830 resultados para IPv6, Denial of Service, Coloured Petri Nets, Risk Analysis, IPv6threats


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Cultural Property Risk Analysis Model was applied in 2006 to a Portuguese archive located in Lisbon. Its results highlighted the need for the institution to take care of risks related to fire, physical forces and relative humidity problems. Five years after this first analysis the results are revisited and a few changes are introduced due to recent events: fire and high humidity remain an important hazard but are now accompanied by a pressing contaminants problem. Improvements in storage systems were responsible for a large decrease in terms of calculated risk magnitude and proved to be very cost-effective.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

“Drilling of polymeric matrix composites structures”

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A Internet, conforme a conhecemos, foi projetada com base na pilha de protocolos TCP/IP, que foi desenvolvida nos anos 60 e 70 utilizando um paradigma centrado nos endereços individuais de cada máquina (denominado host-centric). Este paradigma foi extremamente bem-sucedido em interligar máquinas através de encaminhamento baseado no endereço IP. Estudos recentes demonstram que, parte significativa do tráfego atual da Internet centra-se na transferência de conteúdos, em vez das tradicionais aplicações de rede, conforme foi originalmente concebido. Surgiram então novos modelos de comunicação, entre eles, protocolos de rede ponto-a-ponto, onde cada máquina da rede pode efetuar distribuição de conteúdo (denominadas de redes peer-to-peer), para melhorar a distribuição e a troca de conteúdos na Internet. Por conseguinte, nos últimos anos o paradigma host-centric começou a ser posto em causa e apareceu uma nova abordagem de Redes Centradas na Informação (ICN - information-centric networking). Tendo em conta que a Internet, hoje em dia, basicamente é uma rede de transferência de conteúdos e informações, porque não centrar a sua evolução neste sentido, ao invés de comunicações host-to-host? O paradigma de Rede Centrada no Conteúdo (CCN - Content Centric Networking) simplifica a solução de determinados problemas de segurança relacionados com a arquitetura TCP/IP e é uma das principais propostas da nova abordagem de Redes Centradas na Informação. Um dos principais problemas do modelo TCP/IP é a proteção do conteúdo. Atualmente, para garantirmos a autenticidade e a integridade dos dados partilhados na rede, é necessário garantir a segurança do repositório e do caminho que os dados devem percorrer até ao seu destino final. No entanto, a contínua ineficácia perante os ataques de negação de serviço praticados na Internet, sugere a necessidade de que seja a própria infraestrutura da rede a fornecer mecanismos para os mitigar. Um dos principais pilares do paradigma de comunicação da CCN é focalizar-se no próprio conteúdo e não na sua localização física. Desde o seu aparecimento em 2009 e como consequência da evolução e adaptação a sua designação mudou atualmente para Redes de Conteúdos com Nome (NNC – Named Network Content). Nesta dissertação, efetuaremos um estudo de uma visão geral da arquitetura CCN, apresentando as suas principais características, quais os componentes que a compõem e como os seus mecanismos mitigam os tradicionais problemas de comunicação e de segurança. Serão efetuadas experiências com o CCNx, que é um protótipo composto por um conjunto de funcionalidades e ferramentas, que possibilitam a implementação deste paradigma. O objetivo é analisar criticamente algumas das propostas existentes, determinar oportunidades, desafios e perspectivas para investigação futura.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper was presented at the International Sport Business Symposium, held by the Capital University of Economics and Business in Beijing, in 2008. The speakers, Ferran Brunet, as a professor at the Autonomous University of Barcelona and Zuo Xinwen, as a member of Beijing Development and Reform Commission, both set out to analyze changes in the economic and social development of the city which were undertaken with the aim to celebrate the 2008 Olympic Games. They discuss aspects as a transformation in the mode of economic growth, resources of the Organizing Committee, investments related to the Games, transport and communications, industries, the balance of urban and rural development, urban construction and management service and operations into a well-off society.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cells from two melanoma cell lines, Me43 and GLL-19, were cloned in methylcellulose cultures and 20 randomly selected colonies from each line were picked up by micromanipulation, expanded in liquid cultures, and considered as clones of the original cell lines. The antigenic cell surface phenotype of these clones defined by panel of 12 monoclonal antibodies (MAb) was analyzed by flow microfluorometry (FMF) using a fluorescence-activated cell sorter (FACS II) and compared with the known stable phenotype of the parent cell line. The antibody panel consisted of eight MAb against melanoma-associated antigens, two MAb against monomorphic determinants of HLA-DR (la) and HLA-ABC, respectively, one MAb against the common acute lymphoblastic leukemia antigen (CALLA) and one MAb against carcinoembryonic antigen used as control. A remarkable heterogeneity in terms of qualitative and quantitative expression of the cell surface antigens studied was observed among and within the different clones. The single-cell origin of the clones was assessed by comparing the clonogenic cell frequency, determined by limiting dilutions in microculture plates, with the cloning efficiency observed in Petri dishes. Both techniques using methylcellulose medium gave the same percentages of growing colonies. Cells from four Me43 clones were recloned in methylcellulose and the phenotype of five randomly selected subclones from each clone was analysed using the same panel of monoclonal antibodies. Each subclone also displayed heterogeneity with individual phenotypes different from that of the original clone and from the parental Me43 cell line. The antigen expression by individual cells in situ within clones was analyzed on frozen sections from colonies using the same panel of MAb and a biotin-avidin immunoperoxidase method. The results confirmed the marked heterogeneity of antigen expression within and among colonies, as indicated by the FMF analysis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The European Prospective Investigation into Cancer and nutrition (EPIC) is a long-term, multi-centric prospective study in Europe investigating the relationships between cancer and nutrition. This study has served as a basis for a number of Genome-Wide Association Studies (GWAS) and other types of genetic analyses. Over a period of 5 years, 52,256 EPIC DNA samples have been extracted using an automated DNA extraction platform. Here we have evaluated the pre-analytical factors affecting DNA yield, including anthropometric, epidemiological and technical factors such as center of subject recruitment, age, gender, body-mass index, disease case or control status, tobacco consumption, number of aliquots of buffy coat used for DNA extraction, extraction machine or procedure, DNA quantification method, degree of haemolysis and variations in the timing of sample processing. We show that the largest significant variations in DNA yield were observed with degree of haemolysis and with center of subject recruitment. Age, gender, body-mass index, cancer case or control status and tobacco consumption also significantly impacted DNA yield. Feedback from laboratories which have analyzed DNA with different SNP genotyping technologies demonstrate that the vast majority of samples (approximately 88%) performed adequately in different types of assays. To our knowledge this study is the largest to date to evaluate the sources of pre-analytical variations in DNA extracted from peripheral leucocytes. The results provide a strong evidence-based rationale for standardized recommendations on blood collection and processing protocols for large-scale genetic studies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Commentaire de: Gaziano TA, Young CR, Fitzmaurice G, Atwood S, Gaziano JM. Laboratory-based versus non-laboratory-based method for assessment of cardiovascular disease risk: the NHANES I Follow-up Study cohort. Lancet. 2008;371(9616):923-31. PMID: 18342687

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a prototype of an interactive web-GIS tool for risk analysis of natural hazards, in particular for floods and landslides, based on open-source geospatial software and technologies. The aim of the presented tool is to assist the experts (risk managers) in analysing the impacts and consequences of a certain hazard event in a considered region, providing an essential input to the decision-making process in the selection of risk management strategies by responsible authorities and decision makers. This tool is based on the Boundless (OpenGeo Suite) framework and its client-side environment for prototype development, and it is one of the main modules of a web-based collaborative decision support platform in risk management. Within this platform, the users can import necessary maps and information to analyse areas at risk. Based on provided information and parameters, loss scenarios (amount of damages and number of fatalities) of a hazard event are generated on the fly and visualized interactively within the web-GIS interface of the platform. The annualized risk is calculated based on the combination of resultant loss scenarios with different return periods of the hazard event. The application of this developed prototype is demonstrated using a regional data set from one of the case study sites, Fella River of northeastern Italy, of the Marie Curie ITN CHANGES project.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Techniques of evaluation of risks coming from inherent uncertainties to the agricultural activity should accompany planning studies. The risk analysis should be carried out by risk simulation using techniques as the Monte Carlo method. This study was carried out to develop a computer program so-called P-RISCO for the application of risky simulations on linear programming models, to apply to a case study, as well to test the results comparatively to the @RISK program. In the risk analysis it was observed that the average of the output variable total net present value, U, was considerably lower than the maximum U value obtained from the linear programming model. It was also verified that the enterprise will be front to expressive risk of shortage of water in the month of April, what doesn't happen for the cropping pattern obtained by the minimization of the irrigation requirement in the months of April in the four years. The scenario analysis indicated that the sale price of the passion fruit crop exercises expressive influence on the financial performance of the enterprise. In the comparative analysis it was verified the equivalence of P-RISCO and @RISK programs in the execution of the risk simulation for the considered scenario.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The presence of iron uptake (irp-2, fyuA, sitA, fepC, iucA), adhesion (iha, lpfA O157/O141, lpfA O157/O154, efa, toxB) and invasion (inv, ial-related DNA sequences and assignment to the four main Escherichia coli phylogenetic groups (A, B1, B2 e D) were determined in 30 commensal E. coli strains isolated from healthy chickens and in 49 APEC strains isolated from chickens presenting clinical signs of septicemia (n=24) swollen head syndrome (n=14) and omphalitis (n=11) by PCR. None of the strains presented DNA sequences related to the inv, ial, efa, and toxB genes. DNA sequences related to lpfA O157/O154, iucA, fepC, and irp-2 genes were significantly found among pathogenic strains, where iucA gene was associated with septicemia and swollen head syndrome and fepC and irp-2 genes were associated with swollen head syndrome strains. Phylogenetic typing showed that commensal and omphalitis strains belonged mainly to phylogenetic Group A and swollen head syndrome to phylogenetic Group D. Septicemic strains were assigned in phylogenetic Groups A and D. These data could suggest that clonal lineage of septicemic APEC strains have a multiple ancestor origin; one from a pathogenic bacteria ancestor and other from a non-pathogenic ancestor that evolved by the acquisition of virulence related sequences through horizontal gene transfer. Swollen head syndrome may constitute a pathogenic clonal group. By the other side, omphalitis strains probably constitute a non-pathogenic clonal group, and could cause omphalitis as an opportunistic infection. The sharing of virulence related sequences by human pathogenic E. coli and APEC strains could indicate that APEC strains could be a source of virulence genes to human strains and could represent a zoonotic risk.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Kybersodankäynnin merkitys on kasvanut viime vuosina merkittävästi, ja yhtenä kyberso-dankäynnin välineenä voidaan käyttää palvelunestohyökkäyksiä. Tässä tutkimuksessa selvi-tän millä menetelmillä palvelunestohyökkäyksiltä voidaan suojautua ja miten niitä voidaan torjua. Tutkimuksen pääkysymyksenä on: Millä menetelmillä voidaan suojautua palvelunes-tohyökkäyksien vaikutukselta? ja alakysymyksiä ovat: Mikä on palvelunestohyökkäys ja mi-ten se toimii? Mitä erilaisia palvelunestohyökkäyksiä on olemassa? Miten eri palvelunesto-hyökkäykset vaikuttavat? Miten palvelunestohyökkäys havaitaan? Tutkielman lähteinä on käytetty pääasiassa aihealuetta käsitteleviä ja sitä sivuuttavia tutkimuksia. Palvelunestohyökkäyksellä (Denial of Service, DoS) tarkoitetaan Internet-palveluun tai muu-hun tietotekniseen palveluun oikeutettujen käyttäjien palvelun käyttämisen estämistä tai huomattavaa hidastamista kuormittamalla joko tietoliikennettä tai itse kohdejärjestelmää. Palvelunestohyökkäykset ovat keskeytyshyökkäyksiä, joilla toisin kuin muilla kyberhyökkä-yksillä ei yleensä pyritä varastamaan tietoa tai asentamaan haittaohjelmia, vaan pelkästään es-tämään palvelun tai järjestelmän käyttö siihen oikeutetuilta käyttäjiltä. Tutkielman tuloksista selviää, että palvelunestohyökkäyksiä vastaan taisteleminen voidaan jakaa kolmeen osaan: hyökkäysten estämiseen, niiden havaitsemiseen sekä hyökkäyksen tor-jumiseen. Tärkeintä palvelunestohyökkäysten välttämisessä on niiden ennaltaehkäisy. Hyväk-si havaittu yleinen tapa ennaltaehkäistä hyökkäyksiä ja parantaa tietoturvallisuutta on pitää tietoverkko yksinkertaisena, hyvin organisoituna ja hyvin ylläpidettynä sekä päivitettynä. Jo-kaiseen eri palvelunestohyökkäystyyppiin löytyy kyllä suojautumis- ja torjuntakeinot, mutta niiden tehokkuutta hyökkäyksen pysähtymiselle ei voida taata. Vaikeimpia palvelunesto-hyökkäyksiä suojautumisen ja torjumisen suhteen ovat hajautetut palvelunestohyökkäykset, koska niitä ei voida suodattaa IP-osoitteen perusteella.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The present study examined the bullying experiences of a group of students, age 10-14 years, identified as having behaviour problems. A total often students participated in a series of mixed methodology activities, including self-report questionnaires, story telling exercises, and interview style joumaling. The main research questions were related to the prevalence of bully/victims and the type of bullying experiences in this population. Questionnaires gathered information about their involvement in bullying, as well as about psychological risk factors including normative beliefs about antisocial acts, impulsivity, problem solving, and coping strategies. Journal questions expanded on these themes and allowed students to explain their personal experiences as bullies and victims as well as provide suggestions for intervention. The overall results indicated that all of the ten students in this sample have participated in bullying as both a bully and a victim. This high prevalence of bully/victim involvement in students from behavioural classrooms is in sharp contrast with the general population where the prevalence is about 33%. In addition, a common thread was found that indicated that these students who participated in this study demonstrate characteristics of emotionally dysregulated reactive bullies. Theoretical implication and educational practices are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Les alertes que nos logiciels antivirus nous envoient ou encore les différents reportages diffusés dans les médias nous font prendre conscience de l'existence des menaces dans le cyberespace. Que ce soit les pourriels, les attaques par déni de service ou les virus, le cyberespace regorge de menaces qui persistent malgré les efforts qui sont déployés dans leur lutte. Est-ce que cela a à voir avec l'efficacité des politiques en place actuellement pour lutter contre ce phénomène? Pour y répondre, l'objectif général du présent mémoire est de vérifier quelles sont les politiques de prévention (lois anti-pourriel, partenariats publics-privés et démantèlements de botnets) qui influencent le plus fortement le taux de menaces informatiques détectées, tout en s'attardant également à l'effet de différents facteurs socio-économiques sur cette variable. Les données collectées par le logiciel antivirus de la compagnie ESET ont été utilisées. Les résultats suggèrent que les partenariats publics-privés offrant une assistance personnalisée aux internautes s'avèrent être la politique de prévention la plus efficace. Les démantèlements de botnets peuvent également s'avérer efficaces, mais seulement lorsque plusieurs acteurs/serveurs importants du réseau sont mis hors d'état de nuire. Le démantèlement du botnet Mariposa en est un bon exemple. Les résultats de ce mémoire suggèrent que la formule partenariats-démantèlements serait le choix le plus judicieux pour lutter contre les cybermenaces. Ces politiques de prévention possèdent toutes deux des méthodes efficaces pour lutter contre les menaces informatiques et c'est pourquoi elles devraient être mises en commun pour assurer une meilleure défense contre ce phénomène.