834 resultados para Pattern-Based Defense Mechanism
Resumo:
Computer networks are a critical factor for the performance of a modern company. Managing networks is as important as managing any other aspect of the company’s performance and security. There are many tools and appliances for monitoring the traffic and analyzing the network flow security. They use different approaches and rely on a variety of characteristics of the network flows. Network researchers are still working on a common approach for security baselining that might enable early watch alerts. This research focuses on the network security models, particularly the Denial-of-Services (DoS) attacks mitigation, based on a network flow analysis using the flows measurements and the theory of Markov models. The content of the paper comprises the essentials of the author’s doctoral thesis.
Resumo:
An updated flow pattern map was developed for CO2 on the basis of the previous Cheng-Ribatski-Wojtan-Thome CO2 flow pattern map [1,2] to extend the flow pattern map to a wider range of conditions. A new annular flow to dryout transition (A-D) and a new dryout to mist flow transition (D-M) were proposed here. In addition, a bubbly flow region which generally occurs at high mass velocities and low vapor qualities was added to the updated flow pattern map. The updated flow pattern map is applicable to a much wider range of conditions: tube diameters from 0.6 to 10 mm, mass velocities from 50 to 1500 kg/m(2) s, heat fluxes from 1.8 to 46 kW/m(2) and saturation temperatures from -28 to +25 degrees C (reduced pressures from 0.21 to 0.87). The updated flow pattern map was compared to independent experimental data of flow patterns for CO2 in the literature and it predicts the flow patterns well. Then, a database of CO2 two-phase flow pressure drop results from the literature was set up and the database was compared to the leading empirical pressure drop models: the correlations by Chisholm [3], Friedel [4], Gronnerud [5] and Muller-Steinhagen and Heck [6], a modified Chisholm correlation by Yoon et al. [7] and the flow pattern based model of Moreno Quiben and Thome [8-10]. None of these models was able to predict the CO2 pressure drop data well. Therefore, a new flow pattern based phenomenological model of two-phase flow frictional pressure drop for CO2 was developed by modifying the model of Moreno Quiben and Thome using the updated flow pattern map in this study and it predicts the CO2 pressure drop database quite well overall. (C) 2007 Elsevier Ltd. All rights reserved.
Resumo:
The advent of Wireless Sensor Network (WSN) technologies is paving the way for a panoply of new ubiquitous computing applications, some of them with critical requirements. In the ART-WiSe framework, we are designing a two-tiered communication architecture for supporting real-time and reliable communications in WSNs. Within this context, we have been developing a test-bed application, for testing, validating and demonstrating our theoretical findings - a search&rescue/pursuit-evasion application. Basically, a WSN deployment is used to detect, localize and track a target robot and a station controls a rescuer/pursuer robot until it gets close enough to the target robot. This paper describes how this application was engineered, particularly focusing on the implementation of the localization mechanism.
Resumo:
Collage is a pattern-based visual design authoring tool for the creation of collaborative learning scripts computationally modelled with IMS Learning Design (LD). The pattern-based visual approach aims to provide teachers with design ideas that are based on broadly accepted practices. Besides, it seeks hiding the LD notation so that teachers can easily create their own designs. The use of visual representations supports both the understanding of the design ideas and the usability of the authoring tool. This paper presents a multicase study comprising three different cases that evaluate the approach from different perspectives. The first case includes workshops where teachers use Collage. A second case implies the design of a scenario proposed by a third-party using related approaches. The third case analyzes a situation where students follow a design created with Collage. The cross-case analysis provides a global understanding of the possibilities and limitations of the pattern-based visual design approach.
Resumo:
Sensory neuronopathies (SNNs) encompass paraneoplastic, infectious, dysimmune, toxic, inherited, and idiopathic disorders. Recently described diagnostic criteria allow SNN to be differentiated from other forms of sensory neuropathy, but there is no validated strategy based on routine clinical investigations for the etiological diagnosis of SNN. In a multicenter study, the clinical, biological, and electrophysiological characteristics of 148 patients with SNN were analyzed. Multiple correspondence analysis and logistic regression were used to identify patterns differentiating between forms of SNNs with different etiologies. Models were constructed using a study population of 88 patients and checked using a test population of 60 cases. Four patterns were identified. Pattern A, with an acute or subacute onset in the four limbs or arms, early pain, and frequently affecting males over 60 years of age, identified mainly paraneoplastic, toxic, and infectious SNN. Pattern B identified patients with progressive SNN and was divided into patterns C and D, the former corresponding to patients with inherited or slowly progressive idiopathic SNN with severe ataxia and electrophysiological abnormalities and the latter to patients with idiopathic, dysimmune, and sometimes paraneoplastic SNN with a more rapid course than in pattern C. The diagnostic strategy based on these patterns correctly identified 84/88 and 58/60 patients in the study and test populations, respectively.
Resumo:
A multicomponent indicator displacement assay ( MIDA) based on an organometallic receptor and three dyes can be used for the identification and quantification of nucleotides in aqueous solution at neutral pH.
Resumo:
Context: Ovarian tumors (OT) typing is a competency expected from pathologists, with significant clinical implications. OT however come in numerous different types, some rather rare, with the consequence of few opportunities for practice in some departments. Aim: Our aim was to design a tool for pathologists to train in less common OT typing. Method and Results: Representative slides of 20 less common OT were scanned (Nano Zoomer Digital Hamamatsu®) and the diagnostic algorithm proposed by Young and Scully applied to each case (Young RH and Scully RE, Seminars in Diagnostic Pathology 2001, 18: 161-235) to include: recognition of morphological pattern(s); shortlisting of differential diagnosis; proposition of relevant immunohistochemical markers. The next steps of this project will be: evaluation of the tool in several post-graduate training centers in Europe and Québec; improvement of its design based on evaluation results; diffusion to a larger public. Discussion: In clinical medicine, solving many cases is recognized as of utmost importance for a novice to become an expert. This project relies on the virtual slides technology to provide pathologists with a learning tool aimed at increasing their skills in OT typing. After due evaluation, this model might be extended to other uncommon tumors.
Resumo:
Aims: The aim of this work was to assess the ultrastructural changes, cellular proliferation, and the biofilm formation ability of F. nucleatum as defense mechanisms against the effect of HNP-1. Materials and methods: The type strain of F. nucleatum (ssp. nucleatum ATCC 25586) and two clinical strains (ssp. polymorphum AHN 9910 and ssp. nucleatum AHN 9508) were cultured and incubated with four different test concentrations of recombinant HNP-1 (1, 5, 10 and 20 µg/ml) and one control group (0 µg/ml). Bacterial pellets from each concentration were processed for TEM imaging. Planktonic growth was assessed and colony forming units (CFU) were measured to determine the cellular proliferation. Scrambled HNP-1 was used for confirmation. Results: TEM analyses revealed a decrease in the outer membrane surface corrugations and roughness of the strain AHN 9508 with increasing HNP-1 concentrations. In higher concentrations of HNP-1, the strain AHN 9910 showed thicker outer membranes with a number of associated rough vesicles attached to the outer surface. For ATCC 25586, the treated bacterial cells contained higher numbers of intracellular granules with increasing the peptide concentration. Planktonic growth of the two clinical strains were significantly enhanced (P<0.001) with gradually increased concentrations of HNP-1. None of the planktonic growth results of the 3 strains incubated with the scrambled HNP-1 was statistically significant. HNP-1 decreased the biofilm formation of the two clinical strains, AHN 9910 and 9508, significantly (P<0.01 and P<0.001; respectively). Conclusions: The present in vitro study demonstrates that F. nucleatum has the ability to withstand the lethal effects of HNP-1 even at concentrations simulating the diseased periodontium in vivo. The increase in planktonic growth could act as defense mechanisms of F. nucleatum against HNP-1.
Resumo:
This thesis proposes a new document model, according to which any document can be segmented in some independent components and transformed in a pattern-based projection, that only uses a very small set of objects and composition rules. The point is that such a normalized document expresses the same fundamental information of the original one, in a simple, clear and unambiguous way. The central part of my work consists of discussing that model, investigating how a digital document can be segmented, and how a segmented version can be used to implement advanced tools of conversion. I present seven patterns which are versatile enough to capture the most relevant documents’ structures, and whose minimality and rigour make that implementation possible. The abstract model is then instantiated into an actual markup language, called IML. IML is a general and extensible language, which basically adopts an XHTML syntax, able to capture a posteriori the only content of a digital document. It is compared with other languages and proposals, in order to clarify its role and objectives. Finally, I present some systems built upon these ideas. These applications are evaluated in terms of users’ advantages, workflow improvements and impact over the overall quality of the output. In particular, they cover heterogeneous content management processes: from web editing to collaboration (IsaWiki and WikiFactory), from e-learning (IsaLearning) to professional printing (IsaPress).
Resumo:
The biggest problem when analyzing the brain is that its synaptic connections are extremely complex. Generally, the billions of neurons making up the brain exchange information through two types of highly specialized structures: chemical synapses (the vast majority) and so-called gap junctions (a substrate of one class of electrical synapse). Here we are interested in exploring the three-dimensional spatial distribution of chemical synapses in the cerebral cortex. Recent research has showed that the three-dimensional spatial distribution of synapses in layer III of the neocortex can be modeled by a random sequential adsorption (RSA) point process, i.e., synapses are distributed in space almost randomly, with the only constraint that they cannot overlap. In this study we hypothesize that RSA processes can also explain the distribution of synapses in all cortical layers. We also investigate whether there are differences in both the synaptic density and spatial distribution of synapses between layers. Using combined focused ion beam milling and scanning electron microscopy (FIB/SEM), we obtained three-dimensional samples from the six layers of the rat somatosensory cortex and identified and reconstructed the synaptic junctions. A total volume of tissue of approximately 4500μm3 and around 4000 synapses from three different animals were analyzed. Different samples, layers and/or animals were aggregated and compared using RSA replicated spatial point processes. The results showed no significant differences in the synaptic distribution across the different rats used in the study. We found that RSA processes described the spatial distribution of synapses in all samples of each layer. We also found that the synaptic distribution in layers II to VI conforms to a common underlying RSA process with different densities per layer. Interestingly, the results showed that synapses in layer I had a slightly different spatial distribution from the other layers.
Resumo:
The plant cell wall constitutes an essential protection barrier against pathogen attack. In addition, cell-wall disruption leads to accumulation of jasmonates (JAs), which are key signaling molecules for activation of plant inducible defense responses. However, whether JAs in return modulate the cell-wall composition to reinforce this defensive barrier remains unknown. The enzyme 13-allene oxide synthase (13-AOS) catalyzes the first committed step towards biosynthesis of JAs. In potato (Solanum tuberosum), there are two putative St13-AOS genes, which we show here to be differentially induced upon wounding. We also determine that both genes complement an Arabidopsis aos null mutant, indicating that they encode functional 13-AOS enzymes. Indeed, transgenic potato plants lacking both St13-AOS genes (CoAOS1/2 lines) exhibited a significant reduction of JAs, a concomitant decrease in wound-responsive gene activation, and an increased severity of soft rot disease symptoms caused by Dickeya dadantii. Intriguingly, a hypovirulent D. dadantii pel strain lacking the five major pectate lyases, which causes limited tissue maceration on wild-type plants, regained infectivity in CoAOS1/2 plants. In line with this, we found differences in pectin methyl esterase activity and cell-wall pectin composition between wild-type and CoAOS1/2 plants. Importantly, wild-type plants had pectins with a lower degree of methyl esterification, which are the substrates of the pectate lyases mutated in the pel strain. These results suggest that, during development of potato plants, JAs mediate modification of the pectin matrix to form a defensive barrier that is counteracted by pectinolytic virulence factors from D. dadantii.
Resumo:
The crystal structure of the xanthine oxidase-related molybdenum-iron protein aldehyde oxido-reductase from the sulfate reducing anaerobic Gram-negative bacterium Desulfovibrio gigas (Mop) was analyzed in its desulfo-, sulfo-, oxidized, reduced, and alcohol-bound forms at 1.8-A resolution. In the sulfo-form the molybdenum molybdopterin cytosine dinucleotide cofactor has a dithiolene-bound fac-[Mo, = O, = S, ---(OH2)] substructure. Bound inhibitory isopropanol in the inner compartment of the substrate binding tunnel is a model for the Michaelis complex of the reaction with aldehydes (H-C = O,-R). The reaction is proposed to proceed by transfer of the molybdenum-bound water molecule as OH- after proton transfer to Glu-869 to the carbonyl carbon of the substrate in concert with hydride transfer to the sulfido group to generate [MoIV, = O, -SH, ---(O-C = O, -R)). Dissociation of the carboxylic acid product may be facilitated by transient binding of Glu-869 to the molybdenum. The metal-bound water is replenished from a chain of internal water molecules. A second alcohol binding site in the spacious outer compartment may cause the strong substrate inhibition observed. This compartment is the putative binding site of large inhibitors of xanthine oxidase.
Resumo:
We have developed an alignment-free method that calculates phylogenetic distances using a maximum-likelihood approach for a model of sequence change on patterns that are discovered in unaligned sequences. To evaluate the phylogenetic accuracy of our method, and to conduct a comprehensive comparison of existing alignment-free methods (freely available as Python package decaf+py at http://www.bioinformatics.org.au), we have created a data set of reference trees covering a wide range of phylogenetic distances. Amino acid sequences were evolved along the trees and input to the tested methods; from their calculated distances we infered trees whose topologies we compared to the reference trees. We find our pattern-based method statistically superior to all other tested alignment-free methods. We also demonstrate the general advantage of alignment-free methods over an approach based on automated alignments when sequences violate the assumption of collinearity. Similarly, we compare methods on empirical data from an existing alignment benchmark set that we used to derive reference distances and trees. Our pattern-based approach yields distances that show a linear relationship to reference distances over a substantially longer range than other alignment-free methods. The pattern-based approach outperforms alignment-free methods and its phylogenetic accuracy is statistically indistinguishable from alignment-based distances.
Resumo:
This paper presents a way to describe design patterns rigorously based on role concepts. Rigorous pattern descriptions are a key aspect for patterns to be used as rules for model evolution in the MDA context, for example. We formalize the role concepts commonly used in defining design patterns as a role metamodel using Object-Z. Given this role metamodel, individual design patterns are specified generically as a formal pattern role model using Object-Z. We also formalize the properties that must be captured in a class model when a design pattern is deployed. These properties are defined generically in terms of role bindings from a pattern role model to a class model. Our work provides a precise but abstract approach for pattern definition and also provides a precise basis for checking the validity of pattern usage in designs.
Resumo:
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not only offer benefits for web site structure improvement but also for better understanding of user navigational behavior. In this paper, we present a web usage mining method, which utilize web user usage and page linkage information to capture user access pattern based on Probabilistic Latent Semantic Analysis (PLSA) model. A specific probabilistic model analysis algorithm, EM algorithm, is applied to the integrated usage data to infer the latent semantic factors as well as generate user session clusters for revealing user access patterns. Experiments have been conducted on real world data set to validate the effectiveness of the proposed approach. The results have shown that the presented method is capable of characterizing the latent semantic factors and generating user profile in terms of weighted page vectors, which may reflect the common access interest exhibited by users among same session cluster.