194 research outputs found

    Avifauna of a structurally heterogenous forest landscape in the Serra dos Caiabis, Mato Grosso, Brazil: a preliminary assesment.

    Get PDF
    Apresentamos um levantamento preliminar da avifauna da Serra dos Caiabis do município de Alta Floresta, estado de Mato Grosso, Brasil. A região se localiza no extremo centro-norte do estado, na zona de contato entre duas biomas: as florestas húmidas da Amazônia e o cerrado do Brasil central. É caracterizada por solos arenosos de baixa qualidade e marcada por um grande mosaico vegetational rico e diverso, com campinaranas e campinas abertas e florestas altas nas bordas dos rios da formação geológica. A comunidade das aves na Serra dos Caiabis tem uma menor riqueza (362 espécies) em relação à comunidade bem conhecida das florestas húmidas de Alta Floresta, incluindo aves tanto de cerrados e campinaranas como florestais. Foram registradas extensões na ocorrência de algumas espécies e pelo menos duas adendas para Mato Grosso (Cyanocorax chrysops e Tangara varia). O preço da terra na região é baixo devido á qualidade dos solos, o que até recentemente impediu o desenvolvimento agrícola. Porém a região já está sob ameaça de desmatamento para uso agrícola, pois a maioria da terra em áreas vizinhas de Sinop e Alta Floresta está sendo explorada

    Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework

    Get PDF
    The notion that the human user is the weakest link in information security has been strongly, and, we argue, rightly contested in recent years. Here, we take a step further showing that the human user can in fact be the strongest link for detecting attacks that involve deception, such as application masquerading, spearphishing, WiFi evil twin and other types of semantic social engineering. Towards this direction, we have developed a human-as-a-security-sensor framework and a practical implementation in the form of Cogni-Sense, a Microsoft Windows prototype application, designed to allow and encourage users to actively detect and report semantic social engineering attacks against them. Experimental evaluation with 26 users of different profiles running Cogni-Sense on their personal computers for a period of 45 days has shown that human sensors can consistently outperform technical security systems. Making use of a machine learning based approach, we also show that the reliability of each report, and consequently the performance of each human sensor, can be predicted in a meaningful and practical manner. In an organisation that employs a human-as-a-security-sensor implementation, such as Cogni-Sense, an attack is considered to have been detected if at least one user has reported it. In our evaluation, a small organisation consisting only of the 26 participants of the experiment would have exhibited a missed detection rate below 10%, down from 81% if only technical security systems had been used. The results strongly point towards the need to actively involve the user not only in prevention through cyber hygiene and user-centric security design, but also in active cyber threat detection and reporting

    Persistent Place-Making in Prehistory: the Creation, Maintenance, and Transformation of an Epipalaeolithic Landscape

    Get PDF
    Most archaeological projects today integrate, at least to some degree, how past people engaged with their surroundings, including both how they strategized resource use, organized technological production, or scheduled movements within a physical environment, as well as how they constructed cosmologies around or created symbolic connections to places in the landscape. However, there are a multitude of ways in which archaeologists approach the creation, maintenance, and transformation of human-landscape interrelationships. This paper explores some of these approaches for reconstructing the Epipalaeolithic (ca. 23,000–11,500 years BP) landscape of Southwest Asia, using macro- and microscale geoarchaeological approaches to examine how everyday practices leave traces of human-landscape interactions in northern and eastern Jordan. The case studies presented here demonstrate that these Epipalaeolithic groups engaged in complex and far-reaching social landscapes. Examination of the Early and Middle Epipalaeolithic (EP) highlights that the notion of “Neolithization” is somewhat misleading as many of the features we use to define this transition were already well-established patterns of behavior by the Neolithic. Instead, these features and practices were enacted within a hunter-gatherer world and worldview

    Guiding Principles for Chronic Total Occlusion Percutaneous Coronary Intervention.

    Get PDF
    Outcomes of chronic total occlusion (CTO) percutaneous coronary intervention (PCI) have improved because of advancements in equipment and techniques. With global collaboration and knowledge sharing, we have identified 7 common principles that are widely accepted as best practices for CTO-PCI.  1. Ischemic symptom improvement is the primary indication for CTO-PCI.  2. Dual coronary angiography and in-depth and structured review of the angiogram (and, if available, coronary computed tomography angiography) are key for planning and safely performing CTO-PCI.  3. Use of a microcatheter is essential for optimal guidewire manipulation and exchanges.  4. Antegrade wiring, antegrade dissection and reentry, and the retrograde approach are all complementary and necessary crossing strategies. Antegrade wiring is the most common initial technique, whereas retrograde and antegrade dissection and reentry are often required for more complex CTOs.  5. If the initially selected crossing strategy fails, efficient change to an alternative crossing technique increases the likelihood of eventual PCI success, shortens procedure time, and lowers radiation and contrast use.  6. Specific CTO-PCI expertise and volume and the availability of specialized equipment will increase the likelihood of crossing success and facilitate prevention and management of complications, such as perforation.  7. Meticulous attention to lesion preparation and stenting technique, often requiring intracoronary imaging, is required to ensure optimum stent expansion and minimize the risk of short- and long-term adverse events. These principles have been widely adopted by experienced CTO-PCI operators and centers currently achieving high success and acceptable complication rates. Outcomes are less optimal at less experienced centers, highlighting the need for broader adoption of the aforementioned 7 guiding principles along with the development of additional simple and safe CTO crossing and revascularization strategies through ongoing research, education, and training
    corecore