952 resultados para Defense expenditures


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Puroindolines (Pins) and purothionins (Pths) are basic, amphiphilic, cysteine-rich wheat proteins that play a role in plant defense against microbial pathogens. We have examined the co-adsorption and sequential addition of Pins (Pin-a, Pin-b and a mutant form of Pin-b with Trp-44 to Arg-44 substitution) and β-purothionin (β-Pth) model anionic lipid layers, using a combination of surface pressure measurements, external reflection FTIR spectroscopy and neutron reflectometry. Results highlighted differences in the protein binding mechanisms, and in the competitive binding and penetration of lipid layers between respective Pins and β-Pth. Pin-a formed a blanket-like layer of protein below the lipid surface that resulted in the reduction or inhibition of β-Pth penetration of the lipid layer. Wild-type Pin-b participated in co-operative binding with β-Pth, whereas the mutant Pin-b did not bind to the lipid layer in the presence of β-Pth. The results provide further insight into the role of hydrophobic and cationic amino acid residues in antimicrobial activity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present an analysis of a cusp ion step, observed by the Defense Meteorological Satellite Program (DMSP) F10 spacecraft, between two poleward moving events of enhanced ionospheric electron temperature, observed by the European Incoherent Scatter (EISCAT) radar. From the ions detected by the satellite, the variation of the reconnection rate is computed for assumed distances along the open-closed field line separatrix from the satellite to the X line, do. Comparison with the onset times of the associated ionospheric events allows this distance to be estimated, but with an uncertainty due to the determination of the low-energy cutoff of the ion velocity distribution function, ƒ(ν). Nevertheless, the reconnection site is shown to be on the dayside magnetopause, consistent with the reconnection model of the cusp during southward interplanetary magnetic field (IMF). Analysis of the time series of distribution function at constant energies, ƒ(ts), shows that the best estimate of the distance do is 14.5±2 RE. This is consistent with various magnetopause observations of the signatures of reconnection for southward IMF. The ion precipitation is used to reconstruct the field-parallel part of the Cowley D ion distribution function injected into the open low-latitude boundary layer in the vicinity of the X line. From this reconstruction, the field-aligned component of the magnetosheath flow is found to be only −55±65 km s−1 near the X line, which means either that the reconnection X line is near the stagnation region at the nose of the magnetosphere, or that it is closely aligned with the magnetosheath flow streamline which is orthogonal to the magnetosheath field, or both. In addition, the sheath Alfvén speed at the X line is found to be 220±45 km s−1, and the speed with which newly opened field lines are ejected from the X line is 165±30 km s−1. We show that the inferred magnetic field, plasma density, and temperature of the sheath near the X line are consistent with a near-subsolar reconnection site and confirm that the magnetosheath field makes a large angle (>58°) with the X line.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines one legal criterion for the exercise of the right of self-defense that has been significantly overlooked by commentators: the so-called “reporting requirement.” Article 51 of the United Nations (UN) Charter provides, inter alia, that “[m]easures taken by members in the exercise of this right of self-defense shall be immediately reported to the Security Council.” Although the requirement to report all self-defense actions to the Council is clearly set out in Article 51, the Charter offers no further guidance with regard to this obligation. Reference to the practice of states since the UN’s inception in 1945 is therefore essential to understanding the scope and nature of the reporting requirement. As such, this article is underpinned by an extensive original dataset of reporting practice covering the period from January 1, 1998 to December 31, 2013. We know from Article 51 that states “shall” report, but do they, and—if so—in what manner? What are the various implications of reporting, of failing to report, and of the way in which states report? How are reports used, and by whom? Most importantly, this article questions the ultimate value of states reporting their self-defense actions to the Security Council in modern interstate relations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Families at the bottom end of the Edwardian white-collar income spectrum demonstrated middle-class status through observable consumption, at the cost of squeezing other expenditures, including ‘necessities’. This had negative economic impacts, lowering living standards due to inefficiently high budget shares for positional goods. Drawing on the work of Pierre Bourdieu, we examine how railway clerks sought to demonstrate ‘distinction’ from manual workers through certain conspicuous expenditures and how this strategy was progressively undermined by falling real incomes over the Edwardian period.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although studies classify the polygynous mating system of a given species into female defense polygyny (FDP) or resource defense polygyny (RDP), the boundary between these two categories is often slight. Males of some species may even shift between these two types of polygyny in response to temporal variation in social and environmental conditions. Here, we examine the mating system of the Neotropical harvestman Acutisoma proximum and, in order to assess if mate acquisition in males corresponds to FDP or RDP, we tested four contrasting predictions derived from the mating system theory. At the beginning of the reproductive season, males fight with other males for the possession of territories on the vegetation where females will later oviposit, as expected in RDP. Females present a marked preference for specific host plant species, and males establish their territories in areas where these host plants are specially abundant, which is also expected in RDP. Later in the reproductive season, males reduce their patrolling activity and focus on defending individual females that are ovipositing inside their territories, as what occurs in FDP. This is the first described case of an arachnid that exhibits a shift in mating system over the reproductive season, revealing that we should be cautious when defining the mating system of a species based on few observations concentrated in a brief period.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Caulobacter crescentus is a free-living alphaproteobacterium that has 11 predicted LysR-type transcriptional regulators (LTTRs). Previously, a C. crescentus mutant strain with a mini-Tn5lacZ transposon inserted into a gene encoding an LTTR was isolated; this mutant was sensitive to cadmium. In this work, a mutant strain with a deletion was obtained, and the role of this LTTR (called CztR here) was evaluated. The transcriptional start site of this gene was determined by primer extension analysis, and its promoter was cloned in front of a lacZ reporter gene. beta-Galactosidase activity assays, performed with the wild-type and mutant strains, indicated that this gene is 2-fold induced when cells enter stationary phase and that it is negatively autoregulated. Moreover, this regulator is essential for the expression of the divergent cztA gene at stationary phase, in minimal medium, and in response to zinc depletion. This gene encodes a hypothetical protein containing 10 predicted transmembrane segments, and its expression pattern suggests that it encodes a putative zinc transporter. The cztR strain was also shown to be sensitive to superoxide (generated by paraquat) and to hydrogen peroxide but not to tert-butyl hydroperoxide. The expression of katG and ahpC, but not that of the superoxide dismutase genes, was increased in the cztR mutant. A model is proposed to explain how CztR binding to the divergent regulatory regions could activate cztA expression and repress its own transcription.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In most bacteria, the ferric uptake regulator (Fur) is a global regulator that controls iron homeostasis and other cellular processes, such as oxidative stress defense. In this work, we apply a combination of bioinformatics, in vitro and in vivo assays to identify the Caulobacter crescentus Fur regulon. A C. crescentus fur deletion mutant showed a slow growth phenotype, and was hypersensitive to H(2)O(2) and organic peroxide. Using a position weight matrix approach, several predicted Fur-binding sites were detected in the genome of C. crescentus, located in regulatory regions of genes not only involved in iron uptake and usage but also in other functions. Selected Fur-binding sites were validated using electrophoretic mobility shift assay and DNAse I footprinting analysis. Gene expression assays revealed that genes involved in iron uptake were repressed by iron-Fur and induced under conditions of iron limitation, whereas genes encoding iron-using proteins were activated by Fur under conditions of iron sufficiency. Furthermore, several genes that are regulated via small RNAs in other bacteria were found to be directly regulated by Fur in C. crescentus. In conclusion, Fur functions as an activator and as a repressor, integrating iron metabolism and oxidative stress response in C. crescentus.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study aimed to evaluate the potential of soybean-promoted acidic nitrite reduction and to correlate this activity with the content of phenolics and with the bactericidal activity against Escherichia coli O157:H7. Extracts of embrionary axes and cotyledons enriched in phenolics increased (center dot)NO formation at acidic pH at values that were 7.1 and 4.5 times higher, respectively, when compared to the reduction of the nonenriched extracts. Among the various phenolics accumulated in the soybean extracts, five stimulated nitrite reduction in the following decreasing order of potency: epicatechin gallate, chlorogenic acid, caffeic acid, galic acid and p-coumaric acid. Extracts of embrionary axes presented higher contents of epicatechin gallate and caffeic acid, compared to that of cotyledons, indicating a positive correlation between activity of the extracts and content of phenolics with regard to nitrite reducing activity. Soybean extracts enriched in phenolics interacted synergistically with acidified nitrite to prevent E. coli O157:H7 growth. The results suggest that soybean phenolics may interfere with the metabolism of (center dot)NO in an acidic environment by accelerating the reduction of nitrite, with a potential antimicrobial effect in the stomach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 1919 Anton Nyström became the first person in Sweden to publish a comprehensive defense of homosexuality. He believed that its classification as a mental illness was erroneous and that Sweden's law against homosexual sex was both irrational and cruel. Nyström was a physician whose work in the medical area dealt primarily with dermatology, psychiatry and human sexuality; however he was also a prolific historian, who took a staunchly anti-Christian view in his analysis of how Christianity affected European culture, especially in the area of sexual morality. In fact, much of Nyström's medical texts dealing with human sexuality consisted of anti-Christian cultural and historical commentary. The object of this "C-uppsats" is to analyze Nyström's pamphlet, Om Homosexualitet och Hermafroditi: Belysning af Missförstådda Existenser and illustrate how its defensive structure was consistent with the pattern used by the author in his other books and articles on human sexuality. Specifically, that irrational and neurotic Christian beliefs caused both mental and physical suffering and were the source of deleterious forms of morality. Additionally, this paper will also show that the solution Nyström had for the problem of negative and erroneous attitudes towards homosexuality was to replace the sodomitic view of homosexuality with one based upon a more rational and naturalistic belief system, the basis of which could be found in the pre-Christian cultures of Europe, most especially in Greece. This new conception was to be constructed primarily out of historical example and cultural analyses. For Nyström, history writing was used both as a weapon to fight the source of negative attitudes towards homosexuality, as well as a tool that could be used to build a positive cultural model which would be beneficial for homosexuals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This essay presents a portrayal of Heathcliff, Catherine and Isabella from a psychoanalytical perspective with regard to four defense mechanisms; namely, repression, denial, sublimation and projection in order to see how these defense mechanisms have affected the characters’ decisions and behaviour, and led them to their destinations in life. It will include three major sections: repression in characters, denial in characters, and sublimation and projection in characters. These terms will be more clearly defined and explained in the subsequent sections.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed defense is a promising way to neutralize the distributed Denial-of-Service attacks by detecting and responding the attacking sources widespread around the Internet. Components of the distributed defense system will cooperate with each other to combat the attacks. Compared with the centralized defense systems, distributed defense systems can discover the attacks more timely from both source end and victim end, fight the attacks with more resources and take advantage of more flexible strategies. This paper investigates 7 distributed defense systems which make use of various strategies to mitigate the DDoS attacks. Different architectures are designed in these 7 systems to provide distributed DDoS defense solutions. We evaluate these systems in terms of deployment, detection, response, security, robustness and implementation. For each criteria, we give a recommendation on which technologies are best suitable for a successful distributed defense system based on the analysis result. Finally we propose our idea on the design of an effective distributed defense system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last a few years a number of highly publicized incidents of Distributed Denial of Service (DDoS) attacks against high-profile government and commercial websites have made people aware of the importance of providing data and services security to users. A DDoS attack is an availability attack, which is characterized by an explicit attempt from an attacker to prevent legitimate users of a service from using the desired resources. This paper introduces the vulnerability of web applications to DDoS attacks, and presents an active distributed defense system that has a deployment mixture of sub-systems to protect web applications from DDoS attacks. According to the simulation experiments, this system is effective in that it is able to defend web applications against attacks. It can avoid overall network congestion and provide more resources to legitimate web users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present a new approach, called Flexible Deterministic Packet Marking (FDPM), to perform a large-scale IP traceback to defend against Distributed Denial of Service (DDoS) attacks. In a DDoS attack the victim host or network is usually attacked by a large number of spoofed IP packets coming from multiple sources. IP traceback is the ability to trace the IP packets to their sources without relying on the source address field of the IP header. FDPM provides many flexible features to trace the IP packets and can obtain better tracing capability than current IP traceback mechanisms, such as Probabilistic Packet Marking (PPM), and Deterministic Packet Marking (DPM). The flexibilities of FDPM are in two ways, one is that it can adjust the length of marking field according to the network protocols deployed; the other is that it can adjust the marking rate according to the load of participating routers. The implementation and evaluation demonstrates that the FDPM needs moderately only a small number of packets to complete the traceback process; and can successfully perform a large-scale IP traceback, for example, trace up to 110,000 sources in a single incident response. It has a built-in overload prevention mechanism, therefore this scheme can perform a good traceback process even it is heavily loaded.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Currently Distributed Denial of Service (DDoS) attacks have been identified as one of the most serious problems on the Internet. The aim of DDoS attacks is to prevent legitimate users from accessing desired resources, such as network bandwidth. Hence the immediate task of DDoS defense is to provide as much resources as possible to legitimate users when there is an attack. Unfortunately most current defense approaches can not efficiently detect and filter out attack traffic. Our approach is to find the network anomalies by using neural network, deploy the system at distributed routers, identify the attack packets, and then filter them. The marks in the IP header that are generated by a group of IP traceback schemes, Deterministic Packet Marking (DPM)/Flexible Deterministic Packet Marking (FDPM), assist this process of identifying attack packets. The experimental results show that this approach can be used to defend against both intensive and subtle DDoS attacks, and can catch DDoS attacks’ characteristic of starting from multiple sources to a single victim. According to results, we find the marks in IP headers can enhance the sensitivity and accuracy of detection, thus improve the legitimate traffic throughput and reduce attack traffic throughput. Therefore, it can perform well in filtering DDoS attack traffic precisely and effectively.