911 resultados para DROP ATTACKS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Million Hearts® brings together existing efforts and new programs to improve health across communities and help Americans live longer, healthier, more productive lives. In 2012, the Initiative's first year, Million Hearts® built strong partnerships to ensure steady progress toward preventing one million heart attacks and strokes by 2017.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Astrocytes fulfill a central role in regulating K+ and glutamate, both released by neurons into the extracellular space during activity. Glial glutamate uptake is a secondary active process that involves the influx of three Na+ ions and one proton and the efflux of one K+ ion. Thus, intracellular K+ concentration ([K+]i) is potentially influenced both by extracellular K+ concentration ([K+]o) fluctuations and glutamate transport in astrocytes. We evaluated the impact of these K+ ion movements on [K+]i in primary mouse astrocytes by microspectrofluorimetry. We established a new noninvasive and reliable approach to monitor and quantify [K+]i using the recently developed K+ sensitive fluorescent indicator Asante Potassium Green-1 (APG-1). An in situ calibration procedure enabled us to estimate the resting [K+]i at 133±1 mM. We first investigated the dependency of [K+]i levels on [K+]o. We found that [K+]i followed [K+]o changes nearly proportionally in the range 3-10 mM, which is consistent with previously reported microelectrode measurements of intracellular K+ concentration changes in astrocytes. We then found that glutamate superfusion caused a reversible drop of [K+]i that depended on the glutamate concentration with an apparent EC50 of 11.1±1.4 µM, corresponding to the affinity of astrocyte glutamate transporters. The amplitude of the [K+]i drop was found to be 2.3±0.1 mM for 200 µM glutamate applications. Overall, this study shows that the fluorescent K+ indicator APG-1 is a powerful new tool for addressing important questions regarding fine [K+]i regulation with excellent spatial resolution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The objective of this work was to evaluate the natural attack by Acromyrmex crassispinus in initial Pinus taeda plantations without control measures against ants, as well as the effect of defoliation in seedlings of P. taeda. Evaluations of the attack of leaf-cutting ants on P. taeda plantations were done monthly in the first six months, then 9 and 12 months after planting. The percentages of plants that were naturally attacked by ants were registered. The effect of defoliation was evaluated by artificial defoliation, simulating the natural patterns of attack by A. crassispinus on P. taeda seedlings. The natural attack of A. crassispinus was greater during the first months after planting, being more intense in the first 30 days. Artificial defoliation indicated that there were no significant losses in diameter and height in plants with less than 75% defoliation. However, there were significant losses in diameter and height in plants with 100% defoliation, independently of the cut of the apical meristem, and also plant death. The control of leaf-cutting ants in P. taeda plantings, in which A. crassispinus is the most frequent leaf-cutting ant, should be intense only at the beginning of planting, since the most severe attacks occur during this time.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Humans live in symbiosis with 10(14) commensal bacteria among which >99% resides in their gastrointestinal tract. The molecular bases pertaining to the interaction between mucosal secretory IgA (SIgA) and bacteria residing in the intestine are not known. Previous studies have demonstrated that commensals are naturally coated by SIgA in the gut lumen. Thus, understanding how natural SIgA interacts with commensal bacteria can provide new clues on its multiple functions at mucosal surfaces. Using fluorescently labeled, nonspecific SIgA or secretory component (SC), we visualized by confocal microscopy the interaction with various commensal bacteria, including Lactobacillus, Bifidobacteria, Escherichia coli, and Bacteroides strains. These experiments revealed that the interaction between SIgA and commensal bacteria involves Fab- and Fc-independent structural motifs, featuring SC as a crucial partner. Removal of glycans present on free SC or bound in SIgA resulted in a drastic drop in the interaction with Gram-positive bacteria, indicating the essential role of carbohydrates in the process. In contrast, poor binding of Gram-positive bacteria by control IgG was observed. The interaction with Gram-negative bacteria was preserved whatever the molecular form of protein partner used, suggesting the involvement of different binding motifs. Purified SIgA and SC from either mouse hybridoma cells or human colostrum exhibited identical patterns of recognition for Gram-positive bacteria, emphasizing conserved plasticity between species. Thus, sugar-mediated binding of commensals by SIgA highlights the currently underappreciated role of glycans in mediating the interaction between a highly diverse microbiota and the mucosal immune system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, studies into the reasons for dropping out of higher education (including online education) have been undertaken with greater regularity, parallel to the rise in the relative weight of this type of education, compared with brick-and-mortar education. However, the work invested in characterising the students who drop out of education, compared with those who do not, appears not to have had the same relevance as that invested in the analysis of the causes. The definition of dropping out is very sensitive to the context. In this article, we reach a purely empirical definition of student dropping out, based on the probability of not continuing a specific academic programme following several consecutive semesters of "theoretical break". Dropping out should be properly defined before analysing its causes, as well as comparing the drop-out rates between the different online programmes, or between online and on-campus ones. Our results show that there are significant differences among programmes, depending on their theoretical extension, but not their domain of knowledge.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many audio watermarking schemes divide the audio signal into several blocks such that part of the watermark is embedded into each of them. One of the key issues in these block-oriented watermarking schemes is to preserve the synchronisation, i.e. to recover the exact position of each block in the mark recovery process. In this paper, a novel time domain synchronisation technique is presented together with a new blind watermarking scheme which works in the Discrete Fourier Transform (DFT or FFT) domain. The combined scheme provides excellent imperceptibility results whilst achieving robustness against typical attacks. Furthermore, the execution of the scheme is fast enough to be used in real-time applications. The excellent transparency of the embedding algorithm makes it particularly useful for professional applications, such as the embedding of monitoring information in broadcast signals. The scheme is also compared with some recent results of the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

ABSTRACT: BACKGROUND: Perfusion-cardiovascular magnetic resonance (CMR) is generally accepted as an alternative to SPECT to assess myocardial ischemia non-invasively. However its performance vs gated-SPECT and in sub-populations is not fully established. The goal was to compare in a multicenter setting the diagnostic performance of perfusion-CMR and gated-SPECT for the detection of CAD in various populations using conventional x-ray coronary angiography (CXA) as the standard of reference. METHODS: In 33 centers (in US and Europe) 533 patients, eligible for CXA or SPECT, were enrolled in this multivendor trial. SPECT and CXA were performed within 4 weeks before or after CMR in all patients. Prevalence of CAD in the sample was 49% and 515 patients received MR contrast medium. Drop-out rates for CMR and SPECT were 5.6% and 3.7%, respectively (ns). The study was powered for the primary endpoint of non-inferiority of CMR vs SPECT for both, sensitivity and specificity for the detection of CAD (using a single-threshold reading), the results for the primary endpoint were reported elsewhere. In this article secondary endpoints are presented, i.e. the diagnostic performance of CMR versus SPECT in subpopulations such as multi-vessel disease (MVD), in men, in women, and in patients without prior myocardial infarction (MI). For diagnostic performance assessment the area under the receiver-operator-characteristics-curve (AUC) was calculated. Readers were blinded versus clinical data, CXA, and imaging results. RESULTS: The diagnostic performance (= area under ROC = AUC) of CMR was superior to SPECT (p = 0.0004, n = 425) and to gated-SPECT (p = 0.018, n = 253). CMR performed better than SPECT in MVD (p = 0.003 vs all SPECT, p = 0.04 vs gated-SPECT), in men (p = 0.004, n = 313) and in women (p = 0.03, n = 112) as well as in the non-infarct patients (p = 0.005, n = 186 in 1-3 vessel disease and p = 0.015, n = 140 in MVD). CONCLUSION: In this large multicenter, multivendor study the diagnostic performance of perfusion-CMR to detect CAD was superior to perfusion SPECT in the entire population and in sub-groups. Perfusion-CMR can be recommended as an alternative for SPECT imaging. TRIAL REGISTRATION: ClinicalTrials.gov, Identifier: NCT00977093.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cognitive radio is a wireless technology aimed at improvingthe efficiency use of the radio-electric spectrum, thus facilitating a reductionin the load on the free frequency bands. Cognitive radio networkscan scan the spectrum and adapt their parameters to operate in the unoccupiedbands. To avoid interfering with licensed users operating on a givenchannel, the networks need to be highly sensitive, which is achieved byusing cooperative sensing methods. Current cooperative sensing methodsare not robust enough against occasional or continuous attacks. This articleoutlines a Group Fusion method that takes into account the behavior ofusers over the short and long term. On fusing the data, the method is basedon giving more weight to user groups that are more unanimous in their decisions.Simulations have been performed in a dynamic environment withinterferences. Results prove that when attackers are present (both reiterativeor sporadic), the proposed Group Fusion method has superior sensingcapability than other methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes an audio watermarking scheme based on lossy compression. The main idea is taken from an image watermarking approach where the JPEG compression algorithm is used to determine where and how the mark should be placed. Similarly, in the audio scheme suggested in this paper, an MPEG 1 Layer 3 algorithm is chosen for compression to determine the position of the mark bits and, thus, the psychoacoustic masking of the MPEG 1 Layer 3compression is implicitly used. This methodology provides with a high robustness degree against compression attacks. The suggested scheme is also shown to succeed against most of the StirMark benchmark attacks for audio.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limitedresources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La radio cognitiva es una tecnología inalámbrica propuesta para usar eficientemente los recursos del espectro radioeléctrico permitiendo así reducir la carga existente en las bandas de frecuencia de uso libre.Las redes de radio cognitiva son capaces de escanear el espectro y adaptar sus parámetros para operar en las bandas no ocupadas. Para evitar interferir con usuarios con licencia que operan en un determinado canal, la sensibilidad de las redes tiene que ser muy alta. Ello se consigue con métodos de detección cooperativos. Los métodos de detección cooperativa actuales tienen una carencia de robustez ya sea frente a ataques puntuales o continuos.En este artículo presentamos un método de fusión por grupos que tiene presente el comportamiento de los usuarios a corto y largo plazo. Al realizar la fusión de los datos, el método se basa en dar mayor peso a los grupos de usuarios con mayor unanimidad en sus decisiones.Los resultados de las simulaciones prueban que en presencia de atacantes el método de fusión por grupos propuesto consigue una detección superior a otros métodos, cumpliendo los requisitos de sensibilidad mínimos de las redes de radio cognitiva incluso con un 12 de usuarios reiteradamente maliciosos o un 10 de atacantes puntuales.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes the state of the art of secure ad hoc routing protocols and presents SEDYMO, a mechanism to secure a dynamic multihop ad hoc routing protocol. The proposed solution defeats internal and external attacks usinga trustworthiness model based on a distributed certification authority. Digital signatures and hash chains are used to ensure the correctness of the protocol. The protocol is compared with other alternatives in terms of security strength, energy efficiency and time delay. Both computational and transmission costs are considered and it is shown that the secure protocol overhead is not a critical factor compared to the high network interface cost.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Manet security has a lot of open issues. Due to its character-istics, this kind of network needs preventive and corrective protection. Inthis paper, we focus on corrective protection proposing an anomaly IDSmodel for Manet. The design and development of the IDS are consideredin our 3 main stages: normal behavior construction, anomaly detectionand model update. A parametrical mixture model is used for behav-ior modeling from reference data. The associated Bayesian classi¯cationleads to the detection algorithm. MIB variables are used to provide IDSneeded information. Experiments of DoS and scanner attacks validatingthe model are presented as well.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Treatment of bean cuttings with 4-chlororesorcinol (4-CR), known to increase the number of roots and extend their distribution, prevented the accumulation of free indol-3-yl-acetic acid (IAA) in the hypocotyls within 24 h after cutting preparation. In mung bean there was no change in the distribution (upper half vs. 1 ower half of the hypocotyl) of IAA within the hypocotyl as a result of the treatment. In bean cuttings the treatment with 4-CR prevented the accumulation of IAA in the bottom of the cutting. Oxidation of IAA as a measure of IAA oxidase activity in bean was enhanced appreciably by 4-chlororesorcinol. The level of abscisic acid in mung bean, on the other hand, remained 3-4 fold higher than in the control, yet still about 50% lower than the zero time level. In untreated mung bean cuttings the activity of peroxidase increased after cutting preparation. In contrast, the activity of peroxidase in 4-Cr-treated cuttings was consistently lower. In order to relate to the effect of exogenously applied auxin the level of peroxidase was measured also in indol-3-yl-butyric acid-treated cuttings. The overall peroxidase activity in IBA-treated cuttings was not affected. However, when assaying for the different isozymes the drop in peroxidase activity was most evident in the inducible basic isoperoxidases both in 4-CR and IBA treatments. It appears that the exposure to 4-CR exerts an effect that is similar to that of exogenously applied auxin, affecting the activity of basic peroxidases and enhancing the oxidation of endogenous IAA, thus allowing the organization of the primordia.