Search results for "ATTAC"
showing 10 items of 610 documents
The Role of the Classical Pathway for the Bactericidal Effect of Normal Sera Against Gram-Negative Bacteria
1985
Many gram-negative bacteria are killed after treatment with normal serum. This phenomenon was already described in 1889 by Buchner. The serum-bactericidal effect is abolished when serum has been incubated for 30 min at 56° C. Gram-positive bacteria are less sensitive than gram-negative bacteria to direct killing, although gram-positive cocci are opsonized by the action of serum mediated by antibodies and complement (Inoue et al. 1968; Johnston et al. 1969). Normal sera exhibit bactericidal and bacteriolytic properties against some gramnegative strains; whereas, other gram-negative strains are serum resistant. It has been shown that serum from C4-deficient guinea pigs is able to kill some gr…
Interaction of Bacterial Endotoxin (LPS) with Fluid Phase and Macrophage Membrane Associated C1q, the FC-Recognizing Component of the Complement Syst…
1990
The bactericidal activity of normal serum was first described by Buchner in 1889 (10). This effect is abolished when serum has been incubated for 30 min at 56°C. Gram positives are less sensitive than Gram negative bacteria to direct killing, although gram positive cocci are opsonized by the action of serum mediated by antibodies and complement (22). It was found that most of the smooth strains of gram negative bacteria are serum resistant; whereas, the corresponding rough forms are extremely serum sensitive (32, 37). Thus evidence was provided that the composition of the bacterial surface may influence the reaction of the bacteria with the lytic system. The bacteriolytic properties of seru…
Group climate, cohesion, and curative climate: A study on the common factors in the group process and their relation with members' attachment dimensi…
2015
This study examined the relationships among the group process measured by the Group Climate Questionnaire, the Cohesion to the Therapist Scale and Cohesion to the Group Scale, and the Curative Climate Instrument to explore higher order factors that explained the group relationship in a sample of 91 female university students attending six interpersonal growth groups. Furthermore, the study examined how group members' attachment dimensions, anxiety, and avoidance were associated to their perceptions of the group relationship. We found that a three-factor model consisting of positive bond, positive work, and negative relationship approached conventional standards of a model fit. Moreover, the…
Das Adult Attachment Interview - Grundlagen, Anwendung und Einsatzmöglichkeiten im klinischen Alltag
2013
The present paper looks at the potential of the Adult Attachment Interview (AAI) and its underlying basis in attachment theory for use in psychotherapeutic work. We summarize the basic tenets of attachment theory, detail the content and structure of the AAI, provide instructions for conducting the AAI, and introduce the Main et al. (2002) coding system. We then report on associations between AAI-Attachment groups and psychosomatic diseases and, finally, demonstrate applications of the AAI in clinical work and research.
Using Cloud Computing to Implement a Security Overlay Network
2012
This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.
L'attaccamento ai luoghi come modello interpretativo delle relazioni dell'uomo con la cultura. Una ricerca su un campione di ragazzi tunisini della c…
2014
L'attaccamento al luogo è un essenziale bisogno umano in grado di nutrire il senso dell'identità di individui e collettività, a prescindere dai cambiamenti della società. Intento principale in questo lavoro di tesi è quello dell'integrazione, legato al fenomeno dell' intercultura. Il lavoro di tesi è riferito nello specifico nella città di Mazara del Vallo, centro nevralgico di incontro di culture. Ho scelto di indagare la percezione del luogo da parte della popolazione immigrata, coinvolgendo in particolare gli adolescenti che costituiscono la cosiddetta "seconda generazione", e confrontandone le opinioni con quelle espresse dai coetanei autoctoni. L'aspetto più propriamente statistico rig…
Complex Networked Systems: Convergence Analysis, Dynamic Behaviour, and Security.
Complex networked systems are a modern reference framework through which very dierent systems from far disciplines, such as biology, computer science, physics, social science, and engineering, can be described. They arise in the great majority of modern technological applications. Examples of real complex networked systems include embedded systems, biological networks, large-scale systems such as power generation grids, transportation networks, water distribution systems, and social network. In the recent years, scientists and engineers have developed a variety of techniques, approaches, and models to better understand and predict the behaviour of these systems, even though several research…
Attachement, comportement social et attribution d'intentions dans la trisomie 21
2017
International audience; Cette étude s’inscrit dans le champ des recherches sur le développement sociocognitif des enfants déficients intellectuels porteurs d’une trisomie 21 (T21). Elle porte sur les liens entre les représentations d’attachement et le comportement social avec les pairs, ainsi que sur les liens entre les représentations d’attachement et l’attribution d’intentions dans des situations de provocation où l’intention du personnage qui cause le dommage est ambigüe.
Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks
2020
Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…
Dog-bite-related attacks: A new forensic approach
2020
Dog attacks today represent a health hazard considering that prevention strategies have not always been successful. The identification of the dog that attacked the victim is necessary, considering the civil or criminal consequences for the animal's owner. An accurate scene analysis must be performed collecting a series of important information.Forensic investigations in dog attacks involve different methods, such as the evaluating of the canine Short Tandem Repeat (STR) typing in saliva traces on wounds or bite mark analysis, however, these techniques cannot always be applied. The effort to find new methods to identify the dog that attacked the victim represents a very interesting field for…