666 resultados para panic attacks
Resumo:
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.
Resumo:
The specialist digger wasp Trachypus boharti Rubio-Espina preys exclusively on males of the stingless bee Scaptotrigona postica Latreille 1807, although the hunting attacks involve both male and worker bees of S. postica and members of its own species. To understand the mechanism of prey selection, the cuticular hydrocarbon patterns of workers and males of S. postica are analyzed in detail, and the mandibular secretion of males is examined. The cuticular profiles of males and workers are distinctively different. The major group of cuticular compounds, heptacosene isomers, is twice as abundant in workers as in males. There is no clear distinction between worker and male mandibular secretions. Such a distinct and straightforward caste-specific difference in cuticular hydrocarbons could function as a recognition cue by which T. boharti distinguishes between workers and males of S. postica.
Resumo:
Objective.- To assess urinary 6-sulphatoxymelatonin levels in a large consecutive series of patients with migraine and several comorbidities (chronic fatigue, fibromyalgia, insomnia, anxiety, and depression) as compared with controls. Background.- Urine analysis is widely used as a measure of melatonin secretion, as it is correlated with the nocturnal profile of plasma melatonin secretion. Melatonin has critical functions in human physiology and substantial evidence points to its importance in the regulation of circadian rhythms, sleep, and headache disorders. Methods.- Urine samples were collected into a single plastic container over a 12-hour period from 8:00 pm to 8:00 am of the next day, and 6-sulphatoxymelatonin was measured by quantitative ELISA. All of the patients were given a detailed questionnaire about headaches and additionally answered the following questionnaires: Chalder fatigue questionnaire, Epworth somnolence questionnaire, State-Trait Anxiety Inventory, and the Beck Depression Inventory. Results.- A total of 220 subjects were evaluated - 73 (33%) had episodic migraine, 73 (33%) had chronic migraine, and 74 (34%) were enrolled as control subjects. There was a strong correlation between the concentration of 6-sulphatoxymelatonin detected and chronic migraine. Regarding the comorbidities, this study objectively demonstrates an inverse relationship between 6-sulphatoxymelatonin levels and depression, anxiety, and fatigue. Conclusions.- To our knowledge, this is the first study to evaluate the relationship between the urinary concentration of melatonin and migraine comorbidities. These results support hypothalamic involvement in migraine pathophysiology.
Resumo:
The Global Initiative Against Asthma (GINA) was developed to meet the global challenge of asthma. GINA has been adopted in most countries and comparison of asthma management in different parts of the world may be of help when assessing the global dissemination of the guideline. The overall goals in GINA include that asthma patients should be free of symptoms, acute asthma attacks and activity limitations. The aim of the present study was to compare asthma management and asthma control in Sao Paulo, Brazil and Uppsala, Sweden. Information was collected from asthmatics in Sao Paulo and Uppsala with a questionnaire. The questionnaire dealt with the following issues: symptoms, smoking, self-management, hospital visits, effect on school/work and medication. The Sao Paulo patients were more likely to have uncontrolled asthma (36% vs 13%, P < 0.001), having made emergency room visits (57% vs 29%, P < 0.001) and having lost days at school or work because of their asthma (46% vs 28%, P = 0.03) than the asthmatics from Uppsala. There were no difference in the use of inhaled corticosteroids, but the Brazilian patients were more likely to be using theophylline (18% vs 1%, P = 0.001) and less likely to be using long-acting beta-2 agonists (18% vs 37%, P < 0.001). We conclude that the level of asthma control was lower among the patients from Sao Paulo than Uppsala. Few of the patients in either city reached the goals set up by GINA. Improved asthma management may therefore lead to health-economic benefits in both locations. Please cite this paper as: Skorup P, Rizzo LV, Machado-Boman L and Janson C. Asthma management and asthma control in Sao Paulo, Brazil and Uppsala, Sweden: a questionnaire-based comparison. The Clinical Respiratory Journal 2009; 3: 22-28.
Resumo:
Multidimensional scaling is applied in order to visualize an analogue of the small-world effect implied by edges having different displacement velocities in transportation networks. Our findings are illustrated for two real-world systems, namely the London urban network (streets and underground) and the US highway network enhanced by some of the main US airlines routes. We also show that the travel time in these two networks is drastically changed by attacks targeting the edges with large displacement velocities. (C) 2011 Elsevier By. All rights reserved.
Resumo:
The relationship between the structure and function of biological networks constitutes a fundamental issue in systems biology. Particularly, the structure of protein-protein interaction networks is related to important biological functions. In this work, we investigated how such a resilience is determined by the large scale features of the respective networks. Four species are taken into account, namely yeast Saccharomyces cerevisiae, worm Caenorhabditis elegans, fly Drosophila melanogaster and Homo sapiens. We adopted two entropy-related measurements (degree entropy and dynamic entropy) in order to quantify the overall degree of robustness of these networks. We verified that while they exhibit similar structural variations under random node removal, they differ significantly when subjected to intentional attacks (hub removal). As a matter of fact, more complex species tended to exhibit more robust networks. More specifically, we quantified how six important measurements of the networks topology (namely clustering coefficient, average degree of neighbors, average shortest path length, diameter, assortativity coefficient, and slope of the power law degree distribution) correlated with the two entropy measurements. Our results revealed that the fraction of hubs and the average neighbor degree contribute significantly for the resilience of networks. In addition, the topological analysis of the removed hubs indicated that the presence of alternative paths between the proteins connected to hubs tend to reinforce resilience. The performed analysis helps to understand how resilience is underlain in networks and can be applied to the development of protein network models.
Resumo:
1,3-beta-Glucan depolymerizing enzymes have considerable biotechnological applications including biofuel production, feedstock-chemicals and pharmaceuticals. Here we describe a comprehensive functional characterization and low-resolution structure of a hyperthermophilic laminarinase from Thermotoga petrophila (TpLam). We determine TpLam enzymatic mode of operation, which specifically cleaves internal beta-1,3-glucosidic bonds. The enzyme most frequently attacks the bond between the 3rd and 4th residue from the non-reducing end, producing glucose, laminaribiose and laminaritriose as major products. Far-UV circular dichroism demonstrates that TpLam is formed mainly by beta structural elements, and the secondary structure is maintained after incubation at 90 degrees C. The structure resolved by small angle X-ray scattering, reveals a multi-domain structural architecture of a V-shape envelope with a catalytic domain flanked by two carbohydrate-binding modules. Crown Copyright (C) 2011 Published by Elsevier Inc. All rights reserved.
Resumo:
Sugarcane is an important crop that has recently become subject to attacks from the weevil Sphenophorus levis, which is not efficiently controlled with chemical insecticides. This demands the development of new control devices for which digestive physiology data are needed. In the present study, ion-exchange chromatography of S. levis whole midgut homogenates, together with enzyme assays with natural and synthetic substrates and specific inhibitors, demonstrated that a cysteine proteinase is a major proteinase, trypsin is a minor one and chymotrypsin is probably negligible. Amylase, maltase and the cysteine proteinase occur in the gut contents and decrease throughout the midgut; trypsin is constant in the entire midgut, whereas a membrane-bound aminopeptidase predominates in the posterior midgut. The cysteine proteinase was purified to homogeneity through ion-exchange chromatography. The purified enzyme had a mass of 37 kDa and was able to hydrolyze Z-Phe-Arg-MCA and Z-Leu-Arg-MCA with k(cat)/K(m) values of 20.0 +/- 1.1 mu M(-1) s(-1) and 30.0 +/- 0.5 mu M(-1) s(-1), respectively, but not Z-Arg-Arg-MCA. The combined results suggest that protein digestion starts in the anterior midgut under the action of a cathepsin L-like proteinase and ends on the surface of posterior midgut cells. All starch digestion takes place in anterior midgut. These data will be instrumental to developing S. levis-resistant sugarcane. (C) 2011 Elsevier Ltd. All rights reserved.
Resumo:
This Master’s Thesis examines transnational conflicts and Christian-Muslim relations in Nigeria between the years 2001 and 2006. It focuses on two major transnational conflicts: The September 11, 2001 attacks in the United States and the Danish cartoon controversy of 2005/2006. It discusses the impact of these transnational conflicts on Christian-Muslim relations in Nigeria in the light of the implementation of the Sharia Law in some northern Nigerian states and the improved access to the broadcast media and mobile telephone communication in Nigeria. By underscoring the relationship between transnational conflicts and the local context, this study provides a new perspective for understanding Christian-Muslim relations in Nigeria
Resumo:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
Resumo:
Vilhelm Ekelund och den fransk-italienska kultursfären: Några nedslag i de tidiga prosaverken – från Antikt ideal (1909) till Attiskt i fågelperspektiv (1919). (Vilhelm Ekelund and the French and Italian cultural heritage: A study of his early prose – from Antikt ideal (1909) to Attiskt i fågelperspektiv (1919)). The Swedish poet, essayist and aphorist Vilhelm Ekelund was not only influenced by German literature and philosophy, he also wrote extensive literary criticism on the subject of Romance language authors. This article discusses Ekelund’s relationship to some of the most influential French and Italian writers – as it can be seen in his work during the period 1909-1919. This relationship was ambiguous: he paid homage to French authors such as Montaigne, Montesquieu, Stendhal and Comte – as well as to the Italian poet and philosopher Leopardi – but he also severely criticized such distinguished writers as Baudelaire, Rousseau and Maupassant. One conclusion of this article is that the authors praised by Ekelund all venerate the Greek and Roman cultural heritage, whereas the despised novelists and poets were, in his opinion, either too “modern” or too “feminine” – both highly pejorative adjectives in the author’s terminology. It is also noted that Ekelund’s most ferocious attacks date from the first part of the decade, before he entered a more harmonic period with the works Metron (1918) and Attiskt i fågelperspektiv (1919).
Resumo:
The theme of family in literature and in popular discourse occurs at times when the family as an institution is under attack. Attacks against the family coupled with defence of the family are viewed as the barometer of people’s satisfaction with the society in which they live. This outpouring of emotion, whether it is in defence of or attacking the family, is the result of the family’s position on the bridge between nature and society – a fortunate (or a detrimental) link between an individual and the units that make up a society. Across the United States and much of the western world, the battle for gay marriage and inclusive civil unions has revealed the fissures in our collective moral view of the family. The conservative concern about the absence of ‘family values’ is magnified by our situation in a world of flux. Inflation, war, terrorist threats, and the depletion of natural resources are but a few examples. When so much is unknown, how do we position ourselves? What anchors us to the past, gives us comfort in the present, and supports us in the future if not the family? Alternatively, what coddles us more in the past, shackles us more to the present, and lulls us more into a fixed conception of the future than the family? My research is not a sociological survey into the family nor does it stake any claims to understanding the present state of the family in society. The study seeks, however, to shed light on the rhetorical uses of the family by analysing two novels that are inextricably concerned with the theory of the family in times of heightened social change. In particular, my research focuses upon the social role and political meaning of the family in Anna Karenina and Jia.
Resumo:
Esta dissertação apresenta o desenvolvimento de um novo algoritmo de criptografia de chave pública. Este algoritmo apresenta duas características que o tornam único, e que foram tomadas como guia para a sua concepção. A primeira característica é que ele é semanticamente seguro. Isto significa que nenhum adversário limitado polinomialmente consegue obter qualquer informação parcial sobre o conteúdo que foi cifrado, nem mesmo decidir se duas cifrações distintas correspondem ou não a um mesmo conteúdo. A segunda característica é que ele depende, para qualquer tamanho de texto claro, de uma única premissa de segurança: que o logaritmo no grupo formado pelos pontos de uma curva elíptica de ordem prima seja computacionalmente intratável. Isto é obtido garantindo-se que todas as diferentes partes do algoritmo sejam redutíveis a este problema. É apresentada também uma forma simples de estendê-lo a fim de que ele apresente segurança contra atacantes ativos, em especial, contra ataques de texto cifrado adaptativos. Para tanto, e a fim de manter a premissa de que a segurança do algoritmo seja unicamente dependente do logaritmo elíptico, é apresentada uma nova função de resumo criptográfico (hash) cuja segurança é baseada no mesmo problema.
Resumo:
A área de Detecção de Intrusão, apesar de muito pesquisada, não responde a alguns problemas reais como níveis de ataques, dim ensão e complexidade de redes, tolerância a falhas, autenticação e privacidade, interoperabilidade e padronização. Uma pesquisa no Instituto de Informática da UFRGS, mais especificamente no Grupo de Segurança (GSEG), visa desenvolver um Sistema de Detecção de Intrusão Distribuído e com características de tolerância a falhas. Este projeto, denominado Asgaard, é a idealização de um sistema cujo objetivo não se restringe apenas a ser mais uma ferramenta de Detecção de Intrusão, mas uma plataforma que possibilite agregar novos módulos e técnicas, sendo um avanço em relação a outros Sistemas de Detecção atualmente em desenvolvimento. Um tópico ainda não abordado neste projeto seria a detecção de sniffers na rede, vindo a ser uma forma de prevenir que um ataque prossiga em outras estações ou redes interconectadas, desde que um intruso normalmente instala um sniffer após um ataque bem sucedido. Este trabalho discute as técnicas de detecção de sniffers, seus cenários, bem como avalia o uso destas técnicas em uma rede local. As técnicas conhecidas são testadas em um ambiente com diferentes sistemas operacionais, como linux e windows, mapeando os resultados sobre a eficiência das mesmas em condições diversas.
Resumo:
In this paper we look at various alternatives for monetary regimes: dollarization, monetary union and local currency. We use an extension of the debt crisis model of Cole and Kehoe ([3], [4] and [5]), although we do not necessarily follow their sunspot interpretation. Our focus is to appraise the welfare of a country which is heavily dependent on international capital due to low savings, for example, and might suffer a speculative attack on its external public debt. We study the conditions under which countries will be better off adopting each one of the regimes described above. If it belongs to a monetary union or to a local currency regime, a default may be avoided by an ination tax on debt denominated in common or local currency, respectively. Under the former regime, the decision to inate depends on each member country's political inuence over the union's central bank, while, in the latter one, the country has full autonomy to decide about its monetary policy. The possibility that the government inuences the central bank to create ination tax for political reasons adversely affects the expected welfare of both regimes. Under dollarization, ination is ruled out and the country that is subject to an external debt crisis has no other option than to default. Accordingly, one of our main results is that shared ination control strengthens currencies and a common-currency regime is superior in terms of expected welfare to the local-currency one and to dollarization if external shocks that member countries suffer are strongly correlated to each other. On the other hand, dollarization is dominant if the room for political ination under the alternative regime is high. Finally, local currency is dominant if external shocks are uncorrelated and the room for political pressure is mild. We nish by comparing Brazil's and Argentina's recent experiences which resemble the dollarization and the local currency regimes, and appraising the incentives that member countries would have to unify their currencies in the following common markets: Southern Common Market, Andean Community of Nations and Central American Common Market.