681 resultados para Malware attacks
Resumo:
Chrysomya albiceps, the larvae of which are facultative predators of larvae of other dipteran species, has been introduced to the Americas over recent years along with other Old World species of blowflies, including Chrysomya megacephala, Chrysomya putoria and Chlysomya rufifacies. An apparent correlate of this biological invasion has been a sudden decline in the population numbers of Cochliomyia macellaria, a native species of the Americas. In this study, we investigated predation rates on third instar larvae of C. macellaria, C. putoria and C. megacephala by third instar larvae of C. albiceps in no-choice, two-choice and three-choice situations. Most attacks by C. albiceps larvae occurred within the first hour of observation and the highest predation rate occurred on C. macellaria larvae, suggesting that C. albiceps was more dangerous to C. macellaria than to C. megacephala and C. putoria under these experimental conditions. The rates of larvae killed as a result of the predation, as well as its implications to population dynamics of introduced and native species are discussed.
Resumo:
This experiment was developed in order to evaluation the efficiency of pheromone to control the pink bollworm and the total time of its release in cotton field. The experiment was installed in field conditions, in Chapadao do Sul/SP/Brazil, from January to April, 1998. The treatments consisted of 2 areas, being one of 30ha, where it was applied the pheromone and another of 10ha that was chosen as control area and did not receive pheromone. In the treated area, the laboratory synthesized sex pheromone (PB-Rope) was used thought of dispensers that allowed the slow and gradual release of the active substance. A total of 250 dispenser per hectare were evenly hand distributed in the area. The dispensers were wrapped around the plants. Both areas (treated area and untreated area) were monitored by delta trap. For evaluation of the boll damage, the treatment area was divided into 4 sub-areas. Twenty five green bolls were collected at random from each sub-area at 48 and 65 days after pheromone treatment. Bolls were cracked open by hand, and number of the bolls with symptoms of pink bollworm attacks was recorded. For evaluation of the productivity four areas were demarcated in each treatment, where all fibers and seeds harvested were weighted. Release rate of pheromone from dispenser was evaluated through of the weigh of the dispensers. Were marked and weighed in analytic scale, 20 dispensers contend the pheromone, being placed 10 dispensers under the cotton plants in treated area and other 10 dispensers in an open area. To every 15 days the dispensers were retired and weighed in analytic scale and soon after put back in the field in the same places. The results showed that only one application of mating disrupt pheromone, used in a dosage of 250 dispenser/ha, reached 80% of control for pink bollworm. the release period of pheromone from dispenser, after the application, was 120 days.
Resumo:
In primitively eusocial insect societies, reproductive division of labor is established by dominance-submission interactions which determine a linear dominance hierarchy. As previously observed for other species, in Mischocyttarus cerberus styx (Hymenoptera, Vespidae), the dominant female is the main egg layer. Most of her attacks were to the females directly beneath in the rank establishing a hierarchy. During the pre-emergence stage, the hierarchy was already defined and in the post-emergence stage, pre-male substage, the frequency of dominance interactions were strong but the hierarchy was still maintained by the first-ranked female. In the decline stage there were many neutral individuals which could be the reproductives of a new colony.
Resumo:
Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.
Resumo:
Tuberculosis (TB) is a serious public health problem all over the world, which was recognized by the WHO in 1993 as a global emergency because of its very high incidence in the 22 countries that concentrate 80% of TB cases. One of these countries is Brazil, where TB occurrences are well-documented in major cities, but little is known of its spread in rural areas and small towns. Therefore, an epidemiological study was done on medical records of TB sufferers in the rural district and small town of Américo Brasiliense, São Paulo state, from 1992 to 2002, with the aim of improving TB prevention and treatment. The results showed that the incidence of TB peaked in the years of intense migration of rural workers, largely cane-cutters. Among these, the disease attacks mainly the men, in their productive years (20 to 40 years old). The predominant clinical form observed was pulmonary tuberculosis. The treatment abandonment rate was less than 1.8%, while the cure rate was around 90%. The disease detection rate by examination of sputum for acid-fast bacilli was around 60%.
Resumo:
The study was carried out at the UNESP Rio Claro campus (SP), where biotests consisting of simulated ant attacks were performed in colonies of Mischocyttarus cerberus. The behaviors of the wasps were recorded with a camcorder, for further analysis. This analysis was done using the Mann-Whitney U test and the Principal Component Analysis. In the pre-emergence development stage, colonies with a single foundress defend the nest only after the first larvae appear. When there are only eggs in the nest, the wasp abandons the nest. Before leaving, the wasp rubs its gaster against the nest, releasing the ant repellent secretion. When the nest contains larvae or larvae and pupae, the foundress defends the colony, vibrating its wings, pumping her abdomen and biting the ant.
Resumo:
Includes bibliography
Resumo:
Automotive parts manufacture by machining process using silicon nitride-based ceramic tool development in Brazil already is a reality. Si 3N4-based ceramic cutting tools offer a high productivity due to their excellent hot hardness, which allows high cutting speeds. Under such conditions the cutting tool must be resistant to a combination of mechanical, thermal and chemical attacks. Silicon nitride based ceramic materials constitute a mature technology with a very broad base of current and potential applications. The best opportunities for Si3N 4-based ceramics include ballistic armor, composite automotive brakes, diesel particulate filters, joint replacement products and others. The goal of this work was to show latter advance in silicon nitride manufacture and its recent evolution on machining process of gray cast iron, compacted graphite iron and Ti-6Al-4V. Materials characterization and machining tests were analyzed by X-Ray Diffraction, Scanning Electron Microscopy, Vickers hardness and toughness fracture and technical norm. In recent works the authors has been proved to advance in microstructural, mechanical and physic properties control. These facts prove that silicon nitride-based ceramic has enough resistance to withstand the impacts inherent to the machining of gray cast iron (CI), compacted graphite iron (CGI) and Ti-6Al-4V (6-4). Copyright © 2008 SAE International.
Resumo:
We report a case of a bather injured by a swordfish in shallow water off the coast of southern Brazil. The victim suffered multiple injuries from the fish's bill, including a puncture wound of his left knee and the tip of the bill remaining as a foreign body. The victim made a full recovery after field management and conservative care. The potential factors leading to this most unusual attack are discussed. © 2009 Wilderness Medical Society.
Resumo:
The velvetbean caterpillar Anticarsia gemmatalis Hübner attacks peanut leaves, and the use of resistant varieties has directly contributed to ecological and economic aspects of pest control. The aim of this work was to select resistant peanut genotypes to A. gemmatalis using cluster analyses (dendogram obtained by Ward's methods and K-means) and Principal Components analysis for data interpretation. The evaluated genotypes were: IAC 5, IAC 8112, IAC 22 and IAC Tatu ST with upright growth habit, and IAC 147, IAC 125, IAC Caiapó and IAC Runner 886 with runner growth habit, and soybean genotype BR 16 as a susceptible control. The biological parameters: leaf consumption, larval (4o instar) and pupal (24h old) weight, larval and pupal development time and adult longevity were evaluated at laboratory conditions. The genotypes IAC 147 and IAC Runner 886 were resistant to A. gemmatalis in both cluster tests, grouping apart from most of the other genotypes. Both dendrogram and K-means methods provided satisfactory biological explanation, and they can be complementary used together with Principal Component and vice-versa. These results suggest that cluster analyses may be an important statistical tool in the selection of host plant resistance.
Resumo:
Since Sharir and Pnueli, algorithms for context-sensitivity have been defined in terms of 'valid' paths in an interprocedural flow graph. The definition of valid paths requires atomic call and ret statements, and encapsulated procedures. Thus, the resulting algorithms are not directly applicable when behavior similar to call and ret instructions may be realized using non-atomic statements, or when procedures do not have rigid boundaries, such as with programs in low level languages like assembly or RTL. We present a framework for context-sensitive analysis that requires neither atomic call and ret instructions, nor encapsulated procedures. The framework presented decouples the transfer of control semantics and the context manipulation semantics of statements. A new definition of context-sensitivity, called stack contexts, is developed. A stack context, which is defined using trace semantics, is more general than Sharir and Pnueli's interprocedural path based calling-context. An abstract interpretation based framework is developed to reason about stack-contexts and to derive analogues of calling-context based algorithms using stack-context. The framework presented is suitable for deriving algorithms for analyzing binary programs, such as malware, that employ obfuscations with the deliberate intent of defeating automated analysis. The framework is used to create a context-sensitive version of Venable et al.'s algorithm for analyzing x86 binaries without requiring that a binary conforms to a standard compilation model for maintaining procedures, calls, and returns. Experimental results show that a context-sensitive analysis using stack-context performs just as well for programs where the use of Sharir and Pnueli's calling-context produces correct approximations. However, if those programs are transformed to use call obfuscations, a contextsensitive analysis using stack-context still provides the same, correct results and without any additional overhead. © Springer Science+Business Media, LLC 2011.
Resumo:
Includes bibliography
Resumo:
A população mundial vem sofrendo, cada vez mais, as conseqüências das agressões efetuadas pelo homem ao meio ambiente, principalmente quanto à ocupação e uso inadequado das terras, o que ocasiona empobrecimento e depauperamento do solo, influenciando na qualidade e disponibilidade de água, levando à destruição das reservas florestais. Assim, é necessária a implantação de políticas públicas, que contemplem o desenvolvimento econômico, urbano, rural e social de uma região, preservando os recursos naturais para futuras gerações. A bacia em estudo está localizada entre as coordenadas UTM 764942; 7546214 e 741816; 7534759, com uma área de 14699,7ha. Este trabalho visou definir as classes de capacidade de uso de terra da microbacia do Ribeirão Pouso Alegre - Jaú (SP) através do Sistema de Informações Geográficas - SPRING. A carta de capacidade de uso da terra foi elaborada a partir do cruzamento das cartas clinográfica e de solo, que foram elaboradas pelo SIG Spring, e o cruzamento de dados foi feito através do LEGAL - Linguagem Espacial para Geoprocessamento Algébrico. Os resultados mostraram que a microbacia é constituída essencialmente pelas classes II e III e o SIG-SPRING permitiu através dos seus módulos discriminarem e quantificar as áreas das classes de terras, declive e capacidade de uso da terra rapidamente.
Resumo:
We describe a fatal attack by a black caiman (Melanosuchus niger) on an 11-year-old child with comments on the reptile's aggression mechanisms and the conditions under which this kind of incident takes place in the Amazon region. © 2011 Wilderness Medical Society.
Resumo:
Includes bibliography