979 resultados para panic attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Migraine causes crippling attacks of severe head pain along with associated nausea, vomiting, photophobia and/or phonophobia. The aim of this study was to investigate single nucleotide polymorphisms (SNPs) in the adenosine deaminase, RNA-specific, B1 (ADARB1)and adenosine deaminase, RNA specific, B2 (ADARB2) genes in an Australian case-control Caucasian population for association with migraine. Both candidate genes are highly expressed in the central nervous system (CNS) and fit criteria for migraine neuropathology. SNPs in the ADARB2 gene were previously found to be positively associated with migraine in a pedigree-based GWAS using the genetic isolate of Norfolk Island, Australia. The ADARB1 gene was also chosen for investigation due to its important function in editing neurotransmitter receptor transcripts. Methods: Four SNPs in ADARB1 and nine in ADARB2 were selected by inspecting blocks of LD in Haploview for genotyping using either TaqMan or Sequenom assays. These SNPs were genotyped in two-hundred and ninety one patients who satisfied the International Classification of Headache Disorders, ICHD-II 2004 diagnostic criteria for migraine and three-hundred and fourteen controls and PLINK was used for association testing. Results: Chi-square (χ2) analysis found no significant association between any of the SNPs tested in the ADARB1 and ADARB2 genes in this study and the occurrence of migraine. Conclusions: In contrast to findings that SNPs in the ADARB2 gene were positively associated with migraine in the Norfolk Island population, we find no evidence to support the involvement of RNA editing genes in migraine susceptibility in an Australian Caucasian population.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Testing the strategies of discourse and materiality, this practice-based and practice-led research experiments with how anonymous storytelling by vulnerable communities, like that of the sexual minorities and their allies in Malaysia, can better speak to their human rights issues without further subjecting them to personal attacks and targetted persecution. The research identifies the critical role of the voice in lending authenticity and credibility to first person narratives; and contextual credibility as a form of credibility which personal stories naturally aspire to achieve with audiences. Adopting a discursive view of persuasion and recognising too that the power of persuasion may in effect lie with those who receive these stories rather than with those who tell them, the insights and knowledge gained from the research informed the development of the field output, Persuasive Storytelling by Vulnerable Communities in Aggressive Contexts: A Human Rights Communication Framework.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This project analyses and evaluates the integrity assurance mechanisms used in four Authenticated Encryption schemes based on symmetric block ciphers. These schemes are all cross chaining block cipher modes that claim to provide both confidentiality and integrity assurance simultaneously, in one pass over the data. The investigations include assessing the validity of an existing forgery attack on certain schemes, applying the attack approach to other schemes and implementing the attacks to verify claimed probabilities of successful forgeries. For these schemes, the theoretical basis of the attack was developed, the attack algorithm implemented and computer simulations performed for experimental verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We provide the first evidence for interspecific warfare in bees, a spectacular natural phenomenon that involves a series of aerial battles and leads to thousands of fatalities from both attacking and defending colonies. Molecular analysis of fights at a hive of the Australian stingless bee Tetragonula carbonaria revealed that the attack was launched by a related species, Tetragonula hockingsi, which has only recently extended its habitat into southeastern Queensland. Following a succession of attacks by the same T. hockingsi colony over a 4-month period, the defending T. carbonaria colony was defeated and the hive usurped, with the invading colony installing a new queen. We complemented our direct observations with a 5-year study of more than 260 Tetragonula hives and found interspecific hive changes, which were likely to be usurpation events, occurring in 46 hives over this period. We discuss how fighting swarms and hive usurpation fit with theoretical predictions on the evolution of fatal fighting and highlight the many unexplained features of these battles that warrant further study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis investigates the use of fusion techniques and mathematical modelling to increase the robustness of iris recognition systems against iris image quality degradation, pupil size changes and partial occlusion. The proposed techniques improve recognition accuracy and enhance security. They can be further developed for better iris recognition in less constrained environments that do not require user cooperation. A framework to analyse the consistency of different regions of the iris is also developed. This can be applied to improve recognition systems using partial iris images, and cancelable biometric signatures or biometric based cryptography for privacy protection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Past research has suggested that social engineering poses the most significant security risk. Recent studies have suggested that social networking sites (SNSs) are the most common source of social engineering attacks. The risk of social engineering attacks in SNSs is associated with the difficulty of making accurate judgments regarding source credibility in the virtual environment of SNSs. In this paper, we quantitatively investigate source credibility dimensions in terms of social engineering on Facebook, as well as the source characteristics that influence Facebook users to judge an attacker as credible, therefore making them susceptible to victimization. Moreover, in order to predict users’ susceptibility to social engineering victimization based on their demographics, we investigate the effectiveness of source characteristics on different demographic groups by measuring the consent intentions and behavior responses of users to social engineering requests using a role-play experiment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Past research has suggested that social networking sites are the most common source for social engineering-based attacks. Persuasion research shows that people are more likely to obey and accept a message when the source’s presentation appears to be credible. However, many factors can impact the perceived credibility of a source, depending on its type and the characteristics of the environment. Our previous research showed that there are four dimensions of source credibility in terms of social engineering on Facebook: perceived sincerity, perceived competence, perceived attraction, and perceived worthiness. Because the dimensionalities of source credibility as well as their measurement scales can fluctuate from one type of source to another and from one type of context to another, our aim in this study includes validating the existence of those four dimensions toward the credibility of social engineering attackers on Facebook and developing a valid measurement scale for every dimension of them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is 2019, ten years after a plague turns most humans into vampires. Human blood is in short supply. The shortage of causing panic in vampire population Charles Bromley, CEO of pharmaceutic company Bromley Marks - the largest supplier of human blood in the United States- is intent on developing a viable blood substitute. When a cure that can transform vampires back into human...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Atheromatous plaque rupture h the cause of the majority of strokes and heart attacks in the developed world. The role of calcium deposits and their contribution to plaque vulnerability are controversial. Some studies have suggested that calcified plaque tends to be more stable whereas others have suggested the opposite. This study uses a finite element model to evaluate the effect of calcium deposits on the stress within the fibrous cap by varying their location and size. Plaque fibrous cap, lipid pool and calcification were modeled as hyperelastic, Isotropic, (nearly) incompressible materials with different properties for large deformation analysis by assigning time-dependent pressure loading on the lumen wall. The stress and strain contours were illustrated for each condition for comparison. Von Mises stress only increases up to 1.5% when varying the location of calcification in the lipid pool distant to the fibrous cap. Calcification in the fibrous cap leads to a 43% increase of Von Mises stress when compared with that in the lipid pool. An increase of 100% of calcification area leads to a 15% stress increase in the fibrous cap. Calcification in the lipid pool does not increase fibrous cap stress when it is distant to the fibrous cap, whilst large areas of calcification close to or in the fibrous cap may lead to a high stress concentration within the fibrous cap, which may cause plaque rupture. This study highlights the application of a computational model on a simulation of clinical problems, and it may provide insights into the mechanism of plaque rupture.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The reactions of terminal borylene complexes of the type [CpFe(CO)(2)(BNR2)](+) (R = `Pr, Cy) with heteroallenes have been investigated by quantum-chemical methods, in an attempt to explain the experimentally observed product distributions. Reaction with dicyclohexylcarbodiimide (CyNCNCy) gives a bis-insertion product, in which 1 equiv of carbodiimide is assimilated into each of the Fe=B and B=N double bonds to form a spirocyclic boronium system. In contrast, isocyanates (R'NCO, R' = Ph, 2,6-wXy1, CY; XYl = C6H3Me2) react to give isonitrile complexes of the type [CpFe(CO)(2)(CNR')]+, via a net oxygen abstraction (or formal metathesis) process. Both carbodiimide and socyanate substrates are shown to prefer initial attack at the Fe=B bond rather than the B=N bond of the borylene complex. Further mechanistic studies reveal that the carbodiimide reaction ultimately leads to the bis-insertion compounds [CpFe(CO)(2)C(NCy)(2)B(NCY)(2)CNR2](+), rather than to the isonitrile system [CpFe(CO)(2)(CNCy)](+), on the basis of both thermodynamic (product stability) and kinetic considerations (barrier heights). The mechanism of the initial carbodiimide insertion process is unusual in that it involves coordination of the substrate at the (borylene) ligand followed by migration of the metal fragment, rather than a more conventional process: i.e., coordination of the unsaturated substrate at the metal followed by ligand migration. In the case of isocyanate substrates, metathesis products are competitive with those from the insertion pathway. Direct, single-step metathesis reactivity to give products containing a coordinated isonitrile ligand (i.e. [CpFe(CO)(2)(CNR')](+)) is facile if initial coordination of the isocyanate at boron occurs via the oxygen donor (which is kinetically favored); insertion chemistry is feasible when the isocyanate attacks initially via the nitrogen atom. However, even in the latter case, further reaction of the monoinsertion product so formed with excess isocyanate offers a number of facile (low energetic barrier) routes which also generate ['CpFe(CO)(2)(CNR')](+), rather than the bis-insertion product [CpFe(CO)(2)C(NR')(O)B(NR')(O)CNR2](+) (i.e., the direct analogue of the observed products in the carbodiimide reaction).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Underground tunnels are vulnerable to terrorist attacks which can cause collapse of the tunnel structures or at least extensive damage, requiring lengthy repairs. This paper treats the blast impact on a reinforced concrete segmental tunnel buried in soil under a number of parametric conditions; soil properties, soil cover, distance of explosive from the tunnel centreline and explosive weight and analyses the possible failure patterns. A fully coupled Fluid Structure Interaction (FSI) technique incorporating the Arbitrary Lagrangian-Eulerian (ALE) method is used in this study. Results indicate that the tunnel in saturated soil is more vulnerable to severe damage than that buried in either partially saturated soil or dry soil. The tunnel is also more vulnerable to surface explosions which occur directly above the centre of the tunnel than those that occur at any equivalent distances in the ground away from the tunnel centre. The research findings provide useful information on modeling, analysis, overall tunnel response and failure patterns of segmented tunnels subjected to blast loads. This information will guide future development and application of research in this field.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The PhD dissertation "Bucking Glances: On Body, Gender, Sexuality and Visual Culture Research" consists of theoretical introduction and five articles published between 2002-2005. The articles analyze the position of visual representations in the processes of knowledge production on acceptable genders, bodies, and sexualities in contemporary Wes¬tern societies. The research material is heterogeneous, consisting of representations of contemporary art, advertisements, and fashion images. The ideological starting point of the PhD dissertation is the politics of the gaze and the methods used to expose this are the concepts of oppositional gaze, close reading, and resisting reading. The study situates visual representations in dialogue with the concepts of the grotesque and androgyny, as well as with queer-theory and theories of the gaze. The research challenges normative meanings of visual representations and opens up space for more non-conventional readings attached to femininity and masculinity. The visual material is read as troubling the prevailing heteronormative gender system. The dissertation also indicates how visual culture research utilizing the approach of queer theory can be fruitful in opposing and re-visioning changes in the repressive gender system. The article "A Heroic Male and A Beautiful Woman. Teemu Mäki, Orlan and the Ambivalence of the Grotesque Body" problematizes the concept of heroic masculinity through the analysis of the Finnish artist Teemu Mäki's masochistic performance The Good Friday (1989). It also analyzes cosmetic surgery, undertaken by the French artist Orlan, as a cultural tool in constructing and visualizing the contemporary, com¬mercial ideals of female beauty. The article "Boys Will Be Girls Will Be Boys Will Be Girls. The Ambivalence of Androgyny in Calvin Klein' Advertisements" is a close reading of the Calvin Klein perfume advertisement One (1998) in reference to the concept of androgyny. The critical point of the article is that androgynous male bodies allow the extension of the categorical boundaries of masculinity and homosexuality, whereas representations of androgynous women feed into the prevailing stereotypes of femininity, namely the fear of fat. The article "See-through Closet: Female Androgyny in the 1990s Fashion Images, New Woman and Lesbian Chic" analyzes the late 1990s fashion advertisements through the concept of female androgyny. The article argues that the figures of the masculine female androgynes in the late 1990s fashion magazines do not problematize the dichotomous gender binary. The women do not pass as men but produce a variation of heterosexual desirability. At the same time, the representations open up space for lesbian gazing and desiring. The article "Why are there no lesbian advertisements?" addresses the issue of femme gaze and desire in relation to heterosexual fashion advertisements from the British edition of the mainstream fashion magazine Vogue. The article considers possibilities for resistant femme visibility, identification, and desire. The article "Woman, Food, Home. Pirjetta Brander's and Heidi Romo's Works as Bucking Representations of Femininity" analyses the production and queering of heteronormative femininity and family through the analysis of art works. The article discusses how the term queer has been translated into Finnish. The article also introduces a new translation for the term queer: the noun vikuuri, i.e. faulty form and the verb vikuroida, i.e. to buck. In Finnish, the term vikuuri is the vernacular or broken form of the term figure, i.e. figuuri. Vikuuri represents all forms situated outside the norm and the normative.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the research on the Continuation War, interest in the events themselves had exceeded the interest in military planning. Careful consideration has not been given to the planning process and the options that were available. This study shows how the planning of these operations was carried out and identifies the persons responsible. Contrary to earlier research this study shows that persons other than Field-Marshal Carl Gustaf Mannerheim and Quartermaster-General Aksel Airo took part in the planning. Furthermore, the plan was to carry out the operations further east than was ultimately done. The operation plans were coordinated by the Operations Department of Headquarters, which had the opportunity to influence on both Mannerheim and Airo. Part of the actual planning was made outside Headquarters, but final decisions were taken at Headquarters. It is worth observing that many times Mannerheim asked President Risto Ryti for his opinion concerning these operations. The Germans tried to influence the Finnish plans, but the Finns took their decisions independently, although they took German requests into account. It is well-known that the attack by the Finnish forces was stopped at the end of the year 1941. It is less well-known that the Finns planned new attacks until the autumn of 1942. At that point the Finns were convinced that the Germans would lose the war. The Finns were thus prepared to keep advancing should the Germans progress in the direction of Leningrad. This study shows that the Finnish military leaders worked for Finland s own plans and their cooperation with the Germans was directed to achieving this goal. In other words, Finland tried expand eastward with the help of the Germans. This purpose was particularly evident in the planning of the operations in the Hanko district and the Karelian Isthmus in the summer and autumn of 1941, in the Sorokka district in the spring of 1942 and around Lake Ladoga in the summer and autumn of 1942. The Finns reduced their activities when Germans took over responsibility for the operations. However, at the same time the Finns tried to support Germans in passive ways. The Finns justified the decrease in their activities with lack of Finnish forces and numerous defeats. Earlier research has shown that Finland was an active operator in the Continuation War and tried to take back the areas lost in the Winter War. In this study that view becomes more precise and clear especially with regard to Field-Marshal Mannerheim and other high military leaders. There is clear indication that the Finns would have attacked much further east had a German success made such an attack possible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communication channels are typically constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties and establishes shared secret keys, and a secure data transmission layer, which uses the secret keys to encrypt data. We address the partial leakage of communicating parties' long-term secret keys due to various side-channel attacks, and the partial leakage of plaintext due to data compression. Both issues can negatively affect the security of channel establishment and data transmission. In this work, we advance the modelling of security for AKE protocols by considering more granular partial leakage of parties' long-term secrets. We present generic and concrete constructions of two-pass leakage-resilient key exchange protocols that are secure in the proposed security models. We also examine two techniques--heuristic separation of secrets and fixed-dictionary compression--for enabling compression while protecting high-value secrets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In my master thesis I analyse Byzantine warfare in the late period of the empire. I use military operations between Byzantines and crusader Principality of Achaia (1259–83) as a case study. Byzantine strategy was based (in “oriental manner”) on using ambushes, diplomacy, surprise attacks, deception etc. Open field battles that were risky in comparison with their benefits were usually avoided, but the Byzantines were sometimes forced to seek open encounter because their limited ability to keep strong armies in field for long periods of time. Foreign mercenaries had important place in Byzantine armies and they could simply change sides if their paymasters ran out of resources. The use of mercenaries with short contracts made it possible that the composition of an army was flexible but on the other hand heterogeneous – in result Byzantine armies were sometimes ineffective and prone to confusion. In open field battles Byzantines used formation that was made out from several lines placed one after another. This formation was especially suitable for cavalry battles. Byzantines might have also used other kinds of formations. The Byzantines were not considered equal to Latins in close combat. West-Europeans saw mainly horse archers and Latin mercenaries on Byzantine service as threats to themselves in battle. The legitimacy of rulers surrounding the Aegean sea was weak and in many cases political intrigues and personal relationships can have resolved the battles. Especially in sieges the loyalty of population was decisive. In sieges the Byzantines used plenty of siege machines and archers. This made fast conquests possible, but it was expensive. The Byzantines protected their frontiers by building castles. Military operations against the Principality of Achaia were mostly small scale raids following an intensive beginning. Byzantine raids were mostly made by privateers and mountaineers. This does not fit to the traditional picture that warfare belonged to the imperial professional army. It’s unlikely that military operations in war against the Principality of Achaia caused great demographic or economic catastrophe and some regions in the warzone might even have flourished. On the other hand people started to concentrate into villages which (with growing risks for trade) probably caused disturbance in economic development and in result birth rates might have decreased. Both sides of war sought to exchange their prisoners of war. These were treated according to conventional manners that were accepted by both sides. It was possible to sell prisoners, especially women and children, to slavery, but the scale of this trade does not seem to be great in military operations treated in this theses.