Science.gov

Sample records for acute hae attacks

  1. Screening for hereditary angioedema (HAE) at 13 emergency centers in Osaka, Japan

    PubMed Central

    Hirose, Tomoya; Kimbara, Futoshi; Shinozaki, Masahiro; Mizushima, Yasuaki; Yamamoto, Hidehiko; Kishi, Masashi; Kiguchi, Takeyuki; Shiono, Shigeru; Noborio, Mitsuhiro; Fuke, Akihiro; Akimoto, Hiroshi; Kimura, Takaaki; Kaga, Shinichiro; Horiuchi, Takahiko; Shimazu, Takeshi

    2017-01-01

    Abstract Hereditary angioedema (HAE) with deficiency of C1 inhibitor (C1-INH) is an autosomal-dominant disease characterized by recurrent episodes of potentially life-threatening angioedema. The objective is to study the incidence of HAE among patients who visit the emergency department. This was a 3-year prospective observational screening study involving 13 urban tertiary emergency centers in Osaka prefecture, Japan. Patients were included if they met the following criteria: unexplained edema of the body, upper airway obstruction accompanied by edema, anaphylaxis, acute abdomen with intestinal edema (including ileus and acute pancreatitis), or asthma attack. C1-INH activity and C4 level were measured at the time of emergency department admission during the period between July 2011 and June 2014. This study comprised 66 patients with a median age of 54.0 (IQR: 37.5–68.3) years. Three patients were newly diagnosed as having HAE, and 1 patient had already been diagnosed as having HAE. C1-INH activity levels of the patients with HAE were below the detection limit (<25%), whereas those of non-HAE patients (n = 62) were 106% (IQR: 85.5%–127.0%) (normal range, 70%–130%). The median level of C4 was significantly lower in the patients with HAE compared with those without HAE (1.2 [IQR: 1–3] mg/dL vs 22 [IQR: 16.5–29.5] mg/dL, P < 0.01) (normal range, 17–45 mg/dL). Three patients with undiagnosed HAE were diagnosed as having HAE in the emergency department during the 3-year period. If patients have signs and symptoms suspicious of HAE, the levels of C1-INH activity and C4 should be measured. PMID:28178173

  2. Acute asthma: under attack.

    PubMed

    Kissoon, Niranjan

    2002-06-01

    The burden of asthma (death, disability, and an increasing prevalence) makes it a major public health problem worldwide. In an effort to decrease this burden, investigators are studying many aspects of this disease. The role of race, ethnicity, infections, and pollutants as triggers, as well as the risk factors are now being defined. Research into methods to decrease acute exacerbations and improve emergency and in-hospital management, using standardized protocols and incentives for follow-up care, has yielded valuable information but has met with limited success. Adherence to the national guidelines has been poor and to some extent can be attributed to the lack of a practical method of measuring the degree of lung inflammation and cumbersome treatment protocols. Exhaled nitric oxide is a noninvasive marker of inflammation and may provide a rational method to titrate corticosteroid and leukotriene receptor antagonist therapy. The best route and dosing regimen for corticosteroid administration (oral vs intramuscular vs nebulized) are the subject of several studies, with no clear-cut winner. The burden of asthma in developing countries with limited financial resources has also triggered a search for simpler, cheaper, and practical methods for beta-agonist delivery using indigenous spacers. Recent research in asthma has unveiled our incomplete knowledge of the disease but has also provided a sense of where efforts should be expended. Research into the genetics and pharmacogenetics of asthma and into the societal factors limiting the delivery of optimal care is likely to yield useful and practical information.

  3. A Decade of Change: Recent Developments in Pharmacotherapy of Hereditary Angioedema (HAE).

    PubMed

    Bork, Konrad

    2016-10-01

    Hereditary angioedema (HAE) due to C1 esterase inhibitor (C1-INH) deficiency (HAE-C1-INH) is a rare but medically significant disease that can be associated with considerable morbidity and mortality. Research into the pathogenesis of HAE-C1-INH has expanded greatly in the last six decades and has led to new clinical trials with novel therapeutic agents and treatment strategies. Mechanisms of pharmacotherapy include (a) supplementing C1-INH, the missing serine-protease inhibitor in HAE; (b) inhibiting the activation of the contact system and the uncontrolled release of proteases in the kallikrein-kinin system, by blocking the production/function of its components; (c) inhibiting the fibrinolytic system by blocking the production/function of its components; and (d) inhibiting the function of bradykinin at the endothelial level. Strategies for managing HAE-C1-INH are aimed at treating acute attacks, or preventing attacks, through the use of prophylactic treatment. Available agents for treating acute attacks include plasma-derived C1-INH concentrates, a recombinant C1-INH, a bradykinin B2 receptor antagonist, and a plasma kallikrein inhibitor. Long-term prophylactic treatments include attenuated androgens, plasma-derived C1-INH concentrates, and anti-fibrinolytics. Plasma-derived C1-INH and a bradykinin B2 receptor antagonist are already approved for self-administration at home. The number of management options for HAE-C1-INH has increased considerably within the past decade, thus helping to alleviate the burden of this rare disease.

  4. A treatment for the acute migraine attack.

    PubMed

    Adam, E I

    1987-01-01

    A compound analgesic/anti-emetic formulation was significantly effective in reducing the severity of acute attacks of migraine, in a double-blind, randomized, crossover trial of 34 patients referred to a migraine clinic. The preparation contained paracetamol (acetaminophen) 500 mg, codeine phosphate 8 mg, buclizine hydrochloride 6.25 mg and dioctyl sodium sulphosuccinate 10 mg. The dosage was two tablets taken as early as possible in the acute attack. No specific factors could be identified which influenced response to treatment. Patients with a long history of migraine (more than 10 years) responded as well as those with a recent onset of the condition.

  5. Recent developments in the treatment of acute abdominal and facial attacks of hereditary angioedema: focus on human C1 esterase inhibitor

    PubMed Central

    Cardona, Lourdes Pastó; Bellfill, Ramon Lleonart; Caus, Joaquim Marcoval

    2010-01-01

    Hereditary angioedema (HAE) is a potentially fatal genetic disorder typified by a deficiency (type I) or dysfunction (type II) of the C1-inhibitor (C1-INH) and characterized by swelling of the extremities, face, trunk, abdominal viscera, and upper airway. Type III is normal estrogen-sensitive C1-INH HAE. Bradykinin, the main mediator of HAE, binds to endothelial B2 receptors, increasing vascular permeability and resulting in edema. HAE management includes short- and long-term prophylaxis. For treating acute episodes, C1-INH concentrate is recommended with regression of symptoms achieved in 30–90 min. Infusions of 500–1000 U have been used in Europe for years. Two plasma-derived C1-INH concentrates have been licensed recently in the United States: Berinert® for treating acute attacks and Cinryze® for prophylaxis in adolescent/adult patients. A recombinant C1-INH that is being considered for approval (conestat alfa) exhibited significant superiority versus placebo. Ecallantide (Kalbitor®) is a selective kallikrein inhibitor recently licensed in the United States for treating acute attacks in patients aged >16 years. It is administered in three 10-mg subcutaneous injections with the risk of anaphylactic reactions. Icatibant (Firazyr®) is a bradykinin B2 receptor competitor. It is administered subcutaneously as a 30-mg injection and approved in Europe but not in the United States. PMID:23776358

  6. Postangioedema attack skin blisters: an unusual presentation of hereditary angioedema.

    PubMed

    Wiesen, Jonathan; Gonzalez-Estrada, Alexei; Auron, Moises

    2014-04-10

    Hereditary angioedema (HAE) is an autosomal dominant disorder characterised by attacks of self-limited swelling affecting extremities, face and intra-abdominal organs, most often caused by mutations in the C1-inhibitor gene with secondary Bradykinin-mediated increased vascular permeability. We describe a 36-year-old man with a history of HAE who presented with painful interdigital bullae secondary to an acute oedema exacerbation. Biopsy and cultures of the lesions were negative and they resolved spontaneously. It is important to highlight and recognise the development of oedema blisters after resolution of a flare of HAE (only 1 previous case report), and hence avoid unnecessary dermatological diagnostic workup and treatment.

  7. Hereditary angioedema (HAE): a cause for recurrent abdominal pain.

    PubMed

    Soni, Parita; Kumar, Vivek; Alliu, Samson; Shetty, Vijay

    2016-11-14

    A 44-year-old Hispanic woman presented to the emergency room with a 2-day history of sudden onset of severe cramping left lower quadrant abdominal pain associated with ∼20 episodes diarrhoea. Abdominal CT scan exhibited bowel wall oedema and acute extensive colitis. On the basis of the preliminary diagnosis of acute abdomen, the patient was admitted under the surgical team and treated for acute colitis. Since her family history was significant for hereditary angioedema (HAE), complement studies were performed which revealed low complement C4 levels and abnormally low values of C1q esterase inhibitor. Thus, the diagnosis of HAE type I was established. This case report summarises that the symptoms of HAE are often non-specific, hence making the underlying cause difficult to diagnose.

  8. Acute edema blisters in a hereditary angioedema cutaneous attack.

    PubMed

    Fernández Romero, D; Di Marco, P; Malbrán, A

    2008-01-01

    Hereditary angioedema is a rare autosomal dominant disease characterized by recurrent episodes of acute edema affecting the skin and the respiratory and digestive tracts. Acute edema blisters or hydro-static bullae develop after rapid accumulation of interstitial fluid usually associated to cardiac insufficiency. Lesions contain sterile fluid and break up easily resolving without scars. Blisters disappear when fluid accumulation resolves. We describe a patient developing recurrent acute edema blisters as a consequence of cutaneous hereditary angioedema attacks.

  9. Acute kidney injury after massive attack of Africanised bees

    PubMed Central

    Bridi, Ramaiane A; Balbi, Andre Luis; Neves, Precil M; Ponce, Daniela

    2014-01-01

    Acute kidney injury (AKI) is a well-documented complication of massive attack by Africanised bees and can be observed 48–72 h after the accident. We report a case of Africanised bees attack followed by severe and lethal AKI. A 56-year-old man was admitted to emergency department after a massive attack of Africanised bees (>1000 bee stings). He was unconscious, presenting with hypotension and tachycardia. Mechanical ventilation, volume expansion and care for anaphylaxis were instituted. The patient was transferred to the intensive care unit (ICU) and after 48 h he developed rhabdomyolysis, oliguria, increased creatinine levels, hyperkalaemia and refractory acidosis. A diagnosis of AKI secondary to rhabdomyolysis and shock was made. The patient was treated with a prolonged course of haemodialysis. However, he progressed to refractory shock and died 5 days after admission. PMID:24618864

  10. Repeat treatment of acute hereditary angioedema attacks with open-label icatibant in the FAST-1 trial

    PubMed Central

    Malbrán, A; Riedl, M; Ritchie, B; Smith, W B; Yang, W; Banerji, A; Hébert, J; Gleich, G J; Hurewitz, D; Jacobson, K W; Bernstein, J A; Khan, D A; Kirkpatrick, C H; Resnick, D; Li, H; Fernández Romero, D S; Lumry, W

    2014-01-01

    Hereditary angioedema (HAE) is characterized by potentially life-threatening recurrent episodes of oedema. The open-label extension (OLE) phase of the For Angioedema Subcutaneous Treatment (FAST)-1 trial (NCT00097695) evaluated the efficacy and safety of repeated icatibant exposure in adults with multiple HAE attacks. Following completion of the randomized, controlled phase, patients could receive open-label icatibant (30 mg subcutaneously) for subsequent attacks. The primary end-point was time to onset of primary symptom relief, as assessed by visual analogue scale (VAS). Descriptive statistics were reported for cutaneous/abdominal attacks 1–10 treated in the OLE phase and individual laryngeal attacks. Post-hoc analyses were conducted in patients with ≥ 5 attacks across the controlled and OLE phases. Safety was evaluated throughout. During the OLE phase, 72 patients received icatibant for 340 attacks. For cutaneous/abdominal attacks 1–10, the median time to onset of primary symptom relief was 1·0–2·0 h. For laryngeal attacks 1–12, patient-assessed median time to initial symptom improvement was 0·3–1·2 h. Post-hoc analyses showed the time to onset of symptom relief based on composite VAS was consistent across repeated treatments with icatibant. One injection of icatibant was sufficient to treat 88·2% of attacks; rescue medication was required in 5·3% of attacks. No icatibant-related serious adverse events were reported. Icatibant provided consistent efficacy and was well tolerated for repeated treatment of HAE attacks. PMID:24749847

  11. Angiotensin-converting enzyme inhibitor-induced angioedema and hereditary angioedema: a comparison study of attack severity.

    PubMed

    Javaud, Nicolas; Charpentier, Stéphane; Lapostolle, Frédéric; Lekouara, Hakim; Boubaya, Marouane; Lenoir, Gilles; Mekinian, Arsène; Adnet, Frédéric; Fain, Olivier

    2015-01-01

    Objective There appears to be differences in the clinical presentation of hereditary angioedema (HAE) and angiotensin-converting enzyme inhibitor-induced (ACE-I) angioedema (AE). The aim of this study was to compare the clinical characteristics of these two AE forms. Methods We conducted a retrospective study of consecutive patients with HAE or ACE-I AE. The attack characteristics experienced by the patients were compared by a logistic regression analysis using generalized estimating equations. Results A total of 56 patients were included in this study (ACE-I AE, n=25; HAE, n=31). A total of 534 attacks were documented. Severe attacks were more common in the patients who had an acute episode of ACE-I AE than HAE. Swelling of the tongue, lips and larynx were significantly associated with ACE-I AE [OR: 8.70 (95% CI, 1.04-73.70), OR: 20.4 (95% CI, 4.9-84.2) and OR: 7.50 (95% CI, 1.20-48.30), respectively]. Conclusion Swelling of the tongue, lips and larynx are significantly more frequent in drug-induced AE than HAE.

  12. Hereditary angioedema with normal C1-INH (HAE type III).

    PubMed

    Riedl, Marc A

    2013-01-01

    Hereditary angioedema (HAE) with normal C1 inhibitor (C1-INH), also known as HAE type III, is a familial condition only clinically recognized within the past three decades. Similar to HAE from C1-INH deficiency (HAE types I and II), affected individuals experience unpredictable angioedema episodes of the skin, gastrointestinal tract, and airway. Unique clinical features of HAE with normal C1-INH include the predominance of affected women, frequent exacerbation by estrogen, and a prominence of angioedema that involves the face and oropharynx. The underlying pathophysiology of HAE with normal C1-INH is poorly understood, but indirect evidence points to contact pathway dysregulation with bradykinin-mediated angioedema. Currently, evaluation is complicated by a lack of confirmatory laboratory testing such that clinical criteria must often be used to make the diagnosis of HAE with normal C1-INH. Factor XII mutations have been identified in only a minority of persons affected by HAE with normal C1-INH, limiting the utility of such analysis. To date, no controlled clinical studies have examined the efficacy of therapeutic agents for HAE with normal C1-INH, although published evidence supports frequent clinical benefit with medications shown effective in HAE due to C1-INH deficiency.

  13. Acute stress disorder in hospitalised victims of 26/11-terror attack on Mumbai, India.

    PubMed

    Balasinorwala, Vanshree Patil; Shah, Nilesh

    2010-11-01

    The 26/11 terror attacks on Mumbai have been internationally denounced. Acute stress disorder is common in victims of terror. To find out the prevalence and to correlate acute stress disorder, 70 hospitalised victims of terror were assessed for presence of the same using DSM-IV TR criteria. Demographic data and clinical variables were also collected. Acute stress disorder was found in 30% patients. On demographic profile and severity of injury, there were some interesting observations and differences between the victims who developed acute stress disorder and those who did not; though none of the differences reached the level of statistical significance. This study documents the occurrence of acute stress disorder in the victims of 26/11 terror attack.

  14. Prevention of comorbidity and acute attack of gout by uric acid lowering therapy.

    PubMed

    Joo, Kowoon; Kwon, Seong-Ryul; Lim, Mie-Jin; Jung, Kyong-Hee; Joo, Hoyeon; Park, Won

    2014-05-01

    The object of this study was to evaluate the effect of uric acid lowering therapy in reducing the new development of comorbidities and the frequency of acute attacks in gout patients. We retrospectively reviewed patients who were diagnosed to have gout with at least 3 yr of follow up. They were divided into 2 groups; 53 patients with mean serum uric acid level (sUA)<6 mg/dL and 147 patients with mean sUA≥6 mg/dL. Comorbidities of gout such as hypertension (HTN), type II diabetes mellitus (DM), chronic kidney disease, cardiovascular disease (CVD) and urolithiasis were compared in each group at baseline and at last follow-up visit. Frequency of acute gout attacks were also compared between the groups. During the mean follow up period of 7.6 yr, the yearly rate of acute attack and the new development of HTN, DM, CVD and urolithiasis was lower in the adequately treated group compared to the inadequately treated group. Tight control of uric acid decreases the incidence of acute gout attacks and comorbidities of gout such as HTN, DM, CVD and urolithiasis.

  15. Acute renal failure following massive attack by Africanized bee stings.

    PubMed

    Bresolin, Nilzete L; Carvalho, Lígia C; Goes, Eduardo C; Fernandes, Regina; Barotto, Adriana M

    2002-08-01

    Bee venom is a complex substance, which acts in several tissues. Although severe allergic reactions have occurred after one or more stings, several deaths have been reported without allergic manifestations, emphasizing the toxic effects of massive poisoning. A number of about 500 stings have been considered necessary to cause death by direct toxicity, but as few as 30-50 stings have proved fatal in children. Among the major toxic effects are hemolytic anemia, acute renal failure (ARF), and shock. ARF may be due to a common toxic-ischemic mechanism with hypovolemic or anaphylactic shock, pigment tubulopathy (myoglobinuria and hemoglobinuria), or acute tubular necrosis (ATN) from a direct kidney toxicity of the venom. We present a case of rhabdomyolysis and hemolysis with consequent ARF which developed after about 800 bee stings. The patient recovered completely after peritoneal dialysis.

  16. Circumscribed Ciliochoroidal Effusion Presenting as an Acute Angle Closure Attack

    PubMed Central

    Lipa, Roslyn Kathryn Manrique; Sánchez, María Eugenia González; Ordovas, Carlos Antonio Hijar; Aragües, Abel Rojo; Borque, Carmen Garcia

    2017-01-01

    Purpose: To report a case of choroidal effusion probably caused by angiotensin receptor II blocker. Case Report: A 52-year-old man with aplastic anemia and high blood pressure who developed unilateral acute angle closure glaucoma after receiving oral cyclosporine and angiotensin II receptor blocker (losartan). Ophthalmic examination revealed visual acuity of 20/30 in the left eye, mild mydriasis, iris bombe, no anterior chamber reaction, mild conjunctival hyperemia, and the intraocular pressure of 30 mmHg. After laser YAG iridotomy, funduscopy was performed showing a choroidal circumscribed lesion at the inferotemporal quadrant. Diagnostic tests ruled out any inflammatory or malignancy process, and the choroidal lesion spontaneously disappeared. After 20 months of follow-up, patient's ocular remained stable. Conclusion: This is the third case of choroidal effusion associated with angiotensin II receptor blockers. Since idiosyncratic ciliochoroidal effusion is a diagnosis of exclusion, it is mandatory to rule out more frequent causes, such as inflammatory or malignant processes. PMID:28299016

  17. Does the initiation of urate-lowering treatment during an acute gout attack prolong the current episode and precipitate recurrent attacks: a systematic literature review.

    PubMed

    Eminaga, Fatma; Le-Carratt, Jonathan; Jones, Adrian; Abhishek, A

    2016-12-01

    The aim of this study was to systematically review the literature on effect of initiating urate-lowering treatment (ULT) during an acute attack of gout on duration of index attack and persistence on ULT. OVID (Medline), EMBASE and AMED were searched to identify randomized controlled trials (RCTs) of ULT initiation during acute gout attack published in English language. Two reviewers appraised the study quality and extracted data independently. Standardized mean difference (SMD) and relative risk (RR) were used to pool continuous and categorical data. Meta-analysis was carried out using STATA version 14. A total of 537 studies were selected. A total of 487 titles and abstracts were reviewed after removing duplicates. Three RCTs were identified. There was evidence from two high-quality studies that early initiation of allopurinol did not increase pain severity at days 10-15 [SMDpooled (95 % CI) 0.18 (-0.58, 0.93)]. Data from three studies suggested that initiation of ULT during an acute attack of gout did not associate with dropouts [RRpooled (95 % CI) 1.16 (0.58, 2.31)]. There is moderate-quality evidence that the initiation of ULT during an acute attack of gout does not increase pain severity and risk of ULT discontinuation. Larger studies are required to confirm these findings so that patients with acute gout can be initiated on ULT with confidence.

  18. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  19. Typhoid fever as a triggering factor in acute and intractable bronchial asthma attack.

    PubMed

    Wardhana; Surachmanto, Eko E; Datau, E A

    2013-10-01

    Typhoid fever is an enteric infection caused by Salmonella typhi. In Indonesia, typhoid fever is endemic with high incidence of the disease. In daily practice we frequently have patients with bronchial asthma, and it is becoming worse when these patients get typhoid fever. After oral ingestion, Salmonella typhi invades the the intestine mucosa after conducted by microbial binding to epithelial cells, destroying the microfold cells (M cell) then passed through the lamina propria and detected by dendritic cells (DC) which express a variety of pathogen recognition receptors on the surfaces, including Toll-Like Receptor (TLR). expressed on macrophages and on intestinal epithelial cells inducing degradation of IB, and translocation of NF-B (Nuclear Factor-Kappa Beta). This process initiates the induction of pro-inflammatory gene expression profile adhesion molecules, chemokines, adhesion molecules, and other proteins that induce and perpetuate the inflammation in host cells then will induce acute ant intractable attack of bronchial asthma. The role of typhoid fever in bronchial asthma, especially in persons with acute attack of bronchial asthma, is not well understood. In this article, we will discuss the role of typhoid fever in the bronchial asthma patients which may cause bronchial asthma significantly become more severe even triggering the acute and intractable attack of bronchial asthma. This fact makes an important point, to treat completely the typhoid fever in patients with bronchial asthma.

  20. The role of neutrophil lymphocyte ratio to leverage the differential diagnosis of familial Mediterranean fever attack and acute appendicitis

    PubMed Central

    Kucuk, Adem; Erol, Mehmet Fatih; Senel, Soner; Eroler, Emir; Yumun, Havvanur Alparslan; Uslu, Ali Ugur; Erol, Asiye Mukaddes; Tihan, Deniz; Duman, Ugur; Kucukkartallar, Tevfik; Solak, Yalcin

    2016-01-01

    Background/Aims: Familial Mediterranean fever (FMF) is an autosomal recessive disorder characterized by attacks of fever and diffuse abdominal pain. The primary concern with this presentation is to distinguish it from acute appendicitis promptly. Thus, we aimed to evaluate the role of neutrophil lymphocyte ratio (NLR) to leverage the differential diagnosis of acute FMF attack with histologically proven appendicitis. Methods: Twenty-three patients with histologically confirmed acute appendicitis and 88 patients with acute attack of FMF were included in the study. NLR, C-reactive protein and other hematologic parameters were compared between the groups. Results: Neutrophil to lymphocyte ratio was significantly higher in patients with acute appendicitis compared to the FMF attack group (8.24 ± 6.31 vs. 4.16 ± 2.44, p = 0.007). The performance of NLR in diagnosing acute appendicitis with receiver operating characteristic analysis with a cut-off value of 4.03 were; 78% sensitivity, 62% specificity, and area under the curve 0.760 (95% confidence interval, 0.655 to 0.8655; p < 0.001). Conclusions: This study showed that NLR, the simple and readily available inflammatory marker may have a useful role in distinguishing acute FMF attack from acute appendicitis. PMID:26864298

  1. A Puzzle of Vestibular Physiology in a Meniere's Disease Acute Attack

    PubMed Central

    Martinez-Lopez, Marta; Manrique-Huarte, Raquel; Perez-Fernandez, Nicolas

    2015-01-01

    The aim of this paper is to present for the first time the functional evaluation of each of the vestibular receptors in the six semicircular canals in a patient diagnosed with Meniere's disease during an acute attack. A 54-year-old lady was diagnosed with left Meniere's disease who during her regular clinic review suffers an acute attack of vertigo, with fullness and an increase of tinnitus in her left ear. Spontaneous nystagmus and the results in the video head-impulse test (vHIT) are shown before, during, and after the attack. Nystagmus was initially left beating and a few minutes later an upbeat component was added. No skew deviation was observed. A decrease in the gain of the vestibuloocular reflex (VOR) and the presence of overt saccades were observed when the stimuli were in the plane of the left superior semicircular canal. At the end of the crisis nystagmus decreased and vestibuloocular reflex returned to almost normal. A review of the different possibilities to explain these findings points to a hypothetical utricular damage. PMID:26167320

  2. Arterial Spin Label Imaging of Acute Ischemic Stroke and Transient Ischemic Attack

    PubMed Central

    Zaharchuk, Greg

    2011-01-01

    Since acute ischemic stroke and transient ischemic attack (TIA) are fundamentally disruptions of brain hemodynamics, neuroimaging of brain perfusion might be expected to be of clinical utility. Recently, a noncontrast method of measuring CBF using arterial spin labeling (ASL) has become feasible in the clinical setting. It has advantages when compared to dynamic susceptibility contrast (DSC) bolus contrast perfusion-weighted imaging (PWI) that include lack of exposure to gadolinium-based contrast materials, improved quantitation, and decreased sensitivity to susceptibility artifacts and motion. Drawbacks of ASL include reduced signal-to-noise (SNR) and high sensitivity to arterial transit delays. While deleterious for quantitative perfusion measurements, the sensitivity of ASL to late arriving blood can be beneficial to visualize collateral flow. This chapter will discuss ASL imaging findings in patients presenting with acute ischemic stroke and TIA, focusing on typical appearances, common artifacts, and comparisons with bolus contrast PWI. PMID:21640300

  3. Occurrence of Asymptomatic Acute Neuromyelitis Optica Spectrum Disorder-Typical Brain Lesions during an Attack of Optic Neuritis or Myelitis

    PubMed Central

    Kim, Su-Hyun; Hyun, Jae-Won; Joung, AeRan; Lee, Sang Hyun; Kim, Ho Jin

    2016-01-01

    We aimed to investigate the frequency of asymptomatic acute brain MRI abnormalities accompanying optic neuritis (ON) or myelitis in neuromyelitis optica spectrum disorder (NMOSD) patients with aquaporin-4 antibodies (AQP4-Ab). We reviewed 324 brain MRI scans that were obtained during acute attacks of ON or myelitis, in 165 NMOSD patients with AQP4-Ab. We observed that acute asymptomatic NMOSD-typical brain lesions accompanied 27 (8%) acute attacks of ON or myelitis in 24 (15%) patients. The most common asymptomatic brain abnormalities included edematous corpus callosum lesions (n = 17), followed by lesions on the internal capsule and/or cerebral peduncle lesions (n = 9), periependymal surfaces of the fourth ventricle (n = 5), large deep white matter lesions (n = 4), periependymal cerebral lesions surrounding the lateral ventricles (n = 3), and hypothalamic lesions (n = 1). If asymptomatic NMOSD-typical brain abnormalities were considered as evidence for DIS, while also assuming that the AQP4-IgG status was unknown, the median time to diagnosis using the 2015 diagnosis criteria for NMOSD was shortened from 28 months to 6 months (p = 0.008). Asymptomatic acute NMOSD-typical brain lesions can be accompanied by an acute attack of ON or myelitis. Identifying these asymptomatic brain lesions may help facilitate earlier diagnosis of NMOSD. PMID:27936193

  4. Occurrence of Asymptomatic Acute Neuromyelitis Optica Spectrum Disorder-Typical Brain Lesions during an Attack of Optic Neuritis or Myelitis.

    PubMed

    Kim, Su-Hyun; Hyun, Jae-Won; Joung, AeRan; Lee, Sang Hyun; Kim, Ho Jin

    2016-01-01

    We aimed to investigate the frequency of asymptomatic acute brain MRI abnormalities accompanying optic neuritis (ON) or myelitis in neuromyelitis optica spectrum disorder (NMOSD) patients with aquaporin-4 antibodies (AQP4-Ab). We reviewed 324 brain MRI scans that were obtained during acute attacks of ON or myelitis, in 165 NMOSD patients with AQP4-Ab. We observed that acute asymptomatic NMOSD-typical brain lesions accompanied 27 (8%) acute attacks of ON or myelitis in 24 (15%) patients. The most common asymptomatic brain abnormalities included edematous corpus callosum lesions (n = 17), followed by lesions on the internal capsule and/or cerebral peduncle lesions (n = 9), periependymal surfaces of the fourth ventricle (n = 5), large deep white matter lesions (n = 4), periependymal cerebral lesions surrounding the lateral ventricles (n = 3), and hypothalamic lesions (n = 1). If asymptomatic NMOSD-typical brain abnormalities were considered as evidence for DIS, while also assuming that the AQP4-IgG status was unknown, the median time to diagnosis using the 2015 diagnosis criteria for NMOSD was shortened from 28 months to 6 months (p = 0.008). Asymptomatic acute NMOSD-typical brain lesions can be accompanied by an acute attack of ON or myelitis. Identifying these asymptomatic brain lesions may help facilitate earlier diagnosis of NMOSD.

  5. Management of acute attacks of hereditary angioedema: potential role of icatibant

    PubMed Central

    Longhurst, Hilary J

    2010-01-01

    Icatibant (Firazyr®) is a novel subcutaneous treatment recently licensed in the European Union for acute hereditary angioedema. Hereditary angioedema, resulting from inherited partial C1 inhibitor deficiency, is a disabling condition characterized by intermittent episodes of bradykinin-mediated angioedema. Icatibant blocks bradykinin B2 receptors, attenutating the episode. Randomized double-blind, placebo-controlled trials of icatibant, showed significant superiority over oral tranexamic acid in 74 European patients and a trend to improvement in a similar US trial comparing icatibant with placebo in 55 patients. Outcomes for several endpoints did not reach significance in the US trial, perhaps because of low participant numbers and confounding factors: a further trial is planned. Open label studies have shown benefit in multiple treatments for attacks at all sites. Approximately 10% of patients require a second dose for re-emergent symptoms, usually 10 to 27 hours after the initial treatment. Its subcutaneous route of administration, good tolerability and novel mode of action make icatibant a promising addition to the limited repertoire of treatments for hereditary angioedema. PMID:20859548

  6. Value of plasmatic membrane attack complex as a marker of severity in acute kidney injury.

    PubMed

    Rodríguez, Eva; Riera, Marta; Barrios, Clara; Pascual, Julio

    2014-01-01

    The aim of this study was to determine if complement pathway is activated in AKI; for this purpose, we measured, through ELISA sandwich, the terminal lytic fraction of the complement system, called membrane attack complex (C5b-C9), in AKI patients compared with patients with similar clinical conditions but normal renal function. Our data showed that complement system is activated in AKI. Plasmatic MAC concentrations were significantly higher in AKI patients than in those with normal renal function; this difference is maintained independently of the AKI etiology and is proportional to the severity of AKI, measured by ADQI classification. In addition, we found that plasmatic MAC concentrations were significantly higher in patients who did not recover renal function at time of hospitalization discharge, in patients who died during the acute process, and in patients who need renal replacement therapy during hospitalization, but in this last group, the differences did not reach statistical significance. In conclusion, plasmatic MAC concentration seems valuable as a marker of AKI severity.

  7. Sumatriptan (oral route of administration) for acute migraine attacks in adults

    PubMed Central

    Derry, Christopher J; Derry, Sheena; Moore, R Andrew

    2014-01-01

    Background Migraine is a highly disabling condition for the individual and also has wide-reaching implications for society, healthcare services, and the economy. Sumatriptan is an abortive medication for migraine attacks, belonging to the triptan family. Objectives To determine the efficacy and tolerability of oral sumatriptan compared to placebo and other active interventions in the treatment of acute migraine attacks in adults. Search methods We searched the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE, online databases, and reference lists for studies through 13 October 2011. Selection criteria We included randomised, double-blind, placebo- and/or active-controlled studies using oral sumatriptan to treat a migraine headache episode, with at least 10 participants per treatment arm. Data collection and analysis Two review authors independently assessed trial quality and extracted data. We used numbers of participants achieving each outcome to calculate relative risk (or ‘risk ratio’) and numbers needed to treat to benefit (NNT) or harm (NNH) compared to placebo or a different active treatment. Main results Sixty-one studies (37,250 participants) compared oral sumatriptan with placebo or an active comparator. Most of the data were for the 50 mg and 100 mg doses. Sumatriptan surpassed placebo for all efficacy outcomes. For sumatriptan 50 mg versus placebo the NNTs were 6.1, 7.5, and 4.0 for pain-free at two hours and headache relief at one and two hours, respectively. NNTs for sustained pain-free and sustained headache relief during the 24 hours postdose were 9.5 and 6.0, respectively. For sumatriptan 100 mg versus placebo the NNTs were 4.7, 6.8, 3.5, 6.5, and 5.2, respectively, for the same outcomes. Results for the 25 mg dose were similar to the 50 mg dose, while sumatriptan 100 mg was significantly better than 50 mg for pain-free and headache relief at two hours, and for sustained pain-free during 24 hours. Treating early, during

  8. Efficacy of home-based lymphoedema management in reducing acute attacks in subjects with lymphatic filariasis in Burkina Faso.

    PubMed

    Jullien, Patrick; Somé, Jeanne d'Arc; Brantus, Pierre; Bougma, Roland W; Bamba, Issouf; Kyelem, Dominique

    2011-09-01

    One of the two main goals of the Global Programme to Eliminate Lymphatic Filariasis (LF) is to provide care for those suffering from the devastating clinical manifestations of this filarial infection. Among the 120 million infected people worldwide, up to 16 million have lymphoedema. The WHO strategy for managing lymphoedema is based on rigorous skin hygiene, exercise, antibiotics and antifungals when indicated. The aim is to reduce acute attacks of adenolymphangitis and cellulitis responsible for lymphoedema progression and disability. The objective of our study was to assess the effectiveness of home-based lymphoedema management implemented by the national health system of Burkina Faso. Any patient was eligible to participate in the study if suffering from LF-related lymphoedema of a lower limb at any stage, and receiving care as part of the health education and washing project between April 2005 and December 2007. The primary readout was the occurrence of an acute attack in the month preceding the consultation reported by the patient or observed by the care-giver. In all, 1089 patients were enrolled in the study. Before lymphoedema management intervention, 78.1% (95%CI: 75.5-80.5) of the patients had an acute attack in the month preceding the consultation; after four and half months of lymphoedema management, this was reduced to 39.1% (95%CI: 36.2-42.1). A reduction of acute attacks related to the number of consultations or related to the patients' age and gender was not observed. Our results suggest that the home-based lymphoedema management programme in the primary health care system of Burkina Faso is effective in reducing morbidity due to LF in the short-term (4.5 months). The lymphoedema management requires no additional human resources, but whether its effect can be sustained remains to be seen.

  9. Serum Procalcitonin as a Useful Serologic Marker for Differential Diagnosis between Acute Gouty Attack and Bacterial Infection

    PubMed Central

    Song, Jung-Soo

    2016-01-01

    Purpose Patients with gout are similar to those with bacterial infection in terms of the nature of inflammation. Herein we compared the differences in procalcitonin (PCT) levels between these two inflammatory conditions and evaluated the ability of serum PCT to function as a clinical marker for differential diagnosis between acute gouty attack and bacterial infection. Materials and Methods Serum samples were obtained from 67 patients with acute gouty arthritis and 90 age-matched patients with bacterial infection. Serum PCT levels were measured with an enzyme-linked fluorescent assay. Results Serum PCT levels in patients with acute gouty arthritis were significantly lower than those in patients with bacterial infection (0.096±0.105 ng/mL vs. 4.94±13.763 ng/mL, p=0.001). However, erythrocyte sedimentation rate (ESR) and C-reactive protein (CRP) levels showed no significant differences between the two groups. To assess the ability of PCT to discriminate between acute gouty arthritis and bacterial infection, the areas under the curves (AUCs) of serum PCT, uric acid, and CRP were 0.857 [95% confidence interval (CI), 0.798–0.917, p<0.001], 0.808 (95% CI, 0.738–0.878, p<0.001), and 0.638 (95% CI, 0.544–0.731, p=0.005), respectively. There were no significant differences in ESR and white blood cell counts between these two conditions. With a cut-off value of 0.095 ng/mL, the sums of sensitivity and specificity of PCT were the highest (81.0% and 80.6%, respectively). Conclusion Serum PCT levels were significantly lower in patients with acute gouty attack than in patients with bacterial infection. Thus, serum PCT can be used as a useful serologic marker to differentiate between acute gouty arthritis and bacterial infections. PMID:27401644

  10. IDL6-HAE/HSL2 impacts pectin degradation and resistance to Pseudomonas syringae pv tomato DC3000 in Arabidopsis leaves.

    PubMed

    Wang, Xin; Hou, Shuguo; Wu, Qiqi; Lin, Minyan; Acharya, Biswa R; Wu, Daoji; Zhang, Wei

    2017-01-01

    Plant cell walls undergo dynamic structural and chemical changes during plant development and growth. Floral organ abscission and lateral root emergence are both accompanied by cell-wall remodeling, which involves the INFLORESCENCE DEFICIENT IN ABSCISSION (IDA)-derived peptide and its receptors, HAESA (HAE) and HAESA-LIKE2 (HSL2). Plant cell walls also act as barriers against pathogenic invaders. Thus, the cell-wall remodeling during plant development could have an influence on plant resistance to phytopathogens. Here, we identified IDA-like 6 (IDL6), a gene that is prominently expressed in Arabidopsis leaves. IDL6 expression in Arabidopsis leaves is significantly upregulated when the plant is suffering from attacks of the bacterial Pseudomonas syringae pv. tomato (Pst) DC3000. IDL6 overexpression and knockdown lines respectively decrease and increase the Arabidopsis resistance to Pst DC3000, indicating that the gene promotes the Arabidopsis susceptibility to Pst DC3000. Moreover, IDL6 promotes the expression of a polygalacturonase (PG) gene, ADPG2, and increases PG activity in Arabidopsis leaves, which in turn reduces leaf pectin content and leaf robustness. ADPG2 overexpression restrains Arabidopsis resistance to Pst DC3000, whereas ADPG2 loss-of-function mutants increase the resistance to the bacterium. Pst DC3000 infection elevates the ADPG2 expression partially through HAE and HSL2. Taken together, our results suggest that IDL6-HAE/HSL2 facilitates the ingress of Pst DC3000 by promoting pectin degradation in Arabidopsis leaves, and Pst DC3000 might enhance its infection by manipulating the IDL6-HAE/HSL2-ADPG2 signaling pathway.

  11. Inpatient deaths from acute myocardial infarction, 1982-92: analysis of data in the Nottingham heart attack register.

    PubMed Central

    Brown, N.; Young, T.; Gray, D.; Skene, A. M.; Hampton, J. R.

    1997-01-01

    OBJECTIVE: To assess longitudinal trends in admissions, management, and inpatient mortality from acute myocardial infarction over 10 years. DESIGN: Retrospective analysis based on the Nottingham heart attack register. SETTING: Two district general hospitals serving a defined urban and rural population. SUBJECTS: All patients admitted with a confirmed acute myocardial infarction during 1982-4 and 1989-92 (excluding 1991, when data were not collected). MAIN OUTCOME MEASURES: Numbers of patients, background characteristics, time from onset of symptoms to admission, ward of admission, treatment, and inpatient mortality. RESULTS: Admissions with acute myocardial infarction increased from 719 cases in 1982 to 960 in 1992. The mean age increased from 62.1 years to 66.6 years (P < 0.001), the duration of stay fell from 8.7 days to 7.2 days (P < 0.001), and the proportion of patients aged 75 years and over admitted to a coronary care unit increased significantly from 29.1% to 61.2%. A higher proportion of patients were admitted to hospital within 6 hours of onset of their symptoms in 1989-92 than in 1982-4, but 15% were still admitted after the time window for thrombolysis. Use of beta blockers increased threefold between 1982 and 1992, aspirin was used in over 70% of patients after 1989, and thrombolytic use increased 1.3-fold between 1989 and 1992. Age and sex adjusted odds ratios for inpatient mortality remained unchanged over the study period. CONCLUSIONS: Despite an increasing uptake of the "proved" treatments, inpatient mortality from myocardial infarction did not change between 1982 and 1992. PMID:9251546

  12. Statin Prescription Adhered to Guidelines for Patients Hospitalized due to Acute Ischemic Stroke or Transient Ischemic Attack

    PubMed Central

    Hong, Keun-Sik; Oh, Mi Sun; Choi, Hye-Yeon; Cho, A-Hyun; Kwon, Hyung-Min; Yu, Kyung-Ho; Bae, Hee-Joon; Lee, Juneyoung

    2013-01-01

    Background and Purpose Secondary stroke prevention guidelines recommend statins for the management of dyslipidemia in ischemic stroke and transient ischemic attack (TIA). This study assessed the guideline-based statin prescription (GBSP) rate in Korea and the associated physician and patient factors. Methods A survey was conducted to assess Korean neurologists' knowledge of and attitude toward the current dyslipidemia management guidelines. The characteristics and discharge statin prescription for all consecutive patients with acute ischemic stroke or TIA treated by participating neurologists during the 6 months prior to the survey were abstracted. Using algorithms to determine GBSP, we assessed the rate and independent factors of GBSP. Results Of the 174 participating neurologists, 79 (45.4%) were categorized as a higher-level knowledge group. For the 4407 patients (mean age, 66.4 years; female, 42.5%; 90.6% with ischemic stroke and 9.4% with TIA) enrolled in this study, the GBSP rate at discharge was 78.6%. The GBSP rate increased significantly with increasing physician knowledge level (test for trend, p<0.0001), and was higher among patients treated by the higher-level knowledge group than for those treated by the lower-level knowledge group (81.6% vs. 74.7%; unadjusted p<0.0001 and adjusted p=0.045). Other independent factors associated with a higher GBSP rate were hypercholesterolemia and higher low-density lipoprotein cholesterol level, while those associated with a lower GBSP rate were cardioembolism, undetermined etiology due to negative or incomplete work-up, other determined etiology, and TIA presentation. Conclusions More than three-quarters of acute ischemic stroke survivors and TIA patients receive a GBSP at discharge, and this proportion would be further improved by improving the knowledge of dyslipidemia management guidelines among neurologists. PMID:24285962

  13. Acute Coronary Syndrome

    MedlinePlus

    ... angina? This content was last reviewed July 2015. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ... Recovery FAQs • Heart Attack Tools & Resources • Support Network Heart Attack Tools & Resources What Is a Heart Attack? How ...

  14. Understand Your Risk of Heart Attack

    MedlinePlus

    ... Aneurysm More Understand Your Risks to Prevent a Heart Attack Updated:Sep 16,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  15. Presenting symptoms and onset-to-arrival time in patients with acute stroke and transient ischemic attack.

    PubMed

    Gargano, Julia Warner; Wehner, Susan; Reeves, Mathew J

    2011-11-01

    Delayed arrival to the emergency department (ED) precludes most stroke patients from receiving thrombolytic treatment. Our objective in this study was to examine the association between presenting symptoms and onset-to-arrival time (ie, time between onset of symptoms to arrival at the ED) in a statewide stroke registry. Demographics, clinical data, and presenting symptoms were collected for patients with acute stroke or symptomatic transient ischemic attack (TIA) admitted to 15 Michigan hospitals (n = 1922). Polytomous logistic regression models were developed to test the association between presenting symptoms and onset-to-arrival time (classified as <2 hours, 2-6 hours, or >6 hours/unknown). Onset-to-arrival time was <2 hours in 19% of the patients, 2-6 hours in 22%, and >6 hours/unknown in 59%. Unilateral symptoms (reported by 40%) and speech difficulties (reported by 22%) were associated with increased likelihood of arriving within 2 hours (unilateral: adjusted odds ratio [aOR], 1.5; 95% confidence interval [CI], 1.1-1.9; speech: aOR, 1.6; 95% CI, 1.2-2.2). Difficulty with walking, balance, or dizziness (12%), confusion (9%), loss of consciousness (6.7%) and falls (3.4%) were associated with lower likelihood of arriving within 2 hours (walking: aOR, 0.7; 95% CI, 0.4-1.0; confusion: aOR, 0.5; 95% CI, 0.3-0.8; consciousness: aOR, 0.5; 95% CI, 0.1-0.9; falls: aOR, 0.4; 95% CI, 0.3-0.9). Presenting symptoms were strongly associated with time of arrival; patients with unilateral symptoms and speech difficulties were more likely to seek care early. Future studies should consider including more specific patient-level data to identify psychosocial and behavioral aspects of recognition and action to stroke symptoms.

  16. Can You Recognize a Heart Attack? Quiz

    MedlinePlus

    ... Heart Attack? Updated:Sep 16,2016 Begin the quiz Heart Attack • Home • About Heart Attacks Acute Coronary ... in Women “Can you recognize a heart attack?” Quiz • Understand Your Risks to Prevent a Heart Attack ...

  17. Coronary Artery Dissection: Not Just a Heart Attack

    MedlinePlus

    ... Aneurysm More Coronary Artery Dissection: Not Just a Heart Attack Updated:Oct 4,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  18. Case-control study of severe life threatening asthma (SLTA) in adults: demographics, health care, and management of the acute attack

    PubMed Central

    Kolbe, J; Fergusson, W; Vamos, M; Garrett, J

    2000-01-01

    BACKGROUND—Severe life threatening asthma (SLTA) is important in its own right and as a proxy for asthma death. In order to target hospital based intervention strategies to those most likely to benefit, risk factors for SLTA among those admitted to hospital need to be identified. A case-control study was undertaken to determine whether, in comparison with patients admitted to hospital with acute asthma, those with SLTA have different sociodemographic and clinical characteristics, evidence of inadequate ongoing medical care, barriers to health care, or deficiencies in management of the acute attack.
METHODS—Seventy seven patients with SLTA were admitted to an intensive care unit (pH 7.17 (0.15), PaCO2 10.7 (5.0) kPa) and 239 matched controls (by date of index attack) with acute asthma were admitted to general medical wards. A questionnaire was administered 24-48 hours after admission.
RESULTS—The risk of SLTA in comparison with other patients admitted with acute asthma increased with age (odds ratio (OR) 1.04/year, 95% CI 1.01 to 1.07) and was less for women (OR 0.36, 95% CI 0.20to 0.68). These variables were controlled for in all subsequent analyses. There were no differences in other sociodemographic features. Cases were more likely to have experienced a previous SLTA (OR 2.04, 95% CI 1.20 to 3.45) and to have had a hospital admission in the last year (OR 1.86, 95% CI 1.09 to 3.18). There were no differences between cases and controls in terms of indicators of quality of ongoing asthma specific medical care, nor was there evidence of disproportionate barriers to health care. During the index attack cases had more severe asthma at the time of presentation, were less likely to have presented to general practitioners, and were more likely to have called an ambulance or presented to an emergency department. In terms of pharmacological management, those with SLTA were more likely to have been using oral theophylline (OR 2.14, 95% CI 1.35 to 3.68) and less

  19. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  20. Allosteric inhibition of human lymphoblast and purified porphobilinogen deaminase by protoporphyrinogen and coproporphyrinogen. A possible mechanism for the acute attack of variegate porphyria.

    PubMed Central

    Meissner, P; Adams, P; Kirsch, R

    1993-01-01

    Variegate porphyria (VP) is characterized by photocutaneous lesions and acute neuropsychiatric attacks. Decreased protoporphyrinogen oxidase activity results in accumulation of protoporphyrin (ogen) IX and coproporphyrin (ogen) III. During acute attacks delta-aminolevulinic acid and porphobilinogen also increase, suggesting that porphobilinogen deaminase (PBG-D) may be rate limiting. We have examined the effects of porphyrinogens accumulating in VP on PBG-D activity in Epstein-Barr virus-transformed lymphoblast sonicates from 12 VP and 12 control subjects. Protoporphyrinogen oxidase activity was decreased and protoporphyrin increased in VP lymphoblasts. PBG-D in control lymphoblasts obeyed Michaelis-Menten kinetics (Vmax 28.7 +/- 1.8 pmol/mg per h, Hill coefficient 0.83 +/- 0.07). VP sonicates yielded sigmoidal substrate-velocity curves that did not obey Michaelis-Menten kinetics. Vmax was decreased (21.2 +/- 2.0 pmol/mg per h) and the Hill coefficient was 1.78 +/- 0.17. Addition of protoporphyrinogen IX and coproporphyrinogen III to control sonicates yielded sigmoidal PBG-D substrate-velocity curves and decreased PBG-D Vmax. Addition of porphyrins or uroporphyrinogen III did not affect PBG-D activity. Removal of endogenous porphyrin (ogens) from VP sonicates restored normal PBG-D kinetics. Purified human erythrocyte PBG-D obeyed Michaelis-Menten kinetics (Vmax 249 +/- 36 nmol/mg per h, Km 8.9 +/- 1.5 microM, Hill coefficient 0.93 +/- 0.14). Addition of protoporphyrinogen yielded a sigmoidal curve with decreased Vmax. The Hill coefficient approached 4. These findings provide a rational explanation for the increased delta-aminolevulinic acid and porphobilinogen during acute attacks of VP. PMID:7682572

  1. Occurrence of acute myocardial infarction in Worcester, Massachusetts, before, during, and after the terrorists attacks in New York City and Washington, DC, on 11 September 2001.

    PubMed

    Goldberg, Robert J; Spencer, Frederick; Lessard, Darleen; Yarzebski, Jorge; Lareau, Craig; Gore, Joel M

    2005-01-15

    The Worcester Heart Attack Study is an ongoing population-based investigation examining changes over time in the incidence and case-fatality rates of acute myocardial infarction (AMI) in residents of metropolitan Worcester, Massachusetts. Using this large population-based database of patients with independently validated AMI, we examined the impact of the September 11th tragedy on the occurrence rates of AMI in residents of greater Worcester presenting to all area hospitals during 2001 compared with rates in the previous 10 years.

  2. Successful treatment of acute hereditary angioedema attacks with self-administered icatibant in patients with venous access problems.

    PubMed

    Wiednig, Michaela

    2013-04-25

    Hereditary angioedema is a rare and potentially fatal autosomal dominant disorder characterised by unpredictable skin, gastrointestinal tract or respiratory tract oedema. Plasma-derived C1-esterase inhibitors are effective in the prophylaxis or treatment of hereditary angioedema type I and II attacks, but must be administered intravenously. This may be problematic in patients with venous access difficulties. Icatibant, a bradykinin B2-receptor antagonist, is administered subcutaneously. In July 2008 icatibant received approval for healthcare professional-administered treatment of hereditary angioedema attacks in adults. In 2011 it received European Medicines Agency and US Food and Drug Administration licences for patient-administered treatment of hereditary angioedema attacks. Given these approvals, and with the appropriate training, icatibant could provide the opportunity for patients to self-administer treatment. This is one of the first long-term follow-up reports of patients with hereditary angioedema using self-administered icatibant. During follow-up, icatibant remained effective and patient satisfaction was high.

  3. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack or Sudden Cardiac Arrest: How Are They Different? ... to heart disease and stroke. Start exploring today ! Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  4. Emergency medical dispatching: rapid identification and treatment of acute myocardial infarction. National Heart Attack Alert Program Coordinating Committee Access to Care Subcommittee.

    PubMed

    1995-01-01

    Emergency medical telephone calls (ie, those made to 9-1-1 or 7-digit emergency numbers) are directed to emergency medical dispatchers (EMDs) who are responsible for quickly obtaining critical pieces of information from the caller, then activating an appropriate level of emergency medical services (EMS) response and providing the caller with patient care instructions until medical help arrives. The impact of well-trained, medically managed EMDs on the early care of potential acute myocardial infarction (AMI) patients is believed to be beneficial. However, standards for emergency medical dispatching vary widely across the nation. To improve emergency medical dispatching for AMI patients in the United States, this article by the Access to Care Subcommittee on behalf of the National Heart Attack Alert Program makes a number of recommendations regarding the use of medical dispatch protocols, provision of dispatch life support, EMD training, EMD certification, and emergency medical dispatch quality control and improvement processes.

  5. Does acute maternal stress in pregnancy affect infant health outcomes? Examination of a large cohort of infants born after the terrorist attacks of September 11, 2001

    PubMed Central

    Endara, Skye M; Ryan, Margaret AK; Sevick, Carter J; Conlin, Ava Marie S; Macera, Caroline A; Smith, Tyler C

    2009-01-01

    Background Infants in utero during the terrorist attacks of September 11, 2001 may have been negatively affected by maternal stress. Studies to date have produced contradictory results. Methods Data for this retrospective cohort study were obtained from the Department of Defense Birth and Infant Health Registry and included up to 164,743 infants born to active-duty military families. Infants were considered exposed if they were in utero on September 11, 2001, while the referent group included infants gestating in the same period in the preceding and following year (2000 and 2002). We investigated the association of this acute stress during pregnancy with the infant health outcomes of male:female sex ratio, birth defects, preterm birth, and growth deficiencies in utero and in infancy. Results No difference in sex ratio was observed between infants in utero in the first trimester of pregnancy on September 11, 2001 and infants in the referent population. Examination of the relationship between first-trimester exposure and birth defects also revealed no significant associations. In adjusted multivariable models, neither preterm birth nor growth deficiencies were significantly associated with the maternal exposure to the stress of September 11 during pregnancy. Conclusion The findings from this large population-based study suggest that women who were pregnant during the terrorist attacks of September 11, 2001 had no increased risk of adverse infant health outcomes. PMID:19619310

  6. Angioedema attacks in patients with hereditary angioedema: Local manifestations of a systemic activation process.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Zeerleder, Sacha; Drouet, Christian; Zuraw, Bruce; Hack, C Erik

    2016-08-01

    Hereditary angioedema (HAE) caused by a deficiency of functional C1-inhibitor (C1INH) becomes clinically manifest as attacks of angioedema. C1INH is the main inhibitor of the contact system. Poor control of a local activation process of this system at the site of the attack is believed to lead to the formation of bradykinin (BK), which increases local vasopermeability and mediates angioedema on interaction with BK receptor 2 on the endothelium. However, several observations in patients with HAE are difficult to explain from a pathogenic model claiming a local activation process at the site of the angioedema attack. Therefore we postulate an alternative model for angioedema attacks in patients with HAE, which assumes a systemic, fluid-phase activation of the contact system to generate BK and its breakdown products. Interaction of these peptides with endothelial receptors that are locally expressed in the affected tissues rather than with receptors constitutively expressed by the endothelium throughout the whole body explains that such a systemic activation process results in local manifestations of an attack. In particular, BK receptor 1, which is induced on the endothelium by inflammatory stimuli, such as kinins and cytokines, meets the specifications of the involved receptor. The pathogenic model discussed here also provides an explanation for why angioedema can occur at multiple sites during an attack and why HAE attacks respond well to modest increases of circulating C1INH activity levels because inhibition of fluid-phase Factor XIIa and kallikrein requires lower C1INH levels than inhibition of activator-bound factors.

  7. Mental- and physical-health effects of acute exposure to media images of the September 11, 2001, attacks and the Iraq War.

    PubMed

    Silver, Roxane Cohen; Holman, E Alison; Andersen, Judith Pizarro; Poulin, Michael; McIntosh, Daniel N; Gil-Rivas, Virginia

    2013-09-01

    Millions of people witnessed early, repeated television coverage of the September 11 (9/11), 2001, terrorist attacks and were subsequently exposed to graphic media images of the Iraq War. In the present study, we examined psychological- and physical-health impacts of exposure to these collective traumas. A U.S. national sample (N = 2,189) completed Web-based surveys 1 to 3 weeks after 9/11; a subsample (n = 1,322) also completed surveys at the initiation of the Iraq War. These surveys measured media exposure and acute stress responses. Posttraumatic stress symptoms related to 9/11 and physician-diagnosed health ailments were assessed annually for 3 years. Early 9/11- and Iraq War-related television exposure and frequency of exposure to war images predicted increased posttraumatic stress symptoms 2 to 3 years after 9/11. Exposure to 4 or more hr daily of early 9/11-related television and cumulative acute stress predicted increased incidence of health ailments 2 to 3 years later. These findings suggest that exposure to graphic media images may result in physical and psychological effects previously assumed to require direct trauma exposure.

  8. Screening for cognitive impairment with the Montreal Cognitive Assessment in Chinese patients with acute mild stroke and transient ischaemic attack: a validation study

    PubMed Central

    Zuo, Lijun; Dong, Yanhong; Zhu, Rongyan; Jin, Zhao; Li, Zixiao; Wang, Yilong; Zhao, Xingquan; Sachdev, Perminder; Zhang, Wei; Wang, Yongjun

    2016-01-01

    Objective We aimed to establish the cut-off point of the Montreal Cognitive Assessment (MoCA-Beijing) in screening for cognitive impairment (CI) within 2 weeks of mild stroke or transient ischaemic attack (TIA). Methods A total of 80 acute mild ischaemic stroke patients and 22 TIA patients were recruited. They received the MoCA-Beijing and a formal neuropsychological test battery. CI was defined by 1.5 SD below the established norms on a formal neuropsychological test battery. Results Most stroke and TIA patients were in their 50s (53.95±11.43 years old), with greater than primary school level of education. The optimal cut-off point for MoCA-Beijing in discriminating patients with CI from those with no cognitive impairment (NCI) was 22/23 (sensitivity 85%, specificity 88%, positive predictive value=91%, negative predictive value=80%, classification accuracy=86%). The predominant cognitive deficits were characteristic of frontal-subcortical impairment, such as visuomotor speed (46.08%), attention/executive function (42.16%) and visuospatial ability (40.20%). Conclusions A MoCA-Beijing cut-off score of 22/23 is optimally sensitive and specific for detecting CI after mild stroke, and TIA in the acute stroke phase, and is recommended for routine clinical practice. PMID:27406642

  9. Do the residents in the emergency department appropriately manage patients with acute asthma attack? A study of self-criticism.

    PubMed

    Akoglu, Sebahat; Topacoglu, Hakan; Karcioglu, Ozgur; Cimrin, Arif Hikmet

    2004-01-01

    The objective of this study was to investigate the management of patients with asthma attack admitted to the emergency department (ED) in terms of compliance with international guidelines. The records of patients with asthma who were admitted to a university-based ED between December 2001 and December 2002 were evaluated. A total of 72 cases with available data were evaluated retrospectively. Twenty-six patients (36.1%) were admitted more than once during the study period. The number of multiple admissions ranged from 2 (15 patients, 20.0%) to 11 (2 patients, 2.8%). Peak expiratory flow (PEF) measurements were recorded in 17 patients (23.6%) on presentation. Pulse and respiratory rates were recorded in 70 (97.0%) and 67 patients (93.0%), respectively. Thirty-four patients (47.2%) underwent chest x-ray; results were normal in most patients. Salbutamol was the most commonly used drug as first-line therapy. Ipratropium bromide (inhaled) and systemic corticosteroids were added to the salbutamol in 47 (65.2%), 42 (58.4%), and 32 patients (44%), respectively. Pulmonologists were consulted in only 7 cases (9.7%). Thirty patients (43.4%) were prescribed corticosteroids on discharge. The role of functional parameters in determining asthma severity and monitoring treatment effects should be emphasized in clinical practice. Finally, more prevalent use of management guidelines will help determine their usefulness.

  10. Heart Attack

    MedlinePlus

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  11. The Role of Inspiratory Muscle Training in Sickle Cell Anemia Related Pulmonary Damage due to Recurrent Acute Chest Syndrome Attacks

    PubMed Central

    Camcıoğlu, Burcu; Boşnak-Güçlü, Meral; Karadallı, Müşerrefe Nur; Akı, Şahika Zeynep; Türköz-Sucak, Gülsan

    2015-01-01

    Background. The sickling of red blood cells causes a constellation of musculoskeletal, cardiovascular, and pulmonary manifestations. A 32-year-old gentleman with sickle cell anemia (SCA) had been suffering from recurrent acute chest syndrome (ACS). Aim. To examine the effects of inspiratory muscle training (IMT) on pulmonary functions, respiratory and peripheral muscle strength, functional exercise capacity, and quality of life in this patient with SCA. Methods. Functional exercise capacity was evaluated using six-minute walk test, respiratory muscle strength using mouth pressure device, hand grip strength using hand-held dynamometer, pain using Visual Analogue Scale, fatigue using Fatigue Severity Scale, dyspnea using Modified Medical Research Council Scale, and health related quality of life using European Organization for Research and Treatment of Cancer QOL measurement. Results. A significant improvement has been demonstrated in respiratory muscle strength, functional exercise capacity, pain, fatigue, dyspnea, and quality of life. There was no admission to emergency department due to acute chest syndrome in the following 12 months after commencing regular erythrocytapheresis. Conclusion. This is the first report demonstrating the beneficial effects of inspiratory muscle training on functional exercise capacity, respiratory muscle strength, pain, fatigue, dyspnea, and quality of life in a patient with recurrent ACS. PMID:26060589

  12. The time of sunrise and the number of hours with daylight may influence the diurnal rhythm of acute heart attack mortality.

    PubMed

    Kriszbacher, Ildikó; Bódis, József; Boncz, Imre; Koppan, Agnes; Koppan, Miklós

    2010-04-01

    We investigated whether the time of sunrise and the number of daylight hours have an effect on the seasonality, or the daily rhythm of heart attack mortality. We analyzed retrospectively data of patients admitted to hospitals with the diagnosis of heart attack (n=32,329) and patients who deceased of a heart attack (n=5142) between January 1, 2004 and December 31, 2005 in Hungary. Heart attack mortality was highest during winter, while lowest number of events was recorded during summer . The daily peak of diurnality was between 6:00 am and 12:00 pm (33.77%). A positive correlation was found between the time of sunrise, time of sunset and the mortality caused by myocardial infarction (p<0,01). In the analysis of the number of daylight hours and the heart attack mortality we found a negative correlation (r=-0.105, p<0.05). No significant difference was found between sexes and different age-groups in heart attack mortality. Our data suggest, that the occurrence and the mortality of heart attack may be related to the time of sunrise and the number of daylight hours.

  13. Heart Attack Recovery FAQs

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack Recovery FAQs Updated:Sep 19,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  14. Does Acute Maternal Stress in Pregnancy Affect Infant Health Outcomes? Examination of a Large Cohort of Infants Born After the Terrorist Attacks of September 11, 2001

    DTIC Science & Technology

    2009-01-01

    Spandorfer S, Grill E, Davis O, Fasouliotis S, Rosenwaks Z: Septem- ber 11th in New York City (NYC): the effect of a catastrophe on IVF outcome in a...Naval Health Research Center Does acute maternal stress in pregnancy affect infant health outcomes ? Examination of A Large Cohort of Infants Born...California 92106 BioMed CentralBMC Public Health ssOpen AcceResearch article Does acute maternal stress in pregnancy affect infant health outcomes

  15. Acute Pancreatitis and Pregnancy

    MedlinePlus

    ... and Pregnancy Acute Pancreatitis and Pregnancy Timothy Gardner, MD Acute pancreatitis is defined as the sudden inflammation ... the incidence of recurrent attacks minimized. Timothy Gardner, MD is Director of Pancreatic Disorders at Dartmouth-Hitchcock ...

  16. Immunomodulatory Effects of Balneotherapy with Hae-Un-Dae Thermal Water on Imiquimod-Induced Psoriasis-Like Murine Model

    PubMed Central

    Lee, Young Bok; Lee, Jun Young; Lee, Hye Jin; Yun, Seong Taek; Lee, Jong Tae; Kim, Hong Jig; Yu, Dong Soo

    2014-01-01

    Background Balneotherapy, although not a well-established dermatological treatment, is thought to have therapeutic properties for psoriasis and is used as an alternative treatment modality throughout the world. Objective To evaluate the mechanism underlying the therapeutic immunologic effects of thermomineral water. Methods A murine model of imiquimod-induced psoriasis-like skin inflammation was used for evaluating the therapeutic effects of balneotherapy with Hae-Un-Dae hot spring mineral water. The clinical improvements were evaluated by a dermatologist. Lesional cytokines, including interleukin (IL)-17A, IL-23, and IL-22, were quantitatively measured by real-time reverse transcriptase polymerase chain reaction. Serum levels of interferon-γ, IL-4, IL-5, and IL-17A were measured by enzyme-linked immunosorbent assay. T cell proportions in the spleen were evaluated by flow cytometry, and histopathological evaluation of the skin was also performed. Results The mineral water balneotherapy group showed faster improvement in skin erythema and scales than the distilled water bathing group. A substantial reduction was observed in the lesional mRNA levels of IL-17A and IL-23 in the mineral water group. Serum levels of IL-4 and IL-5 were significantly decreased in the mineral water group but not in the distilled water group. Normalized T cell proportions were observed after bathing. Conclusion Balneotherapy showed immunomodulatory effects in a psoriasis-like murine model. Balneotherapy suppressed lesional IL-23 and IL-17A, which are important cytokines in the pathogenesis of psoriasis. These results suggest that balneotherapy can be used as an effective and safe treatment for psoriasis. PMID:24882978

  17. The follow-up of patients of sixty-five years of age and younger with acute ischemic stroke and transient ischemic attacks, and elevated D-dimer levels in plasma.

    PubMed

    Vrethem, Magnus; Lindahl, Tomas

    2009-11-16

    D-dimer levels in plasma, a degradation product of fibrin, have been shown to correlate with the severity of ischemic stroke. In order to investigate the outcome of patients with elevated D-dimer we have carried out a follow-up study of patients of 65 years of age and younger with acute ischemic stroke or transient ischemic attacks (TIA) admitted to our stroke unit from 1991 to 1992. Twenty-two of the 57 patients had elevated D-dimer levels in the plasma. High levels were associated with cardioembolic stroke. On follow-up after a mean of 12 years, 15 patients had died and six patients had suffered another stroke or TIA (three of whom were dead). Ten patients had suffered other cardiovascular events and seven of them were dead. We concluded that high levels of D-dimer in acute ischemic stroke patients on admission were associated with cardioembolic stroke and might have prognostic value for the development of further cardioor cerebrovascular events. Advanced age was found to be an independent risk factor.

  18. Pericarditis - after heart attack

    MedlinePlus

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  19. High Frequency Migraine Is Associated with Lower Acute Pain Sensitivity and Abnormal Insula Activity Related to Migraine Pain Intensity, Attack Frequency, and Pain Catastrophizing

    PubMed Central

    Mathur, Vani A.; Moayedi, Massieh; Keaser, Michael L.; Khan, Shariq A.; Hubbard, Catherine S.; Goyal, Madhav; Seminowicz, David A.

    2016-01-01

    Migraine is a pain disorder associated with abnormal brain structure and function, yet the effect of migraine on acute pain processing remains unclear. It also remains unclear whether altered pain-related brain responses and related structural changes are associated with clinical migraine characteristics. Using fMRI and three levels of thermal stimuli (non-painful, mildly painful, and moderately painful), we compared whole-brain activity between 14 migraine patients and 14 matched controls. Although, there were no significant differences in pain thresholds nor in pre-scan pain ratings to mildly painful thermal stimuli, patients did have aberrant suprathreshold nociceptive processing. Brain imaging showed that, compared to controls, patients had reduced activity in pain modulatory regions including left dorsolateral prefrontal, posterior parietal, and middle temporal cortices and, at a lower-threshold, greater activation in the right mid-insula to moderate pain vs. mild pain. We also found that pain-related activity in the insula was associated with clinical variables in patients, including associations between: bilateral anterior insula and pain catastrophizing (PCS); bilateral anterior insula and contralateral posterior insula and migraine pain intensity; and bilateral posterior insula and migraine frequency at a lower-threshold. PCS and migraine pain intensity were also negatively associated with activity in midline regions including posterior cingulate and medial prefrontal cortices. Diffusion tensor imaging revealed a negative correlation between fractional anisotropy (a measure of white matter integrity; FA) and migraine duration in the right mid-insula and a positive correlation between left mid-insula FA and PCS. In sum, while patients showed lower sensitivity to acute noxious stimuli, the neuroimaging findings suggest enhanced nociceptive processing and significantly disrupted modulatory networks, particularly involving the insula, associated with indices

  20. Conservation of the abscission signaling peptide IDA during Angiosperm evolution: withstanding genome duplications and gain and loss of the receptors HAE/HSL2

    PubMed Central

    Stø, Ida M.; Orr, Russell J. S.; Fooyontphanich, Kim; Jin, Xu; Knutsen, Jonfinn M. B.; Fischer, Urs; Tranbarger, Timothy J.; Nordal, Inger; Aalen, Reidunn B.

    2015-01-01

    The peptide INFLORESCENCE DEFICIENT IN ABSCISSION (IDA), which signals through the leucine-rich repeat receptor-like kinases HAESA (HAE) and HAESA-LIKE2 (HSL2), controls different cell separation events in Arabidopsis thaliana. We hypothesize the involvement of this signaling module in abscission processes in other plant species even though they may shed other organs than A. thaliana. As the first step toward testing this hypothesis from an evolutionarily perspective we have identified genes encoding putative orthologs of IDA and its receptors by BLAST searches of publically available protein, nucleotide and genome databases for angiosperms. Genes encoding IDA or IDA-LIKE (IDL) peptides and HSL proteins were found in all investigated species, which were selected as to represent each angiosperm order with available genomic sequences. The 12 amino acids representing the bioactive peptide in A. thaliana have virtually been unchanged throughout the evolution of the angiosperms; however, the number of IDL and HSL genes varies between different orders and species. The phylogenetic analyses suggest that IDA, HSL2, and the related HSL1 gene, were present in the species that gave rise to the angiosperms. HAE has arisen from HSL1 after a genome duplication that took place after the monocot—eudicots split. HSL1 has also independently been duplicated in the monocots, while HSL2 has been lost in gingers (Zingiberales) and grasses (Poales). IDA has been duplicated in eudicots to give rise to functionally divergent IDL peptides. We postulate that the high number of IDL homologs present in the core eudicots is a result of multiple whole genome duplications (WGD). We substantiate the involvement of IDA and HAE/HSL2 homologs in abscission by providing gene expression data of different organ separation events from various species. PMID:26579174

  1. Seven Deadliest Network Attacks

    SciTech Connect

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  2. Life After a Heart Attack

    MedlinePlus

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  3. What Is a Heart Attack?

    MedlinePlus

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  4. Acute Treatment of Migraine

    PubMed Central

    ÖZTÜRK, Vesile

    2013-01-01

    Migraine is one of the most frequent disabling neurological conditions with a major impact on the patient’s quality of life. Migraine has been described as a chronic disorder that characterized with attacks. Attacks are characterized by moderate–severe, often unilateral, pulsating headache attacks, typically lasting 4 to 72 hours. Migraine remains underdiagnosed and undertreated despite advances in the understanding of its pathophysiology. This article reviews management of migraine acute pharmacological treatment. Currently, for the acute treatment of migraine attacks, non-steroidal anti-inflammatory drugs (NSAIDs) and triptans (serotonin 5HT1B/1D receptor agonists) are recommended. Before intake of NSAID and triptans, metoclopramide or domperidone is useful. In very severe attacks, subcutaneous sumatriptan is first choice. The patient should be treated early in the attack, use an adequate dose and formulation of a medication. Ideally, acute therapy should be restricted to no more than 2 to 3 days per week to avoid medication overuse.

  5. Traumatic tiger attack.

    PubMed

    Chum, Marvin; Ng, Wai Pui

    2011-11-01

    Attacks on humans by large cats are uncommon occurrences and thus the principles of managing such injuries are not well documented. The authors here report the case of an 11-year-old boy who was mauled by a privately owned tiger. The attack resulted in multiple cranial lacerations and fractures, dissection of the internal carotid artery, and persistent neurological deficits. This case outlines the multiple sources of injury and pathology that can result from such an attack. Discussion is focused on the pattern of injury seen in large feline attacks and the treatment approach.

  6. Supply Chain Attack Framework and Attack Patterns

    DTIC Science & Technology

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  7. Stroke following rottweiler attack.

    PubMed

    Miller, S J; Copass, M; Johansen, K; Winn, H R

    1993-02-01

    A previously healthy 50-year-old man suffered a major right cerebral infarction shortly after receiving head and neck bites in an attack by two rottweilers. Arteriography revealed occlusion of the right middle cerebral artery, an intimal flap and pseudoaneurysm in the high right internal carotid artery just proximal to the skull base, and an obstructed right vertebral artery. The powerful jaw mechanism of rottweilers and other large mastiff-type dogs makes their bites particularly destructive. The predilection of these animals for attacking the head and upper body makes occult crush injury to the extracranial cerebral vessels an important diagnostic consideration following such attacks.

  8. Signs of a Heart Attack

    MedlinePlus

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  9. A fatal leopard attack.

    PubMed

    Hejna, Petr

    2010-05-01

    A rare case of a big cat fatal attack is presented. A male leopard that had escaped from its unlocked cage attacked a 26-year-old male zoo worker. The man sustained penetrating injuries to the neck with consequent external bleeding. The man died while being transported to the hospital as a result of the injuries sustained. The wounds discovered on the victim's body corresponded with the known methods of leopard attacks and with findings on the carcasses of animals killed by leopards in the wild. The conclusion of the medicolegal investigation was that the underlying cause of death was a bite wound to the neck which lacerated the left internal jugular vein, the two main branches of the left external carotid artery, and the cervical spine. The cause of death was massive external bleeding. Special attention is paid to the general pattern of injuries sustained from big cat attacks.

  10. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... of patients with unstable angina/non-ST-elevation myocardial infarction (updating the 2007 guideline and replacing the 2011 ...

  11. New sensitivity analysis attack

    NASA Astrophysics Data System (ADS)

    El Choubassi, Maha; Moulin, Pierre

    2005-03-01

    The sensitivity analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector. In this paper, a new attack on spread spectrum schemes is designed. We first examine one of Kalker's algorithms and prove its convergence using the law of large numbers, which gives more insight into the problem. Next, a new algorithm is presented and compared to existing ones. Various detection algorithms are considered including correlation detectors and normalized correlation detectors, as well as other, more complicated algorithms. Our algorithm is noniterative and requires at most n+1 operations, where n is the dimension of the signal. Moreover, the new approach directly estimates the watermark by exploiting the simple geometry of the detection boundary and the information leaked by the detector.

  12. Fatal big cat attacks.

    PubMed

    Cohle, S D; Harlan, C W; Harlan, G

    1990-09-01

    Two cases of fatal attacks by large cats are presented. In the first case, a 30-year-old female zoo worker was attacked by a jaguar that had escaped its cage. In the second case, a 2-year-old girl was fatally injured by her father's pet leopard. The pattern of injuries in these cases is nearly identical to those of these cats' prey in the wild.

  13. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  14. Fatal crocodile attack.

    PubMed

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out.

  15. Word Attack Model.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A limited analysis of alternative approaches to phonemic-level word attack instruction is provided in this document. The instruction segment begins with training in letter-sound correspondences for which mastery of certain skills is assumed. Instruction ends with the decoding of novel items having a consonant-vowel-consonant construction. Contents…

  16. Heart Attack Symptoms in Women

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack Symptoms in Women Updated:Jan 10,2017 Heart Attack Signs in Women Uncomfortable pressure, squeezing, fullness or ...

  17. An Attack Surface Metric

    DTIC Science & Technology

    2005-07-01

    Introduction Measurement of security, both qualitatively and quantitatively, has been a long standing challenge to the research community , and is of...our approach to related work in Section 2. We introduce the entry point and exit point framework in Section 3. We present the definitions of...ignores the specific system configuration that gave rise to the vulnerability, and it does not capture a system’s future attackability. Our approach

  18. Acute Hepatic Porphyria

    PubMed Central

    Bissell, D. Montgomery; Wang, Bruce

    2015-01-01

    The porphyrias comprise a set of diseases, each representing an individual defect in one of the eight enzymes mediating the pathway of heme synthesis. The diseases are genetically distinct but have in common the overproduction of heme precursors. In the case of the acute (neurologic) porphyrias, the cause of symptoms appears to be overproduction of a neurotoxic precursor. For the cutaneous porphyrias, it is photosensitizing porphyrins. Some types have both acute and cutaneous manifestations. The clinical presentation of acute porphyria consists of abdominal pain, nausea, and occasionally seizures. Only a small minority of those who carry a mutation for acute porphyria have pain attacks. The triggers for an acute attack encompass certain medications and severely decreased caloric intake. The propensity of females to acute attacks has been linked to internal changes in ovarian physiology. Symptoms are accompanied by large increases in delta-aminolevulinic acid and porphobilinogen in plasma and urine. Treatment of an acute attack centers initially on pain relief and elimination of inducing factors such as medications; glucose is administered to reverse the fasting state. The only specific treatment is administration of intravenous hemin. An important goal of treatment is preventing progression of the symptoms to a neurological crisis. Patients who progress despite hemin administration have undergone liver transplantation with complete resolution of symptoms. A current issue is the unavailability of a rapid test for urine porphobilinogen in the urgent-care setting. PMID:26357631

  19. When women attack.

    PubMed

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  20. Depression After Heart Attack

    MedlinePlus

    ... R , Sleight P . Beta blockade during and after myocardial infarction: an overview of the randomized trials . Prog Cardiovasc ... 110.017285 Permalink: Copy Subjects Cardiology Etiology Acute myocardial infarction Intervention, Surgery, Transplantation Behavioral/Psychosocial Treatment Compliance/Adherence ...

  1. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  2. Modeling Partial Attacks with Alloy

    NASA Astrophysics Data System (ADS)

    Lin, Amerson; Bond, Mike; Clulow, Jolyon

    The automated and formal analysis of cryptographic primitives, security protocols and Application Programming Interfaces (APIs) up to date has been focused on discovering attacks that completely break the security of a system. However, there are attacks that do not immediately break a system but weaken the security sufficiently for the adversary. We term these attacks partial attacks and present the first methodology for the modeling and automated analysis of this genre of attacks by describing two approaches. The first approach reasons about entropy and was used to simulate and verify an attack on the ECB|ECB|OFB triple-mode DES block-cipher. The second approach reasons about possibility sets and was used to simulate and verify an attack on the personal identification number (PIN) derivation algorithm used in the IBM 4758 Common Cryptographic Architecture.

  3. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  4. DNS Rebinding Attacks

    DTIC Science & Technology

    2009-09-01

    action [From 2] The same origin policy is also called Single Origin or Same Site Policy. It was originally released with Netscape Navigator 2.0 and...success Netscape 8.2.1 Windows XP / SP2 success Opera 9.0.2 Windows 2000 / SP4 success Table 6. Satoh’s attack results using Adobe Flash Player...dns/dns-rebinding.pdf. Retrieved May 2009. [4] D. Dean, E. W. Felten, and D. S. Wallach “Java Security: From HotJava to Netscape and Beyond

  5. How Is a Heart Attack Treated?

    MedlinePlus

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  6. How Is a Heart Attack Diagnosed?

    MedlinePlus

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  7. [Progress with management of hereditary angioedema].

    PubMed

    Johnston, D T; Lode, H

    2013-03-21

    Hereditary angioedema (HAE) is a rare type of angioedema caused by a quantitative or functional deficit of C1 inhibitor (C1 INH) that leads to excess production of bradykinin, which can result in acute localized swelling attacks in the skin or mucous membranes of the mouth, head and neck, extremities, gastrointestinal (GI) tract, genitals, trunk, and larynx. Angioedema in the respiratorytract maycause airway obstruction; severe abdominal pain, vomiting, or diarrhea may occur in the GI tract. Patients with HAE may be diagnosed and managed by HAE specialists or by primary care physicians depending on individual circumstances. Proper treatment requires differentiation from other forms of angioedema. Patients with HAE who are managed appropriately with medications that treat and prevent atttacks may have a lower risk of death from laryngeal edema and a better quality of life. Less frequent attacks may allow them to attend work, school, and leisure activities more regularlyand be free of the pain and disfigurement of HAE attacks moreoften.

  8. Feedback on heart attack.

    PubMed

    Pearce, Lynne

    2016-04-13

    The Royal Brompton & Harefield NHS Foundation Trust in London is the largest heart and lung centre in the UK. This article explores a project carried out by nurses at the trust looking at the experiences of having an acute myocardial infarction, and how patients felt about taking part in a research study.

  9. Guinea worm cause of adult onset asthmatic attack, a radiological diagnosis.

    PubMed

    Marchie, T T

    1999-01-01

    A case report of a fifty years old Hausa male from Sokoto town, Nigeria an endemic region of guinea worm infestation, who presented with sudden adult onset of asthmatic attack and was evaluated radiologically and the diagnosis of acute obstructive airway disease was confirmed. It was noted, that there were associated calcified chain of guinea worms in the lung parenchyma. A rare association of acute asthmatic attack. Patient responded there-after to an anti-asthmatic regime of management.

  10. Recurrent acute pancreatitis.

    PubMed

    Khurana, Vishal; Ganguly, Ishita

    2014-09-28

    Recurrent acute pancreatitis (RAP) is commonly encountered, but less commonly understood clinical entity, especially idiopathic RAP, with propensity to lead to repeated attacks and may be chronic pancreatitis if attacks continue to recur. A great number of studies have been published on acute pancreatitis, but few have focused on RAP. Analysing the results of clinical studies focusing specifically on RAP is problematic in view due to lack of standard definitions, randomised clinical trials, standard evaluation protocol used and less post intervention follow-up duration. With the availability of newer investigation modalities less number of etiologies will remains undiagnosed. This review particularly is focused on the present knowledge in understanding of RAP.

  11. Sulfate attack expansion mechanisms

    SciTech Connect

    Müllauer, Wolfram Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  12. Dog pack attack: hunting humans.

    PubMed

    Avis, S P

    1999-09-01

    Dog bite-related fatalities, although unusual, accounted for 304 deaths in the United States between 1979 and 1996 and 6 fatalities in Canada between 1994 and 1996. Fatal dog pack attacks and attacks involving human predation are less common. The following describes a dog pack attack on a family of four involving 2 fatalities with predation of the victims. Factors previously identified that contribute to pack attacks and predation, including prior group hunting, social feeding, territorial defense, lack of human interaction, and prey stimuli, are discussed.

  13. Successful use of daily intravenous infusion of C1 esterase inhibitor concentrate in the treatment of a hereditary angioedema patient with ascites, hypovolemic shock, sepsis, renal and respiratory failure.

    PubMed

    Pham, Hoang; Santucci, Stephanie; Yang, William H

    2014-01-01

    Hereditary angioedema (HAE) is a rare autosomal dominant disease most commonly associated with defects in C1 esterase inhibitor (C1-INH). HAE manifests as recurrent episodes of edema in various body locations. Atypical symptoms, such as ascites, acute respiratory distress syndrome, and hypovolemic shock, have also been reported. Management of HAE conventionally involves the treatment of acute attacks, as well as short- and long-term prophylaxis. Since attacks can be triggered by several factors, including stress and physical trauma, prophylactic therapy is recommended for patients undergoing surgery. Human plasma-derived C1-INH (pdC1-INH) concentrate is indicated for the treatment of both acute HAE attacks and pre-procedure prevention of HAE episodes in patients undergoing medical, dental, or surgical procedures. We report the first case of a patient with HAE who experienced an abdominal attack precipitated by a retroperitoneal bleed while being converted from warfarin to heparin in preparation for surgery. Subsequently, the patient had a protracted course in hospital with other complications, which included hypovolemic shock, ascites, severe sepsis from nosocomial pneumonia, renal and respiratory failure. Despite intensive interventions, the patient remained in a critical state for months; however, after a trial of daily intravenous infusion of pdC1-INH concentrate (Berinert®, CSL Behring GmbH, Marburg, Germany), clinical status improved, particularly renal function. Therefore, pdC1-INH concentrate may be an effective treatment option to consider for critically-ill patients with HAE.

  14. Scenario Graphs and Attack Graphs

    DTIC Science & Technology

    2004-04-14

    46 6.1 Vulnerability Analysis of a Network . . . . . . . . . . . . . . . . . . . . . . . . . 53 6.2 Sandia Red Team Attack Graph...asymptotic bound. The test machine was a 1Ghz Pentium III with 1GB of RAM, running Red Hat Linux 7.3. Figure 4.1(a) plots running time of the implemen...host scanning tools network information vulnerability Attack Graph network Red

  15. Gout attacks and lunar cycle.

    PubMed

    Mikulecký, M; Rovenský, J

    2000-07-01

    The aim was to search for periodical fluctuations in daily occurrence of gout attacks during the synodic lunar cycle. 126 gout attacks were recorded between 1972 and 1994 at known calendar dates. The synodic plexogram, displaying the number of attacks for each day of the cycle, was processed by cosinor regression. A pronounced cycling was found, with highest peaks under the new and full moon (syzygigies). Thus, the maximal occurrence of attacks coincides with the peaking lunisolar tidal effect. Similar relation of attacks to synodic moon was seen in bronchial asthma of children, and a reciprocal one in paroxysmal tachyarrhythmia. Differing pathogenetic backgrounds of these diseases substantiate the observed differences in their putative reactions on the changing cosmogeophysical environment.

  16. Acute hereditary coproporphyria induced by the androgenic/anabolic steroid methandrostenolone (Dianabol).

    PubMed

    Lane, P R; Massey, K L; Worobetz, L J; Jutras, M N; Hull, P R

    1994-02-01

    Acute attacks of porphyria can be induced by certain drugs. We report a case of acute coproporphyria induced by methandrostenolone. This is the first report of acute porphyria induced by an androgenic, anabolic steroid.

  17. Pathophysiology of acute pancreatitis.

    PubMed

    Bhatia, Madhav; Wong, Fei Ling; Cao, Yang; Lau, Hon Yen; Huang, Jiali; Puneet, Padmam; Chevali, Lakshmi

    2005-01-01

    Acute pancreatitis is a common clinical condition. It is a disease of variable severity in which some patients experience mild, self-limited attacks while others manifest a severe, highly morbid, and frequently lethal attack. The exact mechanisms by which diverse etiological factors induce an attack are still unclear. It is generally believed that the earliest events in acute pancreatitis occur within acinar cells. Acinar cell injury early in acute pancreatitis leads to a local inflammatory reaction. If this inflammatory reaction is marked, it leads to a systemic inflammatory response syndrome (SIRS). An excessive SIRS leads to distant organ damage and multiple organ dysfunction syndrome (MODS). MODS associated with acute pancreatitis is the primary cause of morbidity and mortality in this condition. Recent studies have established the role played by inflammatory mediators in the pathogenesis of acute pancreatitis and the resultant MODS. At the same time, recent research has demonstrated the importance of acinar cell death in the form of apoptosis and necrosis as a determinant of pancreatitis severity. In this review, we will discuss about our current understanding of the pathophysiology of acute pancreatitis.

  18. WILD PIG ATTACKS ON HUMANS

    SciTech Connect

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  19. Allergens might trigger migraine attacks.

    PubMed

    Bektas, Hesna; Karabulut, Hayriye; Doganay, Beyza; Acar, Baran

    2017-03-01

    Migraine is a common primary headache disorder. The mechanisms underlying the onset of a migraine attack are not completely understood. Environmental changes and a number of other factors could induce migraine attacks. The aim of this study was to investigate the relationship between the frequency of migraine attacks and allergens. Migraine patients without aura, and healthy individuals similar in age and gender without a history of headache and allergy were prospectively included in the study. The duration of migraine, the frequency of migraine attacks, the medication history, and the symptoms during attacks were questioned. Migraine disability assessment score (MIDAS) and visual analog scale (VAS) scores were obtained. Allergen extracts including dust, fungi, insect, animal epithelium, pollens, and food allergens were applied for allergy tests. 49 migraine patients and 49 healthy individuals were enrolled in the study. There was no significant difference in terms of age and gender. The median migraine disease duration, the number of attacks in a month, and the duration of attacks were, respectively, 5.5 years (1-44), 4 (1-10) day/month, and 24 (4-72) h. The mean MIDAS grade was 2.45 ± 0.14 (1-4), and mean VAS score was 7.89 ± 0.27 (4-10). The positivity of allergy tests was 55.1 % (27/49) in the migraine group and 32.7 % (16/49) in the control group (p < 0.05). The allergy tests were positive for house dust, red birch, hazel tree, olive tree, nettle, and wheat. The frequency of migraine attacks was higher in allergy-test-positive patients than in negative ones in the migraine group (p = 0.001). The migraine patients who had frequent attacks should be examined for allergies.

  20. High Angle of Attack Aerodynamics

    DTIC Science & Technology

    1979-01-01

    HIGH ANGLE OF ATTACK IN A VERY LOW TURBULENCE LEVEL AIR STREAM by B.L.Hunt and P.C.Dexter 17 WIND AND WATER TUNNEL INVESTIGATIONS OF THE INTERACTION OF...FIGURE 1. TYPICAL FIGffTER FOREBODY LENGTHS It baa been convincingly shown in small-scale wind tunnel and water tunnel experiments that the apfro...attack taken during a water tunnel test. jn asymmetric vor~ox pattern io clearly ubewn. LOW ANGLE OF ATTACKC HIGH ANGLE OF ATTACK (SYMMETRIC

  1. Lifestyle Changes for Heart Attack Prevention

    MedlinePlus

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  2. Platelet activation as a marker of heart attack.

    PubMed

    Blann, Andrew D; Draper, Zoe

    2011-05-12

    A key component of the pathology of myocardial infarction (i.e. heart attack) is platelet-rich thrombosis within the coronary arteries. In many cases this occurs despite the use of anti-platelet drugs such as aspirin, and this, alongside other evidence, prompts the search for novel markers of platelet activity, such as levels of platelet product soluble P selectin in the plasma. However, by themselves, high levels of soluble P-selectin are of insufficient sensitivity and specificity to contribute to the management of the chest pain that may be a heart attack. Conversely, the current report shows that low levels of soluble P selectin contribute to the diagnosis of myocardial infarction because, as low levels are so rarely found in this condition, heart attack can be ruled out. If confirmed, this will be a major step forward in the management of acute chest pain.

  3. Genetic attack on neural cryptography

    SciTech Connect

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  4. Joint Direct Attack Munition (JDAM)

    DTIC Science & Technology

    2013-12-01

    2005 FEB 2005 Selective Availability Anti- Spoofing Module (SAASM)/ GPS Anti-Jam Production Award N/A MAR 2005 SEP 2005 MAR 2005 Change Explanations...Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-503 Joint Direct Attack Munition (JDAM) As of FY 2015 President’s Budget...2013 to 00-00-2013 4. TITLE AND SUBTITLE Joint Direct Attack Munition (JDAM) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  5. Gemcitabine-induced gouty arthritis attacks.

    PubMed

    Bottiglieri, Sal; Tierson, Neil; Patel, Raina; Mo, Jae-Hyun; Mehdi, Syed

    2013-09-01

    In this case report, we review the experience of a patient who presented with early stage pancreatic cancer (Stage IIb) who underwent a Whipple procedure and adjuvant chemoradiation. The patient's past medical history included early stage colon cancer in remission, post-traumatic-stress-disorder, hypertension, hyperlipidemia, osteoarthritis, gout, and pre-diabetes. Chemotherapy initially consisted of weekly gemcitabine. The patient developed acute gouty attacks after his second dose of gemcitabine, which brought him to the emergency room for emergent treatment on several occasions. Gemcitabine was held and treatment began with fluorouracil and concurrent radiation. After completion of his chemoradiation with fluorouracil, he was again treated with weekly gemcitabine alone. As soon as the patient started gemcitabine chemotherapy the patient developed gouty arthritis again, requiring discontinuation of chemotherapy. The patient received no additional treatment until his recent recurrence 8 months later where gemcitabine chemotherapy was again introduced with prophylactic medications consisting of allopurinol 100 mg by mouth daily and colchicine 0.6 mg by mouth daily throughout gemcitabine chemotherapy, and no signs of gouty arthritis occurred. To our knowledge, this is the first case report describing gout attacks associated with gemcitabine therapy. There is limited data available describing the mechanism that gouty arthritis may be precipitated from gemcitabine chemotherapy. Further monitoring and management may be required in patients receiving gemcitabine chemotherapy with underlying gout.

  6. Duloxetine-related panic attacks.

    PubMed

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-03-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients' trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who responded to duloxetine treatment administered in the initial dose of 30 mg per day with as many as three panic attacks in two days. Upon duloxetine withdrawal, these panic attacks ceased as well. The patient continued tianeptine and alprazolam treatment during which no significant side-effects had been seen, so that she gradually recovered. Some of the available literature sources have suggested the possibility of duloxetine administration to the end of generalised anxiety disorder and panic attack treatment. However, they are outnumbered by the contributions reporting about duloxetine-related anxiety, aggressiveness and panic attacks. In line with the foregoing, further monitoring of each and every duloxetine-administered patient group needs to be pursued so as to be able to evaluate treatment benefits and weigh them against risks of anxiety or panic attack onset.

  7. Myocardial perfusion imaging study of CO(2)-induced panic attack.

    PubMed

    Soares-Filho, Gastão L F; Machado, Sergio; Arias-Carrión, Oscar; Santulli, Gaetano; Mesquita, Claudio T; Cosci, Fiammetta; Silva, Adriana C; Nardi, Antonio E

    2014-01-15

    Chest pain is often seen alongside with panic attacks. Moreover, panic disorder has been suggested as a risk factor for cardiovascular disease and even a trigger for acute coronary syndrome. Patients with coronary artery disease may have myocardial ischemia in response to mental stress, in which panic attack is a strong component, by an increase in coronary vasomotor tone or sympathetic hyperactivity setting off an increase in myocardial oxygen consumption. Indeed, coronary artery spasm was presumed to be present in cases of cardiac ischemia linked to panic disorder. These findings correlating panic disorder with coronary artery disease lead us to raise questions about the favorable prognosis of chest pain in panic attack. To investigate whether myocardial ischemia is the genesis of chest pain in panic attacks, we developed a myocardial perfusion study through research by myocardial scintigraphy in patients with panic attacks induced in the laboratory by inhalation of 35% carbon dioxide. In conclusion, from the data obtained, some hypotheses are discussed from the viewpoint of endothelial dysfunction and microvascular disease present in mental stress response.

  8. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  9. Eyespots divert attacks by fish.

    PubMed

    Kjernsmo, Karin; Merilaita, Sami

    2013-09-07

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish' own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments.

  10. Eyespots divert attacks by fish

    PubMed Central

    Kjernsmo, Karin; Merilaita, Sami

    2013-01-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish’ own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments. PMID:23864602

  11. Development of a disease-specific quality of life questionnaire for adult patients with hereditary angioedema due to C1 inhibitor deficiency (HAE-QoL): Spanish multi-centre research project

    PubMed Central

    2012-01-01

    Background There is a need for a disease-specific instrument for assessing health-related quality of life in adults with hereditary angioedema due to C1 inhibitor deficiency, a rare, disabling and life-threatening disease. In this paper we report the protocol for the development and validation of a specific questionnaire, with details on the results of the process of item generation, domain selection, and the expert and patient rating phase. Methods/Design Semi-structured interviews were completed by 45 patients with hereditary angioedema and 8 experts from 8 regions in Spain. A qualitative content analysis of the responses was carried out. Issues raised by respondents were grouped into categories. Content analysis identified 240 different responses, which were grouped into 10 conceptual domains. Sixty- four items were generated. A total of 8 experts and 16 patients assessed the items for clarity, relevance to the disease, and correct dimension assignment. The preliminary version of the specific health-related quality of life questionnaire for hereditary angioedema (HAE-QoL v 1.1) contained 44 items grouped into 9 domains. Discussion To the best of our knowledge, this is the first multi-centre research project that aims to develop a specific health-related quality of life questionnaire for adult patients with hereditary angioedema due to C1 inhibitor deficiency. A preliminary version of the specific HAE-QoL questionnaire was obtained. The qualitative analysis of interviews together with the expert and patient rating phase helped to ensure content validity. A pilot study will be performed to assess the psychometric properties of the questionnaire and to decide on the final version. PMID:22817696

  12. Evaluation of Word Attack Skills.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A framework for more apt and sensitive evaluation of generalized word attack skill--the heart of oral reading skill--is presented. The paper envisions the design and development of oral reading instruction as bounded by a fully-specified evaluation scheme. (Author)

  13. Mitigating Higher Ed Cyber Attacks

    ERIC Educational Resources Information Center

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  14. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  15. Hereditary angioedema with normal C1 inhibitor in a French cohort: Clinical characteristics and response to treatment with icatibant

    PubMed Central

    Boccon‐Gibod, Isabelle; Launay, David; Gompel, Anne; Kanny, Gisele; Fabien, Vincent; Fain, Oliver

    2017-01-01

    Abstract Introduction The clinical characteristics and icatibant‐treatment outcomes of patients with hereditary angioedema with normal C1 inhibitor (HAE‐nC1 INH) are limited. Methods We retrospectively analyzed data from French HAE patients enrolled in the Icatibant Outcome Survey registry (from July 2009 to September 2013) to compare disease characteristics and the effectiveness and safety of acute icatibant‐treated angioedema attacks in patients with HAE‐nC1 INH, HAE with C1 INH deficiency (type I), or dysfunction (type II). Results One center in Grenoble contributed 22 patients with HAE‐nC1 INH and a family history of HAE while 15 centers across France contributed 153 patients with HAE type I and seven patients with HAE type II. Patients with HAE‐nC1 INH compared to HAE type I, respectively, were more likely to be female (88.1% vs. 63.4%), older at median age of disease onset (21 years vs. 15 years), and have a greater rate of abdominal (80% vs. 61%) and laryngeal (23% vs. 14%) attacks. Icatibant was effective in both groups though the median time to resolution of attack was significantly longer in the HAE‐nC1 INH group (20.0 h, 37 attacks) versus the HAE type I group (14.0 h, 67 attacks). Icatibant was self‐administered for 96.1% of attacks in patients with HAE‐nC1 INH and 75.8% in patients with HAE type I. No serious adverse side effects related to icatibant were reported. Conclusions These data help further define the disease characteristics of HAE‐nC1 INH in the French population and extend the limited data reporting the safe and effective use of icatibant in acute treatment of angioedema in French patients diagnosed with HAE‐nC1 INH. PMID:28250922

  16. Crony Attack: Strategic Attack’s Silver Bullet

    DTIC Science & Technology

    2006-11-01

    by distributing a large amount of private goods to the selectorate—the cronies—can be termed kleptocracies . Many govern- ments do indeed resemble...where the high-private goods kleptocracy is a good model. Furthermore, while not an example of crony attack to affect policy change (as opposed to...information about those nearest to the leader. The relationships part is only the start. Kleptocracies , like orga- nized crime leaders, are clever

  17. The effect of asymmetric attack on trim angle of attack

    NASA Technical Reports Server (NTRS)

    Kruse, R. L.

    1983-01-01

    Ballistic range tests were conducted to determine the effect of an asymmetrically ablated heat shield on the trim angle of attack of an entry vehicle. The tests, which were in support of Project Galileo, were conducted in atmospheric air at Mach numbers from 0.7 to 2.0. For the results for the configuration that was tested, the deduced trim angle varied between 13 deg and 21 deg.

  18. Zika Attacks Nerves, Muscles, Other Tissues

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  19. Beware Heart Attack Risk from Shoveling Snow

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_163566.html Beware Heart Attack Risk From Shoveling Snow Canadian study finds cases ... why men are more likely to suffer a heart attack after a heavy snowfall, researchers report. In a ...

  20. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  1. Network Attack Reference Data Set

    DTIC Science & Technology

    2004-12-01

    services they offer. When the attacker attempts to access system services in order to determine which are available, the scan is called a “ portscan ”. Network...Scans The following portscans were crafted using simPortScan.cc (Appendix B.2). Filename: scan V TCP fast seq small.tcp Source: Crafted...Stealthy Portscans . Journal of Computer Security, 10, 105–136. 6. Yegneswaran, V., Barford, P., and Ullrich, J. (2003). Internet Intrusions: Global

  2. Biomechanics of knife stab attacks.

    PubMed

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  3. Terror attacks influence driving behavior in Israel

    PubMed Central

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  4. Flashbulb memories of Paris attacks

    PubMed Central

    El Haj, Mohamad; Gandolphe, Marie-Charlotte; Wawrziczny, Emilie; Antoine, Pascal

    2016-01-01

    Abstract Rationale: Flashbulb memories are detailed and vivid memories of attributes of the reception context of surprising and emotionally arousing public events. Patient concerns and diagnosis: This paper offers a fine-grained view of flashbulb memories in a patient with mild Alzheimer's disease (AD). Interventions: The patient underwent a directed interview about the 13 November 2015 attacks in Paris. Outcomes: Unlike her memory about the date and month of the attacks, the patient provided accurate information about the year, time and places they occurred. The patient also provided accurate information about how she first became aware of the attacks, where she was, with whom, what she was doing, and what time it was when she learned about them. As for the affective characteristics of these memories, she tended to have high ratings of vividness and rehearsal. Negative emotional states and great surprise and novelty were also reported. Lessons: By assessing the impact of flashbulb memories in this patient with AD, this paper offers a unique view into how such memories may trigger a considerable recall of context as well much subjective reliving. PMID:27861395

  5. The Reverse Statistical Disclosure Attack

    NASA Astrophysics Data System (ADS)

    Mallesh, Nayantara; Wright, Matthew

    Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on finding the receivers to whom a given targeted user sends. In this paper, we investigate the effectiveness of statistical disclosure in finding all of a users' contacts, including those from whom she receives messages. To this end, we propose a new attack called the Reverse Statistical Disclosure Attack (RSDA). RSDA uses observations of all users sending patterns to estimate both the targeted user's sending pattern and her receiving pattern. The estimated patterns are combined to find a set of the targeted user's most likely contacts. We study the performance of RSDA in simulation using different mix network configurations and also study the effectiveness of cover traffic as a countermeasure. Our results show that that RSDA outperforms the traditional SDA in finding the user's contacts, particularly as the amounts of user traffic and cover traffic rise.

  6. Review of Existing Wormhole Attack Discovery Techniques

    DTIC Science & Technology

    2006-08-01

    Review of Existing Wormhole Attack Discovery Techniques Maria Alexandrovna Gorlatova The scientific or...DATES COVERED - 4. TITLE AND SUBTITLE Review of Existing Wormhole Attack Discovery Techniques 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Review of Existing Wormhole Attack

  7. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  8. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  9. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  10. [The systemic inflammatory response syndrome correction in acute destructive pancreatitis].

    PubMed

    Agapov, M A; Khoreva, M V; Gorskiĭ, V A

    2011-01-01

    Acute pancreatitis is a disease of variable severity. In which some patients experience mild, self-limited attacks while others manifest a severe, highly morbid, and frequently lethal attack. The exact mechanisms by which diverse etiological factors induce an attack are still unclear. Recent studies have established the role played by inflammatory mediators in the pathogenesis of acute pancreatitis. In our research we have estimated influence of not steroid anti-inflammatory preparation on synthesis pro-and anti-inflammatory Cytokines at healthy donors and at patients with Acute pancreatitis.

  11. Treatment of migraine attacks with an analgesic combination (Mersyndol).

    PubMed

    Somerville, B W

    1976-06-05

    The relief of acute migraine attacks with an analgesic/antihistamine combination containing paracetamol, codeine phosphate, doxylamine succinate and caffeine (Mersyndol) compared with that achieved with a placebo has been studied in a double-blind, crossover trial. Mersyndol emerged as significantly better than placebo in the complete relief of migraine pain, and was clearly superior to placebo in partially relieving the pain of migraine. These results suggest that it could be a useful alternative to ergotamine, and a comparative trial with ergotamine is suggested. Side effects with this combination were fairly common but mild, and consisted mainly of drowsiness caused by the antihistamine component.

  12. Cluster attacks responsive to recreational cannabis and dronabinol.

    PubMed

    Robbins, Matthew S; Tarshish, Sara; Solomon, Seymour; Grosberg, Brian M

    2009-06-01

    Pharmacological preparations of cannabinoid compounds have a variety of therapeutic uses in medicine, including different pain syndromes, but have not been previously reported as beneficial for cluster headache. We present a patient with cluster headache who was refractory to multiple acute and preventive medications but successfully aborted his attacks with recreational marijuana use; subsequent use of dronabinol provided equally effective pain relief. The beneficial effect may be related to the high concentration of cannabinoid receptors in the hypothalamus, which has been implicated as a site of dysfunction in neuroimaging studies of patients with cluster headache.

  13. Adolescent Vulnerability Following the September 11th Terrorist Attacks: A Study of Parents and Their Children

    ERIC Educational Resources Information Center

    Gil-Rivas, Virginia; Holman, E. Alison; Silver, Roxane Cohen

    2004-01-01

    Approximately 2 weeks after September 11th, adolescents from a national sample of households who were indirectly exposed to the terrorist attacks through the media completed a Web-based survey that assessed event-related acute stress symptoms. One year later, these adolescents (N = 142) and a randomly selected parent from their household completed…

  14. Joint Direct Attack Munition (JDAM)

    DTIC Science & Technology

    2015-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-503 Joint Direct Attack Munition (JDAM) As of FY 2017 President’s Budget Defense Acquisition...RDT&E - Research, Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then Year...N/A Feb 2005 Feb 2005 Feb 2005 Selective Availability Anti-Spoofing Module (SAASM)/GPS Anti-Jam Production Award N/A Mar 2005 Mar 2005 Mar 2005

  15. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    MedlinePlus

    ... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...

  16. What Are the Symptoms of a Heart Attack?

    MedlinePlus

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  17. Migraine attacks the Basal Ganglia

    PubMed Central

    2011-01-01

    Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human) brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF) to a matched (gender, age, age of onset and type of medication) group of patients whose migraine episodes progressed (HF). Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine. PMID:21936901

  18. Shoulder injuries from attacking motion

    NASA Astrophysics Data System (ADS)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  19. Efficacy and Tolerability of STOPAIN for a Migraine Attack

    PubMed Central

    St. Cyr, Andrea; Chen, Ashley; Bradley, Kathleen C.; Yuan, Hsiangkuo; Silberstein, Stephen D.; Young, William B.

    2015-01-01

    Objective: To determine whether topical menthol 6% gel will relieve a migraine attack. Materials and Methods: A single-center, open-label pilot trial of 25 patients with at least 1 year of diagnosed episodic migraine and <15 headache days per month. Patients treated one migraine attack with STOPAIN topical menthol 6% gel to skull base within 2 h of headache onset. Headache pain severity was assessed prior to and after gel application. Results: Thirty-two patients enrolled and 25 completed the study. Prior to treatment, 7 patients had mild pain, 13 moderate pain, and 5 severe pain. Two hours following gel application, 7 (28%) patients had no pain, 7 (28%) mild pain, 6 (25%) moderate pain, and 5 (20%) severe pain. The majority of patients had similar pain intensity (8; 32%) or improvement (13; 52%). At 24-h, only two non-rescued patients still had mild headache. Of the 25 completers, 2 patients took rescue medication prior to the 2-h period, and an additional 10 patients rescued between 2 and 24 h. Conclusion: Study results showed a significant improvement in headache intensity by 2 h after gel application. This pilot study shows STOPAIN gel may be effective in treating an acute migraine attack. PMID:25699012

  20. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  1. Cement composition and sulfate attack

    SciTech Connect

    Shanahan, Natalya; Zayed, Abla . E-mail: zayed@eng.usf.edu

    2007-04-15

    Four cements were used to address the effect of tricalcium silicate content of cement on external sulfate attack in sodium sulfate solution. The selected cements had similar fineness and Bogue-calculated tricalcium aluminate content but variable tricalcium silicates. Durability was assessed using linear expansion and compressive strength. Phases associated with deterioration were examined using scanning electron microscopy and X-ray diffraction. Mineralogical phase content of the as-received cements was studied by X-ray diffraction using two methods: internal standard and Rietveld analysis. The results indicate that phase content of cements determined by X-ray mineralogical analysis correlates better with the mortar performance in sulfate environment than Bogue content. Additionally, it was found that in cements containing triclacium aluminate only in the cubic form, the observed deterioration is affected by tricalcium silicate content. Morphological similarities between hydration products of high tricalcium aluminate and high tricalcium silicate cements exposed to sodium sulfate environment were also observed.

  2. Detecting Denial of Service Attacks in Tor

    NASA Astrophysics Data System (ADS)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  3. Cougar attacks on humans: a case report.

    PubMed

    McKee, Denise

    2003-01-01

    Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.

  4. [Mitotane as possible cause of acute intermittent porphyria].

    PubMed

    von Eyben, Finn Edler

    2011-09-12

    A 54 year-old woman with acute intermittent porphyria (AIP) developed an attack of porphyria after 156 days of treatment with mitotane following a non-radical adrenalectomy for adrenocortical carcinoma. Mitotane therapy was discontinued but the attack of porphyria persisted for more than four months and included episodes with severe metabolic and neurologic toxicities. Mitotane is probably porphyrinogenic for patients with AIP.

  5. Auroral Simulation Studies. HAES Report No. 6

    DTIC Science & Technology

    1975-04-22

    an important source of 5577 emission in- the aurora. Intense auroral bombardment over a period of 4 minutes is found to result in negligible...hereby gratefully acknOwledged. I K4 A 11 7~. 4 - 1i PREFACE The High Altitude Effects Simulation (IIABS) Program sponsored by the Defense Nuclear Agency...and Conclusions 93 02( A) EMISSION 95 4 TABLE OF CONTENTS (Continued) PAGE !ECTION 3 STUDIES RELATED TO LWIR PRODUCTION AND TO EUV EFFECTS IN THE

  6. British used Congreve Rockets to Attack Napoleon

    NASA Technical Reports Server (NTRS)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  7. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting...

  8. Preventive attack in the 1990s

    SciTech Connect

    Prebeck, S.R.

    1993-05-28

    The decline of the Soviet Union upset the world`s balance of power and opened the door to third world proliferation since the superpowers no longer have tight control over their client-states. This increase in proliferation raised the issue of how the United States (US) should respond to a third world nation that is acquiring nuclear weapons. Should the United States depend on preventive attacks to stop the proliferation of nuclear weapons. This is not a new issue. Proliferation and preventive war have both been issues since the end of World War II. The United States considered a preventive attack against the Soviet Union in the postwar years. The Soviet Union considered preventive attacks against the People`s Republic of China in 1969. Israel conducted a preventive attack in 1981 against the Osiraq nuclear reactor in Iraq. Preventive attacks are politically untenable and are not militarily possible. Without perfect political conditions, it is unacceptable for the only remaining superpower to attack a second-rate power. It is militarily impossible for the United States to guarantee the removal of all nuclear weapons in a single preventive attack. This study concludes that the United States should not depend on preventive attacks to stop proliferation of nuclear weapons.

  9. The cost of attack in competing networks.

    PubMed

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-06

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities.

  10. The cost of attack in competing networks

    PubMed Central

    Podobnik, B.

    2015-01-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator–prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  11. Exacerbation of migraine attacks during treatment with the selective serotonin reuptake inhibitor sertraline. A case report.

    PubMed

    Bickel, A; Kornhuber, J; Maihöfner, C; Ropohl, A

    2005-11-01

    Abnormal signal transmission in central serotonergic pathways is supposed to play an important role in the pathogenesis of migraine and major depression. We report on a patient, who was treated during an episode of depression with the selective serotonin reuptake inhibitor (SSRI) sertraline and developed frequent migraine attacks under this therapeutical regime. Single migraine attacks were treated successfully with triptanes. Although SSRIs may be beneficial for migraine prophylaxis at long term administration, this case suggests that acute administration of SSRIs in migraineurs may include the risk of worsening migraine.

  12. Novel Psychological Formulation and Treatment of "Tic Attacks" in Tourette Syndrome.

    PubMed

    Robinson, Sally; Hedderly, Tammy

    2016-01-01

    One important, but underreported, phenomenon in Tourette syndrome (TS) is the occurrence of "tic attacks." These episodes have been described at conferences as sudden bouts of tics and/or functional tic-like movements, lasting from 15 min to several hours. They have also been described by patients in online TS communities. To date, there are no reports of tic attacks in the literature. The aim of this article is to stimulate discussion and inform clinical practices by describing the clinical presentation of 12 children (mean age 11 years and 3 months; SD = 2 years and 4 months) with TS and tic attacks, with a detailed case report for one case (13-year-old male). These children commonly present acutely to casualty departments and undergo unnecessary medical investigations. Interestingly, all children reported comorbid anxiety, with worries about the tics themselves and an increased internal focus of attention on tics once the attacks had started. In keeping with other children, the index case reported a strong internal focus of attention, with a relationship between physiological sensations/tic urges, worries about having tic attacks, and behavioral responses (e.g., body scanning, situational avoidance, and other responses). In our experience, the attacks reduce with psychological therapy, for example, the index case attended 13 sessions of therapy that included metacognitive and attention training techniques, as well as cognitive-behavioral strategies. Following treatment, an improvement was seen across a range of measures assessing tics, mood, anxiety, and quality of life. Thus, psychological techniques used to treat anxiety disorders are effective at supporting a reduction in tic attacks through modifying attention, worry processes, and negative beliefs. It is hypothesized that an attentional style of threat monitoring, difficulties tolerating internal sensory urges, cognitive misattributions, and maladaptive coping strategies contribute to the

  13. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  14. The Meniere attack: an ischemia/reperfusion disorder of inner ear sensory tissues.

    PubMed

    Foster, C A; Breeze, R E

    2013-12-01

    We believe Meniere attacks arise as a chance association of endolymphatic hydrops and vascular risk factors for intracerebral ischemia. Hydrops acts as a variable Starling resistor upon the inner ear vasculature that is capable of inducing ischemic attacks only in people with reduced perfusion pressure in the ear. The unique characteristics of the attacks (loss of vestibular response and hearing acutely followed by a return to apparent normalcy over hours) are explained by the differential sensitivity of the inner ear tissues to transient ischemia, with the sensory tissues (dendrites, hair cells) vulnerable to hours-long ischemia/reperfusion injury, and the stria vulnerable to ischemia due to its high metabolic rate. Permanent hearing loss and vestibular damage after many attacks would result when small areas of irreversible sensory cell damage accumulate and become confluent. This theory is supported by the strong correlation of hydrops with Meniere attacks, the finding that autoregulation of cochlear blood flow is impaired in the hydropic ear, and studies demonstrating that symptoms and signs in people and in animal models vary with conditions that alter perfusion pressure in the inner ear. Induction of Meniere attacks in animal models requires both hydrops and a mechanism that reduces perfusion pressure, such as epinephrine injection or head dependency. There is a strong clinical association between Meniere attacks and disorders that increase the risk for cerebrovascular ischemia, such as migraine. The excitable tissues in the sensory structures have long been known to be more vulnerable to ischemia than the remaining aural tissues, and are now known to be vulnerable to excitotoxicity induced by ischemia/reperfusion. This correlates well with autopsy evidence of damage to dendrites and hair cells and with strial atrophy in late Meniere disease cases. If this hypothesis is confirmed, treatment of vascular risk factors may allow control of symptoms and result in a

  15. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  16. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  17. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  18. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  19. Cystitis - acute

    MedlinePlus

    Uncomplicated urinary tract infection; UTI - acute cystitis; Acute bladder infection; Acute bacterial cystitis ... cause. Menopause also increases the risk for a urinary tract infection. The following also increase your chances of having ...

  20. Who Is at Risk for a Heart Attack?

    MedlinePlus

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  1. When You Visit Your Doctor After a Heart Attack

    MedlinePlus

    ... inbox ! When You Visit Your Doctor - After a Heart Attack After a Heart Attack Questions to Discuss with Your Doctor: Have you ... body? Did you have this pain before your heart attack? What brings it on? How frequently do you ...

  2. After Cancer, Higher Risk of Severe Heart Attack

    MedlinePlus

    ... this type of heart attack, called ST-elevation myocardial infarction (STEMI). One in 10 had a history of ... that cancer survivors had a higher rate of heart attack, not all of those attacks proved fatal. In ...

  3. Women's Heart Disease: Heart Attack Symptoms

    MedlinePlus

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  4. Evaluation of the Single Keybit Template Attack

    DTIC Science & Technology

    2011-03-01

    27 v Page 3.5 Measures of Performance...17 MOP Measures of Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 x...include en- cryption standards, leakage models, correlation, classification theory, previous tem- plate attacks and measures of performance. 2.1

  5. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  6. Identifying and Analyzing Web Server Attacks

    SciTech Connect

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  7. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-14

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  8. Recovery of infrastructure networks after localised attacks

    PubMed Central

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  9. Study Shows How Zika Attacks Infant Brain

    MedlinePlus

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  10. Diabetes - preventing heart attack and stroke

    MedlinePlus

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  11. Approach to acute, recurrent, and chronic pancreatitis.

    PubMed

    Kinney, Timothy P; Freeman, Martin L

    2008-06-01

    Pancreatitis can manifest as a one-time episode, recurring attacks, or chronic pain. It is caused by numerous factors ranging from alcohol consumption to gallstones to subtle obstructive causes and occult autoimmune disorders. As a result, determining the etiology and effectively treating the causes and consequences of pancreatitis can be challenging. This article reviews the diagnosis and management of acute, acute recurrent, and chronic pancreatitis, focusing on more challenging scenarios.

  12. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  13. Heart Attack - Multiple Languages: MedlinePlus

    MedlinePlus

    ... Arabic) النوبة القلبية - العربية Bilingual PDF Health Information Translations Bosnian (Bosanski) Heart Attack Srčani udar - Bosanski (Bosnian) Bilingual PDF Health Information Translations Chinese - Simplified (简体中文) Heart Attack 心脏病发作 - 简体中文 (Chinese - ...

  14. Awareness of heart attack and stroke symptoms among Hispanic male adults living in the United States.

    PubMed

    Lutfiyya, May Nawal; Bardales, Ricardo; Bales, Robert; Aguero, Carlos; Brady, Shelly; Tobar, Adriana; McGrath, Cynthia; Zaiser, Julia; Lipsky, Martin S

    2010-10-01

    There is evidence that Hispanic men are a high risk group for treatment delay for both heart attack and stroke. More targeted research is needed to elucidate this specific population's knowledge of warning signs for these acute events. This study sought to describe within-group disparities in Hispanic men's knowledge of heart attack and stroke symptomology. Multivariate techniques were used to analyze a multi-year Behavioral Risk Factor Surveillance Heart and Stroke module database. The data were cross-sectional and focused on health risk factors and behaviors. The research participants were U.S. male Hispanic adults aged 18-99. The main outcome measure for the study was heart attack and stroke symptom knowledge score. Multivariate logistic regression analysis yielded that Hispanic men aged >or=18 years who earned low scores on the composite heart attack and stroke knowledge questions (range 0-8 points) were more likely to: have less than a high school education, have deferred medical care because of cost, not have an identified health care provider, and be uninsured. There were significant within-group differences. Targeting educational efforts toward older (>or=55 years) Hispanic men with less than high school education, those who do not have an identified health care provider or health insurance, and who defer health care because of cost could be ways to improve the outcome of acute vascular events among the U.S. Hispanic adult male population.

  15. Posttraumatic stress disorder in Manhattan, New York City, after the September 11th terrorist attacks.

    PubMed

    Galea, Sandro; Resnick, Heidi; Ahern, Jennifer; Gold, Joel; Bucuvalas, Michael; Kilpatrick, Dean; Stuber, Jennifer; Vlahov, David

    2002-09-01

    Estimates of acute mental health symptoms in the general population after disasters are scarce. We assessed the prevalence and correlates of acute posttraumatic stress disorder (PTSD) in residents of Manhattan 5-8 weeks after the terrorist attacks of September 11, 2001. We used random-digit dialing to contact a representative sample of adults living in Manhattan below 110th Street. Participants were interviewed about prior life events, personal characteristics, exposure to the events of September 11th, and psychological symptoms after the attack. Among 988 eligible adults, 19.3% reported symptoms consistent with PTSD at some point in their life, and 8.8% reported symptoms consistent with a diagnosis of current (within the past 30 days) PTSD. Overall, 57.8% of respondents reported at least one PTSD symptom in the past month. The most common past-month symptoms were intrusive memories (27.4%) and insomnia (24.5%). Predictors of current PTSD in a multivariable model were residence below Canal Street, low social support, life stressors 12 months prior to September 11th, perievent panic attack, losing possessions in the attacks, and involvement in the rescue efforts. These findings can help guide resource planning for future disasters in densely populated urban areas.

  16. [Therapeutic and toxic theophylline levels in asthma attacks--is there a need for additional theophylline?].

    PubMed

    Zeidman, A; Gardyn, J; Fradin, Z; Fink, G; Mittelman, M

    1997-07-01

    Although first-line therapy for bronchial asthma has changed over the past decade to anti-inflammatory medication such as inhaled corticosteroids and cromolyn with possible addition of beta-agonists, theophylline is still useful and therefore widely used. However, several studies have raised serious questions regarding its efficacy in acute asthmatic exacerbations. These studies, the narrow therapeutic range of the drug, the frequency of side effects and interactions with common drugs, and individual variation in clearance and metabolism, have prompted its reevaluation in the management of asthma. Therapeutic serum levels of theophylline are between 10 to 20 mcg/ml. Most adults achieve these concentrations with daily slow-release oral theophylline preparations, 200-400 mg (approximately 10 mg/Kg) twice a day. However, when such a patient presents to the emergency room (ER) in an asthmatic attack, immediate intravenous theophylline is often given, regardless of maintenance treatment. Since the rationale for this common therapeutic approach has been challenged, the current study was undertaken. Serum theophylline levels were measured in 23 consecutive asthmatics presenting to the ER in an acute attack. 15 (68%) had therapeutic levels (above 10 mcg/ml) and 2 had toxic levels (above 20 mcg/ml), prior to receiving the standard intravenous theophylline dose given for an attack. These data indicate that most patients with bronchial asthma on oral maintenance theophylline do not require additional intravenous theophylline when in an attack. It probably will not benefit them and may even induce serious theophylline toxicity.

  17. Severe attacks by dogs: characteristics of the dogs, the victims, and the attack settings.

    PubMed

    Wright, J C

    1985-01-01

    Sixteen incidents involving dog bites fitting the description "severe" were identified among 5,711 dog bite incidents reported to health departments in five South Carolina counties (population 750,912 in 1980) between July 1, 1979, and June 30, 1982. A "severe" attack was defined as one in which the dog "repeatedly bit or vigorously shook its victim, and the victim or the person intervening had extreme difficulty terminating the attack." Information from health department records was clarified by interviews with animal control officers, health and police officials, and persons with firsthand knowledge of the events. Investigation disclosed that the dogs involved in the 16 severe attacks were reproductively intact males. The median age of the dogs was 3 years. A majority of the attacks were by American Staffordshire terriers, St. Bernards, and cocker spaniels. Ten of the dogs had been aggressive toward people or other dogs before the incident that was investigated. Ten of the 16 victims of severe attacks were 10 years of age or younger; the median age of all 16 victims was 8 years. Twelve of the victims either were members of the family that owned the attacking dog or had had contact with the dog before the attack. Eleven of the victims were bitten on the head, neck, or shoulders. In 88 percent of the cases, the attacks took place in the owner's yard or home, or in the adjoining yard. In 10 of the 16 incidents, members of the victims' families witnessed the attacks. The characteristics of these attacks, only one of which proved fatal, were similar in many respects to those that have been reported for other dog bite incidents that resulted in fatalities. On the basis of this study, the author estimates that a risk of 2 fatalities per 1,000 reported dog bites may exist nationwide. Suggestions made for the prevention of severe attacks focus on changing the behavior of both potential canine attackers and potential victims.

  18. Many faces of angioedema: focus on the diagnosis and management of abdominal manifestations of hereditary angioedema.

    PubMed

    Nzeako, Ugochukwu C; Longhurst, Hilary J

    2012-04-01

    Angioedema of the intestinal tract is an infrequent but well-described cause of abdominal pain that can occur because of inherited, acquired, allergic, or drug-induced causes. Hereditary angioedema (HAE) is a genetic disorder that causes recurrent attacks of severe edema of various body parts, including the intestinal tract. Moderate to severe abdominal pain occurs in 43-93% of such attacks due to intestinal edema. Laryngeal edema is a potentially life-threatening manifestation. Failure to recognize and diagnose HAE or other causes of intestinal angioedema can lead to years of delay in diagnosis, and in the case of HAE, often to unnecessary abdominal surgeries. Recognizing the typical history of recurrent attacks of abdominal pain, oropharyngeal/laryngeal angioedema or cutaneous angioedema, family history of similar symptoms, association of attacks with stress or menses, and exacerbation of attacks after administration of estrogens or angiotensin-converting enzyme inhibitors will increase diagnostic accuracy. Interdisciplinary treatment is often necessary after the diagnosis of HAE, first with acute management in the emergency room or the intensive care unit, followed by either drug prophylaxis against future attacks using a C1-esterase inhibitor concentrate or attenuated androgens and discontinuation of medications known to trigger attacks. Newer drugs approved for treatment of acute attacks may have future roles in the prevention of attacks if further studies support their efficacy. Gastroenterologists in particular should maintain a high index of suspicion for the possibility of HAE or other causes of intestinal angioedema in patients with a history of recurrent abdominal pain.

  19. Transient ischemic attack may present a target for normobaric hyperoxia treatment.

    PubMed

    Hadjiev, Dimiter I; Mineva, Petya P

    2010-07-01

    According to the new revised tissue-based definition, transient ischemic attack is a transient episode of neurological dysfunction caused by a focal brain, spinal cord, or retinal ischemia without acute infarction. This review addresses the pathophysiology of transient ischemic attack and the impact of normobaric hyperoxia on the penumbral tissue. Neuroimaging in transient ischemic attack patients and advances in penumbra imaging allow the transient ischemic attack, from pathophysiological viewpoint, to be defined as an ischemic penumbra of varied duration, which could proceed to a cerebral infarction or reduce to a benign oligemia. Persisting perfusion abnormalities are observed, despite resolution of the neurological symptoms. Preclinical and clinical studies have shown that the normobaric hyperoxia treatment is associated with improvement of hemodynamic and metabolic disturbances, particularly in the penumbral tissue. Transient ischemic attack, considered an ischemic penumbra, may present an ideal target for early normobaric hyperoxia therapy, administered as soon as possible after the onset of the neurological deficit. Follow-up perfusion imaging could guide and individualize the treatment.

  20. Emergency management of acute adult asthma.

    PubMed Central

    Grunfeld, A. F.; Ho, K.

    1995-01-01

    Despite advances in understanding the pathophysiology of acute asthma and the development of new, effective therapies, patients still die. While physicians agree that most asthma deaths could be prevented if patients were treated adequately, evidence suggests that both patients and physicians continue to underestimate the severity of asthma attacks and delay adequate treatment. PMID:8563508

  1. An update of clinical management of acute intermittent porphyria

    PubMed Central

    Pischik, Elena; Kauppinen, Raili

    2015-01-01

    Acute intermittent porphyria (AIP) is due to a deficiency of the third enzyme, the hydroxymethylbilane synthase, in heme biosynthesis. It manifests with occasional neuropsychiatric crises associated with overproduction of porphyrin precursors, aminolevulinic acid and porphobilinogen. The clinical criteria of an acute attack include the paroxysmal nature and various combinations of symptoms, such as abdominal pain, autonomic dysfunction, hyponatremia, muscle weakness, or mental symptoms, in the absence of other obvious causes. Intensive abdominal pain without peritoneal signs, acute peripheral neuropathy, and encephalopathy usually with seizures or psychosis are the key symptoms indicating possible acute porphyria. More than fivefold elevation of urinary porphobilinogen excretion together with typical symptoms of an acute attack is sufficient to start a treatment. Currently, the prognosis of the patients with AIP is good, but physicians should be aware of a potentially fatal outcome of the disease. Mutation screening and identification of type of acute porphyria can be done at the quiescent phase of the disease. The management of patients with AIP include following strategies: A, during an acute attack: 1) treatment with heme preparations, if an acute attack is severe or moderate; 2) symptomatic treatment of autonomic dysfunctions, polyneuropathy and encephalopathy; 3) exclusion of precipitating factors; and 4) adequate nutrition and fluid therapy. B, during remission: 1) exclusion of precipitating factors (education of patients and family doctors), 2) information about on-line drug lists, and 3) mutation screening for family members and education about precipitating factors in mutation-positive family members. C, management of patients with recurrent attacks: 1) evaluation of the lifestyle, 2) evaluation of hormonal therapy in women, 3) prophylactic heme therapy, and 4) liver transplantation in patients with severe recurrent attacks. D, follow-up of the AIP

  2. An update of clinical management of acute intermittent porphyria.

    PubMed

    Pischik, Elena; Kauppinen, Raili

    2015-01-01

    Acute intermittent porphyria (AIP) is due to a deficiency of the third enzyme, the hydroxymethylbilane synthase, in heme biosynthesis. It manifests with occasional neuropsychiatric crises associated with overproduction of porphyrin precursors, aminolevulinic acid and porphobilinogen. The clinical criteria of an acute attack include the paroxysmal nature and various combinations of symptoms, such as abdominal pain, autonomic dysfunction, hyponatremia, muscle weakness, or mental symptoms, in the absence of other obvious causes. Intensive abdominal pain without peritoneal signs, acute peripheral neuropathy, and encephalopathy usually with seizures or psychosis are the key symptoms indicating possible acute porphyria. More than fivefold elevation of urinary porphobilinogen excretion together with typical symptoms of an acute attack is sufficient to start a treatment. Currently, the prognosis of the patients with AIP is good, but physicians should be aware of a potentially fatal outcome of the disease. Mutation screening and identification of type of acute porphyria can be done at the quiescent phase of the disease. The management of patients with AIP include following strategies: A, during an acute attack: 1) treatment with heme preparations, if an acute attack is severe or moderate; 2) symptomatic treatment of autonomic dysfunctions, polyneuropathy and encephalopathy; 3) exclusion of precipitating factors; and 4) adequate nutrition and fluid therapy. B, during remission: 1) exclusion of precipitating factors (education of patients and family doctors), 2) information about on-line drug lists, and 3) mutation screening for family members and education about precipitating factors in mutation-positive family members. C, management of patients with recurrent attacks: 1) evaluation of the lifestyle, 2) evaluation of hormonal therapy in women, 3) prophylactic heme therapy, and 4) liver transplantation in patients with severe recurrent attacks. D, follow-up of the AIP

  3. Know the Warning Signs of a Heart Attack

    MedlinePlus

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  4. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  5. On-demand therapy for hereditary angioedema.

    PubMed

    Bernstein, Jonathan A

    2013-11-01

    Consensus guidelines on hereditary angioedema (HAE) recommend that all patients have access to on-demand treatment of acute attacks. A recent patientcentric guideline recommended that at least 2 on-demand therapies be available because patients often have heterogeneous responses to different medications. Self-administration of therapeutic agents, or administration under supervision by a health care provider in the home setting, is the preferred treatment approach. Future studies are needed to show the benefits of acute on-demand therapies at improving quality of life and reducing morbidity and mortality in patients with HAE.

  6. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  7. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    NASA Astrophysics Data System (ADS)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  8. Robustness of interdependent networks under targeted attack

    NASA Astrophysics Data System (ADS)

    Huang, Xuqing; Gao, Jianxi; Buldyrev, Sergey; Havlin, Shlomo; Stanley, H. Eugene

    2012-02-01

    When an initial failure of nodes occurs in interdependent networks, a cascade of failure between the networks occurs. Earlier studies focused on random initial failures. Here we study the robustness of interdependent networks under targeted attack on high or low degree nodes. We introduce a general technique which maps the targeted-attack problem in interdependent networks to the random-attack problem in a transformed pair of interdependent networks. We find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc=0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. The result implies that interdependent networks are difficult to defend by strategies such as protecting the high degree nodes that have been found useful to significantly improve robustness of single networks.

  9. Robustness of interdependent networks under targeted attack

    NASA Astrophysics Data System (ADS)

    Huang, Xuqing; Gao, Jianxi; Buldyrev, Sergey V.; Havlin, Shlomo; Stanley, H. Eugene

    2011-06-01

    When an initial failure of nodes occurs in interdependent networks, a cascade of failure between the networks occurs. Earlier studies focused on random initial failures. Here we study the robustness of interdependent networks under targeted attack on high or low degree nodes. We introduce a general technique which maps the targeted-attack problem in interdependent networks to the random-attack problem in a transformed pair of interdependent networks. We find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc=0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. The result implies that interdependent networks are difficult to defend by strategies such as protecting the high degree nodes that have been found useful to significantly improve robustness of single networks.

  10. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  11. Death due to attack from chow dog.

    PubMed

    Bux, R C; McDowell, J D

    1992-12-01

    It is estimated that between one and four million persons per year are bitten by dogs in the United States. While most injuries associated with the bites are minor, serious sequelae, and even death, may occur. Most victims of fatal dog attacks are children < 1 year of age or elderly women. The most frequent cause of death is hemorrhage and shock from major vessel damage. A case is reported in which an elderly woman was attacked by her pet Chow dog. The victim received multiple superficial abrasions, contusions, and lacerations from the dog attack. A large perforation of the right external pudendal vein and three perforations of the left superficial femoral vein resulted in exsanguination and death. Fractures of the left 2nd through 4th ribs with underlying pulmonary contusion were also found.

  12. Responding to chemical attack. Final report

    SciTech Connect

    Bagley, R.W.

    1991-02-11

    In view of Iraq's stated intention of using chemical weapons in the Persian Gulf War, the Coalition forces must be prepared to respond. Iraq is capable of conducting such an attack. While the use of chemical weapons may not be militarily significant, the political effect of the use and the response to it may be very significant. Responses including the use of chemical and nuclear weapons are assessed in terms of their legality, political cost, and military effectiveness and found unacceptable. Reliance on diplomatic protests and on post-war criminal sanctions are judged ineffective. A response in the form of increased conventional attack on the Iraqi chemical infrastructure is recommended because that response will preserve the present Coalition, effectively counter the chemical attack, contribute to regional stability, and enhance the reputation of the United States for lawfulness and dependability.

  13. Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks

    DTIC Science & Technology

    2006-01-01

    than preventing or deterring, collusion attacks. We show that colluding verifiers who are capable of implementing wormhole attacks can defeat even...away. We will illustrate this using (a) standard collusion and also (b) wormhole in Figure 2. A wormhole attack is one in which a fast link is set up...be- tween the victims and an attacker who is outside of the normal range. The wormhole attack may appear to be an overkill for this problem since

  14. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    NASA Astrophysics Data System (ADS)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  15. The neurologic manifestations of the acute porphyrias.

    PubMed

    Simon, Neil G; Herkes, Geoffrey K

    2011-09-01

    The porphyrias are diseases characterised by accumulation of porphyrins and porphyrin precursors owing to enzymatic deficiencies of the haem synthetic pathway. In the acute hepatic porphyrias accumulation of porphyrin precursors, in particular delta-aminolaevulinic acid (ALA), cause dysfunction of the central, peripheral and autonomic nervous systems. This leads to the characteristic clinical findings of abdominal pain, neuropsychiatric symptoms and neuropathy. The exact pathogenic mechanism is not clear but evidence to date suggests both direct toxic effects of ALA and intracellular metabolic derangement contribute to the neurologic disorders. This review explores the mechanisms of neural dysfunction in the acute porphyrias and the resultant clinical features of an acute attack.

  16. Small Bowel Obstruction Secondary to Acute Pancreatitis

    PubMed Central

    Sunkara, Tagore; Etienne, Denzil; Caughey, Megan E.; Gaduputi, Vinaya

    2017-01-01

    While an uncommon occurrence, it is possible for patients diagnosed with acute pancreatitis to develop colonic ileus, obstruction, or perforation. By extension, it is also possible to develop a small bowel obstruction following an episode of acute pancreatitis. Here, we present the case of a 44-year-old male, who after repeated attacks of acute pancreatitis, came to the emergency department with continuous, non-bloody vomiting. This patient also complained of both left upper quadrant and epigastric pain, and was subsequently diagnosed with a small bowel obstruction involving the proximal jejunum. PMID:28270876

  17. Small Bowel Obstruction Secondary to Acute Pancreatitis.

    PubMed

    Sunkara, Tagore; Etienne, Denzil; Caughey, Megan E; Gaduputi, Vinaya

    2017-02-01

    While an uncommon occurrence, it is possible for patients diagnosed with acute pancreatitis to develop colonic ileus, obstruction, or perforation. By extension, it is also possible to develop a small bowel obstruction following an episode of acute pancreatitis. Here, we present the case of a 44-year-old male, who after repeated attacks of acute pancreatitis, came to the emergency department with continuous, non-bloody vomiting. This patient also complained of both left upper quadrant and epigastric pain, and was subsequently diagnosed with a small bowel obstruction involving the proximal jejunum.

  18. Acute Pericarditis

    MedlinePlus

    ... parasitic, or fungal and, in people with AIDS , tuberculosis , or aspergillosis ) Heart attack Heart surgery (postpericardiotomy syndrome) ... who have AIDS, a number of infections, including tuberculosis and aspergillosis, may result in pericarditis. Pericarditis due ...

  19. Predation: Prey plumage adaptation against falcon attack.

    PubMed

    Palleroni, Alberto; Miller, Cory T; Hauser, Marc; Marler, Peter

    2005-04-21

    Several plumage types are found in feral pigeons (Columba livia), but one type imparts a clear survival advantage during attacks by the swiftest of all predators--the peregrine falcon (Falco peregrinus). Here we use quantitative field observations and experiments to demonstrate both the selective nature of the falcon's choice of prey and the effect of plumage coloration on the survival of feral pigeons. This plumage colour is an independently heritable trait that is likely to be an antipredator adaptation against high-speed attacks in open air space.

  20. Identifying inference attacks against healthcare data repositories

    PubMed Central

    Vaidya, Jaideep; Shafiq, Basit; Jiang, Xiaoqian; Ohno-Machado, Lucila

    Health care data repositories play an important role in driving progress in medical research. Finding new pathways to discovery requires having adequate data and relevant analysis. However, it is critical to ensure the privacy and security of the stored data. In this paper, we identify a dangerous inference attack against naive suppression based approaches that are used to protect sensitive information. We base our attack on the querying system provided by the Healthcare Cost and Utilization Project, though it applies in general to any medical database providing a query capability. We also discuss potential solutions to this problem. PMID:24303279

  1. Diffusion-Weighted Imaging and Diagnosis of Transient Ischemic Attack

    PubMed Central

    Brazzelli, Miriam; Chappell, Francesca M; Miranda, Hector; Shuler, Kirsten; Dennis, Martin; Sandercock, Peter A G; Muir, Keith; Wardlaw, Joanna M

    2014-01-01

    Objective Magnetic resonance (MR) diffusion-weighted imaging (DWI) is sensitive to small acute ischemic lesions and might help diagnose transient ischemic attack (TIA). Reclassification of patients with TIA and a DWI lesion as “stroke” is under consideration. We assessed DWI positivity in TIA and implications for reclassification as stroke. Methods We searched multiple sources, without language restriction, from January 1995 to July 2012. We used PRISMA guidelines, and included studies that provided data on patients presenting with suspected TIA who underwent MR DWI and reported the proportion with an acute DWI lesion. We performed univariate random effects meta-analysis to determine DWI positive rates and influencing factors. Results We included 47 papers and 9,078 patients (range = 18–1,693). Diagnosis was by a stroke specialist in 26 of 47 studies (55%); all studies excluded TIA mimics. The pooled proportion of TIA patients with an acute DWI lesion was 34.3% (95% confidence interval [CI] = 30.5–38.4, range = 9–67%; I2 = 89.3%). Larger studies (n > 200) had lower DWI-positive rates (29%; 95% CI = 23.2–34.6) than smaller (n < 50) studies (40.1%; 95% CI = 33.5–46.6%; p = 0.035), but no other testable factors, including clinician speciality and time to scanning, reduced or explained the 7-fold DWI-positive variation. Interpretation The commonest DWI finding in patients with definite TIA is a negative scan. Available data do not explain why ⅔ of patients with definite specialist-confirmed TIA have negative DWI findings. Until these factors are better understood, reclassifying DWI-positive TIAs as strokes is likely to increase variance in estimates of global stroke and TIA burden of disease. ANN NEUROL 2014;75:67–76 PMID:24085376

  2. Acute Bronchitis

    MedlinePlus

    ... can also cause acute bronchitis. To diagnose acute bronchitis, your health care provider will ask about your symptoms and listen to your breathing. You may also have other tests. Treatments include rest, fluids, and aspirin (for adults) or ...

  3. Preventing and Profiling Malicious Insider Attacks

    DTIC Science & Technology

    2012-04-01

    personality predispositions. The aim of this report is to determine what personality factors , personality predispositions and motivators may...Butavicius, M. (2009). Human Factors and Information Security: Individual, Culture and Security Environment . Manuscript submitted for publication...previous research on malicious insiders with particular emphasis on the social and psychological factors that may have influenced the attacker and their

  4. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  5. Shark Attack! Sinking Your Teeth into Anatomy.

    ERIC Educational Resources Information Center

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  6. Triage of casualties after nuclear attack.

    PubMed

    Pledger, H G

    1986-09-20

    Casualties from a nuclear attack on the United Kingdom would overwhelm the health services, and health workers would be faced with many more people seeking help than could be offered treatment. Discussion is needed to determine which methods of medical and non-medical triage would be acceptable and feasible.

  7. Attack Classification Schema for Smart City WSNs.

    PubMed

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  8. Rhode Island School Terrorist Attack Preparedness

    ERIC Educational Resources Information Center

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  9. CASE STUDY: DIELDRIN ATTACK IN DALYAN LAGOON

    EPA Science Inventory

    During the first two weeks of December 2005, NATO sponsored an Advanced Study Institute (ASI) in Istanbul, Turkey. Part of this ASI involved a case study of a terrorist attack, where a chemical was assumed to be dumped into Sulunger Lake in Turkey. This chapter documents the re...

  10. Gas in Attack and Gas in Defense

    DTIC Science & Technology

    1919-07-01

    celluloid eye pieces and, at a somewhat later date, with an expira - tory valve c In a ga~i attack the sack was pulled over the head and tucked...the field. PROTECTION IN WAR IS RELATIVE ONLY. ‘%. Napoleon is credited with saying/In order to make an omelet, it is necessary, to break some eggs

  11. Plant defences against herbivore and insect attack

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  12. Categorizing Network Attacks Using Pattern Classification Algorithms

    DTIC Science & Technology

    2002-03-01

    attacks into predefined categories such as Flooding Denial of Service, Distributed Denial of Service, Nukers, and Portscans . Such categorization decreases...Detection of Stealthy Portscans . Tech- nical Report, Silicon Defense, 2000. [Stevens94] Stevens, W. Richard. TCP/IP Illustrated Volume 1 . Reading: Addison

  13. Responses to the September 11, 2001 Attacks.

    ERIC Educational Resources Information Center

    Anderson, Frances E.

    2001-01-01

    This editorial introduces a special section devoted to chronicling the responses of art therapists after the September 11th attacks. The section contains 10 articles from therapists in New York City, New Jersey, Long Island, Washington, DC, and California. Articles include stories of the reactions of the therapists as well as their work with…

  14. Panic attacks after treatment with zuclopenthixol decanoate.

    PubMed

    Srivastava, Anil; Soni, Jorge

    2007-01-01

    The association between neuroleptics and anxiety is unclear: neuroleptics have been used to treat anxiety though may also themselves be anxiogenic. We present the case of a man who developed new onset panic attacks after treatment with zuclopenthixol decanoate, a commonly administered depot antipsychotic. We review the literature on the association between antipsychotics and anxiety and present possible pathophysiological mechanisms.

  15. Improvement of Hungarian Joint Terminal Attack Program

    DTIC Science & Technology

    2013-06-13

    Forward Looking Infrared GLTD Ground Laser Target Designator HDF Hungarian Defense Force JFO Joint Fires Observer JTAC Joint Terminal Attack Controller......FLIR at least. Laser capability is another important material requirement for CAS aircraft. Laser systems contain two important components. A low

  16. Intrusion-Tolerant Replication under Attack

    ERIC Educational Resources Information Center

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  17. Survival of child after lion attack

    PubMed Central

    Dabdoub, Carlos F.; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named “Bang-Bang”, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of the literature. Case Description: We report the case of an 8-year-old boy who was attacked by a lion during a circus show. The patient underwent an emergent neurosurgical procedure, including parietal craniectomy, cleaning, and extensive surgical debridement of the wounds. Despite open severe head trauma with brain damage as well as thorax and abdomen trauma, the child survived, with minimal neurological sequelae. Conclusions: Human injury resulting from encounters with nondomesticated animals is increasingly rising throughout the world. This case highlights the potentially violent and aggressive nature of wild mammals held in captivity. Unusual wild animal attacks and the complex injuries that result may pose a challenge to surgeons practicing in resource-limited settings. In this sense, the best treatment in the mentioned case is the prevention of human injuries by these animals. In addition, to attend to these infrequent cases, the authors emphasize the importance of a multidisciplinary approach to achieve the best cosmetic and functional results. PMID:23869277

  18. Association between Terror Attacks and Suicide Attempts

    ERIC Educational Resources Information Center

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  19. Outcome after anterior callosal section that spares the splenium in pediatric patients with drop attacks.

    PubMed

    Yang, Peng-Fan; Lin, Qiao; Mei, Zhen; Chen, Zi-Qian; Zhang, Hui-Jian; Pei, Jia-Sheng; Tian, Jun; Jia, Yan-Zeng; Zhong, Zhong-Hui

    2014-07-01

    We report on the efficacy and safety of extended, one-stage anterior callosal section that spares the splenium, which is performed in a large series of pediatric patients with drop attacks. Twenty-nine pediatric patients with drop attacks were studied (19 males and 10 females; mean age: 9.9 years). As presurgical factors, the age at surgery, age at seizure onset, age at drop attack onset, sex, hemiparesis, severe mental retardation, electroencephalograph abnormalities, magnetic resonance imaging abnormalities, and (18)fluorodeoxyglucose positron emission tomography abnormalities were analyzed. All patients had multiple seizure types, including drop attacks, atypical absence seizures, complex partial seizures, tonic seizures, and generalized tonic-clonic seizures. All patients were developmentally impaired and had electroencephalograph results showing marked secondary bilateral synchrony. All patients received an extended, one-stage callosal section, leaving only the splenium intact. The mean follow-up time was 5.2 years. Seizure outcome (cessation of seizures or ≥ 90% seizure reduction) was achieved in 79.3% of patients with drop attacks. The families assessed the overall daily function as improved in 62.1% of the patients, unchanged in 24.1%, and worse in 13.8%. Family satisfaction with callosotomy was achieved in 82.8% of the patients. The majority of the patients had some degree of a transient acute postoperative disconnection syndrome that disappeared within 3 weeks. Postoperatively, patients showed a consistent increase in attention levels. We conclude that extended callosal sectioning that leaves the splenium intact should be considered a good palliative surgical option for pediatric patients with drop attacks and that diminishment of epileptic discharge synchrony is a good prognostic sign following callosotomy. We also found that the postoperative increase in attention levels was as useful as seizure control in improving the quality of life of these

  20. Error and attack vulnerability of temporal networks

    NASA Astrophysics Data System (ADS)

    Trajanovski, S.; Scellato, S.; Leontiadis, I.

    2012-06-01

    The study of real-world communication systems via complex network models has greatly expanded our understanding on how information flows, even in completely decentralized architectures such as mobile wireless networks. Nonetheless, static network models cannot capture the time-varying aspects and, therefore, various temporal metrics have been introduced. In this paper, we investigate the robustness of time-varying networks under various failures and intelligent attacks. We adopt a methodology to evaluate the impact of such events on the network connectivity by employing temporal metrics in order to select and remove nodes based on how critical they are considered for the network. We also define the temporal robustness range, a new metric that quantifies the disruption caused by an attack strategy to a given temporal network. Our results show that in real-world networks, where some nodes are more dominant than others, temporal connectivity is significantly more affected by intelligent attacks than by random failures. Moreover, different intelligent attack strategies have a similar effect on the robustness: even small subsets of highly connected nodes act as a bottleneck in the temporal information flow, becoming critical weak points of the entire system. Additionally, the same nodes are the most important across a range of different importance metrics, expressing the correlation between highly connected nodes and those that trigger most of the changes in the optimal information spreading. Contrarily, we show that in randomly generated networks, where all the nodes have similar properties, random errors and intelligent attacks exhibit similar behavior. These conclusions may help us in design of more robust systems and fault-tolerant network architectures.

  1. Drugs and acute porphyrias: reasons for a hazardous relationship.

    PubMed

    Roveri, Giulia; Nascimbeni, Fabio; Rocchi, Emilio; Ventura, Paolo

    2014-11-01

    The porphyrias are a group of metabolic diseases caused by inherited or acquired enzymatic deficiency in the metabolic pathway of heme biosynthesis. Simplistically, they can be considered as storage diseases, because the partial enzymatic defect gives rise to a metabolic "bottleneck" in the biosynthetic pathway and hence to an accumulation of different metabolic intermediates, potentially toxic and responsible for the various (cutaneous or neurovisceral) clinical manifestations observed in these diseases. In the acute porphyrias (acute intermittent porphyria, hereditary coproporphyria, variegate porphyria, and the very rare delta-aminolevulinic acid dehydratase ALAD-d porphyria), the characteristic severe neurovisceral involvement is mainly ascribed to a tissue accumulation of delta-aminolevulinic acid, a neurotoxic nonporphyrin precursor. Many different factors, both endogenous and exogenous, may favor the accumulation of this precursor in patients who are carriers of an enzymatic defect consistent with an acute porphyria, thus contributing to trigger the serious (and potentially fatal) clinical manifestations of the disease (acute porphyric attacks). To date, many different drugs are known to be able to precipitate an acute porphyric attack, so that the acute porphyrias are also considered as pharmacogenetic or toxygenetic diseases. This article reviews the different biochemical mechanisms underlying the capacity of many drugs to precipitate a porphyric acute attack (drug porphyrogenicity) in carriers of genetic mutations responsible for acute porphyrias, and addresses the issue of prescribing drugs for patients affected by these rare, but extremely complex, diseases.

  2. FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks

    DTIC Science & Technology

    2011-11-23

    Constant Bit Rate (CBR), Shrew [14], and covert [15] attacks) and by comparing the FLoc results with those of other approaches (e.g., Pushback [5...Bit Rate (CBR) attack (Fig. 10 6(b)), and a Shrew attack (Fig. 6(c)) [6]. The aim of the high- population TCP attack is to reduce the bandwidth of...and are rate-limited accordingly. In the Shrew attack, each attack source sends 2.0 Mbps traffic only during 0.25RTT seconds within an interval of

  3. FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks

    DTIC Science & Technology

    2011-11-23

    Constant Bit Rate (CBR), Shrew [14], and covert [15] attacks) and by comparing the FLoc results with those of other approaches (e.g., Pushback [5...Bit Rate (CBR) attack (Fig. 10 6(b)), and a Shrew attack (Fig. 6(c)) [6]. The aim of the high- population TCP attack is to reduce the bandwidth of...MTDs and are rate-limited accordingly. In the Shrew attack, each attack source sends 2.0 Mbps traffic only during 0.25RTT seconds within an interval of

  4. Therapeutic management of hereditary angioedema due to C1 inhibitor deficiency.

    PubMed

    Zanichelli, Andrea; Mansi, Marta; Periti, Giulia; Cicardi, Marco

    2013-05-01

    Hereditary angioedema (HAE) due to C1 inhibitor (C1-INH) deficiency is a rare genetic disease characterized by recurrent swellings of the subcutaneous and submucosal tissues that can manifest as cutaneous edema, abdominal pain and laryngeal edema with airway obstruction. These symptoms have a significant impact on patients' quality of life. The reduction in C1-INH function leads to uncontrolled activation of the contact system and generation of bradykinin, the mediator of increased vascular permeability and edema formation. In the past, few treatment options were available; however, several new therapies with proven efficacy have recently become available to treat and prevent HAE attacks, such as plasma-derived and recombinant C1-INHs that replace the deficient protein, bradykinin receptor antagonist (icatibant) that blocks bradykinin activity and kallikrein inhibitor (ecallantide) that prevents bradykinin release. Such therapies can improve disease outcome. This article reviews the therapeutic management of HAE, which involves the treatment of acute attacks and prophylaxis.

  5. Intra-Attack Vestibuloocular Reflex Changes in Ménière's Disease

    PubMed Central

    Finlay, John B.

    2016-01-01

    Ménière's attack has been shown to temporarily alter the vestibuloocular reflex (VOR). A patient with unilateral Ménière's disease was serially evaluated with the video Head Impulse Test during single, untreated episodes of acute vertigo. Spontaneous nystagmus activity was concurrently recorded in order to establish the three typical phases of Ménière's attack (irritative, paralytic, and recovery) and correlate them with VOR performance. The onset of attack was associated with a quick change in VOR gain on the side of the affected ear. While a rapidly progressive reduction of the VOR was evident at the paralytic nystagmus phase, in the recovery phase the VOR gain returned to normal and the direction of the previous nystagmus reversed. The membrane rupture potassium intoxication theory provides a good foundation with which to explain these dynamic VOR changes and the observed triphasic direction behavior of the spontaneous nystagmus. We additionally postulated that endolymphatic fluid displacement could have a synergic effect during the earliest phase of attack. PMID:28018691

  6. Vulnerability of impulse attack-free four random phase mask cryptosystems to chosen-plaintext attack

    NASA Astrophysics Data System (ADS)

    Li, Tuo; Shi, Yishi

    2016-03-01

    An attack-free four random phase mask cryptosystem is breached in the paper. The decryption key of the system can be easily accessed by the opponent by using a new type of powerful three-dimensional phase retrieval method. Our result, to the best of our knowledge, is the first work to show this security flaw in the attack-free four random phase mask cryptosystem. Meanwhile, a set of numerical simulations is provided to demonstrate the robustness of the presented method.

  7. Acute rheumatic fever in adults: case report together with an analysis of 25 patients with acute rheumatic fever.

    PubMed

    Kasitanon, Nuntana; Sukitawut, Waraporn; Louthrenoo, Worawit

    2009-07-01

    We reported the oldest acute rheumatic fever (ARF) patient with initial attack at the age of 90 years and experience with ARF in adults in 20 years of observation. The case files of all ARF patients treated by rheumatology unit, Chiang Mai University, were reviewed. Demographic data and clinical profile were recorded and compared between patients with initial attack and patients with recurrent attack. A total of 25 patients with ARF were included. There was no different incidence of arthritis and carditis between two groups. Initial attack patients have higher incidence of prolonged PR-interval (67 vs. 12%, P = 0.049) and longer duration of admission to diagnosis (5 vs. 2 days, P = 0.05). Thirty percent presented initial attack after 30 years of age. ARF is more common in adults than previously recognized. Therefore, clinicians should be aware of this condition and include it in their differential diagnosis of the febrile patients with arthritis.

  8. Optimal Attack Strategy in Random Scale-Free Networks Based on Incomplete Information

    NASA Astrophysics Data System (ADS)

    Li, Jun; Wu, Jun; Li, Yong; Deng, Hong-Zhong; Tan, Yue-Jin

    2011-06-01

    We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes. We investigate the optimal attack strategy in random scale-free networks both analytically and numerically. We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies. It is found that when the attack intensity is small, the attacker should attack more nodes in the “white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the “black area" in which we can not obtain attack information. Moreover, we show that there is an inflection point in the curve of optimal attack proportion. For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.

  9. Pycnogenol treatment of acute hemorrhoidal episodes.

    PubMed

    Belcaro, Gianni; Cesarone, Maria Rosaria; Errichi, Bruno; Di Renzo, Andrea; Grossi, Maria Giovanna; Ricci, Andrea; Dugall, Mark; Cornelli, Umberto; Cacchio, Marisa; Rohdewald, Peter

    2010-03-01

    We investigated the efficacy of orally and topically applied Pycnogenol for the management of acute hemorrhoidal attacks in a controlled, randomized study with 84 subjects. Within less than 48 h of onset of an acute attack, patients were enrolled and signs and symptoms were scored. This evaluation was repeated after seven days' treatment and again seven days following treatment cessation. The decrease in scores was significantly more pronounced in the Pycnogenol-treated groups than in the control group given placebo (p < 0.05), showing the efficacy of Pycnogenol for relieving signs and symptoms of acute external hemorrhoids. In a group of patients given topical (0.5%) Pycnogenol in addition to oral Pycnogenol the improvement in symptoms set in significantly faster and was more pronounced. The most prominent symptom, hemorrhoidal bleeding, was completely absent in all patients treated with Pycnogenol for seven days and also at the 14 days follow-up. In contrast, bleedings were still observed in the control group during the two weeks follow-up. This study indicates that Pycnogenol, both in oral and in topical form, is effective for controlling this common, disabling health problem. The application of Pycnogenol eases the management of acute hemorrhoidal attacks and help avoid bleedings.

  10. High Pain Tolerance Tied to 'Silent' Heart Attack Risk

    MedlinePlus

    ... 162666.html High Pain Tolerance Tied to 'Silent' Heart Attack Risk Unusual symptoms include upper back or jaw ... be at increased risk of having a "silent" heart attack, a new study hints. Chest pain is one ...

  11. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    NASA Astrophysics Data System (ADS)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  12. How Will I Recover from My Heart Attack?

    MedlinePlus

    ... Understand Your Risk for Congenital Heart Defects Symptoms & Diagnosis of Congenital Heart Defects Care & Treatment for Congenital Heart Defects Congenital Heart Defects Tools & Resources Heart Attack About Heart Attacks Warning Signs of a Heart ...

  13. 5 Ways Women Can Cut Their Heart Attack Risk

    MedlinePlus

    ... 163609.html 5 Ways Women Can Cut Their Heart Attack Risk Heart disease is leading cause of death ... than in men. Know the symptoms of a heart attack -- which differ from those in men -- and include ...

  14. Aspirin to Prevent a First Heart Attack or Stroke

    MedlinePlus

    ... NHLBI on Twitter. Aspirin to Prevent a First Heart Attack or Stroke Also known as aspirin primary prevention. ... if I’m taking aspirin to prevent another heart attack or stroke? The information discussed in Who may ...

  15. Calcium Buildup in Young Arteries May Signal Heart Attack Risk

    MedlinePlus

    ... html Calcium Buildup in Young Arteries May Signal Heart Attack Risk Even small amount in 30s, 40s appears ... their arteries are already at risk of a heart attack, a new study finds. Among those 32 to ...

  16. Calcium Supplements: A Risk Factor for Heart Attack?

    MedlinePlus

    ... that calcium supplements may increase the risk of heart attack. Is this true? Answers from Rekha Mankad, M. ... calcium supplements may increase your risk of a heart attack. Other doctors believe that calcium supplements have little ...

  17. Trans Fat Bans May Have Cut Heart Attack, Stroke Rate

    MedlinePlus

    ... 164605.html Trans Fat Bans May Have Cut Heart Attack, Stroke Rate Pending FDA regulations should remove nearly ... Could the contents of your cupcake affect your heart attack risk? It seems so, according to a new ...

  18. Prevention of Hereditary Angioedema Attacks with a Subcutaneous C1 Inhibitor.

    PubMed

    Longhurst, Hilary; Cicardi, Marco; Craig, Timothy; Bork, Konrad; Grattan, Clive; Baker, James; Li, Huamin H; Reshef, Avner; Bonner, James; Bernstein, Jonathan A; Anderson, John; Lumry, William R; Farkas, Henriette; Katelaris, Constance H; Sussman, Gordon L; Jacobs, Joshua; Riedl, Marc; Manning, Michael E; Hebert, Jacques; Keith, Paul K; Kivity, Shmuel; Neri, Sergio; Levy, Donald S; Baeza, Maria L; Nathan, Robert; Schwartz, Lawrence B; Caballero, Teresa; Yang, William; Crisan, Ioana; Hernandez, María D; Hussain, Iftikhar; Tarzi, Michael; Ritchie, Bruce; Králíčková, Pavlina; Guilarte, Mar; Rehman, Syed M; Banerji, Aleena; Gower, Richard G; Bensen-Kennedy, Debra; Edelman, Jonathan; Feuersenger, Henrike; Lawo, John-Philip; Machnig, Thomas; Pawaskar, Dipti; Pragst, Ingo; Zuraw, Bruce L

    2017-03-23

    .32 uses per month in the 60-IU group. Adverse events (most commonly mild and transient local site reactions) occurred in similar proportions of patients who received CSL830 and those who received placebo. Conclusions In patients with hereditary angioedema, the prophylactic use of a subcutaneous C1 inhibitor twice weekly significantly reduced the frequency of acute attacks. (Funded by CSL Behring; COMPACT EudraCT number, 2013-000916-10 , and ClinicalTrials.gov number, NCT01912456 .).

  19. Making MANET secured against malicious attack

    NASA Astrophysics Data System (ADS)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  20. Two fatal tiger attacks in zoos.

    PubMed

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  1. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  2. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    NASA Astrophysics Data System (ADS)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  3. Replication Does Survive Information Warfare Attacks

    DTIC Science & Technology

    1997-01-01

    warfare, storage jamming, unauthorized modification, Trojan horse 1 INTRODUCTION Ammann, Jajodia, McCollum, and Blaustein define information warfare as the...information warfare, and we adopt the latter term. To provide context, Amman et al. specifically do not consider Trojan horses within the database system...called internal jammers (McDermott and Goldschalg, 1996b)), but instead consider a wide range of attacks other than Trojan horses . Both groups agree that

  4. Fighting Through a Logistics Cyber Attack

    DTIC Science & Technology

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...of operations required to support the war fighter and its heavy reliance on unclassified networks. This research focuses on The Global Air...documents to investigate the policies in place that provide guidance for the strategies and tactics, techniques and procedures (TTPs) that counter

  5. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  6. Computer Network Attack: An Operational Tool?

    DTIC Science & Technology

    2007-11-02

    Spectrum of Conflict, Cyber Warfare , Preemptive Strike, Effects Based Targeting. 15. Abstract: Computer Network Attack (CNA) is defined as...great deal of attention as the world’s capabilities in cyber - warfare grow. 11 Although addressing the wide ranging legal aspects of CNA is beyond the...the notion of cyber - warfare has not yet developed to the point that international norms have been established.15 These norms will be developed in

  7. America under attack: ACHE affiliates respond.

    PubMed

    Lanser, Ellen G

    2002-01-01

    In the midst of the horror and uncertainty that swept over America on September 11, the healthcare sector helped to keep our nation firmly anchored. Within moments of the terrorist attacks, healthcare organizations in New York, Washington, D.C., and the surrounding areas responded swiftly, calmly, and effectively. Many of these hospitals are led by ACHE affiliates. Following are their accounts of that day, lessons they learned, and plans for the future.

  8. Strategic Attack of National Electrical Systems

    DTIC Science & Technology

    1994-10-01

    subsystem the step-up transformers are the most lu­ crative targets. According to a study by the Office of Technology Assessment (OTA), the step-up...the Army Air Forces, to analyze the dete­ rioration of the German economy through bombing and determine the “date when deterioration will have...German economy , and steel production essential to war production, these industries would only be slightly affected by an attack on power facilities

  9. Enhancing network robustness against malicious attacks.

    PubMed

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider et al., Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (R(n)), we propose a link-robustness index (R(l)). We show that solely enhancing R(n) cannot guarantee the improvement of R(l). Moreover, the structure of an R(l)-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the R(n) and R(l) into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  10. Enhancing network robustness against malicious attacks

    NASA Astrophysics Data System (ADS)

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider , Proc. Natl. Acad. Sci. USAPNASA60027-842410.1073/pnas.1009440108 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (Rn), we propose a link-robustness index (Rl). We show that solely enhancing Rn cannot guarantee the improvement of Rl. Moreover, the structure of an Rl-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the Rn and Rl into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  11. Security of quantum cryptography against individual attacks

    NASA Astrophysics Data System (ADS)

    Slutsky, Boris A.; Rao, Ramesh; Sun, Pang-Chen; Fainman, Y.

    1998-04-01

    An attempt to eavesdrop on a quantum cryptographic channel reveals itself through errors it inevitably introduces into the transmission. We investigate the relationship between the induced error rate and the maximum amount of information the eavesdropper can extract, in both the two-state B92 [B92 refers to the work of C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992)] and the four-state BB84 [BB84 refers to the work of C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175-179] quantum cryptographic protocols. In each case, the optimal eavesdropping method that on average yields the most information for a given error rate is explicitly constructed. Analysis is limited to eavesdropping strategies where each bit of the quantum transmission is attacked individually and independently from other bits. Subject to this restriction, however, we believe that all attacks not forbidden by physical laws are covered. Unlike previous work, the eavesdropper's advantage is measured in terms of Renyi (rather than Shannon) information, and with respect only to bits received error-free by Bob (rather than all bits). This alters both the maximum extractable information and the optimal eavesdropping attack. The result can be used directly at the privacy amplification stage of the protocol to accomplish secure communication over a noisy channel.

  12. Major dog attack injuries in children.

    PubMed

    Wiseman, N E; Chochinov, H; Fraser, V

    1983-10-01

    Children are frequently admitted to a hospital with injuries sustained as a result of being attacked by a dog. Over a 5-year period (1977 to 1981), 57 such patients have been treated at the Winnipeg Children's Hospital. Half of the dog attack victims were 5 years or younger with injuries occurring more often in boys (55%). The majority of patients (95%) sustained puncture wounds and lacerations to the face (77%) and extremities (23%). In three of the cases, the dog attack victims presented with peritonitis secondary to bowel perforation and were treated successfully. A fourth child died as a result of his injuries prior to reaching the hospital. In the past, much attention has been focused on soft tissue injuries and their cosmetic repair. It is also important to recognize that the small child is particularly vulnerable to dog maulings from which the injuries sustained may be life threatening or lethal. Prevention seems to be the only rational approach to solving this problem.

  13. A Rare Cause of Recurrent Acute Pancreatitis in a Child: Isovaleric Acidemia with Novel Mutation

    PubMed Central

    Sag, Elif; Cebi, Alper Han; Kaya, Gulay; Karaguzel, Gulay

    2017-01-01

    Recurrent acute pancreatic attacks is a rare clinical condition (2-5% of all acute pancreatis) in children and is mainly idiopathic in most cases. Sometimes it may be associated with congenital anomalies, metabolic diseases or hereditary conditions. Isovaleric acidemia (IVA) is a rare autosomal recessive amino acid metabolism disorder associated with isovaleryl coenzyme A dehydrogenase deficiency presenting the clinical findings such metabolic acidosis with increased anion gap, hyperammonemia, ketonemia, hypoglycemia, “the odor of sweaty feet,” abdominal pain, vomiting, feeding intolerance, shock and coma. Recurrent acute pancreatitis associated with IVA have been rarely reported. Herein; we report a child who admitted with recurrent acute pancreatic attacks and had the final diagnosis of IVA. Mutation analysis revealed a novel homozygous mutation of (p.E117K [c.349G>A]) in the IVA gene. Organic acidemias must kept in mind in the differential diagnosis of recurrent acute pancreatic attacks in children.

  14. Finasteride use and acute pancreatitis in Taiwan.

    PubMed

    Lai, Shih-Wei; Lai, Hsueh-Chou; Lin, Cheng-Li; Liao, Kuan-Fu

    2015-06-01

    The aim of this study was to examine whether there is an association between finasteride use and the risk of acute pancreatitis. This population-based case-control study used the database of the Taiwan National Health Insurance Program. There were 2,530 male subjects aged 40-84 years with a first-attack of acute pancreatitis during the period of 1998-2011 as the case group and 10,119 randomly selected subjects without acute pancreatitis as the control group. Both groups were matched by age and index year of diagnosing acute pancreatitis. Subjects who never had finasteride prescription were defined as "never use." Subjects who at least received 1 prescription for finasteride before the date of diagnosing acute pancreatitis were defined as "ever use." The association of acute pancreatitis with finasteride use was examined by the odds ratio (OR) and 95% confidence interval (CI) using the multivariable unconditional logistic regression model. The crude OR of acute pancreatitis was 1.78 (95%CI 1.33, 2.39) for subjects with ever use of finasteride, when compared with subjects with never use of finasteride. After adjusting for potential confounders, the adjusted OR of acute pancreatitis decreased to 1.25 (95%CI 0.90, 1.73) for subjects with ever use of finasteride, but no statistical significance was seen. No association can be detected between finasteride use and the risk of acute pancreatitis.

  15. What Can We Learn?--The Algonquin Bear Attack.

    ERIC Educational Resources Information Center

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  16. Early Warning and Prediction of Interest Attacks and Exploits

    DTIC Science & Technology

    2005-09-01

    EARLY WARNING AND PREDICTION OF INTERNET ATTACKS AND EXPLOITS THESIS Brian P. Zeitz... EARLY WARNING AND PREDICTION OF INTERNET ATTACKS AND EXPLOITS THESIS Presented to the Faculty Department of Electrical and Computer...RELEASE; DISTRIBUTION UNLIMITED iv AFIT/GIA/ENG/05-06 EARLY WARNING AND PREDICTION OF INTERNET ATTACKS AND EXPLOITS

  17. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  18. Attack or retreat: contrasted defensive tactics used by Cyprian honeybee colonies under attack from hornets.

    PubMed

    Papachristoforou, Alexandros; Rortais, Agnès; Sueur, Jérôme; Arnold, Gérard

    2011-02-01

    This study describes the tactics used by Cyprian honeybees (Apis mellifera cypria) to defend their colonies against hornet (Vespa orientalis orientalis) attacks. We use simulated hornet attacks and a combination of video recordings and image analysis to reveal, for the first time, contrasted intra-subspecies defensive tactics that operate at the colony level during predation. In some colonies, when attacked, the numbers of guards at the hive entrance increases rapidly to attack, engulf, and kill invading hornets. In other colonies, guards avoid conflicts with hornets by retreating gradually and by forming a defensive line of honeybees at the hive entrance. Retreater colonies have propolis walls at the hive entrances with small apertures that are too narrow to allow the hornet to access the hive and that therefore reinforces entrance protection. On the contrary, attacker colonies have propolis walls with large openings through which the hornet can pass; these bees block the hornet's access by intensively guarding the hive entrance. We experimentally destroy propolis walls to test whether colonies consistently rebuild walls with the same intrinsic characteristics and we also monitor the survival rate of each anti-predator tactic after massive natural predation by hornets.

  19. Real Time Recognition of Heart Attack in a Smart Phone

    PubMed Central

    Rad, Mahshid Zomorodi; Ghuchani, Saeed Rahati; Bahaadinbeigy, Kambiz; Khalilzadeh, Mohammad Mahdi

    2015-01-01

    Background: In many countries, including our own, cardiovascular disease is the most common cause of mortality and morbidity. Myocardial infarction (heart attack) is of particular importance in heart disease as well as time and type of reaction to acute myocardial infarction and these can be a determining factor in patients’ outcome. Methods: In order to reduce physician attendance time and keep patients informed about their condition, the smart phone as a common communication device has been used to process data and determine patients’ ECG signals. For ECG signal analysis, we used time domain methods for extracting the ST-segment as the most important feature of the signal to detect myocardial infarction and the thresholding methods and linear classifiers by LabVIEW Mobile Module were used to determine signal risk. Results: The sensitivity and specificity as criteria to evaluate the algorithm were 98% and 93.3% respectively in real time. Conclusions: This algorithm, because of the low computational load and high speed, makes it possible to run in a smart phone. Using Bluetooth to send the data from a portable monitoring system to a smart phone facilitates the real time applications. By using this program on the patient’s mobile, timely detection of infarction so to inform patients is possible and mobile services such as SMS and calling for a physician’s consultation can be done. PMID:26236081

  20. Minor Stroke and Transient Ischemic Attack: Research and Practice

    PubMed Central

    Yakhkind, Aleksandra; McTaggart, Ryan A.; Jayaraman, Mahesh V.; Siket, Matthew S.; Silver, Brian; Yaghi, Shadi

    2016-01-01

    A majority of patients with ischemic stroke present with mild deficits for which aggressive management is not often pursued. Comprehensive work-up and appropriate intervention for minor strokes and transient ischemic attacks (TIAs) point toward better patient outcomes, lower costs, and fewer cases of disability. Imaging is a key modality to guide treatment and predict stroke recurrence. Patients with large vessel occlusions have been found to suffer worse outcomes and could benefit from intervention. Whether intravenous thrombolytic therapy decreases disability in minor stroke patients and whether acute endovascular intervention improves functional outcomes in patients with minor stroke and known large vessel occlusion remain controversial. Studies are ongoing to determine ideal antiplatelet therapy for stroke and TIA, while ongoing statin therapy, surgical management for patients with carotid stenosis, and anticoagulation for patients with atrial fibrillation have all been proven to decrease the rate of stroke recurrence and improve outcomes. This review summarizes the current evidence and discusses the standard of care for patients with minor stroke and TIA. PMID:27375548

  1. Usefulness of chest radiographs in first asthma attacks

    SciTech Connect

    Gershel, J.C.; Goldman, H.S.; Stein, R.E.K.; Shelov, S.P.; Ziprkowski, M.

    1983-08-11

    To assess the value of routine chest radiography during acute first attacks of asthma, we studied 371 consecutive children over one year of age who presented with an initial episode of wheezing. Three hundred fifty children (94.3%) had radiographic findings that were compatible with uncomplicated asthma and were considered negative. Twenty-one (5.7%) had positive findings: atelectasis and pneumonia were noted in seven, segmental atelectasis in six, pneumonia in five, multiple areas of subsegmental atelectasis in two, and pneumomediastinum in one. The patients with positive films were more likely to have a respiratory rate above 60 or a pulse rate above 160 (P < 0.001), localized rales or localized decreased breath sounds before treatment (P < 0.01), and localized rales (P < 0.005) and localized wheezing (P < 0.02) after treatment; also, these patients were admitted to the hospital more often (P < 0.001). Ninety-five percent (20 of 21) of the children with positive films could be identified before treatment on the basis of a combination of tachypnea, tachycardia, fever, and localized rales or localized decreased breath sounds. Most first-time wheezers will not have positive radiographs; careful clinical evaluation should reveal which patients will have abnormal radiographs and will therefore benefit from the procedure. 20 references, 3 tables.

  2. Self-administered C1 esterase inhibitor concentrates for the management of hereditary angioedema: usability and patient acceptance

    PubMed Central

    Li, Huamin Henry

    2016-01-01

    Hereditary angioedema (HAE) is a rare genetic disease characterized by episodic subcutaneous or submucosal swelling. The primary cause for the most common form of HAE is a deficiency in functional C1 esterase inhibitor (C1-INH). The swelling caused by HAE can be painful, disfiguring, and life-threatening. It reduces daily function and compromises the quality of life of affected individuals and their caregivers. Among different treatment strategies, replacement with C1-INH concentrates is employed for on-demand treatment of acute attacks and long-term prophylaxis. Three human plasma-derived C1-INH preparations are approved for HAE treatment in the US, the European Union, or both regions: Cinryze®, Berinert®, and Cetor®; however, only Cinryze is approved for long-term prophylaxis. Postmarketing studies have shown that home therapy (self-administered or administered by a caregiver) is a convenient and safe option preferred by many HAE patients. In this review, we summarize the role of self-administered plasma-derived C1-INH concentrate therapy with Cinryze at home in the prophylaxis of HAE. PMID:27660422

  3. Serum MicroRNA Signatures in Migraineurs During Attacks and in Pain-Free Periods.

    PubMed

    Andersen, Hjalte H; Duroux, Meg; Gazerani, Parisa

    2016-04-01

    MicroRNAs have emerged as important biomarkers and modulators of pathophysiological processes including oncogenesis and neurodegeneration. MicroRNAs are found to be involved in the generation and maintenance of pain in animal models of inflammation and neuropathic pain. Recently, microRNA dysregulation has been reported in patients with painful conditions such as complex regional pain syndrome and fibromyalgia. The aim of this study was to assess whether serum microRNA alterations occur during migraine attacks and whether migraine manifests in chronic serum microRNA aberrations. Two cohorts of 24 migraineurs, and age- and sex-matched healthy controls were included. High-content serum microRNA (miRNA) arrays were used to assess the serum microRNA profiles of migraineurs during attacks and pain-free periods in comparison with healthy controls. Of the 372 assessed microRNAs, 32 or ≈ 8% were found to be differentially expressed and 4 of these--miR-34a-5p, 29c-5p, -382-5p, and -26b-3p--were selected for further investigation. Migraine attacks were associated with an acute upregulation in miR-34a-5p and miR-382-5p expression. Interestingly, miR-382-5p not only exhibited an upregulation during attack but also proved to be a biomarker for migraine when comparing migraineurs in pain-free periods to the healthy control group (p = <0.01). In conclusion, migraine manifestation is reflected in serum miRNA aberrations, both during attacks and pain-free periods. This finding sheds light on the potential role of microRNAs in the pathophysiology of migraine and adds a new approach towards potential identification of much sought-after serum biomarkers of migraine.

  4. Emergency Mental Health Services for Children After the Terrorist Attacks of September 11, 2001.

    PubMed

    Bruckner, Tim A; Kim, Yonsu; Lubens, Pauline; Singh, Amrita; Snowden, Lonnie; Chakravarthy, Bharath

    2016-01-01

    Much literature documents elevated psychiatric symptoms among adults after the terrorist attacks of September 11, 2001 (9/11). We, however, know of no research in children that examines emergency mental health services following 9/11. We test whether children's emergency services for crisis mental health care rose above expected values in September 2001. We applied time-series methods to California Medicaid claims (1999-2003; N = 127,200 visits). Findings in California indicate an 8.7% increase of children's emergency mental health visits statistically attributable to 9/11. Non-Hispanic white more than African American children account for this acute rise in emergency services.

  5. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    PubMed

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  6. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    PubMed Central

    Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature. PMID:24959606

  7. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  8. Is it easy to clinically distinguish inflammatory arthritis of bacterial origin from monoarthritis attacks of gout disease?

    PubMed

    Atik, O Şahap; Ergişi, Yılmaz; Ayanoğlu, Tacettin; Tokgöz, Mehmet Ali; Sezgin, Erdem Aras; Göçün, Pınar Uyar

    2016-12-01

    Acute monoarthritis is a common situation in orthopedic emergency where the patient presents with typical inflamed joint. It is hard to clinically distinguish inflammatory arthritis of bacterial origin from monoarthritis attacks of gout disease. If these two situations, which are the most common causes of acute monoarthritis, are misdiagnosed, outcomes might be catastrophic and costly. Synovial fluid analysis is the most reliable method for confirming the diagnosis although it might not always lead to definitive diagnosis. If there is clinical suspicion for crystal arthropathy, repeated examinations may provide benefits for confirming the diagnosis.

  9. Understanding How They Attack Your Weaknesses: CAPEC

    DTIC Science & Technology

    2011-05-01

    exploits ■ Capture the attacker’s perspective to aid software developers, acquirers and operators in improving the assurance profile of their software...development and secure operations The HS SEDI FFRDC is managed and operated by The MITRE Corporation for DHS. 5 Common Attack Pattern Enumeration and...patterns into an integrated enumeration that can be i l d ff i l l d b h icons stent y an e ect ve y everage y t e commun ty – Gives you an attacker’s

  10. Decision Support for Attack Submarine Commanders.

    DTIC Science & Technology

    1980-10-01

    AD-AO95 892 DECISION SCIENCE CONSORTIUM INC FALLS CHURCH VA F./e 12/2 DECISION SUPPORT FOR ATTACK SUBMARINE COMMANDERS. (U) OCT 80 M S COHEN, R V...BROWN N00014-80-C-0046 UNCLASSIFIED TR-8S-11 ML DECISIN IEN$CE CUIVSURTiUM, MrC. DECISION SUPPORT FOR A TTA CK SUBMARINE COMMANDERS Marvin S . Cohen and...on reverse) DDI ,o..ŕ 1473 EDITION OF I NOV 65 IS OISOLCTZ Unclassified S /N 0102-014-6601 1 SECURITY CLASIFICATION OF TNIS PAGE (10bon DW& tateo* 01

  11. Profiler-2000: Attacking the Insider Threat

    DTIC Science & Technology

    2005-09-01

    s/ JOSEPH CAMERA, Chief Information & Intelligence Exploitation Division Information Directorate REPORT...Approaches to undermining anomaly detectors………………………………9 3.3 Detection coverage of an anomaly detector………………………………….10 3.4 Deploying Exploits and Sensors...13 3.5 Where and how an attack manifests in the data……………………………...13 3.6 Manipulating the manifestation; modifying exploits

  12. Cyber Attack! Crime or Act of War?

    DTIC Science & Technology

    2011-04-13

    all of the other domains. A plans officer pointed out that if we used this scheme of defense in land warfare, an ― invasion of New Jersey would have...Tonkin (1965) or the 9/11 attacks (2001). Most do not require it as the facts on the ground make the action obvious such as Iraq‘s invasion of Kuwait...1990), Japan‘s bombing of Pearl Harbor (1941), and the North Korean invasion of South Korea (1950). Regardless if there is a formal investigation or

  13. Bobcat attack on a cottontail rabbit

    USGS Publications Warehouse

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  14. Acute Scrotum Caused by Hernia Sac Torsion.

    PubMed

    Fukui, Shinji; Aoki, Katsuya; Shimada, Keiji; Samma, Shoji

    2016-03-01

    A 9-year-old boy was referred to us with an acute pain attack of the left scrotal contents. Ultrasonography showed a normal blood supply to the left testis, suggesting an incarcerated left inguinal hernia. Surgical exploration did not demonstrate an incarcerated left inguinal hernia. After exploration of the left testis, a dark red pedunculated cystic mass, separate from the left testis, was found to be twisted. Immunohistochemical studies of the excised cyst demonstrated torsion of the hernia sac of the peritoneum. In conclusion, we encountered a case of acute scrotum which was probably caused by torsion of the hernia sac.

  15. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    SciTech Connect

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely

  16. The significance of urinary beta-2 microglobulin level for differential diagnosis of familial Mediterranean fever and acute appendicitis.

    PubMed

    Ugan, Yunus; Korkmaz, Hakan; Dogru, Atalay; Koca, Yavuz Savas; Balkarlı, Ayse; Aylak, Firdevs; Tunc, Sevket Ercan

    2016-07-01

    The clinical and laboratory parameters widely used are not specific to discriminate the abdominal pain due to FMF attack from that of acute appendicitis. The present study aims to investigate the urinary beta-2 microglobulin (U-β2M) level as a potential parameter to identify these two diseases mimicking each other. A total of 51 patients with established FMF diagnosis due to Tel Hashomer criteria on colchicine treatment (1-1.5 mg/day), 15 patients with acute appendicitis who had appropriate clinical picture and were also supported pathologically after the surgery, and 20 healthy controls were enrolled in the study. Of the 51 patients with FMF, 25 were at an attack period, while remaining 26 were not. For the diagnosis of acute attack, as well as physical examination, laboratory tests including white blood cell count, C-reactive protein, and erythrocyte sedimentation rate were performed. From urine specimens U-β2M, microalbumin, and N-acetyl glucosaminidase (U-NAG) were measured. U-β2M levels were significantly higher in acute appendicitis group compared to FMF attack, FMF non-attack, and control groups (p < 0.001, p < 0.001, and p < 0.001, respectively). U-NAG and microalbuminuria were significantly higher in acute appendicitis, FMF attack, and FMF non-attack groups compared to controls (U-NAG p < 0.001, p = 0.016, p = 0.004, microalbuminuria p < 0.001, p < 0.001, p < 0.001, respectively). Microalbuminuria was significantly higher in acute appendicitis group compared to the FMF attack group (p = 0.004). Determination of U-β2M levels may be helpful for differential diagnosis of peritonitis attacks of FMF patients on colchicine treatment and acute appendicitis. However, this finding should be substantiated with other studies.

  17. Sleep bruxism possibly triggered by multiple sclerosis attacks and treated successfully with botulinum toxin: Report of three cases.

    PubMed

    Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit

    2015-09-01

    Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack.

  18. Acute Pancreatitis and Pregnancy

    MedlinePlus

    ... Pancreatitis Acute Pancreatitis and Pregnancy Acute Pancreatitis and Pregnancy Timothy Gardner, MD Acute pancreatitis is defined as ... pancreatitis in pregnancy. Reasons for Acute Pancreatitis and Pregnancy While acute pancreatitis is responsible for almost 1 ...

  19. Challenges in the successful management of a case of acute intermittent porphyria in India.

    PubMed

    Patell, Rushad; Dosi, Rupal; Joshi, Harsh; Shah, Purav; Tripathi, Rishi

    2016-07-01

    Acute intermittent porphyria (AIP) is a rare metabolic disease involving a defect in haem biosynthesis resulting in the accumulation and excessive secretion of porphyrins and its precursors. Acute attacks present with episodes of severe abdominal pain, nausea, confusion and severe life-threatening seizures. A high index of suspicion is required for the initial diagnosis of AIP.

  20. Marine microalgae attack and feed on metazoans

    PubMed Central

    Berge, Terje; Poulsen, Louise K; Moldrup, Morten; Daugbjerg, Niels; Juel Hansen, Per

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to form massive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a density-dependent manner and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15 min) and caused by attacks of swarming cells, likely through the transfer and action of a highly potent but uncharacterised neurotoxin. The copepods grazed and reproduced on a diet of K. armiger at densities below 1000, cells ml−1, but above 3500 cells ml−1 the mixotrophic dinoflagellates immobilised, fed on and killed the copepods. Switching the trophic role of the microalgae from prey to predator of copepods couples population growth to reduced grazing pressure, promoting the persistence of blooms at high densities. K. armiger also fed on three other metazoan organisms offered, suggesting that active predation by mixotrophic dinoflagellates may be directly involved in causing mortalities at several trophic levels in the marine food web. PMID:22513533

  1. Marine microalgae attack and feed on metazoans.

    PubMed

    Berge, Terje; Poulsen, Louise K; Moldrup, Morten; Daugbjerg, Niels; Juel Hansen, Per

    2012-10-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to form massive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a density-dependent manner and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15 min) and caused by attacks of swarming cells, likely through the transfer and action of a highly potent but uncharacterised neurotoxin. The copepods grazed and reproduced on a diet of K. armiger at densities below 1000, cells ml(-1), but above 3500 cells ml(-1) the mixotrophic dinoflagellates immobilised, fed on and killed the copepods. Switching the trophic role of the microalgae from prey to predator of copepods couples population growth to reduced grazing pressure, promoting the persistence of blooms at high densities. K. armiger also fed on three other metazoan organisms offered, suggesting that active predation by mixotrophic dinoflagellates may be directly involved in causing mortalities at several trophic levels in the marine food web.

  2. Error and attack tolerance of complex networks

    NASA Astrophysics Data System (ADS)

    Albert, Réka; Jeong, Hawoong; Barabási, Albert-László

    2000-07-01

    Many complex systems display a surprising degree of tolerance against errors. For example, relatively simple organisms grow, persist and reproduce despite drastic pharmaceutical or environmental interventions, an error tolerance attributed to the robustness of the underlying metabolic network. Complex communication networks display a surprising degree of robustness: although key components regularly malfunction, local failures rarely lead to the loss of the global information-carrying ability of the network. The stability of these and other complex systems is often attributed to the redundant wiring of the functional web defined by the systems' components. Here we demonstrate that error tolerance is not shared by all redundant systems: it is displayed only by a class of inhomogeneously wired networks, called scale-free networks, which include the World-Wide Web, the Internet, social networks and cells. We find that such networks display an unexpected degree of robustness, the ability of their nodes to communicate being unaffected even by unrealistically high failure rates. However, error tolerance comes at a high price in that these networks are extremely vulnerable to attacks (that is, to the selection and removal of a few nodes that play a vital role in maintaining the network's connectivity). Such error tolerance and attack vulnerability are generic properties of communication networks.

  3. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  4. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  5. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    SciTech Connect

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh; Halappanavar, Mahantesh

    2016-07-16

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  6. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  7. [Acute asthmatic crisis in children].

    PubMed

    Dubus, J C; Bodiou, A C; Buttin, C; Jouglet, T; Stremler, N; Mély, L

    2000-03-01

    Acute asthma attack in children is an attack responsible for life-threatening acute respiratory distress with partial or no response to bronchodilator drugs. The severity of the episode needs to be quickly evaluated. This presupposes a perfect knowledge of the clinical signs of severity. Treatment is urgent and first based on the administration of high doses of inhaled short-acting beta 2-agonists. In the more obstructed children, anti-cholinergic drugs can be added to nebulized beta 2-agonists. Because of their delayed effect, systemic steroids require an early prescription. Symptomatic treatments are: urgent hospitalization, oxygen if needed, proper hydratation. Continuous nebulization or intravenous perfusion of beta 2-agonists are prescribed with cardiac monitoring when no objective improvement is noted. Admission into the pediatric intensive care unit when bronchial obstruction continues will permit the association of bronchodilator drugs and the proposal of mechanical ventilation if needed. When the episode is resolved, a prophylactic treatment using inhaled corticosteroids must be prescribed. Clinical and spirometric follow-up has to be organized, and the patient and his/her family have to be educated.

  8. [Acute pancreatitis].

    PubMed

    Hecker, M; Mayer, K; Askevold, I; Collet, P; Weigand, M A; Krombach, G A; Padberg, W; Hecker, A

    2014-03-01

    Acute pancreatitis is a potentially fatal disease with individually differing expression of systemic involvement. For this reason early diagnosis with subsequent risk stratification is essential in the clinical management of this frequent gastroenterological disorder. Severe forms of acute pancreatitis occur in approximately 20 % of cases often requiring intensive care monitoring and interdisciplinary therapeutic approaches. In the acute phase adequate fluid replacement and sufficient analgesic therapy is of major therapeutic importance. Concerning the administration of antibiotics and the nutritional support of patients with acute pancreatitis a change in paradigms could be observed in recent years. Furthermore, endoscopic, radiological or surgical interventions can be necessary depending on the severity of the disease and potential complications.

  9. Bronchitis - acute

    MedlinePlus

    ... to breathe. Other symptoms of bronchitis are a cough and coughing up mucus. Acute means the symptoms ... diagnosed with chronic bronchitis, you must have a cough with mucus on most days for at least ...

  10. Acute Bronchitis

    MedlinePlus

    ... bronchitis? Acute bronchitis is inflammation of your bronchial tree. The bronchial tree consists of tubes that carry air into your ... weeks or months. This happens because the bronchial tree takes a while to heal. A lasting cough ...

  11. Panic attack triggering myocardial ischemia documented by myocardial perfusion imaging study. A case report

    PubMed Central

    2012-01-01

    Background Chest pain, a key element in the investigation of coronary artery disease is often regarded as a benign prognosis when present in panic attacks. However, panic disorder has been suggested as an independent risk factor for long-term prognosis of cardiovascular diseases and a trigger of acute myocardial infarction. Objective Faced with the extreme importance in differentiate from ischemic to non-ischemic chest pain, we report a case of panic attack induced by inhalation of 35% carbon dioxide triggering myocardial ischemia, documented by myocardial perfusion imaging study. Discussion Panic attack is undoubtedly a strong component of mental stress. Patients with coronary artery disease may present myocardial ischemia in mental stress response by two ways: an increase in coronary vasomotor tone or a sympathetic hyperactivity leading to a rise in myocardial oxygen consumption. Coronary artery spasm was presumed to be present in cases of cardiac ischemia linked to panic disorder. Possibly the carbon dioxide challenge test could trigger myocardial ischemia by the same mechanisms. Conclusion The use of mental stress has been suggested as an alternative method for myocardial ischemia investigation. Based on translational medicine objectives the use of CO2 challenge followed by Sestamibi SPECT could be a useful method to allow improved application of research-based knowledge to the medical field, specifically at the interface of PD and cardiovascular disease. PMID:22999016

  12. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  13. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  14. Identification of cooling tower wood attack and methods of control

    SciTech Connect

    Song, P.; Trulear, M.G.

    1986-01-01

    Biological and chemical attack can greatly accelerate the deterioration of cooling tower wood. The damage, once inflicted, is irreversible and often results in premature and costly wood replacement. Biological attack is more serious than chemical, and is difficult to detect. Control of both types is essential for good tower maintenance A review of wood structures, types of attack and methods of control are presented. Effects of alkaline cooling water operation on wood deterioration are also discussed.

  15. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  16. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  17. On Cybersecurity, Crowdsourcing, and Social Cyber-Attack

    DTIC Science & Technology

    2013-01-01

    reaching hordes of interested mischief makers who are comfortably anonymous and hard to track. Social cyber -attack as a means to bully and trick...ON CYBERSECURITY, CROWDSOURCING, AND SOCIAL CYBER -ATTACK By Rebecca Goolsby, Ph.D., Office of Naval Research Civil unrest and social media have...must take into account the growing potential for cyber -attack using social media, where hoax messages are incorporated into a stream of otherwise

  18. ATTACK WARNING: Better Management Required to Resolve NORAD Integration Deficiencies

    DTIC Science & Technology

    1989-07-01

    WAHNGO D.C.9’𔄃- 2030-710 Accession Number: 1923 Publication Date: Jul 07, 1989 Title: Attack Warning : Better Management Required to Resolve NORAD...Office, GAO, Washington, DC 20548 Report Number: GAO/IMTEC-89- 26 Descriptors, Keywords: Surveillance Warning Communication Attack Methodology Evaluation...Integrated Tactical Warning and Attack Assessment System’s data processing and communications capabilities. Our review focused on the Air Force’s

  19. Non-harmful insertion of data mimicking computer network attacks

    DOEpatents

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  20. The effect of resveratrol on the recurrent attacks of gouty arthritis.

    PubMed

    Chen, Haiyan; Zheng, Shucong; Wang, Yuankai; Zhu, Huiqing; Liu, Qiong; Xue, Yu; Qiu, Jianhua; Zou, Hejian; Zhu, Xiaoxia

    2016-05-01

    Gouty arthritis is characterized by inflammation induced by monosodium urate (MSU) crystal deposition, which is resulted by an increase of serum urate concentration. The management of gout, especially the recurrent acute attacks of chronic gouty arthritis, is still a problem to be resolved. In this study, we aimed to develop the preventive and therapeutic effect of resveratrol on gouty arthritis. MSU was used to induce gouty arthritis in the foot pad of C57BL/6 mice. Yeast polysaccharide and potassium oxonate were used to induce hyperuricemia in Kunming mice. Resveratrol was intraperitoneal injected to the mice in the treatment group. The pad inflammation and the level of serum uric acid were investigated to estimate the effect of resveratrol in gouty arthritis. Hyperuricemia was significantly detected in the mice treated with yeast polysaccharide and potassium oxonate, and gouty arthritis was successfully induced with MSU in mice. We further identified that resveratrol inhibited pad swelling and pad 99mTc uptake in gouty mice. Moreover, serum uric acid level was also decreased by resveratrol in hyperuricemia mice. This study highlighted that resveratrol might be applied to prevent the recurrent acute attack of gouty arthritis because of its inhibition of articular inflammation and down-regulation of serum uric acid.

  1. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  2. Orthostatic panic attacks among Vietnamese refugees.

    PubMed

    Hinton, Devon E; Hinton, Ladson; Tran, Minh; Nguyen, Men; Nguyen, Lim; Hsia, Curtis; Pollack, Mark H

    2007-12-01

    Viewed historically and cross-culturally, orthostatic-induced dizziness, i.e., dizziness caused by standing up from a sitting or a lying position, forms a key aspect of many syndromes: irritable heart (American Civil War), effort syndrome (World War I and World War II), chronic fatigue syndrome (contemporary USA), Gulf War syndrome (contemporary USA), and orthostatic dysregulation (contemporary Japan). Among Vietnamese refugees attending a psychiatric clinic, this study documents a high rate of orthostatic panic (OP), as well as certain processes seemingly generating these panic attacks, viz., flashbacks and culturally specific catastrophic cognitions. Case examples are used to demonstrate OP's phenomenology and relevance to clinical care. To illustrate the mechanisms producing OP, we adduce the multiplex model of panic generation. Culturally appropriate care of Vietnamese refugees should include assessment and treatment of OP.

  3. Detecting Cyber Attacks On Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  4. Inorganic nanoparticles engineered to attack bacteria.

    PubMed

    Miller, Kristen P; Wang, Lei; Benicewicz, Brian C; Decho, Alan W

    2015-11-07

    Antibiotics were once the golden bullet to constrain infectious bacteria. However, the rapid and continuing emergence of antibiotic resistance (AR) among infectious microbial pathogens has questioned the future utility of antibiotics. This dilemma has recently fueled the marriage of the disparate fields of nanochemistry and antibiotics. Nanoparticles and other types of nanomaterials have been extensively developed for drug delivery to eukaryotic cells. However, bacteria have very different cellular architectures than eukaryotic cells. This review addresses the chemistry of nanoparticle-based antibiotic carriers, and how their technical capabilities are now being re-engineered to attack, kill, but also non-lethally manipulate the physiologies of bacteria. This review also discusses the surface functionalization of inorganic nanoparticles with small ligand molecules, polymers, and charged moieties to achieve drug loading and controllable release.

  5. Resveratrol products resulting by free radical attack

    NASA Astrophysics Data System (ADS)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  6. Emergency response to an anthrax attack

    PubMed Central

    Wein, Lawrence M.; Craft, David L.; Kaplan, Edward H.

    2003-01-01

    We developed a mathematical model to compare various emergency responses in the event of an airborne anthrax attack. The system consists of an atmospheric dispersion model, an age-dependent dose–response model, a disease progression model, and a set of spatially distributed two-stage queueing systems consisting of antibiotic distribution and hospital care. Our results underscore the need for the extremely aggressive and timely use of oral antibiotics by all asymptomatics in the exposure region, distributed either preattack or by nonprofessionals postattack, and the creation of surge capacity for supportive hospital care via expanded training of nonemergency care workers at the local level and the use of federal and military resources and nationwide medical volunteers. The use of prioritization (based on disease stage and/or age) at both queues, and the development and deployment of modestly rapid and sensitive biosensors, while helpful, produce only second-order improvements. PMID:12651951

  7. On the offensive against brain attack

    SciTech Connect

    Wheatcraft, D.

    1997-06-01

    The Center for Healthcare Technologies at Lawrence Livermore National Laboratory has undertaken a stroke initiative whose purpose is to provide the medical community with the tools that will allow doctors to diagnose and treat stroke as aggressively as they do heart attack. A multidisciplinary team of stroke-initiative researchers is collaborating with academic medical centers and private companies to move these tools from the research and development stage through clinical trials, regulatory approval, and manufacture so that they can benefit many thousands of people who have strokes each year. Tools the team has developed fall into four categories: microsensors for brain and clot characterization, a catheter-based system using laser energy to break up clots in the blood vessels of the brain, laser-tissue interaction models in support of laser {open_quotes}clot busting,{close_quotes} and microtools for treating the aneurysms that cause hemorrhagic stroke.

  8. Windows NT Attacks for the Evaluation of Intrusion Detection Systems

    DTIC Science & Technology

    2000-06-01

    Neptune and Smurf. These attacks are fully documented in [10]. In addition, two denial-of-service attacks, CrashIIS and DoSNuke, were developed to...in the Netscape browser. NetBus and NetCat use trojan programs to establish back doors on the victim system. PPMacro inserts malicious macro code...detecting the attack. 51 7.2 Netbus R-s-U Description The attacker uses a trojan program to install and run the Netbus server, version 1.7, on

  9. Feasible attack on detector-device-independent quantum key distribution.

    PubMed

    Wei, Kejin; Liu, Hongwei; Ma, Haiqiang; Yang, Xiuqing; Zhang, Yong; Sun, Yongmei; Xiao, Jinghua; Ji, Yuefeng

    2017-03-27

    Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob's BSM setup is assumed to be completely a "black box", is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack-detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.

  10. Panic attacks during sleep: a hyperventilation-probability model.

    PubMed

    Ley, R

    1988-09-01

    Panic attacks during sleep are analysed in terms of a hyperventilation theory of panic disorder. The theory assumes that panic attacks during sleep are a manifestation of severe chronic hyperventilation, a dysfunctional state in which renal compensation has led to a relatively steady state of diminished bicarbonate. Reductions in respiration during deep non-REM sleep lead to respiratory acidosis which triggers hyperventilatory hypocapnea and subsequent panic. A probability model designed to predict when during sleep panic attacks are likely to occur is supported by relevant data from studies of sleep and panic attacks. Implications for treatment are discussed.

  11. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  12. Techniques for Judging Intent Behind Network Based Cyber Attacks

    SciTech Connect

    Allen, J M

    2004-01-28

    This project developed a prototype system that can rapidly differentiate between undirected cyber attacks, and those that have a more specific and concerning intent behind them. The system responds to important cyber attacks in a tactically significant way as the attack is proceeding. It is also creates a prioritized list for the human analysts allowing them to focus on the threats mostly likely to be of interest. In the recent years the volume of attacks over the internet has increased exponentially, as they have become more and more automated. The result of this is that real threats are harder and harder to distinguish from the general threat. It is possible with our current systems to identify network packets that originated from thousands of IP addresses as probing a site like LLNL in a single day. Human analysis of these threats does not result in information that can be used for tactical response because most of the attacks are short and over before the human starts the analysis. Only a very small percentage of attacks can even be evaluated manually due to the volume. This project developed methods, and prototyped tools, that can identify attacks, slow the attack down and aid in the process of prioritizing detections. The project demonstrated that such methods exist, and that practical implementations exist for modern computers and networks. We call the tools created D.I.A.G. or Determining Internet Attackers Goals.

  13. Crack-cocaine users as victims of physical attack.

    PubMed Central

    Siegal, H. A.; Falck, R. S.; Wang, J.; Carlson, R. G.

    2000-01-01

    This study evaluates the correlates of physical attack among people who use crack cocaine in Dayton, Ohio. Using a retrospective and prospective natural history design, data from baseline and 1-year follow-up interviews were used to calculate the prevalence of physical attack and the annual rate of physical attack suffered by 440 not-in-treatment crack-cocaine users. Logistic regression was used to determine the correlates of physical attack. The lifetime prevalence of physical attack was 63.0%; the annual rate was 36.8%. At baseline, daily crack users were more likely to report a previous attack since they began using crack (odds ratio [OR], 1.81; 95% confidence interval [CI], 1.18-2.77). Longer duration of crack use was also associated with experiencing an attack (OR, 1.09; 95% CI, 1.04-1.14). Between baseline and 12-month follow-up, the odds of men being attacked were significantly less than those for women (OR, 0.48; 95% CI, 0.23-0.99). Physical attack is widespread among crack-cocaine users, and does not vary by ethnicity. Injuries often result in the need for medical care. Over the short term, women are at increased risk. Accessible and effective drug abuse treatment is needed to diminish the harm this population suffers. PMID:10800295

  14. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  15. Comparing acquired angioedema with hereditary angioedema (types I/II): findings from the Icatibant Outcome Survey.

    PubMed

    Longhurst, H J; Zanichelli, A; Caballero, T; Bouillet, L; Aberer, W; Maurer, M; Fain, O; Fabien, V; Andresen, I

    2017-04-01

    Icatibant is used to treat acute hereditary angioedema with C1 inhibitor deficiency types I/II (C1-INH-HAE types I/II) and has shown promise in angioedema due to acquired C1 inhibitor deficiency (C1-INH-AAE). Data from the Icatibant Outcome Survey (IOS) were analysed to evaluate the effectiveness of icatibant in the treatment of patients with C1-INH-AAE and compare disease characteristics with those with C1-INH-HAE types I/II. Key medical history (including prior occurrence of attacks) was recorded upon IOS enrolment. Thereafter, data were recorded retrospectively at approximately 6-month intervals during patient follow-up visits. In the icatibant-treated population, 16 patients with C1-INH-AAE had 287 attacks and 415 patients with C1-INH-HAE types I/II had 2245 attacks. Patients with C1-INH-AAE versus C1-INH-HAE types I/II were more often male (69 versus 42%; P = 0·035) and had a significantly later mean (95% confidence interval) age of symptom onset [57·9 (51·33-64·53) versus 14·0 (12·70-15·26) years]. Time from symptom onset to diagnosis was significantly shorter in patients with C1-INH-AAE versus C1-INH-HAE types I/II (mean 12·3 months versus 118·1 months; P = 0·006). Patients with C1-INH-AAE showed a trend for higher occurrence of attacks involving the face (35 versus 21% of attacks; P = 0·064). Overall, angioedema attacks were more severe in patients with C1-INH-HAE types I/II versus C1-INH-AAE (61 versus 40% of attacks were classified as severe to very severe; P < 0·001). Median total attack duration was 5·0 h and 9·0 h for patients with C1-INH-AAE versus C1-INH-HAE types I/II, respectively.

  16. Comparing acquired angioedema with hereditary angioedema (types I/II): findings from the Icatibant Outcome Survey

    PubMed Central

    Zanichelli, A.; Caballero, T.; Bouillet, L.; Aberer, W.; Maurer, M.; Fain, O.; Fabien, V.; Andresen, I.

    2017-01-01

    Summary Icatibant is used to treat acute hereditary angioedema with C1 inhibitor deficiency types I/II (C1‐INH‐HAE types I/II) and has shown promise in angioedema due to acquired C1 inhibitor deficiency (C1‐INH‐AAE). Data from the Icatibant Outcome Survey (IOS) were analysed to evaluate the effectiveness of icatibant in the treatment of patients with C1‐INH‐AAE and compare disease characteristics with those with C1‐INH‐HAE types I/II. Key medical history (including prior occurrence of attacks) was recorded upon IOS enrolment. Thereafter, data were recorded retrospectively at approximately 6‐month intervals during patient follow‐up visits. In the icatibant‐treated population, 16 patients with C1‐INH‐AAE had 287 attacks and 415 patients with C1‐INH‐HAE types I/II had 2245 attacks. Patients with C1‐INH‐AAE versus C1‐INH‐HAE types I/II were more often male (69 versus 42%; P = 0·035) and had a significantly later mean (95% confidence interval) age of symptom onset [57·9 (51·33–64·53) versus 14·0 (12·70–15·26) years]. Time from symptom onset to diagnosis was significantly shorter in patients with C1‐INH‐AAE versus C1‐INH‐HAE types I/II (mean 12·3 months versus 118·1 months; P = 0·006). Patients with C1‐INH‐AAE showed a trend for higher occurrence of attacks involving the face (35 versus 21% of attacks; P = 0·064). Overall, angioedema attacks were more severe in patients with C1‐INH‐HAE types I/II versus C1‐INH‐AAE (61 versus 40% of attacks were classified as severe to very severe; P < 0·001). Median total attack duration was 5·0 h and 9·0 h for patients with C1‐INH‐AAE versus C1‐INH‐HAE types I/II, respectively. PMID:27936514

  17. Novel usage of fresh frozen plasma in hereditary angioedema.

    PubMed

    Hanizah, N; Affirul, C A; Farah, N A; Shamila, M A; Ridzuan, M I

    2016-01-01

    Hereditary angioedema (HAE) is a rare and potentially life threatening autosomal dominant disease characterized by recurrent episodes of cutaneous and mucosal oedema. It results from reduced expression or loss of function of CI-esterase inhibitors (C1-INH). As opposed to the more common histamine-mediated angioedema, HAE does not respond well to conventional treatments with anti-histamines, steroids and adrenaline. Early recognition and timely intervention with the correct treatment are crucial particularly preventing airway obstruction. New disease specific treatment including plasma derived or recombinant C1-INH, ecallantide and icatibant have recently emerged and its appropriate use can reduce HAE-associated mortality and morbidity. However due to its costs, these disease specific treatments have yet to reach Malaysia. Despite that no randomized clinical trial on FFP has been performed, its efficacy in treating acute attacks of HAE is only demonstrated in case studies. This case report illustrates the successful treatment of acute HAE episode with FFP in a Malaysian government hospital setting.

  18. Acute ischemic stroke update.

    PubMed

    Baldwin, Kathleen; Orr, Sean; Briand, Mary; Piazza, Carolyn; Veydt, Annita; McCoy, Stacey

    2010-05-01

    Stroke is the third most common cause of death in the United States and is the number one cause of long-term disability. Legislative mandates, largely the result of the American Heart Association, American Stroke Association, and Brain Attack Coalition working cooperatively, have resulted in nationwide standardization of care for patients who experience a stroke. Transport to a skilled facility that can provide optimal care, including immediate treatment to halt or reverse the damage caused by stroke, must occur swiftly. Admission to a certified stroke center is recommended for improving outcomes. Most strokes are ischemic in nature. Acute ischemic stroke is a heterogeneous group of vascular diseases, which makes targeted treatment challenging. To provide a thorough review of the literature since the 2007 acute ischemic stroke guidelines were developed, we performed a search of the MEDLINE database (January 1, 2004-July 1, 2009) for relevant English-language studies. Results (through July 1, 2009) from clinical trials included in the Internet Stroke Center registry were also accessed. Results from several pivotal studies have contributed to our knowledge of stroke. Additional data support the efficacy and safety of intravenous alteplase, the standard of care for acute ischemic stroke since 1995. Due to these study results, the American Stroke Association changed its recommendation to extend the time window for administration of intravenous alteplase from within 3 hours to 4.5 hours of symptom onset; this recommendation enables many more patients to receive the drug. Other findings included clinically useful biomarkers, the role of inflammation and infection, an expanded role for placement of intracranial stents, a reduced role for urgent carotid endarterectomy, alternative treatments for large-vessel disease, identification of nontraditional risk factors, including risk factors for women, and newly published pediatric stroke guidelines. In addition, new devices for

  19. Words Mean Things: The Case for Information System Attack and Control System Attack

    DTIC Science & Technology

    2008-10-31

    databases , reservation system, documents, web pages…”ix On the other hand, infrastructure control systems interact with the physical world, and...Week and Space Technology, 4 September 2002, 3, EBSCOhost (accessed 8 September 2008). xxvii Barnes, Julian E., “Hacking Could Become Weapon in...September 2002, EBSCOhost (accessed 8 September 2008). Gibson, Tim, “What You Should Know About Attacking Computer Networks

  20. Public Figure Attacks in the United States, 1995-2015.

    PubMed

    Meloy, J Reid; Amman, Molly

    2016-09-01

    An archival descriptive study of public figure attackers in the United States between 1995 and 2015 was undertaken. Fifty-six incidents were identified, primarily through exhaustive internet searches, composed of 58 attackers and 58 victims. A code book was developed which focused upon victims, offenders, pre-attack behaviors including direct threats, attack characteristics, post-offense and other outcomes, motivations and psychological abstracts. The average interrater agreement for coding of bivariate variables was 0.835 (intraclass correlation coefficient). The three most likely victim categories were politicians, judges, and athletes. Attackers were males, many with a psychiatric disorder, most were grandiose, and most had both a violent and nonviolent criminal history. The known motivations for the attacks were often angry and personal, the most common being dissatisfaction with a judicial or other governmental process (23%). In only one case was the primary motivation to achieve notoriety. Lethality risk during an attack was 55%. Collateral injury or death occurred in 29% of the incidents. Only 5% communicated a direct threat to the target beforehand. The term "publicly intimate figure" is introduced to describe the sociocultural blurring of public and private lives among the targets, and its possible role in some attackers' perceptions and motivations. Copyright © 2016 John Wiley & Sons, Ltd.

  1. Effectiveness of the call in beach volleyball attacking play.

    PubMed

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-09

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  2. Effectiveness of the Call in Beach Volleyball Attacking Play

    PubMed Central

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-01-01

    In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2) = 4.55, p = 0.103). In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call. PMID:25713679

  3. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    ERIC Educational Resources Information Center

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  4. Cube-Type Algebraic Attacks on Wireless Encryption Protocols

    DTIC Science & Technology

    2009-09-01

    15. NUMBER OF PAGES 99 14 . SUBJECT TERMS Wireless Security, Cryptanalysis, Boolean Functions, Algebraic Attacks, Correlation Attacks, Cube...Correspondence of the Finite Field....... 12 3. Boolean Function .................................................................. 14 4. Hamming...a a a a     ; continue in that fashion up to the element where there is repetition ( 7a ). 14 3. Boolean Function Definition 2.6: A Boolean

  5. Are Risk Assessments of a Terrorist Attack Coherent?

    ERIC Educational Resources Information Center

    Mandel, David R.

    2005-01-01

    Four experiments examined 3 types of violations of coherence criteria in risk assessments of a terrorist attack. First, the requirement that extensionally equivalent descriptions be assigned the same probability (i.e., additivity) was violated. Unpacking descriptions of an attack into subtypes led to an increase in assessed risk. Second,…

  6. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  7. Is There Anybody There? A Psychodynamic View of Panic Attack.

    ERIC Educational Resources Information Center

    Rizq, Rosemary

    2002-01-01

    Presents a process analysis of a psychodynamic intervention for a client with panic attacks. Discusses how a psychodynamic understanding of the complex etiology of the client's panic attacks that ultimately produced improved coping skills and a subjective sense of improvement for her. Process analysis is used to illustrate the theoretical base,…

  8. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  9. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  10. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  11. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  12. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  13. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  14. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  15. For Heart Attack Survivors, a Risk of Suicide?

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_162414.html For Heart Attack Survivors, a Risk of Suicide? Study findings underscore ... 2016 (HealthDay News) -- People who've suffered a heart attack or unstable angina may face a higher-than- ...

  16. New Attacks on Animal Researchers Provoke Anger and Worry

    ERIC Educational Resources Information Center

    Guterman, Lila

    2008-01-01

    This article reports on firebomb attacks at the homes of two animal researchers which have provoked anger and unease. The firebomb attacks, which set the home of a neuroscientist at the University of California at Santa Cruz aflame and destroyed a car parked in the driveway of another university researcher's home, have left researchers and…

  17. [Banana tree pests attacking Heliconia latispatha Benth. (Heliconiaceae)].

    PubMed

    Watanabe, Maria A

    2007-01-01

    In mid-May 2005, the caterpillars Antichloris eriphia (Fabr.) (Lepidoptera: Arctiidae) and Calligo illioneus (Cramer) (Lepidoptera: Nymphalidae) which are banana tree pests, were found attacking six-month old stalks of Heliconia latispatha Benth., planted near a banana tree plantation in Jaguariuna, SP, Brazil. The attack by C. illioneus is observed by the first time in Brazil.

  18. Zebrafish Models for Human Acute Organophosphorus Poisoning.

    PubMed

    Faria, Melissa; Garcia-Reyero, Natàlia; Padrós, Francesc; Babin, Patrick J; Sebastián, David; Cachot, Jérôme; Prats, Eva; Arick Ii, Mark; Rial, Eduardo; Knoll-Gellida, Anja; Mathieu, Guilaine; Le Bihanic, Florane; Escalon, B Lynn; Zorzano, Antonio; Soares, Amadeu M V M; Raldúa, Demetrio

    2015-10-22

    Terrorist use of organophosphorus-based nerve agents and toxic industrial chemicals against civilian populations constitutes a real threat, as demonstrated by the terrorist attacks in Japan in the 1990 s or, even more recently, in the Syrian civil war. Thus, development of more effective countermeasures against acute organophosphorus poisoning is urgently needed. Here, we have generated and validated zebrafish models for mild, moderate and severe acute organophosphorus poisoning by exposing zebrafish larvae to different concentrations of the prototypic organophosphorus compound chlorpyrifos-oxon. Our results show that zebrafish models mimic most of the pathophysiological mechanisms behind this toxidrome in humans, including acetylcholinesterase inhibition, N-methyl-D-aspartate receptor activation, and calcium dysregulation as well as inflammatory and immune responses. The suitability of the zebrafish larvae to in vivo high-throughput screenings of small molecule libraries makes these models a valuable tool for identifying new drugs for multifunctional drug therapy against acute organophosphorus poisoning.

  19. Zebrafish Models for Human Acute Organophosphorus Poisoning

    PubMed Central

    Faria, Melissa; Garcia-Reyero, Natàlia; Padrós, Francesc; Babin, Patrick J.; Sebastián, David; Cachot, Jérôme; Prats, Eva; Arick II, Mark; Rial, Eduardo; Knoll-Gellida, Anja; Mathieu, Guilaine; Le Bihanic, Florane; Escalon, B. Lynn; Zorzano, Antonio; Soares, Amadeu M.V.M; Raldúa, Demetrio

    2015-01-01

    Terrorist use of organophosphorus-based nerve agents and toxic industrial chemicals against civilian populations constitutes a real threat, as demonstrated by the terrorist attacks in Japan in the 1990 s or, even more recently, in the Syrian civil war. Thus, development of more effective countermeasures against acute organophosphorus poisoning is urgently needed. Here, we have generated and validated zebrafish models for mild, moderate and severe acute organophosphorus poisoning by exposing zebrafish larvae to different concentrations of the prototypic organophosphorus compound chlorpyrifos-oxon. Our results show that zebrafish models mimic most of the pathophysiological mechanisms behind this toxidrome in humans, including acetylcholinesterase inhibition, N-methyl-D-aspartate receptor activation, and calcium dysregulation as well as inflammatory and immune responses. The suitability of the zebrafish larvae to in vivo high-throughput screenings of small molecule libraries makes these models a valuable tool for identifying new drugs for multifunctional drug therapy against acute organophosphorus poisoning. PMID:26489395

  20. Studies on sulfate attack: Mechanisms, test methods, and modeling

    NASA Astrophysics Data System (ADS)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  1. Weak laws against acid attacks on women: an Indian perspective.

    PubMed

    Ahmad, Nehaluddin

    2012-01-01

    Acid attacks, especially on women, have seen an alarming growth in India over the last decade. While these attacks can be attributed to various factors such as the social weakness of women in a male-dominated society, the situation is exacerbated by the general neglect of the lawmakers. As acid is inexpensive and easily available, it serves as an ideal weapon for the perpetrators. Further, as this offence is bailable in certain situations, the punishment does not act as a sufficient deterrent in most cases. This paper describes the horrendous effects that acid attacks have on the victims physically, psychologically and socially. It also examines the contemporary laws governing acid attacks on victims and offenders. Ideas for a better legal approach will also be examined with special reference to acid attacks as a crime, and the validity of specific legal provisions for female victims.

  2. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  3. Expected losses, insurability, and benefits from reducing vulnerability to attacks.

    SciTech Connect

    Nozick, Linda Karen; Carlson, Rolf Erik; Turnquist, Mark Alan

    2004-03-01

    A model of malicious attacks against an infrastructure system is developed that uses a network representation of the system structure together with a Hidden Markov Model of an attack at a node of that system and a Markov Decision Process model of attacker strategy across the system as a whole. We use information systems as an illustration, but the analytic structure developed can also apply to attacks against physical facilities or other systems that provide services to customers. This structure provides an explicit mechanism to evaluate expected losses from malicious attacks, and to evaluate changes in those losses that would result from system hardening. Thus, we provide a basis for evaluating the benefits of system hardening. The model also allows investigation of the potential for the purchase of an insurance contract to cover the potential losses when safeguards are breached and the system fails.

  4. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  5. The Application of Baum-Welch Algorithm in Multistep Attack

    PubMed Central

    Zhang, Yanxue; Zhao, Dongmei; Liu, Jinxing

    2014-01-01

    The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction. PMID:24991642

  6. IVs to Skip for Immunizing WEP against FMS Attack

    NASA Astrophysics Data System (ADS)

    Kobara, Kazukuni; Imai, Hideki

    The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive skip methods reveal information on the WEP key since most of them depend on the WEP key and the patterns of the skipped IV reveal it. In order to skip IVs safely, the skip patterns must be chosen carefully. In this paper, we review the attack conditions (6) and (7), whose success probability is the highest, 0.05, amongst all known conditions to guess one key-byte from one packet. Then we identify their safe skip patterns.

  7. The acute hepatic porphyrias: current status and future challenges.

    PubMed

    Siegesmund, Marko; van Tuyll van Serooskerken, Anne-Moniek; Poblete-Gutiérrez, Pamela; Frank, Jorge

    2010-10-01

    The porphyrias are predominantly inherited metabolic disorders, which result from a specific deficiency of one of the eight enzymes along the pathway of haem biosynthesis. Historically, they have been classified into hepatic and erythropoietic forms, based on the primary site of expression of the prevailing dysfunctional enzyme. From a clinical point of view, however, it is more convenient to subdivide them into acute and non-acute porphyrias, thereby primarily considering the potential occurrence of life-threatening acute neurovisceral attacks. Unrecognised or untreated, such an acute porphyric attack is associated with a significant mortality of up to 10%. The acute hepatic porphyrias comprise acute intermittent porphyria, variegate porphyria, hereditary coproporphyria, and δ-aminolevulinic acid dehydratase deficiency porphyria. Making a precise diagnosis may be difficult because the different types of porphyrias may show overlapping clinical and biochemical characteristics. To date, the therapeutic possibilities are limited and mainly symptomatic. In this overview we report on what is currently known about pathogenesis, clinic, diagnostics, and therapy of the acute hepatic porphyrias. We further point out actual and future challenges in the management of these diseases.

  8. Increased use of cigarettes, alcohol, and marijuana among Manhattan, New York, residents after the September 11th terrorist attacks.

    PubMed

    Vlahov, David; Galea, Sandro; Resnick, Heidi; Ahern, Jennifer; Boscarino, Joseph A; Bucuvalas, Michael; Gold, Joel; Kilpatrick, Dean

    2002-06-01

    The September 11, 2001, terrorist attacks were the largest human-made disaster in the United States since the Civil War. Studies after earlier disasters have reported rates of psychological disorders in the acute postdisaster period. However, data on postdisaster increases in substance use are sparse. A random digit dial telephone survey was conducted to estimate the prevalence of increased cigarette smoking, alcohol consumption, and marijuana use among residents of Manhattan, New York City, 5-8 weeks after the attacks. Among 988 persons included, 28.8% reported an increase in use of any of these three substances, 9.7% reported an increase in smoking, 24.6% reported an increase in alcohol consumption, and 3.2% reported an increase in marijuana use. Persons who increased smoking of cigarettes and marijuana were more likely to experience posttraumatic stress disorder than were those who did not (24.2% vs. 5.6% posttraumatic stress disorder for cigarettes; 36.0% vs. 6.6% for marijuana). Depression was more common among those who increased than for those who did not increase cigarette smoking (22.1 vs. 8.2%), alcohol consumption (15.5 vs. 8.3%), and marijuana smoking (22.3 vs. 9.4%). The results of this study suggest a substantial increase in substance use in the acute postdisaster period after the September 11th attacks. Increase in use of different substances may be associated with the presence of different comorbid psychiatric conditions.

  9. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  10. Acute Pancreatitis

    PubMed Central

    Geokas, Michael C.

    1972-01-01

    For many decades two types of acute pancreatitis have been recognized: the edematous or interstitial and the hemorrhagic or necrotic. In most cases acute pancreatitis is associated with alcoholism or biliary tract disease. Elevated serum or urinary α-amylase is the most important finding in diagnosis. The presence of methemalbumin in serum and in peritoneal or pleural fluid supports the diagnosis of the hemorrhagic form of the disease in patients with a history and enzyme studies suggestive of pancreatitis. There is no characteristic clinical picture in acute pancreatitis, and its complications are legion. Pancreatic pseudocyst is probably the most common and pancreatic abscess is the most serious complication. The pathogenetic principle is autodigestion, but the precise sequence of biochemical events is unclear, especially the mode of trypsinogen activation and the role of lysosomal hydrolases. A host of metabolic derangements have been identified in acute pancreatitis, involving lipid, glucose, calcium and magnesium metabolism and changes of the blood clotting mechanism, to name but a few. Medical treatment includes intestinal decompression, analgesics, correction of hypovolemia and other supportive and protective measures. Surgical exploration is advisable in selected cases, when the diagnosis is in doubt, and is considered imperative in the presence of certain complications, especially pancreatic abscess. PMID:4559467

  11. Node Survival in Networks under Correlated Attacks

    PubMed Central

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles. PMID:25932635

  12. Node Survival in Networks under Correlated Attacks.

    PubMed

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles.

  13. Assessment and treatment of nocturnal panic attacks.

    PubMed

    Craske, Michelle G; Tsao, Jennie C I

    2005-06-01

    Nocturnal panic (NP), waking from sleep in a state of panic, is a common occurrence among patients with panic disorder, with 44-71% reporting at least one such attack. NP is a non-REM event that is distinct from sleep terrors, sleep apnea, nightmares or dream-induced arousals. This review outlines recent advances in the characterization of NP, as well as current approaches to the assessment and treatment of NP. In contrast to earlier work, more recent studies suggest that patients with NP do not differ from patients without NP on sleep architecture, sleep physiology, self-reported sleep quality and severity of panic disorder. However, more precise measurement of physiological precipitants and features is warranted. Assessment of NP focuses on ruling out other explanations for NP, with differential diagnosis based on interviews, sleep polysomnography and ambulatory recording of sleep. Psychological treatment (cognitive-behavioral therapy) targets misappraisals of anxiety sensations, hyperventilatory response, and conditioned reactions to internal, physical cues. Recent evidence supports the efficacy of this approach, however, controlled studies on pharmacological agents in the treatment of NP are lacking. Research is needed to examine the effects of combined cognitive-behavioral therapy and medications, compared to medication alone in the treatment of NP.

  14. Injuries and illnesses among New York City Fire Department rescue workers after responding to the World Trade Center attacks.

    PubMed

    2002-09-11

    Within minutes of the terrorist attacks on September 11, 2001, the Fire Department of New York City (FDNY) operated a continuous rescue/recovery effort at the World Trade Center (WTC) site. Medical officers of FDNY Bureau of Health Services (FDNY-BHS) responded to provide emergency medical services (see box). The collapse of the WTC towers and several adjacent structures resulted in a vast, physically dangerous disaster zone. The height of the WTC towers produced extraordinary forces during their collapse, pulverizing considerable portions of the buildings' structural components and exposing first responders and civilians to substantial amounts of airborne particulate matter. Fires burned continuously under the debris until mid-December 2001. Because of ongoing fire activity and the large numbers of civilians and rescue workers who were killed during the attacks, approximately 11,000 FDNY firefighters and many emergency medical service (EMS) personnel worked on or directly adjacent to the rubble and incurred substantial exposures (Figure). This report describes morbidity and mortality in FDNY rescue workers during the 11-month period after the WTC attacks and documents a substantial increase in respiratory and stress-related illness compared with the time period before the WTC attacks. These findings demonstrate the need to provide acute and long-term medical monitoring, treatment, and counseling to FDNY rescue workers exposed to this disaster and to solve supply, compliance, and supervision problems so that respiratory protection can be rapidly provided at future disasters.

  15. Pre-Attack Symptomatology and Temperament as Predictors of Children's Responses to the September 11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Smith, Kimberlee I.; Meltzoff, Andrew N.

    2005-01-01

    Background: The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Method: Children's responses were assessed in a community sample of children in Seattle, Washington,…

  16. Diagnostic criteria of acute rheumatic fever.

    PubMed

    Burke, Rebecca J; Chang, Christopher

    2014-01-01

    Acute rheumatic fever is an inflammatory sequela of Group A Streptococcal pharyngitis that affects multiple organ systems. The incidence of acute rheumatic fever has been declining even before the use of antibiotics became widespread, however the disease remains a significant cause of morbidity and mortality in children, particularly in developing countries and has been estimated to affect 19 per 100,000 children worldwide. Acute rheumatic fever is a clinical diagnosis, and therefore subject to the judgment of the clinician. Because of the variable presentation, the Jones criteria were first developed in 1944 to aid clinicians in the diagnosis of acute rheumatic fever. The Jones criteria have been modified throughout the years, most recently in 1992 to aid clinicians in the diagnosis of initial attacks of acute rheumatic fever and to minimize overdiagnosis of the disease. Diagnosis of acute rheumatic fever is based on the presence of documented preceding Group A Streptococcal infection, in addition to the presence of two major manifestations or one major and two minor manifestations of the Jones criteria. Without documentation of antecedent Group A Streptococcal infection, the diagnosis is much less likely except in a few rare scenarios. Carditis, polyarthritis and Sydenham's chorea are the most common major manifestations of acute rheumatic fever. However, despite the predominance of these major manifestations of acute rheumatic fever, there can be significant overlap with other disorders such as Lyme disease, serum sickness, drug reactions, and post-Streptococcal reactive arthritis. This overlap between disease processes has led to continued investigation of the pathophysiology as well as development of new biomarkers and laboratory studies to aid in the diagnosis of acute rheumatic fever and distinction from other disease processes.

  17. Optimal response to attacks on the open science grids.

    SciTech Connect

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  18. Localized attacks on spatially embedded networks with dependencies.

    PubMed

    Berezin, Yehiel; Bashan, Amir; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2015-03-11

    Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures-even of finite fraction-if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems.

  19. Localized attacks on spatially embedded networks with dependencies

    PubMed Central

    Berezin, Yehiel; Bashan, Amir; Danziger, Michael M.; Li, Daqing; Havlin, Shlomo

    2015-01-01

    Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures—even of finite fraction—if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems. PMID:25757572

  20. Falsification Attacks against WPA-TKIP in a Realistic Environment

    NASA Astrophysics Data System (ADS)

    Todo, Yosuke; Ozawa, Yuki; Ohigashi, Toshihiro; Morii, Masakatu

    In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP). A previous realistic attack succeeds only for a network that supports IEEE 802.11e QoS features by both an access point (AP) and a client, and it has an execution time of 12-15min, in which it recovers a message integrity code (MIC) key from an ARP packet. Our first attack reduces the execution time for recovering a MIC key. It can recover the MIC key within 7-8min. Our second attack expands its targets that can be attacked. This attack focuses on a new vulnerability of QoS packet processing, and this vulnerability can remove the condition that the AP supports IEEE 802.11e. In addition, we discovered another vulnerability by which our attack succeeds under the condition that the chipset of the client supports IEEE 802.11e even if the client disables this standard through the OS. We demonstrate that chipsets developed by several kinds of vendors have the same vulnerability.

  1. Attack resilience of the evolving scientific collaboration network.

    PubMed

    Liu, Xiao Fan; Xu, Xiao-Ke; Small, Michael; Tse, Chi K

    2011-01-01

    Stationary complex networks have been extensively studied in the last ten years. However, many natural systems are known to be continuously evolving at the local ("microscopic") level. Understanding the response to targeted attacks of an evolving network may shed light on both how to design robust systems and finding effective attack strategies. In this paper we study empirically the response to targeted attacks of the scientific collaboration networks. First we show that scientific collaboration network is a complex system which evolves intensively at the local level--fewer than 20% of scientific collaborations last more than one year. Then, we investigate the impact of the sudden death of eminent scientists on the evolution of the collaboration networks of their former collaborators. We observe in particular that the sudden death, which is equivalent to the removal of the center of the egocentric network of the eminent scientist, does not affect the topological evolution of the residual network. Nonetheless, removal of the eminent hub node is exactly the strategy one would adopt for an effective targeted attack on a stationary network. Hence, we use this evolving collaboration network as an experimental model for attack on an evolving complex network. We find that such attacks are ineffectual, and infer that the scientific collaboration network is the trace of knowledge propagation on a larger underlying social network. The redundancy of the underlying structure in fact acts as a protection mechanism against such network attacks.

  2. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  3. [Diagnosis and treatment in the emergency room of acute asthma in childhood].

    PubMed

    Aldana Vergara, Ruth Saraí; Olivar Lòpez, Victor; Sienra Monge, Juan José Luis; Lezana Fernández, José Luis; Zepeda Ortega, Benjamin

    2009-01-01

    Acute asthma is characterized by acute air way obstruction episodes presented as short breath, increased coughing, wheezing and difficult breathing, reversible with bronchodilator. It constitutes one of the most frequent causes of pediatric ER visits whose diagnosis and treatment is not always adequate. It is necessary to carry out a complete medical history searching for the number of previous attacks, risk factors, associated illnesses, triggers, prior hospitalizations, preventive and maintenance treatment used, along with a complete physical examination. During the management of moderate-severe attacks frequent systematic assessments are required to ensure treatment response. In children above 5 years old, monitoring of expiratory peak flow (EPF) during mild-moderate attacks is recommended. In general, a national consensus to classify and treat acute asthma in emergency services does not exist for which the need to develop a clinical practice guide of diagnosis and management arises.

  4. Acute Vestibulopathy

    PubMed Central

    Cha, Yoon-Hee

    2011-01-01

    The presentation of acute vertigo may represent both a common benign disorder or a life threatening but rare one. Familiarity with the common peripheral vestibular disorders will allow the clinician to rapidly “rule-in” a benign disorder and recognize when further testing is required. Key features of vertigo required to make an accurate diagnosis are duration, chronicity, associated symptoms, and triggers. Bedside tests that are critical to the diagnosis of acute vertigo include the Dix-Hallpike maneuver and canalith repositioning manuever, occlusive ophthalmoscopy, and the head impulse test. The goal of this review is to provide the clinician with the clinical and pathophysiologic background of the most common disorders that present with vertigo to develop a logical differential diagnosis and management plan. PMID:23983835

  5. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    SciTech Connect

    Nichols, Jeff A. {Cyber Sciences}; Curtis, Laura

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.

  6. Recurrence of Panic Attacks after Influenza Vaccination: Two Case Reports

    PubMed Central

    Kim, Han-Joon; Jeon, Sang-Won; Yoon, Ho-Kyoung

    2016-01-01

    Human influenza is a contagious respiratory illness caused by the influenza virus. The influenza vaccination is recommended annually, but several adverse effects related to allergic reactions have been reported. Panic attacks are also known to occur, but no case of a panic attack adverse effect has been reported in South Korea. We present two cases of panic disorder patients whose symptoms were aggravated by the influenza vaccination. We assumed that dysregulation of T-lymphocytes in panic disorder patients could have a role in activating various kinds of cytokines and chemokines, which then can lead to panic attack aggravation. PMID:27776395

  7. Unusual fatal dog attack in Dunedin, New Zealand.

    PubMed

    Healey, D L; Kieser, J A

    2005-12-01

    A case of a fatal dog attack on a middle aged woman is presented. The offending dog was her own Bull-mastiff, which had previously shown signs of aggression towards her. Most of the injuries were found on the victim's face, neck and skull. A noteworthy feature of this attack was that the victim was known to suffer from Huntington disease. It is postulated that the involuntary movements, progressive dementia and increased moodiness characteristic of the disease may have had a significant role in triggering the attack.

  8. Acute Blindness.

    PubMed

    Meekins, Jessica M

    2015-09-01

    Sudden loss of vision is an ophthalmic emergency with numerous possible causes. Abnormalities may occur at any point within the complex vision pathway, from retina to optic nerve to the visual center in the occipital lobe. This article reviews specific prechiasm (retina and optic nerve) and cerebral cortical diseases that lead to acute blindness. Information regarding specific etiologies, pathophysiology, diagnosis, treatment, and prognosis for vision is discussed.

  9. The treatment of acute vertigo.

    PubMed

    Cesarani, A; Alpini, D; Monti, B; Raponi, G

    2004-03-01

    Vertigo and dizziness are very common symptoms in the general population. The aim of this paper is to describe the physical and pharmacological treatment of symptoms characterized by sudden onset of rotatory vertigo. Acute vertigo can be subdivided into two main groups: (1) spontaneous vertigo and (2) provoked vertigo, usually by postural changes, generally called paroxysmal positional vertigo (PPV). Sudden onset of acute vertigo is usually due to acute spontaneous unilateral vestibular failure. It can be also fluctuant as, e.g., in recurrent attacks of Ménière's disease. Pharmacotherapy of acute spontaneous vertigo includes Levo-sulpiride i.v., 50 mg in 250 physiologic solution, once or twice a day, methoclopramide i.m., 10 mg once or twice a day, or triethilperazine rectally, once or twice a day, to reduce neurovegetative symptoms; diazepam i.m., 10 mg once or twice a day, to decrease internuclear inhibition, sulfate magnesium i.v., two ampoules in 500 cc physiological solution, twice a day, or piracetam i.v., one ampoule in 500 cc physiological solution, twice a day, to decrease vestibular damage. At the onset of the acute symptoms, patients must lie on their healthy side with the head and trunk raised 20 degrees. The room must be quiet but not darkened. If the patient is able to swallow without vomiting, it is important to reduce nystagmus and stabilize the visual field with gabapentine, per os, 300 mg twice or three times a day. The first step of the physical therapy of acute vertigo is vestibular electrical stimulation, that is to say, a superficial paravertebral electrical stimulation of neck muscles, aimed to reduce antigravitary failure and to increase proprioceptive cervical sensory substitution. PPV is a common complaint and represents one of the most common entities in peripheral vestibular pathology. While the clinical picture is well known and widely described, the etiopathogenesis of PPV is still a matter of debate. Despite the different

  10. Experimental protocol of dental procedures In patients with hereditary angioedema: the role of anxiety and the use of nitrogen oxide

    PubMed Central

    ROSA, A.; MIRANDA, M.; FRANCO, R.; GUARINO, M.G.; BARLATTANI, A.; BOLLERO, P.

    2016-01-01

    SUMMARY Hereditary angioedema (HAE) is a rare disease, little known to the medical and dental community, but with a growing rate of hospitalization over the years. HAE is due to a deficit/dysfunction of C1 esterase inhibitor which leads to an increase in vascular permeability and the appearance of edemas widespread in all body areas. The airways are the most affected and laryngeal swelling, which can occur, it is dangerous for the patient’s life, is also a sensitive spot in our daily practice, therefore, it is also important to be aware of all the signs of this disease. Episodes of HAE have no obvious cause, but it can be triggered by anxiety, invasive procedures and trauma. So this disease is a major problem in oral and maxillofacial surgery, ENT, endoscopy, emergency medicine and anesthesia because even simple procedures can cause laryngeal edema. The recommendations on the management of HAE include long- and short-term prophylaxis and treatment for acute attacks, however, the importance of anxiety control during the operating phases is undervalued. The present work suggests an experimental protocol for the surgery management of HAE patients with the help of nitrous oxide, with a brief review of the literature on this topic. PMID:28042430

  11. Ongoing Contact Activation in Patients with Hereditary Angioedema

    PubMed Central

    Konings, Joke; Cugno, Massimo; Suffritti, Chiara; ten Cate, Hugo; Cicardi, Marco; Govers-Riemslag, José W. P.

    2013-01-01

    Hereditary angioedema (HAE) is predominantly caused by a deficiency in C1 esterase inhibitor (C1INH) (HAE-C1INH). C1INH inhibits activated factor XII (FXIIa), activated factor XI (FXIa), and kallikrein. In HAE-C1INH patients the thrombotic risk is not increased even though activation of the contact system is poorly regulated. Therefore, we hypothesized that contact activation preferentially leads to kallikrein formation and less to activation of the coagulation cascade in HAE-C1INH patients. We measured the levels of C1INH in complex with activated contact factors in plasma samples of HAE-C1INH patients (N=30, 17 during remission and 13 during acute attack) and healthy controls (N=10). We did not detect differences in enzyme-inhibitor complexes between samples of controls, patients during remission and patients during an acute attack. Reconstitution with C1INH did not change this result. Next, we determined the potential to form enzyme-inhibitory complexes after complete in vitro activation of the plasma samples with a FXII trigger. In all samples, enzyme-C1INH levels increased after activation even in patients during an acute attack. However, the levels of FXIIa-C1INH, FXIa-C1INH and kallikrein-C1INH were at least 52% lower in samples taken during remission and 70% lower in samples taken during attack compared to samples from controls (p<0.05). Addition of C1INH after activation led to an increase in levels of FXIIa-C1INH and FXIa-C1INH (p<0.05), which were still lower than in controls (p<0.05), while the levels of kallikrein-C1INH did not change. These results are consistent with constitutive activation and attenuated depletion of the contact system and show that the ongoing activation of the contact system, which is present in HAE-C1INH patients both during remission and during acute attacks, is not associated with preferential generation of kallikrein over FXIa. PMID:24013493

  12. Turning the Tables: Using Wireless Communication Against an Attacker

    NASA Astrophysics Data System (ADS)

    Martinovic, Ivan; Schmitt, Jens B.

    In this paper, we propose a system leveraging the peculiarities of the wireless medium, such as the broadcast nature of wireless communication and the unpredictability of indoor signal propagation to achieve effective protection against attacks based on the injection of fake data in wireless sensor networks (WSNs). Using a real-world WSN deployment and a realistic implementation of an attacker, we analyze this protection scheme and demonstrate that neither position change, transmission power manipulation, nor complete knowledge of wireless parameters can help an attacker to successfully attack the network. As a result, this work demonstrates how the chaotic nature of radio communication, which is often considered a disadvantage in regard to security objectives, can be exploited to enhance protection and support implementation of lightweight security mechanisms.

  13. Vulnerability of complex networks under path-based attacks

    NASA Astrophysics Data System (ADS)

    Pu, Cun-Lai; Cui, Wei

    2015-02-01

    We investigate vulnerability of complex networks including model networks and real-world networks subject to path-based attacks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  14. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    PubMed Central

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate. PMID:26295058

  15. Degree-based attacks and defense strategies in complex networks

    NASA Astrophysics Data System (ADS)

    Yehezkel, Aviv; Cohen, Reuven

    2012-12-01

    We study the stability of random scale-free networks to degree-dependent attacks. We present analytical and numerical results to compute the critical fraction pc of nodes that need to be removed for destroying the network under this attack for different attack parameters. We study the effect of different defense strategies, based on the addition of a constant number of links on network robustness. We test defense strategies based on adding links to either low degree, middegree or high degree nodes. We find using analytical results and simulations that the middegree nodes defense strategy leads to the largest improvement to the network robustness against degree-based attacks. We also test these defense strategies on an internet autonomous systems map and obtain similar results.

  16. Supersonic flow around circular cones at angles of attack

    NASA Technical Reports Server (NTRS)

    Ferri, Antonio

    1951-01-01

    The properties of conical flow without axial symmetry are analyzed. The flow around cones of circular cross section at small angles of attack is determined by correctly considering the effect of the entropy gradients in the flow.

  17. Mite-Proof Bedding May Help Curb Asthma Attacks

    MedlinePlus

    ... Curb Asthma Attacks: Study Kids whose mattresses and pillows were encased had less severe flare-ups, researchers ... asthma and dust mite allergy. Their mattresses and pillows were encased with mite-proof or placebo covers. ...

  18. An unusual case of predation: dog pack or cougar attack?

    PubMed

    Fonseca, Gabriel M; Palacios, Rocío

    2013-01-01

    Injuries produced by animals are capable of leaving severe patterns and in some cases may result in the death of the attacked individual. Law enforcement authorities may come to erroneous conclusions about the source of the bites based on their awareness of animals present and similarities of the injuries to the untrained eye, with dreadful consequences. Expertise of a carnivore biologist and an odontologist that indentifies the particularities of bite marks may be useful for identifying the attacking species. We present the investigation of a fatal dog pack attack involving a 43-year-old man in Bell Ville (Argentina) where the evidence provided by a forensic dentist and a biologist was categorical for establishing the animal species involved. Because of the unusual characteristics of the wounds and the initial hypothesis made by local authorities of a cougar attack, habits and specific patterns of both dog pack and cougar predation on humans are discussed.

  19. The countermeasures against the blinding attack in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Jindong; Wang, Hong; Qin, Xiaojuan; Wei, Zhengjun; Zhang, Zhiming

    2016-01-01

    It has been shown that the single photon detectors (SPDs) based on the avalanche photodiode (APD) can be blinded and controlled by the bright light and short trigger pulses. Eavesdropper can get the full information without causing additional quantum bit error rate. Hence, in order to guarantee the security of the quantum key distribution (QKD) systems, some countermeasures, by changing the characteristic of the SPD or monitoring the parameters of the detector, are presented by some research groups. In this paper, we provide a new and effective countermeasure against the blinding attack based on improving the optical scheme of the decoding unit in the QKD system rather than only considering the characteristic of the SPD. In our proposal we use a coupler with asymmetric splitting ratio to distinguish the detection characteristic of the SPD with blinding attack from that without blinding attack. The detailed analysis shows that the proposed scheme is feasible to defense the blinding attack.

  20. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    PubMed

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2016-04-12

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  1. After-gate attack on a quantum cryptosystem

    NASA Astrophysics Data System (ADS)

    Wiechers, C.; Lydersen, L.; Wittmann, C.; Elser, D.; Skaar, J.; Marquardt, Ch; Makarov, V.; Leuchs, G.

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  2. Trojan-horse attacks on quantum-key-distribution systems

    SciTech Connect

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-02-15

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems.

  3. Sleep attacks and antiparkinsonian drugs: a pilot prospective pharmacoepidemiologic study.

    PubMed

    Montastruc, J L; Brefel-Courbon, C; Senard, J M; Bagheri, H; Ferreira, J; Rascol, O; Lapeyre-Mestre, M

    2001-01-01

    A prospective survey was performed to characterize the prevalence of sleep attacks and to evaluate precipitating factors in a group of 236 patients with idiopathic Parkinson's disease. Sleep attacks were reported by 72 patients (30.5%). Multivariate analysis showed a marked association between the occurrence of sudden sleep episodes and first autonomic failure, followed by treatment with ropinirole and bromocriptine. The present work underlines the major contributing role of autonomic failure followed by dopamine agonists in the occurrence of such an event. Because a relationship between sleep attacks and not only ropinirole but also bromocriptine treatment was described, the present work suggests that sleep attacks are a common side effect of all dopamine agonists.

  4. Resistance maximization principle for defending networks against virus attack

    NASA Astrophysics Data System (ADS)

    Li, Angsheng; Zhang, Xiaohui; Pan, Yicheng

    2017-01-01

    We investigate the defending of networks against virus attack. We define the resistance of a network to be the maximum number of bits required to determine the code of the module that is accessible from random walk, from which random walk cannot escape. We show that for any network G, R(G) =H1(G) -H2(G) , where R(G) is the resistance of G, H1(G) and H2(G) are the one- and two-dimensional structural information of G, respectively, and that resistance maximization is the principle for defending networks against virus attack. By using the theory, we investigate the defending of real world networks and of the networks generated by the preferential attachment and the security models. We show that there exist networks that are defensible by a small number of controllers from cascading failure of any virus attack. Our theory demonstrates that resistance maximization is the principle for defending networks against virus attacks.

  5. Chemical processes induced by OH attack on nucleic acids

    NASA Astrophysics Data System (ADS)

    Kuwabara, Mikinori

    Recent studies concerning the chemical processes in nucleic acids starting with OH attack to produce free radicals and ending with the formation of stable products were reviewed. Using nucleosides, nucleotides and homopolynucleotides as model compounds, and DNA itself, free radicals produced by OH attack on nucleic acids have been mainly studied by a method combining ESR, spin trapping and high-performance liquid chromatography. For identification of final products in both base and sugar moieties of nucleic acids, mass and NMR spectroscopies combined with gas chromatography or high-performance liquid chromatography are usually employed. Kinetic measurements of structural alterations in the polynucleotides and DNA after OH attack have been made by a method combining electron-pulse irradiation and laser-light scattering. From these studies, the chemical reaction processes from the generation of free radicals in nucleic acids by OH attack, through the formation of unstable intermediates, to the formation of final products can be described.

  6. Heartburn or Chest Pain: When Is It Heart Attack?

    MedlinePlus

    Diseases and Conditions Heartburn Severe heartburn and heart attack can be hard to tell apart. Understand how they typically differ, and learn when to get immediate help. By Mayo Clinic Staff You' ...

  7. Exercisers May Have Better Shot of Surviving Heart Attack

    MedlinePlus

    ... the University of Copenhagen. "Animal studies suggest that myocardial infarctions [heart attacks] are smaller and less likely to ... see if exercise was linked with less serious myocardial infarctions in people," she added in a journal news ...

  8. New records of Pipunculidae attacking proconiine sharpshooter (Auchenorrhyncha: Cicadellidae: Proconiini)

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Five records of Pipunculidae (Diptera) attacking proconiine sharpshooters (Auchenorrhyncha: Cicadellidae) are documented here for the first time. Eudorylas alternatus (Cresson) is documented as a parasitoid of Cuerna obtusa Oman and Beamer, and Oncometopia orbona (Fabricius) is recorded as being at...

  9. Quantum cloning attacks against PUF-based quantum authentication systems

    NASA Astrophysics Data System (ADS)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-08-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  10. Three cases giant panda attack on human at Beijing Zoo

    PubMed Central

    Zhang, Peixun; Wang, Tianbing; Xiong, Jian; Xue, Feng; Xu, Hailin; Chen, Jianhai; Zhang, Dianying; Fu, Zhongguo; Jiang, Baoguo

    2014-01-01

    Panda is regarded as Chinese national treasure. Most people always thought they were cute and just ate bamboo and had never imagined a panda could be vicious. Giant panda attacks on human are rare. There, we present three cases of giant panda attacks on humans at the Panda House at Beijing Zoo from September 2006 to June 2009 to warn people of the giant panda’s potentially dangerous behavior. PMID:25550978

  11. Pathological findings of a fatal leopard seal attack.

    PubMed

    Rutty, Guy N

    2007-03-01

    A unique case of a fatal leopard seal attack against an adult human female is presented. The death occurred in Rothera, Antarctica when the female was snorkeling while undertaking scientific research. The principle injuries occurred, during life, to the facial areas prior to the act of drowning. The method of attack of leopard seals against their natural prey is discussed and related to the findings on the deceased.

  12. Attacks on fixed-apparatus quantum-key-distribution schemes

    NASA Astrophysics Data System (ADS)

    Boyer, Michel; Gelles, Ran; Mor, Tal

    2014-07-01

    We consider quantum-key-distribution implementations in which the receiver's apparatus is fixed and does not depend on his choice of basis at each qubit transmission. We show that, although theoretical quantum key distribution is proven secure, such implementations are totally insecure against a strong eavesdropper that has one-time (single) access to the receiver's equipment. The attack we present here, the "fixed-apparatus attack," causes a potential risk to the usefulness of several recent implementations.

  13. Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling

    DTIC Science & Technology

    2011-03-25

    attributes. timestomp Winter.jpg -z "Monday 1/01/2001 01:01:01 AM" 142 Bibliography [Ame04] Amenaza , (2004, May), "Understanding Risk...Through Attack Tree Analysis," Amenaza Technologies Limited, [Online], Accessed 9 Dec 2010, http://www.amenaza.com/downloads/docs...Methodology.pdf. [Ame05] Amenaza , (2005, Nov), "Fundamentals of Capabilities-based Attack Tree Analysis," Amenaza Technologies Limited, [Online

  14. MULTOPS: A Data-Structure for Bandwidth Attack Detection

    DTIC Science & Technology

    2007-11-02

    Computer Systems, 18(3):263–297, August 2000. [Net00] Netscape . Leading Web sites under attack, February 2000. Available at http: //technews.netscape.com...to crash. This can have serious consequences for Web companies which rely on their online availability to do business. This paper intro- duces a data...packets. Another attack works by generating a huge amount of normal traffic by, for example, running a JavaScript pro- gram in a browser that pops up

  15. Successful attack on permutation-parity-machine-based neural cryptography

    NASA Astrophysics Data System (ADS)

    Seoane, Luís F.; Ruttor, Andreas

    2012-02-01

    An algorithm is presented which implements a probabilistic attack on the key-exchange protocol based on permutation parity machines. Instead of imitating the synchronization of the communicating partners, the strategy consists of a Monte Carlo method to sample the space of possible weights during inner rounds and an analytic approach to convey the extracted information from one outer round to the next one. The results show that the protocol under attack fails to synchronize faster than an eavesdropper using this algorithm.

  16. British media attacks on homeopathy: are they justified?

    PubMed

    Vithoulkas, George

    2008-04-01

    Homeopathy is being attacked by the British media. These attacks draw support from irresponsible and unjustified claims by certain teachers of homeopathy. Such claims include the use of 'dream' and 'imaginative' methods for provings. For prescribing some such teachers attempt to replace the laborious process of matching symptom picture and remedy with spurious theories based on 'signatures', sensations and other methods. Other irresponsible claims have also been made. These "new ideas" risk destroying the principles, theory, and practice of homeopathy.

  17. [Apate terebrans (Pallas) (Coleoptera: Bostrychidae) attacking neem trees in Brazil].

    PubMed

    de Souza, Rodolfo M; dos Anjos, Norivaldo; Mourão, Sheila A

    2009-01-01

    This paper describes and records the attack of adults Apate terebrans (Pallas) to a neem plantation located in Guarani, State of Minas Gerais, Brazil, in March 2007. The damage was characterized by a hole in the trunk, from where the shot-hole-borer enters constructing tunnels and feeding on the wood. This is the first record of A. terebrans attacking neem trees in Brazil.

  18. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing

    DTIC Science & Technology

    2001-10-01

    capacity • Reducing the amount of resources consumed • Monitoring traffic volume • Tracing attack packets though the Internet Detecting subverted...attempt to reduce the amount of resources consumed during a DDoS attack. NetBSD will accelerate its timeouts of partially opened TCP connections at times...should be nearly comparable to a system that does not use the payment mechanisms. There is prior work on how pricing can be used to influence consumer

  19. Three cases giant panda attack on human at Beijing Zoo.

    PubMed

    Zhang, Peixun; Wang, Tianbing; Xiong, Jian; Xue, Feng; Xu, Hailin; Chen, Jianhai; Zhang, Dianying; Fu, Zhongguo; Jiang, Baoguo

    2014-01-01

    Panda is regarded as Chinese national treasure. Most people always thought they were cute and just ate bamboo and had never imagined a panda could be vicious. Giant panda attacks on human are rare. There, we present three cases of giant panda attacks on humans at the Panda House at Beijing Zoo from September 2006 to June 2009 to warn people of the giant panda's potentially dangerous behavior.

  20. Captive tiger attack: case report and review of the literature.

    PubMed

    Schiller, Henry J; Cullinane, Daniel C; Sawyer, Mark D; Zietlow, Scott P

    2007-05-01

    Tigers, as well as other large predators, are being held in private settings with increasing frequency. Unregulated private "zoos" are cropping up in many rural and suburban settings across the country. The number of attacks from captive predators also is on the rise. This case highlights the potentially violent and aggressive nature of wild animals held in captivity. Treatment principals and wounding patterns of large cat attacks are emphasized.

  1. Stendhal's aphasic spells: the first report of transient ischemic attacks followed by stroke.

    PubMed

    Bogousslavsky, Julien; Assal, Gil

    2010-01-01

    In March 1841, the year before he died of acute stroke, Stendhal, one of the most famous French novelists of the 19th century, developed a series of short-lived speech impairments which he precisely reported in his correspondence. His reports suggest that these spells were aphasic transient ischemic attacks (TIAs). The accuracy and precision of Stendhal's description exactly 20 years before Broca's presentation at the Société d'Anthropologie is remarkable since it occurred at a time when TIAs had not been studied in the medical literature and aphasia was still in its 'prehistory'. Stendhal's TIAs a few months before his fatal stroke constitute the first historical report of the warning nature of TIAs, which would be emphasized only over 100 years later.

  2. Exposure Science for Terrorist Attacks and Theaters of Military Conflict: Minimizing Contact with Toxicants

    PubMed Central

    Lioy, Paul J.

    2014-01-01

    The strategies for protecting our deployed U.S. Forces are outlined in National Research Council documents published in 1999–2000. This article summarizes experiences and information gathered and interpreted regarding population and rescue workers’ exposures in the aftermath of the 2001 World Trade Center attacks, with the aim to provide insights on issues related to military deployment to locations with hazardous agents. Issues coveted include phases of exposure, materials of concern, detection equipment, and personal protection equipment. The focus is on human exposure issues, which are primarily associated with strategies 1 through 3 of the National Research Council’s report entitled “Protecting Those Who Serve: Strategies to Protect the Health of Deployed U.S. Forces”. Contact and duration of contact with hazardous substances are critical areas of concern, which require prevention and intervention procedures and protocols to reduce the incidence of acute and long-term health outcomes. PMID:21916334

  3. Why does the gout attack stop? A roadmap for the immune pathogenesis of gout

    PubMed Central

    Schett, Georg; Schauer, Christine; Hoffmann, Markus; Herrmann, Martin

    2015-01-01

    Gout is one of the most severe and frequent rheumatic diseases. Clinical manifestations of gout arise from uric acid crystal deposition in the musculoskeletal tissue. At high concentrations of uric acid in the body (hyperuricaemia), needle-shaped monosodium urate (MSU) crystals are formed. The structures are ingested by neutrophils and monocytes and thereby trigger robust activation of the inflammasome, an intracellular protein complex mounting an inflammatory response. Inflammasome activation builds interleukin-1, which acts as a proinflammatory mediator and induces vasodilation, recruitment of additional leucocytes and the expression of proinflammatory cytokines and chemokines. This process is associated with the clinical manifestation of an acute gout attack. Such attacks, however, stop rather rapidly and the process of resolution of inflammation in gout is now better defined. Neutrophils having ingested MSU crystals undergo a specific form of cell death called NETosis, which is characterised by the formation of neutrophil extracellular traps (NETs). During this process, DNA is extruded, allowing the dense packaging of MSU crystals as well as the degradation of proinflammatory cytokines, thereby allowing the stopping of the inflammatory process. Reactive oxygen species are essential for forming NETs and for allowing the resolution of inflammation in gout. This process of NETosis is critical for understanding tophaceous gout, since tophi are composed of NETs and densely packed MSU crystals. PMID:26557370

  4. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    NASA Astrophysics Data System (ADS)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  5. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  6. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  7. Larval defense against attack from parasitoid wasps requires nociceptive neurons.

    PubMed

    Robertson, Jessica L; Tsubouchi, Asako; Tracey, W Daniel

    2013-01-01

    Parasitoid wasps are a fierce predator of Drosophila larvae. Female Leptopilina boulardi (LB) wasps use a sharp ovipositor to inject eggs into the bodies of Drosophila melanogaster larvae. The wasp then eats the Drosophila larva alive from the inside, and an adult wasp ecloses from the Drosophila pupal case instead of a fly. However, the Drosophila larvae are not defenseless as they may resist the attack of the wasps through somatosensory-triggered behavioral responses. Here we describe the full range of behaviors performed by the larval prey in immediate response to attacks by the wasps. Our results suggest that Drosophila larvae primarily sense the wasps using their mechanosensory systems. The range of behavioral responses included both "gentle touch" like responses as well as nociceptive responses. We found that the precise larval response depended on both the somatotopic location of the attack, and whether or not the larval cuticle was successfully penetrated during the course of the attack. Interestingly, nociceptive responses are more likely to be triggered by attacks in which the cuticle had been successfully penetrated by the wasp. Finally, we found that the class IV neurons, which are necessary for mechanical nociception, were also necessary for a nociceptive response to wasp attacks. Thus, the class IV neurons allow for a nociceptive behavioral response to a naturally occurring predator of Drosophila.

  8. Human behaviour can trigger large carnivore attacks in developed countries

    PubMed Central

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E.; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-01-01

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores. PMID:26838467

  9. Impact modeling and prediction of attacks on cyber targets

    NASA Astrophysics Data System (ADS)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  10. Human behaviour can trigger large carnivore attacks in developed countries.

    PubMed

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-02-03

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores.

  11. Modeling attacker-defender interactions in information networks.

    SciTech Connect

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  12. Enhancing community integrity of networks against multilevel targeted attacks

    NASA Astrophysics Data System (ADS)

    Ma, Lijia; Gong, Maoguo; Cai, Qing; Jiao, Licheng

    2013-08-01

    The community structure and the robustness are two important properties of networks for analyzing the functionality of complex systems. The community structure is crucial to understand the potential functionality of complex systems, while the robustness is indispensable to protect the functionality of complex systems from malicious attacks. When a network suffers from an unpredictable attack, its structural integrity would be damaged. Earlier studies focused on the integrity of the node structure or the edge structure when a network suffers from a single-level malicious attack on the nodes or the edges. In this study, we model the attack on the network as a two-level targeted one. Then, we propose a community robustness index to evaluate the integrality of the community structure when the network suffers from the modeled attack. The proposed index plays an important role in analyzing the ability of the real systems to resist unpredictable failures. Finally, based on the proposed community robustness index, a greedy algorithm is devised to mitigate the network attack. Experiments on three real network systems show that with minor changes in links the community robustness of networks can be greatly improved. The results also demonstrate that the community structures in the optimized networks remain practically unchanged compared with the original ones.

  13. Understanding public confidence in government to prevent terrorist attacks.

    SciTech Connect

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  14. Quantum hacking: attacking practical quantum key distribution systems

    NASA Astrophysics Data System (ADS)

    Qi, Bing; Fung, Chi-Hang Fred; Zhao, Yi; Ma, Xiongfeng; Tamaki, Kiyoshi; Chen, Christine; Lo, Hoi-Kwong

    2007-09-01

    Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfections and violate some of the assumptions in a security proof. Here, we report two types of eavesdropping attacks against a practical QKD system. The first one is "time-shift" attack, which is applicable to QKD systems with gated single photon detectors (SPDs). In this attack, the eavesdropper, Eve, exploits the time mismatch between the open windows of the two SPDs. She can acquire a significant amount of information on the final key by simply shifting the quantum signals forwards or backwards in time domain. Our experimental results in [9] with a commercial QKD system demonstrate that, under this attack, the original QKD system is breakable. This is the first experimental demonstration of a feasible attack against a commercial QKD system. This is a surprising result. The second one is "phase-remapping" attack [10]. Here, Eve exploits the fact that a practical phase modulator has a finite response time. In principle, Eve could change the encoded phase value by time-shifting the signal pulse relative to the reference pulse.

  15. Psychological distress and prejudice following terror attacks in France.

    PubMed

    Goodwin, Robin; Kaniasty, Krzysztof; Sun, Shaojing; Ben-Ezra, Menachem

    2017-03-16

    Terrorist attacks have the capacity to threaten our beliefs about the world, cause distress across populations and promote discrimination towards particular groups. We examined the impact of two different types of attacks in the same city and same year on psychological distress and probable posttraumatic stress symptoms, and the moderating effects of religion or media use on distress/posttraumatic symptoms and inter-group relations. Two panel surveys four weeks after the January 2015 Charlie Hebdo attack (N = 1981) and the November 2015 Bataclan concert hall/restaurant attacks (N = 1878), measured intrinsic religiosity, social and traditional media use, psychological distress (K6), probable posttraumatic stress symptoms (proposed ICD-11), symbolic racism and willingness to interact with Muslims by non-Muslims. Prevalence of serious mental illness (K6 score > 18) was higher after November 2015 attacks (7.0% after the first attack, 10.2% the second, χ2 (1) = 5.67, p < 0.02), as were probable posttraumatic stress symptoms (11.9% vs. 14.1%; χ2 (1) = 4.15, p < 0.04). In structural equation analyses, sex, age, geographic proximity, media use and religiosity were associated with distress, as was the interaction between event and religiosity. Distress was then associated with racism symbolism and willingness to interact with Muslims. Implications are considered for managing psychological trauma across populations, and protecting inter-group harmony.

  16. Facial injuries following hyena attack in rural eastern Ethiopia.

    PubMed

    Fell, M J; Ayalew, Y; McClenaghan, F C; McGurk, M

    2014-12-01

    Hyenas are effective hunters and will consider humans as potential prey if the need and opportunity arise. This study describes the circumstances of hyena attacks, the patterns of injuries sustained, and reconstruction in a resource-poor setting. As part of a charitable surgical mission to Ethiopia in 2012, 45 patients with facial deformities were reviewed, of whom four were victims of hyena attacks. A semi-structured interview was performed to ascertain the circumstances of the attack and the subsequent consequences. The age of the victims at the time of attack varied from 5 to 50 years. The attacks occurred when the victims were alone and vulnerable and took place in outdoor open spaces, during the evening or at night. The initial lunge was made to the facial area; if the jaws closed on the facial bones they were crushed, but in all cases the soft tissues were grasped and torn from the underlying bone. Reconstruction was dictated by the extent of soft tissue loss but could normally be obtained by use of local or regional flaps. Hyenas have been shown to attack humans in a predictable way and cause injuries that typically involve the soft tissues of the face.

  17. Severe and fatal mass attacks by 'killer' bees (Africanized honey bees--Apis mellifera scutellata) in Brazil: clinicopathological studies with measurement of serum venom concentrations.

    PubMed

    França, F O; Benvenuti, L A; Fan, H W; Dos Santos, D R; Hain, S H; Picchi-Martins, F R; Cardoso, J L; Kamiguti, A S; Theakston, R D; Warrell, D A

    1994-05-01

    In São Paulo State, Brazil, five males, aged between 8 and 64 years, were attacked by 'Africanized' honey bees (Apis mellifera scutellata). The estimated number of stings received by each patient ranged from > 200 to > 1000. All five were transferred to intensive care units in São Paulo City. Clinical features included intravascular haemolysis, respiratory distress with ARDS, hepatic dysfunction, rhabdomyolysis (with myoglobinaemia and myoglobinuria), hypertension and myocardial damage (perhaps explained by release of endogenous catecholamines by venom phospholipase A2 and mellitin), shock, coma, acute renal failure and bleeding. Laboratory findings included gross neutrophil leucocytosis, elevated serum enzymes [AST, ALT, LDH, CPK (predominantly CPK-MM)] and creatinine. Clotting times were slightly prolonged. Despite treatment with antihistamines, corticosteroids, bronchodilators, vasodilators, bicarbonate, mannitol and mechanical ventilation, three of the patients died between 22 and 71 h after the attacks, with histopathological features of ARDS, hepatocellular necrosis, acute tubular necrosis, focal subendocardial necrosis and disseminated intravascular coagulation. Whole bee venom and phospholipase A2 (PLA2) antigen concentrations were measured in serum and urine for the first time, using enzyme immunoassay. High venom and PLA2 concentrations were detected in serum and urine for more than 50 h after the stings in two fatal cases, in one of which the total circulating unbound whole venom was estimated at 27 mg, one hour after the attack. An antivenom should be developed to treat the increasing numbers of victims of mass attacks by Africanized 'killer' bees in USA, Middle and South America.

  18. Gene scanning and heart attack risk.

    PubMed

    Barth, Andreas S; Tomaselli, Gordon F

    2016-04-01

    Coronary heart disease remains the leading cause of death in the Western World. The advent of microarray and next-generation sequencing technologies has generated multi-dimensional data sets, allowing for new pathophysiological insights into this complex disease. To date, genome-wide association studies (GWAS) have identified 152 associated loci and 320 candidate genes, contributing to the genetic risk of coronary artery disease (CAD) and acute myocardial infarction (AMI). The majority of single nucleotide polymorphisms (SNPs) mediate their risk by unknown mechanisms. A functional analysis based on Gene Ontology and KEGG pathways of candidate genes that are associated with CAD/AMI-SNPs showed the strongest evidence for genes regulating cholesterol metabolism. Additional clusters were significantly enriched for pathways, which play prominent roles during AMI and the development of atherosclerotic plaques in vascular tissue, including focal adhesion/extracellular matrix interaction, TGF-β signaling, apoptosis, regulation of vascular smooth muscle contraction, angiogenesis, calcium ion binding, and transcription factors. A systems genetics approach, which incorporates genetic risk with gene expression data, metabolomic data, and protein biochemistry into genome-wide network studies, holds promise to elucidate the complex interplay between genetic risk and environmental factors for coronary artery disease.

  19. Acute gouty arthritis complicated with acute ST elevation myocardial infarction is independently associated with short- and long-term adverse non-fatal cardiac events.

    PubMed

    Liu, Kuan-Liang; Lee, Hsin-Fu; Chou, Shing-Hsien; Lin, Yen-Chen; Lin, Chia-Pin; Wang, Chun-Li; Chang, Chi-Jen; Hsu, Lung-An

    2014-01-01

    Large epidemiologic studies have associated gouty arthritis with the risk of coronary heart disease. However, there has been a lack of information regarding the outcomes for patients who have gout attacks during hospitalization for acute myocardial infarction. We reviewed the data of 444 consecutive patients who were admitted to our hospital between 2005 and 2008 due to acute ST elevation myocardial infarction (STEMI). The clinical outcomes were compared between patients with gout attack and those without. Of the 444, 48 patients with acute STEMI developed acute gouty arthritis during hospitalization. The multivariate analysis identified prior history of gout and estimated glomerular filtration rate as independent risk factors of gout attack for patients with acute STEMI (odds ratio (OR) 21.02, 95 % CI 2.96-149.26, p = 0.002; OR 0.92, 95 % CI 0.86-0.99, p = 0.035, respectively). The in-hospital mortality and duration of hospital stay did not differ significantly between the gouty group and the non-gouty group (controls). During a mean follow-up of 49 ± 28 months, all-cause mortality and stroke were similar for both groups. Multivariate Cox regression showed that gout attack was independently associated with short- and long-term adverse non-fatal cardiac events (hazard ratio (HR) 1.88, 95 % CI 1.09-3.24, p = 0.024; HR 1.82, 95 % CI 1.09-3.03, p = 0.022, respectively). Gout attack among patients hospitalized due to acute STEMI was independently associated with short-term and long-term rates of adverse non-fatal cardiac events.

  20. Being, thinking, creating: when war attacks the setting and the transference counter-attacks.

    PubMed

    Khair Badawi, Marie-Thérèse; Badawi, Marie-Thérèse Khair

    2011-04-01

    When trauma enters into the reality of the analyst and of the analysand, when it attacks the setting, what becomes of the analyst's role? How can transformations be brought about? With reference to three clinical situations, the author attempts to explore how the articulation between transference and countertransference - the inter-relation - structures the situation; the analyst must remain in his or her role as analyst through managing to create and to reflect upon the clinical aspects of that situation when faced with the unpredictability of what war brings in its wake. It then becomes possible to see how the work of the negative can be confined to the outer limits of the setting.

  1. TMA Payload, Field Services and Data Reduction - HAES No. 17

    DTIC Science & Technology

    1975-02-01

    Northward component of winds for flight DN-7021 8 3 Hodograph of winds for flight DN-7021 9 4 Eastward component of winds for flight A10.216-3 12 5 Northward...component of winds for flight A10.216-3 13 6 Hodograph of winds for flight AI0.216-3 14 Table 1 LOCATION OF PHOTOGRAPHIC SITES 3 2 WIND COMPONENTS...the northward wind. Figure 6 presents the winds in the form of a hodogr~ih. Numbers adjacent to points on the hodograph Indicate the altitude. The

  2. Factors governing risk of cougar attacks on humans

    USGS Publications Warehouse

    Mattson, David; Logan, Kenneth; Sweanor, Linda

    2011-01-01

    Since the 1980s wildlife managers in the United States and Canada have expressed increasing concern about the physical threat posed by cougars (Puma concolor) to humans. We developed a conceptual framework and analyzed 386 human–cougar encounters (29 fatal attacks, 171 instances of nonfatal contact, and 186 close-threatening encounters) to provide information relevant to public safety. We conceived of human injury and death as the outcome of 4 transitions affected by different suites of factors: (1) a human encountering a cougar: (2) given an encounter, odds that the cougar would be aggressive; (3) given aggression, odds that the cougar would attack; and (4) given an attack, odds that the human would die. We developed multivariable logistic regression models to explain variation in odds at transitions three and four using variables pertaining to characteristics of involved people and cougars. Young (≤ 2.5 years) or unhealthy (by weight, condition, or disease) cougars were more likely than any others to be involved in close (typically <5 m) encounters that threatened the involved person. Of cougars in close encounters, females were more likely than males to attack, and of attacking animals, adults were more likely than juveniles to kill the victim (32% versus 9% fatality, respectively). During close encounters, victims who used a weapon killed the involved cougar in 82% of cases. Other mitigating behaviors (e.g., yelling, backing away, throwing objects, increasing stature) also substantially lessened odds of attack. People who were moving quickly or erratically when an encounter happened (running, playing, skiing, snowshoeing, biking, ATV-riding) were more likely to be attacked and killed compared to people who were less active (25% versus 8% fatality). Children (≤ 10 years) were more likely than single adults to be attacked, but intervention by people of any age reduced odds of a child’s death by 4.6×. Overall, cougar attacks on people in Canada and the

  3. Current state of hereditary angioedema management: a patient survey.

    PubMed

    Banerji, Aleena; Busse, Paula; Christiansen, Sandra C; Li, Henry; Lumry, William; Davis-Lorton, Mark; Bernstein, Jonathan A; Frank, Michael; Castaldo, Anthony; Long, Janet F; Zuraw, Bruce L; Riedl, Marc

    2015-01-01

    Hereditary angioedema (HAE) is a chronic disease with a high burden of disease that is poorly understood and often misdiagnosed. Availability of treatments, including C1 esterase inhibitor (C1INH) replacement, ecallantide, and icatibant, marks a significant advance for HAE patients. We aimed to better understand the current state of HAE care, from a patient perspective, after the introduction of several novel therapies. One session of the United States Hereditary Angioedema Association 2013 patient summit was devoted to data collection for this study. Patients attending the summit were self-selected, and HAE diagnosis was self-reported. Survey questions assessed patient characteristics, burden of disease, and treatment. Participant responses were captured using an audience response system. We surveyed 149 (80%) type I and II HAE (HAE-C1INH) and 37 (20%) HAE with normal C1INH (HAE-nlC1INH) patients. HAE-C1INH (72%) and HAE-nlCINH patients (76%) equally reported that HAE had a significant impact on quality of life (QOL). A third of HAE-C1INH patients were diagnosed within one year of their first HAE attack, but another third reported a delay of more than 10 years. Most HAE-C1INH (88%) and HAE-nlC1INH (76%) patients had on-demand treatment available. HAE-C1INH patients frequently had an individual treatment plan (76%) compared with 50% of HAE-nlC1INH patients. Most HAE-C1INH patients went to the emergency department (ED) or were hospitalized less than once every six months (80%). Our findings show that HAE management is improving with good access to on-demand and prophylactic treatment options. However, HAE patients still have a significant burden of disease and continued research and educational efforts are needed.

  4. Current state of hereditary angioedema management: A patient survey

    PubMed Central

    Busse, Paula; Christiansen, Sandra C.; Li, Henry; Lumry, William; Davis-Lorton, Mark; Bernstein, Jonathan A.; Frank, Michael; Castaldo, Anthony; Long, Janet F.; Zuraw, Bruce L.; Riedl, Marc

    2015-01-01

    Hereditary angioedema (HAE) is a chronic disease with a high burden of disease that is poorly understood and often misdiagnosed. Availability of treatments, including C1 esterase inhibitor (C1INH) replacement, ecallantide, and icatibant, marks a significant advance for HAE patients. We aimed to better understand the current state of HAE care, from a patient perspective, after the introduction of several novel therapies. One session of the United States Hereditary Angioedema Association 2013 patient summit was devoted to data collection for this study. Patients attending the summit were self-selected, and HAE diagnosis was self-reported. Survey questions assessed patient characteristics, burden of disease, and treatment. Participant responses were captured using an audience response system. We surveyed 149 (80%) type I and II HAE (HAE-C1INH) and 37 (20%) HAE with normal C1INH (HAE-nlC1INH) patients. HAE-C1INH (72%) and HAE-nlCINH patients (76%) equally reported that HAE had a significant impact on quality of life (QOL). A third of HAE-C1INH patients were diagnosed within one year of their first HAE attack, but another third reported a delay of more than 10 years. Most HAE-C1INH (88%) and HAE-nlC1INH (76%) patients had on-demand treatment available. HAE-C1INH patients frequently had an individual treatment plan (76%) compared with 50% of HAE-nlC1INH patients. Most HAE-C1INH patients went to the emergency department (ED) or were hospitalized less than once every six months (80%). Our findings show that HAE management is improving with good access to on-demand and prophylactic treatment options. However, HAE patients still have a significant burden of disease and continued research and educational efforts are needed. PMID:25976438

  5. Two seconds is all it takes: European starlings (Sturnus vulgaris) increase levels of circulating glucocorticoids after witnessing a brief raptor attack.

    PubMed

    Jones, Blake C; Smith, Adam D; Bebus, Sara E; Schoech, Stephan J

    2016-02-01

    Researchers typically study "acute" activation of the hypothalamic-pituitary-adrenal (HPA) axis by measuring levels of circulating glucocorticoids in animals that have been exposed to a predator or a cue from a predator (e.g., odor), or have experienced a standardized capture-and-restraint protocol, all of which are many minutes in duration. However, exposure to predators in the "wild", either as the subject of an attack or as a witness to an attack, is generally much shorter as most depredation attempts upon free-living animals last <5s. Yet, whether a stimulus lasting only seconds can activate the HPA axis is unknown. To determine if a stimulus of a few seconds triggers a glucocorticoid response, we measured levels of corticosterone (CORT; the primary avian glucocorticoid) in wild-caught European starlings (Sturnus vulgaris) after they witnessed a brief (<2-8s) raptor attack upon a conspecific, a human "attack" (i.e., a researcher handling a conspecific), and an undisturbed control. Witnesses of a raptor attack responded with CORT levels comparable to that induced by a standardized capture-and-restraint protocol. Glucocorticoid levels of individuals following the control treatment were similar to baseline levels, and those that witnessed a human "attack" had intermediate levels. Our results demonstrate that witnessing a predator attack of very brief duration triggers a profound adrenocortical stress response. Given the considerable evidence of a role for glucocorticoids in learning and memory, such a response may affect how individuals learn to recognize and appropriately react to predators.

  6. The role of host tree condition in attack of white oaks by the twolined chestnut borer, Agrilus bilineatus (Weber) (Coleoptera: Buprestidae).

    PubMed

    Dunn, James P; Kimmerer, Thomas W; Nordin, Gerald L

    1986-11-01

    The twolined chestnut borer, Agrilus bilineatus (Weber) (Coleoptera: Buprestidae), attacks stressed oaks (Quercus spp.) and is associated with extensive mortality of trees in the eastern deciduous forests of North America. We examined host location by the insect and subsequent host mortality in experimentally stressed trees. A. bilineatus adults were able to rapidly and specifically locate stressed oak trees. Up to 160 beetles per week were captured on sticky band traps on the trunks of stressed trees, while beetles rarely landed on unstressed control trees. This suggests that adult borers have an acute perception of host tree "quality", and that this perception is from a distance. One mechanism of host location may be detection of volatile compounds produced by stressed trees.The condition of the host tree appears to regulate both beetle attraction and successful colonization. Mortally wounded (xylem-girdled) trees attracted beetles only until the cambium died. Xylem-girdled trees were attacked early in the beetle flight season, but larvae did not survive to emerge as adults from these trees. In contrast, phloemgirdled trees continued to attract beetles throughout the flight period. Phloem-girdled trees which were heavily attacked by A. bilineatus died late in the season in which they were attacked. Lightly attacked trees survived until the following growing season, and were then heavily attacked and killed. In one stand, phloem-girdled trees were not attacked, healed over the girdling wounds and were still alive three years after girdling. These results indicate that oak trees are only attractive to A. bilineatus within a narrow range of physiological conditions following stress but prior to mortality. A. bilineatus appears to be a proximate agent of mortality in stressed oaks in eastern North America.

  7. Attacks, applications, and evaluation of known watermarking algorithms with Checkmark

    NASA Astrophysics Data System (ADS)

    Meerwald, Peter; Pereira, Shelby

    2002-04-01

    The Checkmark benchmarking tool was introduced to provide a framework for application-oriented evaluation of watermarking schemes. In this article we introduce new attacks and applications into the existing Checkmark framework. In addition to describing new attacks and applications, we also compare the performance of some well-known watermarking algorithms (proposed by Bruyndonckx,Cox, Fridrich, Dugad, Kim, Wang, Xia, Xie, Zhu and Pereira) with respect to the Checkmark benchmark. In particular, we consider the non-geometric application which contains tests that do not change the geometry of image. This attack constraint is artificial, but yet important for research purposes since a number of algorithms may be interesting, but would score poorly with respect to specific applications simply because geometric compensation has not been incorporated. We note, however, that with the help of image registration, even research algorithms that do not have counter-measures against geometric distortion -- such as a template or reference watermark -- can be evaluated. In the first version of the Checkmark benchmarking program, application-oriented evaluation was introduced, along with many new attacks not already considered in the literature. A second goal of this paper is to introduce new attacks and new applications into the Checkmark framework. In particular, we introduce the following new applications: video frame watermarking, medical imaging and watermarking of logos. Video frame watermarking includes low compression attacks and distortions which warp the edges of the video as well as general projective transformations which may result from someone filming the screen at a cinema. With respect to medical imaging, only small distortions are considered and furthermore it is essential that no distortions are present at embedding. Finally for logos, we consider images of small sizes and particularly compression, scaling, aspect ratio and other small distortions. The challenge

  8. [Acute paraphrenic states in the clinical presentation of attack-like schizophrenia].

    PubMed

    Subbotskaya, N V

    2015-01-01

    Цель исследования — изучение психопатологической структуры острого парафренного синдрома при разных вариантах течения шизофрении. Материал и методы. Проведено обследование 60 больных. Результаты и обсуждение. Выделено три варианта острого парафренного синдрома: с доминированием чувственного бреда, с доминированием проявлений синдрома Кандинского—Клерамбо и с доминированием конфабуляторных расстройств. Установлено, что для рекуррентной шизофрении характерно развитие острого парафренного синдрома с чувственным бредом, для близкой к вялотекущей приступообразно-прогредиентной шизофрении — развитие острого парафренного синдрома с чувственным бредом в сочетании с интерпретативным, для близкой к юношеской злокачественной приступообразно-прогредиентной шизофрении — развитие острого парафренного синдрома с преобладанием синдрома Кандинского—Клерамбо и чувственных форм бреда, для близкой к параноидной приступообразно-прогредиентной шизофрении наиболее характерно развитие острого парафренного синдрома с преобладанием синдрома Кандинского—Клерамбо и острого парафренного синдрома с конфабуляторными расстройствами. Подтверждена нозологическая специфичность острого парафренного синдрома при приступообразно-прогредиентной шизофрении.

  9. Acute recurrent pancreatitis: An autoimmune disease?

    PubMed Central

    Pezzilli, Raffaele

    2008-01-01

    In this review article, we will briefly describe the main characteristics of autoimmune pancreatitis and then we will concentrate on our aim, namely, evaluating the clinical characteristics of patients having recurrence of pain from the disease. In fact, the open question is to evaluate the possible presence of autoimmune pancreatitis in patients with an undefined etiology of acute pancreatitis and for this reason we carried out a search in the literature in order to explore this issue. In cases of recurrent attacks of pain in patients with “diopathic”pancreatitis, we need to keep in mind the possibility that our patients may have autoimmune pancreatitis. Even though the frequency of this disease seems to be quite low, we believe that in the future, by increasing our knowledge on the subject, we will be able to diagnose an ever-increasing number of patients having acute recurrence of pain from autoimmune pancreatitis. PMID:18286678

  10. Treatment for acute asthma in the Emergency Department: practical aspects.

    PubMed

    Urso, D L

    2010-03-01

    This article describes the management of acute asthma exacerbation in the Emergency Department (ED). An asthma exacerbation can be defined as clinical worsening of disease or an asymptomatic decrease in peak flows. Acute exacerbations of asthma may represent reactions to airway irritants or failures of chronic treatment. Hospitalizations and ED visits account for a large proportion of the health-care cost burden of asthma. The assessment of an asthma exacerbation constitutes a process with two different dimensions: to determine the severity of attack, and to evaluate the response to treatment. The principal goals of managing an asthma acute exacerbation may be summarized as maintenance of adequate arterial oxygen saturation with supplemental oxygen, relief of airflow obstruction with repetitive administration of short acting beta-2 agonists (SABA), and treatment of airway inflammation with systemic corticosteroids (CS) to prevent future relapses. SABA, oxygen, and CS form the basis of management of acute asthma exacerbation but a role is emerging for anthicolinergics.

  11. Capacity and optimal collusion attack channels for Gaussian fingerprinting games

    NASA Astrophysics Data System (ADS)

    Wang, Ying; Moulin, Pierre

    2007-02-01

    In content fingerprinting, the same media covertext - image, video, audio, or text - is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to "remove" their fingerprints and forge a pirated copy. To trace the forgery back to members of the coalition, we need fingerprinting codes that can reliably identify the fingerprints of those members. Researchers have been focusing on designing or testing fingerprints for Gaussian host signals and the mean square error (MSE) distortion under some classes of collusion attacks, in terms of the detector's error probability in detecting collusion members. For example, under the assumptions of Gaussian fingerprints and Gaussian attacks (the fingerprinted signals are averaged and then the result is passed through a Gaussian test channel), Moulin and Briassouli1 derived optimal strategies in a game-theoretic framework that uses the detector's error probability as the performance measure for a binary decision problem (whether a user participates in the collusion attack or not); Stone2 and Zhao et al. 3 studied average and other non-linear collusion attacks for Gaussian-like fingerprints; Wang et al. 4 stated that the average collusion attack is the most efficient one for orthogonal fingerprints; Kiyavash and Moulin 5 derived a mathematical proof of the optimality of the average collusion attack under some assumptions. In this paper, we also consider Gaussian cover signals, the MSE distortion, and memoryless collusion attacks. We do not make any assumption about the fingerprinting codes used other than an embedding distortion constraint. Also, our only assumptions about the attack channel are an expected distortion constraint, a memoryless constraint, and a fairness constraint. That is, the colluders are allowed to use any arbitrary nonlinear strategy subject to the above

  12. Learn What a Heart Attack Feels Like--It Could Save Your Life

    MedlinePlus

    Learn What a Heart Attack Feels Like— It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do ... your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all ...

  13. Acute laminitis.

    PubMed

    Baxter, G M

    1994-12-01

    Laminitis is an inflammation of the sensitive laminae along the dorsal aspect of the digit and is considered to be a secondary complication of several predisposing or primary factors. Affected horses are usually very lame, have increased digital pulses, are painful to hoof testers along the toe of the foot, and have evidence of downward rotation or distal displacement of the distal phalanx present on radiographs. Treatments for acute laminitis include anti-inflammatory drugs, anti-endotoxin therapy, vasodilators, antithrombotic therapy, corrective trimming and shoeing, and surgical procedures. Treatment regimens are very controversial and the true efficacy of these treatments is unknown. The quality of laminae damage that occurs with laminitis, however, probably has greater influence on the success of treatment and outcome of the horse than the treatment regimen itself.

  14. Vulnerability of complex networks under three-level-tree attacks

    NASA Astrophysics Data System (ADS)

    Hao, Yao-hui; Han, Ji-hong; Lin, Yi; Liu, Lin

    2016-11-01

    We investigate vulnerability of complex networks including model networks and real world networks subject to three-level-tree attack. Specifically, we remove three different three-level-tree structures: RRN (Random Root Node), MaxDRN (Max Degree Root Node) and MinDRN (Min Degree Root Node) from a network iteratively until there is no three-level-tree left. Results demonstrate that random network is more robust than scale-free network against three tree attacks, and the robustness of random network decreases as the < k > increases. And scale-free network shows different characteristics in different tree attack modes. The robustness of scale-free is not affected by the < k > parameters for RRN, but increases as the < k > increases for MinDRN. The important thing is that MaxDRN is the most effective in the three tree attack modes, especially for scale-free network. These findings supplement and extend the previous attack results on nodes and edges, and can thus help us better explain the vulnerability of different networks, and provide an insight into more tolerant real complex systems design.

  15. Risk of Wheezing Attacks in Infants With Transient Tachypnea Newborns

    PubMed Central

    Golshantafti, Mohammad; Yavari, Tahereh; Afrand, Mohammadhosain

    2016-01-01

    Background: The most common reason of respiratory distress in the newborn is transient tachypnea of the newborn (TTN). There are some reports saying that TTN is associated with increased frequencies of wheezing attacks. Objectives: The aims of this study were to determine the risk factors associated with TTN and to determine the association between TTN and the development of wheezing syndromes in early life. Materials and Methods: In a historical cohort study, we recorded the characteristics of 70 infants born at the Shohadaye Kargar Hospital in Yazd between March 2005 and March 2009 and who were hospitalized because of TTN in the neonatal intensive-care unit. We called their parents at least four years after the infants were discharged from the hospital and asked about any wheezing attacks. Seventy other infants with no health problems during the newborn period were included in the study as the control group. Results: The rate of wheezing attacks in newborns with TTN was more than patients with no TTN diagnosis (P = 0.014). TTN was found to be an independent risk factor for later wheezing attacks (relative risk [RR] = 2.8). Conclusions: The most obvious finding of this study was that TTN was an independent risk factor for wheezing attacks. So long-term medical care is suggested for these patients who may be at risk, because TTN may not be as transient as has been previously thought. PMID:26848370

  16. Marital history and survival after a heart attack.

    PubMed

    Dupre, Matthew E; Nelson, Alicia

    2016-12-01

    Heart disease is the leading cause of death in the United States and nearly one million Americans will have a heart attack this year. Although the risks associated with a heart attack are well established, we know surprisingly little about how marital factors contribute to survival in adults afflicted with heart disease. This study uses a life course perspective and longitudinal data from the Health and Retirement Study to examine how various dimensions of marital life influence survival in U.S. older adults who suffered a heart attack (n = 2197). We found that adults who were never married (odds ratio [OR] = 1.73), currently divorced (OR = 1.70), or widowed (OR = 1.34) were at significantly greater risk of dying after a heart attack than adults who were continuously married; and the risks were not uniform over time. We also found that the risk of dying increased by 12% for every additional marital loss and decreased by 7% for every one-tenth increase in the proportion of years married. After accounting for more than a dozen socioeconomic, psychosocial, behavioral, and physiological factors, we found that current marital status remained the most robust indicator of survival following a heart attack. The implications of the findings are discussed in the context of life course inequalities in chronic disease and directions for future research.

  17. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks

    NASA Astrophysics Data System (ADS)

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-09-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.

  18. Deterring watermark collusion attacks using signal processing techniques

    NASA Astrophysics Data System (ADS)

    Lemma, Aweke N.; van der Veen, Michiel

    2007-02-01

    Collusion attack is a malicious watermark removal attack in which the hacker has access to multiple copies of the same content with different watermarks and tries to remove the watermark using averaging. In the literature, several solutions to collusion attacks have been reported. The main stream solutions aim at designing watermark codes that are inherently resistant to collusion attacks. The other approaches propose signal processing based solutions that aim at modifying the watermarked signals in such a way that averaging multiple copies of the content leads to a significant degradation of the content quality. In this paper, we present signal processing based technique that may be deployed for deterring collusion attacks. We formulate the problem in the context of electronic music distribution where the content is generally available in the compressed domain. Thus, we first extend the collusion resistance principles to bit stream signals and secondly present experimental based analysis to estimate a bound on the maximum number of modified versions of a content that satisfy good perceptibility requirement on one hand and destructive averaging property on the other hand.

  19. Gait biometrics under spoofing attacks: an experimental investigation

    NASA Astrophysics Data System (ADS)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  20. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks

    PubMed Central

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-01-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems. PMID:27609483

  1. Robustness of Controllability for Networks Based on Edge-Attack

    PubMed Central

    Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong

    2014-01-01

    We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components. PMID:24586507

  2. Automatic analysis of attack data from distributed honeypot network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Voznak, MIroslav; Rezac, Filip; Partila, Pavol; Tomala, Karel

    2013-05-01

    There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server communicates only with authorized honeypots. The centralized server also automatically analyses data from each honeypot. Results of this analysis and also other statistical data about malicious activity are simply accessible through a built-in web server. All statistical and analysis reports serve as information basis for an algorithm which classifies different types of used VoIP attacks. The web interface then brings a tool for quick comparison and evaluation of actual attacks in all monitored networks. The article describes both, the honeypots nodes in distributed architecture, which monitor suspicious activity, and also methods and algorithms used on the server side for analysis of gathered data.

  3. Studies of the vicarious traumatization of college students by the September 11th attacks: effects of proximity, exposure and connectedness.

    PubMed

    Blanchard, Edward B; Kuhn, Eric; Rowell, Dianna L; Hickling, Edward J; Wittrock, David; Rogers, Rebecca L; Johnson, Michelle R; Steckler, Debra C

    2004-02-01

    From mid-October 2001 through the end of November 2001, we collected fairly large sets of questionnaires from undergraduates at three public universities (Albany, NY, n = 507, Augusta, GA, n = 336, Fargo, ND, n = 526 ) to assess rate of acute stress disorder (ASD) and level of ASD symptoms following the September 11th attacks, rate of current posttraumatic stress disorder (PTSD) and level of PTSD symptoms, and current level of depressive symptoms resulting from the September 11th attacks. We also gathered information on exposure to media coverage of the attacks, connectedness to the World Trade Center (WTC) and personnel there, and degree of engagement in reparative acts such as giving blood, attending vigils. We found higher levels of ASD, ASD symptoms, PTSD and PTSD symptoms as a function of geographical proximity to New York City (and within the Albany site, proximity of students' homes) and gender. Exposure (hours of TV watched) was a predictor in some instances as was connectedness to WTC victims. ASD symptoms were the strongest predictor of subsequent PTSD symptoms. Path models accounted for over 60% of the variance in PTSD symptoms.

  4. Assessing and Managing All Aspects of Migraine: Migraine Attacks, Migraine-Related Functional Impairment, Common Comorbidities, and Quality of Life

    PubMed Central

    Buse, Dawn C.; Rupnow, Marcia F. T.; Lipton, Richard B.

    2009-01-01

    Migraine can be characterized as a chronic disorder with episodic attacks and the potential for progression to chronic migraine. We conducted a PubMed literature search (January 1, 1970 through May 31, 2008) for studies on the impact of migraine, including disability, health-related quality of life (HRQoL), comorbidities, and instruments used by health care professionals to treat patients with migraine. Numerous studies have shown that migraine substantially impairs a person's functions during attacks and diminishes HRQoL during and between attacks. Despite its impact, migraine remains underestimated, underdiagnosed, and undertreated. Several tools are available to help physicians assess the impact of migraine on the daily activities and HRQoL of their patients, such as the 36-Item Short-Form Health Survey and the Headache Impact Test. Improving communication during the office visit through active listening, use of open-ended questions, and use of the “ask-tell-ask” strategy can also help in assessing migraine-related impairment. Together, these tools and communication techniques can lead to a more complete assessment of how migraine affects patients' lives and can aid in the development of the optimal treatment plan for each patient. Both pharmacotherapy (acute and preventive treatment strategies) and nonpharmacological therapies play important roles in the management of migraine. PMID:19411439

  5. Alcohol consumption in patients with acute or chronic pancreatitis.

    PubMed

    Sand, J; Lankisch, P G; Nordback, I

    2007-01-01

    Understanding of the relation between the alcoholic consumption and the development of pancreatitis should help in defining the alcoholic etiology of pancreatitis. Although the association between alcohol consumption and pancreatitis has been recognized for over 100 years, it remains still unclear why some alcoholics develop pancreatitis and some do not. Surprisingly little data are available about alcohol amounts, drinking patterns, type of alcohol consumed and other habits such as dietary habits or smoking in respect to pancreatitis preceding the attack of acute pancreatitis or the time of the diagnosis of chronic pancreatitis. This review summarizes the current knowledge. Epidemiological studies clearly show connection between the alcohol consumption in population and the development of acute and chronic pancreatitis. In the individual level the risk to develop either acute or chronic pancreatitis increases along with the alcohol consumption. Moreover, the risk for recurrent acute pancreatitis after the first acute pancreatitis episode seems also to be highly dependent on the level of alcohol consumption. Abstaining from alcohol may prohibit recurrent acute pancreatitis and reduce pain in chronic pancreatitis. Therefore, all the attempts to decrease alcohol consumption after acute pancreatitis and even after the diagnosis of chronic pancreatitis should be encouraged. Smoking seems to be a remarkable co-factor together with alcohol in the development of chronic pancreatitis, whereas no hard data are available for this association in acute pancreatitis. Setting the limits for accepting the alcohol as the etiology cannot currently be based on published data, but rather on the 'political' agreement.

  6. Incidence of Stroke and Transient Ischemic Attack in Croatia: A Population Based Study.

    PubMed

    Kadojić, Dragutin; Demarin, Vida; Dikanović, Marinko; Lusić, Ivo; Tuskan-Mohar, Lidija; Trkanjec, Zlatko; Mihaljević, Ivan; Kadojić, Mira; Bitunjac, Milan; Vranjes, Zeljko

    2015-09-01

    The aim of this population based neuroepidemiological study was to establish the real incidence rates of acute cerebrovascular disease (CVD): stroke and transient ischemic attack (TIA) in the Republic of Croatia. Multicentric study included 89 501 persons of all ages in four regional centres in Croatia: Zagreb, Osijek + Slavonski Brod, Rijeka and Split. The following incidence rates of stroke, expressed at population of 100 000, have been established: Zagreb 290.52, Osijek + Slavonski Brod 302.14, Rijeka 219.65, Split 195.82. Incidence rate of stroke for the Republic of Croatia is 251.39. The following incidence rates of TIA, expressed at population of 100,000, have been established: Zagreb 87.15, Osijek + Slavonski Brod 156.53, Rijeka 90.11, Split 59.10. Incidence rate of TIA for the Republic of Croatia is 100.55. In the continental part of Croatia (Zagreb, Osijek + Slavonski Brod) incidence rate of stroke is higher by 45%, while incidence rate of TIA is higher by 82% than in the coastal part of Croatia, probably due to different lifestyle and environmental factors. The study has shown relatively high incidence rates of acute CVD (stroke and TIA) in the Republic of Croatia, which proves that CVD are a great public health problem.

  7. Cerebrovascular adaptations to cocaine-induced transient ischemic attacks in the rodent brain

    PubMed Central

    You, Jiang; Volkow, Nora D.; Park, Kicheon; Zhang, Qiujia; Clare, Kevin; Du, Congwu

    2017-01-01

    Occurrence of transient ischemic attacks (TIA) and cerebral strokes is a recognized risk associated with cocaine abuse. Here, we use a rodent model along with optical imaging to study cocaine-induced TIA and the associated dynamic changes in cerebral blood flow velocity (CBFv) and cerebrovasculature. We show that chronic cocaine exposure in mice resulted in marked cortical hypoperfusion, in significant arterial and venous vasoconstriction, and in a sensitized vascular response to an acute cocaine injection. Starting after 10 days of exposure, an acute cocaine challenge to these mice resulted in a TIA, which presented as hemiparalysis and was associated with an abrupt exacerbation of CBFv. The severity of the TIA correlated with the decreases in cortical CBFv such that the greater the decreases in flow, the longer the TIA duration. The severity of TIA peaked around 17–22 days of cocaine exposure and decreased thereafter in parallel to a reorganization of CBFv from superficial to deep cortical layers, along with an increase in vessel density into these layers. Here, we document for the first time to our knowledge evidence of a TIA in an animal model of chronic cocaine exposure that was associated with profound decreases in CBFv, and we revealed that while the severity of the TIA initially increased with repeated exposures, it subsequently improved in parallel to an increase in the vessel density. This suggests that strategies to accelerate cerebrovascular recovery might be therapeutically beneficial in cocaine abusers. PMID:28289715

  8. Precipitation of asthma attacks in Melanesian adults by sodium metabisulphite.

    PubMed

    Timberlake, C M; Toun, A K; Hudson, B J

    1992-09-01

    Seven Melanesian asthmatic patients were challenged with substances that have been shown to precipitate asthma attacks in asthma patients in developed countries. Patients were challenged in a double-blind fashion using placebo and active substances. The active substances were tartrazine, sodium metabisulphite, aspirin and betel nut. All 7 patients were challenged with tartrazine and sodium metabisulphite; 5 were challenged with aspirin also, but only 2 were challenged with betel nut. Asthma attacks were precipitated by sodium metabisulphite in 3 patients. No other substances precipitated asthma. As sodium metabisulphite is a common food additive, these results suggest that processed foods introduced into developing countries may have an important role in precipitating asthma attacks in susceptible persons.

  9. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    SciTech Connect

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo'; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-09-10

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  10. A Model of Biological Attacks on a Realistic Population

    NASA Astrophysics Data System (ADS)

    Carley, Kathleen M.; Fridsma, Douglas; Casman, Elizabeth; Altman, Neal; Chen, Li-Chiou; Kaminsky, Boris; Nave, Demian; Yahja, Alex

    The capability to assess the impacts of large-scale biological attacks and the efficacy of containment policies is critical and requires knowledge-intensive reasoning about social response and disease transmission within a complex social system. There is a close linkage among social networks, transportation networks, disease spread, and early detection. Spatial dimensions related to public gathering places such as hospitals, nursing homes, and restaurants, can play a major role in epidemics [Klovdahl et. al. 2001]. Like natural epidemics, bioterrorist attacks unfold within spatially defined, complex social systems, and the societal and networked response can have profound effects on their outcome. This paper focuses on bioterrorist attacks, but the model has been applied to emergent and familiar diseases as well.

  11. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.

    PubMed

    Albahar, Marwan

    2017-01-05

    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.

  12. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    PubMed Central

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas; Vécsei, László; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-01-01

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation. PMID:24039694

  13. Conservation biology: lion attacks on humans in Tanzania.

    PubMed

    Packer, Craig; Ikanda, Dennis; Kissui, Bernard; Kushnir, Hadas

    2005-08-18

    Large carnivores inspire opposition to conservation efforts owing to their impact on livestock and human safety. Here we analyse the pattern of lion attacks over the past 15 years on humans in Tanzania, which has the largest population of lions in Africa, and find that they have killed more than 563 Tanzanians since 1990 and injured at least 308. Attacks have increased dramatically during this time: they peak at harvest time each year and are most frequent in areas with few prey apart from bush pigs (Potamochoerus larvatus), the most common nocturnal crop pest. Our findings provide an important starting point for devising strategies to reduce the risk to rural Tanzanians of lion attacks.

  14. Countermeasure against tailored bright illumination attack for DPS-QKD.

    PubMed

    Honjo, Toshimori; Fujiwara, Mikio; Shimizu, Kaoru; Tamaki, Kiyoshi; Miki, Shigehito; Yamashita, Taro; Terai, Hirotaka; Wang, Zhen; Sasaki, Masahide

    2013-02-11

    We propose a countermeasure against the so-called tailored bright illumination attack for differential-phase-shift QKD (DPS-QKD). By monitoring a rate of coincidence detection at a pair of superconducting nanowire single-photon detectors (SSPDs) which is connected at each of the output ports of Bob's Mach-Zehnder interferometer, Alice and Bob can detect and defeat this kind of attack. We also experimentally confirmed the feasibility of this countermeasure using our 1 GHz-clocked DPS-QKD system. In the emulation of the attack, we achieved much lower power of the bright illumination light compared with the original demonstration by using a pulse stream instead of broad pulses.

  15. Aerodynamic characteristics of airplanes at high angles of attack

    NASA Technical Reports Server (NTRS)

    Chambers, J. R.; Grafton, S. B.

    1977-01-01

    An introduction to, and a broad overiew of, the aerodynamic characteristics of airplanes at high angles of attack are provided. Items include: (1) some important fundamental phenomena which determine the aerodynamic characteristics of airplanes at high angles of attack; (2) static and dynamic aerodynamic characteristics near the stall; (3) aerodynamics of the spin; (4) test techniques used in stall/spin studies; (5) applications of aerodynamic data to problems in flight dynamics in the stall/spin area; and (6) the outlook for future research in the area. Although stalling and spinning are flight dynamic problems of importance to all aircraft, including general aviation aircraft, commercial transports, and military airplanes, emphasis is placed on military configurations and the principle aerodynamic factors which influence the stability and control of such vehicles at high angles of attack.

  16. [Fauna attacks in French Guiana: retrospective 4-year analysis].

    PubMed

    Mimeau, E; Chesneau, P

    2006-02-01

    The rich, diversified fauna of French Guiana has an infamous reputation for its aggressiveness. A retrospective analysis of the records the SAMU emergency service in Guiana showed that less than 1% of phone calls received between 1998 and 2001 involved fauna attacks. Most of these calls involved flying hymenoptera (36.9%), snakes (15.6 %), dogs (13.8%), and scorpions (9.8%). In 69 of 666 cases, the attack was severe enough to warrant dispatching a SMUR intensive mobile care unit. These cases involved poisonous snake bites (n=35), flying hymenoptera stings (n=24) and scorpion stings (n=5). Although this study presents numerous confounding factors, its findings indicate that the risk of fauna attacks in French Guiana may be overestimated.

  17. Defending networks against denial-of-service attacks

    NASA Astrophysics Data System (ADS)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  18. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    SciTech Connect

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4

  19. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  20. Grievous Temporal and Occipital Injury Caused by a Bear Attack

    PubMed Central

    Thada, Nikhil Dinaker; Rao, Pallavi; Thada, Smitha Rani; Prasad, Kishore Chandra

    2013-01-01

    Bear attacks are reported from nearly every part of the world. The chance of a human encountering a bear increases as the remote bear territory diminishes. The sloth bear is one of the three species of bears found in India, which inhabits the forests of India and its neighboring countries. Here we describe a teenager who came to us with a critical injury involving the face, temporal and occipital bones inflicted by a sloth bear attack. He underwent a temporal exploration, facial nerve decompression, pinna reconstruction, and occipital bone repair to save him from fatality. PMID:24396623

  1. Jaguar Attack on a Child: Case Report and Literature Review

    PubMed Central

    Iserson, Kenneth V.; Francis, Adama M.

    2015-01-01

    Jaguar attacks on humans rarely occur in the wild. When they do, they are often fatal. We describe a jaguar attack on a three-year-old girl near her home deep in a remote area of the Guyanese jungle. The patient had a complex but, relatively, rapid transport to a medical treatment facility for her life-threatening injuries. The child, who suffered typical jaguar-inflicted injury patterns and survived, is highlighted. We review jaguar anatomy, environmental status, hunting and killing behaviors, and discuss optimal medical management, given the resource-limited treatment environment of this international emergency medicine case. PMID:25834674

  2. Patrol Detection for Replica Attacks on Wireless Sensor Networks

    PubMed Central

    Wang, Liang-Min; Shi, Yang

    2011-01-01

    Replica attack is a critical concern in the security of wireless sensor networks. We employ mobile nodes as patrollers to detect replicas distributed in different zones in a network, in which a basic patrol detection protocol and two detection algorithms for stationary and mobile modes are presented. Then we perform security analysis to discuss the defense strategies against the possible attacks on the proposed detection protocol. Moreover, we show the advantages of the proposed protocol by discussing and comparing the communication cost and detection probability with some existing methods. PMID:22163752

  3. Jaguar attack on a child: case report and literature review.

    PubMed

    Iserson, Kenneth V; Francis, Adama M

    2015-03-01

    Jaguar attacks on humans rarely occur in the wild. When they do, they are often fatal. We describe a jaguar attack on a three-year-old girl near her home deep in a remote area of the Guyanese jungle. The patient had a complex but, relatively, rapid transport to a medical treatment facility for her life-threatening injuries. The child, who suffered typical jaguar-inflicted injury patterns and survived, is highlighted. We review jaguar anatomy, environmental status, hunting and killing behaviors, and discuss optimal medical management, given the resource-limited treatment environment of this international emergency medicine case.

  4. Diagnosis and screening of patients with hereditary angioedema in primary care

    PubMed Central

    Henao, Maria Paula; Kraschnewski, Jennifer L; Kelbel, Theodore; Craig, Timothy J

    2016-01-01

    Hereditary angioedema (HAE) is a rare autosomal dominant disease that commonly manifests with episodes of cutaneous or submucosal angioedema and intense abdominal pain. The condition usually presents due to a deficiency of C1 esterase inhibitor (C1-INH) that leads to the overproduction of bradykinin, causing an abrupt increase in vascular permeability. A less-understood and less-common form of the disease presents with normal C1-INH levels. Symptoms of angioedema may be confused initially with mast cell-mediated angioedema, such as allergic reactions, and may perplex physicians when epinephrine, antihistamine, or glucocorticoid therapies do not provide relief. Similarly, abdominal attacks may lead to unnecessary surgeries or opiate dependence. All affected individuals are at risk for a life-threatening episode of laryngeal angioedema, which continues to be a source of fatalities due to asphyxiation. Unfortunately, the diagnosis is delayed on average by almost a decade due to a misunderstanding of symptoms and general lack of awareness of the disease. Once physicians suspect HAE, however, diagnostic methods are reliable and available at most laboratories, and include testing for C4, C1-INH protein, and C1-INH functional levels. In patients with HAE, management consists of acute treatment of an attack as well as possible short- or long-term prophylaxis. Plasma-derived C1-INH, ecallantide, icatibant, and recombinant human C1-INH are new treatments that have been shown to be safe and effective in the treatment of HAE attacks. The current understanding of HAE has greatly improved in recent decades, leading to growing awareness, new treatments, improved management strategies, and better outcomes for patients. PMID:27194914

  5. [The treatment of posner-schlossmann's syndrome. (acute glaucomatocyclitic crises) (author's transl)].

    PubMed

    Huismans, H

    1975-12-01

    In the surgery two patients with Posner-Schlossmann-Syndrome were observed for several months. The therapy of the acute attack secondary glaucoma was the combination of Diamox, Cortison - and Neosynephrine eye-drops. With Pilocarpine the I.O.P. lowering was insufficient. In one case corneal precipitates typical for Heterochromia complicata Fuchs were observed.

  6. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  7. Sleep Deprivation Attack Detection in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  8. Angle of Attack Modulation for Mars Entry Terminal State Optimization

    NASA Technical Reports Server (NTRS)

    Lafleur, Jarret M.; Cerimele, Christopher J.

    2009-01-01

    From the perspective of atmospheric entry, descent, and landing (EDL), one of the most foreboding destinations in the solar system is Mars due in part to its exceedingly thin atmosphere. To benchmark best possible scenarios for evaluation of potential Mars EDL system designs, a study is conducted to optimize the entry-to-terminal-state portion of EDL for a variety of entry velocities and vehicle masses, focusing on the identification of potential benefits of enabling angle of attack modulation. The terminal state is envisioned as one appropriate for the initiation of terminal descent via parachute or other means. A particle swarm optimizer varies entry flight path angle, ten bank profile points, and ten angle of attack profile points to find maximum-final-altitude trajectories for a 10 30 m ellipsled at 180 different combinations of values for entry mass, entry velocity, terminal Mach number, and minimum allowable altitude. Parametric plots of maximum achievable altitude are shown, as are examples of optimized trajectories. It is shown that appreciable terminal state altitude gains (2.5-4.0 km) over pure bank angle control may be possible if angle of attack modulation is enabled for Mars entry vehicles. Gains of this magnitude could prove to be enabling for missions requiring high-altitude landing sites. Conclusions are also drawn regarding trends in the bank and angle of attack profiles that produce the optimal trajectories in this study, and directions for future work are identified.

  9. Hydrogen attack - Influence of hydrogen sulfide. [on carbon steel

    NASA Technical Reports Server (NTRS)

    Eliezer, D.; Nelson, H. G.

    1978-01-01

    An experimental study is conducted on 12.5-mm-thick SAE 1020 steel (plain carbon steel) plate to assess hydrogen attack at room temperature after specimen exposure at 525 C to hydrogen and a blend of hydrogen sulfide and hydrogen at a pressure of 3.5 MN/sq m for exposure times up to 240 hr. The results are discussed in terms of tensile properties, fissure formation, and surface scales. It is shown that hydrogen attack from a high-purity hydrogen environment is severe, with the formation of numerous methane fissures and bubbles along with a significant reduction in the room-temperature tensile yield and ultimate strengths. However, no hydrogen attack is observed in the hydrogen/hydrogen sulfide blend environment, i.e. no fissure or bubble formation occurred and the room-temperature tensile properties remained unchanged. It is suggested that the observed porous discontinuous scale of FeS acts as a barrier to hydrogen entry, thus reducing its effective equilibrium solubility in the iron lattice. Therefore, hydrogen attack should not occur in pressure-vessel steels used in many coal gasification processes.

  10. Posttraumatic Stress Disorder Following the September 11, 2001, Terrorist Attacks

    PubMed Central

    Neria, Yuval; DiGrande, Laura; Adams, Ben G.

    2012-01-01

    The September 11, 2001 (9/11), terrorist attacks were unprecedented in their magnitude and aftermath. In the wake of the attacks, researchers reported a wide range of mental and physical health outcomes, with posttraumatic stress disorder (PTSD) the one most commonly studied. In this review, we aim to assess the evidence about PTSD among highly exposed populations in the first 10 years after the 9/11 attacks. We performed a systematic review. Eligible studies included original reports based on the full Diagnostic and Statistical Manual of Mental Disorders (4th ed., rev.; American Psychiatric Association, 2000) criteria of PTSD among highly exposed populations such as those living or working within close proximity to the World Trade Center (WTC) and the Pentagon in New York City and Washington, DC, respectively, and first responders, including rescue, cleaning, and recovery workers. The large body of research conducted after the 9/11 attacks in the past decade suggests that the burden of PTSD among persons with high exposure to 9/11 was substantial. PTSD that was 9/11-related was associated with a wide range of correlates, including sociodemographic and background factors, event exposure characteristics, loss of life of significant others, and social support factors. Few studies used longitudinal study design or clinical assessments, and no studies reported findings beyond six years post-9/11, thus hindering documentation of the long-term course of confirmed PTSD. Future directions for research are discussed. PMID:21823772

  11. The Tokyo subway sarin attack--lessons learned.

    PubMed

    Okumura, T; Hisaoka, T; Yamada, A; Naito, T; Isonuma, H; Okumura, S; Miura, K; Sakurada, M; Maekawa, H; Ishimatsu, S; Takasu, N; Suzuki, K

    2005-09-01

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin.

  12. A Defender-Attacker Optimization of Port Radar Surveillance

    DTIC Science & Technology

    2011-01-01

    security; optimization; attacker-defender “And thence discover how with most advantage They may vex us with shot, or with assault.” Shakespeare , KingHenryVI...ed., McGraw-Hill, New York, 1990. [23] H. von Stackelberg, The theory of the market economy, William Hodge, London, UK, 1952. [24] J. Benders

  13. [Epileptic attacks in cerebral arterial pathology. Clinical findings].

    PubMed

    Rohmer, F; Collard, M; Kurtz, D; Warter, J M; Coquillat, G

    1975-09-01

    The authors analyse, with reference to 107 cases, the incidence of epileptic attacks in different types of non-traumatic arterial pathology of the brain. They describe their various clinical and evolutive aspects and attempt to isolate those peculiar to critical manifestations of this type occurring in the course of cerebral vascular accidents.

  14. Fraud in Academic Publishing: Researchers Under Cyber-Attacks.

    PubMed

    Dadkhah, Mehdi; Borchardt, Glenn; Maliszewski, Tomasz

    2017-01-01

    Day by day, researchers receive new suspicious e-mails in their inboxes. Many of them do not have sufficient information about these types of e-mails, and may become victims of cyber-attacks. In this short communication, we review current cyber threats in academic publishing and try to present general guidelines for authors.

  15. Attacks on the Freedom To Learn. 1986-1987 Report.

    ERIC Educational Resources Information Center

    People for the American Way, Washington, DC.

    Documenting a cumulative attack on the freedom to learn, which strikes at the heart of public education, this report describes how censorship has grown since 1982, highlighting trends that have emerged over five years, the actors, the challenges, and the results. Following an introduction, the report documents the state of censorship for…

  16. Toward Exposing Timing-Based Probing Attacks in Web Applications.

    PubMed

    Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai

    2017-02-25

    Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users' browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.

  17. Bear attack--A unique fatality in Finland.

    PubMed

    De Giorgio, Fabio; Rainio, Juha; Pascali, Vincenzo; Lalu, Kaisa

    2007-11-15

    Fatalities due to animal bites, the vast majority of which are associated with dogs and big cats, are relatively uncommon and rarely described in the literature. Especially rare are fatal bear attacks on humans. We herein present a forensic investigation of a fatal assault, involving numerous bites on a 42-year-old man in Finland by an European brown bear (Ursus arctos arctos).

  18. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  19. Hypergame theory applied to cyber attack and defense

    NASA Astrophysics Data System (ADS)

    House, James Thomas; Cybenko, George

    2010-04-01

    This work concerns cyber attack and defense in the context of game theory--specifically hypergame theory. Hypergame theory extends classical game theory with the ability to deal with differences in players' expertise, differences in their understanding of game rules, misperceptions, and so forth. Each of these different sub-scenarios, or subgames, is associated with a probability--representing the likelihood that the given subgame is truly "in play" at a given moment. In order to form an optimal attack or defense policy, these probabilities must be learned if they're not known a-priori. We present hidden Markov model and maximum entropy approaches for accurately learning these probabilities through multiple iterations of both normal and modified game play. We also give a widely-applicable approach for the analysis of cases where an opponent is aware that he is being studied, and intentionally plays to spoil the process of learning and thereby obfuscate his attributes. These are considered in the context of a generic, abstract cyber attack example. We demonstrate that machine learning efficacy can be heavily dependent on the goals and styles of participant behavior. To this end detailed simulation results under various combinations of attacker and defender behaviors are presented and analyzed.

  20. Technosocial Modeling of IED Threat Scenarios and Attacks

    SciTech Connect

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

  1. The Changing Nature of Suicide Attacks: A Social Network Perspective

    ERIC Educational Resources Information Center

    Pedahzur, Ami; Perliger, Arie

    2006-01-01

    To comprehend the developments underlying the suicide attacks of recent years, we suggest that the organizational approach, which until recently was used to explain this phenomenon, should be complemented with a social network perspective. By employing a social network analysis of Palestinian suicide networks, the authors found that, in contrast…

  2. [The hospital care of victims of terrorist attacks].

    PubMed

    Bouhaddou, Assena; Nion, Nathalie; Riou, Bruno; Blandeau, Fanny; Moreau, Pilar; Guemache, Sofia

    2017-04-01

    The treatment of victims of terrorist attacks in a trauma centre requires the putting in place of plans, training and simulation exercises. Previous experiences have highlighted the areas which require improvement. As exceptional health situations are unpredictable, it is essential to always be vigilant and prepared for an unforeseen event.

  3. Focus Groups with Children after the World Trade Center Attacks

    ERIC Educational Resources Information Center

    Pfefferbaum, Betty; North, Carol S.; Pollio, David E.; Wallace, Nancy E.; Smith, Rebecca; Jeon-Slaughter, Haekyung

    2007-01-01

    Focus groups with 23 New York City children examined their reactions to the September 11 terrorist attacks, their parents' reactions, and their expectations about the future. We identified an initial set of six topics; these topics were reviewed and assigned to a final set of thematic categories--understanding the events and motives, emotional…

  4. Limit Asthma Attacks Caused by Colds or Flu

    MedlinePlus

    ... asthma attack. References Bailey W, et al. Trigger control to enhance asthma management. http://www.uptodate.com/home. Accessed Sept. 19, ... Flu and people with asthma. Centers for Disease Control and Prevention. ... and Management of Asthma. National Heart, Lung, and Blood Institute. ...

  5. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  6. Parent-Reported Predictors of Adolescent Panic Attacks.

    ERIC Educational Resources Information Center

    Hayward, Chris; Wilson, Kimberly A.; Lagle, Kristy; Killen, Joel D.; Taylor, C. Barr

    2004-01-01

    Objective: To identify parent-reported risk factors for adolescent panic attacks. Method: Structured diagnostic interviews were obtained from 770 parents of participants in a school-based risk factor study for adolescent panic. Parent-reported risk factors assessed included characteristics of the child (negative affect, separation anxiety disorder…

  7. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    SciTech Connect

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  8. Male Brown-headed Cowbird Attacks and Kills a Nestling

    USGS Publications Warehouse

    Igl, L.D.

    2003-01-01

    I observed a male Brown-headed Cowbird (Molothrus ater) attack and kill a nestling of an unidentified passerine in a grassland field in Day County, South Dakota, in June 2000. The killing or removal of nestlings by female cowbirds has been reported by others, but this behavior has not been documented previously in male cowbirds.

  9. X-31 high angle of attack control system performance

    NASA Technical Reports Server (NTRS)

    Huber, Peter; Seamount, Patricia

    1994-01-01

    The design goals for the X-31 flight control system were: (1) level 1 handling qualities during post-stall maneuvering (30 to 70 degrees angle-of-attack); (2) thrust vectoring to enhance performance across the flight envelope; and (3) adequate pitch-down authority at high angle-of-attack. Additional performance goals are discussed. A description of the flight control system is presented, highlighting flight control system features in the pitch and roll axes and X-31 thrust vectoring characteristics. The high angle-of-attack envelope clearance approach will be described, including a brief explanation of analysis techniques and tools. Also, problems encountered during envelope expansion will be discussed. This presentation emphasizes control system solutions to problems encountered in envelope expansion. An essentially 'care free' envelope was cleared for the close-in-combat demonstrator phase. High angle-of-attack flying qualities maneuvers are currently being flown and evaluated. These results are compared with pilot opinions expressed during the close-in-combat program and with results obtained from the F-18 HARV for identical maneuvers. The status and preliminary results of these tests are discussed.

  10. Endangered Education: How Corporate Polluters Are Attacking Environmental Education.

    ERIC Educational Resources Information Center

    Bohart, Barbara; Manilov, Marianne; Schwarz, Tamara

    This report claims that an attack has been waged on environmental education to derail the re-authorization of the National Environmental Education Act and to de-stabilize and de-fund environmental education in the United States. Presented in the media as a grassroots movement, stories have appeared in local, state, and national media that…

  11. Revising School Attack Protections since 9/11

    ERIC Educational Resources Information Center

    Black, Susan

    2004-01-01

    The terrorist attacks of September 11, 2001, prompted federal officials to step up campaigns to make schools safe. After visiting Ground Zero at New York City's World Trade Center, Education Secretary Rodney Paige sent each chief state school officer suggestions for managing school crises. Many states also have school safety plans in place. New…

  12. Microbially induced organic acid underdeposit attack in a gas pipeline

    SciTech Connect

    Dias, O.C.; Bromel, M.C. )

    1990-04-01

    A leaking undersea carbon-steel gas pipeline was investigated, and attack was confined to low areas where water had accumulated.Analyses showed that pitting, which occurred under deposits, was caused by organic acids generated by bacteria. The metabolic activities of anaerobic sporeformers produce these acids. Alkyl amine carboxylic acid and metronidizole were effective deterrents at low concentrations.

  13. Animal biowarfare research: historical perspective and potential future attacks.

    PubMed

    Yeh, Jung-Yong; Park, Jee-Yong; Cho, Yun Sang; Cho, In-Soo

    2012-12-01

    A biological attack on livestock or poultry could result in the loss of valuable animals, costs related to the containment of outbreaks and the disposal of carcasses, lost trade and other economic effects involving suppliers, transporters, distributors and restaurants; however, it is not possible to secure all livestock, and livestock are much less well guarded than human targets. Thus, the vulnerability of the livestock industry to the introduction of biological agents varies for the following reasons: (i) the majority of lethal and contagious biological agents are environmentally resilient, endemic in foreign countries and harmless to humans, making it easier for terrorists to acquire, handle and deploy these pathogens, (ii) with animals concentrated in fewer production facilities and frequently transported between these facilities, a single pathogen introduction could cause widespread infection and (iii) the extent of human travel around the globe makes it difficult to exclude exotic animal diseases as possible biological agents. Historically, many governments have developed and planned to use biological agents for direct attacks on livestock or poultry. In the past, developed nations have actively developed biological weapons to target animals. The potential spectrum of bioterrorism ranges from isolated acts against individuals by individuals to tactical and strategic military attacks and state-sponsored international terrorism intended to cause mass casualties in animals, humans or both. This review provides an overview of the past development and use of biological weapons and describes potential future attacks.

  14. Effect of attack angle on flow characteristic of centrifugal fan

    NASA Astrophysics Data System (ADS)

    Wu, Y.; Dou, H. S.; Wei, Y. K.; Chen, X. P.; Chen, Y. N.; Cao, W. B.

    2016-05-01

    In this paper, numerical simulation is performed for the performance and internal flow of a centrifugal fan with different operating conditions using steady three-dimensional incompressible Navier-Stokes equations coupled with the RNG k-e turbulent model. The performance curves, the contours of static pressure, total pressure, radial velocity, relative streamlines and turbulence intensity at different attack angles are obtained. The distributions of static pressure and velocity on suction surface and pressure surface in the same impeller channel are compared for various attack angles. The research shows that the efficiency of the centrifugal fan is the highest when the attack angle is 8 degree. The main reason is that the vortex flow in the impeller is reduced, and the jet-wake pattern is weakened at the impeller outlet. The pressure difference between pressure side and suction side is smooth and the amplitude of the total pressure fluctuation is low along the circumferential direction. These phenomena may cause the loss reduced for the attack angle of about 8 degree.

  15. Exercise Following a Heart Attack: Some Special Considerations.

    ERIC Educational Resources Information Center

    Fardy, Paul S.

    This paper presents information on the effectiveness of exercise programs for heart attack victims. Some of the observations come from unpublished results of a two year experiment of the National Exercise and Heart Disease Project. The paper first establishes that a group exercise program with trained supervision is advantageous for people with…

  16. Delimiting Democratic Debate: The Fordham Institute's Attack on Democratic Values

    ERIC Educational Resources Information Center

    Leahey, Christopher R.

    2005-01-01

    Reflecting on the current debate on how to teach about the terrorist attacks of September 11, 2001, and the subsequent U.S. invasions of Afghanistan and Iraq, this article examines Thomas B. Fordham Institute's Terrorists, Despots, and Democracy: What Our Children Need to Know, one of the several publications produced by the Fordham Institute that…

  17. Vulnerabilities in GSM technology and feasibility of selected attacks

    NASA Astrophysics Data System (ADS)

    Voznak, M.; Prokes, M.; Sevcik, L.; Frnda, J.; Toral-Cruz, Homer; Jakovlev, Sergej; Fazio, Peppino; Mehic, M.; Mikulec, M.

    2015-05-01

    Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem's occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting - Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.

  18. Assessment and Intervention for Academic Task Attack Strategy Competencies

    ERIC Educational Resources Information Center

    Busse, R. T.; Lee, Charlene

    2015-01-01

    Many students who underachieve in schools may not be learning as effectively as they could. Direct assessments such as the Academic Competence Evaluation Scales (ACES), School Motivation and Learning Strategies Inventory (SMALSI), and the Academic Task Attack Checklist System (ATACS) can be used to evaluate students' knowledge and use of…

  19. Database Relation Watermarking Resilient against Secondary Watermarking Attacks

    NASA Astrophysics Data System (ADS)

    Gupta, Gaurav; Pieprzyk, Josef

    There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.

  20. Cultural Connections: Bowl with Frieze of Lions Attacking Bulls

    ERIC Educational Resources Information Center

    School Arts: The Art Education Magazine for Teachers, 2004

    2004-01-01

    This article gives a brief description of the piece of art titled "Bowl with Frieze of Lions Attacking Bulls" which is thought to be the product of a court or palace of the Neo-Assyrian period and dates to the late seventh to eighth century BC, between the reigns of Sargon and Ashurbanipal. The article highlights the piece's most notable…