24 research outputs found

    Евгеника в древнеиндийской культуре арийских племен

    Get PDF
    Eugenie în vechea cultură indiană a triburilor arieneDuring 1500 BC the nomadic tribes of the Aryan people migrated to the Indian subcontinent. They strongly believed in their superiority above the local inhabitants, and raised social barriers to create a perfect race. The ideal family and the birth (motherhood) of a son, as an offspring to continue father’s presence in earth, were of great importance. The union of a perfect couple, man and wife, was sacred. Ayurveda, which literally means “knowledge of life» was infiltrated in religion. Thus, Aryans divinised their views and eugenics conquered their minds, helped them to survive and at the end drove them to isolation, becoming their doom.Евгеника в древнеиндийской культуре арийских племе

    Diagoras of Cyprus (3rd century BC) – an eminent oculist and opposer to the use of opium

    Get PDF
    The objective of this article is to showcase the use of opium in ancient times, as well as the beliefs surrounding it, focusing on the opinion of Diagoras of Cyprus, a physician with great knowledge of pharmacology who probably practiced ophthalmology, composing a rose-based collyrium. Opium, a drug produced from poppy, used to have several uses such as in anesthesia, pain relief and ritualistic purposes. There is evidence of its creation since before 5000BC. In Greece, the first documentation dates back to around 2600-1100 BC in Crete. Many ancient medico-philosophers used to utilize it in their practice, mentioning it in the majority of the medical texts of that time. However, there were others that disapproved of its use due to the possible side effects. Diagoras was one of them, as he categorized opium as a lethal substance that could cause severe problems to the vision. He may even have thought of the possible addiction that it can cause because of the euphoric state it puts a person in. Some practitioners mentioned Diagoras’s opinion on opium, such as Erasistratus and Pliny the Elder. Despite his contributions in opium usage and ophthalmology, Diagoras is still unappreciated as a medical figure

    Detecting Targeted Attacks Using Shadow Honeypots

    Get PDF
    We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network/service. Traffic that is considered anomalous is processed by a "shadow honeypot'' to determine the accuracy of the anomaly prediction. The shadow is an instance of the protected software that shares all internal state with a regular ("production'') instance of the application, and is instrumented to detect potential attacks. Attacks against the shadow are caught, and any incurred state changes are discarded. Legitimate traffic that was misclassified will be validated by the shadow and will be handled correctly by the system transparently to the end user. The outcome of processing a request by the shadow is used to filter future attack instances and could be used to update the anomaly detector. Our architecture allows system designers to fine-tune systems for performance, since false positives will be filtered by the shadow. Contrary to regular honeypots, our architecture can be used both for server and client applications. We demonstrate the feasibility of our approach in a proof-of-concept implementation of the Shadow Honeypot architecture for the Apache web server and the Mozilla Firefox browser. We show that despite a considerable overhead in the instrumentation of the shadow honeypot (up to 20% for Apache), the overall impact on the system is diminished by the ability to minimize the rate of false-positives

    The Italian anatomist Realdo Colombo (1516-1559) and his contribution to the discovery of pulmonary circulation

    No full text
    In our article we present the anatomical work of the distinguished Renaissance anatomist Realdo Colombo, as well as, his contribution to the discovery of pulmonary circulation. Colombo was not the first to describe the pulmonary circulation, but he backed up this hypothesis with evidence after extensive dissection and vivisection. He paved the way for his successors and particularly William Harvey (1578-1657) to the establishment of anatomy and physiology of blood circulation

    Paul of Aegina (ca 625-690 AD), His Work and His Contribution to the Treatment of Spine Disorders: The First Routine Laminectomy in the Recorded History

    No full text
    The purpose of this historical review is to summarize the work of Paul of Aegina and especially his contribution to the treatment of Spine disorders and trauma. A major review of the literature was undertaken with emphasis on the treatise of Paul himself as well as those of later scholars and historians. Paul expanded the horizons of surgery of his time, using his talent to perform very complicated surgery with favorite outcomes in a variety of diseases in many fields of medicine. This review will focus especially on his use of laminectomy for spinal decompression and how his successful results led him to establish his method as a routine and safe method for the treatment of spinal stenosis. However, our knowledge of his full work is at least incomplete and, from all we know, he does not seem to mention the long term effect that such an operation has on spine stability and movement

    Design and Implementation of a High-Performance Network Intrusion Prevention System

    No full text
    Abstract: Network intrusion prevention systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software-based network intrusion prevention systems have difficulty in handling high speed links. This paper describes the design and implementation of a high-performance network intrusion prevention system that combines the use of software-based network intrusion prevention sensors and a network processor board. The network processor acts as a customized load balancing splitter that cooperates with a set of modified content-based network intrusion detection sensors in processing network traffic. We show that the components of such a system, if co-designed, can achieve high performance, while minimizing redundant processing and communication. We have implemented the system using low-cost, off-the-shelf technology: an IXP1200 network processor evaluation board and commodity PCs. Our evaluation shows that our enhancements can reduce the processing load of the sensors by at least 45 % resulting in a system that can handle a fully-loaded Gigabit Ethernet link using at most four commodity PCs
    corecore