733 resultados para Drone attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The escape response to electrical or chemical stimulation of the dorsal periaqueductal gray matter (DPAG) has been associated with panic attacks. In order to explore the validity of the DPAG stimulation model for the study of panic disorder, we determined if the aversive consequences of the electrical or chemical stimulation of this midbrain area can be detected subsequently in the elevated T-maze. This animal model, derived from the elevated plus-maze, permits the measurement in the same rat of a generalized anxiety- and a panic-related defensive response, i.e., inhibitory avoidance and escape, respectively. Facilitation of inhibitory avoidance, suggesting an anxiogenic effect, was detected in male Wistar rats (200-220 g) tested in the elevated T-maze 30 min after DPAG electrical stimulation (current generated by a sine-wave stimulator, frequency at 60 Hz) or after local microinjection of the GABA A receptor antagonist bicuculline (5 pmol). Previous electrical (5, 15, 30 min, or 24 h before testing) or chemical stimulation of this midbrain area did not affect escape performance in the elevated T-maze or locomotion in an open-field. No change in the two behavioral tasks measured by the elevated T-maze was observed after repetitive (3 trials) electrical stimulation of the DPAG. The results indicate that activation of the DPAG caused a short-lived, but selective, increase in defensive behaviors associated with generalized anxiety.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Intracutaneous sterile water injection (ISWI) is used for relief of low back pain during labor, acute attacks of urolithiasis, chronic neck and shoulder pain following whiplash injuries, and chronic myofascial pain syndrome. We conducted a randomized, double-blinded, placebo-controlled trial to evaluate the effect of ISWI for relief of acute low back pain (aLBP). A total of 68 patients (41 females and 27 males) between 18 and 55 years old experiencing aLBP with moderate to severe pain (scores ≥5 on an 11-point visual analogue scale [VAS]) were recruited and randomly assigned to receive either ISWIs (n=34) or intracutaneous isotonic saline injections (placebo treatment; n=34). The primary outcome was improvement in pain intensity using the VAS at 10, 45, and 90 min and 1 day after treatment. The secondary outcome was functional improvement, which was assessed using the Patient-Specific Functional Scale (PSFS) 1 day after treatment. The mean VAS score was significantly lower in the ISWI group than in the control group at 10, 45, and 90 min, and 1 day after injection (P<0.05, t-test). The mean increment in PSFS score of the ISWI group was 2.9±2.2 1 day after treatment, while that in the control group was 0.9±2.2. Our study showed that ISWI was effective for relieving pain and improving function in aLBP patients at short-term follow-up. ISWI might be an alternative treatment for aLBP patients, especially in areas where medications are not available, as well as in specific patients (e.g., those who are pregnant or have asthma), who are unable to receive medications or other forms of analgesia because of side effects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract The storage susceptibility of Bambara groundnut (B. G.) (Voandzeia Subterranean (L.) Thouars) to Callosobruchus maculatus and chemical and functional properties of 11 varieties form Far-North of Cameroon were investigate using standard analytical methods. Storage susceptibility shown that, after five months within treatment, C. maculatus destroy 10 to 50% of grains. The chemical characteristics of none attack grains of 11 varieties were range to 18.64 at 21.08%, 6.85 at 7.44%, 49.75 at 52.68% and to 6.05 at 7.55% respectively for protein, fat, starch and free carbohydrate. These chemical characteristics significantly (p < 0.05) decreases form attacks varieties. For the functional parameters, the none attacks grains was range of 130 at 135%, 19.15 at 20.91%, 18.20 at 21.13%, 2.76 at 3.21% and of 8.54 at 10.14% respectively for water capacity absorption, solubility index, gel length, ash and humidity. The results of this study indicated that storage susceptibility, chemical and functional properties of B. G. be dependant to the varieties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Leveraging cloud services, companies and organizations can significantly improve their efficiency, as well as building novel business opportunities. Cloud computing offers various advantages to companies while having some risks for them too. Advantages offered by service providers are mostly about efficiency and reliability while risks of cloud computing are mostly about security problems. Problems with security of the cloud still demand significant attention in order to tackle the potential problems. Security problems in the cloud as security problems in any area of computing, can not be fully tackled. However creating novel and new solutions can be used by service providers to mitigate the potential threats to a large extent. Looking at the security problem from a very high perspective, there are two focus directions. Security problems that threaten service user’s security and privacy are at one side. On the other hand, security problems that threaten service provider’s security and privacy are on the other side. Both kinds of threats should mostly be detected and mitigated by service providers. Looking a bit closer to the problem, mitigating security problems that target providers can protect both service provider and the user. However, the focus of research community mostly is to provide solutions to protect cloud users. A significant research effort has been put in protecting cloud tenants against external attacks. However, attacks that are originated from elastic, on-demand and legitimate cloud resources should still be considered seriously. The cloud-based botnet or botcloud is one of the prevalent cases of cloud resource misuses. Unfortunately, some of the cloud’s essential characteristics enable criminals to form reliable and low cost botclouds in a short time. In this paper, we present a system that helps to detect distributed infected Virtual Machines (VMs) acting as elements of botclouds. Based on a set of botnet related system level symptoms, our system groups VMs. Grouping VMs helps to separate infected VMs from others and narrows down the target group under inspection. Our system takes advantages of Virtual Machine Introspection (VMI) and data mining techniques.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

IoT consists of essentially thousands of tiny sensor nodes interconnected to the internet, each one of which executes the programmed functions under memory and power limita- tions. The sensor nodes are distributed mainly for gathering data in various situations. IoT envisions the future technologies such as e-health, smart city, auto-mobiles automa- tion, construction sites automation, and smart home. Secure communication of data under memory and energy constraints is major challenge in IoT. Authentication is the first and important phase of secure communication. This study presents a protocol to authenticate resource constraint devices in physical proximity by solely using the shared wireless communication interfaces. This model of authentication only relies on the abundance of ambient radio signals to authenticate in less than a second. To evaluate the designed protocol, SkyMotes are emulated in a network environment simulated by Contiki/COOJA. Results presented during this study proves that this approach is immune against passive and active attacks. An adversary located as near as two meters can be identified in less than a second with minimal expense of energy. Since, only radio device is used as required hardware for the authentication, this technique is scalable and interoperable to heterogeneous nature of IoT.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Science has revolutionized the human life. The advance progress in science and research is making human life easier and more comfortable. The new and emerging technology of micro drone is penetrating and widening the scientific research. This thesis is a part of work in which a unique work is carried out, although related research paper and journal are available. Design and development of automatic charging station for a ready to fly quadcopter is rare and unusual work. The work is carried out as an standard engineering process that include requirements gathering, creating the required document (this thesis is a part of required document as well), selection of suitable hardware, configuring the hardware, generate the code for software, uploading code to the microcontroller, troubleshooting and rectification, finalized prototype and testing. Thesis describe how mechatronics engineering is useful in generating a customized and unique project. At the starting phase of this project (before purchasing a ready to fly quadcopter) every single aspect of this work was known. The only unknown alternatives was a battery and charger. Several task was achieved including design and development of automatic charging station, accurate landing and telecast a live video on additional screen. At starting it was decided that quadcopter should follow the mobile robot, during study it was concluded there is no such quadcopter available in market to auto follow a robot indoor. This works starts with a market survey and comparing the different brands of quadcopter that meets all the requirements and specifications of the mobile robot assembly. Selection of quadcopter is a result of discussion and meeting with the team members, supervisor, professor and project manage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Karl Popper versus Theodor Adorno: Lessons from a historical confrontation. In 1961, during the Congress of the German Society of Sociology, two great theoretical references of the XX century faced in a historical debate about the logic of the social sciences. In addition to methodological issues strict sense, the confrontation became known as a debate between positivism and dialectic. The article first deals with the theoretical trajectories of Popper and Adorno and the relation of their theories with their political and ideological certainties. On one hand, the trajectory of the Popperian epistemology is examined, its contributions and vigorous attacks on Marx in what he called 'poverty of historicism" and false predictive Marxist world, and, on the other hand, the role of Adorno in the Frankfurt School, his criticism of totalitarianism and the defense of a critical emancipatory reason. The article also deals with the confrontation itself, the exposure of Popper's twenty-seven theses that culminate with the situation logic and the method of the economy as exemplary for the social sciences and Adorno's critical perspective of sociology and society as non-separable objects. In conclusion we show how the articulation of theory with the weltanschauung of each author helps to clarify the terms of the debate and how the confrontation contributed unequivocally to the dynamics of scientific progress and for the critical history of the ideas.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Internetin yhteisöpalveluiden käyttäjien avoimuus ja sosiaalisuus altistavat heidät monenlaisille riskeille. “Social engineering” eli käyttäjien manipulointi on uhka, joka liittyy informaation hankkimiseen perinteisen kanssakäymisen kautta, mutta yhä enenevissä määrin myös internetissä. Kun kanssakäyminen tapahtuu internetin välityksellä, käyttäjien manipuloijat hyödyntävät yhteisöpalveluita yhteydenpitoon uhrien kanssa sekä paljon käyttäjäinformaatiota sisältävänä alustana. Tämän tutkielman tarkoitus on löytää internetin yhteisöpalveluiden ja käyttäjien manipuloinnin välinen yhteys. Tämä päämäärä saavutettiin etsimällä vastauksia kysymyksiin kuten: Mitkä ovat tyypilliset hyökkäystyypit? Miksi informaatiolla on niin suuri rooli? Mitä seurauksia ilmiöllä on ja miten hyökkäyksiltä on mahdollista suojautua? Vastaukset kysymyksiin löydettiin toteuttamalla systemaattinen kirjallisuuskatsaus. Katsaus muodostui yhdistämällä tärkeimmät löydökset 60 tarkoin valitusta ilmiötä käsittelevästä artikkelista. Käyttäjien manipuloinnin huomattiin olevan hyvin laaja ja monimutkainen ilmiö internetin yhteisöpalveluissa. Huomattiin, että manipulointia ilmenee sivustoilla useissa erilaisissa muodoissa, joita ovat muun muassa tietojen kalastelu, profiilien yhdistäminen, sosiaaliset sovellukset, roskaposti, haitalliset linkit, identiteettivarkaudet, tietovuodot ja erilaiset huijaukset, jotka hyödyntävät sekä ihmisluonnon että sivustojen perusominaisuuksia. Haavoittuvuus ja luottamus havaittiin myös tärkeiksi aspekteiksi, sillä ne yhdistävät informaation merkityksen ja ihmisluonnon, jotka molemmat ovat avaintekijöitä sekä manipuloinnissa että yhteisöpalvelusivustoilla. Vaikka ilmiön seurausten huomattiin olevan negatiivisia niin käyttäjien olemukselle internetissä kuin todellisessakin elämässä, havaittiin myös, että ilmiön ymmärtäminen ja tunnistaminen helpottaa siltä suojautumista

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Increased losses of eggs and chicks resulting from human intrusion (investigator or other) into seabird colonies has been well documented. In 1990/91, I studied the effects of investigator disturbance on aggressive behaviour and breeding success of individual pairs of ring-billed gulls nesting at two colonies near Port Colborne, Ontario. The insular colony was on an artificial breakwall, associated with the Welland Ship Canal, approximately 1 km off the north shore of Lake Erie. The mainland colony was adjacent to the canal approximately 1 km east of the breakwall. The frequencies of adult threat and assault behaviours, chick movement and adult attacks on chicks were recorded by continuous scan sampling 30 min prior to, 30 min during and 60 (2 X 30) min after investigator disturbance. The frequency of threat and assault behaviours increased during the period of investigator activity in the colony while the duration of wingpulls and beakpulls decreased. Significantly more chicks ran ("runners") from their natal territories during disturbances and "runners" were more frequently attacked than "territorial" chicks. No chicks were fatally attacked during disturbance and "runners" returned to their natal territories quickly after disturbance. Breeding success was determined for pairs nesting in study plots subjected to two levels of disturbance (normal and moderate). The disturbance level of each plot differed in visitation frequency and activities performed on each visit. Investigator disturbance had no effect on the hatching success or fledging success (taken as 21 days of age) of ring-billed gull study pairs at either colony.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This was a weekly paper that was published every Saturday. The motto of the Merrimack was: "Not too rash--Yet not fearful--We aim to be just." It was published from 1808-1817. Topics of interest include: Page 1: State of New York Republicans published a statement arguing against the war and the policies of John Adams and James Madison; account of the capture of York by the Americans, 27 April 1813; Page 2: account of the capture of York by the Americans, 27 April 1813; letter from American Brig. Gen. Henry Miller to Sir John B. Warren warning the British not to execute captured U.S. citizen O'Neal; response from Sir John B. Warren to Brig. Gen. Henry Miller stating that O'Neal had been released; account of Stephen Girard buying back his ransomed ship from the British; Page 3: account of Stephen Girard buying back his ransomed ship from the British; U.S. General Harrison repels British and Indian forces that attack Fort Meigs; account of British forces capturing U.S. privateer ship Alexander; report of British forces near Newport, New York, the Delaware river, and the Potomac River; report of Indian attacks in Kaskaskia, Randolph County; report of a boat load of provisions attacked by Indians near Fort Harrison; Commodore Isaac Chauncey arrived at Sacket's Harbor to unload stores taken from York before leaving for Niagara to commence attack against Fort George; U.S. Army announcement recruiting men 18 to 45 years of age to enlist in the army;

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A weekly paper that was published from 1805 to 1814. War related news includes: Page 103 - Weekly Retrospect: Troop movements of Captain Morgan and a company of light dragoons from Niagara to Greenbush; report on the Battle of Queenston Heights including a casualty listing and a mention of the death of Major General Isaac Brock and Colonel McDonald and the American's respect for Brock; British attach of Fort Erie and the Village of Black Rock; the privateer Globe under Captain Murphy returning to Baltimore after capturing a British letter of marque; First Nation / Indian attacks near St. Louis; movements of General W. Harrison and army from Fort Defiance to the rapids of Miama (Miami). The rest of the newspaper contains literary works (poems and translations), essays (including on celibacy), marriages, deaths and other anecdotes. The motto on the front page states: "Visiting Every Flower with Labour Meet, and Gathering all its Treasures, Sweet by Sweet."

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Chlorhexidine is an effective antiseptic used widely in disinfecting products (hand soap), oral products (mouthwash), and is known to have potential applications in the textile industry. Chlorhexidine has been studied extensively through a biological and biochemical lens, showing evidence that it attacks the semipermeable membrane in bacterial cells. Although extremely lethal to bacterial cells, the present understanding of the exact mode of action of chlorhexidine is incomplete. A biophysical approach has been taken to investigate the potential location of chlorhexidine in the lipid bilayer. Deuterium nuclear magnetic resonance was used to characterize the molecular arrangement of mixed phospholipid/drug formulations. Powder spectra were analyzed using the de-Pake-ing technique, a method capable of extracting both the orientation distribution and the anisotropy distribution functions simultaneously. The results from samples of protonated phospholipids mixed with deuterium-labelled chlorhexidine are compared to those from samples of deuterated phospholipids and protonated chlorhexidine to determine its location in the lipid bilayer. A series of neutron scattering experiments were also conducted to study the biophysical interaction of chlorhexidine with a model phospholipid membrane of DMPC, a common saturated lipid found in bacterial cell membranes. The results found the hexamethylene linker to be located at the depth of the glycerol/phosphate region of the lipid bilayer. As drug concentration was increased in samples, a dramatic decrease in bilayer thickness was observed. Differential scanning calorimetry experiments have revealed a depression of the DMPC bilayer gel-to-lamellar phase transition temperature with an increasing drug concentration. The enthalpy of the transition remained the same for all drug concentrations, indicating a strictly drug/headgroup interaction, thus supporting the proposed location of chlorhexidine. In combination, these results lead to the hypothesis that the drug is folded approximately in half on its hexamethylene linker, with the hydrophobic linker at the depth of the glycerol/phosphate region of the lipid bilayer and the hydrophilic chlorophenyl groups located at the lipid headgroup. This arrangement seems to suggest that the drug molecule acts as a wedge to disrupt the bilayer. In vivo, this should make the cell membrane leaky, which is in agreement with a wide range of bacteriological observations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Daniel Clendenan (1793-1866) was the son of Abraham Clendenan, a private in Butler’s Rangers. He was married to Susan[na] [Albrecht ] Albright, daughter of Amos Albright. Daniel and Susan[na] had twelve children and belonged to the Disciple Church. In 1826 Daniel Clendenan purchased Part lot 14, Concession 6, Louth Township from Robert Roberts Loring. On this property he built a home and conducted the business of blacksmithing and along with William Jones operated a lumber mill. Volume 1 and the first part of Volume 2 are Daniel Clendenan’s account books. Daniel and his wife Susan are buried in the Vineland Mennonite cemetery. Daniel and Susan[na]’s youngest daughter, Sarah, married widower Andrew Thompson (1825-1901), son of Charles and grandson of Solomon. Andrew Thompson had settled in the Wainfleet area in 1854 and had owned a mill in Wellandport. Daniel Clendenan, in ill health, passed ownership of Lot 14, Concession 6, Louth Township to his son-in-law Andrew Thompson. Robert Roberts Loring, the original owner of lot 14, concession 6 in Louth was born in September of 1789 in England. He joined the 49th Regiment of Foot as an ensign in December of 1804 and arrived in Quebec the following July. He served with Isaac Brock and Roger Sheaffe. In 1806 he was promoted to lieutenant. Loring was hired by Lieutenant General Gordon Drummond and accompanied him to Ireland in 1811, but the outbreak of war in the States in 1812 drew Loring back to Canada. On June 26, 1812 Loring became a captain in the 104th Regiment of Foot. On October 29 of the same year, he was appointed aide-de-camp to Sheaffe who was the administrator of Upper Canada. During the American attack on York in April 1813, Loring suffered an injury to his right arm from which he never recovered. In December of 1813, Drummond assumed command of the forces in Upper Canada and he appointed Loring as his aide-de-camp, later civil secretary and eventually his personal secretary. Loring was with Drummond in 1813 at the capture of Fort Niagara (near Youngstown), N.Y. He was also with Drummond in the attacks on Fort Niagara, settlements along the American side of the Niagara River, and then York and Kingston. In July of 1814 he was promoted to brevet major, however he was captured at the Battle of Lundy’s Lane and he spent the remainder of the conflict in Cheshire, Massachusetts. One of his fellow captives was William Hamilton Merritt. Loring remained in the army and had numerous military posts in Canada and England. He retired in 1839 and lived the last of his years in Toronto. He died on April 1, 1848. Sources: http://www.biographi.ca/en/bio/loring_robert_roberts_7E.html and “Loring, Robert Roberts” by Robert Malcomson in The Encyclopedia Of the War Of 1812 edited by Spencer Tucker, James R. Arnold, Roberta Wiener, Paul G. Pierpaoli, John C. Fredriksen