773 resultados para DDoS attacks
Resumo:
Bees are well known for being industrious pollinators. Some species, however, have taken to invading the nests of other colonies to steal food, nest material or the nest site itself. Despite the potential mortality costs due to fighting with an aggressive opponent, the prospects of a large bounty can be worth the risk. In this review, we aim to bring together current knowledge on intercolony fighting with a view to better understand the evolution of warfare in bees and identify avenues for future research. A review of literature reveals that at least 60 species of stingless bees are involved in heterospecific conflicts, either as attacking or victim colonies. The threat of invasion has led to the evolution of architectural, behavioural and morphological adaptations, such as narrow entrance tunnels, mud balls to block the entrance, decoy nests that direct invaders away from the brood chamber, fighting swarms, and soldiers that are skilled at immobilising attackers. Little is known about how victim colonies are selected, but a phylogenetically controlled analysis suggests that the notorious robber bee Lestrimelitta preferentially attacks colonies of species with more concentrated honey. Warfare among bees poses many interesting questions, including why species differ so greatly in their response to attacks and how these alternative strategies of obtaining food or new nest sites have evolved.
Resumo:
This paper develops a model for military conflicts where the defending forces have to determine an optimal partitioning of available resources to counter attacks from an adversary in two different fronts. The Lanchester attrition model is used to develop the dynamical equations governing the variation in force strength. Three different allocation schemes - Time-Zero-Allocation (TZA), Allocate-Assess-Reallocate (AAR), and Continuous Constant Allocation (CCA) - are considered and the optimal solutions are obtained in each case. Numerical examples are given to support the analytical results.
Kansanterveysongelman synty : Tuberkuloosi ja terveyden hallinta Suomessa ennen toista maailmansotaa
Resumo:
The study focuses on the emergence of tuberculosis as a public health problem and the development of the various methods to counteract it in Finland before the introduction of efficient methods of treatment in the 1940s and 50s. It covers a time period from year 1882 when the tuberculosis bacterium was identified to the 1930s when the early formation of tuberculosis work became established in Finland. During this time there occurred important changes in medicine, public health thinking and methods of personal health care that have been referred to as the bacteriological revolution. The study places tuberculosis prevention in this context and shows how the tuberculosis problem affected the government of health on all these three dimensions. The study is based on foucauldian analytics of government, which is supplemented with perspectives from contemporary science and technology studies. In addition, it utilises a broad array of work in medical history. The central research materials consist of medical journals, official programs and documents on tuberculosis policy, and health education texts. The general conclusions of the study are twofold. Firstly, the ensemble of tuberculosis work was formed from historically diverse and often conflicting elements. The identification of the pathogen was only the first step in the establishment of tuberculosis as a major public health problem. Important were also the attention of the science of hygiene and statistical reasoning that dominated public health thinking in the late 19th century. Furthermore, the adoption of the bacteriological tuberculosis doctrine in medicine, public health work and health education was profoundly influenced by previous understanding of the nature of the illness, of medical work, of the prevention of contagious diseases, and of personal health care. Also the two central institutions of tuberculosis work, sanatorium and dispensary, have heterogeneous origins and multifarious functions. Secondly, bacteriology represented in this study by tuberculosis remodelled medical knowledge and practices, the targets and methods of public health policy, and the doctrine of personal health care. Tuberculosis provided a strong argument for specific causes (if not cures) as well as laboratory methods in medicine. Tuberculosis prevention contributed substantially to the development whereby a comprehensive responsibility for the health of the population and public health work was added to the agenda of the state. Health advice on tuberculosis and other contagious diseases used dangerous bacteria to motivate personal health care and redefined it as protecting oneself from the attacks of external pathogens and strengthening oneself against their effects. Thus, tuberculosis work is one important root for the contemporary public concern for the health of the population and the imperative of personal health care.
Resumo:
This paper develops a model for military conflicts where the defending forces have to determine an optimal partitioning of available resources to counter attacks from an adversary in two different fronts. The Lanchester attrition model is used to develop the dynamical equations governing the variation in force strength. Three different allocation schemes - Time-Zero-Allocation (TZA), Allocate-Assess-Reallocate (AAR), and Continuous Constant Allocation (CCA) - are considered and the optimal solutions are obtained in each case. Numerical examples are given to support the analytical results.
Resumo:
Migraine is the common cause of chronic episodic headache, affecting 12%-15% of the Caucasian population (41 million Europeans and some half a million Finns), and causes considerable loss of quality of life to its sufferers, as well as being linked to increased risk for a wide range of conditions, from depression to stroke. Migraine is the 19th most severe disease in terms of disability-adjusted life years, and 9th among women. It is characterized by attacks of headache accompanied by sensitivity to external stimuli lasting 4-72 hours, and in a third of cases by neurological aura symptoms, such as loss of vision, speech or muscle function. The underlying pathophysiology, including what triggers migraine attacks and why they occur in the first place, is largely unknown. The aim of this study was to identify genetic factors associated with the hereditary susceptibility to migraine, in order to gain a better understanding of migraine mechanisms. In this thesis, we report the results of genetic linkage and association analyses on a Finnish migraine patient collection as well as migraineurs from Australia, Denmark, Germany, Iceland and the Netherlands. Altogether we studied genetic information of nearly 7,000 migraine patients and over 50,000 population-matched controls. We also developed a new migraine analysis method called the trait component analysis, which is based on individual patient responses instead of the clinical diagnosis. Using this method, we detected a number of new genetic loci for migraine, including on chromosome 17p13 (HLOD 4.65) and 10q22-q23 (female-specific HLOD 7.68) with significant evidence of linkage, along with five other loci (2p12, 8q12, 4q28-q31, 18q12-q22, and Xp22) detected with suggestive evidence of linkage. The 10q22-q23 locus was the first genetic finding in migraine to show linkage to the same locus and markers in multiple populations, with consistent detection in six different scans. Traditionally, ion channels have been thought to play a role in migraine susceptibility, but we were able to exclude any significant role for common variants in a candidate gene study of 155 ion transport genes. This was followed up by the first genome-wide association study in migraine, conducted on 2,748 migraine patients and 10,747 matched controls followed by a replication in 3,209 patients and 40,062 controls. In this study, we found interesting results with genome-wide significance, providing targets for future genetic and functional studies. Overall, we found several promising genetic loci for migraine providing a promising base for future studies in migraine.
Resumo:
Financial crises have shown that dramatic movements in one financial market can have a powerful impact on other markets. The paper proposes to use cobreaking to model comovements between financial markets during crises and to test for conta-gion. It finds evidence of cobreaking between stock returns in developed markets. Finding cobreaking has implications for the diversification of international investments. For emerging mar-ket stock returns the evidence of cobreaking is mainly due to the non-financial event of the 9/11 terrorist attacks in 2001. Fi-nancial crises originating in one emerging market do not spread to other markets, i.e., no contagion.
Resumo:
This paper develops a model for military conflicts where the defending forces have to determine an optimal partitioning of available resources to counter attacks from an adversary from n different fronts. The problem of optimally partitioning the defending forces against the attacking forces is addressed. The Lanchester square law model is used to develop the dynamical equations governing the variation in force strength. Two different allocation schemes-Time-ZeroAllocation (TZA) and Continuous Constant Allocation (CCA) are considered and the optimal solutions for both are obtained analytically. These results generalize other results available in the literature. Numerical examples are given to support the analytical results.
Resumo:
An indole oxygenase from the leaves of Jasminum grandiflorum was isolated and purified to near homogeneity. The purified enzyme system catalyses the conversion of indole to anthranilic acid. It is optimally active at pH 4.8 and at 30°C. Apart from indole, the oxygenase also attacks 5-hydroxy indole and 5-bromoindole. Both sulfhydryl reagents and sulfhydryl compounds inhibited the enzyme activity. Copper specific metal chelators such as salicylaldoxime, diethyl dithiocarbamate and neocuproine, inhibited the enzyme activity drastically. Inhibition caused by atebrine, could be reversed by FAD. Dialysis resulted in complete loss of enzyme activity. Inactive enzyme could be reactivated only by the addition of both FAD and Cu2+, suggesting that indole oxygenase is a cuproflavoprotein.
Resumo:
Various intrinsic and external factors are constantly attacking the cells causing damage to DNA and to other cellular structures. Cells in turn have evolved with different kinds of mechanisms to protect against the attacks and to repair the damage. Ultraviolet radiation (UVR) is one of the major environmental genotoxic carcinogens that causes inflammation, mutations, immunosuppression, accelerated aging of the skin and skin cancers. Epidermis is the outermost layer of the skin consisting mostly of keratinocytes, whose primary function is to protect the skin against e.g. UV radiation. LIM domain proteins are a group of proteins involved in regulation of cell growth, damage signalling, cell fate determination and signal transduction. Despite their two zinc fingers, LIM domains do not bind to DNA, but rather mediate protein-protein interactions and function as modular protein binding interfaces. We initially identified CSRP1 as UVR-regulated transcript by using expression profiling. Here we have further studied the regulation and function of CRP1, a representative of cysteine rich protein- family consisting of two LIM domains. We find that CRP1 is increased by UVR in primary human keratinocytes and in normal human skin fibroblasts. Ectopic expression of CRP1 protected the cells against UVR and provided a survival advantage, whereas silencing of CRP1 rendered the cells more photosensitive. Actinic keratosis is a premalignant lesion of skin caused by excess exposure to sunlight and sunburn, which may lead to formation of squamous cell carcinoma. The expression of CRP1 was increased in basal keratinocytes of Actinic keratosis patient specimens suggesting that CRP1 may be increased by constant exposure to UVR and may provide survival advantage for the cells also in vivo. In squamous cell carcinoma, CRP1 was only expressed in the fibroblasts surrounding the tumour. Moreover, we found that ectopic expression of CRP1 suppresses cell proliferation. Transforming growth factor beta (TGFbeta) is a multifunctional cytokine that regulates several functions in cell including growth, apoptosis and differentiation, and plays important roles in pathological disorders like cancer and fibrosis. We found that TGFbeta-signalling pathway regulates CRP1 at protein, but not at transcriptional level. The increase was mediated both through Smad and non-Smad signalling pathways involving MAPK/p38. Furthermore, we found that TGFbeta-mediated increase in CRP1 was associated with myofibroblast differentiation, and that CRP1 was significantly more expressed in idiopathic pulmonary fibrosis as compared to normal lung specimens. Since cell contractility is a distinct feature of myofibroblasts, and CRP1 is associated with actin cytoskeleton, we studied the role of CRP1 in cell contractility. CRP1 was found to localize to stress fibres that mediate contractility and to mediate myofibroblast contraction. These studies identify CRP1 as a stress responsive and cytokine regulated cytoskeletal protein that participates in pathological processes involved in fibrotic diseases and cancer.
Resumo:
The hydrolysis reactions of organometallic ruthenium(II) piano-stool complexes of the type Ru-II(eta(6)-cymene)(L)Cl](0/+) (1-5, where L = kappa(1)- or kappa(2)-1,1-bis(diphenylphosphino)methane,1,1bis-(diphenylphosphino)methane oxide, kappa(1)-mercaptobenzothiazole) have been studied using density functional theory at the B3LYP level. In addition to considering a syn attack in an associative fashion, where the nucleophile approaches from the same side as the leaving group, we have explored alternative paths such as an anti attack in an associative manner, where the nucleophile attacks from the opposite side of the leaving group. During the anti attack, an intermediate is formed and there is a coordination mode change of the arene ring from eta(6) to eta(2) along with its rotation. When the intermediate goes to the product, the arene ring slips back from eta(2) to eta(6) coordination. This coordinated movement of the arene ring makes the associative anti attack an accessible pathway for the substitution process. Our calculations predict very similar activation barriers for both syn and anti attacks. In the dissociative path, the rate-determining step is the generation of a coordinatively unsaturated 16-electron ruthenium species. This turns out to be viable once solvent effects are included. The large size of the ancillary ligands on Ru makes the dissociative process as favorable as the associative process. Activation energy calculations reveal that although the dissociative path is favorable for kappa(1) complexes, both dissociative and associative processes can have significant contribution to the hydrolysis reaction in kappa(2) complexes. Once activated by hydrolysis, these complexes react with guanine and adenine bases of DNA. The thermodynamic stabilities of complexes formed with the nucleobases are also presented.
Resumo:
Molecular constraints for the localization of active site directed ligands (competitive inhibitors and substrates) in the active site of phospholipase A2 (PLA2) are characterized. Structure activity relationships with known inhibitors suggest that the head : group interactions dominate the selectivity as well as a substantial part of the affinity. The ab initio fitting of the amide ligands in the active site was carried out to characterize the head group interactions. Based on a systematic coordinate space search, formamide is docked with known experimental constraints such as coordination of the carbonyl group to Ca2+ and hydrogen bond between amide nitrogen and ND1 of His48. An optimal position for a bound water molecule is identified and its significance for the catalytic mechanism is postulated. Unlike the traditional ''pseudo-triad'' mechanism, the ''Ca-coordinatedoxyanion'' mechanism proposed here invokes activation of the catalytic water to form the oxyanion in the coordination sphere of calcium. As it attacks the carbonyl carbon of the ester, a near-tetrahedral intermediate is formed. As the second proton of the catalytic water is abstracted by the ester oxygen, its reorientation and simultaneous cleavage form hydrogen bond with ND1 of His48. In this mechanism of esterolysis, a catalytic role for the water co-ordinated to Ca2+ is recognised.
Resumo:
Graded alternate layers of Al2O3 and 8% Y2O3-ZrO2 and their admixtures were plasma sprayed onto bond-coated mild steel. They were evaluated for thermal-shock resistance, thermal-barrier characteristics, hot corrosion resistance (molten NaCl corrodant) and depth of attack, adhesion strength and the presence of phases. Although front-back temperature drops of 423-623 K were observed, some of the coatings showed good adherence even after 100 thermal shack cycles. In the sequence of the graded layers, the oxide which is directly in contact with the bond coat appears to influence the properties especially in coatings of 150 and 300 mu m thickness. Molten NaCl readily attacks the films at high hot-face temperatures (1273 K for 1 h) and the adhesive strength falls significantly by 50-60%. Diffusion of alkaline elements is also found to depend on the chemical composition of the outer coating directly facing the molten corrodant. (C) 1997 Elsevier Science Limited.
Resumo:
We present a sound and complete decision procedure for the bounded process cryptographic protocol insecurity problem, based on the notion of normal proofs [2] and classical unification. We also show a result about the existence of attacks with “high” normal cuts. Our proof of correctness provides an alternate proof and new insights into the fundamental result of Rusinowitch and Turuani [9] for the same setting.
Resumo:
We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.
Resumo:
We examine a natural, but non-tight, reductionist security proof for deterministic message authentication code (MAC) schemes in the multi-user setting. If security parameters for the MAC scheme are selected without accounting for the non-tightness in the reduction, then the MAC scheme is shown to provide a level of security that is less than desirable in the multi-user setting. We find similar deficiencies in the security assurances provided by non-tight proofs when we analyze some protocols in the literature including ones for network authentication and aggregate MACs. Our observations call into question the practical value of non-tight reductionist security proofs. We also exhibit attacks on authenticated encryption schemes, disk encryption schemes, and stream ciphers in the multi-user setting.