785 resultados para Forgery attacks
Resumo:
El Mapa de la Vida (Adolfo García Ortega, 2009) e El Corrector (Ricardo Menéndez Salmón, 2009), são dois romances contemporâneos que polarizam a discursividade literária acerca da experiência dos atentados a 11 de Março de 2004, na capital espanhola. O artigo propõe-se a questionar as diferentes representações literárias da cidade de Madrid num contexto de ansiedades e inseguranças, potencializado por esse acontecimento, através de uma reflexão que identifique as proximidades e singularidades com representações de diferentes naturezas: Haverá um discurso de uma identidade própria e local, ou de uma identificação e apropriação global (nomeadamente em relação ao 11 de Setembro)? E as representações literárias dialogam com outros média narrativos (as artes visuais e performativas), ou, pelo contrário, as suas vozes e silêncios são específicos de uma expressão literária? Deste modo, pretende-se que seja estabelecida uma rede de relações entre diferentes discursos sobre a construção da cidade (Madrid em primeiro plano) enquanto espaço da experiência do terror.
Resumo:
Preprint version
Resumo:
Este artículo plantea que, para poder actualizar la agenda internacional del Ecuador, se torna necesario considerar los cambios drásticos experimentados en las relaciones internacionales durante la última década. De manera particular, se debe contemplar que la caída del Muro de Berlín significó la imposición rigurosa del liberalismo económico y, a su vez, que los atentados del 11 de septiembre de 2001 implican la imposición de una ideología guiada por la lucha antiterrorista. Todo esto influye en labor de la Cancillería con relación a la cooperación internacional, organismos bilaterales y multilaterales. Finalmente, se definen temas prioritarios tales como el fortalecimiento a la democracia, seguridad, la lucha contra la corrupción, la migración, Derechos Humanos, medio ambiente, terrorismo y narcotráfico.
Resumo:
Las causas por las cuales se puede decretar el estado de emergencia han variado en el tiempo según las circunstancias de cada época y de cada país. Dichas situaciones de emergencia pueden obedecer a causas naturales o humanas. Pueden producirse por fenómenos físicos o climatológicos, por conmociones interiores, ataques exteriores, o incluso por desequilibrios económicos o sociales sectoriales o generales. Y, para hacer frente a estos estados excepcionales, el derecho internacional ha delimitado una serie de principios que deben ser respetados por los gobiernos locales.
Resumo:
This article analyses the counter-terrorist operations carried out by Captain (later Major General) Orde Wingate in Palestine in 1938, and considers whether these might inform current operations. Wingate's Special Night Squads were formed from British soldiers and Jewish police specifically to counter terrorist and sabotage attacks. Their approach escalated from interdicting terrorist gangs to pre-emptive attacks on suspected terrorist sanctuaries to reprisal attacks after terrorist atrocities. They continued the British practice of using irregular units in counter-insurgency, which was sustained into the postwar era and contributed to the evolution of British Special Forces. Wingate's methods proved effective in pacifying terrorist-infested areas and could be applied again, but only in the face of 'friction' arising from changes in cultural attitudes since the 1930s, and from the political-strategic context of post-2001 counter-insurgent and counter-terrorist operations. In some cases, however, public opinion might not preclude the use of some of Wingate's techniques.
Resumo:
1. Insect predators often aggregrate to patches of high prey density and use prey chemicals as cues for oviposition. If prey have mutualistic guardians such as ants, however, then these patches may be less suitable for predators. 2. Ants often tend aphids and defend them against predators such as ladybirds. Here, we show that ants can reduce ladybird performance by destroying eggs and physically attacking larvae and adults. 3. Unless ladybirds are able to defend against ant attacks they are likely to have adaptations to avoid ants. We show that Adalia bipunctata ladybirds not only move away from patches with Lasius niger ants, but also avoid laying eggs in these patches. Furthermore, ladybirds not only respond to ant presence, but also detect ant semiochemicals and alter oviposition strategy accordingly. 4. Ant semiochemicals may signal the extent of ant territories allowing aphid predators to effectively navigate a mosaic landscape of sub-optimal patches in search of less well-defended prey. Such avoidance probably benefits both ants and ladybirds, and the semiochemicals could be regarded as a means of cooperative communication between enemies. 5. Overall, ladybirds respond to a wide range of positive and negative oviposition cues that may trade-off with each other and internal motivation to determine the overall oviposition strategy.
Resumo:
Emerging parasitoids of aphids encounter secondary plant chemistry from cues left by the mother parasitoid at oviposition and from the plant-feeding of the host aphid. In practice, however, it is secondary plant cheinistry oil the Surface of the aphid mummy which influences parasitoid olfactory behaviour. Offspring of Aphidius colemani reared oil Myzus persicae on artificial diet did no distinguish between the odours of bean and cabbage, but showed a clear preference for cabbage odour if sinigrin had been painted oil the back of the mummy. Similarly Aphidius rhopalosiphi reared on Metopolophium dirhodum on wheat preferred the odour of wheat plants grown near tomato plants to odour of wheat alone if the wheat plants oil which they had been reared had been exposed to the volatiles of nearby tomato plants. Aphidius rhopalosiphi reared on M dirhodum, and removed from the mummy before emergence, showed a preference for the odour of a different wheat cultivar if they had contacted a mummy from that cultivar, and similar results were obtained with A. colemani naturally emerged from M. persicae mummies. Aphidius colemani emerged from mummies oil one crucifer were allowed to contact in sequence (for 45 min each) mummies from two different crucifers. The mumber of attacks made in 10 min oil M. persicae was always significantly higher when aphids were feeding oil the same plant as the origin of the last MUMMY offered, or oil the second plant if aphids feeding on the third plant were not included. Chilling emerged A. colemani for 24 h at 5 degrees C appeared to erase the imprint of secondary plant chemistry, and they no longer showed host plant odour preferences in the olfactometer. When the parasitoids were chilled after three Successive mummy experiences, memory of the last experience appeared at least temporarily erased and preference was then shown for the chemistry of the second experience.
Resumo:
The development of cancer in humans and animals is a multistep process. The complex series of cellular and molecular changes participating in cancer development are mediated by a diversity of endogenous and exogenous stimuli. One type of endogenous damage is that arising from intermediates of oxygen (dioxygen) reduction - oxygen-free radicals (OFR), which attacks not only the bases but also the deoxyribosyl backbone of DNA. Thanks to improvements in analytical techniques, a major achievement in the understanding of carcinogenesis in the past two decades has been the identification and quantification of various adducts of OFR with DNA. OFR are also known to attack other cellular components such as lipids, leaving behind reactive species that in turn can couple to DNA bases. Endogenous DNA lesions are genotoxic and induce mutations. The most extensively studied lesion is the formation of 8-OH-dG. This lesion is important because it is relatively easily formed and is mutagenic and therefore is a potential biomarker of carcinogenesis. Mutations that may arise from formation of 8-OH-dG involve GC. TA transversions. In view of these findings, OFR are considered as an important class of carcinogens. The effect of OFR is balanced by the antioxidant action of non-enzymatic antioxidants as well as antioxidant enzymes. Non-enzymatic antioxidants involve vitamin C, vitamin E, carotenoids (CAR), selenium and others. However, under certain conditions, some antioxidants can also exhibit a pro-oxidant mechanism of action. For example, beta-carotene at high concentration and with increased partial pressure of dioxygen is known to behave as a pro-oxidant. Some concerns have also been raised over the potentially deleterious transition metal ion-mediated (iron, copper) pro-oxidant effect of vitamin C. Clinical studies mapping the effect of preventive antioxidants have shown surprisingly little or no effect on cancer incidence. The epidemiological trials together with in vitro experiments suggest that the optimal approach is to reduce endogenous and exogenous sources of oxidative stress, rather than increase intake of anti-oxidants. In this review, we highlight some major achievements in the study of DNA damage caused by OFR and the role in carcinogenesis played by oxidatively damaged DNA. The protective effect of antioxidants against free radicals is also discussed.
Resumo:
Olive oil is a key component of the traditional Mediterranean diet; a diet that may explain the low rate of cardiovascular disease (CVD) in Southern European. (Extra virgin) Olive oil is a good source of monounsaturated fatty acids (MUFA) and phenolic compounds, both of which have been investigated for their effects on plasma lipids and lipoproteins, measures of oxidation and factors related to thrombosis. This issue aims to summarise the current understanding of the effects of such dietary components on the haemostatic system and subsequent risk of CVD. To date, evidence suggests that diets rich in MUFA and thus in olive oil attenuate the thrombotic response via a reduction in platelet aggregation and in postprandial FVII levels. Thrombosis is a key event in causing heart attacks and strokes, which if modulated by diet could pose a cost-effective way of reducing CVD incidence in populations that adhere to MUFA/olive oil-rich diets long-term.
Resumo:
Complement-mediated inflammation exacerbates the tissue injury of ischaemic necrosis in heart attacks and strokes, the most common causes of death in developed countries. Large infarct size increases immediate morbidity and mortality and, in survivors of the acute event, larger non-functional scars adversely affect long-term prognosis. There is thus an important unmet medical need for new cardioprotective and neuroprotective treatments. We have previously shown that human C-reactive protein (CRP), the classical acute-phase protein that binds to ligands exposed in damaged tissue and then activates complement(1), increases myocardial and cerebral infarct size in rats subjected to coronary or cerebral artery ligation, respectively(2,3). Rat CRP does not activate rat complement, whereas human CRP activates both rat and human complement(4). Administration of human CRP to rats is thus an excellent model for the actions of endogenous human CRP2,3. Here we report the design, synthesis and efficacy of 1,6-bis(phosphocholine)-hexane as a specific small-molecule inhibitor of CRP. Five molecules of this palindromic compound are bound by two pentameric CRP molecules, crosslinking and occluding the ligand-binding B-face of CRP and blocking its functions. Administration of 1,6-bis(phosphocholine)-hexane to rats undergoing acute myocardial infarction abrogated the increase in infarct size and cardiac dysfunction produced by injection of human CRP. Therapeutic inhibition of CRP is thus a promising new approach to cardioprotection in acute myocardial infarction, and may also provide neuroprotection in stroke. Potential wider applications include other inflammatory, infective and tissue-damaging conditions characterized by increased CRP production, in which binding of CRP to exposed ligands in damaged cells may lead to complement-mediated exacerbation of tissue injury.
Resumo:
Threatening intrusive images are central to posttraumatic stress disorder. It has been suggested that intrusive imagery in the context of a sense of threat leads to the development and persistence of posttraumatic stress symptoms. This study investigates London school children's (N = 76; age 10-11 years) self-reported posttraumatic stress symptoms in response to viewing the attacks of September 11, 2001 on television. Assessments were made at two time points. A minority of participants reported moderate-severe symptoms with functional impairment at 2 months (14.5%) and 6 months (9.2%) after viewing the September 11events. After controlling for symptom stability, persistent symptoms were associated with peri-traumatic factors, notably perceiving that one's life was in danger. The combined effect of intrusive imagery and peri-traumatic life threat was associated with symptom persistence. Assessments of intrusive image content via checklist and free-report indicated that the images were directly related to September 11 and were fairly stable over time. Implications for treating children's intrusive images following stressful events are explored. (C) 2007 Elsevier Ltd. All rights reserved.
Resumo:
This paper represents the first step in an on-going work for designing an unsupervised method based on genetic algorithm for intrusion detection. Its main role in a broader system is to notify of an unusual traffic and in that way provide the possibility of detecting unknown attacks. Most of the machine-learning techniques deployed for intrusion detection are supervised as these techniques are generally more accurate, but this implies the need of labeling the data for training and testing which is time-consuming and error-prone. Hence, our goal is to devise an anomaly detector which would be unsupervised, but at the same time robust and accurate. Genetic algorithms are robust and able to avoid getting stuck in local optima, unlike the rest of clustering techniques. The model is verified on KDD99 benchmark dataset, generating a solution competitive with the solutions of the state-of-the-art which demonstrates high possibilities of the proposed method.
Resumo:
The major technical objectives of the RC-NSPES are to provide a framework for the concurrent operation of reactive and pro-active security functions to deliver efficient and optimised intrusion detection schemes as well as enhanced and highly correlated rule sets for more effective alerts management and root-cause analysis. The design and implementation of the RC-NSPES solution includes a number of innovative features in terms of real-time programmable embedded hardware (FPGA) deployment as well as in the integrated management station. These have been devised so as to deliver enhanced detection of attacks and contextualised alerts against threats that can arise from both the network layer and the application layer protocols. The resulting architecture represents an efficient and effective framework for the future deployment of network security systems.
Resumo:
We have discovered a novel approach of intrusion detection system using an intelligent data classifier based on a self organizing map (SOM). We have surveyed all other unsupervised intrusion detection methods, different alternative SOM based techniques and KDD winner IDS methods. This paper provides a robust designed and implemented intelligent data classifier technique based on a single large size (30x30) self organizing map (SOM) having the capability to detect all types of attacks given in the DARPA Archive 1999 the lowest false positive rate being 0.04 % and higher detection rate being 99.73% tested using full KDD data sets and 89.54% comparable detection rate and 0.18% lowest false positive rate tested using corrected data sets.
Resumo:
The European Union sees the introduction of the ePassport as a step towards rendering passports more secure against forgery while facilitating more reliable border controls. In this paper we take an interdisciplinary approach to the key security and privacy issues arising from the use of ePassports. We further anallyse how European data protection legislation must be respected and what additional security measures must be integrated in order to safeguard the privacy of the EU ePassport holder.