834 resultados para INTRUSION


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation present an analysis of the interethnic conflict between Makuxi and Wapixana at the current moment in the Maloca of the Adobe, Aboriginal Land Fox-Mountain range of the Sun, in the State of Roraima. The theoretical field was boarded in the Ethnology, pursuing situations in local history, with edges in ethno-history. The research elapsed of the deepening necessity on the social relations and aboriginal politics, for the intercultural professional exercise of educator, appealing the bibliographical survey and participant comment as method; not directive interviews, photographs, filmings and daily register in of field, as techniques carried through in the period of 2006 to 2007. Although to inhabit in the same area and to establish marriages between itself, individuals and groups express tensions, aggravated with the landmark and legal recognition of the area, which generated inter dispute and intraetnias, mainly with the intrusion of farmers, rizicultores and the form of governmental influence. A relation of rivalry, individual and collective was evidenced, suggesting the strengthenig and not it fractionly, of the fights external politics, interns and in way to the cultural diversity and social adversity

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cette étude de clientèle avait comme premier objectif de décrire les caractéristiques personnelles et familiales pour l'ensemble des jeunes qui séjournent en foyer de groupe au Centre jeunesse de l'Estrie. Le deuxième objectif de cette étude était de d'identifier les caractéristiques personnelles et familiales des jeunes des foyers de groupe inscrits au programme des familles d'accueil associées. Les jeunes qui ont participé à cette étude ont été recrutés dans les trois foyers de groupe du Centre jeunesse de l'Estrie. La proportion des jeunes qui ont accepté de participer est de 88%. Au total, 22 jeunes soit 15 adolescents et 7 adolescentes âgés entre 12 et 17 ans ont été rencontrés dans le cadre d'une entrevue structurée pour répondre à nos questionnaires. Différents types de questionnaires ont été utilisés pour évaluer les caractéristiques sociofamiliales et personnelles de ces jeunes. Ces questionnaires portaient sur la composition de la famille, les relations parents-enfant (qualité de la relation, fréquence des contacts, soins et surprotection reçus), la violence conjugale, la présence de problèmes avec la justice, de consommation d'alcool ou de drogue chez les membres de la famille, les problèmes de comportement des jeunes, leur consommation d'alcool et de psychotropes, leur cheminement scolaire, leur histoire de placement, la composition de leur réseau social de soutien, la présence d'idéations suicidaires, d'abus sexuels et la violence qu'ils ont subie par les pairs et les adultes. Les principaux résultats obtenus nous apprennent que ces jeunes ont en moyenne 14,8 ans. La proportion de garçons placés en foyer de groupe est plus élevée (68,2%) que la proportion de filles (31,8%). La moitié des jeunes (50%) perçoivent présenter des troubles de comportements extériorisés (agirs délinquants, comportements agressifs). La proportion des jeunes qui présentent des troubles intériorisés (retrait social, complaintes somatiques, anxiété et dépression) est presque aussi élevée (45,5%). Cette constatation nous amène à nous préoccuper de l'importance accordée à ce type de troubles dans le suivi clinique des jeunes puisque ces troubles passent souvent inaperçus lorsqu'ils sont accompagnés d'agirs délinquants ou agressifs chez le jeune ou chez les autres jeunes du foyer de groupe. De plus, 31,8% des jeunes perçoivent présenter des troubles de comportements intériorisés et extériorisés. Du côté de la consommation de psychotropes, 95,2% des jeunes avouent en avoir déjà fait usage au cours de leur vie. De ce nombre, 65% des jeunes avouent en consommer sur une base occasionnelle et seulement 33,3% avouent en consommer sur une base régulière. Par ailleurs, ces jeunes ont un faible réseau social de soutien; ils ont en moyenne 6,3 personnes autour d'eux réparties dans 2,8 catégories. Les caractéristiques du passé des jeunes placés en foyer de groupe révèlent qu'ils ont vécu des événements lourds de conséquence. Tout d'abord, l'âge moyen des jeunes au premier placement est de 9,5 ans. Ils ont cumulé en moyenne 53,6 mois en milieux substituts et ils ont connu 6,1 milieux différents. La proportion des jeunes ayant des idéations suicidaires s'élève à 40,9%. Parmi les adolescentes interrogées, 71,4% ont vécu au moins un épisode d'abus sexuel. Une proportion de 40,9% des jeunes rapportent avoir subi de la violence d'une intensité importante (score de 10 points sur une possibilité de 20) de la part des adultes qui se sont occupés d'eux. Aussi, ces jeunes ont un passé scolaire empreint d'échec: 86,4% des jeunes ont doublé au moins une armée scolaire. De plus, ces jeunes fréquentent un centre de jour depuis 35,8 mois en moyenne. Enfin, 71,4 % des jeunes ont le projet de compléter au moins leurs études secondaires. L'étude des caractéristiques familiales nous apprend que la plupart des jeunes (81,8%) ont maintenu un contact fréquent avec au moins un parent. La moitié des jeunes désignent leur mère dans leur réseau social de soutien. En fait, les jeunes ont une meilleure relation avec leur mère qu'avec leur père. La relation avec leur père est soit détériorée ou absente pour la majorité des jeunes. Cependant, la qualité de la relation avec la mère est passable. En fait, la moitié des répondants (52,6%) ont reçu dans leur enfance des soins insatisfaisants de la part d'au moins un parent et ils ont aussi subi de la surprotection (80%) c'est-à-dire du contrôle, de l'intrusion ou du maintien de comportements dépendants de la part de leur parent. Enfin, la majorité des jeunes (68,2%) proviennent d'une famille non traditionnelle (soit monoparentale ou recomposée). Une proportion de 52,4% des jeunes ont été témoins assez fréquemment de violence conjugale. De plus, les familles de ces jeunes comptent au moins un membre de la famille aux prises avec des problèmes de justice (68,2%) et des problèmes de consommation de drogues (45,5%). Le deuxième objectif de cette étude visait à identifier les caractéristiques plus spécifiques d'un sous-groupe de jeunes qui participent déjà au nouveau projet de familles d'accueil associées. Quatre jeunes (groupe 2) avaient été ciblés à cause de leur difficulté d'insertion dans un milieu plus normalisant. Ces jeunes ont cumulé plusieurs échecs de placement vers des familles d'accueil. Les caractéristiques qui les distinguent des autres jeunes qui ne participent pas au programme (groupe 1) sont essentiellement liées à leur histoire de placement. Tout d'abord, ils étaient beaucoup plus jeunes au moment du premier placement (groupe 1= 10,8 ans, groupe 2= 3,8 ans). Ils ont connu 9 milieux substituts différents alors que les autres n'en ont connu que 5,4. Ils ont séjourné 105 mois en milieux substituts comparativement aux autres jeunes qui ont cumulé en moyenne 42,2 mois en milieux substituts. Aussi, la proportion du temps passé en milieux substituts au cours de leur vie est plus élevée (61,4%) chez les jeunes inscrits au programme que chez les autres jeunes des foyers de groupe qui ne sont pas inscrits dans ce programme (23,6%).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis. This includes data related to: Host, Network, Session, Asset, Alert and Protocols. Security Onion can be implemented as a standalone deployment with server and sensor included or with a master server and multiple sensors allowing for the system to be scaled as required. Many interfaces and tools are available for management of the system and analysis of data such as Sguil, Snorby, Squert and Enterprise Log Search and Archive (ELSA). These interfaces can be used for analysis of alerts and captured events and then can be further exported for analysis in Network Forensic Analysis Tools (NFAT) such as NetworkMiner, CapME or Xplico. The Security Onion platform also provides various methods of management such as Secure SHell (SSH) for management of server and sensors and Web client remote access. All of this with the ability to replay and analyse example malicious traffic makes the Security Onion a suitable low cost alternative for Network Security Management. In this paper, we have a feature and functionality review for the Security Onion in terms of: types of data, configuration, interface, tools and system management.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Le tournant du siècle marque les véritables débuts de la médecine dite préventive. En effet, la révolution pasteurienne donne naissance à l'hygiène qui permet désormais aux médecins d'envahir de nouveaux champs auxquels ces derniers accordaient peu d'intérêt dans le passé. Parmi ces nouveaux champs, on retrouve l'obstétrique et la puériculture. C'est la mortalité infantile qui justifie cette intrusion et qui conduit les médecins-hygiénistes à intervenir auprès des femmes en ce qui a trait à leur fonction maternelle. Comme l'ensemble des pays industrialisés de cette époque, le Québec possède un taux de mortalité infantile fort élevé, constat qui conditionne les médecins à encadrer par différents moyens la maternité. On assiste durant cette période, qui s'étend de la fin du dix-neuvième siècle et qui va jusqu'au milieu du vingtième, à l'élaboration progressive d'un discours auquel se rattache un ensemble de prescriptions touchant directement les femmes en tant que mères. C'est ainsi que s'établit peu à peu une norme pour la femme qui consiste à consulter systématiquement un médecin durant la période de la grossesse, ainsi qu'après l'accouchement, pour permettre le suivi médical de la mère et du nourrisson et ce, toujours dans le but premier de diminuer la mortalité infantile. Cependant, pour des raisons financières ou relevant simplement de la tradition, plusieurs femmes refusent de consulter un médecin, du moins en d'autres temps qu'au moment précis de l'accouchement…

Relevância:

10.00% 10.00%

Publicador:

Resumo:

O presente estudo aborda a reabsorção radicular como resultado do tratamento ortodôntico, apontando variáveis mecânicas e biológicas responsáveis pelo processo tais como idade, género, trauma, anatomia dentária, agenesias, tipo de forças ortodônticas e tempo de tratamento. A morfologia radicular é um dos principais fatores pois indica a suscetibilidade dos dentes à reabsorção radicular. Forma de pipeta, triangulares e com ápices afilados são mais afetados. A idade do paciente, gênero, tempo de tratamento e tipo de má-oclusão parecem não apresentar relação direta com a reabsorção radicular, mas sim a gravidade da má-oclusão e a amplitude dos movimentos a serem executados. Apesar de ser um processo com pouca previsibilidade, a reabsorção radicular cessa após o término do tratamento, não comprometendo a capacidade funcional dos dentes envolvidos.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Layered structures, known as micro structures in marine environments are common features of which their formation mechanisms are first reviewed. Some methods of measuring such features based on the measurements and theories are presented for the Persian Gulf. This includes determination of layers with temperature inversion (TI) associated with double diffusive convection (DDC). The relevant associated parameters are estimated from ROPME CTD data for late winter and early summer of 1992. Only in certain parts temperature inversion and DDC are observed which seem to produce layered structures. Observations show that the places with TI and DDC are mainly confined to the frontal regions where the water entering the Persian Gulf and water exiting it meet, nearly along the axis of the Gulf. TI and DDC is mainly observer in the northern bound of the front. Typical density ratio for regions with TI and DDC is 0.7 to 0.2 and the mean depth is at about 37 ± 3 m for the Persian Gulf. TI and DDC are also found in the outflow from the Persian Gulf to the Oman Gulf which is found to be at a depth of about 250 m. Horizontal addiction and reduction of solar heating seem to be the main reasons in producing layers with TI and DDC. It is also found that the regime of DDC in the Persian Gulf is more diffusive and the flow associated with intrusion layers with TI is non-isopycnal (more unstable). However for the Oman sea both diffusive and finger regime are observed and the flow is inferred to be isopycnal (more stable statically). Typical heat and salt fluxes due to DDC are found to be 6 W/m2 and 0.36 W/m2 respectively. Effective salinity diffusivity, Ks and heat diffusivity, Kr have been estimated for the places with DDC in the Persian Gulf and Oman Gulf (Ks=1.1 *10-7 m2/s, KT= 1.88*10-6 m2/s). Their values are within the values obtained by others. The buoyancy frequency for the Persian Gulf with typical mean value of 0.05s-1 is much higher than these of the free Oceans. Such large values of N (typically 0.05 s-1) indicate that processes such as tide can produce strong internal waves which may be another factor in producing layered structures. This requires separate study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Today the Ria de Aveiro of northern Portugal has a hydromorphological regime in which river influence is limited to periods of flood. For most of the annual cycle, tidal currents and wind waves are the major forcing agents in this complex coastal lagoon–estuarine system. The system has evolved over two centuries from one that was naturally fluvially dominant to one that is today tidally dominant. Human influence was a trigger for these changes, starting in 1808 when its natural evolution was halted by the construction of a new inlet/outlet channel through the mobile sand spit that isolates it from the Atlantic Ocean. In consequence, tidal ranges in the lagoon increased rapidly from ~0.1 m to >1 m and continued to increase, as a result of continued engineering works and dredging, today reaching ~3 m on spring tides. Hydromorphological adjustments that have taken place include the deepening of channels, an increase in the area of inter-tidal flats, regression of salt marsh, increased tidal propagation and increased saline intrusion. Loss of once abundant submerged aquatic vegetation (SAV), due to increased tidal flows, exacerbated by increased recreational activities, has been accompanied by a change from fine cohesive sediments to coarser, mobile sediments with reduced biological activity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

O fator nutricional presente nos sapais não é só importante para os organismos que nele habitam como também apresenta uma importância ecológica a uma maior escala. Exemplifica-se este fato com a capacidade de retenção do Fósforo (P) por parte das plantas podendo estas competir como produto químicos para sua imobilização através da incorporação da sua fração biodisponível para cumprimento dos mecanismos básicos de sobrevivência. O rizosedimento dessas plantas é uma importante fonte de nutrientes necessários para garantia básica da perpetuação de todos os serviços (regulação, provisão, cultural) gerados pelo ambiente. A perda de áreas de sapal foi o motivo principal para a elaboração desta tese visto a preocupação em relação aos impactes que a perda de serviços associados à área de estudo escolhida, o sistema lagunar da Ria de Aveiro, poderá vir sofrer caso aconteçam alterações hídricas (naturais ou antrópicas) mais acentuadas no futuro. Essa tese assume como compromisso chamar a atenção para essa questão como também investigar os mecanismos do ciclo do P este importante nutriente considerado essencial para a manutenção da vida em nosso planeta. Para este estudo foram escolhidas 3 espécies de plantas halófitas representantes do sapal amostral, são elas: Bolbochenous maritimus, Spartina maritima e de Juncus maritimus. As questões levantadas buscam compreender o papel do P nas transformações que ocorrem no rizosedimento das halófitas em 3 diferentes contextos: (i) quando comparados os valores da biomassa de P associado às halófitas estudadas (estudo realizado nos sapais povoados por Spartina maritima e Juncus maritimus) em toda extensão da Ria de Aveiro (ii) quando da disponibilidade de P perante a presença de poluentes inorgânicos no Largo do Laranjo, que corresponde a uma zona historicamente contaminada por metais (estudo realizado no rizosedimento das espécies Bolbochenous maritimus e Juncus maritimus) e (iii) quanto à intrusão superficial da água salgada da laguna (estudo focado na avaliação da perda do P próximo às raízes das halófitas que habitam a zona externa do dique do Baixo Vouga Lagunar (BVL) que corresponde à zona de confluência do Rio Vouga com a Ria de Aveiro). Por meio da análise do rizosedimento e da biomassa das diferentes halófitas predominantes do sapal foi possível verificar que, em relação à carga nutritiva fosfática, de Norte (Canal de São Jacinto/Ovar) a Sul (Canal de Mira) da Ria de Aveiro, a cota do sapal é mais importante do que a natureza espacial do sistema. Esta informação é primordial para a assertividade de futuras medidas de criação e reabilitação das áreas de sapal na Ria de Aveiro. Os estudos realizados nas áreas impactadas (Largo do Laranjo e BVL) incidiram na análise do perfil vertical rizosedimentar das halófitas pertencentes ao sapal médio-alto. Estes estudos revelaram que o rizosedimento dessas halófitas possui características peculiares que definem a dinâmica do ciclo do P de forma bastante característica. O rizosedimento das halófitas presentes no Largo do Laranjo apresentaram teores biodisponíveis de P equivalentes àqueles presentes no rizosedimento de área mais afastada da fonte pontual de contaminação para as mesmas espécies. Numa visão otimista, os resultados revelam que ambos sapais, Largo de Laranjo e Cais do Bico, apresentam condições equiparável para perpetuação dos serviços por eles gerados, que nesse caso se tornam ainda mais valiosos devido a garantia da fitoestabilização dos contaminantes (prevenção da entrada de contaminantes na coluna d’água e na cadeia alimentar). No Baixo Vouga Lagunar a análise espacial do sapal na zona exterior ao dique revelou a perda da diversidade das espécies bem como o aumento da área de vasa e consequentemente a perda dos teores de P associados ao rizosedimento das halófitas mais expostas aos efeitos da compressão costeira intensificados pelas ações naturais e antrópicas a que a Ria está sujeita. Em geral, a degradação dessa área de sapal devido aos fenômenos de assoreamento ou de erosão não pode ser separada dos processos sedimentares na área envolvente, principalmente no caso da Ria de Aveiro que tem sofrido constantes mudanças para atender às necessidades das atividades humanas. Essa tendência provavelmente não mudará no futuro próximo. Consequentemente, a evolução da laguna será principalmente dependente do resultado direto das ações humanas que deverão sempre encontrar formas de compensar os danos causados no âmbito de intervenções de reabilitação do sistema hídrico. A recriação de áreas de sapal pode ter lugar como medida mitigadora no âmbito de intervenções de reabilitação de áreas degradadas e ainda poderá servir como forma de captura de P para programas de utilização de fertilizantes naturais (componente desejável para a agricultura moderna o que é particularmente importante para as regiões altamente dependentes do mercado de importação). Deste modo, recomenda-se que a recuperação das áreas de sapal seja enquadrada no âmbito de intervenções mais amplas de valorização dos sistemas estuarinos e lagunares.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Knowledge of the environmental factors influence on the spatial-temporal variation of fishes is important to fisheries management and conservation. Thus, the aim of this work was to analyze the influence of the abiotical factors on the spatial-temporal distribution of Paralonchurus brasiliensis (Pisces, Sciaenidae) caught by-catch with the shrimp fishing of Ubatuba and Caraguatatuba regions, north coast of São Paulo State. The fishes were captured every month from January to December 2002. Samples were collected by otter trawl at 5, 10, 15, 20, 25, 30 and 35m depths. The temperatures (surface and bottom), salinities (surface and bottom), sediment features and organic matters were verified for each depth. During all period of the study 12.642 specimens of P. brasiliensis were captured at Ubatuba and 17.166 at Caraguatatuba, which totalized the biomass of 267 for the first and 339kg for the other region. The females outnumbered males in fish population. The greatest values of biomass and number of individuals were registered at the summer and autumn seasons, while the lowest values were observed at the winter and spring seasons. The greatest abundances were found from 15 to 25m depth. In this study, it was verified that P. brasiliensis is a coastal waters associate species. The spatialtemporal distribution of P. brasiliensis is affected by intrusion of SACW and depth for the coastal region and by depth and sediment in sheltered areas such as Caraguatatuba

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tese de Doutoramento, Educação (Metodologia do Ensino da Língua Portuguesa), 15 de Julho 2013, Universidade dos Açores.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The major function of this model is to access the UCI Wisconsin Breast Cancer data-set[1] and classify the data items into two categories, which are normal and anomalous. This kind of classification can be referred as anomaly detection, which discriminates anomalous behaviour from normal behaviour in computer systems. One popular solution for anomaly detection is Artificial Immune Systems (AIS). AIS are adaptive systems inspired by theoretical immunology and observed immune functions, principles and models which are applied to problem solving. The Dendritic Cell Algorithm (DCA)[2] is an AIS algorithm that is developed specifically for anomaly detection. It has been successfully applied to intrusion detection in computer security. It is believed that agent-based modelling is an ideal approach for implementing AIS, as intelligent agents could be the perfect representations of immune entities in AIS. This model evaluates the feasibility of re-implementing the DCA in an agent-based simulation environment called AnyLogic, where the immune entities in the DCA are represented by intelligent agents. If this model can be successfully implemented, it makes it possible to implement more complicated and adaptive AIS models in the agent-based simulation environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several lines of evidence converge to the idea that rapid eye movement sleep (REMS) is a good model to foster our understanding of psychosis. Both REMS and psychosis course with internally generated perceptions and lack of rational judgment, which is attributed to a hyperlimbic activity along with hypofrontality. Interestingly, some individuals can become aware of dreaming during REMS, a particular experience known as lucid dreaming (LD), whose neurobiological basis is still controversial. Since the frontal lobe plays a role in self-consciousness, working memory and attention, here we hypothesize that LD is associated with increased frontal activity during REMS. A possible way to test this hypothesis is to check whether transcranial magnetic or electric stimulation of the frontal region during REMS triggers LD. We further suggest that psychosis and LD are opposite phenomena: LD as a physiological awakening while dreaming due to frontal activity, and psychosis as a pathological intrusion of dream features during wake state due to hypofrontality. We further suggest that LD research may have three main clinical implications. First, LD could be important to the study of consciousness, including its pathologies and other altered states. Second, LD could be used as a therapy for recurrent nightmares, a common symptom of depression and post-traumatic stress disorder. Finally, LD may allow for motor imagery during dreaming with possible improvement of physical rehabilitation. In all, we believe that LD research may clarify multiple aspects of brain functioning in its physiological, altered and pathological states.