703 resultados para TERRORIST ATTACKS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Address sustainability in all efforts. Sustainability should be at the core of all levels of homeland security and emergency management effort in Iowa. Capabilities need to be built for the long term, and without a sustainability plan in place, projects can quickly deplete uncertain levels of funding. Utilize an all-hazards methodology. Developing capabilities that are effective during a variety of disaster and emergency scenarios represents sound planning and resource management. Enhance capabilities through joint planning, training and exercise. Effective capabilities developed through coordinated planning efforts and an ongoing joint training and exercising program to ensure substantiate of prepared response. Utilize a collaborative approach to build capability. We will utilize whatever partnerships are necessary to build capability in the most effective manner possible. Regional partnerships have been, and will continue to be, in the forefront of the State of Iowa’s efforts to build and enhance capability. Enhance statewide capabilities. Whenever possible, we will identify and augment existing resources to provide statewide capability during a disaster or terrorist attack. Awareness, outreach and education. Open communication is critical to the success of any initiative. All projects implemented will have awareness, education and outreach components to ensure that all stakeholders are informed as to their responsibilities, capabilities and access. Information sharing and a common operating picture. The timely exchange of critical/actionable information is imperative to the success of every operation. The identification of a common operating picture allows decision makers to make informed decisions based on a unified understanding of the events around them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: To evaluate the dynamic properties of the horizontal vestibulo-ocular reflex (h-VOR) in the acute stage of two common labyrinthine diseases that provoke severe attacks of vertigo with spontaneous nystagmus: vestibular neuritis (vestibular loss alone) and viral labyrinthitis (cochleovestibular loss). MATERIAL AND METHODS: Sixty-three patients were investigated: 42 were diagnosed with vestibular neuritis and 21 with viral labyrinthitis. The h-VOR function was evaluated by conventional caloric and impulsive testing. A simplified model of vestibular function was used to analyze the vestibulo-ocular response to rotational stimulation. RESULTS: The results showed a significant difference in h-VOR characteristics between the two pathologies. Patients with vestibular neuritis exhibited a strong horizontal semicircular canal deficit, but no h-VOR asymmetry between the two rotational directions. In contrast, patients with viral labyrinthitis demonstrated moderate canal paresis and a marked h-VOR deficit in rotation toward the affected ear. CONCLUSION: These findings support the hypothesis that the h-VOR dynamic asymmetry that occurs after an acute unilateral inner ear lesion is not due to canal dysfunction alone, but involves complex adaptive changes in the central VOR that may implicate the otolith system. Based on histopathologic and clinical differences in the two pathologies reported in the literature, we postulate that this otolith-canal interaction is mainly linked to the loss of saccular function.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

English summary: Criminal legislation and terrorist groups (s. 334-335)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este artículo pretende estudiar la relación entre periodistas y políticos en situacionescríticas. Los autores han analizado la información emitida por las cadenas de televisión:Televisión Española, Antena 3 y Tele 5 en los días 11, 12 y 13 de marzo de 2004, coincidiendocon el atentado de Madrid. De esta investigación, se concluye que los periodistasactuaron con poca capacidad crítica, en connivencia con los políticos, en la propagaciónde determinadas tesis poco o nada argumentadas y de ciertos tópicos y expresionesgratuitas.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Elevated circulating concentrations in modified LDL-cholesterol particles (e.g. oxidised LDL) and low levels in HDL increase not only the risk for diabetic patients to develop cardiovascular diseases but also may contribute to development and progression of diabetes by directly having adverse effects on β-cells. Chronic exposure of β-cells to 2 mM human oxidised LDL-cholesterol (oxLDL) increases the rate of apoptosis, reduce insulin biosynthesis and the secretory capacity of the cells in response to nutrients. In line with the protective role, HDL efficiently antagonised the harmful effects of ox- LDL, suggesting that low levels of HDL would be inefficient to protect β-cells against oxLDL attack in patients. Activation of endoplasmic reticulum (ER) stress is pointed out to contribute to β-cell dysfunction elicited by environmental stressors. In this study we investigated whether activation of ER stress is required for oxLDL to mediate detrimental effects on β-cells and we tested the potential antagonist properties of HDL: The mouse MIN6 insulin-secreting cells were cultured with 2 mM of LDL-cholesterol preparation (native or in vitro oxidized) in the presence or absence of 1 mM of HDL-cholesterol or the ER stress inhibitor 4-phenylbutyrate (4-PBA): Prolonged exposure of MIN6 cells to 2 mM oxLDL-cholesterol for 48 hours led to an increase in expression of ER stress markers such as ATF4, CHOP and p58 and stimulated the splicing of XBP-1 whereas, induction of these markers was not observable in the cells cultured with native LDL. Treatment of the cells with the 4-PBA chemical chaperone molecule efficiently blocked activation of the ER stress markers induced by oxLDL. The latter mediates β-cell dysfunction and apoptosis by diminishing the expression of islet brain 1 (IB1) and Bcl2. The levels of these two proteins were preserved in the cells that were co-treated with oxLDL and the 4-PBA. Consistent with this result we found that blockade of ER stress activation alleviated the loss of insulin synthesis and abolished apoptosis evoked by oxLDL. However incubation of the cells with 4-PBA did not prevent impairment of insulin secretion elicited by oxLDL, indicating that ER stress is not responsible for the oxLDL-mediated defect of insulin secretion. Co-incubation of the cells with HDL mimicked the effects of 4-PBA on the expression of IB1 and Blc2 and thereby counteracted oxLDL attacks on insulin synthesis and cell survivals. We found that HDL efficiently inhibited activation of the ER stress mediated by oxLDL: These data highlight the contribution of the ER stress in the defects of insulin synthesis and cell survivals induced by oxLDL and emphasize the potent role of HDL to counter activation of the oxLDL-mediated ER-stress activation:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Million Hearts® brings together existing efforts and new programs to improve health across communities and help Americans live longer, healthier, more productive lives. In 2012, the Initiative's first year, Million Hearts® built strong partnerships to ensure steady progress toward preventing one million heart attacks and strokes by 2017.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The objective of this work was to evaluate the natural attack by Acromyrmex crassispinus in initial Pinus taeda plantations without control measures against ants, as well as the effect of defoliation in seedlings of P. taeda. Evaluations of the attack of leaf-cutting ants on P. taeda plantations were done monthly in the first six months, then 9 and 12 months after planting. The percentages of plants that were naturally attacked by ants were registered. The effect of defoliation was evaluated by artificial defoliation, simulating the natural patterns of attack by A. crassispinus on P. taeda seedlings. The natural attack of A. crassispinus was greater during the first months after planting, being more intense in the first 30 days. Artificial defoliation indicated that there were no significant losses in diameter and height in plants with less than 75% defoliation. However, there were significant losses in diameter and height in plants with 100% defoliation, independently of the cut of the apical meristem, and also plant death. The control of leaf-cutting ants in P. taeda plantings, in which A. crassispinus is the most frequent leaf-cutting ant, should be intense only at the beginning of planting, since the most severe attacks occur during this time.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many audio watermarking schemes divide the audio signal into several blocks such that part of the watermark is embedded into each of them. One of the key issues in these block-oriented watermarking schemes is to preserve the synchronisation, i.e. to recover the exact position of each block in the mark recovery process. In this paper, a novel time domain synchronisation technique is presented together with a new blind watermarking scheme which works in the Discrete Fourier Transform (DFT or FFT) domain. The combined scheme provides excellent imperceptibility results whilst achieving robustness against typical attacks. Furthermore, the execution of the scheme is fast enough to be used in real-time applications. The excellent transparency of the embedding algorithm makes it particularly useful for professional applications, such as the embedding of monitoring information in broadcast signals. The scheme is also compared with some recent results of the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cognitive radio is a wireless technology aimed at improvingthe efficiency use of the radio-electric spectrum, thus facilitating a reductionin the load on the free frequency bands. Cognitive radio networkscan scan the spectrum and adapt their parameters to operate in the unoccupiedbands. To avoid interfering with licensed users operating on a givenchannel, the networks need to be highly sensitive, which is achieved byusing cooperative sensing methods. Current cooperative sensing methodsare not robust enough against occasional or continuous attacks. This articleoutlines a Group Fusion method that takes into account the behavior ofusers over the short and long term. On fusing the data, the method is basedon giving more weight to user groups that are more unanimous in their decisions.Simulations have been performed in a dynamic environment withinterferences. Results prove that when attackers are present (both reiterativeor sporadic), the proposed Group Fusion method has superior sensingcapability than other methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes an audio watermarking scheme based on lossy compression. The main idea is taken from an image watermarking approach where the JPEG compression algorithm is used to determine where and how the mark should be placed. Similarly, in the audio scheme suggested in this paper, an MPEG 1 Layer 3 algorithm is chosen for compression to determine the position of the mark bits and, thus, the psychoacoustic masking of the MPEG 1 Layer 3compression is implicitly used. This methodology provides with a high robustness degree against compression attacks. The suggested scheme is also shown to succeed against most of the StirMark benchmark attacks for audio.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limitedresources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La radio cognitiva es una tecnología inalámbrica propuesta para usar eficientemente los recursos del espectro radioeléctrico permitiendo así reducir la carga existente en las bandas de frecuencia de uso libre.Las redes de radio cognitiva son capaces de escanear el espectro y adaptar sus parámetros para operar en las bandas no ocupadas. Para evitar interferir con usuarios con licencia que operan en un determinado canal, la sensibilidad de las redes tiene que ser muy alta. Ello se consigue con métodos de detección cooperativos. Los métodos de detección cooperativa actuales tienen una carencia de robustez ya sea frente a ataques puntuales o continuos.En este artículo presentamos un método de fusión por grupos que tiene presente el comportamiento de los usuarios a corto y largo plazo. Al realizar la fusión de los datos, el método se basa en dar mayor peso a los grupos de usuarios con mayor unanimidad en sus decisiones.Los resultados de las simulaciones prueban que en presencia de atacantes el método de fusión por grupos propuesto consigue una detección superior a otros métodos, cumpliendo los requisitos de sensibilidad mínimos de las redes de radio cognitiva incluso con un 12 de usuarios reiteradamente maliciosos o un 10 de atacantes puntuales.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes the state of the art of secure ad hoc routing protocols and presents SEDYMO, a mechanism to secure a dynamic multihop ad hoc routing protocol. The proposed solution defeats internal and external attacks usinga trustworthiness model based on a distributed certification authority. Digital signatures and hash chains are used to ensure the correctness of the protocol. The protocol is compared with other alternatives in terms of security strength, energy efficiency and time delay. Both computational and transmission costs are considered and it is shown that the secure protocol overhead is not a critical factor compared to the high network interface cost.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Manet security has a lot of open issues. Due to its character-istics, this kind of network needs preventive and corrective protection. Inthis paper, we focus on corrective protection proposing an anomaly IDSmodel for Manet. The design and development of the IDS are consideredin our 3 main stages: normal behavior construction, anomaly detectionand model update. A parametrical mixture model is used for behav-ior modeling from reference data. The associated Bayesian classi¯cationleads to the detection algorithm. MIB variables are used to provide IDSneeded information. Experiments of DoS and scanner attacks validatingthe model are presented as well.