-up. In this case, the patient was treated with a chincup and an Eschler arch, used simultaneously during 14 months, followed by corrective orthodontics. It should be noticed that, in this case, initial diagnosis at the centric relation allowed visualizing the anterior teeth in an edge-to-edge relationship, thereby favoring the prognosis. After completion of the treatment, the patient was followed for a 10-year period, and stability was observed. The clinical treatment results showed that it is possible to achieve favorable outcomes with early management in functional Class III malocclusion patients.
Resumo:
OBJETIVOS: o presente estudo radiográfico, retrospectivo e longitudinal objetivou determinar se a ancoragem do aparelho expansor fixo tipo Haas, modificado para as dentaduras decídua e mista, interfere na velocidade de rizólise e esfoliação dos caninos decíduos. MÉTODOS: foi feita uma avaliação quantitativa da rizólise do canino decíduo mediante a medição do comprimento coroa-ápice dos caninos decíduos superiores, dos lados direito e esquerdo. Para essa avaliação, 24 crianças submetidas à expansão rápida da maxila (ERM) na dentadura decídua ou no início da dentadura mista foram comparadas com 15 crianças que não passaram por esse procedimento. A medição do comprimento coroa-ápice dos caninos decíduos foi realizada com o programa computadorizado CEF-X Cefalometria Digital, produzido pela CDT Informática, que permitiu calibrar o tamanho dos dentes pela uniformização das imagens radiográficas digitalizadas. RESULTADOS: os dados estatísticos revelaram que não houve diferença na velocidade de rizólise dos caninos decíduos entre as crianças do grupo controle e as do grupo submetido à ERM. CONCLUSÕES: é possível inferir que o aparelho expansor fixo tipo Haas ancorado em dentes decíduos não influencia a rizólise dos caninos decíduos usados como ancoragem.
Resumo:
This investigation aimed at assessing the extent to which memory from practice in a specific condition of target displacement modulates temporal errors and movement timing of interceptive movements. We compared two groups practicing with certainty of future target velocity either in unchanged target velocity or in target velocity decrease. Following practice, both experimental groups were probed in the situations of unchanged target velocity and target velocity decrease either under the context of certainty or uncertainty about target velocity. Results from practice showed similar improvement of temporal accuracy between groups, revealing that target velocity decrease did not disturb temporal movement organization when fully predictable. Analysis of temporal errors in the probing trials indicated that both groups had higher timing accuracy in velocity decrease in comparison with unchanged velocity. Effect of practice was detected by increased temporal accuracy of the velocity decrease group in situations of decreased velocity; a trend consistent with the expected effect of practice was observed for temporal errors in the unchanged velocity group and in movement initiation at a descriptive level. An additional point of theoretical interest was the fast adaptation in both groups to a target velocity pattern different from that practiced. These points are discussed under the perspective of integration of vision and motor control by means of an internal forward model of external motion.
Resumo:
Use of peripheral vision to organize and reorganize an interceptive action was investigated in young adults. Temporal errors and kinematic variables were evaluated in the interception of a virtual moving target, in situations in which its initial velocity was kept unchanged or was unexpectedly decreased. Observation of target approach was made through continuous visual pursuit (focal vision) or keeping visual focus at the origin of the trajectory or at the contact spot (peripheral vision). Results showed that visual focus at the contact spot led to temporal errors similar to focal vision, although showing a distinct kinematic profile, while focus at the origin led to an impoverished performance
Resumo:
Different interceptive tasks and modes of interception (hitting or capturing) do not necessarily involve similar control processes. Control based on preprogramming of movement parameters is possible for actions with brief movement times but is now widely rejected; continuous perceptuomotor control models are preferred for all types of interception. The rejection of preprogrammed control and acceptance of continuous control is evaluated for the timing of rapidly executed, manual hitting actions. It is shown that a preprogrammed control model is capable of providing a convincing account of observed behavior patterns that avoids many of the arguments that have been raised against it. Prominent continuous perceptual control models are analyzed within a common framework and are shown to be interpretable as feedback control strategies. Although these models can explain observations of on-line adjustments to movement, they offer only post hoc explanations for observed behavior patterns in hitting tasks and are not directly supported by data. It is proposed that rapid manual hitting tasks make up a class of interceptions for which a preprogrammed strategy is adopted-a strategy that minimizes the role of visual feedback. Such a strategy is effective when the task demands a high degree of temporal accuracy.
Resumo:
The effects of temporal precision constraints and movement amplitude on performance of an interceptive aiming task were examined. Participants were required to strike a moving target object with a 'bat' by moving the bat along a straight path (constrained by a linear slide) perpendicular to the path of the target. Temporal precision constraints were defined in terms of the time period (or window) within which contact with the target was possible. Three time windows were used (approx. 35, 50 and 65 ms) and these were achieved either by manipulating the size of the bat (experiment 1a), the size of the target (experiment 1b) or the speed of the target (experiment 2). In all experiments, movement time (MT) increased in proportion to movement amplitude but was only affected by differences in the temporal precision constraint if this was achieved by variation in the target's speed. In this case the MT was approximately inversely proportional to target speed. Peak movement speed was affected by temporal accuracy constraints in all three experiments: participants reached higher speeds when the temporal precision required was greater. These results are discussed with reference to the speed-accuracy trade-off observed for temporally constrained aiming movements. It is suggested that the MT and speed of interceptive aiming movements may be understood as responses to the spatiotemporal constraints of the task.
Resumo:
A Educação Ambiental constitui-se na relação entre a natureza e a cultura de modo indissociável das relações de poder e de saber. A pesquisa enreda-se na tendência da Educação Ambiental complexa, analisa os modos de fabricação das subjetividades impostas pelo discurso neocapitalista, investiga a racionalidade herdada da sociedade moderna e explora a lógica dos referenciais afrodescendentes, em específico as lógicas presentes nos Terreiros da Umbanda. Problematiza o mito na Educação Ambiental e a Educação Ambiental no mito a partir das orixalidades umbandistas. Adota a pesquisa narrativa dialogando com Tristão (2012), problematiza os processos de subjetivação a partir de Foucault (1996) e busca capturar os saberes sustentáveis da noosfera umbandista (MORIN, 2005c) influenciada por Deleuze e Guattari (1996-1997). Através das Giras, seu principal ritual, evidencia como essas lógicas são acionadas para a fabricação de novos modos de percepção da relação entre a cultura e a natureza. Contribuem, no processo de investigação para a produção dos dados, a realização de entrevistas abertas e semiestruturadas, o registro em cadernos de bordo, gravações em áudio e vídeo, fotografias e rodas de conversas em encontros com professores e alunos de uma escola pública, próxima aos Terreiros, onde problematiza os processos e mecanismos de exclusão e violência materializados em posturas discriminatórias e de negação da cultura afro-brasileira e o modo como essas experiências são partilhadas pelos professores e alunos no contexto de suas práticas. A aposta metodológica consiste em criar estratégias de narrar experiências da Educação Ambiental em espaços não formais, como os espaços dos Terreiros da Umbanda, e em espaços formais, como a escola, através das orixalidades em narrativas, na busca de zonas de confiança e na invenção de encontros mais solidários, por escutas mais sutis e híbridas, e de novos sentidos de alianças que dissolvam pontos de vistas e desestabilizem discursos do eixo dominante, como forma de exercício do pensamento para abertura de lógicas silenciadas historicamente. Conclui que lógicas complexas incluem as existências infames e obscurecidas pela lógica oficial e que lógicas complexas buscam ver os efeitos dos modos como nós próprios fomos constituídos. A fé-eco-lógica presente nas orixalidades em narrativas potencializa a desconstrução dos regimes de verdade e subverte a monocultura de lógicas.
Resumo:
Dissertação de mestrado integrado em Engenharia Biomédica (área de especialização em Eletrónica Médica)
Implementação de sistemas de encriptação AES advanced encryption standard em hardware para segurança
Resumo:
Dissertação de mestrado integrado em Engenharia Electrónica Industrial e Computadores
Resumo:
Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limitedresources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.
Resumo:
The -function and the -function are phenomenological models that are widely used in the context of timing interceptive actions and collision avoidance, respectively. Both models were previously considered to be unrelated to each other: is a decreasing function that provides an estimation of time-to-contact (ttc) in the early phase of an object approach; in contrast, has a maximum before ttc. Furthermore, it is not clear how both functions could be implemented at the neuronal level in a biophysically plausible fashion. Here we propose a new framework the corrected modified Tau function capable of predicting both -type ("") and -type ("") responses. The outstanding property of our new framework is its resilience to noise. We show that can be derived from a firing rate equation, and, as , serves to describe the response curves of collision sensitive neurons. Furthermore, we show that predicts the psychophysical performance of subjects determining ttc. Our new framework is thus validated successfully against published and novel experimental data. Within the framework, links between -type and -type neurons are established. Therefore, it could possibly serve as a model for explaining the co-occurrence of such neurons in the brain.
Resumo:
The -function and the -function are phenomenological models that are widely used in the context of timing interceptive actions and collision avoidance, respectively. Both models were previously considered to be unrelated to each other: is a decreasing function that provides an estimation of time-to-contact (ttc) in the early phase of an object approach; in contrast, has a maximum before ttc. Furthermore, it is not clear how both functions could be implemented at the neuronal level in a biophysically plausible fashion. Here we propose a new framework- the corrected modified Tau function- capable of predicting both -type ("") and -type ("") responses. The outstanding property of our new framework is its resilience to noise. We show that can be derived from a firing rate equation, and, as , serves to describe the response curves of collision sensitive neurons. Furthermore, we show that predicts the psychophysical performance of subjects determining ttc. Our new framework is thus validated successfully against published and novel experimental data. Within the framework, links between -type and -type neurons are established. Therefore, it could possibly serve as a model for explaining the co-occurrence of such neurons in the brain.
Resumo:
Key agreement is a cryptographic scenario between two legitimate parties, who need to establish a common secret key over a public authenticated channel, and an eavesdropper who intercepts all their messages in order to learn the secret. We consider query complexity in which we count only the number of evaluations (queries) of a given black-box function, and classical communication channels. Ralph Merkle provided the first unclassified scheme for secure communications over insecure channels. When legitimate parties are willing to ask O(N) queries for some parameter N, any classical eavesdropper needs Omega(N^2) queries before being able to learn their secret, which is is optimal. However, a quantum eavesdropper can break this scheme in O(N) queries. Furthermore, it was conjectured that any scheme, in which legitimate parties are classical, could be broken in O(N) quantum queries. In this thesis, we introduce protocols à la Merkle that fall into two categories. When legitimate parties are restricted to use classical computers, we offer the first secure classical scheme. It requires Omega(N^{13/12}) queries of a quantum eavesdropper to learn the secret. We give another protocol having security of Omega(N^{7/6}) queries. Furthermore, for any k>= 2, we introduce a classical protocol in which legitimate parties establish a secret in O(N) queries while the optimal quantum eavesdropping strategy requires Theta(N^{1/2+k/{k+1}}) queries, approaching Theta(N^{3/2}) when k increases. When legitimate parties are provided with quantum computers, we present two quantum protocols improving on the best known scheme before this work. Furthermore, for any k>= 2, we give a quantum protocol in which legitimate parties establish a secret in O(N) queries while the optimal quantum eavesdropping strategy requires Theta(N^{1+{k}/{k+1}})} queries, approaching Theta(N^{2}) when k increases.
Resumo:
OBJETIVOS: determinar a morfologia das 3ª e 4ª vértebras cervicais representativa dos estágios de pré-pico, pico e pós-pico de velocidade de crescimento estatural, definidos previamente pelos centros de ossificação do primeiro dedo em radiografias carpais ou do dedo polegar. MÉTODOS: foram utilizadas 120 telerradiografias em norma lateral de 106 pacientes selecionados da clínica de Ortodontia Preventiva e Interceptiva da Faculdade de Odontologia de Araçatuba-UNESP e Profis/HRAC-USP que apresentavam as correspondentes radiografias carpais ou do dedo polegar. As telerradiografias foram divididas em três grupos de 40 radiografias, de acordo com os estágios maturacionais pré-pico, pico e pós-pico, definidos pela imagem do primeiro dedo. A morfologia dos corpos das 3ª e 4ª vértebras cervicais foi determinada por dois examinadores devidamente calibrados em dois tempos diferentes. CONCLUSÕES: concluiu-se que o formato retangular horizontal com borda inferior reta foi representativo do estágio de pré-pico, independentemente da vértebra analisada. Já o formato retangular horizontal com borda inferior curva, especialmente se encontrado em C4, ou o formato quadrado com borda inferior reta caracterizaram o pico de velocidade de crescimento. O formato quadrado ou, principalmente, o retangular vertical com borda inferior curva determinaram o estágio de pós-pico de velocidade de crescimento da adolescência.