984 resultados para National Soil Database
Resumo:
Objectives. A large-scale survey of doses to patients undergoing the most frequent radiological examinations was carried out in health services in Sao Paulo (347 radiological examinations per 1 000 inhabitants), the most populous Brazilian state. Methods. A postal dosimetric kit with thermoluminescence dosimeters was used to evaluate the entrance surface dose (ESD) to patients. A stratified sampling technique applied to the national health database furnished important data on the distribution of equipment and the annual number of examinations. Chest, head (skull and sinus), and spine (cervical, thoracic, and lumbar) examinations were included in the trial. A total of 83 rooms and 868 patients were included, and 1 415 values of ESD were measured. Results. The data show large coefficients of variation in tube charge, giving rise to large variations in ESD values. Also, a series of high ESD values associated with unnecessary localizing fluoroscopy were detected. Diagnostic reference levels were determined, based on the 75th percentile (third quartile) of the ESD distributions. For adult patients, the diagnostic reference levels achieved are very similar to those obtained in international surveys. However, the situation is different for pediatric patients: the ESD values found in this survey are twice as large as the international recommendations for chest radiographs of children. Conclusions. Despite the reduced number of ESD values and rooms for the pediatric patient group, it is recommended that practices in chest examinations be revised and that specific national reference doses and image quality be established after a broader survey is carried out.
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico
Resumo:
The optimal timing of primary and metastatic tumor management in patients with synchronous hepatic colorectal metastases remains controversial. We aimed to compare perioperative outcomes of simultaneous colorectal/liver resection (SCLR) with isolated resections utilizing a national clinical database.
Resumo:
Aim: Accumulating evidence indicates that species may be pre-adapted for invasion success in new ranges. In the light of increasing global nutrient accumulation, an important candidate pre-adaptation for invasiveness is the ability to grow in nutrient-rich habitats. Therefore we tested whether globally invasive species originating from Central Europe have come from more productive rather than less productive habitats. A further important candidate pre-adaptation for invasiveness is large niche width. Therefore, we also tested whether species able to grow across habitats with a wider range of productivity are more invasive. Location: Global with respect to invasiveness, and Central European with respect to origin of study species. Methods We examined whether average habitat productivity and its width across habitats are significant predictors of the success of Central European species as aliens and as weeds elsewhere in the world based on data in the Global Compendium of Weeds. The two habitat productivity measures were derived from nutrient indicator values (after Ellenberg) of accompanying species present in vegetation records of the comprehensive Czech National Phytosociological Database. In the analyses, we accounted for phylogenetic relatedness among species and for size of the native distribution ranges. Results: Species from more productive habitats and with a wider native habitat-productivity niche in Central Europe have higher alien success elsewhere in the world. Weediness of species increased with mean habitat productivity. Niche width was also an important determinant of weediness for species with their main occurrence in nutrient-poor habitats, but not for those from nutrient-rich habitats. Main conclusions: Our results indicate that Central European plant species from productive habitats and those species from nutrient-poor habitat with wide productivity-niche are pre-adapted to become invasive. These results suggest that the world-wide invasion success of many Central European species is likely to have been promoted by the global increase of resource-rich habitats.
Resumo:
During the last decade, DNA profiling and the use of DNA databases have become two of the most employed instruments of police investigations. This very rapid establishment of forensic genetics is yet far from being complete. In the last few years novel types of analyses have been presented to describe phenotypically a possible perpetrator. We conducted the present study among German speaking Swiss residents for two main reasons: firstly, we aimed at getting an impression of the public awareness and acceptance of the Swiss DNA database and the perception of a hypothetical DNA database containing all Swiss residents. Secondly, we wanted to get a broader picture of how people that are not working in the field of forensic genetics think about legal permission to establish phenotypic descriptions of alleged criminals by genetic means. Even though a significant number of study participants did not even know about the existence of the Swiss DNA database, its acceptance appears to be very high. Generally our results suggest that the current forensic use of DNA profiling is considered highly trustworthy. However, the acceptance of a hypothetical universal database would be only as low as about 30% among the 284 respondents to our study, mostly because people are concerned about the security of their genetic data, their privacy or a possible risk of abuse of such a database. Concerning the genetic analysis of externally visible characteristics and biogeographical ancestry, we discover a high degree of acceptance. The acceptance decreases slightly when precise characteristics are presented to the participants in detail. About half of the respondents would be in favor of the moderate use of physical traits analyses only for serious crimes threatening life, health or sexual integrity. The possible risk of discrimination and reinforcement of racism, as discussed by scholars from anthropology, bioethics, law, philosophy and sociology, is mentioned less frequently by the study participants than we would have expected. A national DNA database and the widespread use of DNA analyses for police and justice have an impact on the entire society. Therefore the concerns of lay persons from the respective population should be heard and considered. The aims of this study were to draw a broader picture of the public opinion on DNA databasing and to contribute to the debate about the possible future use of genetics to reveal phenotypic characteristics. Our data might provide an additional perspective for experts involved in regulatory or legislative processes.
Resumo:
It has been well documented that inmates incarcerated in prisons and correctional facilities exhibit higher incidence and prevalence of mycobacterium tuberculosis (TB) disease than the general population. This has public health implications because correctional systems may serve as reservoirs for TB disease that can lead to TB outbreaks in the facilities or can be spread to the general public once inmates are released. Although Texas has one of the largest correctional systems in both the US and the world, little is known about TB prevalence and incidence among Texas inmates. The purpose of this study was to elucidate the relationship between TB incidence and incarceration in Texas correctional facilities and investigate differences in various demographic factors. ^ The study used the national TB database from the US Centers for Disease Control and Prevention (CDC) to calculate and compare the overall incidences of TB disease among correctional facility inmates and similar non-inmates in Texas during 2005–2009. Data were also stratified by age, gender, race/ethnicity, birth status, and HIV status and compared between inmates and non-inmates using chi-squared analysis and relative risks with 95% confidence intervals to assess any significant differences. ^ Results suggest that the overall TB incidence among Texas correctional facility inmates per year (88.6 per 100,000) was significantly higher than that of Texas non-inmates (6.3 per 100,000); a 14 fold difference. Relative risk analyses by gender, race/ethnicity, and those with HIV infection found that the TB incidences for all these demographics were significantly and consistently higher in inmates compared to non-inmates. In particular, Hispanic inmates were more likely to develop TB than their non-inmate counterparts by a relative risk of 23.9 (95% CI 19.4–29.4). Likewise, both male and female inmates were more likely to develop TB than non-inmates (RR = 10.2, 95% CI 8.5–12.2; RR = 20.8, 95% CI 12.2–25.3, respectively), although female inmates unconventionally exhibited a higher TB incidence and relative risk than males inmates, which has not been shown. Among those with HIV infections, correctional facility inmates were 2.6 times were likely to develop TB disease than non-inmates (95% CI 1.5–4.4). ^ Inmates in Texas correctional facilities have a higher incidence of TB than non-inmates. Part of this higher risk may be because a large proportion of inmates come from populations already at high risks for TB, such as foreign born immigrants, those infected with HIV, and low SES groups such as many racial/ethnic minorities. Thus, these results may be used as a basis for more controlled and detailed research in the area, and to further characterize incarceration as a risk factor for TB incidence. They may also bring much needed attention about this health disparity to public health officials, legislators, and health administrators to expand and improve TB control in Texas correctional facilities, particularly among inmates released to the community, and reduce the risk of TB transmission to the general population.^
Resumo:
Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.
Resumo:
In this study, we investigated the relationship between vegetation and modern-pollen rain along the elevational gradient of Mount Paggeo. We apply multivariate data analysis to assess the relationship between vegetation and modern-pollen rain and quantify the representativeness of forest zones. This study represents the first statistical analysis of pollen-vegetation relationship along an elevational gradient in Greece. Hence, this paper improves confidence in interpretation of palynological records from north-eastern Greece and may refine past climate reconstructions for a more accurate comparison of data and modelling. Numerical classification and ordination were performed on pollen data to assess differences among plant communities that beech (Fagus sylvatica) dominates or co-dominates. The results show a strong relationship between altitude, arboreal cover, human impact and variations in pollen and nonpollen palynomorph taxa percentages.
Resumo:
An algorithm based on a Bayesian network classifier was adapted to produce 10-day burned area (BA) maps from the Long Term Data Record Version 3 (LTDR) at a spatial resolution of 0.05° (~5 km) for the North American boreal region from 2001 to 2011. The modified algorithm used the Brightness Temperature channel from the Moderate Resolution Imaging Spectroradiometer (MODIS) band 31 T31 (11.03 μm) instead of the Advanced Very High Resolution Radiometer (AVHRR) band T3 (3.75 μm). The accuracy of the BA-LTDR, the Collection 5.1 MODIS Burned Area (MCD45A1), the MODIS Collection 5.1 Direct Broadcast Monthly Burned Area (MCD64A1) and the Burned Area GEOLAND-2 (BA GEOLAND-2) products was assessed using reference data from the Alaska Fire Service (AFS) and the Canadian Forest Service National Fire Database (CFSNFD). The linear regression analysis of the burned area percentages of the MCD64A1 product using 40 km × 40 km grids versus the reference data for the years from 2001 to 2011 showed an agreement of R2 = 0.84 and a slope = 0.76, while the BA-LTDR showed an agreement of R2 = 0.75 and a slope = 0.69. These results represent an improvement over the MCD45A1 product, which showed an agreement of R2 = 0.67 and a slope = 0.42. The MCD64A1, BA-LTDR and MCD45A1 products underestimated the total burned area in the study region, whereas the BA GEOLAND-2 product overestimated it by approximately five-fold, with an agreement of R2 = 0.05. Despite MCD64A1 showing the best overall results, the BA-LTDR product proved to be an alternative for mapping burned areas in the North American boreal forest region compared with the other global BA products, even those with higher spatial/spectral resolution
Resumo:
Riparian zones are dynamic, transitional ecosystems between aquatic and terrestrial ecosystems with well defined vegetation and soil characteristics. Development of an all-encompassing definition for riparian ecotones, because of their high variability, is challenging. However, there are two primary factors that all riparian ecotones are dependent on: the watercourse and its associated floodplain. Previous approaches to riparian boundary delineation have utilized fixed width buffers, but this methodology has proven to be inadequate as it only takes the watercourse into consideration and ignores critical geomorphology, associated vegetation and soil characteristics. Our approach offers advantages over other previously used methods by utilizing: the geospatial modeling capabilities of ArcMap GIS; a better sampling technique along the water course that can distinguish the 50-year flood plain, which is the optimal hydrologic descriptor of riparian ecotones; the Soil Survey Database (SSURGO) and National Wetland Inventory (NWI) databases to distinguish contiguous areas beyond the 50-year plain; and land use/cover characteristics associated with the delineated riparian zones. The model utilizes spatial data readily available from Federal and State agencies and geospatial clearinghouses. An accuracy assessment was performed to assess the impact of varying the 50-year flood height, changing the DEM spatial resolution (1, 3, 5 and 10m), and positional inaccuracies with the National Hydrography Dataset (NHD) streams layer on the boundary placement of the delineated variable width riparian ecotones area. The result of this study is a robust and automated GIS based model attached to ESRI ArcMap software to delineate and classify variable-width riparian ecotones.
Resumo:
Robust and accurate regional estimates of C storage in soils are currently an important research topic because of ongoing debate about human-induced changes in the terrestrial C cycle. Widely available geoprocessing tools were applied to estimate native soil organic C (SOC) stocks of Rio Grande do Sul state in southern Brazil to a depth of 30 cm from previously sampled soil pedons under undisturbed vegetation. The study used a statewide comprehensive soil survey comprising a small-scale soil map, a climate map, and a soil pedon database. Soil organic C stocks under native vegetation were calculated with two different approaches: the Tier 1 method of the Intergovernmental Panel on Climate Change (IPCC) and a refined method based on actual field measurements derived from soil profile data. Highest SOC stocks occurred in Neossolos Quartzarenico hidromorfico (Aquents), Organossolos Tiomorficos (Hemists), Latossolos Brunos (Udox), and Vertissolos Ebanicos (Uderts) soil classes. Before human use of soils, most C was stored in the Latossolos Vermelhos (Udox) and Neossolos Regoliticos (Orthents), which occupy a large area of Rio Grande do Sul. Generally, IPCC default reference SOC stocks compared well with SOC stocks calculated from soil pedons. The total SOC stock of Rio Grande do Sul was estimated at 1510.3 Tg C (5.8 kg C m(-2)) by the IPPC method and 1597.5 +/- 363.9 Tg C (7.4 +/- 1.9 kg C m(-2)) calculated from soil pedons. The SOC digital map and SOC database developed in this study provide crucial background information for state-level contemporary assessment of C stocks and soil C sequestration programs and initiatives.
Resumo:
This paper describes the construction of Australia-wide soil property predictions from a compiled national soils point database. Those properties considered include pH, organic carbon, total phosphorus, total nitrogen, thickness. texture, and clay content. Many of these soil properties are used directly in environmental process modelling including global climate change models. Models are constructed at the 250-m resolution using decision trees. These relate the soil property to the environment through a suite of environmental predictors at the locations where measurements are observed. These models are then used to extend predictions to the continental extent by applying the rules derived to the exhaustively available environmental predictors. The methodology and performance is described in detail for pH and summarized for other properties. Environmental variables are found to be important predictors, even at the 250-m resolution at which they are available here as they can describe the broad changes in soil property.
Resumo:
The need for information on the health service needs of people with physical and/or sensory disabilities was first highlighted in Shaping a Healthier Future, a document which outlined the national strategy for effective healthcare in the 1990s. This strategy document identified the establishment of a national database as the means of gathering such information Download the Report here
Resumo:
The need for information on the service needs of people with physical and/or sensory disabilities was first highlighted in Shaping a Healthier Future: A strategy for Effective Healthcare in the 1990s. This strategy document identified the establishment of a national database as the means of gathering such information. Subsequently, the report of the Review Group on Health and Personal Social Services for People with Physical and Sensory Disabilities, Towards an Independent Future, identified the lack of reliable information on the numbers of people with a physical and/or sensory disability needing a health and personal social service and their precise service needs. Download the Report here