877 resultados para Replay Attack
Resumo:
The objective of this work was to determine the effects of rainfall, temperature, predators, parasitoids, plant age, leaf chemical composition, levels of leaf nitrogen and potassium, besides density of leaf trichomes, on attack intensity of Bemisia tabaci biotype B on the Cucumis sativus. An increase in the number of whitefly adults and nymphs per leaf was observed with plant aging. A higher number of whitefly adults per leaf and eggs cm-2 was verified in the apical part than in the middle and bottom part of the plants canopy. However, the higher number of whitefly nymphs was observed in the mid-part than in the apical and bottom part of the plant canopy. The incidence of whitefly nymphs was negatively affected with foliar nitrogen. Pentacosane and octacosane positively affected whitefly adults and the first compound also affected the nymphs of this pest species.
Resumo:
The objective of this work was to investigate the relationships between predators and parasitoids, leaf chemical composition, levels of leaf nitrogen and potassium, total rainfall, relative humidity, daylight and median temperature on the intensity of whitefly, aphid, and thrips attack on cabbage. Whitefly, aphids and thrips population tended to proliferate in the final stage of plant or reached a peak population about 40 days after plantation. The whitefly and thrips tended to increase with an increase in the median temperature. A dependence of Cheiracanthium inclusum and Adialytus spp. populations on whitefly and aphids populations, respectively, was observed. No significant effect was detected between K and nonacosane leaf content and aphid population. However, an increase in leaf N content was followed by a decrease of this insect population. No significant relation was observed between leaf N, K and nonacosane and whitefly and thrips populations. Highest nonacosane levels were observed in plants 40 days after transplant, and relative humidity correlated negatively with nonacosane. Natural enemies, especially the parasitoid Adialytus spp. and the spiders can be useful controlling agents of the whitefly and aphids in cabbage. Median temperature can increase whitefly and thrips populations.
Resumo:
BACKGROUND: Ischemic stroke is the leading cause of mortality worldwide and a major contributor to neurological disability and dementia. Terutroban is a specific TP receptor antagonist with antithrombotic, antivasoconstrictive, and antiatherosclerotic properties, which may be of interest for the secondary prevention of ischemic stroke. This article describes the rationale and design of the Prevention of cerebrovascular and cardiovascular Events of ischemic origin with teRutroban in patients with a history oF ischemic strOke or tRansient ischeMic Attack (PERFORM) Study, which aims to demonstrate the superiority of the efficacy of terutroban versus aspirin in secondary prevention of cerebrovascular and cardiovascular events. METHODS AND RESULTS: The PERFORM Study is a multicenter, randomized, double-blind, parallel-group study being carried out in 802 centers in 46 countries. The study population includes patients aged > or =55 years, having suffered an ischemic stroke (< or =3 months) or a transient ischemic attack (< or =8 days). Participants are randomly allocated to terutroban (30 mg/day) or aspirin (100 mg/day). The primary efficacy endpoint is a composite of ischemic stroke (fatal or nonfatal), myocardial infarction (fatal or nonfatal), or other vascular death (excluding hemorrhagic death of any origin). Safety is being evaluated by assessing hemorrhagic events. Follow-up is expected to last for 2-4 years. Assuming a relative risk reduction of 13%, the expected number of primary events is 2,340. To obtain statistical power of 90%, this requires inclusion of at least 18,000 patients in this event-driven trial. The first patient was randomized in February 2006. CONCLUSIONS: The PERFORM Study will explore the benefits and safety of terutroban in secondary cardiovascular prevention after a cerebral ischemic event.
Resumo:
The objective of this work was to evaluate the natural attack by Acromyrmex crassispinus in initial Pinus taeda plantations without control measures against ants, as well as the effect of defoliation in seedlings of P. taeda. Evaluations of the attack of leaf-cutting ants on P. taeda plantations were done monthly in the first six months, then 9 and 12 months after planting. The percentages of plants that were naturally attacked by ants were registered. The effect of defoliation was evaluated by artificial defoliation, simulating the natural patterns of attack by A. crassispinus on P. taeda seedlings. The natural attack of A. crassispinus was greater during the first months after planting, being more intense in the first 30 days. Artificial defoliation indicated that there were no significant losses in diameter and height in plants with less than 75% defoliation. However, there were significant losses in diameter and height in plants with 100% defoliation, independently of the cut of the apical meristem, and also plant death. The control of leaf-cutting ants in P. taeda plantings, in which A. crassispinus is the most frequent leaf-cutting ant, should be intense only at the beginning of planting, since the most severe attacks occur during this time.
Resumo:
Peer-reviewed
Resumo:
Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limitedresources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.
Resumo:
Thereis now growing evidencethatthe hippocampus generatestheta rhythmsthat can phase biasfast neural oscillationsinthe neocortex, allowing coordination of widespread fast oscillatory populations outside limbic areas. A recent magnetoencephalographic study showed that maintenance of configural-relational scene information in a delayed match-to-sample (DMS) task was associated with replay of that information during the delay period. The periodicity of the replay was coordinated by the phase of the ongoing theta rhythm, and the degree of theta coordination during the delay period was positively correlated with DMS performance. Here, we reanalyzed these data to investigate which brain regions were involved in generating the theta oscillations that coordinated the periodic replay of configural- relational information. We used a beamformer algorithm to produce estimates of regional theta rhythms and constructed volumetric images of the phase-locking between the local theta cycle and the instances of replay (in the 13- 80 Hz band). We found that individual differences in DMS performancefor configural-relational associations were relatedtothe degree of phase coupling of instances of cortical reactivations to theta oscillations generated in the right posterior hippocampus and the right inferior frontal gyrus. This demonstrates that the timing of memory reactivations in humans is biased toward hippocampal theta phase
Resumo:
BACKGROUND: PRES is a reversible neurotoxic state presenting with headache, altered mental status, visual loss, and seizures. Delayed diagnosis can be avoided if radiological patterns could distinguish PRES from cerebral ischemia. METHODS: Clinical and radiological data were collected on all hospitalized patients who had (1) discharge diagnosis of PRES and (2) acute CTP/CTA. Data were compared with 10 TIA patients with proven cytotoxic edema on MRI. RESULTS: Of the four PRES patients found, three were correlated with acute blood pressure and one with chemotherapy. At the radiological level, quantitative analyses of the CTP parameters showed that 2 out of 4 patients had bilaterally reduced CBF-values (23.2-47.1 ml/100g/min) in occipital regions, as seen in the pathological regions of TIA patients (27.3 ± 13.5 ml/100g/min). When compared with TIA patients, the pathological ROI's demonstrated decreased CBV-values (3.4-5.6 ml/100g). Vasogenic edema on MRI FLAIR imaging was seen in only one PRES patient, and cytotoxic edema on DWI-imaging was never found. CT angiography showed in one PRES patient a vasospasm-like unilateral posterior cerebral artery. CONCLUSIONS: If confirmed by other groups, CTP and CTA imaging in patients with acute visual loss and confusion may help to distinguish PRES from bi-occipital ischemia. These radiological parameters may identify PRES patients at risk for additional tissue infarction.
Resumo:
During our study of the glyoxylate cycle in soybean (Glycine max. L. var. Maple arrow), two mitochondrial and three cytosolic aconitase molecular species (EC 4.2.1.3) were detected, designated as M1, M2, C1, C2 and C3 isoforms, respectively, according to their intracellular locations and electrophoretic mobilities. Using the glyoxylate cycle marker enzymes isocitrate lyase (ICL, EC 4.1.3.1) and malate synthase (MS, EC 4.1.3.2), the activity of this pathway providing the essential link between P-oxidation and gluconeogenesis was confirmed during germination (cotyledons) and senescence (leaves). It was then established that, in both cases, the activity of the CI aconitase isoform developed concomitantly with the transcription and translation levels of the icl and ms genes. This strongly suggests that C1 aconitase is constitutive of the glyoxylate cycle. In addition, the same isoform was found to be active during pathogenic attack as well (hypocotyls). It might be assumed that in such a case the glyoxylate cycle is reinitiated as a part of a carbon reallocation system feeding on the diseased tissue cellular components.
Resumo:
Pathogenic attack by the fungus Botrytis cinerea (primary pathogen) on soybean leaves (Glycine max. L.; cv. Maple arrow) results in a hypersensitive response (necrotising infected leaves), in the establishment of local acquired resistance, as well as in the systemic induction of genes coding for pathogenesis-related proteins. It now appears that, concomitantly with these already well documented defence reactions, the pathogenic attack also induces the carbon reallocation mechanism based on the reinitiation of the glyoxylate cycle (pseudo-senescence of the infected leaves).
Resumo:
BACKGROUND: Earlobe crease (ELC) has been associated with cardiovascular diseases (CVD) or risk factors (CVRF) and could be a marker predisposing to CVD. However, most studies studied only a small number of CVRF and no complete assessment of the associations between ELC and CVRF has been performed in a single study. METHODS: Population-based study (n = 4635, 46.7 % men) conducted between 2009 and 2012 in Lausanne, Switzerland. RESULTS: Eight hundred six participants (17.4 %) had an ELC. Presence of ELC was associated with male gender and older age. After adjusting for age and gender (and medication whenever necessary), presence of ELC was significantly (p < 0.05) associated with higher levels of body mass index (BMI) [adjusted mean ± standard error: 27.0 ± 0.2 vs. 26.02 ± 0.07 kg/m(2)], triglycerides [1.40 ± 0.03 vs. 1.36 ± 0.01 mmol/L] and insulin [8.8 ± 0.2 vs. 8.3 ± 0.1 μIU/mL]; lower levels of HDL cholesterol [1.61 ± 0.02 vs. 1.64 ± 0.01 mmol/L]; higher frequency of abdominal obesity [odds ratio and (95 % confidence interval) 1.20 (1.02; 1.42)]; hypertension [1.41 (1.18; 1.67)]; diabetes [1.43 (1.15; 1.79)]; high HOMA-IR [1.19 (1.00; 1.42)]; metabolic syndrome [1.28 (1.08; 1.51)] and history of CVD [1.55 (1.21; 1.98)]. No associations were found between ELC and estimated cardiovascular risk, inflammatory or liver markers. After further adjustment on BMI, only the associations between ELC and hypertension [1.30 (1.08; 1.56)] and history of CVD [1.47 (1.14; 1.89)] remained significant. For history of CVD, further adjustment on diabetes, hypertension, total cholesterol and smoking led to similar results [1.36 (1.05; 1.77)]. CONCLUSION: In this community-based sample ELC was significantly and independently associated with hypertension and history of CVD.
Resumo:
Secretion curves for prolactin, cortisol, TSH, and GH from a 37-year old woman with dysthymia and panic disorder with agoraphobia were determined one day prior to (day I), and during a panic attack (day II) associated with an oral dose of 60 mg dl-fenfluramine, a drug known to increase anticipatory anxiety. The increased cortisol secretion observed is discussed in relation to the hormonal correlates of anxiety and the possible role of depression, dl-fenfluramine, and serotonergic receptor sensitivity
Resumo:
Familial Mediterranean fever (FMF) is a periodic autoinflammatory disease characterized by chronic inflammation. This study investigated the relationship between acute-phase reactants and gene mutations in attack-free periods of childhood FMF. Patients diagnosed with FMF were divided into four groups based on genetic features: no mutation, homozygous, heterozygous, and compound heterozygous. These groups were monitored for 2 years, and blood samples were collected every 6 months during attack-free periods. Erythrocyte sedimentation rate, C-reactive protein, fibrinogen, and white blood cell count were measured. A disease severity score was determined for each patient. Mean values for erythrocyte sedimentation rate and fibrinogen were significantly different in the homozygous group. White blood cell count and C-reactive protein were similar between the groups. Disease severity score was higher in patients with the M694V mutation than in individuals without the mutation, as well as in those with other mutation groups. Periodic follow-up of patients with FMF MEFV mutations in subjects with acute-phase reactants may be useful in the prevention of morbidity.
Resumo:
Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.
Resumo:
1980 script for Attack a Big Mac