904 resultados para Identity based encryption


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this study, a genotypification of Leishmaniawas performed using polimerase chain reaction-restriction fragment length polymorfism (PCR-RFLP) and sequencing techniques to identify species of Leishmaniaparasites in phlebotomine sand flies and dogs naturally infected. Between January-February of 2009, CDC light traps were used to collect insect samples from 13 capture sites in the municipality of Posadas, which is located in the province of Misiones of Argentina. Sand flies identified as Lutzomyia longipalpiswere grouped into 28 separate pools for molecular biological analysis. Canine samples were taken from lymph node aspirates of two symptomatic stray animals that had been positively diagnosed with canine visceral leishmaniasis. One vector pool of 10 sand flies (1 out of the 28 pools tested) and both of the canine samples tested positively for Leishmania infantumby PCR and RFLP analysis. PCR products were confirmed by sequencing and showed a maximum identity with L. infantum. Given that infection was detected in one out of the 28 pools and that at least one infected insect was infected, it was possible to infer an infection rate at least of 0.47% for Lu. longipalpisamong the analyzed samples. These results contribute to incriminate Lu. longipalpis as the vector of L. infantumin the municipality of Posadas, where cases of the disease in humans and dogs have been reported since 2005.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A forensic intelligence process was conducted over cross-border seizures of false identity documents whose sources were partly known to be the same. Visual features of 300 counterfeit Portuguese and French identity cards seized in France and Switzerland were observed and integrated in a structured database developed to detect and analyze forensic links. Based on a few batches of documents known to come from common sources, the forensic profiling method could be validated and its performance evaluated. The method also proved efficient and complementary to conventional means of detecting connections between cases. Cross-border links were detected, highlighting the need for more collaboration. Forensic intelligence could be produced, uncovering the structure of counterfeits' illegal trade, the concentration of their sources and the evolution of their quality over time. In addition, two case examples illustrated how forensic profiling may support specific investigations. The forensic intelligence process and its results will underline the need to develop such approaches to support the fight against fraudulent documents and organized crime.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper lays down some theoretical framework for further research to be made on the subject of how identity of young Slovenian and Catalan users is forming within the social networking website Facebook. The author pursues his interest based on observation of how communicationand thus interaction between users is changing and how this is reflected in everyday practices. In so doing he tries to identify the connections between the individual, society and technology, asthese are more and more interwoven, and we cannot think one without the other in thecontemporary globalised world.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

On the identity of Melipona torrida Friese (Hymenoptera, Apidae). Melipona marginata var. torrida Friese, 1916, described from three workers putatively collected in Costa Rica, never had its identity properly recognized. Since its original description, no additional specimens have ever been collected in Costa Rica. It is argued here that Melipona torrida was based on mislabeled specimens and corresponds to Melipona marginata obscurior Moure, 1971, a form known only from southern Brazil, Argentina and Paraguay. A lectotype is designated for Melipona torrida and notes on the type material of Melipona marginata obscurior are provided. Other known examples of species described from mislabeled specimens in Friese's Zur Bienenfauna von Costa Rica are discussed. It is pointed out that additional names proposed in this work, based on material from Costa Rica, might turn out to correspond to South American taxa. Also, the date of publication of this Friese's paper is discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The taxonomic identity of the butterfly Heliconius melpomene f. pyritosa var. fumigata Zikán, 1937 (Nymphalidae: Heliconiinae) is discussed based on the discovery of the specimen based on which this name was assigned. The specimen is not a variation of Eueides tales surdus Stichel, 1903, as previously stated, but is in fact a variation of H. melpomene f. pyritosa, which is a synonym of Heliconius erato amalfreda Riffarth, 1901.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The HbpR protein is the sigma54-dependent transcription activator for 2-hydroxybiphenyl degradation in Pseudomonas azelaica. The ability of HbpR and XylR, which share 35% amino acid sequence identity, to cross-activate the PhbpC and Pu promoters was investigated by determining HbpR- or XylR-mediated luciferase expression and by DNA binding assays. XylR measurably activated the PhbpC promoter in the presence of the effector m-xylene, both in Escherichia coli and Pseudomonas putida. HbpR weakly stimulated the Pu promoter in E. coli but not in P. azelaica. Poor HbpR-dependent activation from Pu was caused by a weak binding to the operator region. To create promoters efficiently activated by both regulators, the HbpR binding sites on PhbpC were gradually changed into the XylR binding sites of Pu by site-directed mutagenesis. Inducible luciferase expression from mutated promoters was tested in E. coli on a two plasmid system, and from mono copy gene fusions in P. azelaica and P. putida. Some mutants were efficiently activated by both HbpR and XylR, showing that promoters can be created which are permissive for both regulators. Others achieved a higher XylR-dependent transcription than from Pu itself. Mutants were also obtained which displayed a tenfold lower uninduced expression level by HbpR than the wild-type PhbpC, while keeping the same maximal induction level. On the basis of these results, a dual-responsive bioreporter strain of P. azelaica was created, containing both XylR and HbpR, and activating luciferase expression from the same single promoter independently with m-xylene and 2-hydroxybiphenyl.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Under the influence of intelligence-led policing models, crime analysis methods have known of important developments in recent years. Applications have been proposed in several fields of forensic science to exploit and manage various types of material evidence in a systematic and more efficient way. However, nothing has been suggested so far in the field of false identity documents.This study seeks to fill this gap by proposing a simple and general method for profiling false identity documents which aims to establish links based on their visual forensic characteristics. A sample of more than 200 false identity documents including French stolen blank passports, counterfeited driving licenses from Iraq and falsified Bulgarian driving licenses was gathered from nine Swiss police departments and integrated into an ad hoc developed database called ProfID. Links detected automatically and systematically through this database were exploited and analyzed to produce strategic and tactical intelligence useful to the fight against identity document fraud.The profiling and intelligence process established for these three types of false identity documents has confirmed its efficiency, more than 30% of documents being linked. Identity document fraud appears as a structured and interregional criminality, against which material and forensic links detected between false identity documents might serve as a tool for investigation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

La globalización cuestiona la existencia de una relación mimética entre ciudadanía y Estado-nación. Las identidades homogéneas, sustentadas ideológicamente en nociones como «lengua nacional», plantean problemas en sociedades en las que ha crecido espectacularmente la diversidad lingüística e identitaria. Cataluña es un territorio en el que una parte de la población afirma una identidad catalana distinta a la española y viceversa. Además, se ha teorizado que la identidad catalana y la lengua catalana coexisten mutuamente. Por eso, se suceden voces que defienden la presencia del catalán en la educación escolar como fuente de la identidad nacional catalana, mientras que otras voces defienden su presencia simplemente como una buena manera de aprender el catalán cuando no se puede aprender en el medio social y familiar. En los últimos años, Cataluña ha recibido casi un millón de personas extranjeras que han modificado notablemente su situación sociolingüística. Las últimas encuestas manifiestan que un 6,3% de la población utiliza habitualmente una lengua distinta del catalán y del castellano. En este marco, mostramos las construcciones identitarias de un grupo de adolescentes de origen extranjero que están en el segundo ciclo de la ESO. Los datos fueron recogidos mediante dos grupos de discusión de seis-siete estudiantes de distinto origen, lengua propia y tiempo de residencia en Cataluña. Los resultados muestran la importancia del lugar de origen en la construcción de la identidad. Además, los participantes que afirman sentimientos catalanes o españoles no los relacionan con la lengua sino con los intercambios sociales que han establecido con sus iguales de origen naciona. Las intervenciones muestran también las dificultades para promover identidades múltiples desde el contexto escolar que eviten actitudes racistas y xenófobas y sirvan para promover proyectos colectivos de futuro en los que se pueda vivir desde una cierta diferencia

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The identity [r]evolution is happening. Who are you, who am I in the information society? In recent years, the convergence of several factors - technological, political, economic - has accelerated a fundamental change in our networked world. On a technological level, information becomes easier to gather, to store, to exchange and to process. The belief that more information brings more security has been a strong political driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one's behaviour, or needs, or preferences. It can lead to categorizations according to some specific risk criteria, for example, or to direct and personalized marketing. As a consequence, new forms of identities appear. They are not necessarily related to our names anymore. They are based on information, on traces that we leave when we act or interact, when we go somewhere or just stay in one place, or even sometimes when we make a choice. They are related to the SIM cards of our mobile phones, to our credit card numbers, to the pseudonyms that we use on the Internet, to our email addresses, to the IP addresses of our computers, to our profiles... Like traditional identities, these new forms of identities can allow us to distinguish an individual within a group of people, or describe this person as belonging to a community or a category. How far have we moved through this process? The identity [r]evolution is already becoming part of our daily lives. People are eager to share information with their "friends" in social networks like Facebook, in chat rooms, or in Second Life. Customers take advantage of the numerous bonus cards that are made available. Video surveillance is becoming the rule. In several countries, traditional ID documents are being replaced by biometric passports with RFID technologies. This raises several privacy issues and might actually even result in changing the perception of the concept of privacy itself, in particular by the younger generation. In the information society, our (partial) identities become the illusory masks that we choose -or that we are assigned- to interplay and communicate with each other. Rights, obligations, responsibilities, even reputation are increasingly associated with these masks. On the one hand, these masks become the key to access restricted information and to use services. On the other hand, in case of a fraud or negative reputation, the owner of such a mask can be penalized: doors remain closed, access to services is denied. Hence the current preoccupying growth of impersonation, identity-theft and other identity-related crimes. Where is the path of the identity [r]evolution leading us? The booklet is giving a glance on possible scenarios in the field of identity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

En este trabajo se expone e ilustra un modelo teórico para entender las funciones de la identidad, así como los mecanismospsicosociales asociados a su construcción: “Modelo Evolutivo y Funcional de la Identidad Mediada” (MEBIM). La identidad, mediada narrativamente, cumple una función personal orientada a la dirección de la propia vida, así como una función sociocultural vinculada a la búsqueda de reconocimiento de los derechos de los grupos sociales a los que uno se siente apegado. Se ilustran los factores asociados a la construcción de la identidad personal (sí mismos posibles, transiciones vitales, vínculo afectivo) y sociocultural (acción-transformación e identificación simbólica) a partir de 12 historias de vida realizadas con mestizos e indígenasde la Universidad Intercultural de Chiapas (México). Se sugiere que en contextos educativos formales, como la escuela o la Universidad, se deben propiciar narrativas personales y socioculturales con el objetivo de optimizar la identidad en un mundo a la vez globalizado y plural

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We propose a class of models of social network formation based on a mathematical abstraction of the concept of social distance. Social distance attachment is represented by the tendency of peers to establish acquaintances via a decreasing function of the relative distance in a representative social space. We derive analytical results (corroborated by extensive numerical simulations), showing that the model reproduces the main statistical characteristics of real social networks: large clustering coefficient, positive degree correlations, and the emergence of a hierarchy of communities. The model is confronted with the social network formed by people that shares confidential information using the Pretty Good Privacy (PGP) encryption algorithm, the so-called web of trust of PGP.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Gender identity disorder is defined as a permanent desire to relieve one's own sexual features to acquire the sexual features and line to life of the opposite sex. The diagnosis is based on the psychiatric evaluation and treatment on an interdisciplinary approach by endocrinologists, surgeons and psychiatrists, and can be conceptualized into distinct phases: diagnostic evaluation, real life experience, hormonal treatment and surgery. Multiples challenges have to be faced, especially by the psychiatrist who follows the patient during the whole process.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

PURPOSE: All methods presented to date to map both conductivity and permittivity rely on multiple acquisitions to compute quantitatively the magnitude of radiofrequency transmit fields, B1+. In this work, we propose a method to compute both conductivity and permittivity based solely on relative receive coil sensitivities ( B1-) that can be obtained in one single measurement without the need to neither explicitly perform transmit/receive phase separation nor make assumptions regarding those phases. THEORY AND METHODS: To demonstrate the validity and the noise sensitivity of our method we used electromagnetic finite differences simulations of a 16-channel transceiver array. To experimentally validate our methodology at 7 Tesla, multi compartment phantom data was acquired using a standard 32-channel receive coil system and two-dimensional (2D) and 3D gradient echo acquisition. The reconstructed electric properties were correlated to those measured using dielectric probes. RESULTS: The method was demonstrated both in simulations and in phantom data with correlations to both the modeled and bench measurements being close to identity. The noise properties were modeled and understood. CONCLUSION: The proposed methodology allows to quantitatively determine the electrical properties of a sample using any MR contrast, with the only constraint being the need to have 4 or more receive coils and high SNR. Magn Reson Med, 2014. © 2014 Wiley Periodicals, Inc.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tutkimuksen päätavoitteena oli auttaa Myllykoski –ryhmää määrittämään, mistä tekijöistä ryhmän uuden myyntiorganisaation, Myllykoski Salesin, tulevaisuuden imagon tulisi koostua. Näin ollen tutkimus pyrki selvittämään Myllykoski –ryhmän yritysidentiteetin nykytilaa ja Myllykoski Salesin toivottuja imagotekijöitä, sekä vertaamaan niiden vastaavuutta. Lisäksi tutkimuksen tavoitteena oli tutkia Myllykoski –ryhmän nykyistä ja toivottua tulevaisuuden imagotilaa. Jotta imagonrakennusprosessi olisi menestyksekäs, rakennettavan imagon ja viestittävien imagotekijöiden tulisi perustua yritysidentiteetin todellisiin tekijöihin. Yritysidentiteetin voidaan määritellä olevan yhtäläinen sisäisten sidosryhmien muodostaman yritysmielikuvan kanssa ja näin ollen nykyinen yritysidentiteetti voidaan paljastaa tutkimalla henkilökunnan mielipiteitä työorganisaatiotaan kohtaan. Näin ollen käsiteltävä tutkimus suoritettiin tekemällä kaksi sähköpostikyselyä, jotka suunnattiin Myllykoski -ryhmän myynti- ja markkinointihenkilökunnalle. Tutkimusten vastausprosentit olivat 71,4 % (johto, 14 lähetettyä kyselyä) ja 51,9 % (muu henkilökunta, 108 lähetettyä kyselyä). Saatuja vastauksia analysoitiin sekä laadullisesti että määrällisesti. Saaduista vastauksista oli selvästi havaittavissa Myllykoski –ryhmän yritysidentiteetin nykytila, nykyinen ja toivottu imagotila, sekä Myllykoski Salesin toivotut imagotekijät. Verrattaessa toivottuja imagotekijöitä ryhmän yritysidentiteettiin havaittiin, että suurin osa halutuista imagotekijöistä vastasi ryhmän identiteetin nykytilan ominaisuuksia ja näin ollen kyseisiä tekijöitä voitaisiin huoletta viestiä rakennettaessa Myllykoski Salesin imagoa. Joidenkin toivottujen imagotekijöiden viestintää tulisi kuitenkin vakavasti harkita, jottei rakennettaisi epärealistista imagoa.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tämä työ esittelee uuden tarjota paikasta riippuvaa tietoa langattomien tietoverkkojen käyttäjille. Tieto välitetään jokaiselle käyttäjälle tietämättä mitään käyttäjän henkilöllisyydestä. Sovellustason protokollaksi valittiin HTTP, joka mahdollistaa tämän järjestelmän saattaa tietoa perille useimmille käyttäjille, jotka käyttävät hyvinkin erilaisia päätelaitteita. Tämä järjestelmä toimii sieppaavan www-liikenteen välityspalvelimen jatkeena. Erilaisten tietokantojen sisällä on perusteella järjestelmä päättää välitetäänkö tietoa vai ei. Järjestelmä sisältää myös yksinkertaisen ohjelmiston käyttäjien paikantamiseksi yksittäisen tukiaseman tarkkuudella. Vaikka esitetty ratkaisu tähtääkin paikkaan perustuvien mainosten tarjoamiseen, se on helposti muunnettavissa minkä tahansa tyyppisen tiedon välittämiseen käyttäjille.