872 resultados para panic attacks
Resumo:
Lana Nowakowski's opinion piece on the High Court decision in the Zaburoni HIV case attacks "Queensland's absurd necessity to prove intention on transmission" and argues that "changes to the law are long overdue". Both claims are wrong...
Resumo:
This paper presents a detailed analysis of a model for military conflicts where the defending forces have to determine an optimal partitioning of available resources to counter attacks from an adversary in two different fronts in an area fire situation. Lanchester linear law attrition model is used to develop the dynamical equations governing the variation in force strength. Here we address a static resource allocation problem namely, Time-Zero-Allocation (TZA) where the resource allocation is done only at the initial time. Numerical examples are given to support the analytical results.
Resumo:
The MIT Lincoln Laboratory IDS evaluation methodology is a practical solution in terms of evaluating the performance of Intrusion Detection Systems, which has contributed tremendously to the research progress in that field. The DARPA IDS evaluation dataset has been criticized and considered by many as a very outdated dataset, unable to accommodate the latest trend in attacks. Then naturally the question arises as to whether the detection systems have improved beyond detecting these old level of attacks. If not, is it worth thinking of this dataset as obsolete? The paper presented here tries to provide supporting facts for the use of the DARPA IDS evaluation dataset. The two commonly used signature-based IDSs, Snort and Cisco IDS, and two anomaly detectors, the PHAD and the ALAD, are made use of for this evaluation purpose and the results support the usefulness of DARPA dataset for IDS evaluation.
Resumo:
Recommender systems aggregate individual user ratings into predictions of products or services that might interest visitors. The quality of this aggregation process crucially affects the user experience and hence the effectiveness of recommenders in e-commerce. We present a characterization of nearest-neighbor collaborative filtering that allows us to disaggregate global recommender performance measures into contributions made by each individual rating. In particular, we formulate three roles-scouts, promoters, and connectors-that capture how users receive recommendations, how items get recommended, and how ratings of these two types are themselves connected, respectively. These roles find direct uses in improving recommendations for users, in better targeting of items and, most importantly, in helping monitor the health of the system as a whole. For instance, they can be used to track the evolution of neighborhoods, to identify rating subspaces that do not contribute ( or contribute negatively) to system performance, to enumerate users who are in danger of leaving, and to assess the susceptibility of the system to attacks such as shilling. We argue that the three rating roles presented here provide broad primitives to manage a recommender system and its community.
Resumo:
The motivation behind the fusion of Intrusion Detection Systems was the realization that with the increasing traffic and increasing complexity of attacks, none of the present day stand-alone Intrusion Detection Systems can meet the high demand for a very high detection rate and an extremely low false positive rate. Multi-sensor fusion can be used to meet these requirements by a refinement of the combined response of different Intrusion Detection Systems. In this paper, we show the design technique of sensor fusion to best utilize the useful response from multiple sensors by an appropriate adjustment of the fusion threshold. The threshold is generally chosen according to the past experiences or by an expert system. In this paper, we show that the choice of the threshold bounds according to the Chebyshev inequality principle performs better. This approach also helps to solve the problem of scalability and has the advantage of failsafe capability. This paper theoretically models the fusion of Intrusion Detection Systems for the purpose of proving the improvement in performance, supplemented with the empirical evaluation. The combination of complementary sensors is shown to detect more attacks than the individual components. Since the individual sensors chosen detect sufficiently different attacks, their result can be merged for improved performance. The combination is done in different ways like (i) taking all the alarms from each system and avoiding duplications, (ii) taking alarms from each system by fixing threshold bounds, and (iii) rule-based fusion with a priori knowledge of the individual sensor performance. A number of evaluation metrics are used, and the results indicate that there is an overall enhancement in the performance of the combined detector using sensor fusion incorporating the threshold bounds and significantly better performance using simple rule-based fusion.
Resumo:
Bees are well known for being industrious pollinators. Some species, however, have taken to invading the nests of other colonies to steal food, nest material or the nest site itself. Despite the potential mortality costs due to fighting with an aggressive opponent, the prospects of a large bounty can be worth the risk. In this review, we aim to bring together current knowledge on intercolony fighting with a view to better understand the evolution of warfare in bees and identify avenues for future research. A review of literature reveals that at least 60 species of stingless bees are involved in heterospecific conflicts, either as attacking or victim colonies. The threat of invasion has led to the evolution of architectural, behavioural and morphological adaptations, such as narrow entrance tunnels, mud balls to block the entrance, decoy nests that direct invaders away from the brood chamber, fighting swarms, and soldiers that are skilled at immobilising attackers. Little is known about how victim colonies are selected, but a phylogenetically controlled analysis suggests that the notorious robber bee Lestrimelitta preferentially attacks colonies of species with more concentrated honey. Warfare among bees poses many interesting questions, including why species differ so greatly in their response to attacks and how these alternative strategies of obtaining food or new nest sites have evolved.
Resumo:
This paper develops a model for military conflicts where the defending forces have to determine an optimal partitioning of available resources to counter attacks from an adversary in two different fronts. The Lanchester attrition model is used to develop the dynamical equations governing the variation in force strength. Three different allocation schemes - Time-Zero-Allocation (TZA), Allocate-Assess-Reallocate (AAR), and Continuous Constant Allocation (CCA) - are considered and the optimal solutions are obtained in each case. Numerical examples are given to support the analytical results.
Kansanterveysongelman synty : Tuberkuloosi ja terveyden hallinta Suomessa ennen toista maailmansotaa
Resumo:
The study focuses on the emergence of tuberculosis as a public health problem and the development of the various methods to counteract it in Finland before the introduction of efficient methods of treatment in the 1940s and 50s. It covers a time period from year 1882 when the tuberculosis bacterium was identified to the 1930s when the early formation of tuberculosis work became established in Finland. During this time there occurred important changes in medicine, public health thinking and methods of personal health care that have been referred to as the bacteriological revolution. The study places tuberculosis prevention in this context and shows how the tuberculosis problem affected the government of health on all these three dimensions. The study is based on foucauldian analytics of government, which is supplemented with perspectives from contemporary science and technology studies. In addition, it utilises a broad array of work in medical history. The central research materials consist of medical journals, official programs and documents on tuberculosis policy, and health education texts. The general conclusions of the study are twofold. Firstly, the ensemble of tuberculosis work was formed from historically diverse and often conflicting elements. The identification of the pathogen was only the first step in the establishment of tuberculosis as a major public health problem. Important were also the attention of the science of hygiene and statistical reasoning that dominated public health thinking in the late 19th century. Furthermore, the adoption of the bacteriological tuberculosis doctrine in medicine, public health work and health education was profoundly influenced by previous understanding of the nature of the illness, of medical work, of the prevention of contagious diseases, and of personal health care. Also the two central institutions of tuberculosis work, sanatorium and dispensary, have heterogeneous origins and multifarious functions. Secondly, bacteriology represented in this study by tuberculosis remodelled medical knowledge and practices, the targets and methods of public health policy, and the doctrine of personal health care. Tuberculosis provided a strong argument for specific causes (if not cures) as well as laboratory methods in medicine. Tuberculosis prevention contributed substantially to the development whereby a comprehensive responsibility for the health of the population and public health work was added to the agenda of the state. Health advice on tuberculosis and other contagious diseases used dangerous bacteria to motivate personal health care and redefined it as protecting oneself from the attacks of external pathogens and strengthening oneself against their effects. Thus, tuberculosis work is one important root for the contemporary public concern for the health of the population and the imperative of personal health care.
Resumo:
This paper develops a model for military conflicts where the defending forces have to determine an optimal partitioning of available resources to counter attacks from an adversary in two different fronts. The Lanchester attrition model is used to develop the dynamical equations governing the variation in force strength. Three different allocation schemes - Time-Zero-Allocation (TZA), Allocate-Assess-Reallocate (AAR), and Continuous Constant Allocation (CCA) - are considered and the optimal solutions are obtained in each case. Numerical examples are given to support the analytical results.
Resumo:
Migraine is the common cause of chronic episodic headache, affecting 12%-15% of the Caucasian population (41 million Europeans and some half a million Finns), and causes considerable loss of quality of life to its sufferers, as well as being linked to increased risk for a wide range of conditions, from depression to stroke. Migraine is the 19th most severe disease in terms of disability-adjusted life years, and 9th among women. It is characterized by attacks of headache accompanied by sensitivity to external stimuli lasting 4-72 hours, and in a third of cases by neurological aura symptoms, such as loss of vision, speech or muscle function. The underlying pathophysiology, including what triggers migraine attacks and why they occur in the first place, is largely unknown. The aim of this study was to identify genetic factors associated with the hereditary susceptibility to migraine, in order to gain a better understanding of migraine mechanisms. In this thesis, we report the results of genetic linkage and association analyses on a Finnish migraine patient collection as well as migraineurs from Australia, Denmark, Germany, Iceland and the Netherlands. Altogether we studied genetic information of nearly 7,000 migraine patients and over 50,000 population-matched controls. We also developed a new migraine analysis method called the trait component analysis, which is based on individual patient responses instead of the clinical diagnosis. Using this method, we detected a number of new genetic loci for migraine, including on chromosome 17p13 (HLOD 4.65) and 10q22-q23 (female-specific HLOD 7.68) with significant evidence of linkage, along with five other loci (2p12, 8q12, 4q28-q31, 18q12-q22, and Xp22) detected with suggestive evidence of linkage. The 10q22-q23 locus was the first genetic finding in migraine to show linkage to the same locus and markers in multiple populations, with consistent detection in six different scans. Traditionally, ion channels have been thought to play a role in migraine susceptibility, but we were able to exclude any significant role for common variants in a candidate gene study of 155 ion transport genes. This was followed up by the first genome-wide association study in migraine, conducted on 2,748 migraine patients and 10,747 matched controls followed by a replication in 3,209 patients and 40,062 controls. In this study, we found interesting results with genome-wide significance, providing targets for future genetic and functional studies. Overall, we found several promising genetic loci for migraine providing a promising base for future studies in migraine.
Resumo:
Financial crises have shown that dramatic movements in one financial market can have a powerful impact on other markets. The paper proposes to use cobreaking to model comovements between financial markets during crises and to test for conta-gion. It finds evidence of cobreaking between stock returns in developed markets. Finding cobreaking has implications for the diversification of international investments. For emerging mar-ket stock returns the evidence of cobreaking is mainly due to the non-financial event of the 9/11 terrorist attacks in 2001. Fi-nancial crises originating in one emerging market do not spread to other markets, i.e., no contagion.
Resumo:
This paper develops a model for military conflicts where the defending forces have to determine an optimal partitioning of available resources to counter attacks from an adversary from n different fronts. The problem of optimally partitioning the defending forces against the attacking forces is addressed. The Lanchester square law model is used to develop the dynamical equations governing the variation in force strength. Two different allocation schemes-Time-ZeroAllocation (TZA) and Continuous Constant Allocation (CCA) are considered and the optimal solutions for both are obtained analytically. These results generalize other results available in the literature. Numerical examples are given to support the analytical results.
Resumo:
An indole oxygenase from the leaves of Jasminum grandiflorum was isolated and purified to near homogeneity. The purified enzyme system catalyses the conversion of indole to anthranilic acid. It is optimally active at pH 4.8 and at 30°C. Apart from indole, the oxygenase also attacks 5-hydroxy indole and 5-bromoindole. Both sulfhydryl reagents and sulfhydryl compounds inhibited the enzyme activity. Copper specific metal chelators such as salicylaldoxime, diethyl dithiocarbamate and neocuproine, inhibited the enzyme activity drastically. Inhibition caused by atebrine, could be reversed by FAD. Dialysis resulted in complete loss of enzyme activity. Inactive enzyme could be reactivated only by the addition of both FAD and Cu2+, suggesting that indole oxygenase is a cuproflavoprotein.
Resumo:
Various intrinsic and external factors are constantly attacking the cells causing damage to DNA and to other cellular structures. Cells in turn have evolved with different kinds of mechanisms to protect against the attacks and to repair the damage. Ultraviolet radiation (UVR) is one of the major environmental genotoxic carcinogens that causes inflammation, mutations, immunosuppression, accelerated aging of the skin and skin cancers. Epidermis is the outermost layer of the skin consisting mostly of keratinocytes, whose primary function is to protect the skin against e.g. UV radiation. LIM domain proteins are a group of proteins involved in regulation of cell growth, damage signalling, cell fate determination and signal transduction. Despite their two zinc fingers, LIM domains do not bind to DNA, but rather mediate protein-protein interactions and function as modular protein binding interfaces. We initially identified CSRP1 as UVR-regulated transcript by using expression profiling. Here we have further studied the regulation and function of CRP1, a representative of cysteine rich protein- family consisting of two LIM domains. We find that CRP1 is increased by UVR in primary human keratinocytes and in normal human skin fibroblasts. Ectopic expression of CRP1 protected the cells against UVR and provided a survival advantage, whereas silencing of CRP1 rendered the cells more photosensitive. Actinic keratosis is a premalignant lesion of skin caused by excess exposure to sunlight and sunburn, which may lead to formation of squamous cell carcinoma. The expression of CRP1 was increased in basal keratinocytes of Actinic keratosis patient specimens suggesting that CRP1 may be increased by constant exposure to UVR and may provide survival advantage for the cells also in vivo. In squamous cell carcinoma, CRP1 was only expressed in the fibroblasts surrounding the tumour. Moreover, we found that ectopic expression of CRP1 suppresses cell proliferation. Transforming growth factor beta (TGFbeta) is a multifunctional cytokine that regulates several functions in cell including growth, apoptosis and differentiation, and plays important roles in pathological disorders like cancer and fibrosis. We found that TGFbeta-signalling pathway regulates CRP1 at protein, but not at transcriptional level. The increase was mediated both through Smad and non-Smad signalling pathways involving MAPK/p38. Furthermore, we found that TGFbeta-mediated increase in CRP1 was associated with myofibroblast differentiation, and that CRP1 was significantly more expressed in idiopathic pulmonary fibrosis as compared to normal lung specimens. Since cell contractility is a distinct feature of myofibroblasts, and CRP1 is associated with actin cytoskeleton, we studied the role of CRP1 in cell contractility. CRP1 was found to localize to stress fibres that mediate contractility and to mediate myofibroblast contraction. These studies identify CRP1 as a stress responsive and cytokine regulated cytoskeletal protein that participates in pathological processes involved in fibrotic diseases and cancer.
Resumo:
The hydrolysis reactions of organometallic ruthenium(II) piano-stool complexes of the type Ru-II(eta(6)-cymene)(L)Cl](0/+) (1-5, where L = kappa(1)- or kappa(2)-1,1-bis(diphenylphosphino)methane,1,1bis-(diphenylphosphino)methane oxide, kappa(1)-mercaptobenzothiazole) have been studied using density functional theory at the B3LYP level. In addition to considering a syn attack in an associative fashion, where the nucleophile approaches from the same side as the leaving group, we have explored alternative paths such as an anti attack in an associative manner, where the nucleophile attacks from the opposite side of the leaving group. During the anti attack, an intermediate is formed and there is a coordination mode change of the arene ring from eta(6) to eta(2) along with its rotation. When the intermediate goes to the product, the arene ring slips back from eta(2) to eta(6) coordination. This coordinated movement of the arene ring makes the associative anti attack an accessible pathway for the substitution process. Our calculations predict very similar activation barriers for both syn and anti attacks. In the dissociative path, the rate-determining step is the generation of a coordinatively unsaturated 16-electron ruthenium species. This turns out to be viable once solvent effects are included. The large size of the ancillary ligands on Ru makes the dissociative process as favorable as the associative process. Activation energy calculations reveal that although the dissociative path is favorable for kappa(1) complexes, both dissociative and associative processes can have significant contribution to the hydrolysis reaction in kappa(2) complexes. Once activated by hydrolysis, these complexes react with guanine and adenine bases of DNA. The thermodynamic stabilities of complexes formed with the nucleobases are also presented.