874 resultados para resistance against malicious auditors
Resumo:
RTSV is one of two viruses that cause tungro disease. RTSV is independently transmitted, whereas the other virus, rice tungro bacilliform virus (RTBV), is dependent on RTSV for its transmission by the green leafhopper (GLH), Nephotettix virescens. The occurrence and spread of tungro disease therefore depend on the presence of RTSV in the field. Resistance to RTSV infection would slow down the spread of the disease.
Resumo:
Resistance to rice virus diseases is an important requirement in many Southeast Asian rice breeding programs. Inheritance of resistance to rice tungro spherical virus (RTSV) in TW5, a near-isogenic line derived from Indonesian rice cultivar Utri Merah, was compared to that in TKM6, an Indian rice cultivar. Both TKM6 and Utri Merah are cultivars resistant to RTSV infections. Crosses were made between TKM6 and TN1, a susceptible cultivar, and between TW5 and TN1, and F3 lines were evaluated for their resistance to RTSV using two RTSV inoculum sources and a serological assay (ELISA). In TKM6, the resistance to the mixture of RTSV-V + RTBV inoculum source was controlled by a single recessive gene, whereas in TW5, the resistance was controlled by two recessive genes. A single recessive gene, however, controlled the resistance in TW5 when another RTSV variant, RTSV-VI, was used, suggesting that the resistance in TW5 depends on the nature of the RTSV inoculum used. RT-PCR, sequence, and phylogenetic analyses confirmed that RTSV-VI inoculum differs from RTSV-V inoculum and accurate phenotyping of the resistance to RTSV requires the use of a genetic marker.
Resumo:
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a client to solve some moderately hard problem before being granted access to a resource. However, recent client puzzle difficulty definitions (Stebila and Ustaoglu, 2009; Chen et al., 2009) do not ensure that solving n puzzles is n times harder than solving one puzzle. Motivated by examples of puzzles where this is the case, we present stronger definitions of difficulty for client puzzles that are meaningful in the context of adversaries with more computational power than required to solve a single puzzle. A protocol using strong client puzzles may still not be secure against DoS attacks if the puzzles are not used in a secure manner. We describe a security model for analyzing the DoS resistance of any protocol in the context of client puzzles and give a generic technique for combining any protocol with a strong client puzzle to obtain a DoS-resistant protocol.
Resumo:
From September 2000 to June 2003, a community-based program for dengue control using local predacious copepods of the genus Mesocyclops was conducted in three rural communes in the central Vietnam provinces of Quang Nam, Quang Ngai, and Khanh Hoa. Post-project, three subsequent entomologic surveys were conducted until March 2004. The number of households and residents in the communes were 5,913 and 27,167, respectively, and dengue notification rates for these communes from 1996 were as high as 2,418.5 per 100,000 persons. Following knowledge, attitude, and practice evaluations, surveys of water storage containers indicated that Mesocyclops spp. already occurred in 3-17% and that large tanks up to 2,000 liters, 130-300-liter jars, wells, and some 220-liter metal drums were the most productive habitats for Aedes aegypti. With technical support, the programs were driven by communal management committees, health collaborators, schoolteachers, and pupils. From quantitative estimates of the standing crop of third and fourth instars from 100 households, Ae. aegypti were reduced by approximately 90% by year 1, 92.3-98.6% by year 2, and Ae. aegypti immature forms had been eliminated from two of three communes by June 2003. Similarly, from resting adult collections from 100 households, densities were reduced to 0-1 per commune. By March 2004, two communes with no larvae had small numbers but the third was negative; one adult was collected in each of two communes while one became negative. Absolute estimates of third and fourth instars at the three intervention communes and one left untreated had significant correlations (P = 0.009-< 0.001) with numbers of adults aspirated from inside houses on each of 15 survey periods. By year 1, the incidence of dengue disease in the treated communes was reduced by 76.7% compared with non-intervention communes within the same districts, and no dengue was evident in 2002 and 2003, compared with 112.8 and 14.4 cases per 100,000 at district level. Since we had similar success in northern Vietnam from 1998 to 2000, this study demonstrates that this control model is broadly acceptable and achievable at community level but vigilance is required post-project to prevent reinfestation.
Resumo:
In December 2006, the Engineering and Technology Group of Queensland’s Department of Main Roads entered into a three-year skid resistance management research project with QUT Faculty of Built Environment and Engineering researchers and the QUT-based CRC for Integrated Engineering Asset Management (CIEAM). CIEAM undertakes a broad range of asset management research in the areas of defence, utilities, transportation and industrial processes. “The research project is an important activity of Main Roads’ Skid Resistance Management Plan published in June 2006.” said Main Roads project leader Mr Justin Weligamage. “The intended project output is a decision-support model for use by Road Asset Managers throughout a road network. The research objective is to enable road asset managers to better manage the surfacing condition of the road asset with specific focus on skid resistance,” said QUT project leader Professor Arun Kumar. The research project will review existing skid resistance investigatory levels, develop a risk-based method to establish skid resistance investigatory levels and improve the decision support methodology in order to minimise crashes. The new risk-based approach will be used to identify locations on the Queensland state-controlled road network that may have inadequate skid resistance. Once a high risk site is identified, the appropriate remedial action will be decided on. This approach will allow road asset managers to target optimal remedial actions, reducing the incidence and severity of crashes where inadequate skid resistance is a contributing cause.
Resumo:
A system for agroinoculating rice tungro bacilliform virus (RTBV), one of the two viruses of the rice tungro disease complex, has been optimised. A nontumour-inducing strain of Agrobacterium (pGV3850) was used in order to conform with biosafety regulations. Fourteen-day-old seedlings survived the mechanical damage of the technique and were still young enough to support virus replication. The level of the bacterial inoculum was important to obtain maximum infection, with a high inoculum level (0.5 × 1012 cells/ml) resulting in up to 100% infection of a susceptible variety that was comparable with infection by insect transmission. Agroinoculation with RTBV was successful for all three rice cultivarss tested; TN1 (tungro susceptible), Balimau Putih (tungro tolerant), and IR26 (RTSV and vector resistant). Agroinoculation enables resistance to RTBV to be distinguished from resistance to the leafhopper vector of the virus, and should prove useful in screening rice germplasm, breeding materials, and transgenic rice lines.
Resumo:
Road accidents are of great concerns for road and transport departments around world, which cause tremendous loss and dangers for public. Reducing accident rates and crash severity are imperative goals that governments, road and transport authorities, and researchers are aimed to achieve. In Australia, road crash trauma costs the nation A$ 15 billion annually. Five people are killed, and 550 are injured every day. Each fatality costs the taxpayer A$1.7 million. Serious injury cases can cost the taxpayer many times the cost of a fatality. Crashes are in general uncontrolled events and are dependent on a number of interrelated factors such as driver behaviour, traffic conditions, travel speed, road geometry and condition, and vehicle characteristics (e.g. tyre type pressure and condition, and suspension type and condition). Skid resistance is considered one of the most important surface characteristics as it has a direct impact on traffic safety. Attempts have been made worldwide to study the relationship between skid resistance and road crashes. Most of these studies used the statistical regression and correlation methods in analysing the relationships between skid resistance and road crashes. The outcomes from these studies provided mix results and not conclusive. The objective of this paper is to present a probability-based method of an ongoing study in identifying the relationship between skid resistance and road crashes. Historical skid resistance and crash data of a road network located in the tropical east coast of Queensland were analysed using the probability-based method. Analysis methodology and results of the relationships between skid resistance, road characteristics and crashes are presented.
Resumo:
Road crashes cost world and Australian society a significant proportion of GDP, affecting productivity and causing significant suffering for communities and individuals. This paper presents a case study that generates data mining models that contribute to understanding of road crashes by allowing examination of the role of skid resistance (F60) and other road attributes in road crashes. Predictive data mining algorithms, primarily regression trees, were used to produce road segment crash count models from the road and traffic attributes of crash scenarios. The rules derived from the regression trees provide evidence of the significance of road attributes in contributing to crash, with a focus on the evaluation of skid resistance.
Resumo:
Genetic variation is the resource animal breeders exploit in stock improvement programs. Both the process of selection and husbandry practices employed in aquaculture will erode genetic variation levels overtime, hence the critical resource can be lost and this may compromise future genetic gains in breeding programs. The amount of genetic variation in five lines of Sydney Rock Oyster (SRO) that had been selected for QX (Queensland unknown) disease resistance were examined and compared with that in a wild reference population using seven specific SRO microsatellite loci. The five selected lines had significantly lower levels of genetic diversity than did the wild reference population with allelic diversity declining approximately 80%, but impacts on heterozygosity per locus were less severe. Significant deficiencies in heterozygotes were detected at six of the seven loci in both mass selected lines and the wild reference population. Against this trend however, a significant excess of heterozygotes was recorded at three loci Sgo9, Sgo14 and Sgo21 in three QX disease resistant lines (#2, #5 and #13). All populations were significantly genetic differentiated from each other based on pairwise FST values. A neighbour joining tree based on DA genetic distances showed a clear separation between all culture and wild populations. Results of this study show clearly, that the impacts of the stock improvement program for SRO has significantly eroded natural levels of genetic variation in the culture lines. This could compromise long-term genetic gains and affect sustainability of the SRO breeding program over the long-term.
Resumo:
Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial off-the-shelf NIDS to function normally in a VPN without any modification. One of the features of the proposed framework is that it does not compromise on the confidentiality afforded by the VPN. Our work uses a combination of Shamir’s secret-sharing scheme and randomised network proxies to securely route network traffic to the NIDS for analysis. The detection framework is effective against two general classes of attacks – attacks targeted at the network hosts or attacks targeted at framework itself. We implement the detection framework as a prototype program and evaluate it. Our evaluation shows that the framework does indeed detect these classes of attacks and does not introduce any additional false positives. Despite the increase in network overhead in doing so, the proposed detection framework is able to consistently detect intrusions through encrypted networks.
Resumo:
This paper seeks to assimilate Queer Theory: that is, to bring it within the gambit of a ‘mainstream’ or ‘dominant’ space: the academy. It does so by historicising Queer Theory, and investigating, if not what it is, then at least what it has been. This makes it possible to engage critically with Queer Theory. Suggesting that Queer Theory has often employed tropes of assimilation, the paper turns to another cultural site at which such language is popular - science fiction - in order to investigate the assumption of these metaphors. It goes on to suggest some of the assumptions about cultures which underlie these metaphors. Finally, it points to other sites in Queer Theory which undermines these assumptions, and provide other ways - quite uninterested in assimilation - in which to think Queer.
Resumo:
In 1986 the then United States Secretary of State George Shultz asserted that: It is absurd to argue that international law prohibits us from capturing terrorists in international waters or airspace; from attacking them on the soil of other nations, even for the purpose of rescuing hostages; or from using force against states that support, train and harbor terrorists or guerrillas. At that time the United States’ claim of a right to use military force in self-defence against terrorism2 received little support from other states.3 The predominant view then was that terrorist attacks committed by private or non-state actors were a form of criminal activity to be combated through domestic and international criminal justice mechanisms. The notion that such terrorist acts should be treated as ‘armed attacks’ triggering a victim state’s right of self-defence was not accepted by the majority of states. To suggest, as Shultz had done, that a state not directly responsible for terrorist acts could have its territorial integrity violated by military action targeting terrorists located within that state, was a controversial proposition in 1986. However, some fifteen years later, when the United States and a coalition of allies launched a military campaign in Afghanistan following the 11 September 2001 (hereafter ‘9/11’) terrorist attacks, there was virtually unanimous international support for the use of force.
Resumo:
The development of vaccines to combat pathogens that infect across mucosal surfaces has been a major goal of vaccine research. Successful mucosal vaccination requires the co-administration of adjuvants that can overcome the state of immune tolerance normally associated with mucosal application of proteins. In the case of oral immunization, delivery systems are also required to protect vaccine antigens against destruction by gastric pH and digestive enzymes. Furthermore, adjuvants used for mucosal delivery must be free of neurotoxic effects like those induced by the commonly used experimental mucosal adjuvant cholera toxin. Maintenance of the "cold chain" is also essential for the effectiveness of any vaccine and adjuvants/delivery systems that enhance the stability of a vaccine would offer a significant advantage. Needle-free methods of vaccination that induce protective immunity at multiple mucosal surfaces are also desirable for rapid vaccination of large populations. In the present study we show that transcutaneous immunization (TCI) using Lipid C, a novel lipid-based matrix originally developed for oral immunization, containing soluble Helicobacter sonicate significantly reduces the gastric bacterial burden in mice following gastric challenge with live Helicobacter pylori. Protection is associated with the production of splenic gamma interferon and gastric IgA and was achieved without the co-administration of potent and potentially toxic adjuvants, although protection was further enhanced by inclusion of CpG-ODN and cholera toxin in the lipid delivery system.