705 resultados para Speculative attacks
Resumo:
This study compares the prevalence of complaints of insomnia, excessive diurnal sleepiness, parasomnias, and sleep habits of the adult population in the city of São Paulo, Brazil, estimated in surveys carried out in 1987 and 1995. Representative samples of 1000 adult residents per survey were interviewed using a validated structured sleep questionnaire, the "UNIFESP Sleep Questionnaire". Difficulty maintaining sleep, difficulty initiating sleep and early morning awakening, occurring at least three times a week, were reported in 1987 and 1995, by 15.8/27.6, 13.9/19.1, and 10.6/14.2% of the interviewees, respectively, significantly increasing throughout time. These sleep problems were more often found among women. Frequencies of excessive diurnal sleepiness and sleep attacks were unchanged comparing 1987 with 1995 (4.5 vs 3.8 and 3.1 vs 3.0%, respectively). Parasomnia complaints remained unchanged, with the exception of leg cramps, which doubled in prevalence from 1987 to 1995 (2.6 to 5.8%). Snoring was the most common parasomnia (21.5% in 1995), reported more often by men than by women, and somnambulism was the least common (approximately 1%). Besides sleeping slightly less, interviewees went to bed and woke up later in 1995. Approximately 12% of the subjects in both surveys had consulted a physician due to sleep problems and 3.0% reported habitual use of sleep-promoting substances in 1995. Overall, there was a significant increase in insomnia complaints from 1987 to 1995 in the general population of the city of São Paulo. This major change over a little under a decade should be considered as an important public health issue.
Resumo:
The medial hypothalamus is part of a neurobiological substrate controlling defensive behavior. It has been shown that a hypothalamic nucleus, the dorsomedial hypothalamus (DMH), is involved in the regulation of escape, a defensive behavior related to panic attacks. The role played by the DMH in the organization of conditioned fear responses, however, is less clear. In the present study, we investigated the effects of reversible inactivation of the DMH with the GABA A agonist muscimol on inhibitory avoidance acquisition and escape expression by male Wistar rats (approximately 280 g in weight) tested in the elevated T-maze (ETM). In the ETM, inhibitory avoidance, a conditioned defensive response, has been associated with generalized anxiety disorder. Results showed that intra-DMH administration of the GABA A receptor agonist muscimol inhibited escape performance, suggesting an antipanic-like effect (P < 0.05), without changing inhibitory avoidance acquisition. Although a higher dose of muscimol (1.0 nmol/0.2 µL; N = 7) also altered locomotor activity in an open field when compared to control animals (0.2 µL saline; N = 13) (P < 0.05), the lower dose (0.5 nmol/0.2 µL; N = 12) of muscimol did not cause any motor impairment. These data corroborate previous evidence suggesting that the DMH is specifically involved in the modulation of escape. Dysfunction of this regulatory mechanism may be relevant in the genesis/maintenance of panic disorder.
Resumo:
The objective of the present randomized, open-label, naturalistic 8-week study was to compare the efficacy and safety of treatment with clonazepam (N = 63) and paroxetine (N = 57) in patients with panic disorder with or without agoraphobia. Efficacy assessment included number of panic attacks and clinician ratings of the global severity of panic disorders with the clinical global impression (CGI) improvement (CGI-I) and CGI severity (CGI-S) scales. Most patients were females (69.8 and 68.4% in the clonazepam and paroxetine groups, respectively) and age (mean ± SD) was 35.9 ± 9.6 years for the clonazepam group and 33.7 ± 8.8 years for the paroxetine group. Treatment with clonazepam versus paroxetine resulted in fewer weekly panic attacks at week 4 (0.1 vs 0.5, respectively; P < 0.01), and greater clinical improvements at week 8 (CGI-I: 1.6 vs 2.9; P = 0.04). Anxiety severity was significantly reduced with clonazepam versus paroxetine at weeks 1 and 2, with no difference in panic disorder severity. Patients treated with clonazepam had fewer adverse events than patients treated with paroxetine (73 vs 95%; P = 0.001). The most common adverse events were drowsiness/fatigue (57%), memory/concentration difficulties (24%), and sexual dysfunction (11%) in the clonazepam group and drowsiness/fatigue (81%), sexual dysfunction (70%), and nausea/vomiting (61%) in the paroxetine group. This naturalistic study confirms the efficacy and tolerability of clonazepam and paroxetine in the acute treatment of patients with panic disorder.
Resumo:
Panic disorder patients are vulnerable to recurrent panic attacks. Two neurochemical hypotheses have been proposed to explain this susceptibility. The first assumes that panic patients have deficient serotonergic inhibition of neurons localized in the dorsal periaqueductal gray matter of the midbrain that organize defensive reactions to cope with proximal threats and of sympathomotor control areas of the rostral ventrolateral medulla that generate most of the neurovegetative symptoms of the panic attack. The second suggests that endogenous opioids buffer normal subjects from the behavioral and physiological manifestations of the panic attack, and their deficit brings about heightened suffocation sensitivity and separation anxiety in panic patients, making them more vulnerable to panic attacks. Experimental results obtained in rats performing one-way escape in the elevated T-maze, an animal model of panic, indicate that the inhibitory action of serotonin on defense is connected with activation of endogenous opioids in the periaqueductal gray. This allows reconciliation of the serotonergic and opioidergic hypotheses of panic pathophysiology, the periaqueductal gray being the fulcrum of serotonin-opioid interaction.
Resumo:
The escape response to electrical or chemical stimulation of the dorsal periaqueductal gray matter (DPAG) has been associated with panic attacks. In order to explore the validity of the DPAG stimulation model for the study of panic disorder, we determined if the aversive consequences of the electrical or chemical stimulation of this midbrain area can be detected subsequently in the elevated T-maze. This animal model, derived from the elevated plus-maze, permits the measurement in the same rat of a generalized anxiety- and a panic-related defensive response, i.e., inhibitory avoidance and escape, respectively. Facilitation of inhibitory avoidance, suggesting an anxiogenic effect, was detected in male Wistar rats (200-220 g) tested in the elevated T-maze 30 min after DPAG electrical stimulation (current generated by a sine-wave stimulator, frequency at 60 Hz) or after local microinjection of the GABA A receptor antagonist bicuculline (5 pmol). Previous electrical (5, 15, 30 min, or 24 h before testing) or chemical stimulation of this midbrain area did not affect escape performance in the elevated T-maze or locomotion in an open-field. No change in the two behavioral tasks measured by the elevated T-maze was observed after repetitive (3 trials) electrical stimulation of the DPAG. The results indicate that activation of the DPAG caused a short-lived, but selective, increase in defensive behaviors associated with generalized anxiety.
Resumo:
Observational studies suggest there are clinical benefits to moderate red wine (RW) consumption. However, the effects on coronary vasculature and overall lifestyle are unclear. We investigated whether a lifestyle of regular long-term RW consumption is associated with changes in coronary plaque burden, calcium score, carotid intima/media thickness, endothelial function, and metabolic variables, compared with alcohol abstinence. Healthy volunteers were evaluated by coronary computed tomography angiography (CTA) as well as carotid and brachial artery ultrasound. Nutritional status, psychological status, and metabolic variables were assessed. The study included 101 drinkers [aged 58.9±7.3 years (means±SD)], from wine brotherhoods, and 104 abstainers, from Anglican, Evangelical and Catholic churches both in the city of São Paulo, Brazil. No significant differences in demographics were noted. Lesion prevalence per patient assessed by coronary CTA and classified as absent (0), 1-25, 26-49, and ≥50% stenosis was similar between groups. When analyzed by individual arteries, i.e., left anterior descending, circumflex, and right coronary, prevalence was also not different. On the other hand, calcium scores were higher among drinkers than abstainers (144.4±362.2 vs 122.0±370.3; P<0.01). However, drinkers reported less history of diabetes and exercised more. RW drinkers consumed 2127.9±387.7 kcal/day while abstainers consumed 1836.0±305.0 (P<0.0001). HDL cholesterol was significantly higher among drinkers compared to abstainers (46.9±10.9 vs 39.5±9.0 mg/dL; P<0.001), while fasting plasma glucose was lower (97.6±18.2 vs 118.4±29.6 mg/dL; P<0.02). Liver enzymes were normal in both groups. In conclusion, long-term wine drinkers displayed a similar plaque burden but greater calcium score than abstainers, despite a more atherogenic diet, and the mechanisms for the increased calcium scores in the former remain speculative.
Resumo:
Intracutaneous sterile water injection (ISWI) is used for relief of low back pain during labor, acute attacks of urolithiasis, chronic neck and shoulder pain following whiplash injuries, and chronic myofascial pain syndrome. We conducted a randomized, double-blinded, placebo-controlled trial to evaluate the effect of ISWI for relief of acute low back pain (aLBP). A total of 68 patients (41 females and 27 males) between 18 and 55 years old experiencing aLBP with moderate to severe pain (scores ≥5 on an 11-point visual analogue scale [VAS]) were recruited and randomly assigned to receive either ISWIs (n=34) or intracutaneous isotonic saline injections (placebo treatment; n=34). The primary outcome was improvement in pain intensity using the VAS at 10, 45, and 90 min and 1 day after treatment. The secondary outcome was functional improvement, which was assessed using the Patient-Specific Functional Scale (PSFS) 1 day after treatment. The mean VAS score was significantly lower in the ISWI group than in the control group at 10, 45, and 90 min, and 1 day after injection (P<0.05, t-test). The mean increment in PSFS score of the ISWI group was 2.9±2.2 1 day after treatment, while that in the control group was 0.9±2.2. Our study showed that ISWI was effective for relieving pain and improving function in aLBP patients at short-term follow-up. ISWI might be an alternative treatment for aLBP patients, especially in areas where medications are not available, as well as in specific patients (e.g., those who are pregnant or have asthma), who are unable to receive medications or other forms of analgesia because of side effects.
Resumo:
Abstract The storage susceptibility of Bambara groundnut (B. G.) (Voandzeia Subterranean (L.) Thouars) to Callosobruchus maculatus and chemical and functional properties of 11 varieties form Far-North of Cameroon were investigate using standard analytical methods. Storage susceptibility shown that, after five months within treatment, C. maculatus destroy 10 to 50% of grains. The chemical characteristics of none attack grains of 11 varieties were range to 18.64 at 21.08%, 6.85 at 7.44%, 49.75 at 52.68% and to 6.05 at 7.55% respectively for protein, fat, starch and free carbohydrate. These chemical characteristics significantly (p < 0.05) decreases form attacks varieties. For the functional parameters, the none attacks grains was range of 130 at 135%, 19.15 at 20.91%, 18.20 at 21.13%, 2.76 at 3.21% and of 8.54 at 10.14% respectively for water capacity absorption, solubility index, gel length, ash and humidity. The results of this study indicated that storage susceptibility, chemical and functional properties of B. G. be dependant to the varieties.
Resumo:
Leveraging cloud services, companies and organizations can significantly improve their efficiency, as well as building novel business opportunities. Cloud computing offers various advantages to companies while having some risks for them too. Advantages offered by service providers are mostly about efficiency and reliability while risks of cloud computing are mostly about security problems. Problems with security of the cloud still demand significant attention in order to tackle the potential problems. Security problems in the cloud as security problems in any area of computing, can not be fully tackled. However creating novel and new solutions can be used by service providers to mitigate the potential threats to a large extent. Looking at the security problem from a very high perspective, there are two focus directions. Security problems that threaten service user’s security and privacy are at one side. On the other hand, security problems that threaten service provider’s security and privacy are on the other side. Both kinds of threats should mostly be detected and mitigated by service providers. Looking a bit closer to the problem, mitigating security problems that target providers can protect both service provider and the user. However, the focus of research community mostly is to provide solutions to protect cloud users. A significant research effort has been put in protecting cloud tenants against external attacks. However, attacks that are originated from elastic, on-demand and legitimate cloud resources should still be considered seriously. The cloud-based botnet or botcloud is one of the prevalent cases of cloud resource misuses. Unfortunately, some of the cloud’s essential characteristics enable criminals to form reliable and low cost botclouds in a short time. In this paper, we present a system that helps to detect distributed infected Virtual Machines (VMs) acting as elements of botclouds. Based on a set of botnet related system level symptoms, our system groups VMs. Grouping VMs helps to separate infected VMs from others and narrows down the target group under inspection. Our system takes advantages of Virtual Machine Introspection (VMI) and data mining techniques.
Resumo:
IoT consists of essentially thousands of tiny sensor nodes interconnected to the internet, each one of which executes the programmed functions under memory and power limita- tions. The sensor nodes are distributed mainly for gathering data in various situations. IoT envisions the future technologies such as e-health, smart city, auto-mobiles automa- tion, construction sites automation, and smart home. Secure communication of data under memory and energy constraints is major challenge in IoT. Authentication is the first and important phase of secure communication. This study presents a protocol to authenticate resource constraint devices in physical proximity by solely using the shared wireless communication interfaces. This model of authentication only relies on the abundance of ambient radio signals to authenticate in less than a second. To evaluate the designed protocol, SkyMotes are emulated in a network environment simulated by Contiki/COOJA. Results presented during this study proves that this approach is immune against passive and active attacks. An adversary located as near as two meters can be identified in less than a second with minimal expense of energy. Since, only radio device is used as required hardware for the authentication, this technique is scalable and interoperable to heterogeneous nature of IoT.
Resumo:
This short chapter aims to make an adaptation to a small and financially integrated economy of the monetary / financial model presented by J. M. Keynes in his General Theory of Employment, interest and money. So, this has as a goal, particularly, to adapt the chapters 15 and 17 of the General Theory basically concerned to the speculative motivations to define the composition of the assets portfolio.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
Karl Popper versus Theodor Adorno: Lessons from a historical confrontation. In 1961, during the Congress of the German Society of Sociology, two great theoretical references of the XX century faced in a historical debate about the logic of the social sciences. In addition to methodological issues strict sense, the confrontation became known as a debate between positivism and dialectic. The article first deals with the theoretical trajectories of Popper and Adorno and the relation of their theories with their political and ideological certainties. On one hand, the trajectory of the Popperian epistemology is examined, its contributions and vigorous attacks on Marx in what he called 'poverty of historicism" and false predictive Marxist world, and, on the other hand, the role of Adorno in the Frankfurt School, his criticism of totalitarianism and the defense of a critical emancipatory reason. The article also deals with the confrontation itself, the exposure of Popper's twenty-seven theses that culminate with the situation logic and the method of the economy as exemplary for the social sciences and Adorno's critical perspective of sociology and society as non-separable objects. In conclusion we show how the articulation of theory with the weltanschauung of each author helps to clarify the terms of the debate and how the confrontation contributed unequivocally to the dynamics of scientific progress and for the critical history of the ideas.
Resumo:
Because of its high interest rates, Brazil attracts more and more speculative capital flows, called "hot money", under the form of foreign loans, direct or portfolio investments. Actually, the country is directly involved in a carry-trade strategy that tends to appreciate the real, what penalizes the Brazilian exportations of manufactured products. Moreover, capital inflows are extremely volatile, and their departure, causing a fall in loans granted to the Brazilian private banks, could provoke a dangerous burst of the speculative bubble they have contributed to form in the Brazilian real estate sector.
Resumo:
Internetin yhteisöpalveluiden käyttäjien avoimuus ja sosiaalisuus altistavat heidät monenlaisille riskeille. “Social engineering” eli käyttäjien manipulointi on uhka, joka liittyy informaation hankkimiseen perinteisen kanssakäymisen kautta, mutta yhä enenevissä määrin myös internetissä. Kun kanssakäyminen tapahtuu internetin välityksellä, käyttäjien manipuloijat hyödyntävät yhteisöpalveluita yhteydenpitoon uhrien kanssa sekä paljon käyttäjäinformaatiota sisältävänä alustana. Tämän tutkielman tarkoitus on löytää internetin yhteisöpalveluiden ja käyttäjien manipuloinnin välinen yhteys. Tämä päämäärä saavutettiin etsimällä vastauksia kysymyksiin kuten: Mitkä ovat tyypilliset hyökkäystyypit? Miksi informaatiolla on niin suuri rooli? Mitä seurauksia ilmiöllä on ja miten hyökkäyksiltä on mahdollista suojautua? Vastaukset kysymyksiin löydettiin toteuttamalla systemaattinen kirjallisuuskatsaus. Katsaus muodostui yhdistämällä tärkeimmät löydökset 60 tarkoin valitusta ilmiötä käsittelevästä artikkelista. Käyttäjien manipuloinnin huomattiin olevan hyvin laaja ja monimutkainen ilmiö internetin yhteisöpalveluissa. Huomattiin, että manipulointia ilmenee sivustoilla useissa erilaisissa muodoissa, joita ovat muun muassa tietojen kalastelu, profiilien yhdistäminen, sosiaaliset sovellukset, roskaposti, haitalliset linkit, identiteettivarkaudet, tietovuodot ja erilaiset huijaukset, jotka hyödyntävät sekä ihmisluonnon että sivustojen perusominaisuuksia. Haavoittuvuus ja luottamus havaittiin myös tärkeiksi aspekteiksi, sillä ne yhdistävät informaation merkityksen ja ihmisluonnon, jotka molemmat ovat avaintekijöitä sekä manipuloinnissa että yhteisöpalvelusivustoilla. Vaikka ilmiön seurausten huomattiin olevan negatiivisia niin käyttäjien olemukselle internetissä kuin todellisessakin elämässä, havaittiin myös, että ilmiön ymmärtäminen ja tunnistaminen helpottaa siltä suojautumista