385 resultados para Alien invaders


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Kariba weed (Salvinia molesta) is an invasive alien waterweed that was first recorded in Uganda in sheltered bays of Lake Kyoga in June 2013. This waterweed has become a common feature on Lake Kyoga and its associated rivers, streams and swamps, and has spread to other lakes notably Kwania and Albert in addition to Lake Kimira in Bugiri district.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Escogí trabajar la biografía de Frida buscando respuestas a mi vida, justificaciones al dolor humano, las rupturas, la muerte. Ella perteneció a una época cargada de sentidos, exhuberante en motivos y quehaceres, personajes, culturas, rabias y desafíos, y yo estoy en otra que me ha arrancado con violencia los porqués y me tiene colgada del punto con el que concluye el signo de interrogación de mi existencia, ambas profundamente dolorosas.He leído sobre ella "en búsqueda" como cuando abro la Biblia en los Salmos, me recorro la ira de Job, la historia de Ruth, Salomé o Magdalena, como leo a Sor Juana, Juana de Ibarbourou o Dulce María Loynás, igual los cuentos cortos de Cortázar o las "Cotidianas" de Benedetti y también cuando nada más necesito ver la luna o quedarme quieta, sin preguntas, frente a mi imagen tan propia y tan ajena.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

O comércio de espécies selvagens tem crescido bastante ao longo das últimas décadas. Atualmente é considerado o quarto maior tráfico ilegal no mundo, logo seguido da transação de drogas, de armas e de humanos. Estima-se que o comércio de espécies selvagens pode ultrapassar os 12 milhões de euros por ano na UE. Abrange tanto as plantas como os animais vivos; mas, nestes últimos, incluem-se também os seus derivados, tais como sejam as peles, os ossos, alimento, entre outros. O uso das espécies selvagens é bastante vastos, as espécies são utilizadas para alimentação, uso medicinal, investigação científica, comércio de peles, alimentação e o mais comum é para animais de estimação. As espécies exóticas muitas vezes tornam-se espécies exóticas invasoras, começam a ser um perigo para a biodiversidade e para as espécies nativas. O processo de invasão apresenta-se por quatro fases: dispersão ou transporte, estabelecimento, naturalização e por fim dispersão geográfica e/ou invasão. Vários são os mecanismos para combater as espécies exóticas invasoras, sendo que o mecanismo mais radical a erradicação de espécimes. Em Lisboa, estão descritas três espécies exóticas invasoras: a tartaruga da Florida Trachemys scripta, a tartaruga de Nelson Pseudemys nelsoni e a tartaruga corcunda do Mississipi Graptemys pseudogeographica; ABSTRACT: The wildlife trade is growing fast over the last decades. It is now considered the fourth largest illegal trade in the world, followed by the drugs, weapons and humans. It is estimated that trade with species can exceed 12 million € per year in the EU. This trade comprises plants or live animals; but also is derivatives, such as skins, bones, food, and others. The use of wildlife is diverse, can be for food, medical, scientific research, trade of skins, but the most common is for pets. Alien species can become invasive alien species and so they become a threat to biodiversity and for native species. The process of invasion has four phases: dispersion or transport, establishment, naturalization and geographic dispersion and/or invasion. There are several mechanisms to combat such invasive alien species: the most radical mechanism is eradication of specimens. In Lisbon, are described three invasive alien species: the red-eared slider turtle Trachemys Florida, the Florida red-bellied turtle Pseudemys nelsoni and the false map turtle Graptemys psedogeographica.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new ‘Danger Theory’ (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of ‘grounding’ the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação de dout. em Literatura (Literatura e Cultura Clássicas), Faculdade de Ciências Humanas e Sociais, Univ. do Algarve, 2005

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aquatic macrophytes can successfully colonise and re-colonise areas separated by space and time. The mechanisms underlying such “mobility” are not well understood, but it has often been hypothesised that epizoochory (external dispersal) plays an important role. Yet, there is only limited, and mostly anecdotal, evidence concerning successful epizoochorous dispersal of aquatic macrophytes, particularly in the case of short-distance dispersal. Here we examine in situ and ex situ dispersal of aquatic macrophytes, including three invasive alien species. A high frequency of Lemna minor Linnaeus dispersal was observed in situ, and this was linked to bird-mediated epizoochory. We concluded that wind had no effect on dispersal. Similarly, in an ex situ examination Lemna minuta Kunth and Azolla filiculoides Lamarck, were found to be dispersed with a high frequency by mallard ducks (Anas platyrhynchos). No dispersal was measured for Elodea nuttalli (Planchon) H. St. John. It is concluded that short-distance or “stepping-stone” dispersal via bird-mediated epizoochory can occur with high frequencies, and therefore can play an important role in facilitating colonisation, range expansion and biological invasion of macrophytes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El siguiente estudio de caso analiza la influencia de la llegada de la migración infantil indocumentada centroamericana en la reformulación de la política migratoria de Estados Unidos en el período 2010-2014. Enfocándose en el caso de Honduras para dar a conocer y analizar las causas que crean las dinámicas migratorias por parte de los menores, este trabajo analiza como la llegada de estas poblaciones genera ciertos efectos en el proceso de toma de decisión de las políticas internas de los Estados Unidos. Por un lado, para resaltar las características del fenómeno migratorio, se utilizan las teorías de redes sociales y la teoría push and pull. Por otro, mediante los conceptos de Sensibilidad y Vulnerabilidad expuestos en la teoría de la Interdependencia Compleja de las Relaciones Internacionales, como también el concepto de Seguridad Societal propuesto por Barry Buzan se estudia el nivel de influencia del fenómeno infantil en el gobierno norteamericano.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

ResumenEstudia el proceso que condujo a la consagración de Atlacatl el cacique indígena que lideró la resistencia de los habitantes de Cuscatlán frente a los invasores españoles, como héroe nacional, hacia fines de la década de 1920AbstractThe author studies the process which led to the elevations of Atlacatl, the indigenous chieftain who lead the resistance of the inhabitants of Cuscatlán against the spanish invaders, to the status of national hero towards the en of the 1920s