946 resultados para Chosen-plaintext attack
Resumo:
The extraterrestrial solar spectrum (ESS) is an important component in near infrared (near-IR) radiative transfer calculations. However, the impact of a particular choice of the ESS in these regions has been given very little attention. A line-by-line (LBL) transfer model has been used to calculate the absorbed solar irradiance and solar heating rates in the near-IR from 2000-10000 cm−1(1-5 μm) using different ESS. For overhead sun conditions in a mid-latitude summer atmosphere, the absorbed irradiances could differ by up to about 11 Wm−2 (8.2%) while the tropospheric and stratospheric heating rates could differ by up to about 0.13 K day−1 (8.1%) and 0.19 K day−1 (7.6%). The spectral shape of the ESS also has a small but non-negligible impact on these factors in the near-IR.
Resumo:
A educação vem sofrendo graves, permanentes e contundentes críticas quanto a sua produtividade, eficácia e eficiência. O ataque sistemático às escolas, e em especial às destinadas à preparação de professores, e uma constante em países do Velho, do Terceiro e do Novo Mundo. Todos concordam que a função docente exige competência profissional, sendo a sua ausência a principal responsavel pelas lacunas, insuficiências e deficiências do processo educacional. Acredita-se que a situação ensino-aprendizagem proporcionada por uma atividade didática bem orientada seja um fator de suma importância para a eficácia e eficiência de um sistema de ensino. Considerando a expansão do ensino de 2o grau, que o levou a perder muito do seu caráter acadêmico e seletivo, optou-se pelo estudo da formação do professor que a ele se destina. Com a finalidade de verificar o tipo de formação que o professor de 2o grau vem recebendo e as consequências deste no seu desempenho profissional. Analisa-se criticamente a evolução histérica de sua formação, no Brasil, e procede-se a um estudo dos currículos dos cursos de licenciatura das Faculdades de Educação, ou Unidades Equivalentes, do Estado do Espírito Santo. Verifica-se que estas, de modo geral, adotam o currículo mínimo proposto pelo Conselho Federal de Educação. Sabe-se que o ensino de 2o grau, atualmente, destina-se a alunos provenientes das mais diversas classes sociais, sendo os seus objetivos bem mais amplos que antes verifica-se que as alterações curriculares limitam-se a uma improdutiva ampliação ou diminuição de carga horária e de disciplinas. Deduz-se que a Faculdade de Educação não trouxe nenhuma inovação significativa no que concerne ao currículo de formação pedagógica de professor de 2o grau,o que dá procedência às críticas negativas que a mesma vem recebendo. Recomenda-se a realização de pesquisas de campo e o estudo de propostas curriculares objetivando obter subardias para a reformulação dos currículos atuais.
Resumo:
We present a continuous time target zone model of speculative attacks. Contrary to most of the literature that considers the certainty case, i.e., agents know for sure the Central Bank behavior in the future, we build uncertainty into the madel in two different ways. First, we consider the case in whicb the leveI of reserves at which the central bank lets the regime collapse is uncertain. Alternatively, we ana1ize the case in which, with some probability, the government may cbange its policy reducing the initially positive trend in domestic credito In both cases, contrary to the case of a fixed exchange rate regime, speculators face a cost of launching a tentative attack that may not succeed. Such cost induces a delay and may even prevent its occurrence. At the time of the tentative attack, the exchange rate moves either discretely up, if the attack succeeds, or down, if it fails. The remlts are consistent with the fact that, typically, an attack involves substantial profits and losses for the speculators. In particular, if agents believed that the government will control fiscal imbalances in the future, or alternatively, if they believe the trend in domestic credit to be temporary, the attack is postponed even in the presence of a signal of an imminent collapse. Finally, we aIso show that the timing of a speculative attack increases with the width of the target zone.
Resumo:
An important challenge in the crime literature is to isolate causal effects of police on crime. Following a terrorist attack on the main Jewish center in the city of Buenos Aires, Argentina, in July 1994, all Jewish institutions (including schools, synagogues, and clubs) were given 24-hour police protection. Thus, this hideous event induced a geographical allocation of police forces that can be presumed to be exogenous in a crime regression. Using data on the location of car thefts before and after the terrorist attack, we find a large deterrent effect of observable police presence on crime. The effect is local, with little or no appreciable impact outside the narrow area in which the police are deployed.
Resumo:
The main variables found on procedure of the dissolution silicate rocks using acid dissolution in teflon open vessel for analysis of micro elements by ICP-AES has been determined. The results obtained for some samples showed strong dependence of the rock mineralogical composition, then it was recommended an alkaline fusion step after acid dissolution. The decomposition procedure use 20 mi of an acid mixture of HF:HNO3 in the proportion 3:1 for a fraction of 250 mg pulverized sample. The recommended temperatures were 60 degrees C for attack and 90 degrees C for acid volatilization. The fusion step with 50 mg LiBO2 at 1000 degrees C may be used if non-attacked residue is observed in the solution. The whole time was 6 h per sample. Nine types os silicate rocks that show mineralogical and chemical different compositions were chosen for obtaining the optimization of the variables. The elements used were Ce, Y, Yb and Zr. In addition, ultrassonic nebulization has been used. The percentual standard deviations obtained for five determinations were 0.7 and 1.4 for triplicate samples. The mineralogical and textural information from the petrographical analysis of the samples indicated the need of increasing the fusion step on the optimized procedure.
Resumo:
The authors report a massive attack by Pseudomyrmex ants on a human who touched a Triplaria - novice tree (Triplaris spp). The ants naturally live in these trees and their stings cause intense pain and discrete to moderate local inflammation. The problem is common in sonic Brazilian regions and can be prevented by identifying the trees.
Resumo:
I report some observations of a Chestnut-bellied Euphonia (Euphonia pectoralis) nest in a lowland Atlantic Forest of southeastern Brazil during the early nestling period. During 7.5 hours of observations, the nest was attended 46.3% of the time, 45.6% by the female and 0.7% by the male. Unattended periods lasted 16-38 min. Parents visited the nest most of the time together at 36-59 min intervals. There were 1.06 feeding visits per nestling per hour. The two nestlings in the nest ended up preyed upon by army ants (Labidus praedator, Ecitoninae). The low height of the nest (0.8 m) may have facilitated its detection by the ants.
Resumo:
Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.
Resumo:
A 55-year-old man was attacked by a Brazilian tapir (Tapirus terrestris) after surprising and stabbing the animal in his corn plantation. The victim received deep bites in the thighs, neck, and cervical areas, resulting in severe hemorrhage and death. This is the first report of a tapir incident resulting in death and is of interest because of the severity of the contusions and lacerations caused by the provoked animal.
Resumo:
The study was carried out at the UNESP Rio Claro campus (SP), where biotests consisting of simulated ant attacks were performed in colonies of Mischocyttarus cerberus. The behaviors of the wasps were recorded with a camcorder, for further analysis. This analysis was done using the Mann-Whitney U test and the Principal Component Analysis. In the pre-emergence development stage, colonies with a single foundress defend the nest only after the first larvae appear. When there are only eggs in the nest, the wasp abandons the nest. Before leaving, the wasp rubs its gaster against the nest, releasing the ant repellent secretion. When the nest contains larvae or larvae and pupae, the foundress defends the colony, vibrating its wings, pumping her abdomen and biting the ant.
Resumo:
(Chemical Equation Presented) The reaction between the benzohydroxamate anion (BHO-) and bis(2,4-dinitrophenyl)phosphate (BDNPP) has been examined kinetically, and the products were characterized by mass and NMR spectroscopy. The nucleophilic attack of BHO- follows two reaction paths: (i) at phosphorus, giving an unstable intermediate that undergoes a Lossen rearrangement to phenyl isocyanate, aniline, diphenylurea, and O-phenylcarbamyl benzohydroxamate; and (ii) on the aromatic carbon, giving an intermediate that was detected but slowly decomposes to aniline and 2,4-dinitrophenol. Thus, the benzohydroxamate anion can be considered a self-destructive molecular scissor since it reacts and loses its nucleophilic ability. © 2009 American Chemical Society.