736 resultados para forgery attacks, algebraic attacks, collision attacks, sidechannel attacks


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Research into the course of life, mental stamina and health status of wartime prisoners, victims of Soviet partisan attacks, and paupers in Finnish Lapland The basis of this research comprised the issues raised during the interviews conducted in my work as a general practitioner in Lapland, regarding factors that have possibly affected the life stories and health conditions of Lappish people who had lived through the war as war prisoners, victims of partisan attacks, or paupers. The purpose of the study was to describe how the different life phases and experiences emerged from the interviewees’ stories and to identify their mental stamina. Another goal was to make observations on their health status, in which the main emphasis became to address mental symptoms. The cohort consisted of elderly Finns who lived in Lapland during the war and experienced war imprisonment, pauperism, or became victims of partisan attacks. All three groups consisted of 12 interviewees. The interview transcripts were read several times and then investigated using the content analysis methods applicable to the material. The research methodology was based on building awareness and understanding. Thematic tagging and data coding were used as structured analysis tools. In all three groups most of the interviewees clearly identified their mental stamina, the most fundamental of which were home, family and work. The war prisoners’ injuries and nervous sensibility symptoms had been shown in earlier studies on war prisoners, and on this basis they had been granted disability pensions. However, many of them had suppressed their traumatic experiences and mental difficulties, and they could not talk about these issues until at the time of these interviews held at old age. Four of them still suffered from a post-traumatic stress disorder. The victims of Soviet partisans had had to carry their mental load alone for decades before the cruel ravages on civilians in remote areas of Lapland became publicly known. Most of them still had disturbing nervous sensibility symptoms. Four interviewees had a post-traumatic stress disorder, and in addition to these, the mental symptoms of one had developed into a post-traumatic stress disorder during old age. Many of the interviewees who had been left paupers remembered their childhood as filled with grief and feelings of inferiority, and had nightmares relating to their wartime experiences. Yet none of them suffered from post-traumatic stress disorder. The results showed that the exceptional suffering caused by the war, the wartime imprisonment and the devastating attacks by Soviet partisans had led especially to mental difficulties. These were left almost completely unnoticed in the post-war conditions, and the war victims were unable to seek help on their own. Based on the results, our health care for the elderly should focus on familiarization with the individual experiences and life stories of each elderly person. This can facilitate geriatric diagnostics and individual therapy planning. Empathic familiarization with the life experiences of the elderly may strengthen their mental stamina and improve the quality of successful aging.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The basic goal of this study is to extend old and propose new ways to generate knapsack sets suitable for use in public key cryptography. The knapsack problem and its cryptographic use are reviewed in the introductory chapter. Terminology is based on common cryptographic vocabulary. For example, solving the knapsack problem (which is here a subset sum problem) is termed decipherment. Chapter 1 also reviews the most famous knapsack cryptosystem, the Merkle Hellman system. It is based on a superincreasing knapsack and uses modular multiplication as a trapdoor transformation. The insecurity caused by these two properties exemplifies the two general categories of attacks against knapsack systems. These categories provide the motivation for Chapters 2 and 4. Chapter 2 discusses the density of a knapsack and the dangers of having a low density. Chapter 3 interrupts for a while the more abstract treatment by showing examples of small injective knapsacks and extrapolating conjectures on some characteristics of knapsacks of larger size, especially their density and number. The most common trapdoor technique, modular multiplication, is likely to cause insecurity, but as argued in Chapter 4, it is difficult to find any other simple trapdoor techniques. This discussion also provides a basis for the introduction of various categories of non injectivity in Chapter 5. Besides general ideas of non injectivity of knapsack systems, Chapter 5 introduces and evaluates several ways to construct such systems, most notably the "exceptional blocks" in superincreasing knapsacks and the usage of "too small" a modulus in the modular multiplication as a trapdoor technique. The author believes that non injectivity is the most promising direction for development of knapsack cryptosystema. Chapter 6 modifies two well known knapsack schemes, the Merkle Hellman multiplicative trapdoor knapsack and the Graham Shamir knapsack. The main interest is in aspects other than non injectivity, although that is also exploited. In the end of the chapter, constructions proposed by Desmedt et. al. are presented to serve as a comparison for the developments of the subsequent three chapters. Chapter 7 provides a general framework for the iterative construction of injective knapsacks from smaller knapsacks, together with a simple example, the "three elements" system. In Chapters 8 and 9 the general framework is put into practice in two different ways. Modularly injective small knapsacks are used in Chapter 9 to construct a large knapsack, which is called the congruential knapsack. The addends of a subset sum can be found by decrementing the sum iteratively by using each of the small knapsacks and their moduli in turn. The construction is also generalized to the non injective case, which can lead to especially good results in the density, without complicating the deciphering process too much. Chapter 9 presents three related ways to realize the general framework of Chapter 7. The main idea is to join iteratively small knapsacks, each element of which would satisfy the superincreasing condition. As a whole, none of these systems need become superincreasing, though the development of density is not better than that. The new knapsack systems are injective but they can be deciphered with the same searching method as the non injective knapsacks with the "exceptional blocks" in Chapter 5. The final Chapter 10 first reviews the Chor Rivest knapsack system, which has withstood all cryptanalytic attacks. A couple of modifications to the use of this system are presented in order to further increase the security or make the construction easier. The latter goal is attempted by reducing the size of the Chor Rivest knapsack embedded in the modified system. '

Relevância:

40.00% 40.00%

Publicador:

Resumo:

An efficient approach for organizing large ad hoc networks is to divide the nodesinto multiple clusters and designate, for each cluster, a clusterhead which is responsible forholding intercluster control information. The role of a clusterhead entails rights and duties.On the one hand, it has a dominant position in front of the others because it manages theconnectivity and has access to other node¿s sensitive information. But on the other hand, theclusterhead role also has some associated costs. Hence, in order to prevent malicious nodesfrom taking control of the group in a fraudulent way and avoid selfish attacks from suitablenodes, the clusterhead needs to be elected in a secure way. In this paper we present a novelsolution that guarantees the clusterhead is elected in a cheat-proof manner.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Cardiovascular diseases are responsible for the largest number of deaths among humans worldwide, including heart attacks, strokes, and thrombosis. The treatment of thrombosis is generally through the administration of anticoagulant and/or antiplatelet drugs, which have some clinical limitations. Plants synthesize a wide variety of bioactive metabolites in response to different stimuli. This review focuses on a number of molecules of vegetal origin belonging to different chemical classes, with significant anticoagulant and antiplatelet effects. Their promising antithrombotic profile confirms the potential of natural products as a source of lead molecules for drug development in the prevention and treatment of thrombosis.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Chitinase is produced by a wide variety of plants as a defense against peste attacks. In this study, grape chitinases were purified 16 times by fractionation in 80% ammonium sulfate followed by dialysis and filtration. Purified chitinases exhibited enzymatic activity toward chitin azure. The yield of purified chitinase was 229 mg/L with chitinase activity of 563 U/g. Chitinases had molecular masses of 24 and 30 kDa, as evaluated by SDS-PAGE 12.5%. Two pH optima were determined 3.0 and 6.0. The optimal temperature was 42 °C. Pre hydrolysis of crystalline shrimp chitin by chitinases caused in an increase in the deacetylation ratio triggered by chitin deacetylase producing chitooligosaccharides with DA (degree acetylation) of 58.8%.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Coal, natural gas and petroleum-based liquid fuels are still the most widely used energy sources in modern society. The current scenario contrasts with the foreseen shortage of petroleum that was spread out in the beginning of the XXI century, when the concept of "energy security" emerged as an urgent agenda to ensure a good balance between energy supply and demand. Much beyond protecting refineries and oil ducts from terrorist attacks, these issues soon developed to a portfolio of measures related to process sustainability, involving at least three fundamental dimensions: (a) the need for technological breakthroughs to improve energy production worldwide; (b) the improvement of energy efficiency in all sectors of modern society; and (c) the increase of the social perception that education is a key-word towards a better use of our energy resources. Together with these technological, economic or social issues, "energy security" is also strongly influenced by environmental issues involving greenhouse gas emissions, loss of biodiversity in environmentally sensitive areas, pollution and poor solid waste management. For these and other reasons, the implementation of more sustainable practices in our currently available industrial facilities and the search for alternative energy sources that could partly replace the fossil fuels became a major priority throughout the world. Regarding fossil fuels, the main technological bottlenecks are related to the exploitation of less accessible petroleum resources such as those in the pre-salt layer, ranging from the proper characterization of these deep-water oil reservoirs, the development of lighter and more efficient equipment for both exploration and exploitation, the optimization of the drilling techniques, the achievement of further improvements in production yields and the establishment of specialized training programs for the technical staff. The production of natural gas from shale is also emerging in several countries but its production in large scale has several problems ranging from the unavoidable environmental impact of shale mining as well as to the bad consequences of its large scale exploitation in the past. The large scale use of coal has similar environmental problems, which are aggravated by difficulties in its proper characterization. Also, the mitigation of harmful gases and particulate matter that are released as a result of combustion is still depending on the development of new gas cleaning technologies including more efficient catalysts to improve its emission profile. On the other hand, biofuels are still struggling to fulfill their role in reducing our high dependence on fossil fuels. Fatty acid alkyl esters (biodiesel) from vegetable oils and ethanol from cane sucrose and corn starch are mature technologies whose market share is partially limited by the availability of their raw materials. For this reason, there has been a great effort to develop "second-generation" technologies to produce methanol, ethanol, butanol, biodiesel, biogas (methane), bio-oils, syngas and synthetic fuels from lower grade renewable feedstocks such as lignocellulosic materials whose consumption would not interfere with the rather sensitive issues of food security. Advanced fermentation processes are envisaged as "third generation" technologies and these are primarily linked to the use of algae feedstocks as well as other organisms that could produce biofuels or simply provide microbial biomass for the processes listed above. Due to the complexity and cost of their production chain, "third generation" technologies usually aim at high value added biofuels such as biojet fuel, biohydrogen and hydrocarbons with a fuel performance similar to diesel or gasoline, situations in which the use of genetically modified organisms is usually required. In general, the main challenges in this field could be summarized as follows: (a) the need for prospecting alternative sources of biomass that are not linked to the food chain; (b) the intensive use of green chemistry principles in our current industrial activities; (c) the development of mature technologies for the production of second and third generation biofuels; (d) the development of safe bioprocesses that are based on environmentally benign microorganisms; (e) the scale-up of potential technologies to a suitable demonstration scale; and (f) the full understanding of the technological and environmental implications of the food vs. fuel debate. On the basis of these, the main objective of this article is to stimulate the discussion and help the decision making regarding "energy security" issues and their challenges for modern society, in such a way to encourage the participation of the Brazilian Chemistry community in the design of a road map for a safer, sustainable and prosper future for our nation.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this work, we studied the reactivity of picloram in the aqueous phase at the B3LYP/6-311++G(2d,2p) and MP2/6-311++G(2d,2p) levels of theory through global and local reactivity descriptors. The results obtained at the MP2 level indicate that the cationic form of picloram exhibits the highest hardness while the anionic form is the most nucleophilic. From the Fukui function values, the most reactive site for electrophilic and free radical attacks are on the nitrogen in the pyridine ring. The more reactive sites for nucleophilic attacks are located on the nitrogen atom of the amide group and on the carbon atoms located at positions 2 and 3 in the pyridine ring.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Since his inauguration, President Barack Obama has emphasized the need for a new cybersecurity policy, pledging to make it a "national security priority". This is a significant change in security discourse after an eight-year war on terror – a term Obama announced to be no longer in use. After several white papers, reports and the release of the so-called 60-day Cybersecurity Review, Obama announced the creation of a "cyber czar" position and a new military cyber command to coordinate American cyber defence and warfare. China, as an alleged cyber rival, has played an important role in the discourse that introduced the need for the new office and the proposals for changes in legislation. Research conducted before this study suggest the dominance of state-centric enemy descriptions paused briefly after 9/11, but returned soon into threat discourse. The focus on China's cyber activities fits this trend. The aim of this study is to analyze the type of modern threat scenarios through a linguistic case study on the reporting on Chinese hackers. The methodology of this threat analysis is based on the systemic functional language theory, and realizes as an analysis of action and being descriptions (verbs) used by the American authorities. The main sources of data include the Cybersecurity Act 2009, Securing Cyberspace for the 44th Presidency, and 2008 Report to Congress of the U.S. - China Economic and Security Review Commission. Contrary to the prevailing and popularized terrorism discourse, the results show the comeback of Cold War rhetoric as well as the establishment of a state-centric threat perception in cyber discourse. Cyber adversaries are referred to with descriptions of capacity, technological superiority and untrustworthiness, whereas the ‘self’ is described as vulnerable and weak. The threat of cyber attacks is compared to physical attacks on critical military and civilian infrastructure. The authorities and the media form a cycle, in which both sides quote each other and foster each other’s distrust and rhetoric. The white papers present China's cyber army as an existential threat. This leads to cyber discourse turning into a school-book example of a securitization process. The need for security demands action descriptions, which makes new rules and regulations acceptable. Cyber discourse has motives and agendas that are separate from real security discourse: the arms race of the 21st century is about unmanned war.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In São Paulo State, mainly in rural areas, the utilization of wooden poles is observed for different purposes. In this context, wood in contact with the ground presents faster deterioration, which is generally associated to environmental factors and, especially to the presence of fungi and insects. With the use of mathematical models, the useful life of wooden structures can be predicted by obtaining "climatic indexes" to indicate, comparatively among the areas studied, which have more or less tendency to fungi and insects attacks. In this work, by using climatological data of several cities at São Paulo State, a simplified mathematical model was obtained to measure the aggressiveness of the wood in contact with the soil.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Technical problems have hampered the study of sleep in teleosts. The electrical discharges of Gymnotus carapo L. (Gymnotidae: Gymnotiformes) were monitored to evaluate their ease and reliability as parameters to study sleep. The discharges were detected by electrodes immersed in a glass aquarium and were recorded on a conventional polygraph. G. carapo showed conspicuous signs of behavioral sleep. During these periods, opercular beat rates were counted, electric discharges recorded, and the "sharp discharge increase" (SDI) of the orienting reflex was investigated. All 20 animals monitored maintained electrical discharges during behavioral sleep. The discharge frequencies during sleep (50.3 ± 10.4 Hz) were not significantly different from those observed when the fish was awake and inactive (57.2 ± 12.1 Hz) (Wilcoxon matched-pairs signed-ranks test, P>0.05). However, the SDI, which was prevalent in the awake fish, was not observed during periods of behavioral sleep. Additional observations showed that the species had cannibalistic habits. When presented with electrical discharges from a conspecific, the sleeping fish showed an initial decrease or pause in discharge frequency, while the awake fish did not have this response. We conclude that the electrical discharges of G. carapo were not conspicuous indicators of behavioral sleep. Discharges may have been maintained during sleep for sensory purposes, i.e., conspecific detection and avoidance of cannibalistic attacks.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Our aim was to observe the induction of panic attacks by a hyperventilation challenge test in panic disorder patients (DSM-IV) and their healthy first-degree relatives. We randomly selected 25 panic disorder patients, 31 healthy first-degree relatives of probands with panic disorder and 26 normal volunteers with no family history of panic disorder. All patients had no psychotropic drugs for at least one week. They were induced to hyperventilate (30 breaths/min) for 4 min and anxiety scales were applied before and after the test. A total of 44.0% (N = 11) panic disorder patients, 16.1% (N = 5) of first-degree relatives and 11.5% (N = 3) of control subjects had a panic attack after hyperventilating (chi² = 8.93, d.f. = 2, P = 0.011). In this challenge test the panic disorder patients were more sensitive to hyperventilation than first-degree relatives and normal volunteers. Although the hyperventilation test has a low sensitivity, our data suggest that there is no association between a family history of panic disorder and hyperreactivity to an acute hyperventilation challenge test. Perhaps cognitive variables should be considered to play a specific role in this association since symptoms of a panic attack and acute hyperventilation overlap.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Increased fighting is an effect of desynchronized sleep deprivation (DSD) in rats, and recently this behavior has been suggested to be spontaneous panic and equivalent to panic disorder. In the present study we tested this hypothesis by evaluating the effect of sodium lactate on this aggressiveness, because this substance is recognized to induce spontaneous panic attacks in patients. A total of 186 male albino Wistar rats, 250-350 g, 90-120 days of age, were submitted to DSD (multiple platform method) for 0, 4, or 5 days. At the end of the deprivation period the rats were divided into subgroups respectively injected intraperitoneally with 1.86, 2.98 and 3.72 g/kg of 1 M sodium lactate, or 1.86 and 3.72 g/kg of 2 M sodium lactate. The control animals were submitted to the same procedures but received equivalent injections of sodium chloride. Regardless of DSD time, sleep-deprived animals that received sodium lactate presented a significantly higher mean number of fights (0.13 ± 0.02 fights/min) and a longer mean time spent in confrontation (2.43 ± 0.66 s/min) than the controls (0.01 ± 0.006 fights/min and 0.12 ± 0.07 s/min, respectively; P<0.01, Student t-test). For the sodium lactate group, concentration of the solution and time of deprivation increased the number of fights, with the mean number of fights and mean duration of fighting episodes being greater with the 2.98 g/kg dose using 1 M lactate concentration. These results support the hypothesis that fighting induced by DSD is probably a spontaneous panic manifestation. However, additional investigations are necessary in order to accept this as a promising animal model for studies on panic disorder.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Mirtazapine is an antidepressant whose side effect profile differs from that of first-line agents (selective serotonin reuptake inhibitors) used in the treatment of panic disorder. The present study compared the effect of mirtazapine and fluoxetine in the treatment of panic disorder in a double-blind, randomized, flexible-dose trial conducted with outpatients. After a 1-week single-blind placebo run-in, 27 patients entered an 8-week double-blind phase in which they were randomly assigned to treatment with either mirtazapine or fluoxetine. Both groups improved significantly in all but one efficacy measure (P<=0.01). ANOVA showed no significant differences between the two treatment groups in number of panic attacks, Hamilton Anxiety Scale or Sheehan Phobic Scale, whereas measures of patient global evaluation of phobic anxiety were significantly different between groups (F1,20 = 6.91, P = 0.016) favoring mirtazapine. For the 22 patients who completed the study, the mean daily dose of mirtazapine was 18.3 ± 1.3 vs 14.0 ± 1.0 mg for fluoxetine at the endpoint. Weight gain occurred more frequently in the mirtazapine group (50 vs 7.7%, P = 0.04) and nausea and paresthesia occurred more often in the fluoxetine group (P = 0.01). Results suggest that mirtazapine has properties that make it attractive for the treatment of panic disorder.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The aim of the present study was to verify the sensitivity to the carbon dioxide (CO2) challenge test of panic disorder (PD) patients with respiratory and nonrespiratory subtypes of the disorder. Our hypothesis is that the respiratory subtype is more sensitive to 35% CO2. Twenty-seven PD subjects with or without agoraphobia were classified into respiratory and nonrespiratory subtypes on the basis of the presence of respiratory symptoms during their panic attacks. The tests were carried out in a double-blind manner using two mixtures: 1) 35% CO2 and 65% O2, and 2) 100% atmospheric compressed air, 20 min apart. The tests were repeated after 2 weeks during which the participants in the study did not receive any psychotropic drugs. At least 15 of 16 (93.7%) respiratory PD subtype patients and 5 of 11 (43.4%) nonrespiratory PD patients had a panic attack during one of two CO2 challenges (P = 0.009, Fisher exact test). Respiratory PD subtype patients were more sensitive to the CO2 challenge test. There was agreement between the severity of PD measured by the Clinical Global Impression (CGI) Scale and the subtype of PD. Higher CGI scores in the respiratory PD subtype could reflect a greater sensitivity to the CO2 challenge due to a greater severity of PD. Carbon dioxide challenges in PD may define PD subtypes and their underlying mechanisms.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We investigated the association of eye color with the dominant-subordinate relationship in the fish Nile tilapia, Oreochromis niloticus. Eye color pattern was also examined in relation to the intensity of attacks. We paired 20 size-matched fish (intruder: 73.69 ± 11.49 g; resident: 75.42 ± 8.83 g) and evaluated eye color and fights. These fish were isolated in individual aquaria for 10 days and then their eye color was measured 5 min before pairing (basal values). Twenty minutes after pairing, eye color and fights were quantified for 10 min. Clear establishment of social hierarchy was observed in 7 of 10 pairs of fish. Number of attacks ranged from 1 to 168 among pairs. The quartile was calculated for these data and the pairs were then divided into two classes: low-attack (1 to 111 attacks - 2 lower quartiles) or high-attack (112 to 168 attacks - 2 higher quartiles). Dominance decreased the eye-darkening patterns of the fish after pairing, while subordinance increased darkening compared to dominance. Subordinate fish in low-attack confrontations presented a darker eye compared to dominant fish and to the basal condition. We also observed a paler eye pattern in dominants that shared low-attack interactions after pairing compared to the subordinates and within the group. However, we found no differences in the darkening pattern between dominants and subordinates from the high-attack groups. We conclude that eye color is associated with social rank in this species. Moreover, the association between eye color and social rank in the low-attack pairs may function to reduce aggression.