730 resultados para DDoS attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The epilepsy is one of the neurological disorders more common in the pediatric period, and which interferes significantly in the psycho and social life of children and teenagers. The objective of this study was analyzing the practice of sedentary practices, physicals, traditional infant fun and games of children and teenagers with and without epilepsy. The study was prospective, transversal descriptive, done with 60 children and teenagers with epilepsy (Epileptic Group - EG) patients from Pediatric Neurology Clinic of the Centre Integrated Health Lineu Araújo and 60 children and teenagers without epilepsy (Control Group - CG) students from municipal public school, both of the two groups paired with the same age (age group 7 to 14 years) of both the genders (female = 25/41,6% and male = 35/58,3%) of the Teresina city Piauí. It was done two pattern questionnaires, one applied to children and teenagers of the EG and CG to identify the sedentary activities, physical and traditional infant games and other to the parents/responsible of the EG about the clinical and demographic information. The results permitted the elaboration of two manuscripts: a) the first one titled The Practice of Sedentary and Physical Activities of Children and Teenagers with Epilepsy which showed significant difference in the sedentary activities of playing with car toy (p=0,021) to the EG and reading to the CG (p=0,001); in the physical activities the school physical education (p=0,001) and riding a bike (p=0,014) to the CG; b) the second one The Practice of Infant Games and Fun the children and teenagers with and without Epilepsy in this one the playing with marble presented significant difference (p=0,016) to the CG, despite the girls of the two groups don t do this activity. Observing the distribution of frequencies, it was verified that in the play catch-up and hide-and-seek and burn the EG plays more than the CG both in female and male gender. The girls of the EG play less skip, 60 while the boys of the two groups don t play. Elastic jump the girls of the two groups play in a same frequency and the boys don t participate of this fun. The seizures were found to occur during: soccer (23,3%); hide-and-seek (6,6%) and running (3,3%). In the sedentary activities, seizures were reported to occur: resting and watching TV (18,3%), sleeping (36,0%); sitting (13,3%) and lying down (11,7%). Our results showed that the epileptic group and the controls group engage in the same activities, although the epileptic group participates less than the controls. Although the EG had presented a bigger percentage of generalized attacks, they don t occur during the practice of formal physical activities. The research was developed by a multidisciplinary team, and this contributed a lot to the realization of this study

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work aims to show that the protection of the employment relation is one of the determining factors to respect the principle of the human dignity. The goal is initially to show the devaluation of work from antiquity to the early twentieth century, when the constitutions began to standardize protective devices. This way, the consecration of the social labor rights in the Constitution of 1988 represents the culmination of the historical achievements. This work demonstrates that such rights can not be reduced or suppressed by political conveniences, once these rights are included in the list of immutable clauses. It is displayed that to achieve the fundamental right to work is not well advised to encourage the creation of jobs that maculates the worker s dignity. The outsourced work is, therefore, a classic example of the advancement of precarious forms of contemporary labor. It is inferred that the presence of various forms of harassment results in a degradation of working environment, bringing about dire consequences on professional and personal life of the worker. Thus, decent work must be the appropriate benchmark for the creation of new jobs. It is also shown that the flexibilization of the propaganda rights by certain pressure groups has as main goal to reduce or eliminate rights, based on fallacious data depicting an increase of competitiveness and jobs. In addition, the flexibility implies a growth of the precarization of the work - a reality felt by many workers subjected to such a situation due to the unemployment phenomenon whose origin is not in the protectionism of the norms. It is necessary to expand and structure the constitutionally legitimate institutions to monitor and curb the precarized work, as well as all practices that go against the dignity of the worker. It is also shown the loss of power of the sindicates in the last few years as a consequence of the pulverization workes and the capital attacks through the productive restructure whose outsourcings and privatizations are notorious examples

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Brazilian Constitution aims to regularize the broadest possible the fundamental grounded in the value and supreme principle of human dignity, supporting a Democratic State of Law, to essentially give basic rights to all for a dignified existence. As the result of a historical development, fundamental rights incorporated by legal order represents a real reaction against acts that ignored the dignity of each person in one of these scenarios, especially inserted into the labor relationship, the principle of protection comes to balance and compose such relationship between employers and workers, raising this principle as axiological essence of this subject, based especially on the protection and guarantee of fundamental rights of the worker. For this study, was developed a literature research using books, legislation, legal websites and articles related to the subject, in order to analyze the principle of protection insert in the legal order, properly authoritative on the principle of equality, the social value of the work of human dignity to confer protection to the most vulnerable and admittedly weak of the labor relationship in order to serve the specific regulations legal practical tools and effective protection, against the employer hierarchical power and steering that can not change into abuses and attacks on the fundamental rights of the worker. In conclusion, is not enough, recognizing the vulnerability of the worker, it is necessary to carry out protective legal instruments in line with the the human dignity, consectário logical fundamental rights of workers, to be held in a proportional manner and sometimes flexible, depending on the case. Protection has a beginning and end to ensure that the human dignity that must presuppose a working relationship achieved by orderly and normative power of constitutional norms, with the aim of designing that labor is not an end in itself, but a means to the achievement of the economic advancement by promoting social development and providing necessary support for the increasingly marked impairment of fundamental rights of the worker

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study aimed to evaluate if Parisoschoenus obesulus Casey only attacks naturally aborting coconuts and, consequently, is not a pest of young fruits of coconut tree. Aiming to test this hypothesis, inflorescences at diverse stages of physiological development were offered to individuals of P. obesulus. The results showed that only aborting fruits were colonized by P. obesulus corroborating the established hypothesis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present work evaluated larvae cannibalism of matrinxa, Brycon cephalus, originated from eggs exposed to triiodothyronine, in the period of 36 to 72 hours after hatching. Observed parameters were: weight and length of larvae, stomach content, presence of cannibalism and type of attacks. This study was carried out at Centro de Pesquisa e Gestao de Recursos Pesqueiros Continentais (CEPTA/IBAMA), Pirassununga-SP, in November 2004. Three females were hormonally induced to spawn and pooled oocytes were fertilized and separated into four batches that constituted the treatments: L-1 (control - water); L-2 (0.01 ppm T-3); L-3 (0.05 ppm T-3) and L-4 (0.1 ppm T-3). Eggs were exposed during 15 minutes to water or to solutions containing the different concentrations of T3. Eggs were distributed in 12 conic incubators (60 L), with three replicates per treatment. There was stocked 500 mL of eggs per incubator and hatched larvae were counted. Samples of 30 larvae per treatment were colleted during occurrence of cannibalism (36, 48, 60 and 72 hours post hatching). Predator larvae (with rests of larvae in the stomach) were 50% of the total number of larvae and they presented weight 50% higher compared to that of non predator larvae (without rests of larvae in the stomach) and 9% higher regarding length. Coefficient of variation of weight and length did not differ among treatments, showing similarity in relation to the size. The stomach content revealed that cannibalism occurred in around 50-60 % of larvae, regardless the exposure to the triiodothyronine, and attacks were characterized as head-tail and tail-head attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We aim to understand the social representations of man's aggressive behavior from the perspective of women in situations of domestic violence. This is a descriptive, exploratory and representational study, whose methodological approach falls into the qualitative category. We chose as a scenario for research, by the Reference Center for Citizen Women (CRMC), Natal / RN. The criteria for selection of participants were women who lived/live in situations of domestic violence, with affective or relationship bonding with the assailant, in psychological and emotional positions appropriated to the reality; that are being protected or assisted by the service listed above; whose aggressor is male. We adopted as data collection instruments: questionnaire, Drawing-Story (DE) and a field diary. For analysis of textual data, we decided to use the ALCESTE software conjugated to editing analyze and initial reading. Were investigated 20 women victims of domestic violence, whose author of the attacks was the husband/partner. We identified, from the respondents, that 70% (n = 14) of men with aggressive behavior also had a family history of violence and fragile family relationships. About the physical and emotional condition of the assailant at the time of violence, 50% (n = 10) of these men, regardless the use of alcohol, had often quarrelsome and/or nervous behavior, impatient and unpredictable humor facing a setback, worry or annoyance. Regarding the nature of violence, we observed that women were victims of all types of violence, however, the psychological prevailed in 100% of cases. The corpus "Men" has three classes, whose focuses are, respectively: resignation, denounce and violence/aggression, being possible categorizing them as well: Category 1: The imprisonment of women; Category 2: Violence and its meanings; Category 3: Breaking the violent cycle. We show that the social representations of man s aggressive behavior, from the women in situations of violence, are anchored in the social roles of men in family and society, becoming a dominant model of masculinity. It is aimed, on one hand, from the reproduction of what is already known and/or experienced by male aggressors in the family, as repetitions of behavior. And on the other, present themselves as a state of illness, addiction or psychopathy

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information is one of the most valuable organization s assets, mainly on a global and highly competitive world. On this scenery there are two antagonists forces: on one side, organizations struggle for keeping protected its information, specially those considered as strategic, on the other side, the invaders, leaded by innumerous reasons - such as hobby, challenge or one single protest with the intention of capturing and corrupting the information of other organizations. This thesis presents the descriptive results of one research that had as its main objective to identify which variables influence the Executives´ and CIOs´ perceptions toward Information Security. In addition, the research also identified the profile of Rio Grande do Norte s organizations and its Executives/CIOs concerning Information Security, computed the level of agreement of the respondents according to NBR ISO/IEC 17799 (Information technology Code of practice for information security management) on its dimension Access Control. The research was based on a model, which took into account the following variables: origin of the organization s capital, sector of production, number of PCs networked, number of employees with rights to network, number of attacks suffered by the organizations, respondent´s positions, education level, literacy on Information Technology and specific training on network. In the goal´s point of view, the research was classified as exploratory and descriptive, and, in relation of the approach, quantitative. One questionnaire was applied on 33 Executives and CIOs of the 50 Rio Grande do Norte s organizations that collected the highest taxes of ICMS - Imposto sobre Circulação de Mercadorias on 2000. After the data collecting, cluster analysis and chi-square statistical tools were used for data analysis. The research made clear that the Executives and CIOs of Rio Grande do Norte s organizations have low level of agreement concerning the rules of the NBR ISO/IEC 17799. It also made evident that the Executives and CIOs have its perception toward Information Security influenced by the number of PCs networked and by the number of attacks suffered by the organizations

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increasing of the number of attacks in the computer networks has been treated with the increment of the resources that are applied directly in the active routers equip-ments of these networks. In this context, the firewalls had been consolidated as essential elements in the input and output control process of packets in a network. With the advent of intrusion detectors systems (IDS), efforts have been done in the direction to incorporate packets filtering based in standards of traditional firewalls. This integration incorporates the IDS functions (as filtering based on signatures, until then a passive element) with the already existing functions in firewall. In opposite of the efficiency due this incorporation in the blockage of signature known attacks, the filtering in the application level provokes a natural retard in the analyzed packets, and it can reduce the machine performance to filter the others packets because of machine resources demand by this level of filtering. This work presents models of treatment for this problem based in the packets re-routing for analysis by a sub-network with specific filterings. The suggestion of implementa- tion of this model aims reducing the performance problem and opening a space for the consolidation of scenes where others not conventional filtering solutions (spam blockage, P2P traffic control/blockage, etc.) can be inserted in the filtering sub-network, without inplying in overload of the main firewall in a corporative network

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Attacks to devices connected to networks are one of the main problems related to the confidentiality of sensitive data and the correct functioning of computer systems. In spite of the availability of tools and procedures that harden or prevent the occurrence of security incidents, network devices are successfully attacked using strategies applied in previous events. The lack of knowledge about scenarios in which these attacks occurred effectively contributes to the success of new attacks. The development of a tool that makes this kind of information available is, therefore, of great relevance. This work presents a support system to the management of corporate security for the storage, retrieval and help in constructing attack scenarios and related information. If an incident occurs in a corporation, an expert must access the system to store the specific attack scenario. This scenario, made available through controlled access, must be analyzed so that effective decisions or actions can be taken for similar cases. Besides the strategy used by the attacker, attack scenarios also exacerbate vulnerabilities in devices. The access to this kind of information contributes to an increased security level of a corporation's network devices and a decreased response time to occurring incidents

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Eucalyptus spp. plantations represent >60% of the reforested area in Brazil. Although ambrosia beetle attacks on live trees were at first nonexistent, they have begun to appear with greater frequency. Monitoring for pest insects is a key factor in integrated pest management, and baited traps are one of the most widely used methods for insect population detection and survey. We compared the efficiency of the most widely used trap in Brazil to survey for ambrosia beetles and other Scolytidae, the ESALQ-84 type, with other traditionally employed traps: the multiple funnel (Lindgren trap); drainpipe; and slot (Theyson) traps, in a Eucalyptus grandis Hill ex Maiden stand in Brazil. The ESALQ-84 trap was the most efficient in trapping Hypothenemus eruditus Westwood and Hypothenemus obscurus (F.); the multiple funnel trap caught significantly more Cryptocarenus diadematus Eggers; whereas the slot trap caught more Premnobius cavipennis Eichhoff and Xyleborus affinis Eichhoff than the other traps. The drainpipe trap was the least effective trap overall. When corrected for number of beetles caught per trap surface area, catches were significantly higher on the ESALQ-84 trap for the majority of the species analyzed, probably because of a smaller trap surface area. The slot trap was recommended for it caught overall more beetles of the three most economically important scolytid species in eucalypt plantations in Brazil, P. cavipennis, X. affinis, and X, ferrugineus.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A mancha de alternaria, causada por Alternaria alternata f. sp. citri, afeta tangelos Minneola, tangerinas Dancy, tangores Murcote e, menos freqüentemente, tangelos Orlando, tangerinas Novas, Lees e Sunburst. Esta doença causa desfolha grave, queda de frutos e manchas nas frutas. O objetivo deste trabalho foi estabelecer o melhor fungicida e a melhor dose para o controle da mancha marrom de alternaria. O delineamento experimental foi de parcelas subdivididas em blocos, com 10 tratamentos principais e 3 doses (subparcelas), com 5 repetições. Foram feitas 5 aplicações, com intervalo de 15 dias. Os tratamentos foram: azoxystrobin, pyraclostrobin, trifloxystrobin, trifloxystrobin + tebuconazole (2 aplicações) seguido de 3 aplicações de mancozeb, difenoconazole, trifloxystrobin + propiconazole, iprodione, trifloxystrobin + propineb (2 aplicações) seguido de 3 aplicações de oxicloreto de cobre, oxicloreto de cobre + óleo e testemunha. Simultaneamente foram feitas avaliações de incidência e número de lesões por folha. Ao surgimento dos frutos foram avaliadas a incidência em frutos e a produtividade em Kg/ha. Todos os tratamentos foram superiores à testemunha quanto a produtividade. Entre os produtos utilizados o tratamento com trifloxystrobin + propiconazole foi rentável comparando-se custo e produtividade.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Lepidopteran pests have occurred in eucalyptus plantations in Brazil since 1948, reaching high population levels, reducing tree growth and causing considerable losses in wood production. The control of defoliating caterpillars in eucalyptus forests is complex, mainly due to the large extent of forest plantations and tree height, necessitating the aerial application of chemical or biological insecticides. Due to this complexity, alternative control methods have been proposed, for instance biological control through the use of parasitoids. Trichospilus diatraeae Cherian & Margabandhu, 1942 is a gregarious pupal parasitoid that preferentially attacks species of the order Lepidoptera. This is the first report of T. diatraeae parasitizing pupae of the eucalyptus defoliator Euselasia eucerus Hewitson in Brazil. This parasitoid offers new perspectives for the biological control programmes of this species in eucalyptus plantations in Brazil.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Host-fungal interactions are inherently complex and dynamic. In order to identify new microbial targets and develop more effective anti-fungal therapies, it is important to understand the cellular and molecular mechanisms of disease. Paracoccidioidomycosis provokes a variety of clinical symptoms, and Paracoccidioides brasiliensis can reach many tissues, but primarily attacks the lungs. The ability of the pathogen to interact with the host surface structures is essential to further colonization, invasion, and growth. Epithelial cells may represent the first host barrier or the preferential site of entry of the fungus. For this reason, interactions between P. brasiliensis and Vero/A549 epithelial cells were evaluated, with an emphasis on the adherence, induction of cytoskeletal alterations, and differential signaling activity of the various surface molecules. The adhesion to and invasion of epithelial cells by P. brasiliensis may represent strategies employed to thwart the initial host immune response, and may help in the subsequent dissemination of the pathogen throughout the body.