Sample records for acute hae attacks

  1. Signs and symptoms preceding acute attacks of hereditary angioedema: results of three recent surveys.

    PubMed

    Reshef, Avner; Prematta, Michael J; Craig, Timothy J

    2013-01-01

    In patients with hereditary angioedema (HAE), premonitory symptoms ("prodromes") may appear hours to days before attack onset. It remains to be determined if prodromes could be useful indicators for early treatment initiation. Most published reports of prodromes have been limited to case reports or small case series. The common objective of several recent survey-based studies was to collect information relevant to prodromal patterns in patients with HAE. Three separate surveys solicited prodromal data from HAE patients. Although differences in survey methodologies permit only descriptive analysis of data, responses to the surveys provide the largest compilation of observational data on this topic to date. Prodromes were reported by 82.5-95.7% of patients surveyed. In one survey, about two-thirds of subjects reported experiencing prodromes before all or most acute HAE attacks, and only 6% of subjects noted the appearance of prodromes in <10% of all attacks. The most common types of prodromal symptoms were related to skin/soft tissue and gastrointestinal tract. Most prodromes were experienced hours to days before the onset of angioedema. A large percentage of surveyed subjects indicated being able to predict an impending HAE attack all or most of the time; <10% reported being rarely or never able to predict an attack. Although insufficient to establish the clinical role of prodromal symptoms, results of these surveys provide additional data on the scope of prodromes and could stimulate further research into the potential efficacy and cost-effectiveness of HAE attack prediction and prodrome-triggered interventions.

  2. Hereditary angioedema: management of laryngeal attacks.

    PubMed

    Christiansen, Sandra C; Zuraw, Bruce L

    2011-01-01

    Hereditary angioedema (HAE) patients suffering from laryngeal attacks in the United States faced severely limited treatment options until 2008. These potentially life-threatening episodes occur in over one-half of the patients affected by HAE during their lifetimes. Acute therapy had been relegated to supportive care, intubation, and consideration of fresh frozen plasma (FFP)--the latter with the potential for actually accelerating the speed and severity of the swelling. In this article we will review the recently approved and emerging HAE treatments that have evolved from the recognition that bradykinin generation is the fundamental abnormality leading to attacks of angioedema. Acute therapy for laryngeal attacks will be discussed including purified plasma-derived C1 inhibitor (C1INH), recombinant C1INH, an inhibitor of plasma kallikrein (ecallantide), and a B2 receptor antagonist (icatibant). Prophylactic care has also been transformed from a reliance on attenuated androgens with their attendant side effects to C1INH replacement. The arrival of these novel therapies promises to transform the future management of HAE.

  3. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  4. Conestat alfa for the treatment of angioedema attacks

    PubMed Central

    Davis, Benjamin; Bernstein, Jonathan A

    2011-01-01

    Recently, multiple C1 inhibitor (C1-INH) replacement products have been approved for the treatment of hereditary angioedema (HAE). This review summarizes HAE and its current treatment modalities and focuses on findings from bench to bedside trials of a new C1-INH replacement, conestat alfa. Conestat alfa is unique among the other C1-INH replacement products because it is produced from transgenic rabbits rather than derived from human plasma donors, which can potentially allow an unlimited source of drug without any concern of infectious transmission. The clinical trial data generated to date indicate that conestat alfa is safe and effective for the treatment of acute HAE attacks. PMID:21753889

  5. Update on the Use of C1-Esterase Inhibitor Replacement Therapy in the Acute and Prophylactic Treatment of Hereditary Angioedema.

    PubMed

    Henry Li, H; Riedl, Marc; Kashkin, Jay

    2018-06-16

    In the vast majority of patients with hereditary angioedema (HAE), angioedema attacks are due to the quantitative or functional deficiency of C1-esterase inhibitor (C1-INH), which leads to increased vascular permeability and unregulated release of bradykinin. Exogenous administration of C1-INH is a rational way to restore the concentration and functional activity of this protein, regulate the release of bradykinin, and attenuate or prevent subcutaneous and submucosal edema associated with HAE. Recent international guidelines for the management of HAE include C1-INH as an option for acute treatment of HAE. In addition, these guidelines recommend C1-INH as first-line treatment for long-term prophylaxis and as the therapy of choice for short-term/preprocedural prophylaxis. Several C1-INH products are available, with approved indications varying across regions. For the acute treatment of HAE, both plasma-derived and recombinant C1-INH formulations have been shown to be effective and well tolerated in adolescents and adults with HAE, with onset of relief within 30 min to a few hours. Plasma-derived C1-INH is approved for use in children, and recombinant C1-INH is being evaluated in this population. Intravenous (IV) and subcutaneous (SC) formulations of C1-INH have been approved for routine prophylaxis to prevent HAE attacks in adolescents and adults. Both formulations when administered twice weekly have been shown to reduce the frequency and severity of HAE attacks. The SC formulation of C1-INH obviates the need for repeated venous access and may facilitate self-administration of HAE prophylaxis at home, as recommended in HAE treatment guidelines. As with most rare diseases, the costs of HAE treatment are high; however, the development of additional acute and prophylactic medications for HAE may result in competitive pricing and help drive down the costs of HAE treatment.

  6. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  7. Hereditary Angioedema Attacks Resolve Faster and Are Shorter after Early Icatibant Treatment

    PubMed Central

    Maurer, Marcus; Kaplan, Allen; Investigators, on behalf of I. O. S.

    2013-01-01

    Background Attacks of hereditary angioedema (HAE) are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. Objective To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. Methods The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009–February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. Results Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥1 hour (6.1 hours versus 16.8 hours [p<0.001]). Similar significant effects were observed for <2 hours versus ≥2 hours (7.2 hours versus 20.2 hours [p<0.001]) and <5 hours versus ≥5 hours (8.0 hours versus 23.5 hours [p<0.001]). Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]). Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. Conclusion Early blockade of the bradykinin B2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution. PMID:23390491

  8. Emergency Department Management of Hereditary Angioedema Attacks: Patient Perspectives.

    PubMed

    Otani, Iris M; Christiansen, Sandra C; Busse, Paula; Camargo, Carlos A; Zuraw, Bruce L; Riedl, Marc A; Banerji, Aleena

    Emergency department (ED) management of hereditary angioedema (HAE) has been hindered by misdiagnosis and limited treatment options. Food and Drug Administration approval of 4 on-demand HAE therapies starting in 2009 and the publication of ED guidelines for angioedema management in 2014 should facilitate improvement of HAE management in the ED. The objective of this study was to identify patient-reported areas for improvement in ED management of HAE attacks. Patients with self-reported HAE with C1 inhibitor deficiency who attended the 2015 HAE Association Patient Summit were asked to complete an anonymous 30-question survey. Questions addressed patient characteristics and HAE management in the ED. Patients indicated that understanding of HAE in the ED needed improvement (99%, 104 of 105 patients). Recognition of HAE as a diagnosis (48%, 50 of 105 patients), appreciation of HAE as a serious disease (45%, 47 of 105 patients), and medication management (59%, 62 of 105 patients) were identified as areas needing improvement. Among 39 patients who required ED care within the last year, 6 did not receive any HAE-targeted therapy, and treatment with corticosteroids (n = 3), epinephrine (n = 2), and antihistamines (n = 7) was reported. Among 68 patients whose treatment plan was to receive home on-demand therapy, 26 required ED care because of an inability to receive on-demand therapy at home as outlined in their treatment plan. Having a treatment plan was associated with a greater likelihood of receiving HAE therapy in the ED (99% vs 74%, P = .002). HAE management in the ED can be improved with a focus on recognition of HAE attacks and administration of effective HAE therapies. Copyright © 2016 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  9. Hereditary angioedema with normal C1 inhibitor in a French cohort: Clinical characteristics and response to treatment with icatibant.

    PubMed

    Bouillet, Laurence; Boccon-Gibod, Isabelle; Launay, David; Gompel, Anne; Kanny, Gisele; Fabien, Vincent; Fain, Oliver

    2017-03-01

    The clinical characteristics and icatibant-treatment outcomes of patients with hereditary angioedema with normal C1 inhibitor (HAE-nC1 INH) are limited. We retrospectively analyzed data from French HAE patients enrolled in the Icatibant Outcome Survey registry (from July 2009 to September 2013) to compare disease characteristics and the effectiveness and safety of acute icatibant-treated angioedema attacks in patients with HAE-nC1 INH, HAE with C1 INH deficiency (type I), or dysfunction (type II). One center in Grenoble contributed 22 patients with HAE-nC1 INH and a family history of HAE while 15 centers across France contributed 153 patients with HAE type I and seven patients with HAE type II. Patients with HAE-nC1 INH compared to HAE type I, respectively, were more likely to be female (88.1% vs. 63.4%), older at median age of disease onset (21 years vs. 15 years), and have a greater rate of abdominal (80% vs. 61%) and laryngeal (23% vs. 14%) attacks. Icatibant was effective in both groups though the median time to resolution of attack was significantly longer in the HAE-nC1 INH group (20.0 h, 37 attacks) versus the HAE type I group (14.0 h, 67 attacks). Icatibant was self-administered for 96.1% of attacks in patients with HAE-nC1 INH and 75.8% in patients with HAE type I. No serious adverse side effects related to icatibant were reported. These data help further define the disease characteristics of HAE-nC1 INH in the French population and extend the limited data reporting the safe and effective use of icatibant in acute treatment of angioedema in French patients diagnosed with HAE-nC1 INH.

  10. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant: findings from the Icatibant Outcome Survey.

    PubMed

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard

    2017-01-01

    Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.

  11. Angioedema attacks in patients with hereditary angioedema: Local manifestations of a systemic activation process.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Zeerleder, Sacha; Drouet, Christian; Zuraw, Bruce; Hack, C Erik

    2016-08-01

    Hereditary angioedema (HAE) caused by a deficiency of functional C1-inhibitor (C1INH) becomes clinically manifest as attacks of angioedema. C1INH is the main inhibitor of the contact system. Poor control of a local activation process of this system at the site of the attack is believed to lead to the formation of bradykinin (BK), which increases local vasopermeability and mediates angioedema on interaction with BK receptor 2 on the endothelium. However, several observations in patients with HAE are difficult to explain from a pathogenic model claiming a local activation process at the site of the angioedema attack. Therefore we postulate an alternative model for angioedema attacks in patients with HAE, which assumes a systemic, fluid-phase activation of the contact system to generate BK and its breakdown products. Interaction of these peptides with endothelial receptors that are locally expressed in the affected tissues rather than with receptors constitutively expressed by the endothelium throughout the whole body explains that such a systemic activation process results in local manifestations of an attack. In particular, BK receptor 1, which is induced on the endothelium by inflammatory stimuli, such as kinins and cytokines, meets the specifications of the involved receptor. The pathogenic model discussed here also provides an explanation for why angioedema can occur at multiple sites during an attack and why HAE attacks respond well to modest increases of circulating C1INH activity levels because inhibition of fluid-phase Factor XIIa and kallikrein requires lower C1INH levels than inhibition of activator-bound factors. Copyright © 2016 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  12. [Acute asthma attacks introduced by anesthesia before nasal endoscopic surgery].

    PubMed

    Lü, Xiaofei; Han, Demin; Zhou, Bing; Ding, Bin

    2004-05-01

    In order to pay our attention to the perioperative treatment before nasal endoscopic surgery. Three patients with asthma accompanied chronic sinusitis were analyzed systemically, who had undergone acute attacks of asthma introduced by anesthesia. Anesthetic drugs and instruments can lead to acute attacks of asthma, because sinusitis with asthma means allergic airway inflammation, broncho-hyperreactivity and lower compensatory pulmonary function. Then all of the 3 cases had missed the preoperative treatment. Anesthetic drugs and instruments can lead to acute attacks of asthma. The perioperative treatment before nasal endoscopic surgery is very important for the prevention of the occurrences of this severe complication. Except emergency, the operation should be can celled for avoiding the acute attack of asthma introduced by anesthesia.

  13. Hereditary angioedema with normal C1 inhibitor in a French cohort: Clinical characteristics and response to treatment with icatibant

    PubMed Central

    Boccon‐Gibod, Isabelle; Launay, David; Gompel, Anne; Kanny, Gisele; Fabien, Vincent; Fain, Oliver

    2017-01-01

    Abstract Introduction The clinical characteristics and icatibant‐treatment outcomes of patients with hereditary angioedema with normal C1 inhibitor (HAE‐nC1 INH) are limited. Methods We retrospectively analyzed data from French HAE patients enrolled in the Icatibant Outcome Survey registry (from July 2009 to September 2013) to compare disease characteristics and the effectiveness and safety of acute icatibant‐treated angioedema attacks in patients with HAE‐nC1 INH, HAE with C1 INH deficiency (type I), or dysfunction (type II). Results One center in Grenoble contributed 22 patients with HAE‐nC1 INH and a family history of HAE while 15 centers across France contributed 153 patients with HAE type I and seven patients with HAE type II. Patients with HAE‐nC1 INH compared to HAE type I, respectively, were more likely to be female (88.1% vs. 63.4%), older at median age of disease onset (21 years vs. 15 years), and have a greater rate of abdominal (80% vs. 61%) and laryngeal (23% vs. 14%) attacks. Icatibant was effective in both groups though the median time to resolution of attack was significantly longer in the HAE‐nC1 INH group (20.0 h, 37 attacks) versus the HAE type I group (14.0 h, 67 attacks). Icatibant was self‐administered for 96.1% of attacks in patients with HAE‐nC1 INH and 75.8% in patients with HAE type I. No serious adverse side effects related to icatibant were reported. Conclusions These data help further define the disease characteristics of HAE‐nC1 INH in the French population and extend the limited data reporting the safe and effective use of icatibant in acute treatment of angioedema in French patients diagnosed with HAE‐nC1 INH. PMID:28250922

  14. Icatibant, an inhibitor of bradykinin receptor 2, for hereditary angioedema attacks: prospective experimental single-cohort study.

    PubMed

    Campos, Regis Albuquerque; Valle, Solange Oliveira Rodrigues; França, Alfeu Tavares; Cordeiro, Elisabete; Serpa, Faradiba Sarquis; Mello, Yara Ferreira; Malheiros, Teresinha; Toledo, Eliana; Mansour, Elie; Fusaro, Gustavo; Grumach, Anete Sevciovic

    2014-01-01

    Hereditary angioedema (HAE) with C1 inhibitor deficiency manifests as recurrent episodes of edema involving the skin, upper respiratory tract and gastrointestinal tract. It can be lethal due to asphyxia. The aim here was to evaluate the response to therapy for these attacks using icatibant, an inhibitor of the bradykinin receptor, which was recently introduced into Brazil. Prospective experimental single-cohort study on the efficacy and safety of icatibant for HAE patients. Patients with a confirmed HAE diagnosis were enrolled according to symptoms and regardless of the time since onset of the attack. Icatibant was administered in accordance with the protocol that has been approved in Brazil. Symptom severity was assessed continuously and adverse events were monitored. 24 attacks in 20 HAE patients were treated (female/male 19:1; 19-55 years; median 29 years of age). The symptoms were: subcutaneous edema (22/24); abdominal pain (15/24) and upper airway obstruction (10/24). The time taken until onset of relief was: 5-10 minutes (5/24; 20.8%); 10-20 (5/24; 20.8%); 20-30 (8/24; 33.4%); 30-60 (5/24; 20.8%); and 2 hours (1/24; 4.3%). The time taken for complete resolution of symptoms ranged from 4.3 to 33.4 hours. Adverse effects were only reported at injection sites. Mild to moderate erythema and/or feelings of burning were reported by 15/24 patients, itching by 3 and no adverse effects in 6. HAE type I patients who received icatibant responded promptly; most achieved improved symptom severity within 30 minutes. Local adverse events occurred in 75% of the patients.

  15. Could missile attacks trigger acute myocardial infarction?

    PubMed

    Zubaid, Mohammad; Suresh, Cheiyil G; Thalib, Lukman; Rashed, Wafa

    2006-08-01

    During the Gulf war in 2003, Kuwait was targeted with missile attacks for 10 consecutive days. Our objective is to evaluate the influence of missile attacks on the incidence of acute myocardial infarction (AMI). We retrospectively compared the number of admissions for AMI presenting to a major general hospital during missile attacks period (MAP) in 2003 with four control periods. MAP and each control period consisted of the same number of days (10 days). The four control periods were the 10 days immediately before and after MAP; and the same time period as MAP for the years 2001 and 2002. The number of admissions for AMI was highest during MAP, 21 cases compared to 14-16 cases in the four control periods, with a trend towards increase during MAP (incidence rate ratio = 1.59; 95% CI 0.95 to 2.66, p < 0.07). The number of admissions for AMI during the first 5 days of MAP was significantly higher compared to the first 5 days of the four control periods (incidence rate ratio = 2.43; 95% CI 1.23 to 4.26, p < 0.01). The observed AMI admission rate during the first 5 days of MAP was significantly higher than expected for a 5-day period in the years 2001, 2002 and 2003. This increase was specific to AMI and did not affect other acute cardiac conditions. Missile attacks were associated with an increase in the incidence of AMI. This increase was specific to AMI and did not influence acute cardiac conditions.

  16. RNAi-mediated silencing of hepatic Alas1 effectively prevents and treats the induced acute attacks in acute intermittent porphyria mice.

    PubMed

    Yasuda, Makiko; Gan, Lin; Chen, Brenden; Kadirvel, Senkottuvelan; Yu, Chunli; Phillips, John D; New, Maria I; Liebow, Abigail; Fitzgerald, Kevin; Querbes, William; Desnick, Robert J

    2014-05-27

    The acute hepatic porphyrias are inherited disorders of heme biosynthesis characterized by life-threatening acute neurovisceral attacks. Factors that induce the expression of hepatic 5-aminolevulinic acid synthase 1 (ALAS1) result in the accumulation of the neurotoxic porphyrin precursors 5-aminolevulinic acid (ALA) and porphobilinogen (PBG), which recent studies indicate are primarily responsible for the acute attacks. Current treatment of these attacks involves i.v. administration of hemin, but a faster-acting, more effective, and safer therapy is needed. Here, we describe preclinical studies of liver-directed small interfering RNAs (siRNAs) targeting Alas1 (Alas1-siRNAs) in a mouse model of acute intermittent porphyria, the most common acute hepatic porphyria. A single i.v. dose of Alas1-siRNA prevented the phenobarbital-induced biochemical acute attacks for approximately 2 wk. Injection of Alas1-siRNA during an induced acute attack significantly decreased plasma ALA and PBG levels within 8 h, more rapidly and effectively than a single hemin infusion. Alas1-siRNA was well tolerated and a therapeutic dose did not cause hepatic heme deficiency. These studies provide proof-of-concept for the clinical development of RNA interference therapy for the prevention and treatment of the acute attacks of the acute hepatic porphyrias.

  17. [Chronic pancreatitis diagnosed after the first attack of acute pancreatitis].

    PubMed

    Bojková, Martina; Dítě, Petr; Uvírová, Magdalena; Dvořáčková, Nina; Kianička, Bohuslav; Kupka, Tomáš; Svoboda, Pavel; Klvaňa, Pavel; Martínek, Arnošt

    2016-02-01

    One of the diseases involving a potential risk of developing chronic pancreatitis is acute pancreatitis. Of the overall number of 231 individuals followed with a diagnosis of chronic pancreatitis, 56 patients were initially treated for acute pancreatitis (24.2 %). Within an interval of 12- 24 months from the first attack of acute pancreatitis, their condition gradually progressed to reached the picture of chronic pancreatitis. The individuals included in the study abstained (from alcohol) following the first attack of acute pancreatitis and no relapse of acute pancreatitis was proven during the period of their monitoring. The etiology of acute pancreatitis identified alcohol as the predominant cause (55.3 %), biliary etiology was proven in 35.7 %. According to the revised Atlanta classification, severe pancreatitis was established in 69.6 % of the patients, the others met the criterion for intermediate form, those with the light form were not included. Significant risk factors present among the patients were smoking, obesity and 18 %, resp. 25.8 % had pancreatogenous diabetes mellitus identified. 88.1 % of the patients with acute pancreatitis were smokers. The majority of individuals with chronic pancreatitis following an attack of acute pancreatitis were of a productive age from 25 to 50 years. It is not only acute alcoholic pancreatitis which evolves into chronic pancreatitis, we have also identified this transition for pancreatitis of biliary etiology.

  18. [Comparison of Two Symptom-Triggered Treatments for Alcohol Withdrawal: HAES vs. SAB-P].

    PubMed

    Holzbach, R; Ihlow, C; Takla, T; Kemper, U; Naber, D

    2016-02-01

    For alcohol withdrawal during hospitalization, often a medication as means for withdrawal needs to be chosen. Modern, score-controlled processes that can be used by the nursing staff after instruction by physicians are frequently not used and even unknown in hospitals. One reason for this is that some of the scores require checking several criteria and are therefore more time-consuming and complicated than use of a fixed-dosage strategy. The SAB-P and HAES are short with only 6 items that can be checked by the nursing staff. Safety of the Hamburg Alcohol Withdrawal Scale (Hamburger Alkoholentzugs-Skala (HAES)) was analyzed retrospectively and prospectively with regard to score-controlled alcohol-withdrawal treatment after rating by the nurse staff (Scoregesteuerte Alkoholentzugsbehandlung nach Rating durch das Pflegepersonal (SAB-P)). Incidence of complications in patients treated with SAB-P and HAES was nearly similar with 1% start of delirium and 3% seizures (SAB-P) and 0.5 to 1.5% start of delirium and 0 to 0.5% seizures in the HAES group. With both scales it was possible to start medical treatment while still under falling alcohol levels (0.93 and 0.91%, respectively). Medication dosage was initially higher using the HAES, so that the time needed to monitor withdrawal symptoms could be reduced (3.8 vs. 3.1 days). Using a score-controlled strategy for alcohol withdrawal leads to a lower complication rate than found in literature. The structured procedure was helpful for the nursing staff as well as for the physicians. SAB-P as well as HAES made withdrawal for the patients more comfortable and led to fewer complaints. Because of rapid reaction and faster symptom reduction of HAES, there was less time necessary for monitoring. Simple handling, clomethiazol, oxazepam or diazepam as applicable medication and clear documentation are the advantages of HAES. © Georg Thieme Verlag KG Stuttgart · New York.

  19. Health-Related Quality of Life with Subcutaneous C1-Inhibitor for Prevention of Attacks of Hereditary Angioedema.

    PubMed

    Lumry, William R; Craig, Timothy; Zuraw, Bruce; Longhurst, Hilary; Baker, James; Li, H Henry; Bernstein, Jonathan A; Anderson, John; Riedl, Marc A; Manning, Michael E; Keith, Paul K; Levy, Donald S; Caballero, Teresa; Banerji, Aleena; Gower, Richard G; Farkas, Henriette; Lawo, John-Philip; Pragst, Ingo; Machnig, Thomas; Watson, Douglas J

    2018-01-31

    Hereditary angioedema with C1-inhibitor deficiency (C1-INH-HAE) impairs health-related quality of life (HRQoL). The objective of this study was to assess HRQoL outcomes in patients self-administering subcutaneous C1-INH (C1-INH[SC]; HAEGARDA) for routine prevention of HAE attacks. Post hoc analysis of data from the placebo-controlled, crossover phase III COMPACT study (Clinical Studies for Optimal Management of Preventing Angioedema with Low-Volume Subcutaneous C1-Inhibitor Replacement Therapy). Ninety patients with C1-INH-HAE were randomized to 1 of 4 treatment sequences: C1-INH(SC) 40 or 60 IU/kg twice weekly for 16 weeks, preceded or followed by 16 weeks of twice weekly placebo injections. All HAE attacks were treated with open-label on-demand treatment as necessary. HRQoL assessments at week 14 (last visit) included the European Quality of Life-5 Dimensions Questionnaire (EQ-5D-3L), the Hospital Anxiety and Depression Scale (HADS), the Work Productivity and Activity Impairment Questionnaire (WPAI), and the Treatment Satisfaction Questionnaire for Medication (TSQM). Compared with placebo (on-demand treatment alone), treatment with twice weekly C1-INH(SC) (both doses combined) was associated with better EQ-5D visual analog scale general health, less HADS anxiety, less WPAI presenteeism, work productivity loss, and activity impairment, and greater TSQM effectiveness and overall treatment satisfaction. More patients self-reported a "good/excellent" response during routine prevention with C1-INH(SC) compared with on-demand only (placebo prophylaxis) management. For each HRQoL measure, a greater proportion of patients had a clinically meaningful improvement during C1-INH(SC) treatment compared with placebo. In patients with frequent HAE attacks, a treatment strategy of routine prevention with self-administered twice weekly C1-INH(SC) had a greater impact on improving multiple HAE-related HRQoL impairments, most notably anxiety and work productivity, compared with on

  20. Exposure‐Response Model of Subcutaneous C1‐Inhibitor Concentrate to Estimate the Risk of Attacks in Patients With Hereditary Angioedema

    PubMed Central

    Tortorici, Michael A.; Pawaskar, Dipti; Pragst, Ingo; Machnig, Thomas; Hutmacher, Matthew; Zuraw, Bruce; Cicardi, Marco; Craig, Timothy; Longhurst, Hilary; Sidhu, Jagdev

    2018-01-01

    Subcutaneous C1‐inhibitor (HAEGARDA, CSL Behring), is a US Food and Drug Administration (FDA)‐approved, highly concentrated formulation of a plasma‐derived C1‐esterase inhibitor (C1‐INH), which, in the phase III Clinical Studies for Optimal Management in Preventing Angioedema with Low‐Volume Subcutaneous C1‐inhibitor Replacement Therapy (COMPACT) trial, reduced the incidence of hereditary angioedema (HAE) attacks when given prophylactically. Data from the COMPACT trial were used to develop a repeated time‐to‐event model to characterize the timing and frequency of HAE attacks as a function of C1‐INH activity, and then develop an exposure–response model to assess the relationship between C1‐INH functional activity levels (C1‐INH(f)) and the risk of an attack. The C1‐INH(f) values of 33.1%, 40.3%, and 63.1% were predicted to correspond with 50%, 70%, and 90% reductions in the HAE attack risk, respectively, relative to no therapy. Based on trough C1‐INH(f) values for the 40 IU/kg (40.2%) and 60 IU/kg (48.0%) C1‐INH (SC) doses, the model predicted that 50% and 67% of the population, respectively, would see at least a 70% decrease in the risk of an attack. PMID:29316335

  1. Hereditary Angioedema Caused By C1-Esterase Inhibitor Deficiency: A Literature-Based Analysis and Clinical Commentary on Prophylaxis Treatment Strategies

    PubMed Central

    2011-01-01

    Hereditary angioedema (HAE) caused by C1-esterase inhibitor deficiency is an autosomal-dominant disease resulting from a mutation in the C1-inhibitor gene. HAE is characterized by recurrent attacks of intense, massive, localized subcutaneous edema involving the extremities, genitalia, face, or trunk, or submucosal edema of upper airway or bowels. These symptoms may be disabling, have a dramatic impact on quality of life, and can be life-threatening when affecting the upper airways. Because the manifestations and severity of HAE are highly variable and unpredictable, patients need individualized care to reduce the burden of HAE on daily life. Although effective therapy for the treatment of HAE attacks has been available in many countries for more than 30 years, until recently, there were no agents approved in the United States to treat HAE acutely. Therefore, prophylactic therapy is an integral part of HAE treatment in the United States and for selected patients worldwide. Routine long-term prophylaxis with either attenuated androgens or C1-esterase inhibitor has been shown to reduce the frequency and severity of HAE attacks. Therapy with attenuated androgens, a mainstay of treatment in the past, has been marked by concern about potential adverse effects. C1-esterase inhibitor works directly on the complement and contact plasma cascades to reduce bradykinin release, which is the primary pathologic mechanism in HAE. Different approaches to long-term prophylactic therapy can be used to successfully manage HAE when tailored to meet the needs of the individual patient. PMID:23283143

  2. Exposure-Response Model of Subcutaneous C1-Inhibitor Concentrate to Estimate the Risk of Attacks in Patients With Hereditary Angioedema.

    PubMed

    Zhang, Ying; Tortorici, Michael A; Pawaskar, Dipti; Pragst, Ingo; Machnig, Thomas; Hutmacher, Matthew; Zuraw, Bruce; Cicardi, Marco; Craig, Timothy; Longhurst, Hilary; Sidhu, Jagdev

    2018-03-01

    Subcutaneous C1-inhibitor (HAEGARDA, CSL Behring), is a US Food and Drug Administration (FDA)-approved, highly concentrated formulation of a plasma-derived C1-esterase inhibitor (C1-INH), which, in the phase III Clinical Studies for Optimal Management in Preventing Angioedema with Low-Volume Subcutaneous C1-inhibitor Replacement Therapy (COMPACT) trial, reduced the incidence of hereditary angioedema (HAE) attacks when given prophylactically. Data from the COMPACT trial were used to develop a repeated time-to-event model to characterize the timing and frequency of HAE attacks as a function of C1-INH activity, and then develop an exposure-response model to assess the relationship between C1-INH functional activity levels (C1-INH(f)) and the risk of an attack. The C1-INH(f) values of 33.1%, 40.3%, and 63.1% were predicted to correspond with 50%, 70%, and 90% reductions in the HAE attack risk, respectively, relative to no therapy. Based on trough C1-INH(f) values for the 40 IU/kg (40.2%) and 60 IU/kg (48.0%) C1-INH (SC) doses, the model predicted that 50% and 67% of the population, respectively, would see at least a 70% decrease in the risk of an attack. © 2018 The Authors CPT: Pharmacometrics & Systems Pharmacology published by Wiley Periodicals, Inc. on behalf of American Society for Clinical Pharmacology and Therapeutics.

  3. Comparing acquired angioedema with hereditary angioedema (types I/II): findings from the Icatibant Outcome Survey.

    PubMed

    Longhurst, H J; Zanichelli, A; Caballero, T; Bouillet, L; Aberer, W; Maurer, M; Fain, O; Fabien, V; Andresen, I

    2017-04-01

    Icatibant is used to treat acute hereditary angioedema with C1 inhibitor deficiency types I/II (C1-INH-HAE types I/II) and has shown promise in angioedema due to acquired C1 inhibitor deficiency (C1-INH-AAE). Data from the Icatibant Outcome Survey (IOS) were analysed to evaluate the effectiveness of icatibant in the treatment of patients with C1-INH-AAE and compare disease characteristics with those with C1-INH-HAE types I/II. Key medical history (including prior occurrence of attacks) was recorded upon IOS enrolment. Thereafter, data were recorded retrospectively at approximately 6-month intervals during patient follow-up visits. In the icatibant-treated population, 16 patients with C1-INH-AAE had 287 attacks and 415 patients with C1-INH-HAE types I/II had 2245 attacks. Patients with C1-INH-AAE versus C1-INH-HAE types I/II were more often male (69 versus 42%; P = 0·035) and had a significantly later mean (95% confidence interval) age of symptom onset [57·9 (51·33-64·53) versus 14·0 (12·70-15·26) years]. Time from symptom onset to diagnosis was significantly shorter in patients with C1-INH-AAE versus C1-INH-HAE types I/II (mean 12·3 months versus 118·1 months; P = 0·006). Patients with C1-INH-AAE showed a trend for higher occurrence of attacks involving the face (35 versus 21% of attacks; P = 0·064). Overall, angioedema attacks were more severe in patients with C1-INH-HAE types I/II versus C1-INH-AAE (61 versus 40% of attacks were classified as severe to very severe; P < 0·001). Median total attack duration was 5·0 h and 9·0 h for patients with C1-INH-AAE versus C1-INH-HAE types I/II, respectively. © 2016 British Society for Immunology.

  4. An open-label study to evaluate the long-term safety and efficacy of lanadelumab for prevention of attacks in hereditary angioedema: design of the HELP study extension.

    PubMed

    Riedl, Marc A; Bernstein, Jonathan A; Craig, Timothy; Banerji, Aleena; Magerl, Markus; Cicardi, Marco; Longhurst, Hilary J; Shennak, Mustafa M; Yang, William H; Schranz, Jennifer; Baptista, Jovanna; Busse, Paula J

    2017-01-01

    Hereditary angioedema (HAE) is characterized by recurrent attacks of subcutaneous or submucosal edema. Attacks are unpredictable, debilitating, and have a significant impact on quality of life. Patients may be prescribed prophylactic therapy to prevent angioedema attacks. Current prophylactic treatments may be difficult to administer (i.e., intravenously), require frequent administrations or are not well tolerated, and breakthrough attacks may still occur frequently. Lanadelumab is a subcutaneously-administered monoclonal antibody inhibitor of plasma kallikrein in clinical development for prophylaxis of hereditary angioedema attacks. A Phase 1b study supported its efficacy in preventing attacks. A Phase 3, randomized, double-blind, placebo-controlled, parallel-arm study has been completed and an open-label extension is currently ongoing. The primary objective of the open-label extension is to evaluate the long-term safety of repeated subcutaneous administrations of lanadelumab in patients with type I/II HAE. Secondary objectives include evaluation of efficacy and time to first angioedema attack to determine outer bounds of the dosing interval. The study will also evaluate immunogenicity, pharmacokinetics/pharmacodynamics, quality of life, characteristics of breakthrough attacks, ease of self-administration, and safety/efficacy in patients who switch to lanadelumab from another prophylactic therapy. The open-label extension will enroll patients who completed the double-blind study ("rollover patients") and those who did not participate in the double-blind study ("non-rollover patients"), which includes patients who may or may not be currently using another prophylactic therapy. Rollover patients will receive a single 300 mg dose of lanadelumab on Day 0 and the second dose after the patient's first confirmed angioedema attack. Thereafter, lanadelumab will be administered every 2 weeks. Non-rollover patients will receive 300 mg lanadelumab every 2 weeks regardless

  5. Recent advances in management and treatment of hereditary angioedema.

    PubMed

    Sardana, Niti; Craig, Timothy J

    2011-12-01

    Hereditary angioedema (HAE) is a rare autosomal-dominant disease characterized by recurrent self-limiting episodes of skin and mucosal edema. Morbidity and mortality are significant, and new and pending therapies are now available to reduce the risk associated with the disease. To update the reader on new advances in HAE to improve patient care. We performed a literature search of Ovid, PubMed, and Google to develop this review. Articles that are necessary for the understanding and use of the new therapeutic options for HAE were chosen, and studies of high quality were used to support the use of therapies, and in most cases, results from phase III studies were used. Until recently, therapy for HAE attacks in the United States consisted of symptom relief with narcotics, hydration, and fresh-frozen plasma, which contains active C1 inhibitor. Therapy to prevent HAE attacks has been confined to androgens and, occasionally, antifibrinolytic agents; however, both drug groups have significant adverse effects. The approval of C1-inhibitor concentrate for prevention and acute therapy has improved efficacy and safety. Ecallantide has also been approved for therapy of attacks, and icatibant is expected to be approved in the next few months for attacks. Recombinant C1 inhibitor is presently in phase III studies and should be available for attacks in the near future. In this article we review the changing therapeutic options available for patients in 2011 and beyond.

  6. Does the initiation of urate-lowering treatment during an acute gout attack prolong the current episode and precipitate recurrent attacks: a systematic literature review.

    PubMed

    Eminaga, Fatma; La-Crette, Jonathan; Jones, Adrian; Abhishek, A

    2016-12-01

    The aim of this study was to systematically review the literature on effect of initiating urate-lowering treatment (ULT) during an acute attack of gout on duration of index attack and persistence on ULT. OVID (Medline), EMBASE and AMED were searched to identify randomized controlled trials (RCTs) of ULT initiation during acute gout attack published in English language. Two reviewers appraised the study quality and extracted data independently. Standardized mean difference (SMD) and relative risk (RR) were used to pool continuous and categorical data. Meta-analysis was carried out using STATA version 14. A total of 537 studies were selected. A total of 487 titles and abstracts were reviewed after removing duplicates. Three RCTs were identified. There was evidence from two high-quality studies that early initiation of allopurinol did not increase pain severity at days 10-15 [SMD pooled (95 % CI) 0.18 (-0.58, 0.93)]. Data from three studies suggested that initiation of ULT during an acute attack of gout did not associate with dropouts [RR pooled (95 % CI) 1.16 (0.58, 2.31)]. There is moderate-quality evidence that the initiation of ULT during an acute attack of gout does not increase pain severity and risk of ULT discontinuation. Larger studies are required to confirm these findings so that patients with acute gout can be initiated on ULT with confidence.

  7. [Undiagnosed hereditary angioedema in a patient undergoing emergency caesarean section].

    PubMed

    Tomita, Yukihiko; Kamei, Masataka; Jyujou, Satoshi; Horiuchi, Chinami; Katsuragi, Shinji; Onishi, Yoshihiko

    2012-12-01

    Hereditary angioedema (HAE) is characterized by acute, recurrent attacks of localized edema. Surgical procedures, trauma, and infections have been considered as potential triggers of HAE. Although HAE is a rare genetic disorder, approximately 50-60% of all HAE patients are involved with at least one occurrence of upper airway obstruction. The airway trouble is the most life-threating complication in HAE patients because HAE-related edema does not respond to typical treatment, such as administration of epinephrine, antihistamines, or glucocorticoids. Indeed, mortality rates of laryngeal attack are estimated around 25% to 40%. Here we describe a case of undiagnosed HAE patient undergoing emergency caesarean section under neuraxial blockade. A 31-year-old woman showed multiple regions at her lip margin during surgery and rapidly developed lip swelling after admission to the ward. Neither respiratory nor hemodynamic instability was found during and after surgery. Immediately, in order to assess whether HAE caused these dermatological manifestations, we measured values of both complement component 4 (C4) and functional activity of C1-esterase inhibitor (C1-inh), a protein of the complement system. These laboratory data showed low levels, which were compatible with HAE definition. After commencement of C1-inhibitor replacement therapy, her lip swelling and erythema gradually disappeared without adverse drug reactions. The patient was finally discharged from our institution 10 days after surgery.

  8. Novel usage of fresh frozen plasma in hereditary angioedema.

    PubMed

    Hanizah, N; Affirul, C A; Farah, N A; Shamila, M A; Ridzuan, M I

    2016-01-01

    Hereditary angioedema (HAE) is a rare and potentially life threatening autosomal dominant disease characterized by recurrent episodes of cutaneous and mucosal oedema. It results from reduced expression or loss of function of CI-esterase inhibitors (C1-INH). As opposed to the more common histamine-mediated angioedema, HAE does not respond well to conventional treatments with anti-histamines, steroids and adrenaline. Early recognition and timely intervention with the correct treatment are crucial particularly preventing airway obstruction. New disease specific treatment including plasma derived or recombinant C1-INH, ecallantide and icatibant have recently emerged and its appropriate use can reduce HAE-associated mortality and morbidity. However due to its costs, these disease specific treatments have yet to reach Malaysia. Despite that no randomized clinical trial on FFP has been performed, its efficacy in treating acute attacks of HAE is only demonstrated in case studies. This case report illustrates the successful treatment of acute HAE episode with FFP in a Malaysian government hospital setting.

  9. Development and content validity testing of a patient-reported outcomes questionnaire for the assessment of hereditary angioedema in observational studies.

    PubMed

    Bonner, Nicola; Abetz-Webb, Linda; Renault, Lydie; Caballero, Teresa; Longhurst, Hilary; Maurer, Marcus; Christiansen, Sandra; Zuraw, Bruce

    2015-07-01

    Hereditary Angioedema (HAE), a rare genetic disease, manifests as intermittent, painful attacks of angioedema. Attacks vary in frequency and severity and include skin, abdominal and life-threatening laryngeal swellings. This study aimed to develop a patient reported outcome (PRO) tool for the assessment of HAE attacks, including their management and impact on patients' lives, for use in clinical studies, or by physicians in general practice. The results of open-ended face to face concept elicitation interviews with HAE patients in Argentina (n = 10) and the US (n = 33) were used to develop the first draft questionnaire of the HAE patient reported outcomes questionnaire (HAE PRO). Subsequently, in-depth cognitive debriefing interviews were performed with HAE patients in the UK (n = 10), Brazil (n = 10), Germany (n = 11) and France (n = 12). Following input from eight multinational clinical experts further cognitive interviews were conducted in the US (n = 12) and Germany (n = 12). Patients who experienced abdominal, cutaneous or laryngeal attacks of varying severity levels were included in all rounds of interviews. Across the rounds of interviews patients discussed their HAE attack symptoms, impacts and treatments. Cognitive debriefing interviews explored patient understanding and relevance of questionnaire items. All interviews were conducted face to face following a pre-defined semi-structured interview guide in the patient's native language. Patients reported a variety of HAE symptoms, attack triggers, warning signs, attack impacts and treatment options which were used to develop the HAE PRO. The HAE PRO was revised and refined following input from patients and clinical experts. The final 18-item HAE PRO provides an assessment of the HAE attack experience including symptoms, impacts, treatment requirements, healthcare resource use and loss of productivity caused by HAE attacks. Patient and expert input has contributed to the

  10. Acute stress disorder in hospitalised victims of 26/11-terror attack on Mumbai, India.

    PubMed

    Balasinorwala, Vanshree Patil; Shah, Nilesh

    2010-11-01

    The 26/11 terror attacks on Mumbai have been internationally denounced. Acute stress disorder is common in victims of terror. To find out the prevalence and to correlate acute stress disorder, 70 hospitalised victims of terror were assessed for presence of the same using DSM-IV TR criteria. Demographic data and clinical variables were also collected. Acute stress disorder was found in 30% patients. On demographic profile and severity of injury, there were some interesting observations and differences between the victims who developed acute stress disorder and those who did not; though none of the differences reached the level of statistical significance. This study documents the occurrence of acute stress disorder in the victims of 26/11 terror attack.

  11. Comparing acquired angioedema with hereditary angioedema (types I/II): findings from the Icatibant Outcome Survey

    PubMed Central

    Zanichelli, A.; Caballero, T.; Bouillet, L.; Aberer, W.; Maurer, M.; Fain, O.; Fabien, V.; Andresen, I.

    2017-01-01

    Summary Icatibant is used to treat acute hereditary angioedema with C1 inhibitor deficiency types I/II (C1‐INH‐HAE types I/II) and has shown promise in angioedema due to acquired C1 inhibitor deficiency (C1‐INH‐AAE). Data from the Icatibant Outcome Survey (IOS) were analysed to evaluate the effectiveness of icatibant in the treatment of patients with C1‐INH‐AAE and compare disease characteristics with those with C1‐INH‐HAE types I/II. Key medical history (including prior occurrence of attacks) was recorded upon IOS enrolment. Thereafter, data were recorded retrospectively at approximately 6‐month intervals during patient follow‐up visits. In the icatibant‐treated population, 16 patients with C1‐INH‐AAE had 287 attacks and 415 patients with C1‐INH‐HAE types I/II had 2245 attacks. Patients with C1‐INH‐AAE versus C1‐INH‐HAE types I/II were more often male (69 versus 42%; P = 0·035) and had a significantly later mean (95% confidence interval) age of symptom onset [57·9 (51·33–64·53) versus 14·0 (12·70–15·26) years]. Time from symptom onset to diagnosis was significantly shorter in patients with C1‐INH‐AAE versus C1‐INH‐HAE types I/II (mean 12·3 months versus 118·1 months; P = 0·006). Patients with C1‐INH‐AAE showed a trend for higher occurrence of attacks involving the face (35 versus 21% of attacks; P = 0·064). Overall, angioedema attacks were more severe in patients with C1‐INH‐HAE types I/II versus C1‐INH‐AAE (61 versus 40% of attacks were classified as severe to very severe; P < 0·001). Median total attack duration was 5·0 h and 9·0 h for patients with C1‐INH‐AAE versus C1‐INH‐HAE types I/II, respectively. PMID:27936514

  12. Corneal status in primary angle-closure glaucoma with a history of acute attack.

    PubMed

    Chen, Mei-Ju; Liu, Catherine Jui-Ling; Cheng, Ching-Yu; Lee, Shui-Mei

    2012-01-01

    The corneal status of patients with primary angle-closure glaucoma (PACG) with a history of acute attack was investigated. This cross-sectional study included 40 eyes of PACG patients with an earlier documented symptomatic acute angle-closure attack (aPACG), 40 uninvolved fellow eyes of aPACG patients (fPACG), 44 eyes of chronic PACG patients without such a history (cPACG), and 50 eyes of age-matched normal participants. All glaucoma patients had patent peripheral iridotomies with adequate intraocular pressure control. The examinations and recorded parameters included visual acuity, intraocular pressure, gonioscopy, vertical cup-to-disc ratio, specular microscopy, central corneal pachymetry, refraction, corneal curvature radius, anterior chamber depth, axial length, and lens thickness measurements, and the presenting intraocular pressure and the duration of acute angle-closure attack for aPACG eyes. The mean endothelial cell density was 2271±80 cells/mm(2) in aPACG, 2458±79 cells/mm(2) in fPACG, 2379±50 cells/mm(2) in cPACG, and 2559±45 cells/mm(2) in controls. The aPACG eyes had significantly lower endothelial cell density compared with normal eyes (P=0.002). There was no significant difference in endothelial cell density of aPACG eyes compared with fPACG or cPACG eyes. Multivariate analysis showed the duration of the acute attack was the only factor independently associated with corneal endothelial density of aPACG eyes. The mean central corneal thickness of aPACG (549±32 μm) did not differ significantly from control eyes (552±27 μm), cPACG (557±32 μm), and fPACG (553±31 μm) (P=0.911, 0.274, and 0.725, respectively). Corneal curvature radius of aPACG eyes was not significantly different from that of the comparison groups (all P>0.05). Corneal endothelial cell density was significantly reduced in aPACG eyes compared with normal eyes. No significant difference in endothelial cell density of aPACG eyes was noted when compared with fPACG or cPACG eyes

  13. The Seasonality of Acute Attack of Primary Angle-Closure Glaucoma in Beijing, China.

    PubMed

    Zhu, Jingyuan; Xu, Yang; Wang, Hongyuan; Liu, Dongjing; Zhu, Jingbo; Wu, Huijuan

    2018-03-05

    In this study, the seasonality of acute attack of primary angle-closure glaucoma (PACG) was analysed. This retrospective case series included 283 patients (200 women, 83 men; mean age, 68.2 ± 10.3 years; range, 37-96 years) with acute attack of PACG from a university-based clinic over 4 years. Patients' age and sex, and the date and season of onset of PACG attack, were analysed. Descriptive analysis and von Mises distribution were used for statistical analysis. The highest incidence of acute attack of PACG was observed in those aged 60-69 years (34.6%). Descriptive analysis showed that the incidence was greater in June and July for men, November for women, and November for the entire sample. An angular plot (using von Mises distribution) of the individual dates of onset revealed the estimated peak onset on September 11, November 8, and October 28 for men, women, and both, respectively. Integration of the results from the two analyses revealed the incidence to be higher in the summer and winter for men, and in the winter for women and for the entire sample. More females than males were affected. Monthly and seasonal variations in onset were observed, which might be related to weather changes.

  14. Triggers of acute attacks of gout, does age of gout onset matter? A primary care based cross-sectional study.

    PubMed

    Abhishek, Abhishek; Valdes, Ana M; Jenkins, Wendy; Zhang, Weiya; Doherty, Michael

    2017-01-01

    To determine the proportion of people with gout who self-report triggers of acute attacks; identify the commonly reported triggers, and examine the disease and demographic features associated with self-reporting any trigger(s) of acute attacks of gout. Individuals with gout were asked to fill a questionnaire enquiring about triggers that precipitated their acute gout attacks. Binary logistic regression was used to compute odds ratio (OR) and 95% confidence intervals (CI) to examine the association between having ≥1 self-reported trigger of acute gout and disease and demographic risk factors and to adjust for covariates. All statistical analyses were performed using STATA. 550 participants returned completed questionnaires. 206 (37.5%) reported at least one trigger of acute attacks, and less than 5% reported >2 triggers. Only 28.73% participants reported that their most recent gout attack was triggered by dietary or lifestyle risk factors. The most frequently self-reported triggers were alcohol intake (14.18%), red-meat or sea-food consumption (6%), dehydration (4.91%), injury or excess activity (4.91%), and excessively warm or cold weather (4.36% and 5.45%). Patients who had onset of gout before the age of 50 years were significantly more likely to identify a trigger for precipitating their acute gout attacks (aOR (95%CI) 1.73 (1.12-2.68) after adjusting for covariates. Most people with gout do not identify any triggers for acute attacks, and identifiable triggers are more common in those with young onset gout. Less than 20% people self-reported acute gout attacks from conventionally accepted triggers of gout e.g. alcohol, red-meat intake, while c.5% reported novel triggers such as dehydration, injury or physical activity, and weather extremes.

  15. Triggers of acute attacks of gout, does age of gout onset matter? A primary care based cross-sectional study

    PubMed Central

    Valdes, Ana M.; Jenkins, Wendy; Zhang, Weiya; Doherty, Michael

    2017-01-01

    Objectives To determine the proportion of people with gout who self-report triggers of acute attacks; identify the commonly reported triggers, and examine the disease and demographic features associated with self-reporting any trigger(s) of acute attacks of gout. Methods Individuals with gout were asked to fill a questionnaire enquiring about triggers that precipitated their acute gout attacks. Binary logistic regression was used to compute odds ratio (OR) and 95% confidence intervals (CI) to examine the association between having ≥1 self-reported trigger of acute gout and disease and demographic risk factors and to adjust for covariates. All statistical analyses were performed using STATA. Results 550 participants returned completed questionnaires. 206 (37.5%) reported at least one trigger of acute attacks, and less than 5% reported >2 triggers. Only 28.73% participants reported that their most recent gout attack was triggered by dietary or lifestyle risk factors. The most frequently self-reported triggers were alcohol intake (14.18%), red-meat or sea-food consumption (6%), dehydration (4.91%), injury or excess activity (4.91%), and excessively warm or cold weather (4.36% and 5.45%). Patients who had onset of gout before the age of 50 years were significantly more likely to identify a trigger for precipitating their acute gout attacks (aOR (95%CI) 1.73 (1.12–2.68) after adjusting for covariates. Conclusion Most people with gout do not identify any triggers for acute attacks, and identifiable triggers are more common in those with young onset gout. Less than 20% people self-reported acute gout attacks from conventionally accepted triggers of gout e.g. alcohol, red-meat intake, while c.5% reported novel triggers such as dehydration, injury or physical activity, and weather extremes. PMID:29023487

  16. Analysis of characteristics associated with reinjection of icatibant: Results from the icatibant outcome survey.

    PubMed

    Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus

    2015-01-01

    Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms

  17. The association of vitamin D, cathelicidin, and vitamin D binding protein with acute asthma attacks in children.

    PubMed

    Arikoglu, Tugba; Kuyucu, Semanur; Karaismailoglu, Eda; Batmaz, Sehra Birgul; Balci, Senay

    2015-01-01

    Recent evidence about the various effects of vitamin D (vit D) on innate and adaptive immunity has led to a search for the role of vit D in asthma. It is postulated that a decrease in cathelicidin, a multifunctional host defense molecule, production due to low vit D status may predispose to infectious complications in children with asthma. The aim of this study was to determine the association of vit D, vit D-binding protein (VDBP) and cathelicidin with acute asthma attacks among children with allergic asthma. This prospective study included 35 patients with acute asthma attack and 32 children with controlled asthma, and all were matched by sampling season, sensitization to mites, and previous severity of asthma. A comprehensive questionnaire about risk factors, blood sampling for 25-hydroxyvitamin D vit D, VDBP, and cathelicidin levels; spirometric indices were used. Factors that influence serum vit D and cathelicidin levels and the development of asthma attacks were evaluated with multivariate analysis. The mean serum vit D levels of the attack group was significantly lower than that of the controlled asthma group (p < 0.001). The mean cathelicidin level was significantly higher in the acute asthma group than with the controlled subjects with asthma (p = 0.002). There was no difference between the acute and controlled asthma groups in terms of markers of allergy and serum VDBP levels. Risk factors that may influence vit D levels revealed that body mass index (BMI) (p = 0.038), duration of sun exposure (p < 0.001), and amount of dietary vit D (p < 0.001) independently affected serum vit D levels. Risk factors that may result in acute asthma showed that low serum levels of vit D were significantly related to the risk of asthma attacks (p < 0.001, adjusted odds ratio 16.11). Cathelicidin levels showed a significant positive association with asthma attacks and BMI. Vit D deficiency showed a significant relationship to the development of asthma attacks independent of

  18. The Icatibant Outcome Survey: experience of hereditary angioedema management from six European countries.

    PubMed

    Caballero, T; Aberer, W; Longhurst, H J; Maurer, M; Zanichelli, A; Perrin, A; Bouillet, L; Andresen, I

    2017-07-01

    Hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) is a rare, potentially fatal, bradykinin-mediated disease. Icatibant is a bradykinin B2 receptor antagonist originally approved in 2008 in the European Union and 2011 in the United States as an acute therapy option for HAE attacks in adults. To compare demographics, disease characteristics and treatment outcomes of icatibant-treated HAE attacks in patients with C1-INH-HAE enrolled in the Icatibant Outcome Survey across six European countries: Austria, France, Germany, Italy, Spain and the UK. The Icatibant Outcome Survey [IOS; Shire, Zug, Switzerland (NCT01034969)] is an international observational study monitoring the safety and effectiveness of icatibant. Descriptive, retrospective analyses compared IOS country data derived during July 2009-April 2015. Overall, 481 patients with C1-INH-HAE provided demographic data. A significant difference across countries in age at onset (P = 0.003) and baseline attack frequency (P < 0.001) was found although no significant differences were found with respect to gender (majority female; P = 0.109), age at diagnosis (P = 0.182) or delay in diagnosis (P = 0.059). Icatibant was used to treat 1893 attacks in 325 patients with majority self-administration in all countries. Overall, significant differences (all P < 0.001) were found across countries in time to treatment [median 1.8 h; median range: 0.0 (Germany-Austria) to 4.4 (France) h], time to resolution [median 6.5 h; median range: 3 (Germany-Austria) to 12 (France) h] and attack duration [median 10.5 h; median range: 3.1 (Germany-Austria) to 18.5 (France) h]. These data form the first European cross-country comparison of disease characteristics and icatibant use in patients with C1-INH-HAE who are enrolled in IOS. International variation in icatibant practice and treatment outcomes across the six European countries assessed highlight the need to further investigate the range of country-specific parameters

  19. The Complex Interaction Between Polycystic Ovary Syndrome and Hereditary Angioedema: Case Reports and Review of the Literature.

    PubMed

    Iahn-Aun, Marina; Aun, Marcelo Vivolo; Motta, Antonio Abílio; Kalil, Jorge; Giavina-Bianchi, Pedro; Hayashida, Sylvia Asaka; Baracat, Edmund Chada; Maciel, Gustavo Arantes

    2017-07-01

    Hereditary angioedema (HAE) is a rare but severe disease, with high risk of death, and attacks have been associated to high estrogen levels. Polycystic ovary syndrome (PCOS) is a common hyperandrogenic condition, which is frequently treated with combined oral contraceptives. The aim of this study was to describe 2 clinical cases of young women diagnosed as having PCOS who developed HAE attacks after the introduction of combined estrogen-progestin pills to treat PCOS symptoms. Literature review of sex hormones' role in genesis of HAE attacks and possible mechanisms involved. In the cases reported, after initiation of combined contraceptives, patients presented with facial swelling with airway involvement (laryngeal edema) and abdominal pain. They had a familial history of angioedema and normal C1 inhibitor (C1-INH) levels, leading to the diagnosis of HAE with normal C1-INH (HAEnC1-INH) or HAE type III. After suspension of exogenous estrogen, patients remained asymptomatic from HAE. HAEnC1-INH is an estrogen-dependent form of HAE. It is well established that exogenous estrogen triggers attacks of all types of HAE. However, this is the first description of the association between PCOS and HAE, in which PCOS could be masking HAE symptoms. We propose that PCOS might have a protective role regarding HAE attacks, because of its particular hormonal features, that is, hyperandrogenism and relative stable levels of estradiol. The use of combined estrogen-progestin compounds in women with PCOS and HAE must be avoided, and treatment must be individualized.

  20. Typhoid fever as a triggering factor in acute and intractable bronchial asthma attack.

    PubMed

    Wardhana; Surachmanto, Eko E; Datau, E A

    2013-10-01

    Typhoid fever is an enteric infection caused by Salmonella typhi. In Indonesia, typhoid fever is endemic with high incidence of the disease. In daily practice we frequently have patients with bronchial asthma, and it is becoming worse when these patients get typhoid fever. After oral ingestion, Salmonella typhi invades the the intestine mucosa after conducted by microbial binding to epithelial cells, destroying the microfold cells (M cell) then passed through the lamina propria and detected by dendritic cells (DC) which express a variety of pathogen recognition receptors on the surfaces, including Toll-Like Receptor (TLR). expressed on macrophages and on intestinal epithelial cells inducing degradation of IB, and translocation of NF-B (Nuclear Factor-Kappa Beta). This process initiates the induction of pro-inflammatory gene expression profile adhesion molecules, chemokines, adhesion molecules, and other proteins that induce and perpetuate the inflammation in host cells then will induce acute ant intractable attack of bronchial asthma. The role of typhoid fever in bronchial asthma, especially in persons with acute attack of bronchial asthma, is not well understood. In this article, we will discuss the role of typhoid fever in the bronchial asthma patients which may cause bronchial asthma significantly become more severe even triggering the acute and intractable attack of bronchial asthma. This fact makes an important point, to treat completely the typhoid fever in patients with bronchial asthma.

  1. Choroidal Thickness Changes in the Acute Attack Period in Patients with Familial Mediterranean Fever.

    PubMed

    Gundogan, Fatih C; Akay, Fahrettin; Uzun, Salih; Ozge, Gokhan; Toyran, Sami; Genç, Halil

    2016-01-01

    The aim of this study was to evaluate choroidal thickness changes during acute attacks of familial Mediterranean fever (FMF). Fifty patients with FMF and 50 healthy controls were included. Choroidal thickness of each participant was measured at the foveola and horizontal nasal and temporal quadrants at 500-µm intervals to 1,500 µm from the foveola using spectral-domain optical coherence tomography. White blood cell count, erythrocyte sedimentation rate (ESR) and serum levels of fibrinogen and C-reactive protein (CRP) were evaluated. The clinical findings (peritonitis, arthritis and pleuritis) were noted. Choroidal thickness was significantly thicker at all measurement points in FMF patients compared to healthy controls during an acute attack (p < 0.05). There were positive correlations between the choroidal thickness and ESR, fibrinogen and, particularly, CRP levels. Clinical findings did not change the choroidal thickness significantly (p > 0.05). Increased choroidal thickness in the acute phase of FMF is possibly related to the inflammatory edematous changes in the choroid. © 2015 S. Karger AG, Basel.

  2. Efficacy of parecoxib, sumatriptan, and rizatriptan in the treatment of acute migraine attacks.

    PubMed

    Müller, Thomas; Lohse, Lutz

    2011-01-01

    Triptans and analgetic nonsteroidal inflammatory drugs reduce acute pain syndromes in migraine. A further treatment option for an acute headache attack in patients with migraine may be the application of cyclooxygenase-2-specific inhibitors, as they have anti-inflammatory and analgesic properties. The objective of this pilot study was to investigate the effects of an oral fast-dissolving tablet of 10 mg of rizatriptan, an intravenous infusion of 40 mg of parecoxib, and a subcutaneous pen injection of sumatriptan (6 mg/0.5 mL) on pain relief in 3 cohorts of patients with episodic migraine. They were treated owing to the acute onset of a pain attack as a case of emergency. They were randomized to treatment with sumatriptan, rizatriptan, or parecoxib. The participants completed a visual analog scale for pain intensity at baseline before the drug administration and then after intervals of 20, 30, 60, and 120 minutes. Rizatriptan, parecoxib, and sumatriptan reduced pain symptoms. Twenty and 30 minutes after drug intake, rizatriptan was more efficacious than parecoxib and sumatriptan, and parecoxib was more effective than sumatriptan. Only a significant difference between rizatriptan and sumatriptan was found after 60 and 120 minutes. This trial demonstrates the effectiveness of a parecoxib infusion in the treatment of acute migraine and that the circumvention of the first pass effect of the liver by rizatriptan may be beneficial for fast pain relief.

  3. Clinical significance of delta neutrophil index in the differential diagnosis between septic arthritis and acute gout attack within 24 hours after hospitalization

    PubMed Central

    Pyo, Jung Yoon; Kim, Dae Sik; Jung, Seung Min; Song, Jason Jungsik; Park, Yong-Beom; Lee, Sang-Won

    2017-01-01

    Abstract The most important differential diagnoses of acute monoarticular arthritis are septic arthritis and acute gout attack. Identifying infection is crucial in preventing the devastating outcome of septic arthritis. The delta neutrophil index (DNI) is a value that corresponds to the fraction of circulating immature granulocytes. As DNI reflects the burden of infection, we evaluated this index as a differentiating marker between septic arthritis and acute gout attack. The medical records of 149 patients with septic arthritis and 194 patients with acute gout attack were reviewed. A specific cell analyzer, ADVIA 2120, was used to measure DNI. Clinical and laboratory markers associated with predicting septic arthritis were assessed by using logistic regression. Patients with septic arthritis showed higher levels of DNI than those with acute gout attack (3.3 vs 0.6%, P < .001). Similar results were observed in patients without monosodium urate (MSU) crystal confirmation or those with normouricemia (3.3 vs 0.5 and 3.1 vs 0.7%, respectively; P < .001 for both). A DNI level of 1.9% was determined as the cutoff value for predicting septic arthritis. In the multivariate analysis, DNI was the most powerful independent value for predicting septic arthritis (odds ratio 14.003). This study showed the possibility of using DNI as a differentiating marker between septic arthritis and acute gout attack at the crucial early phase. DNI showed its relevance regardless of confirmation of MSU crystal deposition or serum level of uric acid. PMID:28746185

  4. [Mortality rate of acute heart attack in Zalaegerszeg micro-region. Results of the first Hungarian 24-hour acute ST-elevation myocardial infarction intervention care unit].

    PubMed

    Lupkovics, Géza; Motyovszki, Akos; Németh, Zoltán; Takács, István; Kenéz, András; Burkali, Bernadett; Menyhárt, Ildikó

    2010-04-04

    Morbidity and mortality rates of acute heart attack emphasize the significance of this patient group worldwide. The prompt and exact diagnosis and the timing of adequate therapy is crucial for this patients. Modern supply of acute heart attack includes invasive cardiology intervention, primer percutaneous coronary intervention. In year 1999, American and European recommendations suggested primer percutaneous coronary intervention only as an alternative possibility instead of thrombolysis, or in case of cardiogenic shock. 24 hour intervention unit for patients with acute heart attack was first organized in Hungary in Zala County Hospital's Cardiology Department, in year 1998. Our present study confirms, that since the intervention treatment has been introduced, average mortality rate has been reduced considerably in our area comparing to the national average. Mortality rates in West Transdanubian region and in Zalaegerszeg's micro-region were studied and compared for the period between 1997-2004, according to the data of National Public Health and Medical Officer Service. These data were then compared with the national average mortality data of Hungarian Central Statistical Office. With the help of our own computerized database we examined this period and compared the number of the completed invasive interventions to the mortality statistics. In the first full year, in 1998, we completed 82 primer and 283 elective PCIs; these number increased to 318 and 1265 by year 2005. At the same time, significant decrease of acute infarction related mortality was detectable among men of the Zalaegerszeg micro-region, comparing to the national average (p<0.001). The first Hungarian 24 hour acute heart attack intervention care improved the area's mortality statistics significantly, comparing to the national average. The skilled work of the experienced team means an important advantage to the patients in Zalaegerszeg micro-region.

  5. Socioeconomic burden of hereditary angioedema: results from the hereditary angioedema burden of illness study in Europe.

    PubMed

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen; Hautamaki, Emily; Sisic, Zlatko; Wait, Suzanne; Boysen, Henrik B; Caballero, Teresa

    2014-07-04

    Hereditary angioedema (HAE) due to C1 inhibitor deficiency is a rare but serious and potentially life-threatening disease marked by spontaneous, recurrent attacks of swelling. The study objective was to characterize direct and indirect resource utilization associated with HAE from the patient perspective in Europe. The study was conducted in Spain, Germany, and Denmark to assess the real-world experience of HAE via a cross-sectional survey of HAE patients, including direct and indirect resource utilization during and between attacks for patients and their caregivers over the past 6 months. A regression model examined predictors of medical resource utilization. Overall, 164 patients had an attack in the past 6 months and were included in the analysis. The most significant predictor of medical resource utilization was the severity of the last attack (OR 2.6; p < 0.001). Among patients who sought medical care during the last attack (23%), more than half utilized the emergency department. The last attack prevented patients from their normal activities an average of 4-12 hours. Patient and caregiver absenteeism increased with attack severity and frequency. Among patients who were working or in school (n = 120), 72 provided work/school absenteeism data, resulting in an estimated 20 days missing from work/school on average per year; 51% (n = 84) indicated that HAE has hindered their career/educational advancement. HAE poses a considerable burden on patients and their families in terms of direct medical costs and indirect costs related to lost productivity. This burden is substantial at the time of attacks and in between attacks.

  6. Socioeconomic burden of hereditary angioedema: results from the hereditary angioedema burden of illness study in Europe

    PubMed Central

    2014-01-01

    Background Hereditary angioedema (HAE) due to C1 inhibitor deficiency is a rare but serious and potentially life-threatening disease marked by spontaneous, recurrent attacks of swelling. The study objective was to characterize direct and indirect resource utilization associated with HAE from the patient perspective in Europe. Methods The study was conducted in Spain, Germany, and Denmark to assess the real-world experience of HAE via a cross-sectional survey of HAE patients, including direct and indirect resource utilization during and between attacks for patients and their caregivers over the past 6 months. A regression model examined predictors of medical resource utilization. Results Overall, 164 patients had an attack in the past 6 months and were included in the analysis. The most significant predictor of medical resource utilization was the severity of the last attack (OR 2.6; p < 0.001). Among patients who sought medical care during the last attack (23%), more than half utilized the emergency department. The last attack prevented patients from their normal activities an average of 4–12 hours. Patient and caregiver absenteeism increased with attack severity and frequency. Among patients who were working or in school (n = 120), 72 provided work/school absenteeism data, resulting in an estimated 20 days missing from work/school on average per year; 51% (n = 84) indicated that HAE has hindered their career/educational advancement. Conclusion HAE poses a considerable burden on patients and their families in terms of direct medical costs and indirect costs related to lost productivity. This burden is substantial at the time of attacks and in between attacks. PMID:24996814

  7. Acute neck pain caused by pseudogout attack of calcified cervical yellow ligament: a case report.

    PubMed

    Kobayashi, Takashi; Miyakoshi, Naohisa; Abe, Toshiki; Abe, Eiji; Kikuchi, Kazuma; Noguchi, Hideaki; Konno, Norikazu; Shimada, Yoichi

    2016-05-30

    Calcification of the yellow ligament sometimes compresses the spinal cord and can induce myelopathy. Usually, the calcification does not induce acute neck pain. We report a case of a patient with acute neck pain caused by calcium pyrophosphate dihydrate in a calcified cervical yellow ligament. A 70-year-old Japanese woman presented with acute neck pain. She had a moderately high fever (37.5 °C), and her neck pain was so severe that she could not move her neck in any direction. Computed tomography showed a high-density area between the C5 and C6 laminae suspicious for calcification of the yellow ligament. Magnetic resonance imaging showed intermediate-signal intensity on T1-weighted imaging and high-signal intensity on T2-weighted imaging surrounding a low-signal region on both T1- and T2-weighted imaging with cord compression. There was a turbid, yellow fluid collection in the yellow ligament at the time of operation. Histologically, calcium pyrophosphate dihydrate crystals were found in the fluid, and she was diagnosed as having a pseudogout attack of the yellow ligament. Pseudogout attack of the cervical yellow ligament is rare, but this clinical entity should be added to the differential diagnosis of acute neck pain, especially when calcification of the yellow ligament exists.

  8. Risk for Major Bleeding in Patients Receiving Ticagrelor Compared With Aspirin After Transient Ischemic Attack or Acute Ischemic Stroke in the SOCRATES Study (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes).

    PubMed

    Easton, J Donald; Aunes, Maria; Albers, Gregory W; Amarenco, Pierre; Bokelund-Singh, Sara; Denison, Hans; Evans, Scott R; Held, Peter; Jahreskog, Marianne; Jonasson, Jenny; Minematsu, Kazuo; Molina, Carlos A; Wang, Yongjun; Wong, K S Lawrence; Johnston, S Claiborne

    2017-09-05

    Patients with minor acute ischemic stroke or transient ischemic attack are at high risk for subsequent stroke, and more potent antiplatelet therapy in the acute setting is needed. However, the potential benefit of more intense antiplatelet therapy must be assessed in relation to the risk for major bleeding. The SOCRATES trial (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes) was the first trial with ticagrelor in patients with acute ischemic stroke or transient ischemic attack in which the efficacy and safety of ticagrelor were compared with those of aspirin. The main safety objective was assessment of PLATO (Platelet Inhibition and Patient Outcomes)-defined major bleeds on treatment, with special focus on intracranial hemorrhage (ICrH). An independent adjudication committee blinded to study treatment classified bleeds according to the PLATO, TIMI (Thrombolysis in Myocardial Infarction), and GUSTO (Global Use of Strategies to Open Occluded Coronary Arteries) definitions. The definitions of ICrH and major bleeding excluded cerebral microbleeds and asymptomatic hemorrhagic transformations of cerebral infarctions so that the definitions better discriminated important events in the acute stroke population. A total of 13 130 of 13 199 randomized patients received at least 1 dose of study drug and were included in the safety analysis set. PLATO major bleeds occurred in 31 patients (0.5%) on ticagrelor and 38 patients (0.6%) on aspirin (hazard ratio, 0.83; 95% confidence interval, 0.52-1.34). The most common locations of major bleeds were intracranial and gastrointestinal. ICrH was reported in 12 patients (0.2%) on ticagrelor and 18 patients (0.3%) on aspirin. Thirteen of all 30 ICrHs (4 on ticagrelor and 9 on aspirin) were hemorrhagic strokes, and 4 (2 in each group) were symptomatic hemorrhagic transformations of brain infarctions. The ICrHs were spontaneous in 6 and 13, traumatic in 3 and 3, and procedural in 3 and 2

  9. The relationship between anxiety and quality of life in children with hereditary angioedema.

    PubMed

    Kessel, Aharon; Farkas, Henriette; Kivity, Shmuel; Veszeli, Nóra; Kőhalmi, Kinga V; Engel-Yeger, Batya

    2017-11-01

    The severe life-threatening characteristics of hereditary angioedema (HAE) with C1-inhibitor deficiency (C1-INH-HAE) can affect anxiety levels among pediatric patients. This emotional burden together with the physical restrictions of C1-INH-HAE may decrease children's health-related quality of life (HRQoL). (i) To compare anxiety state and trait between children with C1-INH-HAE and healthy controls; (ii) to examine the relationship between the level of anxiety of children with C1-INH-HAE, their disease activity/affected sites and their HRQoL; and (iii) to predict the HRQoL of children with C1-INH-HAE based on their anxiety level and disease activity/affected sites METHODS: Thirty-three children with C1-INH-HAE (aged 5-18 years) and 52 healthy controls were recruited from Israel and Hungary. All children completed the State-Trait Anxiety Inventory for Children (STAIC), the Pediatric Quality of Life Inventory (Peds-QL) demographic questionnaire and a disease activity and site questionnaire . Disease activity was defined as the number of attacks in last year. Both anxiety state and trait were significantly higher among children with C1-INH-HAE as compared to the controls (44.74±10.56 vs 38.76±10.67, P<.01, 29.21±5.16 vs 25.23±4.09, P<.001 in comparison). Significant differences were found between C1-INH-HAE patients with HAE attacks, asymptomatic C1-INH-HAE patients, and healthy controls in both anxiety state (F 56,2 =4.69, P=.001) and trait (F 56,2 =9.06, P<.0001). A higher anxiety trait was correlated with the number of angioedema-affected sites (r=.52, P=.003). The presence of HAE attacks and higher anxiety trait predicted a lower HRQoL in children with C1-INH-HAE. C1-INH-HAE children have higher anxiety trait and state, which correlate with reduced HRQoL domains. © 2017 EAACI and John Wiley and Sons A/S. Published by John Wiley and Sons Ltd.

  10. [Heart-attack in pregnancy].

    PubMed

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  11. Ticagrelor versus Aspirin in Acute Stroke or Transient Ischemic Attack.

    PubMed

    Johnston, S Claiborne; Amarenco, Pierre; Albers, Gregory W; Denison, Hans; Easton, J Donald; Evans, Scott R; Held, Peter; Jonasson, Jenny; Minematsu, Kazuo; Molina, Carlos A; Wang, Yongjun; Wong, K S Lawrence

    2016-07-07

    Ticagrelor may be a more effective antiplatelet therapy than aspirin for the prevention of recurrent stroke and cardiovascular events in patients with acute cerebral ischemia. We conducted an international double-blind, controlled trial in 674 centers in 33 countries, in which 13,199 patients with a nonsevere ischemic stroke or high-risk transient ischemic attack who had not received intravenous or intraarterial thrombolysis and were not considered to have had a cardioembolic stroke were randomly assigned within 24 hours after symptom onset, in a 1:1 ratio, to receive either ticagrelor (180 mg loading dose on day 1 followed by 90 mg twice daily for days 2 through 90) or aspirin (300 mg on day 1 followed by 100 mg daily for days 2 through 90). The primary end point was the time to the occurrence of stroke, myocardial infarction, or death within 90 days. During the 90 days of treatment, a primary end-point event occurred in 442 of the 6589 patients (6.7%) treated with ticagrelor, versus 497 of the 6610 patients (7.5%) treated with aspirin (hazard ratio, 0.89; 95% confidence interval [CI], 0.78 to 1.01; P=0.07). Ischemic stroke occurred in 385 patients (5.8%) treated with ticagrelor and in 441 patients (6.7%) treated with aspirin (hazard ratio, 0.87; 95% CI, 0.76 to 1.00). Major bleeding occurred in 0.5% of patients treated with ticagrelor and in 0.6% of patients treated with aspirin, intracranial hemorrhage in 0.2% and 0.3%, respectively, and fatal bleeding in 0.1% and 0.1%. In our trial involving patients with acute ischemic stroke or transient ischemic attack, ticagrelor was not found to be superior to aspirin in reducing the rate of stroke, myocardial infarction, or death at 90 days. (Funded by AstraZeneca; ClinicalTrials.gov number, NCT01994720.).

  12. Hereditary angioedema with C1 inhibitor deficiency: delay in diagnosis in Europe

    PubMed Central

    2013-01-01

    Background Hereditary angioedema (HAE) is a rare, debilitating, and potentially life-threatening disease characterized by recurrent edema attacks. Important advances in HAE treatment have been made, including the development of new therapies for treating or preventing attacks. Nevertheless, the disease is still frequently misdiagnosed and inappropriately treated, potentially exposing patients with laryngeal attacks to the risk of asphyxiation. Methods The Icatibant Outcome Survey (IOS) is an international, observational study that documents the clinical outcome of HAE patients eligible for treatment with icatibant. Patient ages at first symptoms and at diagnosis were recorded at enrolment, and the delay between first symptoms and diagnosis was calculated. Results The median [range] diagnostic delay in HAE type I and II patients across eight countries was 8.5 years [0–62.0]. The median delay in diagnosis was longer for HAE type II versus type I (21 versus 8 years, respectively), although this did not quite reach statistical significance. Conclusions Although it can be difficult to differentiate HAE symptoms from those of more common angioedema sub-types (e.g. idiopathic or acquired angioedema), our results show that HAE type I and II patients have an unacceptable delay in diagnosis, even those with a family history of the disease. Raising physician awareness of this disabling and potentially fatal disease may lead to a more accurate diagnosis and timely treatment. PMID:23937903

  13. Case-control study of severe life threatening asthma (SLTA) in adults: demographics, health care, and management of the acute attack

    PubMed Central

    Kolbe, J; Fergusson, W; Vamos, M; Garrett, J

    2000-01-01

    BACKGROUND—Severe life threatening asthma (SLTA) is important in its own right and as a proxy for asthma death. In order to target hospital based intervention strategies to those most likely to benefit, risk factors for SLTA among those admitted to hospital need to be identified. A case-control study was undertaken to determine whether, in comparison with patients admitted to hospital with acute asthma, those with SLTA have different sociodemographic and clinical characteristics, evidence of inadequate ongoing medical care, barriers to health care, or deficiencies in management of the acute attack.
METHODS—Seventy seven patients with SLTA were admitted to an intensive care unit (pH 7.17 (0.15), PaCO2 10.7 (5.0) kPa) and 239 matched controls (by date of index attack) with acute asthma were admitted to general medical wards. A questionnaire was administered 24-48 hours after admission.
RESULTS—The risk of SLTA in comparison with other patients admitted with acute asthma increased with age (odds ratio (OR) 1.04/year, 95% CI 1.01 to 1.07) and was less for women (OR 0.36, 95% CI 0.20to 0.68). These variables were controlled for in all subsequent analyses. There were no differences in other sociodemographic features. Cases were more likely to have experienced a previous SLTA (OR 2.04, 95% CI 1.20 to 3.45) and to have had a hospital admission in the last year (OR 1.86, 95% CI 1.09 to 3.18). There were no differences between cases and controls in terms of indicators of quality of ongoing asthma specific medical care, nor was there evidence of disproportionate barriers to health care. During the index attack cases had more severe asthma at the time of presentation, were less likely to have presented to general practitioners, and were more likely to have called an ambulance or presented to an emergency department. In terms of pharmacological management, those with SLTA were more likely to have been using oral theophylline (OR 2.14, 95% CI 1.35 to 3.68) and less

  14. Economic burden of gouty arthritis attacks for employees with frequent and infrequent attacks.

    PubMed

    Lynch, Wendy; Chan, Wing; Kleinman, Nathan; Andrews, L M; Yadao, Anthony M

    2013-04-01

    The objective of this study was to compare episode-related and annual costs and work absence days for employees with <3 versus ≥ 3 annual gout attacks. Human Capital Management Services data (2009-2010) from adult employees with gout (International Classification of Diseases, Ninth Revision code 274.x) and ≥ 12 months of medical and pharmacy benefits were studied. Outcomes of interest included medical and drug costs, number of emergency department and urgent care visits, number of inpatient days, short- and long-term disability, sick leave, workers' compensation costs, and work absence days. An algorithm based on diagnosis code and antigout medication use identified acute gout treatment episodes. Multivariate analysis compared annual and pre-episode vs. during-episode outcomes for employees with ≥ 3 vs. <3 gout annual attacks. Of 3361 employees with gout, 76 had ≥ 3 attacks; these employees had higher short-term disability costs ($1663 vs. $643, P=0.06) and days (11.68 versus 4.61, P<0.05), more emergency room visits (0.55 vs. 0.23, P<0.0001), and urgent care visits (0.07 vs. 0.04, P<0.01), and lower pharmacy costs ($1677 vs. $1108, P<0.0001) than those with <3 attacks. Medical costs both before ($203 higher) and during attacks ($136 higher) were significantly higher for those with ≥ 3 attacks than for those with <3 attacks. Additionally, a quadratic increasing relationship was found between number of attacks and cost. Frequency of acute gout attacks (≥ 3 episodes per year) among employees with gout was associated with greater short-term disability cost, absence days, and emergency department and urgent care visits, and trends toward higher overall costs.

  15. Long-term prophylaxis in hereditary angio-oedema: a systematic review

    PubMed Central

    Casazza, Giovanni; Bossi, Ilaria; Duca, Piergiorgio; Cicardi, Marco

    2012-01-01

    Objective To systematically review the evidence regarding long-term prophylaxis in the prevention or reduction of attacks in hereditary angio-oedema (HAE). Design Systematic review and meta-analysis. Data sources Electronic databases were searched up to April 2011. Two reviewers selected the studies and extracted the study data, patient characteristics and outcomes of interest. Eligibility criteria for selected studies Controlled trials for HAE prophylaxis. Results 7 studies were included, for a total of 73 patients and 587 HAE attacks. Due to the paucity of studies, a meta-analysis was not possible. Since two studies did not report the number of HAE attacks, five studies (52 patients) were finally included in the summary analysis. Four classes of drugs with at least one controlled trial have been proposed for HAE prophylaxis. All those drugs, except heparin, were found to be more effective than placebo. In the absence of direct comparisons, the relative efficacies of these drugs were determined by calculating a RR of attacks (drug vs placebo). The results were as follows: danazol (RR=0.023, 95% CI 0.003 to 0.162), methyltestosterone (RR=0.054, 95% CI 0.013 to 0.163), ɛ-aminocaproic acid (RR=0.095, 95% CI 0.025 to 0.356), tranexamic acid (RR=0.308, 95% CI 0.195 to 0.479) and C1-INH 0.491 (95% CI 0.395 to 0.607). Conclusions Few trials have evaluated the benefits of HAE prophylaxis, and all drugs but heparin seem to be effective in this setting. Since there are no direct comparisons of HAE drugs, it was not possible to draw definitive conclusions on the most effective one. Thus, to accumulate evidence for HAE prophylaxis, further studies are needed that consider the dose–efficacy relationship and include a head-to-head comparison between drugs, with the active group, rather than placebo, as the control. PMID:22786946

  16. Ticagrelor in Acute Stroke or Transient Ischemic Attack in Asian Patients: From the SOCRATES Trial (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes).

    PubMed

    Wang, Yongjun; Minematsu, Kazuo; Wong, Ka Sing Lawrence; Amarenco, Pierre; Albers, Gregory W; Denison, Hans; Easton, J Donald; Evans, Scott R; Held, Peter; Jonasson, Jenny; Molina, Carlos A; Johnston, S Claiborne

    2017-01-01

    In the SOCRATES trial (Acute Stroke or Transient Ischemic Attack Treated With Aspirin or Ticagrelor and Patient Outcomes), ticagrelor was not superior to aspirin. Because of differences in patient demographics and stroke disease pattern in Asia, outcomes of ticagrelor versus aspirin were assessed among Asian patients in a prespecified exploratory analysis. Baseline demographics, treatment effects, and safety of ticagrelor and aspirin were assessed among Asian patients. Differences in outcomes between groups were assessed using Cox proportional hazard model. A total of 3858 (29.2%) SOCRATES participants were recruited in Asia. Among the Asian patients, the primary end point event occurred in 186 (9.6%) of the 1933 patients treated with ticagrelor, versus 224 (11.6%) of the 1925 patients treated with aspirin (hazard ratio, 0.81; 95% confidence interval, 0.67-0.99). The exploratory P value for treatment-by-region interaction was 0.27. The primary end point event rate in the Asian subgroup was numerically higher than that in the non-Asian group (10.6% versus 5.7%; nominal P<0.01). Among the Asian patients, the rate of PLATO (Platelet Inhibition and Patient Outcomes)-defined major bleeding was similar in the ticagrelor group and the aspirin group (0.6% versus 0.8%; hazard ratio, 0.76; 95% confidence interval, 0.36-1.61). The event rates were numerically higher in the Asian patients. Among the Asian patients with acute stroke or transient ischemic attacks, there was a trend toward a lower hazard ratio in reducing risk of the primary end point of stroke, myocardial infarction, or death in the ticagrelor group. URL: http://www.clinicaltrials.gov. Unique identifier: NCT01994720. © 2016 American Heart Association, Inc.

  17. Sumatriptan plus naproxen for the treatment of acute migraine attacks in adults.

    PubMed

    Law, Simon; Derry, Sheena; Moore, R Andrew

    2016-04-20

    This is an updated version of the original Cochrane review published in October 2013 on 'Sumatriptan plus naproxen for acute migraine attacks in adults'.Migraine is a common disabling condition and a burden for the individual, health services, and society. It affects two to three times more women than men, and is most common in the age range 30 to 50 years. Effective abortive treatments include the triptan and non-steroidal anti-inflammatory classes of drugs. These drugs have different mechanisms of action and combining them may provide better relief. Sumatriptan plus naproxen is now available in combination form for the acute treatment of migraine. To determine the efficacy and tolerability of sumatriptan plus naproxen, administered together as separate tablets or taken as a fixed-dose combination tablet, compared with placebo and other active interventions in the treatment of acute migraine attacks in adults. For this update we searched the Cochrane Central Register of Controlled Trials (CENTRAL) via The Cochrane Register of Studies Online (CRSO) to 28 October 2015, MEDLINE (via Ovid) from 1946 to 28 October 2015, and EMBASE (via Ovid) from 1974 to 28 October 2015, and two online databases (www.gsk-clinicalstudyregister.com and www.clinicaltrials.gov). We also searched the reference lists of included studies and relevant reviews. We included randomised, double-blind, placebo- or active-controlled studies, with at least 10 participants per treatment arm, using sumatriptan plus naproxen to treat a migraine headache episode. Two review authors independently assessed trial quality and extracted data. We used numbers of participants achieving each outcome to calculate risk ratio and numbers needed to treat for an additional beneficial outcome (NNT) or for an additional harmful outcome (NNH) compared with placebo or a different active treatment. For this update we identified one new study (43 participants), but it did not contribute any data for analysis. The review

  18. Sumatriptan (subcutaneous route of administration) for acute migraine attacks in adults

    PubMed Central

    Derry, Christopher J; Derry, Sheena; Moore, R Andrew

    2014-01-01

    Background Migraine is a highly disabling condition for the individual and also has wide-reaching implications for society, healthcare services, and the economy. Sumatriptan is an abortive medication for migraine attacks, belonging to the triptan family. Subcutaneous administration may be preferable to oral for individuals experiencing nausea and/or vomiting Objectives To determine the efficacy and tolerability of subcutaneous sumatriptan compared to placebo and other active interventions in the treatment of acute migraine attacks in adults. Search methods We searched Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE, online databases, and reference lists for studies through 13 October 2011. Selection criteria We included randomised, double-blind, placebo- and/or active-controlled studies using subcutaneous sumatriptan to treat a migraine headache episode, with at least 10 participants per treatment arm. Data collection and analysis Two review authors independently assessed trial quality and extracted data. We used numbers of participants achieving each outcome to calculate relative risk (or ‘risk ratio’) and numbers needed to treat to benefit (NNT) or harm (NNH) compared to placebo or a different active treatment. Main results Thirty-five studies (9365 participants) compared subcutaneous sumatriptan with placebo or an active comparator. Most of the data were for the 6 mg dose. Sumatriptan surpassed placebo for all efficacy outcomes. For sumatriptan 6 mg versus placebo the NNTs were 2.9, 2.3, 2.2, and 2.1 for pain-free at one and two hours, and headache relief at one and two hours, respectively, and 6.1 for sustained pain-free at 24 hours. Results for the 4 mg and 8 mg doses were similar to the 6 mg dose, with 6 mg significantly better than 4 mg only for pain-free at one hour, and 8 mg significantly better than 6 mg only for headache relief at one hour. There was no evidence of increased migraine relief if a second dose of sumatriptan 6

  19. Sumatriptan (intranasal route of administration) for acute migraine attacks in adults

    PubMed Central

    Derry, Christopher J; Derry, Sheena; Moore, R Andrew

    2014-01-01

    Background Migraine is a highly disabling condition for the individual and also has wide-reaching implications for society, healthcare services, and the economy. Sumatriptan is an abortive medication for migraine attacks, belonging to the triptan family. Intranasal administration may be preferable to oral for individuals experiencing nausea and/or vomiting, although it is primarily absorbed in the gut, not the nasal mucosa. Objectives To determine the efficacy and tolerability of intranasal sumatriptan compared to placebo and other active interventions in the treatment of acute migraine attacks in adults. Search methods We searched Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE, online databases, and reference lists for studies through 13 October 2011. Selection criteria We included randomised, double-blind, placebo- and/or active-controlled studies using intranasal sumatriptan to treat a migraine headache episode, with at least 10 participants per treatment arm. Data collection and analysis Two review authors independently assessed trial quality and extracted data. We used numbers of participants achieving each outcome to calculate relative risk (or ‘risk ratio’) and numbers needed to treat to benefit (NNT) or harm (NNH) compared to placebo or a different active treatment. Main results Twelve studies (4755 participants) compared intranasal sumatriptan with placebo or an active comparator. Most of the data were for the 10 mg and 20 mg doses. Sumatriptan surpassed placebo for all efficacy outcomes. For sumatriptan 10 mg versus placebo the NNTs were 7.3, 7.4, and 5.5 for pain-free at two hours, and headache relief at one and two hours, respectively. For sumatriptan 20 mg versus placebo the NNTs were 4.7, 4.9, and 3.5, respectively, for the same outcomes. The 20 mg dose was significantly better than the 10 mg dose for each of these three primary efficacy outcomes. Relief of headache-associated symptoms, including nausea, photophobia, and

  20. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack or Sudden Cardiac Arrest: How Are They Different? ... and procedures related to heart disease and stroke. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  1. Sumatriptan (rectal route of administration) for acute migraine attacks in adults

    PubMed Central

    Derry, Christopher J; Derry, Sheena; Moore, R Andrew

    2014-01-01

    Background Migraine is a highly disabling condition for the individual and also has wide-reaching implications for society, healthcare services, and the economy. Sumatriptan is an abortive medication for migraine attacks, belonging to the triptan family. Rectal administration may be preferable to oral for individuals experiencing nausea and/or vomiting. Objectives To determine the efficacy and tolerability of rectal sumatriptan compared to placebo and other active interventions in the treatment of acute migraine attacks in adults. Search methods We searched the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE, online databases, and reference lists for studies through 13 October 2011. Selection criteria We included randomised, double-blind, placebo- and/or active-controlled studies using rectally administered sumatriptan to treat a migraine headache episode, with at least 10 participants per treatment arm. Data collection and analysis Two review authors independently assessed trial quality and extracted data. We used numbers of participants achieving each outcome to calculate relative risk (or ‘risk ratio’) and numbers needed to treat to benefit (NNT) or harm (NNH) compared to placebo or a different active treatment. Main results Three studies (866 participants) compared rectally administered sumatriptan with placebo or an active comparator. Most of the data were for the 12.5 mg and 25 mg doses. For the majority of efficacy outcomes, sumatriptan surpassed placebo. For sumatriptan 12.5 mg versus placebo the NNTs were 5.2 and 3.2 for headache relief at one and two hours, respectively. Results for the 25 mg dose were similar to the 12.5 mg dose, and there were no significant differences between the two doses for any of the outcomes analysed. The NNTs for sumatriptan 25 mg versus placebo were 4.2, 3.2, and 2.4 for pain-free at two hours, headache relief at one hour, and headache relief at two hours, respectively. Relief of functional

  2. Acute Coronary Syndrome

    MedlinePlus

    ... angina? This content was last reviewed July 2015. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ... Recovery FAQs • Heart Attack Tools & Resources • Support Network Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  3. Immunogenicity assessment of recombinant human c1-inhibitor: an integrated analysis of clinical studies.

    PubMed

    Hack, C Erik; Mannesse, Maurice; Baboeram, Aartie; Oortwijn, Beatrijs; Relan, Anurag

    2012-10-01

    Recombinant human C1-inhibitor (rhC1INH) is used to treat acute angioedema attacks in hereditary angioedema (HAE) due to a genetic C1INH deficiency. Recombinant proteins in general may induce antibody responses and therefore evaluation of such responses in the target population is an essential step in the clinical development program of a recombinant protein. Here we report the assessment of the immunogenicity of rhC1INH in symptomatic HAE patients. Blood samples collected before and after administration of rhC1INH were tested for antibodies against plasma-derived (pd) or rhC1INH, or against host-related impurities (HRI). Above cut-off screening results were confirmed with displacement assays, and also tested for neutralizing anti-C1INH antibodies. Finally, the relation of antibodies to clinical efficacy and safety of rhC1INH was analyzed. Data from 155 HAE patients who received 424 treatments with rhC1INH were analyzed. 1.5% of all pre-exposure tests and 1.3% of all post-exposure tests were above the cut-off level in the screening assay for anti-C1INH antibodies. Six patients (3.9%) had anti-rhC1INH antibodies positive in the confirmatory assay. In two patients, confirmed antibodies were pre-existing with no increase post-exposure; in three patients, the antibodies occurred on a single occasion post-exposure; and in one patient, on subsequent occasions post-exposure. Neutralizing anti-pdC1INH antibodies were not found. Anti-HRI antibodies in the screening assay occurred in <0.7% of the tests before exposure to rhC1INH, in <1.9% after first exposure and in <3.1% after repeat treatment with rhC1INH. Five patients had anti-HRI antibodies positive in the confirmatory assay. In one patient, the antibodies were pre-existing, whereas in three of the 155 rhC1INH-treated patients (1.9%), confirmed anti-HRI antibodies occurred at more time points. Antibody findings were not associated with altered efficacy of rhC1INH or adverse events. These results indicate a reassuring

  4. Acute Treatment of Migraine

    PubMed Central

    ÖZTÜRK, Vesile

    2013-01-01

    Migraine is one of the most frequent disabling neurological conditions with a major impact on the patient’s quality of life. Migraine has been described as a chronic disorder that characterized with attacks. Attacks are characterized by moderate–severe, often unilateral, pulsating headache attacks, typically lasting 4 to 72 hours. Migraine remains underdiagnosed and undertreated despite advances in the understanding of its pathophysiology. This article reviews management of migraine acute pharmacological treatment. Currently, for the acute treatment of migraine attacks, non-steroidal anti-inflammatory drugs (NSAIDs) and triptans (serotonin 5HT1B/1D receptor agonists) are recommended. Before intake of NSAID and triptans, metoclopramide or domperidone is useful. In very severe attacks, subcutaneous sumatriptan is first choice. The patient should be treated early in the attack, use an adequate dose and formulation of a medication. Ideally, acute therapy should be restricted to no more than 2 to 3 days per week to avoid medication overuse. PMID:28360580

  5. Effect of ticagrelor with clopidogrel on high on-treatment platelet reactivity in acute stroke or transient ischemic attack (PRINCE) trial: Rationale and design.

    PubMed

    Wang, Yilong; Lin, Yi; Meng, Xia; Chen, Weiqi; Chen, Guohua; Wang, Zhimin; Wu, Jialing; Wang, Dali; Li, Jianhua; Cao, Yibin; Xu, Yuming; Zhang, Guohua; Li, Xiaobo; Pan, Yuesong; Li, Hao; Liu, Liping; Zhao, Xingquan; Wang, Yongjun

    2017-04-01

    Rationale and aim Little is known about the safety and efficacy of the combination of ticagrelor and aspirin in acute ischemic stroke. This study aimed to evaluate whether the combination of ticagrelor and aspirin was superior to that of clopidogrel and aspirin in reducing the 90-day high on-treatment platelet reactivity for acute minor stroke or transient ischemic attack, especially for carriers of cytochrome P450 2C19 loss-of-function allele. Sample size and design This study was designed as a prospective, multicenter, randomized, open-label, active-controlled, and blind-endpoint, phase II b trial. The required sample size was 952 patients. It was registered with ClinicalTrials.gov (NCT02506140). Study outcomes The primary outcome was the proportion of patients with high on-treatment platelet reactivity at 90 days. High on-treatment platelet reactivity is defined as the P2Y12 reaction unit >208 measured using the VerifyNow P2Y12 assay. Conclusion The Platelet Reactivity in Acute Non-disabling Cerebrovascular Events study explored whether ticagrelor combined with aspirin could reduce further the proportion of patients with high on-treatment platelet reactivity at 90 days after acute minor stroke or transient ischemic attack compared with clopidogrel and aspirin.

  6. [Anaesthesic management of vaginal delivery in a parturient with C1 esterase deficiency].

    PubMed

    Libert, N; Schérier, S; Dubost, C; Franck, L; Rouquette, I; Tortosa, J-C; Rousseau, J-M

    2009-04-01

    Hereditary and acquired angioedema (HAE/AAE) are the clinical translation of a qualitative or a quantitative deficit of C1 esterase inhibitor (C1 INH). The frequency and severity of clinical manifestations vary greatly, ranging from a moderate swelling of the extremities to obstruction of upper airway. Anaesthesiologists and intensivists must be prepared to manage acute manifestations of this disease in case of life-threatening laryngeal edema. Surgery, physical trauma and labour are classical triggers of the disease. The anaesthesiologists should be aware of the drugs used as prophylaxis and treatment of acute attacks when considering labour and caesarean section. Androgens are contraindicated during pregnancy. If prophylaxis is required, tranexamic acid may be used with caution. The safest obstetric approach appears to be to administer a predelivery infusion of C1 INH concentrate. It is important to avoid manipulation of the airway as much as possible by relying on regional techniques. We report the case of a patient suffering from an HAE discovered during pregnancy. The management included administration of C1 INH during labor and early epidural analgesia for pain relief. A short review of the pathophysiology and therapeutic options follows.

  7. The Diabetic Foot Attack: "'Tis Too Late to Retreat!"

    PubMed

    Vas, Prashanth R J; Edmonds, Michael; Kavarthapu, Venu; Rashid, Hisham; Ahluwalia, Raju; Pankhurst, Christian; Papanas, Nikolaos

    2018-03-01

    The "diabetic foot attack" is one of the most devastating presentations of diabetic foot disease, typically presenting as an acutely inflamed foot with rapidly progressive skin and tissue necrosis, at times associated with significant systemic symptoms. Without intervention, it may escalate over hours to limb-threatening proportions and poses a high amputation risk. There are only best practice approaches but no international protocols to guide management. Immediate recognition of a typical infected diabetic foot attack, predominated by severe infection, with prompt surgical intervention to debride all infected tissue alongside broad-spectrum antibiotic therapy is vital to ensure both limb and patient survival. Postoperative access to multidisciplinary and advanced wound care therapies is also necessary. More subtle forms exist: these include the ischemic diabetic foot attack and, possibly, in a contemporary categorization, acute Charcot neuroarthropathy. To emphasize the importance of timely action especially in the infected and ischemic diabetic foot attack, we revisit the concept of "time is tissue" and draw parallels with advances in acute myocardial infarction and stroke care. At the moment, international protocols to guide management of severe diabetic foot presentations do not specifically use the term. However, we believe that it may help increase awareness of the urgent actions required in some situations.

  8. Sumatriptan (oral route of administration) for acute migraine attacks in adults

    PubMed Central

    Derry, Christopher J; Derry, Sheena; Moore, R Andrew

    2014-01-01

    Background Migraine is a highly disabling condition for the individual and also has wide-reaching implications for society, healthcare services, and the economy. Sumatriptan is an abortive medication for migraine attacks, belonging to the triptan family. Objectives To determine the efficacy and tolerability of oral sumatriptan compared to placebo and other active interventions in the treatment of acute migraine attacks in adults. Search methods We searched the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE, online databases, and reference lists for studies through 13 October 2011. Selection criteria We included randomised, double-blind, placebo- and/or active-controlled studies using oral sumatriptan to treat a migraine headache episode, with at least 10 participants per treatment arm. Data collection and analysis Two review authors independently assessed trial quality and extracted data. We used numbers of participants achieving each outcome to calculate relative risk (or ‘risk ratio’) and numbers needed to treat to benefit (NNT) or harm (NNH) compared to placebo or a different active treatment. Main results Sixty-one studies (37,250 participants) compared oral sumatriptan with placebo or an active comparator. Most of the data were for the 50 mg and 100 mg doses. Sumatriptan surpassed placebo for all efficacy outcomes. For sumatriptan 50 mg versus placebo the NNTs were 6.1, 7.5, and 4.0 for pain-free at two hours and headache relief at one and two hours, respectively. NNTs for sustained pain-free and sustained headache relief during the 24 hours postdose were 9.5 and 6.0, respectively. For sumatriptan 100 mg versus placebo the NNTs were 4.7, 6.8, 3.5, 6.5, and 5.2, respectively, for the same outcomes. Results for the 25 mg dose were similar to the 50 mg dose, while sumatriptan 100 mg was significantly better than 50 mg for pain-free and headache relief at two hours, and for sustained pain-free during 24 hours. Treating early, during

  9. Acute asthma during pregnancy.

    PubMed Central

    Stenius-Aarniala, B. S.; Hedman, J.; Teramo, K. A.

    1996-01-01

    BACKGROUND: Acute asthma during pregnancy is potentially dangerous to the fetus. The aim of this study was to investigate the effect of an acute attack of asthma during pregnancy on the course of pregnancy or delivery, or the health of the newborn infant, and to identify undertreatment as a possible cause of the exacerbations. METHODS: Five hundred and four pregnant asthmatic subjects were prospectively followed and treated. The data on 47 patients with an attack of asthma during pregnancy were compared with those of 457 asthmatics with no recorded acute exacerbation and with 237 healthy parturients. RESULTS: Of 504 asthmatics, 177 patients were not initially treated with inhaled corticosteroids. Of these, 17% had an acute attack compared with only 4% of the 257 patients who had been on inhaled anti-inflammatory treatment from the start of pregnancy. There were no differences between the groups as to length of gestation, length of the third stage of labour, or amount of haemorrhage after delivery. No differences were observed between pregnancies with and without an exacerbation with regard to relative birth weight, incidence of malformations, hypoglycaemia, or need for phototherapy for jaundice during the neonatal period. CONCLUSIONS: Patients with inadequate inhaled anti-inflammatory treatment during pregnancy run a higher risk of suffering an acute attack of asthma than those treated with an anti-inflammatory agent. However, if the acute attack of asthma is relatively mild and promptly treated, it does not have a serious effect on the pregnancy, delivery, or the health of the newborn infant. PMID:8733495

  10. Management of acute attacks of hereditary angioedema: potential role of icatibant

    PubMed Central

    Longhurst, Hilary J

    2010-01-01

    Icatibant (Firazyr®) is a novel subcutaneous treatment recently licensed in the European Union for acute hereditary angioedema. Hereditary angioedema, resulting from inherited partial C1 inhibitor deficiency, is a disabling condition characterized by intermittent episodes of bradykinin-mediated angioedema. Icatibant blocks bradykinin B2 receptors, attenutating the episode. Randomized double-blind, placebo-controlled trials of icatibant, showed significant superiority over oral tranexamic acid in 74 European patients and a trend to improvement in a similar US trial comparing icatibant with placebo in 55 patients. Outcomes for several endpoints did not reach significance in the US trial, perhaps because of low participant numbers and confounding factors: a further trial is planned. Open label studies have shown benefit in multiple treatments for attacks at all sites. Approximately 10% of patients require a second dose for re-emergent symptoms, usually 10 to 27 hours after the initial treatment. Its subcutaneous route of administration, good tolerability and novel mode of action make icatibant a promising addition to the limited repertoire of treatments for hereditary angioedema. PMID:20859548

  11. Management of acute attacks of hereditary angioedema: potential role of icatibant.

    PubMed

    Longhurst, Hilary J

    2010-09-07

    Icatibant (Firazyr(®)) is a novel subcutaneous treatment recently licensed in the European Union for acute hereditary angioedema. Hereditary angioedema, resulting from inherited partial C1 inhibitor deficiency, is a disabling condition characterized by intermittent episodes of bradykinin-mediated angioedema. Icatibant blocks bradykinin B2 receptors, attenutating the episode. Randomized double-blind, placebo-controlled trials of icatibant, showed significant superiority over oral tranexamic acid in 74 European patients and a trend to improvement in a similar US trial comparing icatibant with placebo in 55 patients. Outcomes for several endpoints did not reach significance in the US trial, perhaps because of low participant numbers and confounding factors: a further trial is planned. Open label studies have shown benefit in multiple treatments for attacks at all sites. Approximately 10% of patients require a second dose for re-emergent symptoms, usually 10 to 27 hours after the initial treatment. Its subcutaneous route of administration, good tolerability and novel mode of action make icatibant a promising addition to the limited repertoire of treatments for hereditary angioedema.

  12. C1-inhibitor concentrate home therapy for hereditary angioedema: a viable, effective treatment option

    PubMed Central

    Longhurst, H J; Carr, S; Khair, K

    2007-01-01

    Economic and political factors have led to the increased use of home therapy programmes for patients who have traditionally been treated in hospital. Many patients with hereditary angioedema (HAE) experience intermittent severe attacks that affect their quality of life and may be life-threatening. These attacks are treated with C1-inhibitor concentrate which, for most patients, is infused at the local hospital. Home therapy programmes for HAE are currently being established. This paper reviews the extent of use of these programmes and summarizes the advantages and potential disadvantages of the concept so far. PMID:17177958

  13. Conservation of the abscission signaling peptide IDA during Angiosperm evolution: withstanding genome duplications and gain and loss of the receptors HAE/HSL2

    PubMed Central

    Stø, Ida M.; Orr, Russell J. S.; Fooyontphanich, Kim; Jin, Xu; Knutsen, Jonfinn M. B.; Fischer, Urs; Tranbarger, Timothy J.; Nordal, Inger; Aalen, Reidunn B.

    2015-01-01

    The peptide INFLORESCENCE DEFICIENT IN ABSCISSION (IDA), which signals through the leucine-rich repeat receptor-like kinases HAESA (HAE) and HAESA-LIKE2 (HSL2), controls different cell separation events in Arabidopsis thaliana. We hypothesize the involvement of this signaling module in abscission processes in other plant species even though they may shed other organs than A. thaliana. As the first step toward testing this hypothesis from an evolutionarily perspective we have identified genes encoding putative orthologs of IDA and its receptors by BLAST searches of publically available protein, nucleotide and genome databases for angiosperms. Genes encoding IDA or IDA-LIKE (IDL) peptides and HSL proteins were found in all investigated species, which were selected as to represent each angiosperm order with available genomic sequences. The 12 amino acids representing the bioactive peptide in A. thaliana have virtually been unchanged throughout the evolution of the angiosperms; however, the number of IDL and HSL genes varies between different orders and species. The phylogenetic analyses suggest that IDA, HSL2, and the related HSL1 gene, were present in the species that gave rise to the angiosperms. HAE has arisen from HSL1 after a genome duplication that took place after the monocot—eudicots split. HSL1 has also independently been duplicated in the monocots, while HSL2 has been lost in gingers (Zingiberales) and grasses (Poales). IDA has been duplicated in eudicots to give rise to functionally divergent IDL peptides. We postulate that the high number of IDL homologs present in the core eudicots is a result of multiple whole genome duplications (WGD). We substantiate the involvement of IDA and HAE/HSL2 homologs in abscission by providing gene expression data of different organ separation events from various species. PMID:26579174

  14. Panic attack and its correlation with acute coronary syndrome - more than just a diagnosis of exclusion.

    PubMed

    Soh, Keng Chuan; Lee, Cheng

    2010-03-01

    The panic attack is able to mimic the clinical presentation of an acute coronary syndrome (ACS), to the point of being clinically indistinguishable without appropriate investigations. However, the literature actually demonstrates that the 2 conditions are more related than just being differential diagnoses. Through a review of the literature involving epidemiological studies, randomised controlled trials, systematic reviews and meta-analyses found on a Medline search, the relation between panic disorder and ACS is explored in greater depth. Panic disorder, a psychiatric condition with recurrent panic attacks, has been found to be an independent risk factor for subsequent coronary events. This has prognostic bearing and higher mortality rates. Through activation of the sympathetic system by differing upstream mechanisms, the 2 conditions have similar presentations. Another psychiatric differential diagnosis would be that of akathisia, as an adverse effect to antidepressant medications. An overview on the investigations, diagnostic process, treatment modalities and prognoses of the two conditions is presented. Panic disorders remain under-diagnosed, but various interviews are shown to allow physicians without psychiatric training to accurately pick up the condition. Comprehensive multidisciplinary approaches are needed to help patients with both coronary heart disease and anxiety disorder.

  15. Frequent life-threatening laryngeal attacks in two Croatian families with hereditary angioedema due to C1 inhibitor deficiency harbouring a novel frameshift mutation in SERPING1.

    PubMed

    Karadža-Lapić, Ljerka; Korošec, Peter; Šilar, Mira; Košnik, Mitja; Cikojević, Draško; Lozić, Bernarda; Rijavec, Matija

    2016-11-01

    Hereditary angioedema due to C1 inhibitor deficiency (C1-INH-HAE) is a rare autosomal dominant disease caused by mutations in the SERPING1 gene. It can affect many regions in the body, but potentially life-threatening laryngeal oedemas are of concern. Twenty-three subjects from two families were recruited for clinical data evaluation and molecular analysis at General Hospital Šibenik, Croatia. Decreased levels of C1 inhibitor were detected in 12 adult patients and three young asymptomatic persons. The same novel deletion of two nucleotides on exon 3 (c.74_75delAT) was identified in all of them. A history of laryngeal oedema was present in 10 patients (83%), and all patients reported laryngeal attacks at least once a year. The delay in diagnosis decreased noticeably from the first to the last generation. We identified a novel causative mutation in SERPING1 in several affected members of two apparently unrelated families with a high frequency of laryngeal oedema. Molecular analysis of large C1-INH-HAE families will provide new insights on the genotype-phenotype relationship. Key messages Hereditary angioedema due to C1 inhibitor deficiency is a rare autosomal dominant disease caused by mutations in the SERPING1 gene, and laryngeal oedema is of concern because it can cause death by asphyxiation. A novel causative mutation in SERPING1, a deletion of two nucleotides on exon 3 (c.74_75delAT), was identified in several affected members of two apparently unrelated families with a high frequency of laryngeal oedema. Molecular analysis of large C1-INH-HAE families will provide new insights on the genotype-phenotype relationship because it appears that the mutation type may affect disease severity.

  16. Subclinical endophthalmitis following a rooster attack.

    PubMed

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  17. The Humanistic, Societal, and Pharmaco-economic Burden of Angioedema.

    PubMed

    Longhurst, Hilary; Bygum, Anette

    2016-10-01

    Hereditary angioedema due to C1 inhibitor deficiency (C1-INH-HAE) is a rare disorder characterized by intermittent and unpredictable episodes of swelling which cause disfigurement, disability, pain, or, in case of laryngeal swelling, risk of death. Historical factors, including the intermittent nature of the disorder, the lack of awareness of this ultra-rare condition amongst medical personnel, lack of specialist centers, and limited treatment options have contributed to under-diagnosis and under-treatment of the condition. Incorrect treatment of attacks has been common, even when medical help is sought. This has lead to reduced health-seeking behavior and alternative coping strategies, sometimes even denial, in many families, while a minority of HAE-affected patients have become serial emergency room attenders with chronic pain and ongoing requirement for opiate-based painkillers. Both strategies have incurred not only physical but also psychological and economic consequences.In the last 10 years, new and effective acute therapies have been made available, some of which have also provided short-term and long-term prophylaxis options, together with a better understanding of older prophylactic drugs. Improved awareness of HAE amongst the general public, family members, and physicians has reduced the long delay in diagnosis and increased the number of patients receiving effective and up-to-date therapies to improve the physical impact of the disorder.Data on the impact of treatment on the psychological outcomes is scarce, but the limited information available suggests that access to specialist advice and treatment leads to psychological as well as physical improvement.HAE also has profound effects on individual and family economic output, directly via absenteeism from school or work and indirectly via lost opportunities. Economic improvements associated with better treatments are offset by the high cost of new acute treatments, resulting in difficult pharmaco

  18. Histopathological analysis of spontaneous large necrosis of adrenal pheochromocytoma manifested as acute attacks of alternating hypertension and hypotension: a case report.

    PubMed

    Ohara, Nobumasa; Uemura, Yasuyuki; Mezaki, Naomi; Kimura, Keita; Kaneko, Masanori; Kuwano, Hirohiko; Ebe, Katsuya; Fujita, Toshio; Komeyama, Takeshi; Usuda, Hiroyuki; Yamazaki, Yuto; Maekawa, Takashi; Sasano, Hironobu; Kaneko, Kenzo; Kamoi, Kyuzi

    2016-10-12

    Pheochromocytomas are rare catecholamine-producing neuroendocrine tumors. Hypertension secondary to pheochromocytoma is often paroxysmal, and patients occasionally present with sudden attacks of alternating hypertension and hypotension. Spontaneous, extensive necrosis within the tumor that is associated with catecholamine crisis is an infrequent complication of adrenal pheochromocytoma, but its pathogenesis remains unclear. A 69-year-old Japanese man developed acute-onset episodic headaches, palpitations, and chest pains. During the episodes, both marked fluctuations in blood pressure (ranging from 40/25 to 300/160 mmHg) and high plasma levels of catecholamines were found simultaneously. Radiological findings indicated a 4-cm left adrenal pheochromocytoma. These episodic symptoms disappeared within 2 weeks with normalization of plasma catecholamine levels. Two months later, the patient underwent adrenalectomy. Microscopic examinations revealed pheocromocytoma with a large central area of coagulative necrosis. The necrotic material was immunohistochemically positive for chromogranin A. Granulation tissue was adjacent to the necrotic area, accompanied by numerous hemosiderin-laden macrophages and histiocytes with vascular proliferation. Viable tumor cells, detected along the periphery of the tumor, demonstrated pyknosis, and the Ki-67 labeling index was 2 % in the hot spot. No embolus or thrombus formation was found in the resected specimen harboring the whole tumor. The Pheochromocytoma of the Adrenal gland Scaled Score was 2 out of 20. The patient's postoperative course was unremarkable for > 7 years. Presumed causal factors for the extensive necrosis of adrenal pheochromocytoma in previously reported cases include hemorrhage into the tumor, hypotension induced by a phentolamine administration, embolic infarction, high intracapsular pressure due to malignant growth of the tumor, and catecholamine-induced vasoconstriction. In the present case, histopathological

  19. Lysine clonixinate versus dipyrone (metamizole) for the acute treatment of severe migraine attacks: a single-blind, randomized study.

    PubMed

    Krymchantowski, Abouch Valenty; Carneiro, Henrique; Barbosa, Jackeline; Jevoux, Carla

    2008-06-01

    Nonsteroidal anti-inflammatory drugs (NSAID) are effective to treat migraine attacks. Lysine clonixinate (LC) and dipyrone (metamizol) have been proven effective to treat acute migraine. The aim of this study was to evaluate the efficacy and tolerability of the intravenous formulations of LC and dipyrone in the treatment of severe migraine attacks. Thirty patients (28 women, 2 men), aged 18 to 48 years with migraine according the International Headache Society (IHS) (2004) were studied. The patients were randomized into 2 groups when presenting to an emergency department with a severe migraine attack. The study was single-blind. Headache intensity, nausea, photophobia and side effects were evaluated at 0, 30, 60 and 90 minutes after the drug administration. Rectal indomethacin as rescue medication (RM) was available after 2 hours and its use compared between groups. All patients completed the study. At 30 minutes, 0% of the dipyrone group 13% of the LC group were pain free (p=0.46). At 60 and 90 minutes, 2 (13%) and 5 (33%) patients from the dipyrone group and 11 (73%) and 13 (86.7%) patients from the LC group were pain free (p<0.001). At 60 minutes, significantly more patients from the LC group were nausea-free (p<0.001). Regarding photophobia, there were no differences between groups at 60 minutes (p=0.11). The use of RM at 2 hours did not differ among groups (p=0.50). Pain in the site of the injection was reported by more patients of the LC group compared to the dipyrone group (p<0.0001). LC is significantly superior to dipyrone in treating severe migraine attacks. LC promotes significantly more burning at the site of the injection.

  20. Research on Protective Effect and Mechanism of Idazoxan on lps Attacked Acute Hepatic Injury

    NASA Astrophysics Data System (ADS)

    Zhu, Junyu; Ying, Shangqi; Kang, Wenyuan; Huang, Wenjuan; Liang, Huaping

    2018-01-01

    Objective: To observe the protection effect of Idazoxan (IDA) on LPS induced acute hepatic injury, and to explore its action mechanism. Methods: 60 adult C57BL/6 mice were divided into a control group (20 mice, intraperitoneal injection of phosphate buffer), a model group (20 mice, intraperitoneal injection of LPS 10 mg/kg) and a agmatine group (20 mice, intraperitoneal injection of LPS 10 mg/kg and agmatine 200 mg/kg) according to random number table method. Blood and liver tissue were collected for preparation of tissue homogenate. Enzyme-linked immunosorbent assay (ELISA) was adopted for detecting tumor necrosis factor-α (TNF-α) and interleukin (IL- 1β and IL - 6) contents in the serum and liver tissue at 24h after molding. Automatic biochemical analyzer is used for determining alanine transaminase (ALT), aspartate aminotransferase (AST) and lactate dehydrogenase (LDH) level at 24h after molding; The liver tissue pathology changes were observed at 24h after molding. Macrophage RAW264.7 cells were stimulated by 10 μg/mL LPS and with or without IDA (100 μmol/L). 2’, 7’-dichlorofluoresce in diacetate (DCFH-DA) was used as a fluorescent probe for detection of intracellular reactive oxygen species (ROS) level; qRT - PCR method was used for detecting antioxidant enzymes HO-1 and NQO-1 mRNA expression level at 2h, 4h and 8 h. Results: mice in the model group suffered from depression, curling and food water forbidding at 6h after molding. Mice in the Idazoxan group have obviously better spirit and activity than that of model group. The serum ALT, AST and LDH level of LPS attacked acute hepatic injury mice can be effectively alleviated after Idazoxan treatment. The expression of proinflammatory factor TNF-α and IL-6 in the liver can be reduced. The liver showed obvious pathological changes at 24 h after injection, such as liver cell swelling, necrosis, congestion, inflammatory cell infiltration, etc.; The liver cell injury was prominently alleviated in IDA

  1. An Audit of the Use of Gonadorelin Analogues to Prevent Recurrent Acute Symptoms in Patients with Acute Porphyria in the United Kingdom.

    PubMed

    Schulenburg-Brand, Danja; Gardiner, Tricia; Guppy, Simon; Rees, David C; Stein, Penelope; Barth, Julian; Felicity Stewart, M; Badminton, Michael

    2017-01-01

    Severe recurrent acute attacks of porphyria have traditionally been treated with either prophylactic human haemin or gonadorelin analogues (GnA) in females. Evidence on the most effective treatment for this patient subgroup is lacking. This audit surveyed the use of prophylactic GnA in the UK.Twenty female patients (who experienced between 2 and 45 acute attacks of porphyria requiring hospitalisation and treatment with human haemin prior to GnA prophylaxis) were included in the audit. Data was retrospectively collected based on patient history and case review.Twenty three treatment courses were given lasting a median period of 12 months. Monthly subcutaneous Goserelin was most commonly used. In three patients in whom timing with the menstrual cycle was not considered, an acute attack occurred after initiation of the first dose. The majority of patients experienced oestrogen deficiency symptoms during treatment. Fifty percent of the prescribed courses of GnA resulted in a degree of clinical benefit. This successfully treated group experienced between 3 and 20 acute attacks prior to and between 0 and 6 acute attacks during GnA treatment.The audit revealed large variation in practice in the United Kingdom regarding indication, duration of treatment, specific drug used and management of side effects. In view of the limited treatment options available for this cohort and the mixed outcome successes reported, we believe it is reasonable for porphyria specialists to continue offering GnA treatment to women with severe recurrent debilitating acute attacks of porphyria associated with the menstrual cycle, and we propose best practice guidelines to standardise management.

  2. An update of clinical management of acute intermittent porphyria

    PubMed Central

    Pischik, Elena; Kauppinen, Raili

    2015-01-01

    Acute intermittent porphyria (AIP) is due to a deficiency of the third enzyme, the hydroxymethylbilane synthase, in heme biosynthesis. It manifests with occasional neuropsychiatric crises associated with overproduction of porphyrin precursors, aminolevulinic acid and porphobilinogen. The clinical criteria of an acute attack include the paroxysmal nature and various combinations of symptoms, such as abdominal pain, autonomic dysfunction, hyponatremia, muscle weakness, or mental symptoms, in the absence of other obvious causes. Intensive abdominal pain without peritoneal signs, acute peripheral neuropathy, and encephalopathy usually with seizures or psychosis are the key symptoms indicating possible acute porphyria. More than fivefold elevation of urinary porphobilinogen excretion together with typical symptoms of an acute attack is sufficient to start a treatment. Currently, the prognosis of the patients with AIP is good, but physicians should be aware of a potentially fatal outcome of the disease. Mutation screening and identification of type of acute porphyria can be done at the quiescent phase of the disease. The management of patients with AIP include following strategies: A, during an acute attack: 1) treatment with heme preparations, if an acute attack is severe or moderate; 2) symptomatic treatment of autonomic dysfunctions, polyneuropathy and encephalopathy; 3) exclusion of precipitating factors; and 4) adequate nutrition and fluid therapy. B, during remission: 1) exclusion of precipitating factors (education of patients and family doctors), 2) information about on-line drug lists, and 3) mutation screening for family members and education about precipitating factors in mutation-positive family members. C, management of patients with recurrent attacks: 1) evaluation of the lifestyle, 2) evaluation of hormonal therapy in women, 3) prophylactic heme therapy, and 4) liver transplantation in patients with severe recurrent attacks. D, follow-up of the AIP

  3. Efficacy and safety of an intravenous C1-inhibitor concentrate for long-term prophylaxis in hereditary angioedema

    PubMed Central

    Craig, Timothy; Shapiro, Ralph; Vegh, Arthur; Baker, James W.; Bernstein, Jonathan A.; Busse, Paula; Magerl, Markus; Martinez-Saguer, Inmaculada; Riedl, Marc A.; Lumry, William; Williams-Herman, Debora; Edelman, Jonathan; Feuersenger, Henrike; Machnig, Thomas

    2017-01-01

    Background: The plasma-derived, pasteurized, nanofiltered C1-inhibitor concentrate (pnfC1-INH) is approved in the United States as an intravenous (IV) on-demand treatment for hereditary angioedema (HAE) attacks, and, in Europe, as on demand and short-term prophylaxis. Objective: This analysis evaluated Berinert Patient Registry data regarding IV pnfC1-INH used as long-term prophylaxis (LTP). Methods: The international registry (2010–2014) collected prospective and retrospective usage, dosing, and safety data on individuals who used pnfC1-INH for any reason. Results: The registry included data on 47 subjects (80.9% female subjects; mean age, 44.8 years), which reflected 4082 infusions categorized as LTP and a total of 430.2 months of LTP administration. The median absolute dose of pnfC1-INH given for LTP was 1000 IU (range, 500–3000 IU), with a median time interval between infusion and a subsequent pnfC1-INH–treated attack of 72.0 hours (range, 0.0–166.4 hours). Fifteen subjects (31.9%) had no pnfC1-INH–treated HAE attacks within 7 days after pnfC1-INH infusion for LTP; 32 subjects (68.1%) experienced 246 attacks, with rates of 0.06 attacks per infusion and 0.57 attacks per month. A total of 81 adverse events were reported in 16 subjects (34.0%) (0.02 events per infusion; 0.19 events per month); only 3 adverse events were considered related to pnfC1-INH (noncardiac chest pain, postinfusion headache, deep vein thrombosis in a subject with an IV port). Conclusion: In this international registry, IV pnf-C1-INH given as LTP for HAE was safe and efficacious, with a low rate of attacks that required pnfC1-INH treatment, particularly within the first several days after LTP administration. PMID:28381322

  4. Anabolic androgen use in the management of hereditary angioedema: Not so cheap after all.

    PubMed

    Tse, Kevin Y; Zuraw, Bruce L; Chen, Qiaoling; Christiansen, Sandra C

    2017-04-01

    Hereditary angioedema due to C1 inhibitor deficiency (HAE) is a rare, life-threatening disease that imposes a significant burden on affected patients. 17α-alkylated androgens (anabolic androgens) decrease attack frequency and severity but carry the risk of potentially serious dose-related adverse effects. Despite the emergence of targeted therapies for HAE, continued anabolic androgen use has been driven in part by their low cost. To examine the hidden cost of anabolic androgen use related to the risk of developing non-HAE comorbidities. Patients with HAE were identified in the Southern California Kaiser Permanente database using clinical and laboratory findings compatible with HAE. These patients were stratified into anabolic androgen exposed and nonexposed groups. Matched controls were selected from the Kaiser database who did not have HAE or anabolic androgen exposure. Using multivariate analysis, we determined the number of non-HAE comorbidities linked to anabolic androgen use. We next determined the association between dosing and increasing exposure to anabolic androgens and the likelihood of having various comorbidities. Patients with HAE exposed to anabolic androgens had a 28% increase (P = .04) in non-HAE comorbidities when compared with their matched (nonexposed) controls. With each gram per month increase in exposure, a 12% increase in non-HAE comorbidities is observed (P < .01). The most commonly occurring non-HAE comorbidities were psychiatric, muscle cramps, obesity, and hyperlipidemia. Our data suggest that long-term anabolic androgen use enhances the risk of developing comorbid health conditions, thus amplifying the cost of care. Our report provides additional support for the preferred use of newer, targeted therapies for the management of HAE. Copyright © 2017 American College of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  5. Cost‐Effectiveness of Clopidogrel‐Aspirin Versus Aspirin Alone for Acute Transient Ischemic Attack and Minor Stroke

    PubMed Central

    Pan, Yuesong; Wang, Anxin; Liu, Gaifen; Zhao, Xingquan; Meng, Xia; Zhao, Kun; Liu, Liping; Wang, Chunxue; Johnston, S. Claiborne; Wang, Yilong; Wang, Yongjun

    2014-01-01

    Background Treatment with the combination of clopidogrel and aspirin taken soon after a transient ischemic attack (TIA) or minor stroke was shown to reduce the 90‐day risk of stroke in a large trial in China, but the cost‐effectiveness is unknown. This study sought to estimate the cost‐effectiveness of the clopidogrel‐aspirin regimen for acute TIA or minor stroke. Methods and Results A Markov model was created to determine the cost‐effectiveness of treatment of acute TIA or minor stroke patients with clopidogrel‐aspirin compared with aspirin alone. Inputs for the model were obtained from clinical trial data, claims databases, and the published literature. The main outcome measure was cost per quality‐adjusted life‐years (QALYs) gained. One‐way and multivariable probabilistic sensitivity analyses were performed to test the robustness of the findings. Compared with aspirin alone, clopidogrel‐aspirin resulted in a lifetime gain of 0.037 QALYs at an additional cost of CNY 1250 (US$ 192), yielding an incremental cost‐effectiveness ratio of CNY 33 800 (US$ 5200) per QALY gained. Probabilistic sensitivity analysis showed that clopidogrel‐aspirin therapy was more cost‐effective in 95.7% of the simulations at a willingness‐to‐pay threshold recommended by the World Health Organization of CNY 105 000 (US$ 16 200) per QALY. Conclusions Early 90‐day clopidogrel‐aspirin regimen for acute TIA or minor stroke is highly cost‐effective in China. Although clopidogrel is generic, Plavix is brand in China. If Plavix were generic, treatment with clopidogrel‐aspirin would have been cost saving. PMID:24904018

  6. Computed tomography identifies patients at high risk for stroke after transient ischemic attack/nondisabling stroke: prospective, multicenter cohort study.

    PubMed

    Wasserman, Jason K; Perry, Jeffrey J; Sivilotti, Marco L A; Sutherland, Jane; Worster, Andrew; Émond, Marcel; Jin, Albert Y; Oczkowski, Wieslaw J; Sahlas, Demetrios J; Murray, Heather; MacKey, Ariane; Verreault, Steve; Wells, George A; Dowlatshahi, Dar; Stotts, Grant; Stiell, Ian G; Sharma, Mukul

    2015-01-01

    Ischemia on computed tomography (CT) is associated with subsequent stroke after transient ischemic attack. This study assessed CT findings of acute ischemia, chronic ischemia, or microangiopathy for predicting subsequent stroke after transient ischemic attack. This prospective cohort study enrolled patients with transient ischemic attack or nondisabling stroke that had CT scanning within 24 hours. Primary outcome was subsequent stroke within 90 days. Secondary outcomes were stroke at ≤2 or >2 days. CT findings were classified as ischemia present or absent and acute or chronic or microangiopathy. Analysis used Fisher exact test and multivariate logistic regression. A total of 2028 patients were included; 814 had ischemic changes on CT. Subsequent stroke rate was 3.4% at 90 days and 1.5% at ≤2 days. Stroke risk was greater if baseline CT showed acute ischemia alone (10.6%; P=0.002), acute+chronic ischemia (17.4%; P=0.007), acute ischemia+microangiopathy (17.6%; P=0.019), or acute+chronic ischemia+microangiopathy (25.0%; P=0.029). Logistic regression found acute ischemia alone (odds ratio [OR], 2.61; 95% confidence interval [CI[, 1.22-5.57), acute+chronic ischemia (OR, 5.35; 95% CI, 1.71-16.70), acute ischemia+microangiopathy (OR, 4.90; 95% CI, 1.33-18.07), or acute+chronic ischemia+microangiopathy (OR, 8.04; 95% CI, 1.52-42.63) was associated with a greater risk at 90 days, whereas acute+chronic ischemia (OR, 10.78; 95% CI, 2.93-36.68), acute ischemia+microangiopathy (OR, 8.90; 95% CI, 1.90-41.60), and acute+chronic ischemia+microangiopathy (OR, 23.66; 95% CI, 4.34-129.03) had greater risk at ≤2 days. Only acute ischemia (OR, 2.70; 95% CI, 1.01-7.18; P=0.047) was associated with a greater risk at >2 days. In patients with transient ischemic attack/nondisabling stroke, CT evidence of acute ischemia alone or acute ischemia with chronic ischemia or microangiopathy was associated with increased subsequent stroke risk within 90 days. © 2014 American Heart

  7. The 2015 and 2016 terrorist attacks in France: was there a short-term impact on hospitalizations for cardiovascular disease?

    PubMed

    Chatignoux, Edouard; Gabet, Amélie; Moutengou, Elodie; Pirard, Philippe; Motreff, Yvon; Bonaldi, Christophe; Olié, Valérie

    2018-01-01

    The terrorist attacks in Paris and Nice in 2015 and 2016 generated widespread emotional stress in France. Given that acute emotional stress is a well-known trigger for cardiovascular disease, we investigated whether these attacks had any short-term impact on hospitalizations for acute cardiovascular disease in France. Annual hospital discharge data from 2009 to 2016 were extracted from the French Hospital Discharge Database. All hospitalizations with a primary diagnosis of acute coronary syndrome, heart failure, or stroke were selected. Generalized additive Poisson models were used to differentiate "unusual" variations in daily hospitalization numbers in the 15 days following the attacks from the expected background hospitalization rate. The average daily number of hospitalizations was 396.4 for acute coronary syndrome, 598.6 for heart failure, and 334.6 for stroke. The daily mean number of hospitalizations for heart failure and stroke was higher in the 15 days following each attack compared with the reference periods. However, multivariate analysis showed no significant variation in the risk of hospitalization in the days following the attacks. Watching events unfold on television, no matter how dramatic, was not a sufficiently potent trigger for cardiovascular disease, although it may have led to an increase in hospitalizations for stress or anxiety. The 2015 and 2016 terrorist attacks do not seem to have had any measurable short-term impact on hospitalizations for cardiovascular disease either in the Paris and Nice regions or in the rest of France.

  8. Association of HaeIII single nucleotide polymorphisms in the SLC2A1 gene with risk of diabetic nephropathy; evidence from Kurdish patients with type 2 diabetes mellitus.

    PubMed

    Amini, Sabrieh; Javanmardi, Mitra; Mokarizadeh, Aram; Maroofi, Farzad; Jalali, Chiya; Azadi, Namam-Ali; Mohammadi, Hamid; Abdi, Mohammad

    2016-06-01

    Given the growing rate of patients with type 2 diabetes mellitus, uncovering the effects of gene polymorphism on diabetes pathogenesis has attracted a lot of attention. Because glucose transporter 1 is involved in glucose uptake, the polymorphism of this gene may be an important risk factor in type 2 diabetes mellitus or in the progression of diabetes complications such as diabetic nephropathy. As far as the authors are concerned, this study is the first one aiming at evaluating the probable effects of solute carrier family 2 facilitated glucose transporter member 1 (SLC2A1) HaeIII polymorphism on clinical and laboratory outcomes of Kurdish patients with type 2 diabetes mellitus. This study was conducted involving 126 diabetic nephropathy patients and 150 diabetic patients without renal involvement. Serum levels of Cystatin C, fasting blood glucose, creatinine and urinary albumin; levels of glycated hemoglobin and estimated glomerular filtration rate were measured. Moreover, the Hae III polymorphism of SLC2A1 gene was determined by PCR-restriction fragment length polymorphism (RFLP). The rate of CC genotype was higher (37%) in patients with diabetic nephropathy compared with controls. There were a significant correlation between the CC genotype and risk of diabetic nephropathy. There were significant correlations between genotypes, serum Cystatin C and estimated glomerular filtration rate in patients with diabetic nephropathy. The results demonstrated the high frequency of C allele of SLC2A1 HaeIII in Kurdish patients with diabetic nephropathy. It was also found that this polymorphism is a significant risk factor for diabetic nephropathy. The effect of this polymorphism on clinical and laboratory characteristics of diabetic nephropathy patients was significant. © The Author 2015. Published by Oxford University Press on behalf of the Association of Physicians. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Cost-effectiveness of clopidogrel-aspirin versus aspirin alone for acute transient ischemic attack and minor stroke.

    PubMed

    Pan, Yuesong; Wang, Anxin; Liu, Gaifen; Zhao, Xingquan; Meng, Xia; Zhao, Kun; Liu, Liping; Wang, Chunxue; Johnston, S Claiborne; Wang, Yilong; Wang, Yongjun

    2014-06-05

    Treatment with the combination of clopidogrel and aspirin taken soon after a transient ischemic attack (TIA) or minor stroke was shown to reduce the 90-day risk of stroke in a large trial in China, but the cost-effectiveness is unknown. This study sought to estimate the cost-effectiveness of the clopidogrel-aspirin regimen for acute TIA or minor stroke. A Markov model was created to determine the cost-effectiveness of treatment of acute TIA or minor stroke patients with clopidogrel-aspirin compared with aspirin alone. Inputs for the model were obtained from clinical trial data, claims databases, and the published literature. The main outcome measure was cost per quality-adjusted life-years (QALYs) gained. One-way and multivariable probabilistic sensitivity analyses were performed to test the robustness of the findings. Compared with aspirin alone, clopidogrel-aspirin resulted in a lifetime gain of 0.037 QALYs at an additional cost of CNY 1250 (US$ 192), yielding an incremental cost-effectiveness ratio of CNY 33 800 (US$ 5200) per QALY gained. Probabilistic sensitivity analysis showed that clopidogrel-aspirin therapy was more cost-effective in 95.7% of the simulations at a willingness-to-pay threshold recommended by the World Health Organization of CNY 105 000 (US$ 16 200) per QALY. Early 90-day clopidogrel-aspirin regimen for acute TIA or minor stroke is highly cost-effective in China. Although clopidogrel is generic, Plavix is brand in China. If Plavix were generic, treatment with clopidogrel-aspirin would have been cost saving. © 2014 The Authors. Published on behalf of the American Heart Association, Inc., by Wiley Blackwell.

  10. Medical aspects of the Iraqi missile attacks on Israel.

    PubMed

    Karsenty, E; Shemer, J; Alshech, I; Cojocaru, B; Moscovitz, M; Shapiro, Y; Danon, Y L

    1991-01-01

    During the period 18 January-28 February 1991, a total of 39 Iraqi modified Scud missiles landed in Israel, most of them in the densely populated Tel Aviv area. There were 23 missile attack alerts. These attacks caused 1,059 cases of injury; there were two deaths and 232 patients were admitted to emergency rooms for injuries directly related to the explosions, only one of which was severe. A survey among 91 of the injured showed that 46.6% of the wounds were caused by glass splinters, 31.1% were blunt contusions, and 22.2% were acute psychological reactions. No case of blast injury was reported. Inappropriate injection of atropine was reported in 230 cases. Acute anxiety was the reason for admission of 544 patients to emergency rooms. Another 40 patients sustained various traumas while rushing to the sealed room. The relatively low number of injured people is striking in view of the density of population in the areas hit. Various explanations are discussed.

  11. International consensus on the diagnosis and management of pediatric patients with hereditary angioedema with C1 inhibitor deficiency.

    PubMed

    Farkas, H; Martinez-Saguer, I; Bork, K; Bowen, T; Craig, T; Frank, M; Germenis, A E; Grumach, A S; Luczay, A; Varga, L; Zanichelli, A

    2017-02-01

    The consensus documents published to date on hereditary angioedema with C1 inhibitor deficiency (C1-INH-HAE) have focused on adult patients. Many of the previous recommendations have not been adapted to pediatric patients. We intended to produce consensus recommendations for the diagnosis and management of pediatric patients with C1-INH-HAE. During an expert panel meeting that took place during the 9th C1 Inhibitor Deficiency Workshop in Budapest, 2015 (www.haenet.hu), pediatric data were presented and discussed and a consensus was developed by voting. The symptoms of C1-INH-HAE often present in childhood. Differential diagnosis can be difficult as abdominal pain is common in pediatric C1-INH-HAE, but also commonly occurs in the general pediatric population. The early onset of symptoms may predict a more severe subsequent course of the disease. Before the age of 1 year, C1-INH levels may be lower than in adults; therefore, it is advisable to confirm the diagnosis after the age of one year. All neonates/infants with an affected C1-INH-HAE family member should be screened for C1-INH deficiency. Pediatric patients should always carry a C1-INH-HAE information card and medicine for emergency use. The regulatory approval status of the drugs for prophylaxis and for acute treatment is different in each country. Plasma-derived C1-INH, recombinant C1-INH, and ecallantide are the only agents licensed for the acute treatment of pediatric patients. Clinical trials are underway with additional drugs. It is recommended to follow up patients in an HAE comprehensive care center. The pediatric-focused international consensus for the diagnosis and management of C1-INH-HAE patients was created. © 2016 The Authors. Allergy Published by John Wiley & Sons Ltd.

  12. Acute gouty arthritis complicated with acute ST elevation myocardial infarction is independently associated with short- and long-term adverse non-fatal cardiac events.

    PubMed

    Liu, Kuan-Liang; Lee, Hsin-Fu; Chou, Shing-Hsien; Lin, Yen-Chen; Lin, Chia-Pin; Wang, Chun-Li; Chang, Chi-Jen; Hsu, Lung-An

    2014-01-01

    Large epidemiologic studies have associated gouty arthritis with the risk of coronary heart disease. However, there has been a lack of information regarding the outcomes for patients who have gout attacks during hospitalization for acute myocardial infarction. We reviewed the data of 444 consecutive patients who were admitted to our hospital between 2005 and 2008 due to acute ST elevation myocardial infarction (STEMI). The clinical outcomes were compared between patients with gout attack and those without. Of the 444, 48 patients with acute STEMI developed acute gouty arthritis during hospitalization. The multivariate analysis identified prior history of gout and estimated glomerular filtration rate as independent risk factors of gout attack for patients with acute STEMI (odds ratio (OR) 21.02, 95 % CI 2.96-149.26, p = 0.002; OR 0.92, 95 % CI 0.86-0.99, p = 0.035, respectively). The in-hospital mortality and duration of hospital stay did not differ significantly between the gouty group and the non-gouty group (controls). During a mean follow-up of 49 ± 28 months, all-cause mortality and stroke were similar for both groups. Multivariate Cox regression showed that gout attack was independently associated with short- and long-term adverse non-fatal cardiac events (hazard ratio (HR) 1.88, 95 % CI 1.09-3.24, p = 0.024; HR 1.82, 95 % CI 1.09-3.03, p = 0.022, respectively). Gout attack among patients hospitalized due to acute STEMI was independently associated with short-term and long-term rates of adverse non-fatal cardiac events.

  13. Early psychological consequences of the March 11, 2004, terrorist attacks in Madrid, Spain.

    PubMed

    Muñoz, Manuel; Crespo, María; Pérez-Santos, Eloísa; Vázquez, José Juan

    2005-12-01

    On March 11, 2004, Al-Qaeda set off 10 bombs on several train routes in Madrid. 192 people were killed and 2,000 wounded. In this study, 1,179 questionnaires were administered Week 2 after the attacks to residents 18 years and over from the affected geographical areas. The questionnaire included items about sociodemographic variables and exposure to the attacks. Psychological effects were assessed as presence of acute stress and depressive symptomatology and functional impairment. 46.7% of the sample presented symptomatology of acute stress and 49.6% depressive symptoms. Among the symptoms of acute stress, the most frequent were re-experiencing (72.5%) and dissociative symptoms (71.8%). The chief predicting variables in symptomatology were being female, over 65 yr. old, and a habitual train user. The large number of affected people was refined with an item analysis and the consideration of severity of interference in psychosocial functioning.

  14. Cluster headache syndrome. Ways to abort or ward off attacks.

    PubMed

    Marks, D R; Rapoport, A M

    1992-02-15

    Cluster headache is a syndrome of severe head and facial pain accompanied by autonomic abnormalities. Men are affected more frequently than women. Headaches occur daily during periods of susceptibility, which may be followed by periods of remission. The etiology of cluster headache is uncertain. Recent work suggests that hypothalamic dysfunction and/or oxyhemoglobin desaturation may be involved in its pathogenesis. Effective medical regimens are available for aborting acute attacks and for preventing attacks. Surgical ablation of the trigeminal ganglion has been effective in some patients when conventional medical therapy has failed.

  15. Accurate diagnosis of acute abdomen in FMF and acute appendicitis patients: how can we use procalcitonin?

    PubMed

    Kisacik, Bunyamin; Kalyoncu, Umut; Erol, M Fatih; Karadag, Omer; Yildiz, Mustafa; Akdogan, Ali; Kaptanoglu, Bugra; Hayran, Mutlu; Ureten, Kemal; Ertenli, Ihsan; Kiraz, Sedat; Calguneri, Meral

    2007-12-01

    This study was conducted to define the value of procalcitonin (PCT) levels in the differential diagnosis of abdominal familial Mediterranean fever (FMF) attacks from acute appendicitis. From October 2006 to January 2007, 28 FMF (12 males, 16 females) patients with acute abdominal attacks and 34 patients (18 males) with acute abdomen who underwent operation with the clinical diagnosis of acute appendicitis were consecutively enrolled in this study. FMF patients with concurrent infectious diseases were excluded. PCT values were measured by an immunofluorescent method using the B.R.A.H.M.S. PCT kit (B.R.A.H.M.S. Diagnostica, Berlin, Germany). Erythrocyte sedimentation rate (ESR), C-reactive proteins (CRP) and leucocyte levels were also noted. Mean disease duration in FMF patients was 9.6 +/- 8.1 years (range 2-33 years) and all were on colchicine therapy with a mean colchicine dosage of 1.2 +/- 0.4 mg/day. Among the operated patients, 5 were excluded: 3 patients had normal findings and 2 had intestinal perforation (PCT levels were 2.69 and 4.93 ng/ml, respectively) at operative and pathologic evaluation. There were no significant differences between the two groups with respect to gender and age (p was not significant (NS) for all). Acute phase reactants and PCT levels were increased in patients with FMF compared to patients with acute appendicitis (0.529[0.12 +/- 0.96] vs 0.095 [0.01-0.80] p < 0.001, respectively). PCT levels higher than 0.5 ng/ml were found in 11% (3/28) of FMF patients compared to 62% (18/29) of acute appendicitis patients (p < 0.001). Our results suggest that PCT could be a useful test in the differentiation of abdominal FMF attacks from acute appendicitis, though it should not supplant more conventional investigations.

  16. Public knowledge of heart attack symptoms in Beijing residents.

    PubMed

    Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan

    2007-09-20

    attack symptoms is deficient in Beijing residents. But their knowledge of calling emergency medical services when someone is having a heart attack is relatively adequate. Public health efforts are needed to increase the recognition of the major heart attack symptoms in both the general public and groups at high risk for an acute cardiac event, especially in socioeconomically disadvantaged subgroups, including persons with low education level, low household income, and no health insurance coverage.

  17. Frequency and predictors of acute ischaemic lesions on brain magnetic resonance imaging in young patients with a clinical diagnosis of transient ischaemic attack.

    PubMed

    Tanislav, C; Grittner, U; Fazekas, F; Thijs, V; Tatlisumak, T; Huber, R; von Sarnowski, B; Putaala, J; Schmidt, R; Kropp, P; Norrving, B; Martus, P; Gramsch, C; Giese, A K; Rolfs, A; Enzinger, C

    2016-07-01

    Acute lesions in patients with transient ischaemic attack (TIA) are important as they are associated with increased risk for recurrence. Characteristics associated with acute lesions in young TIA patients were therefore investigated. The sifap1 study prospectively recruited a multinational European cohort (n = 5023) of patients aged 18-55 years with acute cerebrovascular event. The detection of acute ischaemic lesions was based on diffusion-weighted imaging (DWI). The frequency of DWI lesions was assessed in 829 TIA patients who met the criteria of symptom duration <24 h and their association with demographic, clinical and imaging variables was analysed. The median age was 46 years (interquartile range 40-51 years); 45% of the patients were female. In 121 patients (15%) ≥1 acute DWI lesion was detected. In 92 patients, DWI lesions were found in the anterior circulation, mostly located in cortical-subcortical areas (n = 63). Factors associated with DWI lesions in multiple regression analysis were left hemispheric presenting symptoms [odds ratio (OR) 1.92, 95% confidence interval (CI) 1.27-2.91], dysarthria (OR 2.17, 95% CI 1.38-3.43) and old brain infarctions on MRI (territories of the middle and posterior cerebral artery: OR 2.43, 95% CI 1.42-4.15; OR 2.41, 95% CI 1.02-5.69, respectively). In young patients with a clinical TIA 15% demonstrated acute DWI lesions on brain MRI, with an event pattern highly suggestive of an embolic origin. Except for the association with previous infarctions there was no clear clinical predictor for acute ischaemic lesions, which indicates the need to obtain MRI in young individuals with TIA. © 2016 EAN.

  18. Transient ischemic attack and minor stroke are the most common manifestations of acute cerebrovascular disease: a prospective, population-based study--the Aarhus TIA study.

    PubMed

    von Weitzel-Mudersbach, Paul; Andersen, Grethe; Hundborg, Heidi H; Johnsen, Søren P

    2013-01-01

    Severity of acute vascular illness may have changed in the last decades due to improvements in primary and secondary prevention. Population-based data on the severity of acute ischemic cerebrovascular disease are sparse. We aimed to examine incidence, characteristics and severity of acute ischemic cerebrovascular disease in a well-defined population. All patients admitted with transient ischemic attack (TIA) or acute ischemic stroke from March 1, 2007, to February 29, 2008, with residence in the Aarhus area, were included. Incidence rates and characteristics of TIA and ischemic stroke were compared. TIA accounted for 30%, TIA and minor stroke combined for 65% of all acute ischemic cerebrovascular events. Age-adjusted incidence rates of TIA and ischemic stroke were 72.2/100,000 and 129.5/100,000 person-years, respectively. TIA patients were younger than stroke patients (66.3 vs. 72.7 years; p < 0.001). Atrial fibrillation, previous myocardial infarction and previous stroke were significantly more frequent in stroke patients; no differences in other baseline characteristics were found. Minor events are the most common in ischemic cerebrovascular disease, and may constitute a larger proportion than previously reported. TIA and stroke patients share many characteristics; however, TIA patients are younger and have fewer manifestations of atherosclerotic diseases, indicating a high potential for secondary prevention. Copyright © 2012 S. Karger AG, Basel.

  19. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  20. Myocardial perfusion imaging study of CO(2)-induced panic attack.

    PubMed

    Soares-Filho, Gastão L F; Machado, Sergio; Arias-Carrión, Oscar; Santulli, Gaetano; Mesquita, Claudio T; Cosci, Fiammetta; Silva, Adriana C; Nardi, Antonio E

    2014-01-15

    Chest pain is often seen alongside with panic attacks. Moreover, panic disorder has been suggested as a risk factor for cardiovascular disease and even a trigger for acute coronary syndrome. Patients with coronary artery disease may have myocardial ischemia in response to mental stress, in which panic attack is a strong component, by an increase in coronary vasomotor tone or sympathetic hyperactivity setting off an increase in myocardial oxygen consumption. Indeed, coronary artery spasm was presumed to be present in cases of cardiac ischemia linked to panic disorder. These findings correlating panic disorder with coronary artery disease lead us to raise questions about the favorable prognosis of chest pain in panic attack. To investigate whether myocardial ischemia is the genesis of chest pain in panic attacks, we developed a myocardial perfusion study through research by myocardial scintigraphy in patients with panic attacks induced in the laboratory by inhalation of 35% carbon dioxide. In conclusion, from the data obtained, some hypotheses are discussed from the viewpoint of endothelial dysfunction and microvascular disease present in mental stress response. Copyright © 2014 Elsevier Inc. All rights reserved.

  1. Lesson of the month 2: The limitations of steroid therapy in bradykinin-mediated angioedema attacks.

    PubMed

    Ismail, Sharif; Cheng, Leo; Grigoriadou, Sofia; Laffan, James; Menon, Manoj

    2015-02-01

    Acute angioedema attacks are conventionally treated with antihistamines and steroids, in line with a presumed mechanism of disease involving overwhelming mast-cell degranulation. This approach overlooks a small but important minority of cases in which attacks are bradykinin driven and exhibit poor responsiveness to steroid or anti-histamine therapy. These patients may have a family history of angioedema (hereditary angioedema), or a past medical history including B-cell lymphoproliferative disorders or autoimmune disease (acquired angioedema). Rather than steroid therapy, they respond to administration of a bradykinin inhibitor, or more commonly, a C1 esterase inhibitor substitute, to control acute symptoms and reduce the probability of invasive airway insertion. In the long-term, they require C1 esterase inhibitor sparing therapy and a treat-the-cause approach to reduce the risk of recurrent attacks. We present here a case of a middle-aged woman who presented with recurrent angioedema of initially uncertain aetiology. © 2015 Royal College of Physicians.

  2. Clinical- and imaging-based prediction of stroke risk after transient ischemic attack: the CIP model.

    PubMed

    Ay, Hakan; Arsava, E Murat; Johnston, S Claiborne; Vangel, Mark; Schwamm, Lee H; Furie, Karen L; Koroshetz, Walter J; Sorensen, A Gregory

    2009-01-01

    Predictive instruments based on clinical features for early stroke risk after transient ischemic attack suffer from limited specificity. We sought to combine imaging and clinical features to improve predictions for 7-day stroke risk after transient ischemic attack. We studied 601 consecutive patients with transient ischemic attack who had MRI within 24 hours of symptom onset. A logistic regression model was developed using stroke within 7 days as the response criterion and diffusion-weighted imaging findings and dichotomized ABCD(2) score (ABCD(2) >/=4) as covariates. Subsequent stroke occurred in 25 patients (5.2%). Dichotomized ABCD(2) score and acute infarct on diffusion-weighted imaging were each independent predictors of stroke risk. The 7-day risk was 0.0% with no predictor, 2.0% with ABCD(2) score >/=4 alone, 4.9% with acute infarct on diffusion-weighted imaging alone, and 14.9% with both predictors (an automated calculator is available at http://cip.martinos.org). Adding imaging increased the area under the receiver operating characteristic curve from 0.66 (95% CI, 0.57 to 0.76) using the ABCD(2) score to 0.81 (95% CI, 0.74 to 0.88; P=0.003). The sensitivity of 80% on the receiver operating characteristic curve corresponded to a specificity of 73% for the CIP model and 47% for the ABCD(2) score. Combining acute imaging findings with clinical transient ischemic attack features causes a dramatic boost in the accuracy of predictions with clinical features alone for early risk of stroke after transient ischemic attack. If validated in relevant clinical settings, risk stratification by the CIP model may assist in early implementation of therapeutic measures and effective use of hospital resources.

  3. Migraine attack treatment : a tailor-made suit, not one size fits all.

    PubMed

    Belvis, Robert; Mas, Natalia; Aceituno, Azahara

    2014-04-01

    About 15% of people in the world suffer migraine attacks. Migraine can induce a great impact in the quality of life, and the costs of medical care and loss of productivity can be also high. Non-steroidal anti-inflammatory drugs (NSAIDs) are the best treatment in mild-to-moderate migraine attacks and triptans are the first line option in the acute treatment of moderate-to-severe migraine attacks. At present, there are seven marketed triptans: sumatriptan, rizatriptan, zolmitriptan, eletriptan, naratriptan, almotriptan and frovatriptan. Obviously, every drug presents different pharmacokinetic and pharmacodynamics properties and, moreover, some triptans have several formulations. The prescription of one of these seven triptans for a specified patient is based in the drug profile: efficacy, safety, pharmacokinetics and pharmacodynamics. Other data to take account in the final prescription are clinical characteristics of the migraine attack (speed of onset, intensity of pain, lasting of the attack) and patient characteristics as working habits, life style or medical history. It is therefore mandatory to perform an individualization of the treatment of migraine attack. In recent years, several new patents of drugs have been registered in the treatment of migraine attack, although most of these are already known drugs that only provide new routes of administration. We present an update on the treatment of the migraine attack.

  4. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    NASA Astrophysics Data System (ADS)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  5. Hereditary angioedema: The plasma contact system out of control.

    PubMed

    De Maat, S; Hofman, Z L M; Maas, C

    2018-06-19

    The plasma contact system contributes to thrombosis in experimental models. Even though our standard blood coagulation tests are prolonged when plasma lacks contact factors, this enzyme system appears to have a minor (if any) role in haemostasis. In this review, we will explore the clinical phenotype of C1 esterase inhibitor (C1-INH) deficiency. C1-INH is the key plasma inhibitor of the contact system enzymes and its deficiency causes hereditary angioedema (HAE). This inflammatory disorder is hallmarked by recurrent aggressive attacks of tissue swelling that occur at unpredictable locations throughout the body. Bradykinin, which is considered a byproduct of the plasma contact system during in vitro coagulation, is the main disease mediator in HAE. Surprisingly, there is little evidence for thrombotic events in HAE patients, suggesting a mechanistic uncoupling from the intrinsic pathway of coagulation. In addition, it is questionable whether a surface is responsible for contact system activation in HAE. In this review, we will discuss the clinical phenotype, disease modifiers and diagnostic challenges of HAE. We will subsequently describe the underlying biochemical mechanisms and contributing disease mediators. Furthermore, we will review three types of HAE, which are not caused by C1 esterase inhibitor deficiency. Finally, we will propose a central enzymatic axis that we hypothesize to be responsible for bradykinin production in health and disease. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  6. About Heart Attacks

    MedlinePlus

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  7. Oral sumatriptan in acute migraine.

    PubMed

    Goadsby, P J; Zagami, A S; Donnan, G A; Symington, G; Anthony, M; Bladin, P F; Lance, J W

    1991-09-28

    The efficacy in acute migraine of oral sumatriptan was assessed in a double-blind, randomised, placebo-controlled, crossover study of 61 patients (mean age 39 [SD 10] years). 41 completed treatment of four attacks, two with sumatriptan 100 mg and two with placebo. The response rate (reduction in headache from moderate or severe to mild or absent at 2 h) was 51% (45/89) with sumatriptan and 10% (9/93) with placebo (p less than 0.01); rescue medication was needed at 2 h in 41% and 88%, respectively. Of 28 patients headache-free at 24 h, 11 (39%) had recurrent headache within 24 h. There were no substantial side-effects. Thus, sumatriptan is an effective well-tolerated treatment for acute migraine attacks.

  8. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  9. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  10. Mental- and physical-health effects of acute exposure to media images of the September 11, 2001, attacks and the Iraq War.

    PubMed

    Silver, Roxane Cohen; Holman, E Alison; Andersen, Judith Pizarro; Poulin, Michael; McIntosh, Daniel N; Gil-Rivas, Virginia

    2013-09-01

    Millions of people witnessed early, repeated television coverage of the September 11 (9/11), 2001, terrorist attacks and were subsequently exposed to graphic media images of the Iraq War. In the present study, we examined psychological- and physical-health impacts of exposure to these collective traumas. A U.S. national sample (N = 2,189) completed Web-based surveys 1 to 3 weeks after 9/11; a subsample (n = 1,322) also completed surveys at the initiation of the Iraq War. These surveys measured media exposure and acute stress responses. Posttraumatic stress symptoms related to 9/11 and physician-diagnosed health ailments were assessed annually for 3 years. Early 9/11- and Iraq War-related television exposure and frequency of exposure to war images predicted increased posttraumatic stress symptoms 2 to 3 years after 9/11. Exposure to 4 or more hr daily of early 9/11-related television and cumulative acute stress predicted increased incidence of health ailments 2 to 3 years later. These findings suggest that exposure to graphic media images may result in physical and psychological effects previously assumed to require direct trauma exposure.

  11. Heart Attack

    MedlinePlus

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  12. Reducing pulmonary injury by hyperbaric oxygen preconditioning during simulated high altitude exposure in rats.

    PubMed

    Li, Zhuo; Gao, Chunjin; Wang, Yanxue; Liu, Fujia; Ma, Linlin; Deng, Changlei; Niu, Ko-Chi; Lin, Mao-Tsun; Wang, Chen

    2011-09-01

    Hyperbaric oxygen preconditioning (HBO₂P + HAE) has been found to be beneficial in preventing the occurrence of ischemic damage to brain, spinal cord, heart, and liver in several disease models. In addition, pulmonary inflammation and edema are associated with a marked reduction in the expression levels of both aquaporin (AQP) 1 and AQP5 in the lung. Here, the aims of this study are first to ascertain whether acute lung injury can be induced by simulated high altitude in rats and second to assess whether HBO2P + HAE is able to prevent the occurrence of the proposed high altitude-induced ALI. Rats were randomly divided into the following three groups: the normobaric air (NBA; 21% O₂ at 1 ATA) group, the HBO₂P + high altitude exposure (HAE) group, and the NBA + HAE group. In HBO₂P + HAE group, animals received 100% O₂ at 2.0 ATA for 1 hour per day, for five consecutive days. In HAE groups, animals were exposed to a simulated HAE of 6,000 m in a hypobaric chamber for 24 hours. Right after being taken out to the ambient, animals were anesthetized generally and killed and thoroughly exsanguinated before their lungs were excised en bloc. The lungs were used for both histologic and molecular evaluation and analysis. In NBA + HAE group, the animals displayed higher scores of alveolar edema, neutrophil infiltration, and hemorrhage compared with those of NBA controls. In contrast, the levels of both AQP1 and AQP5 proteins and mRNA expression in the lung in the NBA + HAE group were significantly lower than those of NBA controls. However, the increased lung injury scores and the decreased levels of both AQP1 and AQP5 proteins and mRNA expression in the lung caused by HAE was significantly reduced by HBO₂P + HAE. Our results suggest that high altitude pulmonary injury may be prevented by HBO2P + HAE in rats.

  13. Acute porphyrias in the USA: features of 108 subjects from porphyrias consortium.

    PubMed

    Bonkovsky, Herbert L; Maddukuri, Vinaya C; Yazici, Cemal; Anderson, Karl E; Bissell, D Montgomery; Bloomer, Joseph R; Phillips, John D; Naik, Hetanshi; Peter, Inga; Baillargeon, Gwen; Bossi, Krista; Gandolfo, Laura; Light, Carrie; Bishop, David; Desnick, Robert J

    2014-12-01

    Recent descriptions of the clinical and laboratory features of subjects with acute porphyrias in the US are lacking. Our aim was to describe clinical, biochemical, and genetic features of 108 subjects. Between September 2010 and December 2012, 108 subjects with acute porphyrias (90 acute intermittent porphyrias, 9 hereditary coproporphyrias, 9 variegate porphyrias) were enrolled into an observational study. Genetic testing was performed at a central genetic testing laboratory and clinical information entered into a central database. Selected features were compared with data for adults in the US. Most subjects (88/108, 81%) were female, with self-reported onset of symptoms in the second through fourth decades of life. The most common symptom was abdominal pain. Appendectomies and cholecystectomies were common before a diagnosis of porphyria. The diagnosis was delayed by a mean of 15 years. Anxiety and depression were common, and 18% complained of chronic symptoms, especially neuropathic and other pains. The incidences of systemic arterial hypertension, chronic kidney disease, seizure disorders, and psychiatric conditions were markedly increased. Mutations of the known causative genes were found in 102/105 of those tested, with novel mutations being found in 37, including in 7/8 subjects with hereditary coproporphyria. Therapy with intravenous hematin was the most effective therapy both for treatment of acute attacks and for prevention of recurrent attacks. Acute porphyrias often remain undiagnosed for more than a decade after first symptoms develop. Intravenous hematin is the treatment of choice, both for treatment of acute attacks and for prevention of recurrent attacks. Copyright © 2014 Elsevier Inc. All rights reserved.

  14. Brain Circulation during Panic Attack: A Transcranial Doppler Study with Clomipramine Challenge.

    PubMed

    Rotella, Francesco; Marinoni, Marinella; Lejeune, Francesca; Alari, Fabiana; Depinesi, Daniela; Cosci, Fiammetta; Faravelli, Carlo

    2014-01-01

    Introduction. Cerebral blood flow has been well studied in patients with panic disorder, but only few studies analyzed the mechanisms underlying the onset of a panic attack. The aim of the present study was to monitor the cerebral hemodynamics modifications during a panic attack. Materials and Methods. 10 panic disorder patients with recent onset, fully drug naïve, were compared to 13 patients with panic disorder with a previous history of treatment and to 14 controls. A continuous bilateral monitoring of mean flow velocities in right and left middle cerebral arteries was performed by transcranial Doppler. Clomipramine was chosen as challenge. Results. Eight out of 10 patients drug naïve and 6 control subjects out of 13 had a full blown panic attack during the test, whereas none of the patients with a history of treatment panicked. The occurrence of a panic attack was accompanied by a rapid decrease of flow velocities in both right and left middle cerebral arteries. Discussion. The bilateral acute decrease of mean flow velocity during a panic attack suggests the vasoconstriction of the microcirculation of deep brain structures perfused by middle cerebral arteries and involved in the so-called "fear circuitry," thus suggesting that cerebral homeostatic dysfunctions seem to have a key role in the onset of a panic attack.

  15. Novel Psychological Formulation and Treatment of "Tic Attacks" in Tourette Syndrome.

    PubMed

    Robinson, Sally; Hedderly, Tammy

    2016-01-01

    One important, but underreported, phenomenon in Tourette syndrome (TS) is the occurrence of "tic attacks." These episodes have been described at conferences as sudden bouts of tics and/or functional tic-like movements, lasting from 15 min to several hours. They have also been described by patients in online TS communities. To date, there are no reports of tic attacks in the literature. The aim of this article is to stimulate discussion and inform clinical practices by describing the clinical presentation of 12 children (mean age 11 years and 3 months; SD = 2 years and 4 months) with TS and tic attacks, with a detailed case report for one case (13-year-old male). These children commonly present acutely to casualty departments and undergo unnecessary medical investigations. Interestingly, all children reported comorbid anxiety, with worries about the tics themselves and an increased internal focus of attention on tics once the attacks had started. In keeping with other children, the index case reported a strong internal focus of attention, with a relationship between physiological sensations/tic urges, worries about having tic attacks, and behavioral responses (e.g., body scanning, situational avoidance, and other responses). In our experience, the attacks reduce with psychological therapy, for example, the index case attended 13 sessions of therapy that included metacognitive and attention training techniques, as well as cognitive-behavioral strategies. Following treatment, an improvement was seen across a range of measures assessing tics, mood, anxiety, and quality of life. Thus, psychological techniques used to treat anxiety disorders are effective at supporting a reduction in tic attacks through modifying attention, worry processes, and negative beliefs. It is hypothesized that an attentional style of threat monitoring, difficulties tolerating internal sensory urges, cognitive misattributions, and maladaptive coping strategies contribute to the

  16. Investigation of an outbreak of hypersensitivity-type reactions during the 2004 national measles-mumps-rubella vaccination campaign in Brazil.

    PubMed

    Freitas, Daniel R C; Moura, Evoide; Araújo, Gisele; Cardoso, Alessandra; Scheidt, Penelope; Ferraz, Elizabete; Madalosso, Geraldine; Chen, Robert T; Hatch, Douglas L

    2013-01-30

    During Brazil's national measles, mumps, and rubella (MMR) vaccination campaign in August 2004, an unexpectedly high rate of hypersensitivity-type adverse events (HAEs) was reported. We reviewed information about children with suspected HAEs reported by clinicians to Brazil's national passive surveillance system for adverse events following immunization (AEFI), compared attack rate of HAE by manufacturer of MMR vaccine used in the campaign, and conducted a case-control study to determine possible risk factors for HAEs. During the 2004 national campaign, the rate of HAEs following MMR vaccination was one log higher for manufacturer A (15.2/100,000 doses administered) compared to the other two manufacturers (1.2 and 0.6/100,000 doses; p<0.0001); a similar pattern was observed retrospectively in analysis of the 2000-2003 AEFI surveillance (0.95 vs. 0.07 per 100,000 doses administered; p<0.0001). In the case-control study, among the 49 case-patients with HAEs identified, reported symptoms included conjunctival injection (60%), urticaria (55%), fever (54%), and facial edema (53%); no deaths occurred. The median time interval between vaccination and symptom onset was 42min (range: 5min-24h). We did not identify any differences in the proportion of case-patients and control children with a history of known allergy to food (including egg, egg-containing products or gelatin), drugs, or environmental antigens. Our study highlights the importance of a well-functioning routine AEFI surveillance system linked with mass vaccination campaigns. Such a system in Brazil permitted timely detection of HAEs and validation of a safety signal associated with one vaccine manufacturer. Unlike earlier publications, this outbreak linked to a single manufacturer of MMR showed no association with a prior allergic history to eggs or other foods, including gelatin; subsequent studies implicate the dextran stabilizer in MMR from manufacturer A as the likely cause of HAEs. Copyright © 2012

  17. Acute porphyria in a patient with Arnold Chiari malformation.

    PubMed

    Shen, Jianbin; O'Keefe, Kevin; Webb, Lisa B; DeGirolamo, Angela

    2015-02-20

    Acute porphyria and Arnold Chiari malformation are both uncommon genetic disorders without known association. The insidious onset, non-specific clinical manifestations, and precipitating factors often cause diagnosis of acute porphyria to be missed, particularly in patients with comorbidities. A women with Arnold Chiari malformation type II who was treated with oxybutynin and antibiotics, including Bactrim for neurogenic bladder and recurrent urinary tract infection, presented with non-specific abdominal pain, constipation, and diarrhea. After receiving Flagyl for C. difficile colitis, the patient developed psychosis, ascending paralysis, and metabolic derangements. She underwent extensive neurological workup due to her congenital neurological abnormalities, most of which were unremarkable. As a differential diagnosis of Guillain Barré syndrome, acute porphyria was then considered and ultimately proved to be the diagnosis. After hematin administration and intense rehabilitation, the patient slowly recovered from the full-blown acute porphyria attack. This case report, for the first time, documents acute porphyria attack as a result of a sequential combination of 3 common medications. This is the first case report of the concomitant presence of both acute porphyria and Arnold Chiari malformation, 2 genetic disorders with unclear association.

  18. Association between serum interleukin-35 levels and severity of acute pancreatitis

    PubMed Central

    Zhang, Yi-Li; Zhou, Xiu-Yun; Guo, Xian-Yang; Tu, Jun-Wei

    2015-01-01

    Inflammatory cytokines have been reported to be associated with pathogenesis of acute pancreatitis. The aim of this study was to measure the serum IL-35 levels in patients with acute pancreatitis and analyze the relationship between IL-35 levels and the disease severity. Thirty-two patients with acute pancreatitis and 32 healthy control subjects were included into the study. The serum levels of IL-35 were measured by enzyme-linked immunosorbent assay upon admission and the following seven days. The relationships with severity and etiology during the clinical course were analyzed. Serum IL-35 levels in patients with acute pancreatitis at the time of admission (5.25±0.37 ng/mL) were significantly higher than those in healthy controls (1.93±0.16 ng/mL, P<0.001). Moreover, serum IL-35 levels in patients with severe attacks (7.15±0.48 ng/mL) were significantly higher than those with moderately severe attacks (5.14±0.49 ng/mL, P=0.01) and mild attacks (3.69±0.53 ng/mL, P<0.001). However, there was no significant difference of serum IL-35 levels among patients with acute pancreatitis due of alcohol, gallstone and idiopathy. In addition, the peak serum concentrations of IL-35 were on day 1 after admission. Our results demonstrate that increased serum IL-35 levels may be related to the inflammatory response in patients with acute pancreatitis, suggesting that IL-35 may be used for a potential biomarker of acute pancreatitis. PMID:26221286

  19. De novo Diagnosis of Fabry Disease among Italian Adults with Acute Ischemic Stroke or Transient Ischemic Attack.

    PubMed

    Romani, Ilaria; Borsini, Walter; Nencini, Patrizia; Morrone, Amelia; Ferri, Lorenzo; Frusconi, Sabrina; Donadio, Vincenzo Angelo; Liguori, Rocco; Donati, Maria Alice; Falconi, Serena; Pracucci, Giovanni; Inzitari, Domenico

    2015-11-01

    Cerebrovascular complications are often the first cause of hospitalization in patients with Fabry disease (FD). Screenings for FD among stroke patients have yielded discrepant results, likely as a result of heterogeneous or incomplete assessment. We designed a study to identify FD among adults 60 years of age or younger who were consecutively admitted for acute ischemic stroke or transient ischemic attack (TIA) to a stroke neurology service in Italy. Patients with first-ever or recurrent events were included, irrespective of gender, risk factors, or stroke type. We screened male patients using α-galactosidase A enzyme assay, and female patients using DNA sequencing. FD was eventually established after a broad multidisciplinary discussion. We screened 108 patients (61% males, median age: 48 years); 84% of these patients had stroke. De novo FD diagnosis was established in 3 patients (2.8%; 95% confidence interval, .57-8.18): a 59-year-old man with recurrent lacunar-like strokes and multiple risk factors; a 42-year-old woman with recurrent cryptogenic minor strokes; and a 32-year-old woman with recurrent strokes previously attributed to Behçet's disease. Screened patients were systematically asked for typical FD symptoms; each of the de novo patients reported one or more of the following: episodes of hand/foot pain during fever, angiokeratoma, and family history of heart disease. In all of the patients events were recurrent, and lacunar-like infarcts characterized their brain imaging. Prevalence of FD among nonselected adults 60 years of age or younger with acute ischemic stroke or TIA is not negligible. A systematic search for FD in a stroke setting, using a comprehensive clinical, biochemical, and genetic screening protocol, may be worthwhile. Copyright © 2015 National Stroke Association. Published by Elsevier Inc. All rights reserved.

  20. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  1. [Duration of bronchodilator effect of inhaled Salmeterol (dry powder x metered dose inhaler) in children with acute asthma attack].

    PubMed

    Solé, D; Rizzo, M C; Porto, I M; Gomez, I D; Sano, F; Figueiredo, M A; Naspitz, C K

    1996-01-01

    Patients during a mild to moderate acute attack of asthma (FEV1: 50 - 80% of predicted) were treated with Salmeterol MDI - 50mcg or Rotadisk - 50mcg or Salbutamol (MDI -200mcg). The children were followed by Spirometry, measuring FEV1 (basal) and after treatment: at 30 minutes, 60 minutes and thereafter every 60 minutes until 780 minutes, if the patients maintained the FEV1 above 80% of the predicted value and/or an increment of 20% in the VEF1 basal value. The Salmeterol group showed a significant bronchodilation at 60 minutes which was maintained in half of the patients up to 9 hours. This was not observed in the Salbutamol group: the peak bronchodilatation was observed at 30 minutes and the bronchodilation effect was observed in half of the patients up to 6 hours. There were no significant differences between both presentations of Salmeterol. This drug allowed a prolonged bronchodilator effect and is, according to the several consensus on management of asthma, an adequate option in the treatment of moderate to severe asthma.

  2. Awareness of heart attack and stroke symptoms among Hispanic male adults living in the United States.

    PubMed

    Lutfiyya, May Nawal; Bardales, Ricardo; Bales, Robert; Aguero, Carlos; Brady, Shelly; Tobar, Adriana; McGrath, Cynthia; Zaiser, Julia; Lipsky, Martin S

    2010-10-01

    There is evidence that Hispanic men are a high risk group for treatment delay for both heart attack and stroke. More targeted research is needed to elucidate this specific population's knowledge of warning signs for these acute events. This study sought to describe within-group disparities in Hispanic men's knowledge of heart attack and stroke symptomology. Multivariate techniques were used to analyze a multi-year Behavioral Risk Factor Surveillance Heart and Stroke module database. The data were cross-sectional and focused on health risk factors and behaviors. The research participants were U.S. male Hispanic adults aged 18-99. The main outcome measure for the study was heart attack and stroke symptom knowledge score. Multivariate logistic regression analysis yielded that Hispanic men aged >or=18 years who earned low scores on the composite heart attack and stroke knowledge questions (range 0-8 points) were more likely to: have less than a high school education, have deferred medical care because of cost, not have an identified health care provider, and be uninsured. There were significant within-group differences. Targeting educational efforts toward older (>or=55 years) Hispanic men with less than high school education, those who do not have an identified health care provider or health insurance, and who defer health care because of cost could be ways to improve the outcome of acute vascular events among the U.S. Hispanic adult male population.

  3. Elevated troponin in patients with acute stroke - Is it a true heart attack?

    PubMed

    Dous, George V; Grigos, Angela C; Grodman, Richard

    2017-09-01

    Although the prognostic value of a positive troponin in an acute stroke patient is still uncertain, it is a commonly encountered clinical situation given that Ischemic Heart Disease (IHD) and cerebrovascular disease (CVD) frequently co-exist in the same patient and share similar risk factors. Our objectives in this review are to (1) identify the biologic relationship between acute cerebrovascular stroke and elevated troponin levels, (2) determine the pathophysiologic differences between positive troponin in the setting of acute stroke versus acute myocardial infarction (AMI), and (3) examine whether positive troponin in the setting of acute stroke has prognostic significance. We also will provide an insight analysis of some of the available studies and will provide guidance for a management approach based on the available data according to the current guidelines.

  4. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  5. Gemcitabine-induced gouty arthritis attacks.

    PubMed

    Bottiglieri, Sal; Tierson, Neil; Patel, Raina; Mo, Jae-Hyun; Mehdi, Syed

    2013-09-01

    In this case report, we review the experience of a patient who presented with early stage pancreatic cancer (Stage IIb) who underwent a Whipple procedure and adjuvant chemoradiation. The patient's past medical history included early stage colon cancer in remission, post-traumatic-stress-disorder, hypertension, hyperlipidemia, osteoarthritis, gout, and pre-diabetes. Chemotherapy initially consisted of weekly gemcitabine. The patient developed acute gouty attacks after his second dose of gemcitabine, which brought him to the emergency room for emergent treatment on several occasions. Gemcitabine was held and treatment began with fluorouracil and concurrent radiation. After completion of his chemoradiation with fluorouracil, he was again treated with weekly gemcitabine alone. As soon as the patient started gemcitabine chemotherapy the patient developed gouty arthritis again, requiring discontinuation of chemotherapy. The patient received no additional treatment until his recent recurrence 8 months later where gemcitabine chemotherapy was again introduced with prophylactic medications consisting of allopurinol 100 mg by mouth daily and colchicine 0.6 mg by mouth daily throughout gemcitabine chemotherapy, and no signs of gouty arthritis occurred. To our knowledge, this is the first case report describing gout attacks associated with gemcitabine therapy. There is limited data available describing the mechanism that gouty arthritis may be precipitated from gemcitabine chemotherapy. Further monitoring and management may be required in patients receiving gemcitabine chemotherapy with underlying gout.

  6. Evaluation of avoralstat, an oral kallikrein inhibitor, in a Phase 3 hereditary angioedema prophylaxis trial: the OPUS-2 study.

    PubMed

    Riedl, Marc A; Aygören-Pürsün, Emel; Baker, James; Farkas, Henriette; Anderson, John; Bernstein, Jonathan A; Bouillet, Laurence; Busse, Paula; Manning, Michael; Magerl, Markus; Gompels, Mark; Huissoon, Aarnoud P; Longhurst, Hillary; Lumry, William; Ritchie, Bruce; Shapiro, Ralph; Soteres, Daniel; Banerji, Aleena; Cancian, Mauro; Johnston, Douglas T; Craig, Timothy J; Launay, David; Li, H Henry; Liebhaber, Myron; Nickel, Timothy; Offenberger, Jacob; Rae, William; Schrijvers, Rik; Triggiani, Massimo; Wedner, H James; Dobo, Sylvia; Cornpropst, Melanie; Clemons, Desiree; Fang, Lei; Collis, Phil; Sheridan, William P; Maurer, Marcus

    2018-04-24

    Effective inhibition of plasma kallikrein may have significant benefits for patients with hereditary angioedema due to deficiency of C1 inhibitor (C1-INH-HAE) by reducing the frequency of angioedema attacks. Avoralstat is a small molecule inhibitor of plasma kallikrein. This study (OPuS-2) evaluated the efficacy and safety of prophylactic avoralstat 300 or 500 mg compared with placebo. OPuS-2 was a Phase 3, multicenter, randomized, double-blind, placebo-controlled, parallel-group study. Subjects were administered avoralstat 300 mg, avoralstat 500 mg, or placebo orally 3 times per day for 12 weeks. The primary efficacy endpoint was the angioedema attack rate based on adjudicator-confirmed attacks. A total of 110 subjects were randomized and dosed. The least squares (LS) mean attack rates per week were 0.589, 0.675, and 0.593 for subjects receiving avoralstat 500 mg, avoralstat 300 mg, and placebo, respectively. Overall, 1 subject in each of the avoralstat groups and no subjects in the placebo group were attack-free during the 84-day treatment period. The LS mean duration of all confirmed attacks was 25.4, 29.4 and 31.4 hours for the avoralstat 500 mg, avoralstat 300 mg and placebo groups respectively. Using the Angioedema Quality of Life Questionnaire (AE-QoL), improved QoL was observed for the avoralstat 500 mg group compared with placebo. Avoralstat was generally safe and well tolerated. Although this study did not demonstrate efficacy of avoralstat in preventing angioedema attacks in C1-INH-HAE, it provided evidence of shortened angioedema episodes and improved QoL in the avoralstat 500 mg treatment group compared with placebo. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  7. Efficacy and safety of ticagrelor versus aspirin in acute stroke or transient ischaemic attack of atherosclerotic origin: a subgroup analysis of SOCRATES, a randomised, double-blind, controlled trial.

    PubMed

    Amarenco, Pierre; Albers, Gregory W; Denison, Hans; Easton, J Donald; Evans, Scott R; Held, Peter; Hill, Michael D; Jonasson, Jenny; Kasner, Scott E; Ladenvall, Per; Minematsu, Kazuo; Molina, Carlos A; Wang, Yongjun; Wong, K S Lawrence; Johnston, S Claiborne

    2017-04-01

    Ticagrelor is an effective antiplatelet therapy for patients with coronary atherosclerotic disease and might be more effective than aspirin in preventing recurrent stroke and cardiovascular events in patients with acute cerebral ischaemia of atherosclerotic origin. Our aim was to test for a treatment-by-ipsilateral atherosclerotic stenosis interaction in a subgroup analysis of patients in the Acute Stroke or Transient Ischaemic Attack Treated with Aspirin or Ticagrelor and Patient Outcomes (SOCRATES) trial. SOCRATES was a randomised, double-blind, controlled trial of ticagrelor versus aspirin in patients aged 40 years or older with a non-cardioembolic, non-severe acute ischaemic stroke, or high-risk transient ischaemic attack from 674 hospitals in 33 countries. We randomly allocated patients (1:1) to ticagrelor (180 mg loading dose on day 1 followed by 90 mg twice daily for days 2-90, given orally) or aspirin (300 mg on day 1 followed by 100 mg daily for days 2-90, given orally) within 24 h of symptom onset. Investigators classified all patients into atherosclerotic and non-atherosclerotic groups for the prespecified, exploratory analysis reported in this study. The primary endpoint was the time to occurrence of stroke, myocardial infarction, or death within 90 days. Efficacy analysis was by intention to treat. The SOCRATES trial is registered with ClinicalTrials.gov, number NCT01994720. Between Jan 7, 2014, and Oct 29, 2015, we randomly allocated 13 199 patients (6589 [50%] to ticagrelor and 6610 [50%] to aspirin). Potentially symptomatic ipsilateral atherosclerotic stenosis was reported in 3081 (23%) of 13 199 patients. We found a treatment-by-atherosclerotic stenosis interaction (p=0·017). 103 (6·7%) of 1542 patients with ipsilateral stenosis in the ticagrelor group and 147 (9·6%) of 1539 patients with ipsilateral stenosis in the aspirin group had an occurrence of stroke, myocardial infarction, or death within 90 days (hazard ratio 0·68 [95% CI 0·53-0

  8. Development of a disease-specific quality of life questionnaire for adult patients with hereditary angioedema due to C1 inhibitor deficiency (HAE-QoL): Spanish multi-centre research project.

    PubMed

    Prior, Nieves; Remor, Eduardo; Gómez-Traseira, Carmen; López-Serrano, Concepción; Cabañas, Rosario; Contreras, Javier; Campos, Ángel; Cardona, Victoria; Cimbollek, Stefan; González-Quevedo, Teresa; Guilarte, Mar; de Rojas, Dolores Hernández Fernández; Marcos, Carmen; Rubio, María; Tejedor-Alonso, Miguel Ángel; Caballero, Teresa

    2012-07-20

    There is a need for a disease-specific instrument for assessing health-related quality of life in adults with hereditary angioedema due to C1 inhibitor deficiency, a rare, disabling and life-threatening disease. In this paper we report the protocol for the development and validation of a specific questionnaire, with details on the results of the process of item generation, domain selection, and the expert and patient rating phase. Semi-structured interviews were completed by 45 patients with hereditary angioedema and 8 experts from 8 regions in Spain. A qualitative content analysis of the responses was carried out. Issues raised by respondents were grouped into categories. Content analysis identified 240 different responses, which were grouped into 10 conceptual domains. Sixty- four items were generated. A total of 8 experts and 16 patients assessed the items for clarity, relevance to the disease, and correct dimension assignment. The preliminary version of the specific health-related quality of life questionnaire for hereditary angioedema (HAE-QoL v 1.1) contained 44 items grouped into 9 domains. To the best of our knowledge, this is the first multi-centre research project that aims to develop a specific health-related quality of life questionnaire for adult patients with hereditary angioedema due to C1 inhibitor deficiency. A preliminary version of the specific HAE-QoL questionnaire was obtained. The qualitative analysis of interviews together with the expert and patient rating phase helped to ensure content validity. A pilot study will be performed to assess the psychometric properties of the questionnaire and to decide on the final version.

  9. Dolichoectasia and Small Vessel Disease in Young Patients With Transient Ischemic Attack and Stroke.

    PubMed

    Thijs, Vincent; Grittner, Ulrike; Fazekas, Franz; McCabe, Dominick J H; Giese, Anne-Katrin; Kessler, Christof; Martus, Peter; Norrving, Bo; Ringelstein, Erich Bernd; Schmidt, Reinhold; Tanislav, Christian; Putaala, Jukka; Tatlisumak, Turgut; von Sarnowski, Bettina; Rolfs, Arndt; Enzinger, Christian

    2017-09-01

    We evaluated whether basilar dolichoectasia is associated with markers of cerebral small vessel disease in younger transient ischemic attack and ischemic stroke patients. We used data from the SIFAP1 study (Stroke in Young Fabry Patients), a large prospective, hospital-based, screening study for Fabry disease in young (<55 years) transient ischemic attack/stroke patients in whom detailed clinical data and brain MRI were obtained, and stroke subtyping with TOAST classification (Trial of ORG 10172 in Acute Stroke Treatment) was performed. Dolichoectasia was found in 508 of 3850 (13.2%) of patients. Dolichoectasia was associated with older age (odds ratio per decade, 1.26; 95% confidence interval, 1.09-1.44), male sex (odds ratio, 1.96; 95% confidence interval, 1.59-2.42), and hypertension (odds ratio, 1.39; 95% confidence interval, 1.13-1.70). Dolichoectasia was more common in patients with small infarctions (33.9% versus 29.8% for acute lesions, P =0.065; 29.1% versus 16.5% for old lesions, P <0.001), infarct location in the brain stem (12.4% versus 6.9%, P <0.001), and in white matter (27.8% versus 21.1%, P =0.001). Microbleeds (16.3% versus 4.7%, P =0.001), higher grades of white matter hyperintensities ( P <0.001), and small vessel disease subtype (18.1% versus 12.4%, overall P for differences in TOAST ( P =0.018) were more often present in patients with dolichoectasia. Dolichoectasia is associated with imaging markers of small vessel disease and brain stem localization of acute and old infarcts in younger patients with transient ischemic attack and ischemic stroke. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00414583. © 2017 American Heart Association, Inc.

  10. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    PubMed Central

    Moisan, Frédéric; Gonzalez, Cleotilde

    2017-01-01

    Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557

  11. Seven Deadliest Network Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less

  12. Efficient Replication of the Novel Human Betacoronavirus EMC on Primary Human Epithelium Highlights Its Zoonotic Potential

    PubMed Central

    Kindler, Eveline; Jónsdóttir, Hulda R.; Muth, Doreen; Hamming, Ole J.; Hartmann, Rune; Rodriguez, Regulo; Geffers, Robert; Fouchier, Ron A. M.; Drosten, Christian; Müller, Marcel A.; Dijkman, Ronald; Thiel, Volker

    2013-01-01

    ABSTRACT The recent emergence of a novel human coronavirus (HCoV-EMC) in the Middle East raised considerable concerns, as it is associated with severe acute pneumonia, renal failure, and fatal outcome and thus resembles the clinical presentation of severe acute respiratory syndrome (SARS) observed in 2002 and 2003. Like SARS-CoV, HCoV-EMC is of zoonotic origin and closely related to bat coronaviruses. The human airway epithelium (HAE) represents the entry point and primary target tissue for respiratory viruses and is highly relevant for assessing the zoonotic potential of emerging respiratory viruses, such as HCoV-EMC. Here, we show that pseudostratified HAE cultures derived from different donors are highly permissive to HCoV-EMC infection, and by using reverse transcription (RT)-PCR and RNAseq data, we experimentally determined the identity of seven HCoV-EMC subgenomic mRNAs. Although the HAE cells were readily responsive to type I and type III interferon (IFN), we observed neither a pronounced inflammatory cytokine nor any detectable IFN responses following HCoV-EMC, SARS-CoV, or HCoV-229E infection, suggesting that innate immune evasion mechanisms and putative IFN antagonists of HCoV-EMC are operational in the new host. Importantly, however, we demonstrate that both type I and type III IFN can efficiently reduce HCoV-EMC replication in HAE cultures, providing a possible treatment option in cases of suspected HCoV-EMC infection. PMID:23422412

  13. The time of sunrise and the number of hours with daylight may influence the diurnal rhythm of acute heart attack mortality.

    PubMed

    Kriszbacher, Ildikó; Bódis, József; Boncz, Imre; Koppan, Agnes; Koppan, Miklós

    2010-04-01

    We investigated whether the time of sunrise and the number of daylight hours have an effect on the seasonality, or the daily rhythm of heart attack mortality. We analyzed retrospectively data of patients admitted to hospitals with the diagnosis of heart attack (n=32,329) and patients who deceased of a heart attack (n=5142) between January 1, 2004 and December 31, 2005 in Hungary. Heart attack mortality was highest during winter, while lowest number of events was recorded during summer . The daily peak of diurnality was between 6:00 am and 12:00 pm (33.77%). A positive correlation was found between the time of sunrise, time of sunset and the mortality caused by myocardial infarction (p<0,01). In the analysis of the number of daylight hours and the heart attack mortality we found a negative correlation (r=-0.105, p<0.05). No significant difference was found between sexes and different age-groups in heart attack mortality. Our data suggest, that the occurrence and the mortality of heart attack may be related to the time of sunrise and the number of daylight hours. Copyright 2008 Elsevier Ireland Ltd. All rights reserved.

  14. Heart Attack Recovery FAQs

    MedlinePlus

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  15. Relationship between the exocrine and endocrine pancreas after acute pancreatitis.

    PubMed

    Das, Stephanie L M; Kennedy, James I C; Murphy, Rinki; Phillips, Anthony R J; Windsor, John A; Petrov, Maxim S

    2014-12-07

    To determine the prevalence and time course of pancreatic exocrine insufficiency in individuals with newly diagnosed prediabetes or diabetes mellitus after acute pancreatitis. Relevant literature cited in three major biomedical journal databases (EMBASE, MEDLINE, and Scopus) was reviewed independently by two authors. There were no language constraints but the search was limited to human studies. Studies included were cohort studies of adult patients who were discharged after an attack of acute pancreatitis. Patients were excluded if they were under 18 years of age or had a previous diagnosis of prediabetes or diabetes mellitus, pancreatic exocrine insufficiency, or chronic pancreatitis. The main outcome measure was the prevalence of concomitant pancreatic exocrine insufficiency in patients who were diagnosed with prediabetes and diabetes mellitus after an attack of acute pancreatitis. Subgroup analysis was conducted for patients who were diagnosed with prediabetes only and those who were diagnosed with diabetes mellitus only. Subgroup analysis looking at the time course of concomitant pancreatic exocrine and endocrine insufficiency was also conducted. Pooled prevalence and corresponding 95% confidence intervals were calculated for all outcome measures and P-values < 0.05 were deemed statistically significant. Eight clinical studies comprising of 234 patients met all eligibility criteria. The pooled prevalence of newly diagnosed prediabetes or diabetes in individuals after acute pancreatitis was 43% (95%CI: 30%-56%). The pooled prevalence of pancreatic exocrine insufficiency in individuals after acute pancreatitis was 29% (95%CI: 19%-39%). The prevalence of concomitant pancreatic exocrine insufficiency in individuals with newly diagnosed prediabetes or diabetes was 40% (95%CI: 25%-55%). The prevalence of concomitant pancreatic exocrine insufficiency among individuals with prediabetes alone and diabetes mellitus alone was 41% (95%CI: 12%-75%) and 39% (95%CI: 28

  16. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    PubMed

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented.

  17. [Status of acute upper respiratory infection, influenza-like illness, and influenza vaccination coverage among community residents in Jinan].

    PubMed

    Liu, Ying; Song, Shaoxia; Wang, Wei; Geng, Xingyi; Liu, Wen; Han, Debiao; Liu, Ti; Wu, Julong; Li, Zhong; Wang, Xianjun; Bi, Zhenqiang

    2015-12-01

    To analyze the status of acute upper respiratory infection and influenza-like illness (ILI) among community residents in Jinan in 2015, and to make a understand of the patient's medical treatment behavior and influenza vaccination coverage status in 2014. Balloting method and convenient sampling method were used to launch a household survey. The residents who had been in Jinan for more than 3 months were selected, to investigate the residents' attack ratio of acute upper respiratory and influenza-like from Jan. 8 to Feb. 7, 2015. Totally, 1 300 persons from 410 families were involved in this survey which recovered 1 241 valid questionnaires with the efficiency of 95.5%. Based on the national age-urban demographic statistics in 2010, the attack rates of acute respiratory infections, influenza-like illness were estimated by the direct standardization method, and the influenza vaccination rates were also calculated in this study. χ(2)-test method was used to compare the different status of incidence and vaccination among residents with different features. The attack rate of acute upper respiratory infection and influenza-like illness in Jinan from January 8, 2015 to February 7, 2015 were 30.2% (375 cases), and 6.1% (76 cases), respectively, with a standardized rate of 29.1% and 5.4%. 5.3% (66 cases) of the residents have vaccinated with the influenza vaccine inoculation, with an adjusted rate of 3.8%. The attack rate difference of acute upper respiratory tract infections was statistically significant between each age group (χ(2)=17.121, P= 0.002). The 0-4 age group had a highest attack rate (45.4%) of acute respiratory infection, while the 15-24 age group got the lowest (26.5%). 38.9% (146 cases) of patients went for a treatment in hospital. Among them, 37.7% (55 cases) of them selected the county level hospitals for treatment, 37.7% (55 cases) selected the community level hospitals, and 24.6% (36 cases) selected the individual clinic. Significant differences of

  18. Transient Ischemic Attack

    MedlinePlus Videos and Cool Tools

    Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood ... The only difference between a stroke and TIA is that with TIA the blockage is transient (temporary). ...

  19. The enduring mental health impact of the September 11th terrorist attacks: challenges and lessons learned.

    PubMed

    Ozbay, Fatih; Auf der Heyde, Tanja; Reissman, Dori; Sharma, Vansh

    2013-09-01

    The authors review the existing literature on the mental health impact of the September 11th attacks and the implications for disaster mental health clinicians and policy makers. The authors discuss the demographic characteristics of those affected and the state of mental health needs and existing mental health delivery services; the nature of the disaster and primary impacts on lives, infrastructure, and socioeconomic factors; the acute aftermath in the days and weeks after the attacks; the persistent mental health impact and evolution of services of the postacute aftermath; and the implications for future disaster mental health practitioners and policy makers. Copyright © 2013 Elsevier Inc. All rights reserved.

  20. Acute stress symptoms during the second Lebanon war in a random sample of Israeli citizens.

    PubMed

    Cohen, Miri; Yahav, Rivka

    2008-02-01

    The aims of this study were to assess prevalence of acute stress disorder (ASD) and acute stress symptoms (ASS) in Israel during the second Lebanon war. A telephone survey was conducted in July 2006 of a random sample of 235 residents of northern Israel, who were subjected to missile attacks, and of central Israel, who were not subjected to missile attacks. Results indicate that ASS scores were higher in the northern respondents; 6.8% of the northern sample and 3.9% of the central sample met ASD criteria. Appearance of each symptom ranged from 15.4% for dissociative to 88.4% for reexperiencing, with significant differences between northern and central respondents only for reexperiencing and arousal. A low ASD rate and a moderate difference between areas subjected and not subjected to attack were found.

  1. Cyber-Physical Attacks With Control Objectives

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-08-18

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  2. Cyber-Physical Attacks With Control Objectives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  3. Invisible Trojan-horse attack.

    PubMed

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  4. Effect of noninvasive vagus nerve stimulation on acute migraine: an open-label pilot study.

    PubMed

    Goadsby, P J; Grosberg, B M; Mauskop, A; Cady, R; Simmons, K A

    2014-10-01

    We sought to assess a novel, noninvasive, portable vagal nerve stimulator (nVNS) for acute treatment of migraine. Participants with migraine with or without aura were eligible for an open-label, single-arm, multiple-attack study. Up to four migraine attacks were treated with two 90-second doses, at 15-minute intervals delivered to the right cervical branch of the vagus nerve within a six-week time period. Subjects were asked to self-treat at moderate or severe pain, or after 20 minutes of mild pain. Of 30 enrolled patients (25 females, five males, median age 39), two treated no attacks, and one treated aura only, leaving a Full Analysis Set of 27 treating 80 attacks with pain. An adverse event was reported in 13 patients, notably: neck twitching (n = 1), raspy voice (n = 1) and redness at the device site (n = 1). No unanticipated, serious or severe adverse events were reported. The pain-free rate at two hours was four of 19 (21%) for the first treated attack with a moderate or severe headache at baseline. For all moderate or severe attacks at baseline, the pain-free rate was 12/54 (22%). nVNS may be an effective and well-tolerated acute treatment for migraine in certain patients. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  5. Rofecoxib versus ibuprofen for acute treatment of migraine: a randomised placebo controlled trial

    PubMed Central

    Misra, U; Jose, M; Kalita, J

    2004-01-01

    Background: Rofecoxib is a potent cyclo-oxygenase-2 inhibitor with a long duration of action. Its role in migraine has not been systematically evaluated. Aim: To study the efficacy of rofecoxib in migraine. Method: In a randomised placebo controlled trial rofecoxib 25 mg, ibuprofen 400 mg, and placebo were compared regarding their efficacy in relieving acute migraine attack. Migraine patients with 2–6 attacks per month were recruited. Headache severity, functional disability, and severity of associated symptoms were graded on a 0–3 scale. The primary endpoint was pain relief at two hours. Relief of associated symptoms and sustained pain relief for 24 hours were also noted. Result: One hundred and twenty four patients were randomised into rofecoxib (42), ibuprofen (40), and placebo (42) groups. One hundred and one patients were followed up: 33 on rofecoxib, 35 ibuprofen, and 33 placebo. Patients' ages ranged from 16–62 (mean 31.4) years, and 83 were females. Pain relief at two hours was noted in 45.5% on rofecoxib, 55.6% on ibuprofen, and 9.1% in the placebo group. The associated symptoms at two hours were reduced in 39.4% on rofecoxib, 50% on ibuprofen, and 9.1% in the placebo group. Sustained 24 hour pain relief was noted in 36.4% on rofecoxib, 41% on ibuprofen, and 6.1% in the placebo group. In the ibuprofen group, five patients had abdominal pain but there were no side effects in those on rofecoxib or in the control group. Both rofecoxib and ibuprofen were significantly effective in relieving pain, associated symptoms at two hours, and in sustained pain relief. There was no significant difference between rofecoxib and ibuprofen in aborting acute migraine attacks. Conclusions: Both ibuprofen and rofecoxib were superior to placebo in aborting an acute migraine attack, and there was no significant difference in their efficacy in an acute migraine attack. PMID:15579612

  6. Does acute maternal stress in pregnancy affect infant health outcomes? Examination of a large cohort of infants born after the terrorist attacks of September 11, 2001

    PubMed Central

    Endara, Skye M; Ryan, Margaret AK; Sevick, Carter J; Conlin, Ava Marie S; Macera, Caroline A; Smith, Tyler C

    2009-01-01

    Background Infants in utero during the terrorist attacks of September 11, 2001 may have been negatively affected by maternal stress. Studies to date have produced contradictory results. Methods Data for this retrospective cohort study were obtained from the Department of Defense Birth and Infant Health Registry and included up to 164,743 infants born to active-duty military families. Infants were considered exposed if they were in utero on September 11, 2001, while the referent group included infants gestating in the same period in the preceding and following year (2000 and 2002). We investigated the association of this acute stress during pregnancy with the infant health outcomes of male:female sex ratio, birth defects, preterm birth, and growth deficiencies in utero and in infancy. Results No difference in sex ratio was observed between infants in utero in the first trimester of pregnancy on September 11, 2001 and infants in the referent population. Examination of the relationship between first-trimester exposure and birth defects also revealed no significant associations. In adjusted multivariable models, neither preterm birth nor growth deficiencies were significantly associated with the maternal exposure to the stress of September 11 during pregnancy. Conclusion The findings from this large population-based study suggest that women who were pregnant during the terrorist attacks of September 11, 2001 had no increased risk of adverse infant health outcomes. PMID:19619310

  7. Does acute maternal stress in pregnancy affect infant health outcomes? Examination of a large cohort of infants born after the terrorist attacks of September 11, 2001.

    PubMed

    Endara, Skye M; Ryan, Margaret A K; Sevick, Carter J; Conlin, Ava Marie S; Macera, Caroline A; Smith, Tyler C

    2009-07-20

    Infants in utero during the terrorist attacks of September 11, 2001 may have been negatively affected by maternal stress. Studies to date have produced contradictory results. Data for this retrospective cohort study were obtained from the Department of Defense Birth and Infant Health Registry and included up to 164,743 infants born to active-duty military families. Infants were considered exposed if they were in utero on September 11, 2001, while the referent group included infants gestating in the same period in the preceding and following year (2000 and 2002). We investigated the association of this acute stress during pregnancy with the infant health outcomes of male:female sex ratio, birth defects, preterm birth, and growth deficiencies in utero and in infancy. No difference in sex ratio was observed between infants in utero in the first trimester of pregnancy on September 11, 2001 and infants in the referent population. Examination of the relationship between first-trimester exposure and birth defects also revealed no significant associations. In adjusted multivariable models, neither preterm birth nor growth deficiencies were significantly associated with the maternal exposure to the stress of September 11 during pregnancy. The findings from this large population-based study suggest that women who were pregnant during the terrorist attacks of September 11, 2001 had no increased risk of adverse infant health outcomes.

  8. Factors That Affect Disease Progression After First Attack of Acute Pancreatitis.

    PubMed

    Bertilsson, Sara; Swärd, Per; Kalaitzakis, Evangelos

    2015-09-01

    Little is known about recurrence of pancreatitis after an initial episode, and little is known about how the disease progresses or what factors affect progression. We performed a population-based study of patients with acute pancreatitis (AP) to determine their outcomes and associated factors. We performed a retrospective study of patients with first-time AP from 2003 through 2012 in a well-defined area of Sweden. Data were collected from medical records on disease etiology, severity (according to the Atlanta classification), recurrence of AP, subsequent chronic pancreatitis, and mortality. Patients were followed up for a median time of 4.6 years, until death or the end of 2013. We identified 1457 patients with first-time AP (48% biliary disease, 17% alcohol-associated, 9.9% severe); 23% of patients had 1 or more recurrences. Risk for recurrence was significantly higher among smokers (hazard ratio [HR], 1.42; 95% confidence interval [CI], 1.03-1.95; P = .03), patients with alcohol-associated AP (HR, 1.58; 95% CI, 1.25-2.23; P < .01), after organ failure (HR, 1.46; 95% CI 1.05-2.03; P = .02), and in patients with systemic complications (HR, 1.88; 95% CI, 1.27-2.79; P < .01) or local complications (HR, 1.66; 95% CI, 1.22-2.27; P < .01). AP of all etiologies progressed to chronic pancreatitis, although alcohol-associated AP progressed most frequently (2.8/100 patient-years). Patients with recurrent AP were at the highest risk for chronic pancreatitis (HR, 6.74; 95% CI, 4.02-11.3; P < .01), followed by alcohol-associated AP (HR, 3.10; 95% CI, 2.05-5.87; P < .01), smoking (HR, 2.26; 95% CI, 1.12-4.58; P = .02), systemic complications (HR, 1.37; 95% CI, 1.06-4.62; P = .03), and peripancreatic necrosis (HR, 2.74; 95% CI, 1.7-4.43; P < .01). In-hospital mortality was 2.8%, and independently associated only with organ failure (odds ratio, 71.17; 95% CI, 21.14-239.60; P < .01). Fifty-three percent of patients who died during disease recurrence had biliary AP; a higher

  9. Correlated Attack Modeling (CAM)

    DTIC Science & Technology

    2003-10-01

    describing attack models to a scenario recognition engine, a prototype of such an engine was developed, using components of the EMERALD intrusion...content. Results – The attacker gains information enabling remote access to database (i.e., privileged login information, database layout to allow...engine that uses attack specifications written in CAML. The implementation integrates two advanced technologies devel- oped in the EMERALD program [27, 31

  10. Valsartan-induced acute pancreatitis.

    PubMed

    Can, Burak; Sali, Mursel; Batman, Adnan; Yilmaz, Hasan; Korkmaz, Ugur; Celebi, Altay; Senturk, Omer; Hulagu, Sadettin

    2014-01-01

    Gastrointestinal toxicity is uncommon among patients treated with angiotensin II receptor antagonists. A 58-year-old man presented with nausea, vomiting and constant pain in the epigastrium that radiated to the flanks. He received treatment with valsartan (160 mg daily) for hypertension. The clinical, biochemical and radiological findings were compatible with a diagnosis of acute pancreatitis. After the patient achieved a clinical and biochemical recovery, the valsartan therapy was started again. Six weeks later, he returned to the hospital with an attack of pancreatitis. Subsequently, he returned with repeated attacks of pancreatitis twice, and the valsartan was discontinued. Ten months after the treatment, the patient had no complaints. When severe abdominal symptoms occur for no apparent reason during treatment with valsartan, a diagnosis of pancreatitis should be considered.

  11. Blind Data Attack on BGP Routers

    DTIC Science & Technology

    2017-03-01

    implement blind attack protection, leaving long -standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This...protection measures should a discovered vulnerability reduce attack complexity. 14. SUBJECT TERMS BGP, TCP, blind attack, blind data attack 15. NUMBER OF...implementations may not properly implement blind attack protection, leaving long -standing connections, such as BorderGateway Protocol (BGP) sessions

  12. Alligator attacks in southwest Florida.

    PubMed

    Harding, Brett E; Wolf, Barbara C

    2006-05-01

    The American alligator inhabits bodies of fresh water in Florida and other southeastern states. Although attacks on pets are frequent, alligator attacks on humans are relatively rare because of the animal's natural fear of man. Because of the rarity of attacks on humans, the pathologic findings and pathophysiology of death in such cases have not been well characterized in the literature. We report three cases of fatal alligator attacks that occurred in southwest Florida, each with different pathologic findings and mechanisms of death. Although the cause of death in each case was attributed to the alligator attack, the mechanisms of death differed and included exsanguination because of amputation of an extremity, overwhelming sepsis, and drowning. These cases illustrate the varied pathophysiologies associated with deaths due to alligator attacks on humans and the features that distinguish alligator bites from those of other aquatic predators.

  13. Relationship between the exocrine and endocrine pancreas after acute pancreatitis

    PubMed Central

    Das, Stephanie L M; Kennedy, James I C; Murphy, Rinki; Phillips, Anthony R J; Windsor, John A; Petrov, Maxim S

    2014-01-01

    AIM: To determine the prevalence and time course of pancreatic exocrine insufficiency in individuals with newly diagnosed prediabetes or diabetes mellitus after acute pancreatitis. METHODS: Relevant literature cited in three major biomedical journal databases (EMBASE, MEDLINE, and Scopus) was reviewed independently by two authors. There were no language constraints but the search was limited to human studies. Studies included were cohort studies of adult patients who were discharged after an attack of acute pancreatitis. Patients were excluded if they were under 18 years of age or had a previous diagnosis of prediabetes or diabetes mellitus, pancreatic exocrine insufficiency, or chronic pancreatitis. The main outcome measure was the prevalence of concomitant pancreatic exocrine insufficiency in patients who were diagnosed with prediabetes and diabetes mellitus after an attack of acute pancreatitis. Subgroup analysis was conducted for patients who were diagnosed with prediabetes only and those who were diagnosed with diabetes mellitus only. Subgroup analysis looking at the time course of concomitant pancreatic exocrine and endocrine insufficiency was also conducted. Pooled prevalence and corresponding 95% confidence intervals were calculated for all outcome measures and P-values < 0.05 were deemed statistically significant. RESULTS: Eight clinical studies comprising of 234 patients met all eligibility criteria. The pooled prevalence of newly diagnosed prediabetes or diabetes in individuals after acute pancreatitis was 43% (95%CI: 30%-56%). The pooled prevalence of pancreatic exocrine insufficiency in individuals after acute pancreatitis was 29% (95%CI: 19%-39%). The prevalence of concomitant pancreatic exocrine insufficiency in individuals with newly diagnosed prediabetes or diabetes was 40% (95%CI: 25%-55%). The prevalence of concomitant pancreatic exocrine insufficiency among individuals with prediabetes alone and diabetes mellitus alone was 41% (95%CI: 12

  14. What is new HLA-B27 acute anterior uveitis?

    PubMed

    Wakefield, Denis; Chang, John H; Amjadi, Shahriar; Maconochie, Zoe; Abu El-Asrar, Ahmed; McCluskey, Peter

    2011-04-01

    Acute anterior uveitis (AAU) is the most common form of uveitis, accounting for approximately 90% of all cases. Half of all cases of AAU are HLA-B27 positive. The disease is typically acute in onset, unilateral, nongranulomatous inflammation involving the iris and ciliary body, with a tendency to recurrent attacks. Approximately 50% of all patients with HLA-B27 AAU develop an associated seronegative arthritis (SNA), while approximately 25% of the patients initially diagnosed with HLA-B27 SNA develop AAU. Environmental factors play a critical role in the pathogenesis of AAU; in particular, bacterial triggers have been strongly implicated in the development of this disease. Topical corticosteroids and cycloplegic agents remain the cornerstones of treatment for AAU. Salazopirine and methotrexate are effective in decreasing recurrent attacks. Biological agents such as anti-TNF and anti-CD20 therapy may be effective in refractory severe AU but are rarely required.

  15. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  16. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  17. Long working hours and occupational stress-related cardiovascular attacks among middle-aged workers in Japan.

    PubMed

    Uehata, T

    1991-12-01

    Two hundred and three Karoshi victims who suffered cardiovascular attacks and for whom workers' compensations was claimed were surveyed. These cases were 196 males and 7 females in middle age, and comprised 123 strokes, 50 acute cardiac failures, 27 myocardial infarctions and 4 aortic ruptures. As a sociomedical background, it was shown that two-thirds of them were working for long hours such as more than 60 hr per week, more than 50 hr overtime per month, or more than half of their fixed holidays before the attack. Moreover, among the white-collar workers, these long working hours were accompanied with other stressful work issues such as career problems, excessive business trips, strident norms, and changes of work places; among the blue-collar workers, they were accompanied with those such as irregular midnight work, insufficient manpower and long-distance driving, etc. On the other hand, eighty-eight cases of them experienced several minor and sudden events including work-related emotional anxiety or excitement, rapid increase of workload, unexpected work trouble or environmental changes of work places anticipated at least within 24 hr directly before the attack. It was concluded that Karoshi, meaning fatal attacks by overload, was one of the work-related diseases mainly triggered by long working hours.

  18. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    NASA Astrophysics Data System (ADS)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  19. Immunomodulatory Effects of Balneotherapy with Hae-Un-Dae Thermal Water on Imiquimod-Induced Psoriasis-Like Murine Model

    PubMed Central

    Lee, Young Bok; Lee, Jun Young; Lee, Hye Jin; Yun, Seong Taek; Lee, Jong Tae; Kim, Hong Jig; Yu, Dong Soo

    2014-01-01

    Background Balneotherapy, although not a well-established dermatological treatment, is thought to have therapeutic properties for psoriasis and is used as an alternative treatment modality throughout the world. Objective To evaluate the mechanism underlying the therapeutic immunologic effects of thermomineral water. Methods A murine model of imiquimod-induced psoriasis-like skin inflammation was used for evaluating the therapeutic effects of balneotherapy with Hae-Un-Dae hot spring mineral water. The clinical improvements were evaluated by a dermatologist. Lesional cytokines, including interleukin (IL)-17A, IL-23, and IL-22, were quantitatively measured by real-time reverse transcriptase polymerase chain reaction. Serum levels of interferon-γ, IL-4, IL-5, and IL-17A were measured by enzyme-linked immunosorbent assay. T cell proportions in the spleen were evaluated by flow cytometry, and histopathological evaluation of the skin was also performed. Results The mineral water balneotherapy group showed faster improvement in skin erythema and scales than the distilled water bathing group. A substantial reduction was observed in the lesional mRNA levels of IL-17A and IL-23 in the mineral water group. Serum levels of IL-4 and IL-5 were significantly decreased in the mineral water group but not in the distilled water group. Normalized T cell proportions were observed after bathing. Conclusion Balneotherapy showed immunomodulatory effects in a psoriasis-like murine model. Balneotherapy suppressed lesional IL-23 and IL-17A, which are important cytokines in the pathogenesis of psoriasis. These results suggest that balneotherapy can be used as an effective and safe treatment for psoriasis. PMID:24882978

  20. Immunomodulatory effects of balneotherapy with hae-un-dae thermal water on imiquimod-induced psoriasis-like murine model.

    PubMed

    Lee, Young Bok; Lee, Jun Young; Lee, Hye Jin; Yun, Seong Taek; Lee, Jong Tae; Kim, Hong Jig; Yu, Dong Soo; Woo, So Youn; Kim, Jin-Wou

    2014-04-01

    Balneotherapy, although not a well-established dermatological treatment, is thought to have therapeutic properties for psoriasis and is used as an alternative treatment modality throughout the world. To evaluate the mechanism underlying the therapeutic immunologic effects of thermomineral water. A murine model of imiquimod-induced psoriasis-like skin inflammation was used for evaluating the therapeutic effects of balneotherapy with Hae-Un-Dae hot spring mineral water. The clinical improvements were evaluated by a dermatologist. Lesional cytokines, including interleukin (IL)-17A, IL-23, and IL-22, were quantitatively measured by real-time reverse transcriptase polymerase chain reaction. Serum levels of interferon-γ, IL-4, IL-5, and IL-17A were measured by enzyme-linked immunosorbent assay. T cell proportions in the spleen were evaluated by flow cytometry, and histopathological evaluation of the skin was also performed. The mineral water balneotherapy group showed faster improvement in skin erythema and scales than the distilled water bathing group. A substantial reduction was observed in the lesional mRNA levels of IL-17A and IL-23 in the mineral water group. Serum levels of IL-4 and IL-5 were significantly decreased in the mineral water group but not in the distilled water group. Normalized T cell proportions were observed after bathing. Balneotherapy showed immunomodulatory effects in a psoriasis-like murine model. Balneotherapy suppressed lesional IL-23 and IL-17A, which are important cytokines in the pathogenesis of psoriasis. These results suggest that balneotherapy can be used as an effective and safe treatment for psoriasis.

  1. Pericarditis - after heart attack

    MedlinePlus

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  2. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackerman, G; Blair, C; Bale, J

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a projectmore » sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report

  3. WILD PIG ATTACKS ON HUMANS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mayer, J.

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animalsmore » were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.« less

  4. Prevention of Hereditary Angioedema Attacks with a Subcutaneous C1 Inhibitor.

    PubMed

    Longhurst, Hilary; Cicardi, Marco; Craig, Timothy; Bork, Konrad; Grattan, Clive; Baker, James; Li, Huamin H; Reshef, Avner; Bonner, James; Bernstein, Jonathan A; Anderson, John; Lumry, William R; Farkas, Henriette; Katelaris, Constance H; Sussman, Gordon L; Jacobs, Joshua; Riedl, Marc; Manning, Michael E; Hebert, Jacques; Keith, Paul K; Kivity, Shmuel; Neri, Sergio; Levy, Donald S; Baeza, Maria L; Nathan, Robert; Schwartz, Lawrence B; Caballero, Teresa; Yang, William; Crisan, Ioana; Hernandez, María D; Hussain, Iftikhar; Tarzi, Michael; Ritchie, Bruce; Králíčková, Pavlina; Guilarte, Mar; Rehman, Syed M; Banerji, Aleena; Gower, Richard G; Bensen-Kennedy, Debra; Edelman, Jonathan; Feuersenger, Henrike; Lawo, John-Philip; Machnig, Thomas; Pawaskar, Dipti; Pragst, Ingo; Zuraw, Bruce L

    2017-03-23

    group. Adverse events (most commonly mild and transient local site reactions) occurred in similar proportions of patients who received CSL830 and those who received placebo. In patients with hereditary angioedema, the prophylactic use of a subcutaneous C1 inhibitor twice weekly significantly reduced the frequency of acute attacks. (Funded by CSL Behring; COMPACT EudraCT number, 2013-000916-10 , and ClinicalTrials.gov number, NCT01912456 .).

  5. Web Forms and Untraceable DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  6. Heart Attack - Multiple Languages

    MedlinePlus

    ... Heart Attack - العربية (Arabic) Bilingual PDF Health Information Translations Bosnian (bosanski) Expand Section Heart Attack - bosanski (Bosnian) Bilingual PDF Health Information Translations Chinese, Simplified (Mandarin dialect) (简体中文) Expand Section Heart ...

  7. Suicide Bombing Attacks

    PubMed Central

    Almogy, Gidon; Belzberg, Howard; Mintz, Yoaz; Pikarsky, Alon K.; Zamir, Gideon; Rivkind, Avraham I.

    2004-01-01

    Objective: To review the experience of a large-volume trauma center in managing and treating casualties of suicide bombing attacks. Summary Background Data: The threat of suicide bombing attacks has escalated worldwide. The ability of the suicide bomber to deliver a relatively large explosive load accompanied by heavy shrapnel to the proximity of his or her victims has caused devastating effects. Methods: The authors reviewed and analyzed the experience obtained in treating victims of suicide bombings at the level I trauma center of the Hadassah University Hospital in Jerusalem, Israel from 2000 to 2003. Results: Evacuation is usually rapid due to the urban setting of these attacks. Numerous casualties are brought into the emergency department over a short period. The setting in which the device is detonated has implications on the type of injuries sustained by survivors. The injuries sustained by victims of suicide bombing attacks in semi-confined spaces are characterized by the degree and extent of widespread tissue damage and include multiple penetrating wounds of varying severity and location, blast injury, and burns. Conclusions: The approach to victims of suicide bombings is based on the guidelines for trauma management. Attention is given to the moderately injured, as these patients may harbor immediate life-threatening injuries. The concept of damage control can be modified to include rapid packing of multiple soft-tissue entry sites. Optimal utilization of manpower and resources is achieved by recruiting all available personnel, adopting a predetermined plan, and a centrally coordinated approach. Suicide bombing attacks seriously challenge the most experienced medical facilities. PMID:15075644

  8. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  9. Predicting Factors of Zone 4 Attack in Volleyball.

    PubMed

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  10. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    PubMed

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  11. Securing internet by eliminating DDOS attacks

    NASA Astrophysics Data System (ADS)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  12. Clopidogrel With Aspirin in Acute Minor Stroke or Transient Ischemic Attack (CHANCE) Trial: One-Year Outcomes.

    PubMed

    Wang, Yilong; Pan, Yuesong; Zhao, Xingquan; Li, Hao; Wang, David; Johnston, S Claiborne; Liu, Liping; Meng, Xia; Wang, Anxin; Wang, Chunxue; Wang, Yongjun

    2015-07-07

    The Clopidogrel in High-risk patients with Acute Non-disabling Cerebrovascular Events (CHANCE) trial showed that the combined treatment of clopidogrel and aspirin decreases the 90-day risk of stroke without increasing hemorrhage in comparison with aspirin alone, but provided insufficient data to establish whether the benefit persisted over a longer period of time beyond the trial termination. We report the 1-year follow-up outcomes of this trial. The trial was a randomized, double-blind, placebo-controlled trial conducted at 114 centers in China. We randomly assigned 5170 patients within 24 hours after onset of minor stroke or high-risk transient ischemic attack to clopidogrel-aspirin therapy (loading dose of 300 mg of clopidogrel on day 1, followed by 75 mg of clopidogrel per day for 90 days, plus 75 mg of aspirin per day for the first 21 days) or to the aspirin-alone group (75 mg/d for 90 days). The primary outcome was stroke event (ischemic or hemorrhagic) during 1-year follow-up. Differences in outcomes between groups were assessed by using the Cox proportional hazards model. Stroke occurred in 275 (10.6%) patients in the clopidogrel-aspirin group, in comparison with 362 (14.0%) patients in the aspirin group (hazard ratio, 0.78; 95% confidence interval, 0.65-0.93; P=0.006). Moderate or severe hemorrhage occurred in 7 (0.3%) patients in the clopidogrel-aspirin group and in 9 (0.4%) patients in the aspirin group (P=0.44). The early benefit of clopidogrel-aspirin treatment in reducing the risk of subsequent stroke persisted for the duration of 1-year of follow-up. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00979589. © 2015 American Heart Association, Inc.

  13. Improving the Rainbow Attack by Reusing Colours

    NASA Astrophysics Data System (ADS)

    Ågren, Martin; Johansson, Thomas; Hell, Martin

    Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.

  14. Identifying Electromagnetic Attacks against Airports

    NASA Astrophysics Data System (ADS)

    Kreth, A.; Genender, E.; Doering, O.; Garbe, H.

    2012-05-01

    This work presents a new and sophisticated approach to detect and locate the origin of electromagnetic attacks. At the example of an airport, a normal electromagnetic environment is defined, in which electromagnetic attacks shall be identified. After a brief consideration of the capabilities of high power electromagnetic sources to produce high field strength values, this contribution finally presents the approach of a sensor network, realizing the identification of electromagnetic attacks.

  15. Validation of the harmless acute pancreatitis score in predicting nonsevere course of acute pancreatitis.

    PubMed

    Oskarsson, V; Mehrabi, M; Orsini, N; Hammarqvist, F; Segersvärd, R; Andrén-Sandberg, A; Sadr Azodi, O

    2011-01-01

    The Harmless Acute Pancreatitis Score (HAPS) is a scoring algorithm to identify patients with nonsevere acute pancreatitis. The aim of this study was to evaluate the reproducibility of HAPS outside its original study setting. Baseline information of all hospitalized patients with acute pancreatitis at Karolinska University Hospital, Stockholm, Sweden, between 2004 and 2009 was collected. The parameters constituting HAPS were signs of peritonitis, hematocrit and serum creatinine levels. Since hematocrit was not available in all patients, complete sample analysis was performed by replacing hematocrit with hemoglobin (strongly correlated with hematocrit; r = 0.86). In total, 531 patients with a first-time or a recurrent attack of acute pancreatitis were included. Among 353 patients with complete information on parameters constituting HAPS, 79 patients were predicted to have a nonsevere course, of whom 1 patient developed severe acute pancreatitis. The specificity of HAPS in predicting a nonsevere course of acute pancreatitis was 96.3% (95% CI: 81.0-99.9) with a corresponding positive predictive value of 98.7% (95% CI: 93.1-100). Complete sample analysis replacing hematocrit with hemoglobin level predicted a nonsevere course in 182 patients, of whom 2 patients had severe acute pancreatitis (94.3% specificity and 98.9% positive predictive value). HAPS is a highly specific scoring algorithm that predicts a nonsevere course of acute pancreatitis. Therefore, HAPS might be an additional tool in the clinical assessment of acute pancreatitis where early screening is important to treat the patients at an optimal level of care. Copyright © 2011 S. Karger AG, Basel.

  16. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  17. Hybrid attacks on model-based social recommender systems

    NASA Astrophysics Data System (ADS)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  18. Do Unexpected Panic Attacks Occur Spontaneously?

    PubMed Central

    Meuret, Alicia E.; Rosenfield, David; Wilhelm, Frank H.; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T.

    2012-01-01

    Background Spontaneous or unexpected panic attacks, per definition, occur out-of-the blue, in absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of or during the attack, but not preceding it. To test this hypothesisweexaminedif points of significant autonomic changes preceded the onset of spontaneous panic attacks. Methods Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen naturally panic attacks were recorded during 1,960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before, and continuing to 10 minutes after, the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization, and compared to time matched control periods within the same person. Results Significant patterns of instability across a numberof autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes prior to onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt PCO2 increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in PCO2. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before and duringthe attacks. Changes in the matched control periods were largely absent. Conclusions Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction betweenuncuedand cued panic attacks. PMID:21783179

  19. Clinical characteristics of acute encephalopathy with acute brain swelling: A peculiar type of acute encephalopathy.

    PubMed

    Nukui, Megumi; Kawawaki, Hisashi; Inoue, Takeshi; Kuki, Ichiro; Okazaki, Shin; Amo, Kiyoko; Togawa, Masao; Ishikawa, Junichi; Rinka, Hiroshi; Shiomi, Masashi

    2018-06-07

    Acute encephalopathy has been observed with acute brain swelling (ABS) that is characterized by rapid progression to whole-brain swelling. The objective of this study was to describe the clinical characteristics of ABS. We encountered four patients with ABS and retrospectively investigated their clinical data with a medical chart review. Three patients had seizure clustering or status epilepticus in the clinical course. Signs of elevated intracranial pressure (ICP) appeared 3-9 h after the first convulsive attack in three patients. In all patients, signs of brainstem involvement appeared 1-8 h after signs of elevated ICP. Mild hyponatremia that progressed after signs of elevated ICP appeared was noted in three patients. Brain CT revealed mild brain swelling in the initial phase, which rapidly progressed to whole-brain swelling. No focal abnormalities were detected on brain MRI in one patient. Continuous electroencephalography was initially normal, but in two patients, high-amplitude slow waves appeared with rapid changes before signs of brainstem involvement. Although recovery was achieved without sequelae in two patients, outcome was fatal for the other two. The pathogenesis of ABS has yet to be clarified, but clinical features in our patients are not consistent with any established subtypes of acute encephalopathy. Therefore, we believe that ABS should be recognized as a new type of acute encephalopathy. Copyright © 2018 The Japanese Society of Child Neurology. Published by Elsevier B.V. All rights reserved.

  20. On Patarin's Attack against the lIC Scheme

    NASA Astrophysics Data System (ADS)

    Ogura, Naoki; Uchiyama, Shigenori

    In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.

  1. Characterization of recombinant human C1 inhibitor secreted in milk of transgenic rabbits.

    PubMed

    van Veen, Harrie A; Koiter, Jaco; Vogelezang, Carla J M; van Wessel, Noucha; van Dam, Tijtje; Velterop, Ingeborg; van Houdt, Kristina; Kupers, Luc; Horbach, Danielle; Salaheddine, Mourad; Nuijens, Jan H; Mannesse, Maurice L M

    2012-12-31

    C1 inhibitor (C1INH) is a single-chain glycoprotein that inhibits activation of the contact system of coagulation and the complement system. C1INH isolated from human blood plasma (pd-hC1INH) is used for the management of hereditary angioedema (HAE), a disease caused by heterozygous deficiency of C1INH, and is a promise for treatment of ischemia-reperfusion injuries like acute myocardial or cerebral infarction. To obtain large quantities of C1INH, recombinant human C1INH (rhC1INH) was expressed in the milk of transgenic rabbits (12 g/l) harboring genomic human C1INH sequences fused to 5' bovine αS(1) casein promoter sequences. Recombinant hC1INH was isolated from milk to a specific activity of 6.1 U/mg and a purity of 99%; by size-exclusion chromatography the 1% impurities consisted of multimers and N-terminal cleaved C1INH species. Mass spectrometric analysis of purified rhC1INH revealed a relative molecular mass (M(r)) of 67,200. Differences in M(r) on SDS PAGE and mass spectrometric analysis between rhC1INH and pd-hC1INH are explained by differential glycosylation (calculated carbohydrate contents of 21% and 28%, respectively), since protein sequencing analysis of rhC1INH revealed intact N- and C-termini. Host-related impurity analysis by ELISA revealed trace amounts of rabbit protein (approximately 10 ppm) in purified batches, but not endogenous rabbit C1INH. The kinetics of inhibition of the target proteases C1s, Factor XIIa, kallikrein and Factor XIa by rhC1INH and pd-hC1INH, indicated comparable inhibitory potency and specificity. Recently, rhC1INH (Ruconest(®)) has been approved by the European Medicines Agency for the treatment of acute attacks of HAE. Copyright © 2012 Elsevier B.V. All rights reserved.

  2. Stress Hyperglycemia and Prognosis of Minor Ischemic Stroke and Transient Ischemic Attack: The CHANCE Study (Clopidogrel in High-Risk Patients With Acute Nondisabling Cerebrovascular Events).

    PubMed

    Pan, Yuesong; Cai, Xueli; Jing, Jing; Meng, Xia; Li, Hao; Wang, Yongjun; Zhao, Xingquan; Liu, Liping; Wang, David; Johnston, S Claiborne; Wei, Tiemin; Wang, Yilong

    2017-11-01

    We aimed to determine the association between stress hyperglycemia and risk of new stroke in patients with a minor ischemic stroke or transient ischemic attack. A subgroup of 3026 consecutive patients from 73 prespecified sites of the CHANCE trial (Clopidogrel in High-Risk Patients With Acute Nondisabling Cerebrovascular Events) were analyzed. Stress hyperglycemia was measured by glucose/glycated albumin (GA) ratio. Glucose/GA ratio was calculated by fasting plasma glucose divided by GA and categorized into 4 even groups according to the quartiles. The primary outcome was a new stroke (ischemic or hemorrhagic) at 90 days. We assessed the association between glucose/GA ratio and risk of stroke by multivariable Cox regression models adjusted for potential covariates. Among 3026 patients included, a total of 299 (9.9%) new stroke occurred at 3 months. Compared with patients with the lowest quartile, patients with the highest quartile of glucose/GA ratio was associated with an increased risk of stroke at 3 months after adjusted for potential covariates (12.0% versus 9.2%; adjusted hazard ratio, 1.46; 95% confidence interval, 1.06-2.01). Similar results were observed after further adjusted for fasting plasma glucose. We also observed that higher level of glucose/GA ratio was associated with an increased risk of stroke with a threshold of 0.29 using a Cox regression model with restricted cubic spline. Stress hyperglycemia, measured by glucose/GA ratio, was associated with an increased risk of stroke in patients with a minor ischemic stroke or transient ischemic attack. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00979589. © 2017 American Heart Association, Inc.

  3. Attacks on public telephone networks: technologies and challenges

    NASA Astrophysics Data System (ADS)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  4. Management of Acute and Recurrent Gout: A Clinical Practice Guideline From the American College of Physicians.

    PubMed

    Qaseem, Amir; Harris, Russell P; Forciea, Mary Ann

    2017-01-03

    The American College of Physicians (ACP) developed this guideline to present the evidence and provide clinical recommendations on the management of gout. Using the ACP grading system, the committee based these recommendations on a systematic review of randomized, controlled trials; systematic reviews; and large observational studies published between January 2010 and March 2016. Clinical outcomes evaluated included pain, joint swelling and tenderness, activities of daily living, patient global assessment, recurrence, intermediate outcomes of serum urate levels, and harms. The target audience for this guideline includes all clinicians, and the target patient population includes adults with acute or recurrent gout. ACP recommends that clinicians choose corticosteroids, nonsteroidal anti-inflammatory drugs (NSAIDs), or colchicine to treat patients with acute gout. (Grade: strong recommendation, high-quality evidence). ACP recommends that clinicians use low-dose colchicine when using colchicine to treat acute gout. (Grade: strong recommendation, moderate-quality evidence). ACP recommends against initiating long-term urate-lowering therapy in most patients after a first gout attack or in patients with infrequent attacks. (Grade: strong recommendation, moderate-quality evidence). ACP recommends that clinicians discuss benefits, harms, costs, and individual preferences with patients before initiating urate-lowering therapy, including concomitant prophylaxis, in patients with recurrent gout attacks. (Grade: strong recommendation, moderate-quality evidence).

  5. Cued Panic Attacks in Body Dysmorphic Disorder

    PubMed Central

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  6. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  7. Thrombolytic drugs for heart attack

    MedlinePlus

    ... gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... supply blood and oxygen to the heart. A heart attack can occur if a blood clot stops the ...

  8. Heart Attack Coronary Artery Disease

    MedlinePlus

    ... our e-newsletter! Aging & Health A to Z Heart Attack Coronary Artery Disease, Angina Basic Facts & Information What ... and oxygen supply; this is what causes a heart attack. If the damaged area is small, however, your ...

  9. Panic Attack History and Smoking Topography

    PubMed Central

    Farris, Samantha G.; Brown, Lily A.; Goodwin, Renee D.; Zvolensky, Michael J.

    2016-01-01

    Background Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Method Participants (n = 124, Mage = 43.9, SD = 9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n = 35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Results Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Discussion Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. PMID:28033542

  10. Panic attack history and smoking topography.

    PubMed

    Farris, Samantha G; Brown, Lily A; Goodwin, Renee D; Zvolensky, Michael J

    2017-02-01

    Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Participants (n=124, M age =43.9, SD=9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n=35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. Febrile neutropenia in children with acute lymphoblastic leukemia: single center experience

    PubMed Central

    Özdemir, Nihal; Tüysüz, Gülen; Çelik, Nigar; Yantri, Leman; Erginöz, Ethem; Apak, Hilmi; Özkan, Alp; Yıldız, İnci; Celkan, Tiraje

    2016-01-01

    Aim: An important life-threatening complication of intensive chemotherapy administered in children with leukemia is febrile neutropenia. The objective of this study was to evaluate the clinical features and consequences of febrile neutropenia attacks in children who were treated for acute lymphoblastic leukemia. Material and Methods: Nighty-six children who received chemotherapy for acute lymphoblastic leukemia in our center between January 1995 and December 2010 were included in the study. The data related to demographic characteristics, treatment features, relapse and febrile neutropenia incidences, risk factors, culture results and prognosis were retrospectively evaluated from the patients’ files. Results: A total of two hundred-ninety nine febrile neutropenia attacks observed in the patients during initial treatment and relapse treatment were evaluated. When the incidence of febrile neutropenia was evaluated by years, it was observed that the patients treated after year 2000 had statistically significantly more febrile neutopenia attacks compared to the patients treated before year 2000. When the incidences of febrile neutropenia during initial treatment and during relapse treatment were compared, it was observed that more febrile neutropenia attacks occured during relapse treatment. Fifty-nine percent of all febrile neutropenia attacks were fever of unknown origin. Eighty microorganisms grew in cultures during febrile neutropenia throughout treatment in 75 patients; 86% were bacterial infections (50% gram positive and 50% gram negative), 8% were viral infections and 6% were fungal infections. Coagulase negative staphylococcus (n=17) was the most frequent gram positive pathogen; E. Coli (n=17) was the most commonly grown gram negative pathogen. Conclusions: In this study, it was found that an increase in the incidence of febrile neutropenia occured in years. Increments in treatment intensities increase the incidence of febrile neutropenia while improving

  12. Pre-attack symptomatology and temperament as predictors of children's responses to the September 11 terrorist attacks.

    PubMed

    Lengua, Liliana J; Long, Anna C; Smith, Kimberlee I; Meltzoff, Andrew N

    2005-06-01

    The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Children's responses were assessed in a community sample of children in Seattle, Washington, participating in an ongoing study. Symptomatology and temperament assessed prior to the attacks were examined as prospective predictors of post-attack post-traumatic stress (PTS), anxiety, depression and externalizing problems. Children demonstrated PTS symptoms and worries at levels comparable to those in children directly experiencing disasters, with 77% of children reporting being worried, 68% being upset by reminders, and 39% having upsetting thoughts. The most common PTS symptom cluster was re-experiencing, and 8% of children met criteria consistent with PTSD. African-American children reported more avoidant PTS symptoms and being more upset by the attacks than European-American children. Girls reported being more upset than boys. Prior internalizing, externalizing, social competence and self-esteem were related to post-attack PTS; and child inhibitory control, assessed prior to the 9/11 attacks, demonstrated a trend towards an association with post-attack PTS symptoms controlling for prior levels of symptomatology. PTS predicted child-report anxiety and conduct problem symptoms at follow-up, approximately 6 months after 9/11. Children experiencing a major disaster at a distance or indirectly through media exposure demonstrated worries and PTS symptoms suggesting that communities need to attend to children's mental health needs in response to national or regional disasters. Pre-disaster symptomatology or low self-regulation may render children more vulnerable in response to a disaster, and immediate post-disaster responses predict subsequent symptomatology. These variables might be used in the identification of children in need of

  13. Acute treatment of migraine headaches.

    PubMed

    Taylor, Frederick R

    2010-04-01

    Optimum acute treatment of migraine requires prevention of headache as a top priority. Recognition of the multitude of migraine presentations, the frequency of total headache attacks, and number of days of headache disability are critical. Successful treatment requires excellent patient-clinician communication enhancing confidence and mutual trust based on patient needs and preferences. Optimum management of acute migraine nearly always requires pharmacologic treatment for rapid resolution. Migraine-specific triptans, dihydroergotamine, and several antiinflammatories have substantial empirical clinical efficacy. Older nonspecific drugs, particularly butalbital and opioids, contribute to medication overuse headache and are to be avoided. Clinicians should utilize evidence-based acute migraine-specific therapy stressing the imperative acute treatment goal of early intervention, but not too often with the correct drug, formulation, and dose. This therapy needs to provide cost-effective fast results, meaningful to the patient while minimizing the need for additional drugs. Migraine-ACT evaluates 2-hour pain freedom with return to normal function, comfort with treatment, and consistency of response. Employ a thoroughly educated patient, formulary, testimonials, stratification, and rational cotherapy against the race to central sensitization for optimum outcomes. Thieme Medical Publishers.

  14. Analysis of Surgical Success in Preventing Recurrent Acute Exacerbations in Chronic Pancreatitis

    PubMed Central

    Nealon, William H.; Matin, Sina

    2001-01-01

    Objective To determine whether surgical intervention prevents recurrent acute exacerbations in chronic pancreatitis (CP). Summary Background Data The primary goal of surgical intervention in the treatment of CP has been relief of chronic unrelenting abdominal pain. A subset of patients with CP have intermittent acute exacerbations, often with increasing frequency and often unrelated to ongoing ethanol abuse. Little data exist regarding the effectiveness of surgery to prevent acute attacks. Methods From 1985 to 1999, all patients identified with a diagnosis of CP were recruited to participate in an ongoing program of serial clinic visits and functional and clinical evaluations. Patients were offered surgery using standard criteria. Data were gathered regarding ethanol abuse, pain, narcotic use, and recurrent acute exacerbations requiring hospital admission before and after surgery. Patients were broadly categorized as having severe unrelenting pain alone (group 1), severe pain with intermittent acute exacerbations (group 2), and intermittent acute exacerbations only (group 3). Results Two hundred fifty-nine patients were recruited. One hundred eighty-five patients underwent 199 surgical procedures (124 modified Puestow procedure [LPJ], 29 distal pancreatectomies [DP], and 46 pancreatic head resections [PHR; 14 performed after failure of LPJ]). There were no deaths. The complication rate was 4% for LPJ, 15% for DP, and 27% for PHR. Ethanol abuse was causative in 238 patients (92%). Mean follow-up was 81 months. There were 104 patients in group 1 (86 who underwent surgery), 71 patients in group 2 (64 who underwent surgery), and 84 in group 3 (49 who underwent surgery). No patient without surgery had spontaneous resolution of symptoms. Postoperative pain relief (freedom from narcotic analgesics) was achieved in 153 of 185 patients (83%) overall: 106 of 124 (86%) for LPJ, 19 of 29 (67%) for DP, and 42 of 46 (91%) for PHR. The mean rate of acute exacerbations was 6.3

  15. Analysis of surgical success in preventing recurrent acute exacerbations in chronic pancreatitis.

    PubMed

    Nealon, W H; Matin, S

    2001-06-01

    To determine whether surgical intervention prevents recurrent acute exacerbations in chronic pancreatitis (CP). The primary goal of surgical intervention in the treatment of CP has been relief of chronic unrelenting abdominal pain. A subset of patients with CP have intermittent acute exacerbations, often with increasing frequency and often unrelated to ongoing ethanol abuse. Little data exist regarding the effectiveness of surgery to prevent acute attacks. From 1985 to 1999, all patients identified with a diagnosis of CP were recruited to participate in an ongoing program of serial clinic visits and functional and clinical evaluations. Patients were offered surgery using standard criteria. Data were gathered regarding ethanol abuse, pain, narcotic use, and recurrent acute exacerbations requiring hospital admission before and after surgery. Patients were broadly categorized as having severe unrelenting pain alone (group 1), severe pain with intermittent acute exacerbations (group 2), and intermittent acute exacerbations only (group 3). Two hundred fifty-nine patients were recruited. One hundred eighty-five patients underwent 199 surgical procedures (124 modified Puestow procedure [LPJ], 29 distal pancreatectomies [DP], and 46 pancreatic head resections [PHR; 14 performed after failure of LPJ]). There were no deaths. The complication rate was 4% for LPJ, 15% for DP, and 27% for PHR. Ethanol abuse was causative in 238 patients (92%). Mean follow-up was 81 months. There were 104 patients in group 1 (86 who underwent surgery), 71 patients in group 2 (64 who underwent surgery), and 84 in group 3 (49 who underwent surgery). No patient without surgery had spontaneous resolution of symptoms. Postoperative pain relief (freedom from narcotic analgesics) was achieved in 153 of 185 patients (83%) overall: 106 of 124 (86%) for LPJ, 19 of 29 (67%) for DP, and 42 of 46 (91%) for PHR. The mean rate of acute exacerbations was 6.3 +/- 2.1 events per year before surgery in group 2 and

  16. Glycemic control of diabetes patients under continuous rocket attacks.

    PubMed

    Soskolne, Varda; Dekel, Rachel; Vinker, Shlomo

    2016-01-01

    Evidence regarding the detrimental effects of exposure to stress on glycemic control among diabetes patients has mainly focused on personal life events or acute trauma. However, the effects of continuous exposure to extreme stress on type 2 diabetes patients have rarely been studied. The aim of the current study was to examine the association of continuous exposure to rocket attacks with glycemic control and with risk factors for diabetes complications among civilian type 2 diabetes patients. We focus on patients residing in the Western Negev in the south of Israel that has been subjected to rocket attacks fired from Gaza since the end of 2001. A two-arm retrospective cohort study of type 2 diabetes patients, aged 35-70 years, residing in a region with chronic exposure to rocket attacks (N = 1697) and in a non-exposed comparison region in Israel (N = 3000). Data were retrieved from the Health Maintenance Organization (HMO)'s database for four time periods representing exposure: chronic-2008; elevated-2009 (post'Cast Lead' operation); return to chronic-2010, 2011. Data included socio-demographic variables, HbA 1c , BMI, LDL cholesterol, blood pressure. General Linear Models (GLM) were used for analysis. For HbA 1c , the model yielded a significant main effect for time, a borderline significance main effect for region, and a significant time by region interaction: no differences in HbA 1c levels between the regions in 2008 and 2009, followed by significant differences between the regions in 2010 and 2011 when HbA 1c continued to increase in the exposed region but decreased in the comparison region. Regarding risk factors, a significant main effect for time for LDL cholesterol only, and significant main effects for region were found in all factors: BMI and LDL cholesterol were higher in the exposed than in the comparison region, but blood pressure values were lower. Continuous exposure to rocket attacks is associated with glycemic control and risk factors in a

  17. CPAD: Cyber-Physical Attack Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ferragut, Erik M; Laska, Jason A

    The CPAD technology relates to anomaly detection and more specifically to cyber physical attack detection. It infers underlying physical relationships between components by analyzing the sensor measurements of a system. It then uses these measurements to detect signs of a non-physically realizable state, which is indicative of an integrity attack on the system. CPAD can be used on any highly-instrumented cyber-physical system to detect integrity attacks and identify the component or components compromised. It has applications to power transmission and distribution, nuclear and industrial plants, and complex vehicles.

  18. Know the Warning Signs of a Heart Attack

    MedlinePlus

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  19. Panic attack history and anxiety sensitivity in relation to cognitive-based smoking processes among treatment-seeking daily smokers.

    PubMed

    Johnson, Kirsten A; Farris, Samantha G; Schmidt, Norman B; Smits, Jasper A J; Zvolensky, Michael J

    2013-01-01

    Empirical research has found that panic attacks are related to increased risk of more severe nicotine withdrawal and poor cessation outcome. Anxiety sensitivity (AS; fear of anxiety and related sensations) has similarly been found to be related to an increased risk of acute nicotine withdrawal and poorer cessation outcome. However, research has yet to examine the relative contributions of panic attacks and AS in terms of cognitive-based smoking processes (e.g., negative reinforcement smoking expectancies, addictive and negative affect-based reduction smoking motives, barriers to cessation, problem symptoms experienced while quitting). Participants (n = 242; 57.4% male; M (age) = 38.1) were daily smokers recruited as a part of a larger randomized control trial for smoking cessation. It was hypothesized that both panic attacks and AS would uniquely and independently predict the studied cognitive-based smoking processes. As hypothesized, AS was uniquely and positively associated with all smoking processes after controlling for average number of cigarettes smoked per day, current Axis I diagnosis, and participant sex. However, panic attack history was only significantly related to problem symptoms experienced while quitting smoking. Although past research has demonstrated significant associations between panic attacks and certain aspects of cigarette smoking (e.g., severity of nicotine withdrawal; lower abstinence rates, and negative affect reduction motives), the present findings suggest that AS may be more relevant to understanding beliefs about and motives for smoking behavior as well as perceptions of cessation-related difficulties.

  20. Increasing trends of acute myocardial infarction in Spain: the MONICA-Catalonia Study.

    PubMed

    Sans, Susana; Puigdefábregas, Ana; Paluzie, Guillermo; Monterde, David; Balaguer-Vintró, Ignacio

    2005-03-01

    To assess coronary mortality and morbidity secular trends in Spain. Acute coronary events occurring in both sexes at ages 35-74 years between 1985 and 1997, were monitored in a geographical area of Catalonia, through a population-based registry. Information was collected from annual discharge lists of 78 hospitals and from death certificates, and validated following the methods and quality control of the World Health Organization MONItoring Trends and Determinants in CArdiovascular Disease Project (MONICA). Registration included 19 119 valid events (14 221 in men, 4898 in women) of which 30% were fatal and 41% were definite acute myocardial infarctions. Average attack rates were 315 per 100 000 (95% CI 300-329) and 80 (75-86) in men and women, respectively. Incidence (first-ever event) rates were 209 (194-224) and 56 (52-60) per 100 000. Attack rates increased annually by 2.1% (0.3-4.1) and 1.8% (-0.9 to +4.6). Average 28-day case fatality was 46% (44-47) in men decreasing significantly by 1.4 and 53% (51-55) in women with no change. Fatal trends remained stable. Nationwide morbidity statistics showed similar trends. Acute coronary syndromes are rising in Spanish men.

  1. Terror attacks influence driving behavior in Israel

    PubMed Central

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  2. Bilateral acute angle closure glaucoma after hyperopic LASIK correction

    PubMed Central

    Osman, Essam A.; Alsaleh, Ahmed A.; Al Turki, Turki; AL Obeidan, Saleh A.

    2009-01-01

    Acute angle closure glaucoma is unexpected complication following laser in situ keratomileusis (LASIK). We are reporting a 49-years-old lady that was presented to the emergency department with acute glaucoma in both eyes soon after LASIK correction. Diagnosis was made on detailed clinical history and examination, slit lamp examination, intraocular pressure measurement and gonioscopy. Laser iridotomy in both eyes succeeded in controlling the attack and normalizing the intraocular pressure (IOP) more than 6 months of follow-up. Prophylactic laser iridotomy is essential for narrow angle patients before LASIK surgery if refractive laser surgery is indicated. PMID:23960863

  3. Novel Method For Low-Rate Ddos Attack Detection

    NASA Astrophysics Data System (ADS)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  4. Assessment of acute injuries, exposure to environmental toxins, and five-year health surveillance of New York Police Department working dogs following the September 11, 2001, World Trade Center terrorist attack.

    PubMed

    Fox, Philip R; Puschner, Birgit; Ebel, Joseph G

    2008-07-01

    To determine deployment logistics of New York Police Department (NYPD) working dogs that assisted in relief efforts at the World Trade Center (WTC) site following the September 11, 2001, terrorist attack; establish types and rates of related acute injuries and illnesses; identify environmental toxin exposures; and determine long-term (ie, 5-year) health effects of deployment. Prospective cohort study. 27 working dogs. Deployment logistics for the period from September 11, 2001, through May 30, 2002, were determined, and acute health disorders were identified by means of physical examination; a questionnaire; interviews with dog handlers; and toxicologic (blood and hair samples), clinicopathologic, microbiologic (nasal swab specimens submitted for Bacillus anthracis culture), and radiographic methods. Long-term health surveillance ended September 21, 2006. Dogs worked a total of 1,428 days (15,148 hours) at the site. Seventeen of the 27 (62.9%) dogs had health disorders during the first week. Specific conditions included fatigue (incidence rate [events/1,000 active deployment hours], 13.1), conjunctival irritation (13.1), respiratory tract problems (12.4), decreased appetite (10.8), dehydration (10), and cuts (9.3). Only minor hematologic and serum biochemical abnormalities were identified. Bacterial culture of nasal swab specimens did not yield B anthracis. Only mild and infrequent health conditions were identified during the 5-year follow-up period. None of the dogs were identified as having chronic respiratory tract disease. Six dogs died of various causes. Results suggested that acute injuries and illnesses were common among NYPD working dogs deployed to the WTC disaster site, but that longterm health complications were minimal.

  5. Efficacy of dosing and re-dosing of two oral fixed combinations of indomethacin, prochlorperazine and caffeine compared with oral sumatriptan in the acute treatment of multiple migraine attacks: a double-blind, double-dummy, randomised, parallel group, multicentre study

    PubMed Central

    Sandrini, G; Cerbo, R; Del Bene, E; Ferrari, A; Genco, S; Grazioli, I; Martelletti, P; Nappi, G; Pinessi, L; Sarchielli, P; Tamburro, P; Uslenghi, C; Zanchin, G

    2007-01-01

    Aims and methods: In this double-blind, double-dummy, randomised, parallel group, multicentre study, the efficacy of dosing and re-dosing of a fixed combination of indomethacin, prochlorperazine and caffeine (Indoprocaf) was compared with encapsulated sumatriptan in the acute treatment of two migraine attacks. Additionally, in the group taking Indoprocaf, two different oral formulations were tested: effervescent tablets and encapsulated coated tablets. Results: Of 297 patients randomised (150 assigned to Indoprocaf and 147 to sumatriptan), 281 were included in the intention-to-treat efficacy analysis. The initial dosing of Indoprocaf and sumatriptan was similarly effective with pain-free rates higher than 30% (95% CI of odds-ratio: 0.57–1.28) and headache relief rates of about 60% (95% CI of odds-ratio: 0.82–1.84) with both the drugs. The efficacy of re-dosing of Indoprocaf as rescue medication was more effective than that of sumatriptan with pain-free values of 47% vs. 27% in the total attacks with a statistically significant difference in the first migraine attack in favour of Indoprocaf. The efficacy of re-dosing to treat a recurrence/relapse was very high without differences between the drugs (pain-free: 60% with Indoprocaf and 50% with sumatriptan in the total attacks). Indoprocaf and sumatriptan were well-tolerated. Conclusion: The study demonstrated that the efficacy of the initial dosing of Indoprocaf was not higher than that of sumatriptan, but that the strategy to use the lowest effective dose as soon as the headache occurred, followed by a second dose if the headache has not relieved or to treat a relapse, was very effective, especially with Indoprocaf. PMID:17627707

  6. The C(-260)>T gene polymorphism in the promoter of the CD14 monocyte receptor gene is not associated with acute myocardial infarction.

    PubMed

    Longobardo, M T; Cefalù, A B; Pezzino, F; Noto, D; Emmanuele, G; Barbagallo, C M; Fiore, B; Monastero, R; Castello, A; Molini, V; Notarbartolo, A; Travali, S; Averna, M R

    2003-11-01

    CD surface molecules mediates cell activation and signaling. In particular, CD14 on blood monocytes mediate monocyte/macrophage activation by lipopolysaccharide. Lipopolysaccharide and its receptor, CD14, have been implicated in atherogenesis. It has been recently shown that a C(-260)T polymorphism in the promoter of the CD14 receptor may be a risk factor for coronary artery disease. Recently this association has been questioned because no increased risk was found with the T allele, even in the homozygous state. In the present study we investigated a possible association between the C(-260)T polymorphism in the CD14 promoter and acute myocardial infarction. Two hundred and thrteen patients with and acute myocardial infarction 213 healthy controls were included in the study. Genotype frequencies of the C(-260)T polymorphism in the CD14 promoter were determined by polimerase chain reaction and the amplified product was cleaved with HaeIII. The frequency of the T allele was not significantly different in patients compared with controls. In this study we were not able to detect differences of frequency of the allele T (-260) in the promoter of the CD14 receptor gene in survivors of myocardial infarction and controls.

  7. Genetic attack on neural cryptography.

    PubMed

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  8. Genetic attack on neural cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold formore » the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.« less

  9. Genetic attack on neural cryptography

    NASA Astrophysics Data System (ADS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  10. High serum creatinine in acute pancreatitis: a marker for pancreatic necrosis?

    PubMed

    Lankisch, Paul Georg; Weber-Dany, Bettina; Maisonneuve, Patrick; Lowenfels, Albert B

    2010-05-01

    High serum creatinine is a well-known unfavorable prognostic parameter in acute pancreatitis. Elevated creatinine at 48 h after admission was recently described as a marker for pancreatic necrosis. As pancreatic necrosis is a serious complication of acute pancreatitis and its identification by a simple single laboratory test would be very helpful, the aim of this study was to test that statement. In a prospective multicenter study of 462 patients with a first attack of acute pancreatitis, serum creatinine was determined on admission, and at 24 and 48 h thereafter, and compared with the findings of contrast-enhanced computed tomography (CT) performed within 96 h of admission. Pancreatic necrosis was present in 62 (13%) of the patients. Serum creatinine levels (abnormal > or = 2 mg/dl) on admission and after 24 and 48 h were evaluated vs. the presence or absence of pancreatic necrosis. Sensitivity rates varied between 14 and 23%, specificity between 95 and 97%, positive predictive values between 41 and 50%, and negative predictive values between 87 and 89%. Receiver operating characteristic curves revealed an area under the curve of between 0.604 and 0.669. An elevated serum creatinine concentration at any time during the first 48 h of admission is not a marker for pancreatic necrosis in a first attack of acute pancreatitis. If serum creatinine is normal, necrotizing pancreatitis is unlikely, and contrast-enhanced CT need not be performed unless complications occur and/or the patient's condition deteriorates.

  11. Significance of large vessel intracranial occlusion causing acute ischemic stroke and TIA.

    PubMed

    Smith, Wade S; Lev, Michael H; English, Joey D; Camargo, Erica C; Chou, Maggie; Johnston, S Claiborne; Gonzalez, Gilberto; Schaefer, Pamela W; Dillon, William P; Koroshetz, Walter J; Furie, Karen L

    2009-12-01

    Acute ischemic stroke due to large vessel occlusion (LVO)-vertebral, basilar, carotid terminus, middle and anterior cerebral arteries-likely portends a worse prognosis than stroke unassociated with LVO. Because little prospective angiographic data have been reported on a cohort of unselected patients with stroke and with transient ischemic attack, the clinical impact of LVO has been difficult to quantify. The Screening Technology and Outcome Project in Stroke Study is a prospective imaging-based study of stroke outcomes performed at 2 academic medical centers. Patients with suspected acute stroke who presented within 24 hours of symptom onset and who underwent multimodality CT/CT angiography were approached for consent for collection of clinical data and 6-month assessment of outcome. Demographic and clinical variables and 6-month modified Rankin Scale scores were collected and combined with blinded interpretation of the CT angiography data. The OR of each variable, including occlusion of intracranial vascular segment in predicting good outcome and 6-month mortality, was calculated using univariate and multivariate logistic regression. Over a 33-month period, 735 patients with suspected stroke were enrolled. Of these, 578 were adjudicated as stroke and 97 as transient ischemic attack. Among patients with stroke, 267 (46%) had LVO accounting for the stroke and 13 (13%) of patients with transient ischemic attack had LVO accounting for transient ischemic attack symptoms. LVO predicted 6-month mortality (OR, 4.5; 95% CI, 2.7 to 7.3; P<0.001). Six-month good outcome (modified Rankin Scale score acute ischemic strokes in unselected patients

  12. Countermeasures for unintentional and intentional video watermarking attacks

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  13. Cougar attacks on humans: a case report.

    PubMed

    McKee, Denise

    2003-01-01

    Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.

  14. Heart Attack

    MedlinePlus

    ... it as instructed while awaiting emergency help. Take aspirin, if recommended. Taking aspirin during a heart attack could reduce heart damage by helping to keep your blood from clotting. Aspirin can interact with other medications, however, so don' ...

  15. Panic attack triggering myocardial ischemia documented by myocardial perfusion imaging study. A case report

    PubMed Central

    2012-01-01

    Background Chest pain, a key element in the investigation of coronary artery disease is often regarded as a benign prognosis when present in panic attacks. However, panic disorder has been suggested as an independent risk factor for long-term prognosis of cardiovascular diseases and a trigger of acute myocardial infarction. Objective Faced with the extreme importance in differentiate from ischemic to non-ischemic chest pain, we report a case of panic attack induced by inhalation of 35% carbon dioxide triggering myocardial ischemia, documented by myocardial perfusion imaging study. Discussion Panic attack is undoubtedly a strong component of mental stress. Patients with coronary artery disease may present myocardial ischemia in mental stress response by two ways: an increase in coronary vasomotor tone or a sympathetic hyperactivity leading to a rise in myocardial oxygen consumption. Coronary artery spasm was presumed to be present in cases of cardiac ischemia linked to panic disorder. Possibly the carbon dioxide challenge test could trigger myocardial ischemia by the same mechanisms. Conclusion The use of mental stress has been suggested as an alternative method for myocardial ischemia investigation. Based on translational medicine objectives the use of CO2 challenge followed by Sestamibi SPECT could be a useful method to allow improved application of research-based knowledge to the medical field, specifically at the interface of PD and cardiovascular disease. PMID:22999016

  16. Panic attack triggering myocardial ischemia documented by myocardial perfusion imaging study. A case report.

    PubMed

    Soares-Filho, Gastão Luiz Fonseca; Mesquita, Claudio Tinoco; Mesquita, Evandro Tinoco; Arias-Carrión, Oscar; Machado, Sergio; González, Manuel Menéndez; Valença, Alexandre Martins; Nardi, Antonio Egidio

    2012-09-21

    Chest pain, a key element in the investigation of coronary artery disease is often regarded as a benign prognosis when present in panic attacks. However, panic disorder has been suggested as an independent risk factor for long-term prognosis of cardiovascular diseases and a trigger of acute myocardial infarction. Faced with the extreme importance in differentiate from ischemic to non-ischemic chest pain, we report a case of panic attack induced by inhalation of 35% carbon dioxide triggering myocardial ischemia, documented by myocardial perfusion imaging study. Panic attack is undoubtedly a strong component of mental stress. Patients with coronary artery disease may present myocardial ischemia in mental stress response by two ways: an increase in coronary vasomotor tone or a sympathetic hyperactivity leading to a rise in myocardial oxygen consumption. Coronary artery spasm was presumed to be present in cases of cardiac ischemia linked to panic disorder. Possibly the carbon dioxide challenge test could trigger myocardial ischemia by the same mechanisms. The use of mental stress has been suggested as an alternative method for myocardial ischemia investigation. Based on translational medicine objectives the use of CO2 challenge followed by Sestamibi SPECT could be a useful method to allow improved application of research-based knowledge to the medical field, specifically at the interface of PD and cardiovascular disease.

  17. Cougar attacks on children: injury patterns and treatment.

    PubMed

    Kadesky, K M; Manarey, C; Blair, G K; Murphy, J J; Verchere, C; Atkinson, K

    1998-06-01

    Cougar attacks on humans appear to be on the rise. A review of all attacks on children was performed to determine the method of attack and injury patterns so that a treatment regimen as well as possible preventative measures could be determined. A review of all attacks, including attacks on children, was performed, including three recent attacks treated at our institution. Situation, adult supervision, patient age, injuries recorded, survival, and mode of attack, if known, were reviewed. There were 50 documented attacks on children with a 25% fatality rate. Most children were not alone at the time of the attack (92%), and in many instances adult supervision was present or nearby. Severe head and neck lacerations along with puncture wounds were the most common injury. Examples of typical cervical injuries include a nonfatal vertebral artery injury, phrenic nerve injury, a fatal internal carotid artery injury, and a fatal cervical spine injury. The cougar was rabid in two cases. Pasteurella resulted in late infections in two patients. Based on the pattern of injuries, the authors recommend aggressive evaluation for occult cervical injuries as well as surgical debridement. Antibiotics should cover oropharyngeal flora including Pasteurella multocida. Rabies prophylaxis is indicated. Adult supervision in wilderness areas is not necessarily protective.

  18. Aortic valve replacement during acute rheumatic fever.

    PubMed

    Khan, A; Chi, S; Gonzalez-Lavin, L

    1978-07-01

    Emergency aortic valve replacement was performed during an attack of acute rheumatic fever in a 12-year-old black boy. He had an uneventful recovery and has remained asymptomatic 27 months after operation. In the light of this experience and that of others, one might conclude that the decision to operate on these patients should be based on the severity of the haemodynamic derangement rather than on the state of activity in the rheumatic process.

  19. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  20. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  1. Video analysis of acute injuries and referee decisions during the 24th Men's Handball World Championship 2015 in Qatar.

    PubMed

    Andersson, S H; Cardinale, M; Whiteley, R; Popovic, N; Hansen, C; Lopez, F S; Bere, T; Bahr, R; Myklebust, G

    2018-03-30

    Although handball is a contact sport with a high risk of acute match injuries, their mechanisms have not yet been investigated. We aimed to describe the mechanisms of acute match injuries in elite male handball and evaluate referee performance in injury situations. Based on injury surveillance from the 24th Men's Handball World Championship 2015 in Qatar, injury situations and the referee decisions were identified on video footage. A total of 55 injury situations and 37 referee decisions were included for analysis. The injury situations were analyzed individually by five handball experts, followed by a consensus meeting. An expert referee panel performed individual blinded evaluation of the referee decisions, followed by an online consensus meeting. Injuries were evenly distributed among attackers (n = 29) and defenders (n = 26). The most frequent injury cause was contact trauma due to a tackle (n = 27). At the time of injury, attackers were most frequently performing a jump shot (n = 9), while defenders were completing a tackle (n = 10). Defenders most commonly tackled the throwing arm (n = 7) or toward the head/face region (n = 6) of injured attackers, while attackers most frequently hit injured defenders with the knee during jump shots (n = 5). Agreement between the referees and the expert panel was weak (kappa: 0.22, 95% CI 0.07 to 0.36), with substantially more lenient rule interpretation by the referees. Our results suggest that stricter refereeing and rule amendments should be considered to prevent acute match injuries in elite handball, especially in relation to tackling episodes when an attacker is performing a jump shot. © 2018 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  2. Anger attacks in bipolar versus recurrent depression.

    PubMed

    Grover, Sandeep; Painuly, Nitesh; Gupta, Nitin; Mattoo, Surendra K

    2011-01-01

    Research on anger attacks has been mostly limited to unipolar depression, and only a few studies have focused on anger attacks in bipolar depression. In a cross-sectional study, 22 subjects with bipolar depression were compared to 22 subjects with recurrent unipolar depression using an anger attack questionnaire, irritability, depression and anxiety scale and quality of life scale. Anger attacks were present in 62.5% subjects with recurrent depression (RDD group) compared to 54.5% in subjects with bipolar depression (BD group), but the difference between the groups was not statistically significant. Also, there was no significant difference between the RDD and BD groups on the Irritability Depression and Anxiety Scale and WHOQOL-Bref except that the BD group had a poorer quality of life (QOL) compared to the RDD group in the social relationship domain (t=-2.30, p<0.05). In the BD group, the subjects with anger attacks were older (t=2.77, p<0.05), had significantly higher scores on the Irritability-Outwards component of IDA (t=3.90, p<0.01) and shorter duration of illness (Mann Whitney Signed ranked value 20.00, p<0.01) and duration of treatment (Mann Whitney Signed ranked value 28.00, p<0.05) compared to BD group members without anger attacks. In the RDD group, the subjects with anger attacks had poor QOL in the social domain (t= -2.12, p<0.05), environmental domain (t=2.99, p=.01) and total (t=2.56, p<0.05) QOL compared to those without anger attacks. Anger attacks are equally prevalent in unipolar and bipolar depression, are not influenced by sociodemographic and clinical variables, and lead to comparable impact on the subjective QOL in both groups.

  3. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    MedlinePlus

    ... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...

  4. Sleep bruxism possibly triggered by multiple sclerosis attacks and treated successfully with botulinum toxin: Report of three cases.

    PubMed

    Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit

    2015-09-01

    Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack. Copyright © 2015 Elsevier B.V. All rights reserved.

  5. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  6. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  7. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  8. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  9. Using agility to combat cyber attacks.

    PubMed

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  10. Adaptive optimisation-offline cyber attack on remote state estimator

    NASA Astrophysics Data System (ADS)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  11. Lifestyle Changes for Heart Attack Prevention

    MedlinePlus

    ... Venous Thromboembolism Aortic Aneurysm More Lifestyle Changes for Heart Attack Prevention Updated:Mar 29,2018 Sounds simple doesn' ... to read. Many topics also available in Spanish . Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  12. Comorbidity in acute pancreatitis relates to organ failure but not to local complications.

    PubMed

    Weitz, G; Woitalla, J; Wellhöner, P; Schmidt, K J; Büning, J; Fellermann, K

    2016-03-01

    Organ failure and local complications contribute to morbidity and mortality in acute pancreatitis. Comorbidity is known to be related to organ failure. The impact of comorbidity on local complications has not yet been delineated. Moreover, it is not clear if the outcome of first-attacks and acute-on-chronic episodes, respectively, differs from outcome in all episodes. Consecutive cases of confirmed acute pancreatitis in a four-year period were reviewed. Charlson comorbidity index (CCI), complications (organ failure and local complications), disease severity (according to the revised Atlanta Classification), need for intensive care, and mortality were derived from the charts. A total of 391 episodes of acute pancreatitis were included. Patients with organ failure were significantly older (P< 0.001) und had a higher CCI (P< 0.001) than patients without organ failure. Patients with and without local complications did not significantly differ in age or CCI. The complication rate of the entire cohort (n = 391; 47.1 %) was comparable with the complication rate of first-attacks (n = 269; 46.8 %) and acute-on-chronic episodes (n = 68; 47.1 %). The majority of the twelve deceased patients had been old and/or chronically ill. Six of these patients had an advanced malignant disease. Comorbidity and age clearly are contributors to organ failure and mortality. Local complications occur independently of age and concomitant diseases. The overall complication rate is not significantly influenced by preceding inflammation of the pancreas. To further improve care in patients with acute pancreatitis special attention should be given to old and multi-morbid patients. © Georg Thieme Verlag KG Stuttgart · New York.

  13. Heartburn or Chest Pain: When Is It Heart Attack?

    MedlinePlus

    Heartburn or heart attack: When to worry Severe heartburn and heart attack can be hard to tell apart. Understand how they typically ... flow to your heart (angina) or an actual heart attack. Heartburn, angina and heart attack may feel very ...

  14. Attack Vulnerability of Network Controllability.

    PubMed

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  15. A fatal elephant attack.

    PubMed

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  16. False Positive and False Negative Effects on Network Attacks

    NASA Astrophysics Data System (ADS)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  17. Emergency Mental Health Services for Children After the Terrorist Attacks of September 11, 2001.

    PubMed

    Bruckner, Tim A; Kim, Yonsu; Lubens, Pauline; Singh, Amrita; Snowden, Lonnie; Chakravarthy, Bharath

    2016-01-01

    Much literature documents elevated psychiatric symptoms among adults after the terrorist attacks of September 11, 2001 (9/11). We, however, know of no research in children that examines emergency mental health services following 9/11. We test whether children's emergency services for crisis mental health care rose above expected values in September 2001. We applied time-series methods to California Medicaid claims (1999-2003; N = 127,200 visits). Findings in California indicate an 8.7% increase of children's emergency mental health visits statistically attributable to 9/11. Non-Hispanic white more than African American children account for this acute rise in emergency services.

  18. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  19. Transient ischemic attack

    MedlinePlus

    ... artery surgery - discharge Stroke - discharge Taking warfarin (Coumadin) Images Endarterectomy Transient Ischemic attack (TIA) References Biller J, Ruland S, Schneck MJ. Ischemic cerebrovascular disease. In Daroff ...

  20. Phaeochromocytoma presenting as an acute coronary syndrome.

    PubMed

    Imam, Towhid; Finny, Philip; Choo-Kang, Alan; Khan, Rehman

    2016-10-26

    A 44-year-old Caucasian man presented to the emergency department in acute cardiogenic shock, with pulmonary oedema, secondary to an acute myocardial infarction and in a hyperosmolar hyperglycaemic state. The previous day he had undergone a colonoscopy, which revealed features of colitis, and was started on prednisolone. He had been previously diagnosed with type 2 diabetes, migraine and anxiety attacks. While awaiting a coronary angiogram he developed abdominal pain and a CT scan was performed and found a large right adrenal mass. Plasma-free metadrenaline levels were elevated. After 4 months, a right adrenalectomy was performed successfully. He made a good recovery with normalisation of his heart function and resolution of his diabetes. The diagnosis was delayed for years due to his episodic symptoms being attributed to other more common diagnoses. Although a rare diagnosis in itself, there are case reports of phaeochromocytoma initially presenting with an acute coronary syndrome. 2016 BMJ Publishing Group Ltd.

  1. Zebrafish Models for Human Acute Organophosphorus Poisoning.

    PubMed

    Faria, Melissa; Garcia-Reyero, Natàlia; Padrós, Francesc; Babin, Patrick J; Sebastián, David; Cachot, Jérôme; Prats, Eva; Arick Ii, Mark; Rial, Eduardo; Knoll-Gellida, Anja; Mathieu, Guilaine; Le Bihanic, Florane; Escalon, B Lynn; Zorzano, Antonio; Soares, Amadeu M V M; Raldúa, Demetrio

    2015-10-22

    Terrorist use of organophosphorus-based nerve agents and toxic industrial chemicals against civilian populations constitutes a real threat, as demonstrated by the terrorist attacks in Japan in the 1990 s or, even more recently, in the Syrian civil war. Thus, development of more effective countermeasures against acute organophosphorus poisoning is urgently needed. Here, we have generated and validated zebrafish models for mild, moderate and severe acute organophosphorus poisoning by exposing zebrafish larvae to different concentrations of the prototypic organophosphorus compound chlorpyrifos-oxon. Our results show that zebrafish models mimic most of the pathophysiological mechanisms behind this toxidrome in humans, including acetylcholinesterase inhibition, N-methyl-D-aspartate receptor activation, and calcium dysregulation as well as inflammatory and immune responses. The suitability of the zebrafish larvae to in vivo high-throughput screenings of small molecule libraries makes these models a valuable tool for identifying new drugs for multifunctional drug therapy against acute organophosphorus poisoning.

  2. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  3. Nonepileptic attack disorder among married women.

    PubMed

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  4. An entangling-probe attack on Shor's algorithm for factorization

    NASA Astrophysics Data System (ADS)

    Azuma, Hiroo

    2018-02-01

    We investigate how to attack Shor's quantum algorithm for factorization with an entangling probe. We show that an attacker can steal an exact solution of Shor's algorithm outside an institute where the quantum computer is installed if he replaces its initialized quantum register with entangled qubits, namely the entangling probe. He can apply arbitrary local operations to his own probe. Moreover, we assume that there is an unauthorized person who helps the attacker to commit a crime inside the institute. He tells garbage data obtained from measurements of the quantum register to the attacker secretly behind a legitimate user's back. If the attacker succeeds in cracking Shor's algorithm, the legitimate user obtains a random answer and does not notice the attacker's illegal acts. We discuss how to detect the attacker. Finally, we estimate a probability that the quantum algorithm inevitably makes an error, of which the attacker can take advantage.

  5. Aortic valve replacement during acute rheumatic fever.

    PubMed Central

    Khan, A; Chi, S; Gonzalez-Lavin, L

    1978-01-01

    Emergency aortic valve replacement was performed during an attack of acute rheumatic fever in a 12-year-old black boy. He had an uneventful recovery and has remained asymptomatic 27 months after operation. In the light of this experience and that of others, one might conclude that the decision to operate on these patients should be based on the severity of the haemodynamic derangement rather than on the state of activity in the rheumatic process. Images PMID:687481

  6. Robustness analysis of interdependent networks under multiple-attacking strategies

    NASA Astrophysics Data System (ADS)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  7. Predictive variables for mortality after acute ischemic stroke.

    PubMed

    Carter, Angela M; Catto, Andrew J; Mansfield, Michael W; Bamford, John M; Grant, Peter J

    2007-06-01

    Stroke is a major healthcare issue worldwide with an incidence comparable to coronary events, highlighting the importance of understanding risk factors for stroke and subsequent mortality. In the present study, we determined long-term (all-cause) mortality in 545 patients with ischemic stroke compared with a cohort of 330 age-matched healthy control subjects followed up for a median of 7.4 years. We assessed the effect of selected demographic, clinical, biochemical, hematologic, and hemostatic factors on mortality in patients with ischemic stroke. Stroke subtype was classified according to the Oxfordshire Community Stroke Project criteria. Patients who died 30 days or less after the acute event (n=32) were excluded from analyses because this outcome is considered to be directly attributable to the acute event. Patients with ischemic stroke were at more than 3-fold increased risk of death compared with the age-matched control cohort. In multivariate analyses, age, stroke subtype, atrial fibrillation, and previous stroke/transient ischemic attack were predictive of mortality in patients with ischemic stroke. Albumin and creatinine and the hemostatic factors von Willebrand factor and beta-thromboglobulin were also predictive of mortality in patients with ischemic stroke after accounting for demographic and clinical variables. The results indicate that subjects with acute ischemic stroke are at increased risk of all-cause mortality. Advancing age, large-vessel stroke, atrial fibrillation, and previous stroke/transient ischemic attack predict mortality; and analysis of albumin, creatinine, von Willebrand factor, and beta-thromboglobulin will aid in the identification of patients at increased risk of death after stroke.

  8. Localized attacks on spatially embedded networks with dependencies.

    PubMed

    Berezin, Yehiel; Bashan, Amir; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2015-03-11

    Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures-even of finite fraction-if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems.

  9. Anxiety-related somatic reactions during missile attacks.

    PubMed

    Carmeli, A; Liberman, N; Mevorach, L

    1991-01-01

    During the Persian Gulf war the Israeli civilian population was the target of missile attacks that could have carried poison gas warheads. During the attacks all civilians were ordered to wear gas masks and move into sealed rooms. Four telephone surveys studied the somatic reactions to this anxiety-arousing situation. The percent of subjects reporting the somatic reactions declined from 38% after the first attack to 20% 12 days later. Somatic reactions were more prevalent among females than males, and among those who completed elementary school only compared to those with an academic education. A complex pattern of relationships between expectancies about chemical warfare attacks and somatic reactions is discussed.

  10. Anxiety sensitivity and panic reactivity to bodily sensations: relation to quit-day (acute) nicotine withdrawal symptom severity among daily smokers making a self-guided quit attempt.

    PubMed

    Marshall, Erin C; Johnson, Kirsten; Bergman, Jenna; Gibson, Laura E; Zvolensky, Michael J

    2009-10-01

    The current investigation explored the main and interactive effects of panic attacks in response to laboratory-induced bodily sensations and anxiety sensitivity in predicting acute nicotine withdrawal symptoms among daily smokers making a self-guided quit attempt. Participants were 99 daily smokers (58% women; M(age) = 28.4 years, SD = 11.7) who completed a battery of questionnaires, a voluntary hyperventilation challenge, and a measure of nicotine withdrawal symptoms 12 hr after making a self-guided quit attempt. Results indicated that the interaction of anxiety sensitivity and panic responsivity to the challenge predicted quit-day nicotine withdrawal symptom severity above and beyond the main effects (p < .05). The form of the interaction indicated that the relationship between postchallenge panic attack status and acute nicotine withdrawal was more robust among individuals who were low in anxiety sensitivity. Individuals who did not experience a panic attack posthyperventilation who were also low in anxiety sensitivity reported the lowest levels of nicotine withdrawal. Results suggest that anxiety sensitivity may be less relevant with regard to acute nicotine withdrawal severity among individuals with panic-related problems.

  11. Execute-Only Attacks against Execute-Only Defenses

    DTIC Science & Technology

    2015-11-13

    attacks that have been widely used to bypass randomization-based memory corruption defenses. A recent technique, Readactor, provides one of the... corruption defenses with various impacts. We analyze the prevalence of opportunities for such attacks in popular code bases and build two proof-of-concept...our countermeasures introduce only a modest additional overhead. I. INTRODUCTION Memory corruption has been a primary vector of attacks against

  12. The contribution of collective attack tactics in differentiating handball score efficiency.

    PubMed

    Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka

    2004-12-01

    The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.

  13. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  14. Detection of complex cyber attacks

    NASA Astrophysics Data System (ADS)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  15. Oral lysine clonixinate in the acute treatment of migraine: a double-blind placebo-controlled study.

    PubMed

    Krymchantowski, A V; Barbosa, J S; Cheim, C; Alves, L A

    2001-03-01

    Several oral nonsteroidal anti-inflammatory drugs (NSAIDs) are effective to treat migraine attacks. Lysine clonixinate (LC) is a NSAID derived from nicotinic acid that has proven to be effective in various pain syndromes such as renal colic and muscular pain. The aim of this double-blind, placebo-controlled study was to evaluate the efficacy of oral LC compared to placebo in the acute treatment of migraine. Sixty four patients with the diagnosis of migraine, according to the IHS criteria, were studied prospectively. Patients received LC or placebo once the headache reached moderate or severe intensity for 6 consecutive attacks. With regard to the moderate attacks, LC was superior than placebo after 1, 2 and 4 hours. The consumption of other rescue medications after 4 hours was significantly higher in the placebo group. With regard to the severe attacks, there was no difference between the active drug group and the placebo group concerning headache intensity and consumption of other rescue medications. We conclude that the NSAID lysine clonixinate is effective in treating moderately severe migraine attacks. It is not superior than placebo in treating severe migraine attacks.

  16. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of...

  17. Factors associated with recovery from acute optic neuritis in patients with multiple sclerosis.

    PubMed

    Malik, Muhammad Taimur; Healy, Brian C; Benson, Leslie A; Kivisakk, Pia; Musallam, Alexander; Weiner, Howard L; Chitnis, Tanuja

    2014-06-17

    To identify clinical and demographic features associated with the severity and recovery from acute optic neuritis (AON) episodes in patients with multiple sclerosis (MS). Adult (n = 253) and pediatric (n = 38) patients whose first symptom was AON were identified from our MS database. Severity measured by loss of visual acuity (mild attack ≤20/40, moderate attack 20/50-20/190, and severe attack ≥20/200) and recovery in visual acuity at 1 year after the attack (complete recovery ≤20/20, fair recovery 20/40, and poor recovery ≥20/50) were recorded. Demographic and clinical features associated with attack severity and recovery were identified using proportional odds logistic regression. For another group of patients, blood samples were available within 6 months of an AON attack. In this group, the impact of vitamin D level on the severity/recovery was also assessed. Men (adjusted odds ratio [OR] = 2.28, p = 0.03) and subjects with severe attacks (adjusted OR = 5.24, p < 0.001) had worse recovery. AON severity was similar between the pediatric and adult subjects, but recovery was significantly better in pediatric subjects in the unadjusted analysis (p = 0.041) and the analysis adjusted for sex (p = 0.029). Season-adjusted vitamin D level was significantly associated with attack severity (OR for 10-U increase in vitamin D level = 0.47; 95% confidence interval: 0.32, 0.68; p < 0.001). Vitamin D level was not associated with recovery from the attack (p = 0.98) in univariate analysis or after accounting for attack severity (p = 0.10). Vitamin D levels affect AON severity, whereas younger age, attack severity, and male sex affect AON recovery. Underlying mechanisms and potential therapeutic targets may identify new measures to mitigate disability accrual in MS. © 2014 American Academy of Neurology.

  18. Panic disorder, panic attacks and panic attack symptoms across race-ethnic groups: results of the collaborative psychiatric epidemiology studies.

    PubMed

    Asnaani, Anu; Gutner, Cassidy A; Hinton, Devon E; Hofmann, Stefan G

    2009-01-01

    The current study investigates race-ethnic differences in rates of panic disorder, panic attacks and certain panic attack symptoms by jointly combining three major national epidemiological databases. The compared groups were White, African American, Latino and Asian. The White group had significantly higher rates of panic disorder, and of many panic symptoms, including palpitations, as compared to the African American, Asian and Latino groups. Several expected race-ethnic differences were not found. An explanation for these findings are adduced, and suggestions are given for future studies so that possible ethnic-racial differences in panic disorder, panic attacks and panic attack symptoms can be investigated in a more rigorous manner.

  19. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  20. Immunosafety of recombinant human C1-inhibitor in hereditary angioedema: evaluation of ige antibodies.

    PubMed

    Hack, C Erik; Relan, Anurag; Baboeram, Aartie; Oortwijn, Beatrijs; Versteeg, Serge; van Ree, Ronald; Pijpstra, Rienk

    2013-04-01

    Recombinant human C1-inhibitor (rhC1INH) purified from milk of transgenic rabbits is used for the treatment of acute attacks in patients with hereditary angioedema (HAE) due to C1-inhibitor (C1INH) deficiency. The objective was to investigate the risk of rhC1INH inducing IgE antibodies or eliciting anaphylactic reactions. In subjects treated with rhC1INH, we retrospectively analysed the frequency and clinical relevance of pre-exposure and potentially newly induced IgE antibodies against rabbit and other animal allergens including cow's milk by the ImmunoCAP(®) Specific IgE blood test system. 130 HAE patients and 14 healthy subjects received 300 administrations of rhC1INH, 65 subjects (47.4 %) on one occasion; 72 (52.6 %) on at least two occasions (range 2-12; median 2). Five subjects had pre-existing anti-rabbit epithelium IgE; the subject with the highest levels and a previously undisclosed rabbit allergy developed an anaphylactic reaction upon first exposure to rhC1INH, whereas the other four subjects with lower pre-existing IgE levels (Class 1-3), did not. No other anaphylactic reactions were identified in any of the subjects exposed to rhC1INH. Analysis of post-exposure samples revealed that the risk of inducing new or boosting existing IgE responses to rabbit or cow's milk allergens was negligible. The propensity of rhC1INH to induce IgE antibodies following repeated administration of rhC1INH is low. Subjects with substantially elevated anti-rabbit epithelium IgE antibodies and/or clinical allergy to rabbits may have an increased risk for an allergic reaction. No other risk factors for allergic reactions to rhC1INH have been identified.

  1. Combating Memory Corruption Attacks On Scada Devices

    NASA Astrophysics Data System (ADS)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  2. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  3. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap

  4. Pre-Attack Symptomatology and Temperament as Predictors of Children's Responses to the September 11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Smith, Kimberlee I.; Meltzoff, Andrew N.

    2005-01-01

    Background: The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Method: Children's responses were assessed in a community sample of children in Seattle, Washington,…

  5. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less

  6. Shark attack.

    PubMed

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  7. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  8. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  9. Pathologic features of fatal shark attacks.

    PubMed

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  10. A prospective study of radionuclide biliary scanning in acute pancreatitis.

    PubMed Central

    Neoptolemos, J. P.; Fossard, D. P.; Berry, J. M.

    1983-01-01

    Early surgery for biliary pancreatitis has resulted in a need for an accurate method of gallstone detection in acute pancreatitis. Fifty patients with acute pancreatitis were studied prospectively to assess the diagnostic value of Radionuclide Biliary Scanning (RBS) performed within 72 hours of an attack. To assess the general accuracy of RBS a further 154 patients with suspected acute cholecystitis or biliary colic were similarly studied. There were 34 patients with biliary pancreatitis and 18 (53%) had a positive scan (no gallbladder seen). There were 16 patients with non-biliary pancreatitis and 5 (31%) had a positive scan. All 51 patients with acute cholecystitis had a positive scan, as did 82% of the 51 patients with biliary colic. There were 52 patients with no biliary or pancreatic disease and none of these had a positive scan. RBS is highly accurate in confirming a diagnosis of acute cholecystitis or biliary colic. However, it cannot be relied on to differentiate between biliary and non-biliary pancreatitis and should certainly not be used as the basis for biliary surgery in these patients. PMID:6859781

  11. Temporal Cyber Attack Detection.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ingram, Joey Burton; Draelos, Timothy J.; Galiardi, Meghan

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms requiremore » large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.« less

  12. Defender-Attacker Decision Tree Analysis to Combat Terrorism.

    PubMed

    Garcia, Ryan J B; von Winterfeldt, Detlof

    2016-12-01

    We propose a methodology, called defender-attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game-theoretic formulations of this problem, we assume that the defenders act rationally by maximizing their expected utility or minimizing their expected costs. However, we do not assume that attackers maximize their expected utilities. Instead, we encode the defender's limited knowledge about the attacker's motivations and capabilities as a conditional probability distribution over the attacker's decisions. We apply this methodology to the problem of defending against possible terrorist attacks on commercial airplanes, using one of three weapons: infrared-guided MANPADS (man-portable air defense systems), laser-guided MANPADS, or visually targeted RPGs (rocket propelled grenades). We also evaluate three countermeasures against these weapons: DIRCMs (directional infrared countermeasures), perimeter control around the airport, and hardening airplanes. The model includes deterrence effects, the effectiveness of the countermeasures, and the substitution of weapons and targets once a specific countermeasure is selected. It also includes a second stage of defensive decisions after an attack occurs. Key findings are: (1) due to the high cost of the countermeasures, not implementing countermeasures is the preferred defensive alternative for a large range of parameters; (2) if the probability of an attack and the associated consequences are large, a combination of DIRCMs and ground perimeter control are preferred over any single countermeasure. © 2016 Society for Risk Analysis.

  13. [Study on clinical effectiveness of acupuncture and moxibustion on acute Bell's facial paralysis: randomized controlled clinical observation].

    PubMed

    Wu, Bin; Li, Ning; Liu, Yi; Huang, Chang-qiong; Zhang, Yong-ling

    2006-03-01

    To investigate the adverse effects of acupuncture on the prognosis, and effectiveness of acupuncture combined with far infrared ray in the patient of acute Bell's facial paralysis within 48 h. Clinically randomized controlled trial was used, and the patients were divided into 3 groups: group A (early acupuncture group), group B (acupuncture combined with far infrared ray) and group C (acupuncture after 7 days). The facial nerve functional classification at the attack, 7 days after the attack and after treatment, the clinically cured rate of following-up of 6 months, and the average cured time, the cured time of complete facial paralysis were observed in the 3 groups. There were no significant differences among the 3 groups in the facial nerve functional classification 7 days after the attack, the clinically cured rate of following-up of 6 months and the average cured time (P > 0.05), but the cured time of complete facial paralysis in the group A and the group B were shorter than that in the group C (P < 0.05). The patient of acute Bell's facial paralysis can be treated with acupuncture and moxibustion, and traditional moxibustion can be replaced by far infrared way.

  14. Factors governing risk of cougar attacks on humans

    USGS Publications Warehouse

    Mattson, David; Logan, Kenneth; Sweanor, Linda

    2011-01-01

    Since the 1980s wildlife managers in the United States and Canada have expressed increasing concern about the physical threat posed by cougars (Puma concolor) to humans. We developed a conceptual framework and analyzed 386 human–cougar encounters (29 fatal attacks, 171 instances of nonfatal contact, and 186 close-threatening encounters) to provide information relevant to public safety. We conceived of human injury and death as the outcome of 4 transitions affected by different suites of factors: (1) a human encountering a cougar: (2) given an encounter, odds that the cougar would be aggressive; (3) given aggression, odds that the cougar would attack; and (4) given an attack, odds that the human would die. We developed multivariable logistic regression models to explain variation in odds at transitions three and four using variables pertaining to characteristics of involved people and cougars. Young (≤ 2.5 years) or unhealthy (by weight, condition, or disease) cougars were more likely than any others to be involved in close (typically <5 m) encounters that threatened the involved person. Of cougars in close encounters, females were more likely than males to attack, and of attacking animals, adults were more likely than juveniles to kill the victim (32% versus 9% fatality, respectively). During close encounters, victims who used a weapon killed the involved cougar in 82% of cases. Other mitigating behaviors (e.g., yelling, backing away, throwing objects, increasing stature) also substantially lessened odds of attack. People who were moving quickly or erratically when an encounter happened (running, playing, skiing, snowshoeing, biking, ATV-riding) were more likely to be attacked and killed compared to people who were less active (25% versus 8% fatality). Children (≤ 10 years) were more likely than single adults to be attacked, but intervention by people of any age reduced odds of a child’s death by 4.6×. Overall, cougar attacks on people in Canada and the

  15. Step to improve neural cryptography against flipping attacks.

    PubMed

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  16. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  17. Percolation of localized attack on isolated and interdependent random networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2014-03-01

    Percolation properties of isolated and interdependent random networks have been investigated extensively. The focus of these studies has been on random attacks where each node in network is attacked with the same probability or targeted attack where each node is attacked with a probability being a function of its centrality, such as degree. Here we discuss a new type of realistic attacks which we call a localized attack where a group of neighboring nodes in the networks are attacked. We attack a randomly chosen node, its neighbors, and its neighbor of neighbors and so on, until removing a fraction (1 - p) of the network. This type of attack reflects damages due to localized disasters, such as earthquakes, floods and war zones in real-world networks. We study, both analytically and by simulations the impact of localized attack on percolation properties of random networks with arbitrary degree distributions and discuss in detail random regular (RR) networks, Erdős-Rényi (ER) networks and scale-free (SF) networks. We extend and generalize our theoretical and simulation results of single isolated networks to networks formed of interdependent networks.

  18. Panic Attack during Elective Gastrointestinal Endoscopy.

    PubMed

    Mitsonis, Charalampos; Dimopoulos, Nikolaos; Zavrou, Marianna; Psarra, Vassiliki; Giofkos, Christos; Fiorakis, Christos; Dimitriadis, Athanasios; Valavanis, Dimitrios; Vousoura, Eleni; Zervas, Iannis; Papavassiliou, Efstathios

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y). Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, P < 0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, P < 0.05). Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  19. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annarita Giani; Eilyan Bitar; Miles McQueen

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacksmore » [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.« less

  20. Efficient replication of the novel human betacoronavirus EMC on primary human epithelium highlights its zoonotic potential.

    PubMed

    Kindler, Eveline; Jónsdóttir, Hulda R; Muth, Doreen; Hamming, Ole J; Hartmann, Rune; Rodriguez, Regulo; Geffers, Robert; Fouchier, Ron A M; Drosten, Christian; Müller, Marcel A; Dijkman, Ronald; Thiel, Volker

    2013-02-19

    The recent emergence of a novel human coronavirus (HCoV-EMC) in the Middle East raised considerable concerns, as it is associated with severe acute pneumonia, renal failure, and fatal outcome and thus resembles the clinical presentation of severe acute respiratory syndrome (SARS) observed in 2002 and 2003. Like SARS-CoV, HCoV-EMC is of zoonotic origin and closely related to bat coronaviruses. The human airway epithelium (HAE) represents the entry point and primary target tissue for respiratory viruses and is highly relevant for assessing the zoonotic potential of emerging respiratory viruses, such as HCoV-EMC. Here, we show that pseudostratified HAE cultures derived from different donors are highly permissive to HCoV-EMC infection, and by using reverse transcription (RT)-PCR and RNAseq data, we experimentally determined the identity of seven HCoV-EMC subgenomic mRNAs. Although the HAE cells were readily responsive to type I and type III interferon (IFN), we observed neither a pronounced inflammatory cytokine nor any detectable IFN responses following HCoV-EMC, SARS-CoV, or HCoV-229E infection, suggesting that innate immune evasion mechanisms and putative IFN antagonists of HCoV-EMC are operational in the new host. Importantly, however, we demonstrate that both type I and type III IFN can efficiently reduce HCoV-EMC replication in HAE cultures, providing a possible treatment option in cases of suspected HCoV-EMC infection. IMPORTANCE A novel human coronavirus, HCoV-EMC, has recently been described to be associated with severe respiratory tract infection and fatalities, similar to severe acute respiratory syndrome (SARS) observed during the 2002-2003 epidemic. Closely related coronaviruses replicate in bats, suggesting that, like SARS-CoV, HCoV-EMC is of zoonotic origin. Since the animal reservoir and circumstances of zoonotic transmission are yet elusive, it is critically important to assess potential species barriers of HCoV-EMC infection. An important first

  1. Public knowledge of heart attack in a Nepalese population survey.

    PubMed

    Limbu, Yuba R; Malla, Rabi; Regmi, Shyam R; Dahal, Ramesh; Nakarmi, Hari L; Yonzan, Ganesh; Gartaula, Ritu P

    2006-01-01

    Limited knowledge of heart attack symptoms may prevent patients from seeking time-dependent thrombolytic therapy, an intervention that offers impressive survival benefit. Previous studies carried out in developed countries demonstrated a deficit of knowledge about a wide range of heart attack symptoms. The aim of this study was to describe knowledge of heart attack, knowledge of heart attack symptoms, and anticipated first response to symptoms among the lay public in Nepal. A total of 1192 participants (657 men and 535 women age 16 to 88 years old) were interviewed in a cross-sectional manner. Those <16 years of age, all health professionals, and individuals with a history of heart attack were excluded. A total of 862 (72.3%) participants had heard of heart attack. Significantly more male than female participants had heard of heart attack (P <.001). Of the respondents, 91.7% with >or=10 years of education (ED-2) had heard of heart of attack, whereas only 54% respondents with <10 years of education or who were illiterate (unable to read and write) (ED-1) had heard of heart attack, and in both the male and female populations, a higher percentage of the ED-2 group had heard of heart attack than the ED-1 group (92.6% vs. 60% and 85.6% vs. 49.6%, respectively). A significantly higher number of respondents from 31 to 50 years of age (AGE-2) had heard of heart attack than those 16 to 30 years of age (AGE-1) and those >50 years of age (AGE-3) (P <.001). Among 862 respondents who had heard of heart attack, 21.3% could not name any heart attack symptoms. A total of 16 different heart attack symptoms were named. Fainting or collapsing (48%), chest pain (22.4%), shortness of breath (9%), dizziness (8.4%), palpitations (7.4%), and sweating (7.4%) were the leading symptoms named by respondents. Fainting or collapsing and chest pain and shortness of breath were named more frequently among the ED-2 group respondents and the AGE-3 group men. Only 3.7% could name >or=2 typical heart

  2. Panic attacks. Psychologic response or medical illness?

    PubMed

    Katerndahl, D A

    1984-06-01

    Panic attacks are surprisingly common in the United States, costing our economy more than $100 million per year in disability benefits and health care expenses. However, diagnosis is difficult and consequently many patients are treated for other conditions. When an underlying disorder is determined to be present, treatment of that disorder may ameliorate attacks. If none is present, panic symptoms will respond to a variety of drugs. Behavioral therapy may be necessary in severe cases or as adjunctive therapy after attacks abate.

  3. OPERATION COBRA. Deliberate Attack, Exploitation

    DTIC Science & Technology

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  4. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    NASA Astrophysics Data System (ADS)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  5. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    PubMed Central

    Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-01-01

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. PMID:29065461

  6. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    PubMed

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  7. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  8. Counteracting Power Analysis Attacks by Masking

    NASA Astrophysics Data System (ADS)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  9. Metrics for Assessment of Smart Grid Data Integrity Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annarita Giani; Miles McQueen; Russell Bent

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less

  10. Public Figure Attacks in the United States, 1995-2015.

    PubMed

    Meloy, J Reid; Amman, Molly

    2016-09-01

    An archival descriptive study of public figure attackers in the United States between 1995 and 2015 was undertaken. Fifty-six incidents were identified, primarily through exhaustive internet searches, composed of 58 attackers and 58 victims. A code book was developed which focused upon victims, offenders, pre-attack behaviors including direct threats, attack characteristics, post-offense and other outcomes, motivations and psychological abstracts. The average interrater agreement for coding of bivariate variables was 0.835 (intraclass correlation coefficient). The three most likely victim categories were politicians, judges, and athletes. Attackers were males, many with a psychiatric disorder, most were grandiose, and most had both a violent and nonviolent criminal history. The known motivations for the attacks were often angry and personal, the most common being dissatisfaction with a judicial or other governmental process (23%). In only one case was the primary motivation to achieve notoriety. Lethality risk during an attack was 55%. Collateral injury or death occurred in 29% of the incidents. Only 5% communicated a direct threat to the target beforehand. The term "publicly intimate figure" is introduced to describe the sociocultural blurring of public and private lives among the targets, and its possible role in some attackers' perceptions and motivations. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  11. Soluble CD40L Is a Useful Marker to Predict Future Strokes in Patients With Minor Stroke and Transient Ischemic Attack.

    PubMed

    Li, Jiejie; Wang, Yilong; Lin, Jinxi; Wang, David; Wang, Anxin; Zhao, Xingquan; Liu, Liping; Wang, Chunxue; Wang, Yongjun

    2015-07-01

    Elevated soluble CD40 ligand (sCD40L) was shown to be related to cardiovascular events, but the role of sCD40L in predicting recurrent stroke remains unclear. Baseline sCD40L levels were measured in 3044 consecutive patients with acute minor stroke and transient ischemic attack, who had previously been enrolled in the Clopidogrel in High-Risk Patients With Acute Nondisabling Cerebrovascular Events (CHANCE) trial. Cox proportional-hazards model was used to assess the association of sCD40L with recurrent stroke. Patients in the top tertile of sCD40L levels had increased risk of recurrent stroke comparing with those in the bottom tertile, after adjusted for conventional confounding factors (hazard ratio, 1.49; 95% confidence interval, 1.11-2.00; P=0.008). The patients with elevated levels of both sCD40L and high-sensitive C-reactive protein also had increased risk of recurrent stroke (hazard ratio, 1.81; 95% confidence interval, 1.23-2.68; P=0.003). Elevated sCD40L levels independently predict recurrent stroke in patients with minor stroke and transient ischemic attack. URL: http://www.clinicaltrials.gov. Unique identifier: NCT00979589. © 2015 American Heart Association, Inc.

  12. Shark attack in Natal.

    PubMed

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  13. Different approaches to acute organophosphorus poison treatment.

    PubMed

    Nurulain, Syed Muhammad

    2012-07-01

    Organophosphorus compounds (OPCs) have a wide variety of applications and are a serious threat for self-poisoning, unintentional misuse, terrorist attack, occupational hazard and warfare attack. The present standard treatment has been reported to be unsatisfactory. Many novel approaches are being used and tested for acute organophosphorus (OP) poison treatment. The bioscavenger concept captured high attention among the scientific community during the last few decades. Other approaches like alkalinisation of blood plasma/serum and use of weak inhibitors against strong inhibitors, though it showed promising results, did not get such wide attention. The introduction of a novel broad-spectrum oxime has also been in focus. In this mini-review, an update of the overview of four different approaches has been discussed. The standard therapy that is atropine+oxime+benzodiazepine along with supportive measures will continue to be the best option with only the replacement of a single oxime to improve its broad-spectrum efficacy.

  14. Sensitivity to carbon dioxide in subjects with a single lifetime panic attack: possible clinical "bedside" predictive test for panic disorder after a first attack.

    PubMed

    Berzak, Elina; Reznik, Mila; Narsia, Oxana; Benjamin, Jonathan

    2004-01-01

    There is currently no way of knowing whether a patient who has recently had a single panic attack has incipient panic disorder. Sensitivity to carbon dioxide (CO2) is lower in healthy volunteers than in panic disorder patients. If this is also true of people who experience a single lifetime panic attack, it could be used as a prognostic test. Subjects with a single lifetime panic attack and subjects with panic disorder received an inhalation of 35% CO2. Subjects completed the panic symptoms scale (PSS), and also stated whether they considered that they had experienced an attack. None of 14 subjects with a single lifetime panic attack, compared to 7 of 17 subjects with panic disorder (P=.009), had an attack. The PSS also distinguished between the groups. The 35% CO2 challenge warrants further investigation as a predictive test after a first panic attack.

  15. Can Vitamins Help Prevent a Heart Attack?

    MedlinePlus

    ... taking vitamins help prevent heart disease or a heart attack? Answers from Rekha Mankad, M.D. It's not yet clear ... risk of developing heart disease or having a heart attack. But, what is known is that no vitamin ...

  16. Studies of the vicarious traumatization of college students by the September 11th attacks: effects of proximity, exposure and connectedness.

    PubMed

    Blanchard, Edward B; Kuhn, Eric; Rowell, Dianna L; Hickling, Edward J; Wittrock, David; Rogers, Rebecca L; Johnson, Michelle R; Steckler, Debra C

    2004-02-01

    From mid-October 2001 through the end of November 2001, we collected fairly large sets of questionnaires from undergraduates at three public universities (Albany, NY, n = 507, Augusta, GA, n = 336, Fargo, ND, n = 526 ) to assess rate of acute stress disorder (ASD) and level of ASD symptoms following the September 11th attacks, rate of current posttraumatic stress disorder (PTSD) and level of PTSD symptoms, and current level of depressive symptoms resulting from the September 11th attacks. We also gathered information on exposure to media coverage of the attacks, connectedness to the World Trade Center (WTC) and personnel there, and degree of engagement in reparative acts such as giving blood, attending vigils. We found higher levels of ASD, ASD symptoms, PTSD and PTSD symptoms as a function of geographical proximity to New York City (and within the Albany site, proximity of students' homes) and gender. Exposure (hours of TV watched) was a predictor in some instances as was connectedness to WTC victims. ASD symptoms were the strongest predictor of subsequent PTSD symptoms. Path models accounted for over 60% of the variance in PTSD symptoms.

  17. Attacker-defender game from a network science perspective

    NASA Astrophysics Data System (ADS)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  18. Disparities in adult African American women's knowledge of heart attack and stroke symptomatology: an analysis of 2003-2005 Behavioral Risk Factor Surveillance Survey data.

    PubMed

    Lutfiyya, May Nawal; Cumba, Marites T; McCullough, Joel Emery; Barlow, Erika Laverne; Lipsky, Martin S

    2008-06-01

    Heart disease and stroke are the first and third leading causes of death of American women, respectively. African American women experience a disproportionate burden of these diseases compared with Caucasian women and are also more likely to delay seeking treatment for acute symptoms. As knowledge is a first step in seeking care, this study examined the knowledge of heart attack and stroke symptoms among African American women. This was a cross-sectional study analyzing 2003-2005 Behavioral Risk Factor Surveillance Survey (BRFSS) data. A composite heart attack and stroke knowledge score was computed for each respondent from the 13 heart attack and stroke symptom knowledge questions. Multivariate logistic regression was performed using low scores on the heart attack and stroke knowledge questions as the dependent variable. Twenty percent of the respondents were low scorers, and 23.8% were high scorers. Logistic regression analysis showed that adult African American women who earned low scores on the composite heart attack and stroke knowledge questions (range 0-8 points) were more likely to be aged 18-34 (OR = 1.36, CI 1.35, 1.37), be uninsured (OR = 1.32, CI 1.31, 1.33), have an annual household income <$35,000 (OR = 1.46, CI 1.45, 1.47), and have a primary healthcare provider (OR = 1.22, CI 1.20, 1.23). The findings indicated that knowledge of heart attack and stroke symptoms varied significantly among African American women, depending on socioeconomic variables. Targeting interventions to African American women, particularly those in lower socioeconomic groups, may increase knowledge of heart attack and stroke symptoms, subsequently improving preventive action taken in response to these conditions.

  19. Research on high power intra-channel crosstalk attack in optical networks

    NASA Astrophysics Data System (ADS)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  20. Transient Ischemic Attack

    MedlinePlus

    A transient ischemic attack (TIA) is a stroke that lasts only a few minutes. It happens when the blood supply to part of the brain is briefly blocked. Symptoms of a TIA are like other stroke symptoms, but do not ...

  1. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.

    PubMed

    Grosshans, Frédéric; Cerf, Nicolas J

    2004-01-30

    A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.

  2. Establishment and Characterization of Immortalized Human Amniotic Epithelial Cells

    PubMed Central

    Zhou, Kaixuan; Koike, Chika; Yoshida, Toshiko; Okabe, Motonori; Fathy, Moustafa; Kyo, Satoru; Kiyono, Tohru; Saito, Shigeru

    2013-01-01

    Abstract Human amniotic epithelial cells (HAEs) have a low immunogenic profile and possess potent immunosuppressive properties. HAEs also have several characteristics similar to stem cells, and they are discarded after parturition. Thus, they could potentially be used in cell therapy with fewer ethical problems. HAEs have a short life, so our aim is to establish and characterize immortalized human amniotic epithelial cells (iHAEs). HAEs were introduced with viral oncogenes E6/E7 and with human telomerase reverse transcriptase (hTERT) to create iHAEs. These iHAEs have proliferated around 200 population doublings (PDs) for at least 12 months. High expression of stem cell markers (Oct 3/4, Nanog, Sox2, Klf4) and epithelial markers (CK5, CK18) were detected by immunohistochemistry and reverse transcription polymerase chain reaction (RT-PCR). These iHAEs were expanded in ultra-low-attachment dishes to form spheroids similarly to epithelial stem/precursor cells. High expression of mesenchymal (CD44, CD73, CD90, CD105) and somatic (CD24, CD29, CD271, Nestin) stem cell markers was detected by flow cytometry. The iHAEs showed adipogenic, osteogenic, neuronal, and cardiac differentiation abilities. In conclusion, the immortalization of HAEs with the characteristics of stem cells has been established, allowing these iHAEs to become useful for cell therapy and regenerative medicine. PMID:23298399

  3. Risk factors for hypertensive attack during pheochromocytoma resection

    PubMed Central

    Kwon, Se Yun; Lee, Kyung Seop; Lee, Jun Nyung; Ha, Yun-Sok; Choi, Seock Hwan; Kim, Hyun Tae; Kim, Tae-Hwan; Yoo, Eun Sang

    2016-01-01

    Purpose We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. Materials and Methods Data from 53 patients diagnosed with pheochromocytoma at Kyungpook National Uriversity Medical Center between January 2000 and June 2012 were retrospectively analyzed. The subjects were divided into 2 groups depending on the presence or absence of hypertensive attack at the time of surgery. Patient demographic characteristics and preoperative evaluations were assessed for their prognostic relevance with respect to hypertensive attack. A univariate analysis was conducted, and a multivariate logistic regression analysis was also performed. Results In the univariate analysis, systolic blood pressure at presentation, preoperative hormonal status (including epinephrine, norepinephrine, vanillylmandelic acid, and metanephrine levels in a 24-hour urine sample), tumor size, and postoperative systolic blood pressure were significantly associated with the development of hypertensive attack. In the multivariate analysis, preoperative epinephrine level and tumor size were independent factors that predicted hypertensive attack. The highest odds ratio for tumor size (2.169) was obtained at a cutoff value of 4.25 cm and the highest odds ratio for preoperative epinephrine (1.020) was obtained at a cutoff value of 166.3 µg/d. Conclusions In this study, a large tumor size and an elevated preoperative urinary epinephrine level were risk factors for intraoperative hypertensive attack in patients with pheochromocytoma. PMID:27194549

  4. Effectiveness of the call in beach volleyball attacking play.

    PubMed

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-09

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  5. The use of combination therapies in the acute management of migraine.

    PubMed

    Krymchantowski, Abouch Valenty

    2006-09-01

    Migraine is a highly prevalent neurological disorder with multiple peripheral and central mechanisms. Targeting a single mechanism for treating individual attacks as well as for performing the prophylaxis has been shown to be only partially effective. Recently, the role of combining agents for acute migraine treatment has gained attention and the combination of a triptan plus a non-steroidal anti-inflammatory drug (NSAID) has demonstrated better efficacy. This review focuses on the fundamentals of treating migraine attacks with two or more agents, and emphasizes the characteristics of the recently approved fixed combination sumatriptan-naproxen. A PubMed search using the terms "migraine", "treatment", "acute", "triptans", "non-steroidal anti-inflammatory drugs", "sumatriptan", "naproxen", and "combination" was used. In addition, abstracts presented in the major meetings of the American Headache and the International Headache Societies along with the American Academy of Neurology were also evaluated. Although most of the few studies encountered were not controlled, there is a clear trend for better efficacy in combining triptans with NSAID. Additionally, the results of two recent large and controlled studies using fixed combinations of sumatriptan (50 mg and 85 mg) with 500 mg naproxen sodium confirm the initial observations of the clear superiority of this combination over the use of each agent alone. The differences in the endpoints 24-hour pain-relief response as well as pain-free and pain-relief parameters at 2-hour time-point are the most noticeable efficacy measures. Tolerability was not different between studied drugs. Combining triptans with NSAID and other agents for the acute treatment of migraine suggests better outcome efficacy measures than the use of single agents. The fixed combination of sumatriptan and naproxen sodium offers improved 2-hour and 24-hour benefits over monotherapy with each one these options. Recently issued FDA approval for marketing

  6. Case report: Pig attack with successful postexposure prophylaxis management.

    PubMed

    Hall, A Brad; Smith, David; Palmer, Jillian

    2014-05-01

    The domesticated pig or boar is ubiquitous to agriculture around the world and is an important food product in most countries. The males that are able to grow tusks that can approach 5 in are the primary contributor to morbidity and mortality from boar attacks. Literature surrounding domesticated boar attacks is sparse. There are no published cases of domesticated boar attacks that describe successful bacterial postexposure prophylaxis. We present a case report of an attack on an adult female by a domesticated boar.

  7. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  8. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-14

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  9. Outcomes following acute primary angle closure in an Asian population.

    PubMed

    Tan, Anna M; Loon, Seng C; Chew, Paul T K

    2009-07-01

    Data regarding development of primary angle closure glaucoma (PACG) following acute primary angle closure (APAC) is conflicting. This study looks at outcomes after an APAC episode with a secondary aim to identify any risk factors that could predict progression to PACG. This is a retrospective review of the charts of consecutive patients who were diagnosed with APAC from December 2003 to June 2006. All were treated in a standard manner with initial intensive medical therapy or laser iridoplasty followed by early laser peripheral iridotomy within 24 h of presentation. Forty-two eyes of 41 patients were analysed. The mean follow-up period was 27.3 +/- 16.2 months. Nine eyes (21.4%) developed an increase in intraocular pressure (IOP) within a mean of 11.9 months (median 5 months) after resolution of APAC. Eight eyes went on to have trabeculectomy or glaucoma drainage device. At final follow up, the mean IOP of attack eye was 13.3 +/- 2.92 mmHg. None of the eyes, including those that underwent surgery, required topical medication to control IOP. Thirty-eight eyes (90.5%) have BCVA of 6/6 to 6/12. The duration of symptoms before presentation (P = 0.00) and duration taken to abort the acute attack (P = 0.01) were found to be significantly associated with development of PACG. The results of this study suggest that outcomes following successful treatment of APAC may not be as poor as described previously. Early aggressive management of the acute episode may have a role to play in preventing development of PACG after APAC.

  10. Finite Energy and Bounded Attacks on Control System Sensor Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less

  11. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  12. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  13. Efficacy and safety of 400 and 800 mg etodolac vs. 1,000 mg paracetamol in acute treatment of migraine: a randomized, double-blind, crossover, multicenter, phase III clinical trial.

    PubMed

    Öztürk, Vesile; Ertaş, Mustafa; Baykan, Betül; Sirin, Hadiye; Özge, Aynur

    2013-03-01

    We aimed to determine the efficacy and safety of etodolac, in acute migraine attacks in comparison with paracetamol (acetaminophen). We designed a randomized, double-blind, crossover phase III clinical trial for patients diagnosed with migraine for at least 1 year, according to ICHD-II criteria. Two hundred and twenty-nine adult patients having 2 to 8 attacks monthly from 17 centers were included. The patients were instructed to use 3 attack treatment packages consisting of 1,000 mg paracetamol, 400 mg etodolac, and 800 mg etodolac on 3 migraine attacks of moderate-severe intensity each in a 3-month treatment period, interchangeably. Any pain medication was used in 1,570 migraine attacks while study treatments were used in 1,047 attacks. The results for 1,000 mg paracetamol, 400 mg etodolac, and 800 mg etodolac were as follows: response of headache at 2 hours 44.9%, 48.3% and 46.1%; pain-free at 2 hours 19.2%, 19.3% and 24.1%; sustained pain-free from 2 to 24 hours 34.3%, 38.3% and 41.1%; relapse rates in 2 to 24 hours 7.3%, 14.3% and 9.7%. There were no statistically significant differences between the groups regarding the headache response, pain-free, sustained pain-free, and relapse rates. Nausea, vomiting, phonophobia, or photophobia decreased similarly in all groups within 24 hours of treatment administration. Drug-related adverse events were noted in 8 patients with 1,000 mg paracetamol, in 9 patients with 400 mg etodolac and in 9 patients for 800 mg etodolac during the study. Our study showed that etodolac is a safe and effective alternative in acute migraine treatment and showed comparable efficacy to paracetamol 1,000 mg. Etodolac may be considered as an alternative option for acute treatment of migraine. © 2012 The Authors. Pain Practice © 2012 World Institute of Pain.

  14. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  15. Attack Helicopter Operations: Art or Science

    DTIC Science & Technology

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  16. Attack by Pyemotes johnmoseri (Acari: Pyemotidae)

    Treesearch

    Tulin Askit; Ibrahim Cakmak; John Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸it et al. 2003). This pest attacks...

  17. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  18. A Traceability Attack against e-Passports

    NASA Astrophysics Data System (ADS)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  19. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  20. A Unique Fatal Moose Attack Mimicking Homicide.

    PubMed

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  1. Recovery of infrastructure networks after localised attacks

    PubMed Central

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  2. Induction of panic attack by stimulation of the ventromedial hypothalamus.

    PubMed

    Wilent, W Bryan; Oh, Michael Y; Buetefisch, Cathrin M; Bailes, Julian E; Cantella, Diane; Angle, Cindy; Whiting, Donald M

    2010-06-01

    Panic attacks are sudden debilitating attacks of intense distress often accompanied by physical symptoms such as shortness of breath and heart palpitations. Numerous brain regions, hormones, and neurotransmitter systems are putatively involved, but the etiology and neurocircuitry of panic attacks is far from established. One particular brain region of interest is the ventromedial hypothalamus (VMH). In cats and rats, electrical stimulation delivered to the VMH has been shown to evoke an emotional "panic attack-like" escape behavior, and in humans, stimulation targeting nuclei just posterior or anterior to the VMH has reportedly induced panic attacks. The authors report findings obtained in an awake patient undergoing bilateral implantation of deep brain stimulation electrodes into the hypothalamus that strongly implicates the VMH as being critically involved in the genesis of panic attacks. First, as the stimulating electrode progressed deeper into the VMH, the intensity of stimulation required to evoke an attack systematically decreased; second, while stimulation of the VMH in either hemisphere evoked panic, stimulation that appeared to be in the center of the VMH was more potent. Thus, this evidence supports the role of the VMH in the induction of panic attacks purported by animal studies.

  3. Heart attacks triggered by huge mud slides in mountain regions and severe flooding in inhabited areas.

    PubMed

    Nagayoshi, Yasuhiro; Yumoto, Shinya; Sakaguchi, Kazuhisa; Shudo, Chiharu; Takino, Shiro; Hashiyama, Motohiro; Kai, Yutaka; Kuroda, Yutaka; Kawano, Hiroaki; Ogawa, Hisao

    2015-02-01

    On July 12, 2012, heavy rains struck southwest Japan, particularly in the Mount Aso area. Huge mud slides in the mountains destroyed houses, and heavy rains caused severe flooding in the inhabited areas. We investigated the incidence of cardiovascular events after the disaster. We investigated patients who were admitted to the emergency department (ED) from July 12 to August 31 in 2012. We reviewed all patients with cardiovascular events, including acute myocardial infarction (AMI), angina attack, worsening of congestive heart failure (CHF), cardiopulmonary arrest (CPA), arrhythmias, tako-tsubo cardiomyopathy (TC), and symptomatic venous thromboembolism (VTE). The total number of cardiovascular events was 28 (14 supraventricular arrhythmias, 3 angina attacks, 1 AMI, 1 VTE, 4 CHF, 1 TC and 4 CPA). There was a significant increase in cardiovascular events during the follow-up period in 2012 in comparison with the average number of these events over the same time period during the prior 2 years (16.8 vs. 5.1/month, p<0.01). There was a sharp increase in cardiovascular events in the first week after the disaster. A second peak was observed 7 weeks after the disaster. Two patients with angina attack were previously diagnosed as having vasospastic angina. The incidence rate of AMI did not increase. An increase in cardiovascular events was observed after severe rainfalls and mud slides. Prevention of disaster-induced cardiovascular events should be a priority regardless of the magnitude of the disaster. Copyright © 2014. Published by Elsevier Ltd.

  4. Optimal response to attacks on the open science grids.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in themore » grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.« less

  5. Robustness of network of networks under targeted attack.

    PubMed

    Dong, Gaogao; Gao, Jianxi; Du, Ruijin; Tian, Lixin; Stanley, H Eugene; Havlin, Shlomo

    2013-05-01

    The robustness of a network of networks (NON) under random attack has been studied recently [Gao et al., Phys. Rev. Lett. 107, 195701 (2011)]. Understanding how robust a NON is to targeted attacks is a major challenge when designing resilient infrastructures. We address here the question how the robustness of a NON is affected by targeted attack on high- or low-degree nodes. We introduce a targeted attack probability function that is dependent upon node degree and study the robustness of two types of NON under targeted attack: (i) a tree of n fully interdependent Erdős-Rényi or scale-free networks and (ii) a starlike network of n partially interdependent Erdős-Rényi networks. For any tree of n fully interdependent Erdős-Rényi networks and scale-free networks under targeted attack, we find that the network becomes significantly more vulnerable when nodes of higher degree have higher probability to fail. When the probability that a node will fail is proportional to its degree, for a NON composed of Erdős-Rényi networks we find analytical solutions for the mutual giant component P(∞) as a function of p, where 1-p is the initial fraction of failed nodes in each network. We also find analytical solutions for the critical fraction p(c), which causes the fragmentation of the n interdependent networks, and for the minimum average degree k[over ¯](min) below which the NON will collapse even if only a single node fails. For a starlike NON of n partially interdependent Erdős-Rényi networks under targeted attack, we find the critical coupling strength q(c) for different n. When q>q(c), the attacked system undergoes an abrupt first order type transition. When q≤q(c), the system displays a smooth second order percolation transition. We also evaluate how the central network becomes more vulnerable as the number of networks with the same coupling strength q increases. The limit of q=0 represents no dependency, and the results are consistent with the classical

  6. The non-trusty clown attack on model-based speaker recognition systems

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2015-03-01

    Biometric detectors for speaker identification commonly employ a statistical model for a subject's voice, such as a Gaussian Mixture Model, that combines multiple means to improve detector performance. This allows a malicious insider to amend or append a component of a subject's statistical model so that a detector behaves normally except under a carefully engineered circumstance. This allows an attacker to force a misclassification of his or her voice only when desired, by smuggling data into a database far in advance of an attack. Note that the attack is possible if attacker has access to database even for a limited time to modify victim's model. We exhibit such an attack on a speaker identification, in which an attacker can force a misclassification by speaking in an unusual voice, and replacing the least weighted component of victim's model by the most weighted competent of the unusual voice of the attacker's model. The reason attacker make his or her voice unusual during the attack is because his or her normal voice model can be in database, and by attacking with unusual voice, the attacker has the option to be recognized as himself or herself when talking normally or as the victim when talking in the unusual manner. By attaching an appropriately weighted vector to a victim's model, we can impersonate all users in our simulations, while avoiding unwanted false rejections.

  7. Feasibility of Multiple Burr Hole With Erythropoietin in Acute Moyamoya Patients.

    PubMed

    Hong, Ji Man; Lee, Seong-Joon; Lee, Jin Soo; Choi, Mun Hee; Lee, Sung Eun; Choi, Jin Wook; Lim, Yong Cheol

    2018-05-01

    In patients with acute symptomatic moyamoya (<2 weeks), the feasibility of a combination therapy of multiple burr hole procedure under local anesthesia and intravenous erythropoietin pretreatment was assessed. We also identified the factors associated with transdural revascularization. In this prospective single-arm study, perfusion-impaired patients presenting with transient ischemic attack or acute cerebral infarction were assessed. Combination therapy was performed to patients lacking transdural collaterals. Primary outcomes were evaluated clinically with modified Rankin Scale scores and radiologically with revascularization success (transhemispheric, trans-burr hole, and sufficient revascularizations [filling ≥33% of ipsilateral supratentorium]) at 6 months. Treatment-related adverse events were analyzed in 3 phases: pre burr hole, post burr hole, and after-discharge as secondary outcome. Factors associated with sufficient revascularization were investigated. Fifty hemispheres from 37 patients were included. Compared with discharge, modified Rankin Scale score at 6 months significantly improved (2.0 [0.0-5.0] versus 1.0 [0.0-4.0]; P <0.001). Majority had successful revascularization: trans-burr hole arteriogenesis (89.5%), transhemispheric arteriogenesis (98.0%), and sufficient revascularization (52.0%). There was no significant pre burr hole or post burr hole complication. Two (5.4%) transient ischemic attack and 1 (2.7%) cerebral infarction occurred after discharge. Presentation with acute infarction (odds ratio, 4.8; 95% confidence interval, 1.1-21.4), ipsilateral basal moyamoya vessels (odds ratio, 13.9; 95% confidence interval, 1.3-144.2), and delayed mean transit time (odds ratio, 3.9; 95% confidence interval, 1.3-12.2) predicted sufficient revascularization. Combination therapy allows safe and effective revascularization in moyamoya patients with acute ischemic presentation. URL: https://www.clinicaltrials.gov. Unique identifier: NCT03162588. © 2018

  8. Defending networks against denial-of-service attacks

    NASA Astrophysics Data System (ADS)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  9. Deterring watermark collusion attacks using signal processing techniques

    NASA Astrophysics Data System (ADS)

    Lemma, Aweke N.; van der Veen, Michiel

    2007-02-01

    Collusion attack is a malicious watermark removal attack in which the hacker has access to multiple copies of the same content with different watermarks and tries to remove the watermark using averaging. In the literature, several solutions to collusion attacks have been reported. The main stream solutions aim at designing watermark codes that are inherently resistant to collusion attacks. The other approaches propose signal processing based solutions that aim at modifying the watermarked signals in such a way that averaging multiple copies of the content leads to a significant degradation of the content quality. In this paper, we present signal processing based technique that may be deployed for deterring collusion attacks. We formulate the problem in the context of electronic music distribution where the content is generally available in the compressed domain. Thus, we first extend the collusion resistance principles to bit stream signals and secondly present experimental based analysis to estimate a bound on the maximum number of modified versions of a content that satisfy good perceptibility requirement on one hand and destructive averaging property on the other hand.

  10. Coping strategies as mediators of the relationship between sense of coherence and stress reactions: Israeli adolescents under missile attacks.

    PubMed

    Braun-Lewensohn, Orna; Sagy, Shifra; Roth, Guy

    2011-05-01

    This study aimed to explore the relationships between sense of coherence (SOC) and stress reactions as mediated by cognitive appraisal and coping strategies among adolescents facing the acute stressful situation of missile attacks. Employing the Salutogenic Model and the interactionist approach to coping, we asked what the roles of situational factors such as coping strategies and cognitive appraisal were in mediating the relationship between SOC and stress reactions. Data were gathered during January 2009 when hundreds of missiles fell in southern Israel. One hundred and thirty eight adolescents filled out questionnaires dealing with SOC, cognitive appraisal (endangerment feelings), Adolescent Coping Scale, state anxiety, state anger, and psychological distress. Overall, our model explained 55% of the variance in stress reactions. SOC had the strongest total direct and indirect effects. Previous findings have indicated SOC as playing only a limited role in explaining stress reactions in acute stress situations. The results of this study highlight the potential of SOC as a powerful resilience factor even in an acute situation, through mediation of situational factors.

  11. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    NASA Astrophysics Data System (ADS)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  12. Douglas-fir beetle attack and tree mortality following wildfire

    Treesearch

    Sharon M. Hood; Barbara Bentz; Kevin C. Ryan

    2003-01-01

    A major concern after wildfires is the buildup of bark beetle populations in fire injured trees, and subsequent attack and population buildup in adjacent unburned areas. To examine this concern, we documented fire injury and insect attacks in Douglas-fir (Pseudotsuga menziesii) on the 2001 Green Knoll Fire, Wyoming to determine attack preferences, brood production, and...

  13. Mass casualty response in the 2008 Mumbai terrorist attacks.

    PubMed

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  14. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  15. Manned and Unmanned Aircraft Effectiveness in Fast Attack Craft / Fast Inshore Attack Craft ASUW Kill Chain Execution

    DTIC Science & Technology

    2016-09-01

    par. 4) Based on a RED projected size of 22.16 m, a sample calculation for the unadjusted single shot probability of kill for HELLFIRE missiles is...framework based on intelligent objects (SIMIO) environment to model a fast attack craft/fast inshore attack craft anti-surface warfare expanded kill chain...concept of operation efficiency. Based on the operational environment, low cost and less capable unmanned aircraft provide an alternative to the

  16. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  17. Using the Domain Name System to Thwart Automated Client-Based Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less

  18. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  19. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

  20. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  1. International consensus and practical guidelines on the gynecologic and obstetric management of female patients with hereditary angioedema caused by C1 inhibitor deficiency.

    PubMed

    Caballero, Teresa; Farkas, Henriette; Bouillet, Laurence; Bowen, Tom; Gompel, Anne; Fagerberg, Christina; Bjökander, Janne; Bork, Konrad; Bygum, Anette; Cicardi, Marco; de Carolis, Caterina; Frank, Michael; Gooi, Jimmy H C; Longhurst, Hilary; Martínez-Saguer, Inmaculada; Nielsen, Erik Waage; Obtulowitz, Krystina; Perricone, Roberto; Prior, Nieves

    2012-02-01

    There are a limited number of publications on the management of gynecologic/obstetric events in female patients with hereditary angioedema caused by C1 inhibitor deficiency (HAE-C1-INH). We sought to elaborate guidelines for optimizing the management of gynecologic/obstetric events in female patients with HAE-C1-INH. A roundtable discussion took place at the 6th C1 Inhibitor Deficiency Workshop (May 2009, Budapest, Hungary). A review of related literature in English was performed. Contraception: Estrogens should be avoided. Barrier methods, intrauterine devices, and progestins can be used. Pregnancy: Attenuated androgens are contraindicated and should be discontinued before attempting conception. Plasma-derived human C1 inhibitor concentrate (pdhC1INH) is preferred for acute treatment, short-term prophylaxis, or long-term prophylaxis. Tranexamic acid or virally inactivated fresh frozen plasma can be used for long-term prophylaxis if human plasma-derived C1-INH is not available. No safety data are available on icatibant, ecallantide, or recombinant human C1-INH (rhC1INH). Parturition: Complications during vaginal delivery are rare. Prophylaxis before labor and delivery might not be clinically indicated, but pdhC1INH therapeutic doses (20 U/kg) should be available. Nevertheless, each case should be treated based on HAE-C1-INH symptoms during pregnancy and previous labors. pdhC1INH prophylaxis is advised before forceps or vacuum extraction or cesarean section. Regional anesthesia is preferred to endotracheal intubation. Breast cancer: Attenuated androgens should be avoided. Antiestrogens can worsen angioedema symptoms. In these cases anastrozole might be an alternative. Other issues addressed include special features of HAE-C1-INH treatment in female patients, genetic counseling, infertility, abortion, lactation, menopause treatment, and endometrial cancer. A consensus for the management of female patients with HAE-C1-INH is presented. Copyright © 2012 American

  2. Triptans for acute cluster headache

    PubMed Central

    Law, Simon; Derry, Sheena; Moore, R Andrew

    2014-01-01

    Background Cluster headache is an uncommon, but severely painful and disabling condition, with rapid onset. Validated treatment options are limited, and first-line therapy includes inhaled oxygen. Alternative therapies such as intranasal lignocaine and ergotamine are not as commonly used and are less well studied. Triptans are successfully used to treat migraine attacks and, because of this, they may also be useful for cluster headache. Objectives To determine the efficacy and tolerability of triptans for the acute treatment of cluster headaches. Search methods We searched Cochrane CENTRAL, MEDLINE and EMBASE for studies through 22 January 2010. Selection criteria Randomised, double-blind, placebo-controlled studies of triptans for acute treatment of cluster headache episodes. Data collection and analysis Two review authors independently assessed study quality and extracted data. Numbers of participants with different levels of pain relief, requiring rescue medication and experiencing adverse events and headache-associated symptoms in treatment and control groups were used to calculate relative risk and numbers needed to treat (NNT) and harm (NNH). Main results All six included studies used a single dose of triptan to treat an attack of moderate to severe pain intensity. In total 231 participants received zolmitriptan 5 mg, 223 received zolmitriptan 10 mg, 131 received sumatriptan 6 mg, 88 received sumatriptan 12 mg, and 326 received placebo. Zolmitriptan was administered either orally or intranasally, and sumatriptan either subcutaneously or intranasally. Overall, the triptans studied were better than placebo for headache relief and pain-free responses, with an NNT of 2.4 for 15 minute pain relief with subcutaneous sumatriptan 6 mg (75% with sumatriptan and 32% with placebo), and 2.8 for 30 minute pain relief with intranasal zolmitriptan 10 mg (62% with zolmitriptan and 26% with placebo). Fewer participants need rescue medication with triptan than with placebo

  3. The international WAO/EAACI guideline for the management of hereditary angioedema-The 2017 revision and update.

    PubMed

    Maurer, M; Magerl, M; Ansotegui, I; Aygören-Pürsün, E; Betschel, S; Bork, K; Bowen, T; Balle Boysen, H; Farkas, H; Grumach, A S; Hide, M; Katelaris, C; Lockey, R; Longhurst, H; Lumry, W R; Martinez-Saguer, I; Moldovan, D; Nast, A; Pawankar, R; Potter, P; Riedl, M; Ritchie, B; Rosenwasser, L; Sánchez-Borges, M; Zhi, Y; Zuraw, B; Craig, T

    2018-01-10

    Hereditary Angioedema (HAE) is a rare and disabling disease. Early diagnosis and appropriate therapy are essential. This update and revision of the global guideline for HAE provides up-to-date consensus recommendations for the management of HAE. In the development of this update and revision of the guideline, an international expert panel reviewed the existing evidence and developed 20 recommendations that were discussed, finalized and consented during the guideline consensus conference in June 2016 in Vienna. The final version of this update and revision of the guideline incorporates the contributions of a board of expert reviewers and the endorsing societies. The goal of this guideline update and revision is to provide clinicians and their patients with guidance that will assist them in making rational decisions in the management of HAE with deficient C1-inhibitor (type 1) and HAE with dysfunctional C1-inhibitor (type 2). The key clinical questions covered by these recommendations are: (1) How should HAE-1/2 be defined and classified?, (2) How should HAE-1/2 be diagnosed?, (3) Should HAE-1/2 patients receive prophylactic and/or on-demand treatment and what treatment options should be used?, (4) Should HAE-1/2 management be different for special HAE-1/2 patient groups such as pregnant/lactating women or children?, and (5) Should HAE-1/2 management incorporate self-administration of therapies and patient support measures? © 2018 EAACI and John Wiley and Sons A/S. Published by John Wiley and Sons Ltd.

  4. Injury, intense dust exposure, and chronic disease among survivors of the World Trade Center terrorist attacks of September 11, 2001.

    PubMed

    Alper, Howard E; Yu, Shengchao; Stellman, Steven D; Brackbill, Robert M

    2017-12-01

    The World Trade Center attack of September 11, 2001 in New York City (9/11) exposed thousands of people to intense concentrations of hazardous materials that have resulted in reports of increased levels of asthma, heart disease, diabetes, and other chronic diseases along with psychological illnesses such as post-traumatic stress disorder (PTSD). Few studies have discriminated between health consequences of immediate (short-term or acute) intense exposures versus chronic residential or workplace exposures. We used proportional hazards methods to determine adjusted hazard ratios (AHRs) for associations between several components of acute exposures (e.g., injury, immersion in the dust cloud) and four chronic disease outcomes: asthma, other non-neoplastic lung diseases, cardiovascular disease, and diabetes, in 8701 persons free of those conditions prior to exposure and who were physically present during or immediately after the World Trade Center attacks. Participants were followed prospectively up to 11 years post-9/11. Heart disease exhibited a dose-response association with sustaining injury (1 injury type: AHR =2.0, 95% CI (Confidence Interval) 1.1-3.6; 2 injury types: AHR = 3.1, 95% CI 1.2-7.9; 3 or more injury types: AHR = 6.8, 95% CI 2.0-22.6), while asthma and other lung diseases were both significantly associated with dust cloud exposure (AHR = 1.3, 95% CI 1.0-1.6). Diabetes was not associated with any of the predictors assessed in this study. In this study we demonstrated that the acute exposures of injury and dust cloud that were sustained on 9/11/2001 had significant associations with later heart and respiratory diseases. Continued monitoring of 9/11 exposed persons' health by medical providers is warranted for the foreseeable future.

  5. Shark attack: review of 86 consecutive cases.

    PubMed

    Woolgar, J D; Cliff, G; Nair, R; Hafez, H; Robbs, J V

    2001-05-01

    On average there are approximately 50 confirmed shark attacks worldwide annually. Despite their rarity, such incidents often generate much public and media attention. The injuries of 86 consecutive victims of shark attack were reviewed from 1980 to 1999. Clinical data retrieved from the South African Shark Attack Files, maintained by the Natal Sharks Board, were retrospectively analyzed to determine the nature, treatment, and outcome of injuries. The majority of victims (n = 68 [81%]) had relatively minor injuries that required simple primary suture. Those patients (n = 16 [19%]) with more extensive limb lacerations longer than 20 cm or with soft-tissue loss of more than one myofascial compartment were associated with higher morbidity and limb loss. In 8 of the 10 fatalities, death occurred as a result of exsanguinating hemorrhage from a limb vascular injury. Victims of shark attack usually sustain only minor injuries. In more serious cases, particularly if associated with a major vascular injury, hemorrhage control and early resuscitation are of utmost importance during the initial management if these patients are to survive.

  6. [Blood endotoxin in acute pancreatitis using limulus amebocyte lysate test (LAL test)].

    PubMed

    Pierrakakis, S; Xepapadakis, G; Mega, A M; Megas, T; Katergiannakis, V G; Perpirakis, G; Filippakis, M

    1990-03-15

    Forty-five cases of acute pancreatitis observed during the period 1986-88 were included in this study. Four of the 45 patients were operated during the acute phase and of these, two died. The remaining 41 patients were treated with conservative therapy using the application of a nasogastric tube, analgesics, and the endovenous administration of various solutions and antibiotics. The severity of each attack of pancreatitis was assessed according to Ranson and Agarwal's criteria. In severe cases (more than 3 of Ranson's criteria) the presence of endotoxin in the systemic circulation was shown using the "limulus" method, together with contemporary low levels of C3 complement factor. As is evident from the results of the study, the presence of endotoxinemia and the low level of C3 in acute pancreatitis are related to the high percentage of complications.

  7. Cost-effectiveness of gammaCore (non-invasive vagus nerve stimulation) for acute treatment of episodic cluster headache.

    PubMed

    Mwamburi, Mkaya; Liebler, Eric J; Tenaglia, Andrew T

    2017-11-01

    Cluster headache is a debilitating disease characterized by excruciatingly painful attacks that affects 0.15% to 0.4% of the US population. Episodic cluster headache manifests as circadian and circannual seasonal bouts of attacks, each lasting 15 to 180 minutes, with periods of remission. In chronic cluster headache, the attacks occur throughout the year with no periods of remission. While existing treatments are effective for some patients, many patients continue to suffer. There are only 2 FDA-approved medications for episodic cluster headache in the United States, while others, such as high-flow oxygen, are used off-label. Episodic cluster headache is associated with comorbidities and affects work, productivity, and daily functioning. The economic burden of episodic cluster headache is considerable, costing more than twice that of nonheadache patients. gammaCore adjunct to standard of care (SoC) was found to have superior efficacy in treatment of acute episodic cluster headaches compared with sham-gammaCore used with SoC in ACT1 and ACT2 trials. However, the economic impact has not been characterized for this indication. We conducted a cost-effectiveness analysis of gammaCore adjunct to SoC compared with SoC alone for the treatment of acute pain associated with episodic cluster headache attacks. The model structure was based on treatment of acute attacks with 3 outcomes: failures, nonresponders, and responders. The time horizon of the model is 1 year using a payer perspective with uncertainty incorporated. Parameter inputs were derived from primary data from the randomized controlled trials for gammaCore. The mean annual costs associated with the gammaCore-plus-SoC arm was $9510, and mean costs for the SoC-alone arm was $10,040. The mean quality-adjusted life years for gammaCore-plus-SoC arm were 0.83, and for the SoC-alone arm, they were 0.74. The gammaCore-plus-SoC arm was dominant over SoC alone. All 1-way and multiway sensitivity analyses were cost

  8. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  9. Appearance of acute gouty arthritis on indium-111-labeled leukocyte scintigraphy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Palestro, C.J.; Vega, A.; Kim, C.K.

    1990-05-01

    Indium-111-labeled leukocyte scintigraphy was performed on a 66-yr-old male with polyarticular acute gouty arthritis. Images revealed intense labeled leukocyte accumulation in a pattern indistinguishable from septic arthritis, in both knees and ankles, and the metatarsophalangeal joint of both great toes, all of which were involved in the acute gouty attack. Joint aspirate as well as blood cultures were reported as no growth; the patient was treated with intravenous colchicine and ACTH for 10 days with dramatic improvement noted. Labeled leukocyte imaging, repeated 12 days after the initial study, revealed near total resolution of joint abnormalities, concordant with the patient's clinicalmore » improvement. This case demonstrates that while acute gouty arthritis is a potential pitfall in labeled leukocyte imaging, in the presence of known gout, it may provide a simple, objective, noninvasive method of evaluating patient response to therapy.« less

  10. A Randomized Trial of Ketorolac vs Sumatripan vs Placebo Nasal Spray (KSPN) for Acute Migraine

    PubMed Central

    Rao, Aruna S.; Gelaye, Bizu; Kurth, Tobias; Dash, Paul D.; Nitchie, Haley; Peterlin, B. Lee

    2016-01-01

    Objective To compare the efficacy of ketorolac nasal spray (NS) vs placebo and sumatriptan NS for the acute treatment of migraine. Methods This was a randomized, double-blind, placebo and active-comparator, crossover study. Adult migraineurs were randomized to ketorolac NS 31.5 mg, sumatriptan NS 20 mg, or placebo to treat three moderate to severe migraine attacks and switched treatments with each attack. Patients seeking headache care at a headache center or in response to community advertisement were recruited. Adult participants with episodic migraine who experienced ≥2 migraine attacks per month were eligible for the Ketorolac vs Sumatriptan vs Placebo Nasal Spray migraine study. Participants were randomized to treatment arms by a research pharmacist, in a 1:1:1 ratio using computer-generated lists. The primary outcome was 2-hour pain relief. Secondary outcomes included 2-hour pain freedom and absence of migraine associated symptoms, and 24-hour sustained pain relief and pain freedom. Results Of the 72 randomized participants, 54 (75%) treated at least one attack and 49 (68%) completed all three treatments, for a total of 152 treated migraine attacks. Both ketorolac NS (72.5%, P < .001) and sumatriptan NS (69.4%, P=.001) were more effective than placebo (38.3%) for 2-hour pain relief and 2-hour pain freedom (ketorolac: 43.1%, P=.004; sumatriptan: 36.7%, P=.046; placebo: 18.4%). Ketorolac NS, but not sumatriptan NS, was more effective than placebo in 2-hour absence of nausea. Both ketorolac NS and sumatriptan NS were more effective than placebo for 24-hour sustained pain relief (ketorolac: 49%, P < .001; sumatriptan: 31%, P=.01, placebo: 20%). Only ketorolac NS was superior to placebo for 24-hour (ketorolac: 35.3%, P=.003; sumatriptan: 22.4%, P=.18, placebo: 12.2%) sustained pain freedom. Nasal burning and dysgeusia were the most common adverse effects for active treatments. Conclusions This study supports that ketorolac NS is superior to placebo and that it

  11. The role of mental disorder in attacks on European politicians 1990-2004.

    PubMed

    James, D V; Mullen, P E; Meloy, J R; Pathé, M T; Farnham, F R; Preston, L; Darnley, B

    2007-11-01

    The only systematic studies of attacks on public figures come from the USA. These studies de-emphasize the role of mental illness and suggest threats are of no predictive value. This study re-examines these questions through a study of attacks on European politicians. All non-terrorist attacks on elected politicians in Western Europe between 1990 and 2004 were analysed. Twenty-four attacks were identified, including five involving fatalities, and eight serious injuries. Ten attackers were psychotic, four drunk, nine politically motivated and one unclassifiable. Eleven attackers evidenced warning behaviours. The mentally disordered, most of whom gave warnings, were responsible for most of the fatal and seriously injurious attacks. A greater awareness of the link between delusional fixations on public figures and subsequent attacks could aid prevention. Equally importantly, recognition would encourage earlier intervention in people who, irrespective of whether they eventually attack, have delusional preoccupations which ruin their lives.

  12. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  13. Muscular imbalance and shoulder pain in volleyball attackers.

    PubMed Central

    Kugler, A; Krüger-Franke, M; Reininger, S; Trouillier, H H; Rosemeyer, B

    1996-01-01

    OBJECTIVE: In overhead sports such as volleyball, baseball, or tennis shoulder problems are very common. The aim of this study was to identify features which may correlate with shoulder problems in volleyball attackers. METHODS: 30 competitive volleyball attackers (mean age 25 years) were included in the study; 15 were suffering from shoulder pain and 15 had no history of shoulder pain. The results were compared with those of a control group of 15 recreational athletes without any overhead sports activities. RESULTS: Volleyball attackers have a different muscular and capsular pattern at the playing shoulder compared to the opposite shoulder. Their playing shoulder is depressed, the scapula lateralised, and the dorsal muscles and the posterior and inferior part of the shoulder capsule shortened. These differences were of more significance in volleyball attackers with shoulder pain than in volleyball players without shoulder pain. In contrast to recreational athletes without any overhead sports activity, there were no significant difference in the comparison of the two shoulders. The histories, clinical and sonographic findings did not reveal further typical features for volleyball attackers with shoulder pain. CONCLUSIONS: Muscular balance of the shoulder girdle is very important in this sport. It is therefore imperative to include adequate stretching and muscular training programme for the prevention, as well as for therapy, of shoulder pain in volleyball attackers. Images Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 PMID:8889124

  14. Learning from history: The Glasgow Airport terrorist attack.

    PubMed

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  15. Gait biometrics under spoofing attacks: an experimental investigation

    NASA Astrophysics Data System (ADS)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  16. Flashbulb memories of the Paris attacks.

    PubMed

    Gandolphe, Marie-Charlotte; El Haj, Mohamad

    2017-06-01

    Flashbulb memories are vivid autobiographical memories of the circumstances where an individual first learns about emotionally significant public events. Our paper assesses whether these memories were triggered by the attacks of Friday 13 November 2015 in Paris. Two hundred and ninety-one participants answered a web-based questionnaire that assessed their memory of the circumstances in which they first learned of the attacks. The questionnaire also assessed vividness, rehearsal, emotion, surprise and novelty. The results showed substantial and vivid recall of the context in which the participants first learned of the event. This recall was associated with fair rehearsal, negative emotional valence, surprise, and novelty. Regression analysis showed that the flashbulb recall was predicted by negative emotion. Negative emotion seems to play a key role in the formation of flashbulb memories, at least those associated with the Paris attacks. © 2017 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  17. Epidemics of panic during a bioterrorist attack--a mathematical model.

    PubMed

    Radosavljevic, Vladan; Radunovic, Desanka; Belojevic, Goran

    2009-09-01

    A bioterrorist attacks usually cause epidemics of panic in a targeted population. We have presented epidemiologic aspect of this phenomenon as a three-component model--host, information on an attack and social network. We have proposed a mathematical model of panic and counter-measures as the function of time in a population exposed to a bioterrorist attack. The model comprises ordinary differential equations and graphically presented combinations of the equations parameters. Clinically, we have presented a model through a sequence of psychic conditions and disorders initiated by an act of bioterrorism. This model might be helpful for an attacked community to timely and properly apply counter-measures and to minimize human mental suffering during a bioterrorist attack.

  18. Non-harmful insertion of data mimicking computer network attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  19. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  20. Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy

    PubMed Central

    Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P

    2002-01-01

    Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044

  1. Comparing the Roles of EUS, ERCP and MRCP in Idiopathic Acute Recurrent Pancreatitis.

    PubMed

    Safari, Mohammad Taghi; Miri, Mohammad Bager; Ebadi, Shahram; Shahrokh, Shabnam; Mohammad Alizadeh, Amir Houshang

    2016-01-01

    Acute recurrent pancreatitis (ARP) is defined as more than two attacks of acute pancreatitis with complete or almost complete resolution of symptoms and signs of pancreatitis between episodes. The initial evaluation fails to detect the cause of ARP in 10%-30% of patients, whose condition is classified as idiopathic ARP. Endoscopic ultrasound (EUS) has gained increasing attention as a useful imaging modality for the pancreas and the extrahepatic biliary tree. The close proximity of the pancreas to the digestive tract allows EUS to obtain detailed images of this organ. This review aims to record pancreaticobiliary endoscopic ultrasound (EUS) and other imaging modalities in the clinical management of patients with idiopathic ARP.

  2. Network overload due to massive attacks

    NASA Astrophysics Data System (ADS)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  3. Flashbulb memories of Paris attacks

    PubMed Central

    El Haj, Mohamad; Gandolphe, Marie-Charlotte; Wawrziczny, Emilie; Antoine, Pascal

    2016-01-01

    Abstract Rationale: Flashbulb memories are detailed and vivid memories of attributes of the reception context of surprising and emotionally arousing public events. Patient concerns and diagnosis: This paper offers a fine-grained view of flashbulb memories in a patient with mild Alzheimer's disease (AD). Interventions: The patient underwent a directed interview about the 13 November 2015 attacks in Paris. Outcomes: Unlike her memory about the date and month of the attacks, the patient provided accurate information about the year, time and places they occurred. The patient also provided accurate information about how she first became aware of the attacks, where she was, with whom, what she was doing, and what time it was when she learned about them. As for the affective characteristics of these memories, she tended to have high ratings of vividness and rehearsal. Negative emotional states and great surprise and novelty were also reported. Lessons: By assessing the impact of flashbulb memories in this patient with AD, this paper offers a unique view into how such memories may trigger a considerable recall of context as well much subjective reliving. PMID:27861395

  4. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    NASA Astrophysics Data System (ADS)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  5. Colonoscopy-induced acute diverticulitis: myth or reality?

    PubMed

    Gorgun, Emre; Isik, Ozgen; Sapci, Ipek; Aytac, Erman; Abbas, Maher A; Ozuner, Gokhan; Church, James; Steele, Scott R

    2018-07-01

    Colonoscopy in patients with diverticulosis can be technically challenging and limited data exist relating to the risk of post-colonoscopy diverticulitis. Our aim was to evaluate the incidence, management, and outcomes of acute diverticulitis following colonoscopy. Study design is retrospective cohort study. Data were gathered by conducting an automated search of the electronic patient database using current procedural terminology and ICD-9 codes. Patients who underwent a colonoscopy from 2003 to 2012 were reviewed to find patients who developed acute diverticulitis within 30 days after colonoscopy. Patient demographics and colonoscopy-related outcomes were documented, which include interval between colonoscopy and diverticulitis, colonoscopy indication, simultaneous colonoscopic interventions, and follow-up after colonoscopy. From 236,377 colonoscopies performed during the study period, 68 patients (mean age 56 years) developed post-colonoscopy diverticulitis (0.029%; 2.9 per 10,000 colonoscopies). Incomplete colonoscopies were more frequent among patients with a history of previous diverticulitis [n = 10 (29%) vs. n = 3 (9%), p = 0.03]. Mean time to develop diverticulitis after colonoscopy was 12 ± 8 days, and 30 (44%) patients required hospitalization. 34 (50%) patients had a history of diverticulitis prior to colonoscopy. Among those patients, 14 underwent colonoscopy with an indication of surveillance for previous disease. When colonoscopy was performed within 6 weeks of a diverticulitis attack, surgical intervention was required more often when compared with colonoscopies performed after 6 weeks of an acute attack [n = 6 (100%) vs. n = 10 (36%), p = 0.006]. 6 (9%) out of 68 patients received emergency surgical treatment. 15 (24%) out of 62 patients who had non-surgical treatment initially underwent an elective sigmoidectomy at a later date. Recurrent diverticulitis developed in 16 (23%) patients after post

  6. Robustness of Controllability for Networks Based on Edge-Attack

    PubMed Central

    Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong

    2014-01-01

    We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components. PMID:24586507

  7. Robustness of controllability for networks based on edge-attack.

    PubMed

    Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong

    2014-01-01

    We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components.

  8. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  9. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  10. Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.

    PubMed

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads

    2018-05-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p < 0.05) more frequent among men and episodic patients, compared with women and chronic patients respectively, no other differences in the prevalence of pre-attack symptoms were identified between groups. Conclusion Pre-attack symptoms are frequent in cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.

  11. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    ERIC Educational Resources Information Center

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes…

  12. A Novel Network Attack Audit System based on Multi-Agent Technology

    NASA Astrophysics Data System (ADS)

    Jianping, Wang; Min, Chen; Xianwen, Wu

    A network attack audit system which includes network attack audit Agent, host audit Agent and management control center audit Agent is proposed. And the improved multi-agent technology is carried out in the network attack audit Agent which has achieved satisfactory audit results. The audit system in terms of network attack is just in-depth, and with the function improvement of network attack audit Agent, different attack will be better analyzed and audit. In addition, the management control center Agent should manage and analyze audit results from AA (or HA) and audit data on time. And the history files of network packets and host log data should also be audit to find deeper violations that cannot be found in real time.

  13. Transient ischemic attack: reviewing the evolution of the definition, diagnosis, risk stratification, and management for the emergency physician.

    PubMed

    Siket, Matthew S; Edlow, Jonathan A

    2012-08-01

    A transient ischemic attack (TIA) is an episode of reversible neurologic deficit caused by temporary focal central nervous system hypoperfusion. TIA is a medical emergency. Because patients with TIA in the emergency department (ED) have a high risk for stroke within the next 48 hours, it is imperative for the clinician to recognize this golden opportunity to prevent a disabling stroke. This article reviews our conceptual understanding of TIA, its definition, diagnosis, ways to stratify stroke risk, the acute management and disposition in the ED, and the potential future role of diagnostic biomarkers. Copyright © 2012 Elsevier Inc. All rights reserved.

  14. The WOMBAT Attack Attribution Method: Some Results

    NASA Astrophysics Data System (ADS)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  15. Depression After Heart Attack

    MedlinePlus

    ... to use in patients with coronary heart disease. Cognitive behavior therapy is a form of psychological treatment that has ... after a heart attack and that SSRIs and cognitive behavior therapy reduce depression, it stands to reason that treating ...

  16. BFT replication resistant to MAC attacks

    NASA Astrophysics Data System (ADS)

    Zbierski, Maciej

    2016-09-01

    Over the last decade numerous Byzantine fault-tolerant (BFT) replication protocols have been proposed in the literature. However, the vast majority of these solutions reuse the same authentication scheme, which makes them susceptible to a so called MAC attack. Such vulnerability enables malicious clients to undetectably prevent the replicated service from processing incoming client requests, and consequently making it permanently unavailable. While some BFT protocols attempted to address this issue by using different authentication mechanisms, they at the same time significantly degraded the performance achieved in correct environments. This article presents a novel adaptive authentication mechanism which can be combined with practically any Byzantine fault-tolerant replication protocol. Unlike previous solutions, the proposed scheme dynamically switches between two operation modes to combine high performance in correct environments and liveness during MAC attacks. The experiment results presented in the article demonstrate that the proposed mechanism can sufficiently tolerate MAC attacks without introducing any observable overhead whenever no faults are present.

  17. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    PubMed

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  18. Attack rates of dengue fever in Swedish travellers.

    PubMed

    Rocklöv, Joacim; Lohr, Wolfgang; Hjertqvist, Marika; Wilder-Smith, Annelies

    2014-06-01

    Dengue is endemic in many countries visited by Swedish travellers. We aimed to determine the attack rate of dengue in Swedish travellers and analyse the trends over time and the geographical variation. We obtained the following data from the Swedish Institute for Communicable Disease Control for the y 1995-2010: number of Swedish residents with confirmed dengue, the country and year of infection. We also obtained registers on the Swedish annual air traveller arrivals to dengue endemic areas from the United Nations World Tourist Organization for the time period. We estimated attack rates with 95% confidence intervals (CI). In total, 925 Swedish travellers with confirmed dengue were reported. We found an increasing trend over time for most destinations. The majority of the dengue cases were acquired in Thailand (492 out of 925 travellers; 53%), with an attack rate of 13.6 (95% CI 12.7, 14.4) per 100,000 travellers. However, the 2 highest attack rates per 100,000 travellers were found for Sri Lanka (45.3, 95% CI 34.3, 56.4) and Bangladesh (42.6, 95% CI 23.8, 61.5). Information on attack rates in travellers is more helpful in guiding travel medicine practitioners than reports of absolute numbers, as the latter reflect travel preferences rather than the true risk. Although the majority of dengue infections in Swedish travellers were acquired in Thailand, the attack rates for dengue in travellers to Sri Lanka and Bangladesh were much higher. These data aid in refining information on the risk of dengue in travellers.

  19. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  20. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  1. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  2. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  3. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  4. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    PubMed

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  5. The robustness of multiplex networks under layer node-based attack

    PubMed Central

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-01-01

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology. PMID:27075870

  6. The robustness of multiplex networks under layer node-based attack.

    PubMed

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-04-14

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology.

  7. Construction of a Cyber Attack Model for Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missedmore » if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.« less

  8. Heart attack - discharge

    MedlinePlus

    ... guideline for the management of patients with non-ST-elevation acute coronary syndromes: a report of the ... 23166211 . Giugliano RP, Cannon CP, Braunwald E. Non-ST elevation acute coronary syndromes. In: Mann DL, Zipes ...

  9. Smoking Behavior and Alcohol Consumption in Individuals With Panic Attacks

    PubMed Central

    Mathew, Amanda R.; Norton, Peter J.; Zvolensky, Michael J.; Buckner, Julia D.; Smits, Jasper A. J.

    2011-01-01

    Individuals with anxiety often report greater smoking and drinking behaviors relative to those without a history of anxiety. In particular, smoking and alcohol use have been directly implicated among individuals experiencing panic attacks, diagnosed with panic disorder, or high on panic-relevant risk factors such as anxiety sensitivity. Less is known, however, about specific features of panic that may differentiate among those who do or do not use cigarettes or alcohol. The purpose of the current study was to replicate previous research findings of an association between panic symptomatology, cigarette smoking, and alcohol consumption, as well as extend findings by examining whether specific symptoms of panic attacks differentiated among those who do or do not use cigarettes or alcohol. Participants (n = 489) completed the Panic Attack Questionnaire-IV, a highly detailed assessment of panic attacks and symptoms, as well as self-report measures of smoking history and alcohol use. Consistent with previous research, participants who reported a history of panic attacks (n = 107) were significantly more likely to report current daily or lifetime daily cigarette smoking, and significantly greater hazardous or harmful alcohol use than participants with no panic history (n = 382). Although smoking and hazardous alcohol use were highly associated regardless of panic status, participants with panic attacks showed elevated hazardous alcohol use after controlling for daily or lifetime smoking. Surprisingly, although participants who reported having had at least one panic attack were more likely to smoke, panic attack symptoms, intensity, or frequency did not differentiate panickers who did or did not smoke. Furthermore, panic-related variables were not shown to differentially relate to problematic drinking among panickers. Implications for understanding the complex relationship between panic attacks and smoking and drinking behaviors are discussed. PMID:21915160

  10. Chess therapy: A new approach to curing panic attack.

    PubMed

    Barzegar, Kazem; Barzegar, Somayeh

    2017-12-01

    To study the effect of playing cell phone chess game on treating panic attack. The chess game on an android cell phone was played by the researcher who was affected by panic attack as a post-traumatic disorder immediately after or before feeling of the start of symptoms. The right level of difficulty, i.e., levels 2-4, was selected for optimal results. Playing chess game on the android cell phone prevented the manifestation of panic attack and led to the cure of this traumatic condition. Chess therapy with the right level of difficulty can be recommended as a very effective non-pharmaceutical method for the successful treatment of panic attacks. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Survival of child after lion attack

    PubMed Central

    Dabdoub, Carlos F.; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named “Bang-Bang”, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of the literature. Case Description: We report the case of an 8-year-old boy who was attacked by a lion during a circus show. The patient underwent an emergent neurosurgical procedure, including parietal craniectomy, cleaning, and extensive surgical debridement of the wounds. Despite open severe head trauma with brain damage as well as thorax and abdomen trauma, the child survived, with minimal neurological sequelae. Conclusions: Human injury resulting from encounters with nondomesticated animals is increasingly rising throughout the world. This case highlights the potentially violent and aggressive nature of wild mammals held in captivity. Unusual wild animal attacks and the complex injuries that result may pose a challenge to surgeons practicing in resource-limited settings. In this sense, the best treatment in the mentioned case is the prevention of human injuries by these animals. In addition, to attend to these infrequent cases, the authors emphasize the importance of a multidisciplinary approach to achieve the best cosmetic and functional results. PMID:23869277

  12. Characterization of attacks on public telephone networks

    NASA Astrophysics Data System (ADS)

    Lorenz, Gary V.; Manes, Gavin W.; Hale, John C.; Marks, Donald; Davis, Kenneth; Shenoi, Sujeet

    2001-02-01

    The U.S. Public Telephone Network (PTN) is a massively connected distributed information systems, much like the Internet. PTN signaling, transmission and operations functions must be protected from physical and cyber attacks to ensure the reliable delivery of telecommunications services. The increasing convergence of PTNs with wireless communications systems, computer networks and the Internet itself poses serious threats to our nation's telecommunications infrastructure. Legacy technologies and advanced services encumber well-known and as of yet undiscovered vulnerabilities that render them susceptible to cyber attacks. This paper presents a taxonomy of cyber attacks on PTNs in converged environments that synthesizes exploits in computer and communications network domains. The taxonomy provides an opportunity for the systematic exploration of mitigative and preventive strategies, as well as for the identification and classification of emerging threats.

  13. Effect of Angle of Attack on Slope Climbing Performance

    NASA Technical Reports Server (NTRS)

    Creager, Colin M.; Jones, Lucas; Smith, Lauren M.

    2017-01-01

    Ascending steep slopes is often a very difficult challenge for off-road vehicles, whether on Earth or on extraterrestrial bodies. This challenge is even greater if the surface consists of loose granular soil that does not provide much shear strength. This study investigated how the path at which a vehicle traverses a slope, specifically the angle that it is commanded to drive relative to the base of the hill (the angle of attack), can affect its performance. A vehicle was driven in loose sand at slope angles up to 15 degrees and angles of attack ranging from 10 to 90 degrees. A novel photogrammetry technique was implemented to both track vehicle motion and create a three-dimensional profile of the terrain. This allowed for true wheel sinkage measurements. The study showed that though low angles of attack result in lower wheel slip and sinkage, the efficiency of the vehicles uphill motion increased at higher angles of attack. For slopes up to 15 degrees, a 90 degree angle of attack provided the greatest likelihood of successful ascent.

  14. Internet Attack Traceback: Cross-Validation and Pebble-Trace

    DTIC Science & Technology

    2013-02-28

    stolen-cyber-attack. [3] Hacked: Data breach costly for Ohio State, victims of compromised info http://www.thelantern.com/campus/hacked- data ... breach -costly-for-ohio-state-victims-of-compromised-info-1.1831311. [4] S. C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical

  15. Random Visitor: Defense against Identity Attacks in P2P Networks

    NASA Astrophysics Data System (ADS)

    Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  16. Attack Detection in Sensor Network Target Localization Systems With Quantized Data

    NASA Astrophysics Data System (ADS)

    Zhang, Jiangfan; Wang, Xiaodong; Blum, Rick S.; Kaplan, Lance M.

    2018-04-01

    We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location with a large mean-square-error. The attack is a combination of man-in-the-middle, hacking, and spoofing attacks that can effectively change both signals going into and coming out of the sensor nodes in a realistic manner. We show that the essential effect of attacks is to alter the estimated distance between the target and each attacked sensor to a different extent, giving rise to a geometric inconsistency among the attacked and unattacked sensors. Hence, with the help of two secure sensors, a class of detectors are proposed to detect the attacked sensors by scrutinizing the existence of the geometric inconsistency. We show that the false alarm and miss probabilities of the proposed detectors decrease exponentially as the number of measurement samples increases, which implies that for sufficiently large number of samples, the proposed detectors can identify the attacked and unattacked sensors with any required accuracy.

  17. Impact modeling and prediction of attacks on cyber targets

    NASA Astrophysics Data System (ADS)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  18. Facial injuries following hyena attack in rural eastern Ethiopia.

    PubMed

    Fell, M J; Ayalew, Y; McClenaghan, F C; McGurk, M

    2014-12-01

    Hyenas are effective hunters and will consider humans as potential prey if the need and opportunity arise. This study describes the circumstances of hyena attacks, the patterns of injuries sustained, and reconstruction in a resource-poor setting. As part of a charitable surgical mission to Ethiopia in 2012, 45 patients with facial deformities were reviewed, of whom four were victims of hyena attacks. A semi-structured interview was performed to ascertain the circumstances of the attack and the subsequent consequences. The age of the victims at the time of attack varied from 5 to 50 years. The attacks occurred when the victims were alone and vulnerable and took place in outdoor open spaces, during the evening or at night. The initial lunge was made to the facial area; if the jaws closed on the facial bones they were crushed, but in all cases the soft tissues were grasped and torn from the underlying bone. Reconstruction was dictated by the extent of soft tissue loss but could normally be obtained by use of local or regional flaps. Hyenas have been shown to attack humans in a predictable way and cause injuries that typically involve the soft tissues of the face. Copyright © 2014 International Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  19. Attenuating brain edema, hippocampal oxidative stress, and cognitive dysfunction in rats using hyperbaric oxygen preconditioning during simulated high-altitude exposure.

    PubMed

    Lin, Hung; Chang, Ching-Ping; Lin, Hung-Jung; Lin, Mao-Tsun; Tsai, Cheng-Chia

    2012-05-01

    We assessed whether hyperbaric oxygen preconditioning (HBO2P) in rats induced heat shock protein (HSP)-70 and whether HSP-70 antibody (Ab) preconditioning attenuates high altitude exposure (HAE)-induced brain edema, hippocampal oxidative stress, and cognitive dysfunction. Rats were randomly divided into five groups: the non-HBO2P + non-HAE group, the HBO2P + non-HAE group, the non-HBO2P + HAE group, the HBO2P + HAE group, and the HBO2P + HSP-70 Abs + HAE group. The HBO2P groups were given 100% O2 at 2.0 absolute atmospheres for 1 hour per day for 5 consecutive days. The HAE groups were exposed to simulated HAE (9.7% O2 at 0.47 absolute atmospheres of 6,000 m) in a hypobaric chamber for 3 days. Polyclonal rabbit anti-mouse HSP-70-neutralizing Abs were intravenously injected 24 hours before the HAE experiments. Immediately after returning to normal atmosphere, the rats were given cognitive performance tests, overdosed with a general anesthetic, and then their brains were excised en bloc for water content measurements and biochemical evaluation and analysis. Non-HBO2P group rats displayed cognitive deficits, brain edema, and hippocampal oxidative stress (evidenced by increased toxic oxidizing radicals [e.g., nitric oxide metabolites and hydroxyl radicals], increased pro-oxidant enzymes [e.g., malondialdehyde and oxidized glutathione] but decreased antioxidant enzymes [e.g., reduced glutathione, glutathione peroxide, glutathione reductase, and superoxide dismutase]) in HAE. HBO2P induced HSP-70 overexpression in the hippocampus and significantly attenuated HAE-induced brain edema, cognitive deficits, and hippocampal oxidative stress. The beneficial effects of HBO2P were significantly reduced by HSP-70 Ab preconditioning. Our results suggest that high-altitude cerebral edema, cognitive deficit, and hippocampal oxidative stress can be prevented by HSP-70-mediated HBO2P in rats.

  20. Habitual aerobic exercise, gene APOA5 named rs662799 SNP and response of blood lipid and lipoprotein phenotypes among older Chinese adult.

    PubMed

    Liu, Xiangyun; Huang, Guoyuan; Niu, Zhanbin; Wei, Yuqin; Wang, Ru

    2018-05-18

    The genetic component of dyslipidemia has been studied in adults but little in older population. It is remains unknown regarding influence and interaction of APOA5 gene single nucleotide polymorphism (SNP) and habitual aerobic exercise (HAE) on changes of blood lipids and lipoprotein phenotypes in older Chinese adults. Four-hundred-twenty-three old Chinese individuals with HAE were divided into hyperlipidemia and normal groups. We genotyped polymorphic loci using matrix assisted laser desorption ionization time of flight mass spectrometry detection technology (MALDI-TOF). HAE level was assessed by International Physical Activity Questionnaire (IPAQ) scale. For three genotypes of rs662799 site, the AG + GG gene carriers presented higher risk of hyperlipidemia compared to the AA carriers, with the ratio of 1.676 (P = .018, 95% CI: 1.092-2.571) for the AG and 1.812 (P = .002, 95% CI: 1.247-2.632) for the GG, respectively. The rs662799 G allele was significantly associated with lower HDL-C but higher TG levels. In relation to different HAE levels, less interaction was observed between the AA carriers and different HAE levels on corresponding lipids changes. The AG + GG carriers with higher HAE levels had significantly lower TG responses compared to those with lower HAE levels (1.45 ± 0.74 mmol/L vs. 1.86 ± 1.15 mmol/L). Excess risk for low HDL-C and hyperlipidemia was associated with rs662799 genotype alleles of APOA5 SNPs in older Chinese adults. Interaction of gene-HAE and HAE levels may induce different responses of blood lipids and lipoprotein phenotypes. HAE levels have less influence on TG changes in the AA carriers; however, high HAE levels appeared to greatly impact TG responses in the AG + GG carriers. Copyright © 2018. Published by Elsevier Inc.

  1. Simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a Gaussian modulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, University Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex

    2010-06-15

    In this article, we give a simple proof of the fact that the optimal collective attacks against continuous-variable quantum key distribution with a Gaussian modulation are Gaussian attacks. Our proof, which makes use of symmetry properties of the protocol in phase space, is particularly relevant for the finite-key analysis of the protocol and therefore for practical applications.

  2. Cyber Security Audit and Attack Detection Toolkit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  3. A single-centre prospective, cohort study of the natural history of acute pancreatitis.

    PubMed

    Cavestro, Giulia Martina; Leandro, Gioacchino; Di Leo, Milena; Zuppardo, Raffaella Alessia; Morrow, Olivia B; Notaristefano, Chiara; Rossi, Gemma; Testoni, Sabrina Gloria Giulia; Mazzoleni, Giorgia; Alessandri, Matteo; Goni, Elisabetta; Singh, Satish K; Giliberti, Aurore; Bianco, Margherita; Fanti, Lorella; Viale, Edi; Arcidiacono, Paolo Giorgio; Mariani, Alberto; Petrone, Maria Chiara; Testoni, Pier Alberto

    2015-03-01

    The natural history of acute pancreatitis is based on clinical studies that aim to elucidate the course of disease on the basis of predicted risk factors. To evaluate the long-term occurrence of recurrent acute pancreatitis and chronic pancreatitis in a cohort of patients following an initial episode of acute pancreatitis. 196 patients were enrolled consecutively and studied prospectively. Clinical characteristics, exogenously/endogenously-associated factors, and evolution to recurrent acute pancreatitis and chronic pancreatitis were analyzed. 40 patients developed recurrent acute pancreatitis 13 of whom developed chronic pancreatitis. In a univariate analysis, recurrent acute pancreatitis was associated with an idiopathic aetiology (p<0.001), pancreas divisum (p=0.001), and higher usage of cigarettes and alcohol (p<0.001; p=0.023). Chronic pancreatitis was associated with a severe first episode of acute pancreatitis (p=0.048), PD (p=0.03), and cigarette smoking (p=0.038). By multivariate analysis, pancreas divisum was an independent risk factor for recurrent acute pancreatitis (OR 11.5, 95% CI 1.6-83.3). A severe first-episode of acute pancreatitis increased the risk of progressing to chronic pancreatitis by nine-fold. Special attention should be given to patients who experience a severe first attack of acute pancreatitis as there appears to be an increased risk of developing chronic pancreatitis over the long term. Copyright © 2014 Editrice Gastroenterologica Italiana S.r.l. Published by Elsevier Ltd. All rights reserved.

  4. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    PubMed

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p < 0.05). Drop attacks were considered to be epileptic negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  5. Accuracy and Predictability of PANC-3 Scoring System over APACHE II in Acute Pancreatitis: A Prospective Study.

    PubMed

    Rathnakar, Surag Kajoor; Vishnu, Vikram Hubbanageri; Muniyappa, Shridhar; Prasath, Arun

    2017-02-01

    Acute Pancreatitis (AP) is one of the common conditions encountered in the emergency room. The course of the disease ranges from mild form to severe acute form. Most of these episodes are mild and spontaneously subsiding within 3 to 5 days. In contrast, Severe Acute Pancreatitis (SAP) occurring in around 15-20% of all cases, mortality can range between 10 to 85% across various centres and countries. In such a situation we need an indicator which can predict the outcome of an attack, as severe or mild, as early as possible and such an indicator should be sensitive and specific enough to trust upon. PANC-3 scoring is such a scoring system in predicting the outcome of an attack of AP. To assess the accuracy and predictability of PANC-3 scoring system over APACHE II in predicting severity in an attack of AP. This prospective study was conducted on 82 patients admitted with the diagnosis of pancreatitis. Investigations to evaluate PANC-3 and APACHE II were done on all the patients and the PANC-3 and APACHE II score was calculated. PANC-3 score has a sensitivity of 82.6% and specificity of 77.9%, the test had a Positive Predictive Value (PPV) of 0.59 and Negative Predictive Value (NPV) of 0.92. Sensitivity of APACHE II in predicting SAP was 91.3% and specificity was 96.6% with PPV of 0.91, NPV was 0.96. Our study shows that PANC-3 can be used to predict the severity of pancreatitis as efficiently as APACHE II. The interpretation of PANC-3 does not need expertise and can be applied at the time of admission which is an advantage when compared to classical scoring systems.

  6. Heart lesion after the first attack of the rheumatic Fever 22 years experience in single centre.

    PubMed

    Bejiqi, Ramush A; Retkoceri, Ragip; Zeka, Naim; Bejiqi, Hana; Retkoceri, Arber

    2015-02-01

    Acute rheumatic fever and its sequels, rheumatic heart diseases, remain major unsolved preventable health problems in Kosovo population, particularly among the disadvantages indigenous Albanian and Egyptians people. In Kosovo, despite of performing secondary prophylaxis with benzathine penicillin, acute rheumatic fever hospitalization rates have remained essentially unchanged for the last 20 years. The role of echocardiography in the diagnosis of acute rheumatic carditis was established over the last 20 years. In this study we aimed to determine the prevalence of rheumatic heart disease in children from Kosovo population with first attack of acute rheumatic fever. Also, we presented that echocardiography examination detects a greater prevalence of rheumatic heart disease than other diagnostic procedures. We aimed to compare the sensitivity and specificity of cardiac auscultation, ECG record, lab analysis to echocardiography and to determine the feasibility of specific age in this setting. To optimize accurate diagnosis of rheumatic fever and rheumatic heart disease, we utilized two group models. In the first group of 388 children, hospitalized and treated before 1999, diagnosis of rheumatic fever was decided basing on the clinical and laboratory findings whereas in second group (221 children treated from1999 to 2010) clinical and lab diagnosis were amplified also on the detection by echocardiography. In second group, using echocardiography as a method of diagnosis and assessment children with rheumatic fever, we found high rates of undetected rheumatic heart disease in this high-risk group population. Echocardiographic examination of children with rheumatic fever for rheumatic heart disease may over diagnose rheumatic heart disease unless congenital mitral valve anomalies and physiological regurgitation are excluded.

  7. Marital History and Survival after a Heart Attack

    PubMed Central

    Dupre, Matthew E.; Nelson, Alicia

    2016-01-01

    Heart disease is the leading cause of death in the United States and nearly one million Americans will have a heart attack this year. Although the risks associated with a heart attack are well established, we know surprisingly little about how marital factors contribute to survival in adults afflicted with heart disease. This study uses a life course perspective and longitudinal data from the Health and Retirement Study to examine how various dimensions of marital life influence survival in U.S. older adults who suffered a heart attack (n=2,197). We found that adults who were never married (odds ratio [OR]=1.73), currently divorced (OR=1.70), or widowed (OR=1.34) were at significantly greater risk of dying after a heart attack than adults who were continuously married; and the risks were not uniform over time. We also found that the risk of dying increased by 12% for every additional marital loss and decreased by 7% for every one-tenth increase in the proportion of years married. After accounting for more than a dozen socioeconomic, psychosocial, behavioral, and physiological factors, we found that current marital status remained the most robust indicator of survival following a heart attack. The implications of the findings are discussed in the context of life course inequalities in chronic disease and directions for future research. PMID:27770749

  8. Incidence and impact of dog attacks on guide dogs in the UK.

    PubMed

    Brooks, A; Moxon, R; England, G C W

    2010-06-19

    In a retrospective survey, researchers identified 100 incidents of attacks on guide dogs by other dogs. These were reviewed in order to determine the number, severity and impact on the handler and dog, and the characteristics of the aggressors and victims. During the study period there were more than three attacks reported each month, with 61 per cent of the attacks being upon dogs that were in harness and working with an owner or trainer. The majority of the dogs that were attacked were male (62 per cent), and the breeds that were over-represented (relative to their prevalence in the general guide dog population) were the labrador and the golden retriever x flat-coated retriever crossbreed. Most of the attacks occurred in public places between 09.00 and 15.00 and the majority (61 per cent) of the attacking dogs were off the lead at the time of the attack. Thirty-eight per cent of the attacking dogs were of bull breeds, which were over-represented among attackers compared with the proportion of this breed type in the general dog population. Veterinary attention was sought after 41 per cent of the attacks, and in 19 per cent of instances there was injury to the handler or to a member of the public. The attacks were reported to have affected the working performance and behaviour of the victim dog in 45 per cent of the instances, and two dogs had to be subsequently withdrawn from working as guide dogs.

  9. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  10. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  11. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  12. Prediction of first episode of panic attack among white-collar workers.

    PubMed

    Watanabe, Akira; Nakao, Kazuhisa; Tokuyama, Madoka; Takeda, Masatoshi

    2005-04-01

    The purpose of the present study was to elucidate a longitudinal matrix of the etiology for first-episode panic attack among white-collar workers. A path model was designed for this purpose. A 5-year, open-cohort study was carried out in a Japanese company. To evaluate the risk factors associated with the onset of a first episode of panic attack, the odds ratios of a new episode of panic attack were calculated by logistic regression. The path model contained five predictor variables: gender difference, overprotection, neuroticism, lifetime history of major depression, and recent stressful life events. The logistic regression analysis indicated that a person with a lifetime history of major depression and recent stressful life events had a fivefold and a threefold higher risk of panic attacks at follow up, respectively. The path model for the prediction of a first episode of panic attack fitted the data well. However, this model presented low accountability for the variance in the ultimate dependent variables, the first episode of panic attack. Three predictors (neuroticism, lifetime history of major depression, and recent stressful life events) had a direct effect on the risk for a first episode of panic attack, whereas gender difference and overprotection had no direct effect. The present model could not fully predict first episodes of panic attack in white-collar workers. To make a path model for the prediction of the first episode of panic attack, other strong predictor variables, which were not surveyed in the present study, are needed. It is suggested that genetic variables are among the other strong predictor variables. A new path model containing genetic variables (e.g. family history etc.) will be needed to predict the first episode of panic attack.

  13. Serial computed tomography scanning in acute pancreatitis: a prospective study.

    PubMed Central

    London, N J; Neoptolemos, J P; Lavelle, J; Bailey, I; James, D

    1989-01-01

    One hundred and two patients with acute pancreatitis had abdominal computed tomography (CT) scans within 72 hours of admission, at one week and at six weeks. Twenty eight attacks were clinically severe, 74 clinically mild. Ninety three (91%) admission scans, 85 (84%) one week scans, and 52 (51%) six week scans were abnormal. The aetiology of the pancreatitis could be inferred from 28 (27%) of admission scans, the CT sign of fatty liver having a sensitivity of 21% and specificity of 100% for alcoholic aetiology. The sensitivity of CT for gall stone aetiology was 34%, specificity 100%. The pancreatic size indices (max anteroposterior measurement of head x max anteroposterior measurement of body) of those patients with severe attacks were significantly greater than those with mild attacks on admission, at one week and at six weeks (p less than 0.004). Fourteen pseudocysts were detected by CT, five (36%) of which were clinically apparent. The pseudocyst size indices (max anteroposterior x max transverse measurement) of the pseudocysts which were clinically apparent were significantly greater than those which were not apparent (p less than 0.01) and only those pseudocysts with a size index greater than or equal to 15 cm2 required treatment. PMID:2651228

  14. An Investigation of Kernel Data Attacks and Countermeasures

    DTIC Science & Technology

    2017-02-14

    security impact of such an attack seem s minor, and thus, it h as not yet drawn much attention from the security community. In this project, we...of such an attack seems minor, and thus, it has not yet drawn much attention from the security community. In this project, we have thoroughly

  15. Comparing the Roles of EUS, ERCP and MRCP in Idiopathic Acute Recurrent Pancreatitis

    PubMed Central

    Safari, Mohammad Taghi; Miri, Mohammad Bager; Ebadi, Shahram; Shahrokh, Shabnam; Alizadeh, Amir Houshang Mohammad

    2016-01-01

    Acute recurrent pancreatitis (ARP) is defined as more than two attacks of acute pancreatitis with complete or almost complete resolution of symptoms and signs of pancreatitis between episodes. The initial evaluation fails to detect the cause of ARP in 10%–30% of patients, whose condition is classified as idiopathic ARP. Endoscopic ultrasound (EUS) has gained increasing attention as a useful imaging modality for the pancreas and the extrahepatic biliary tree. The close proximity of the pancreas to the digestive tract allows EUS to obtain detailed images of this organ. This review aims to record pancreaticobiliary endoscopic ultrasound (EUS) and other imaging modalities in the clinical management of patients with idiopathic ARP. PMID:27375362

  16. Generalized watermarking attack based on watermark estimation and perceptual remodulation

    NASA Astrophysics Data System (ADS)

    Voloshynovskiy, Sviatoslav V.; Pereira, Shelby; Herrigel, Alexander; Baumgartner, Nazanin; Pun, Thierry

    2000-05-01

    Digital image watermarking has become a popular technique for authentication and copyright protection. For verifying the security and robustness of watermarking algorithms, specific attacks have to be applied to test them. In contrast to the known Stirmark attack, which degrades the quality of the image while destroying the watermark, this paper presents a new approach which is based on the estimation of a watermark and the exploitation of the properties of Human Visual System (HVS). The new attack satisfies two important requirements. First, image quality after the attack as perceived by the HVS is not worse than the quality of the stego image. Secondly, the attack uses all available prior information about the watermark and cover image statistics to perform the best watermark removal or damage. The proposed attack is based on a stochastic formulation of the watermark removal problem, considering the embedded watermark as additive noise with some probability distribution. The attack scheme consists of two main stages: (1) watermark estimation and partial removal by a filtering based on a Maximum a Posteriori (MAP) approach; (2) watermark alteration and hiding through addition of noise to the filtered image, taking into account the statistics of the embedded watermark and exploiting HVS characteristics. Experiments on a number of real world and computer generated images show the high efficiency of the proposed attack against known academic and commercial methods: the watermark is completely destroyed in all tested images without altering the image quality. The approach can be used against watermark embedding schemes that operate either in coordinate domain, or transform domains like Fourier, DCT or wavelet.

  17. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information aboutmore » the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.« less

  18. [Investigation on acute nitrite poisoning in Yangjiang city, Guangdong province, China].

    PubMed

    Yu, Hongjie; Luo, Huiming; Lu, Xirong; Song, Qubo; Fan, Zifan

    2002-12-01

    To determine the cause of acute poisoning occurred in a factory in Yangjiang city, Guangdong province. In a cross-sectional study, interviews were conducted with the administrators of the factory and the local physician. A review was conducted on the water system used for industrial purposes and a separate system used by workers for drinking water. Treatment and discharge of industrial waste water were examined. Face-to-face interview was conducted to identify risk of exposure for illness among workers. A total number of 36 cases were identified in the plant and the attack rate was 16.4% (36/220). The incubation period (time between drinking polluted water and the onset of symptoms) had a median of 90 minutes (range: 30 - 230 minutes). Consuming water at the factory increased the attack rate and a dose-response effect was identified (chi(2)(trend) = 79.115, P < 0.01). The nitrite content of residuals in drinking water exceeded the WHO standard (1 ppm). The accident of acute poisoning was due to drinking water contaminated with sodium nitrite. The prevention of drinking water contaminated by toxic chemicals like sodium nitrite, and the design of industrial and potable water supply system need to be carefully reviewed. Regulations should be developed and enforced to minimize the impact of industrial waste water discharges to guarantee the access to clean drinking water.

  19. Human behaviour can trigger large carnivore attacks in developed countries

    PubMed Central

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E.; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-01-01

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores. PMID:26838467

  20. Human behaviour can trigger large carnivore attacks in developed countries.

    PubMed

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-02-03

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores.

  1. Weak laws against acid attacks on women: an Indian perspective.

    PubMed

    Ahmad, Nehaluddin

    2012-01-01

    Acid attacks, especially on women, have seen an alarming growth in India over the last decade. While these attacks can be attributed to various factors such as the social weakness of women in a male-dominated society, the situation is exacerbated by the general neglect of the lawmakers. As acid is inexpensive and easily available, it serves as an ideal weapon for the perpetrators. Further, as this offence is bailable in certain situations, the punishment does not act as a sufficient deterrent in most cases. This paper describes the horrendous effects that acid attacks have on the victims physically, psychologically and socially. It also examines the contemporary laws governing acid attacks on victims and offenders. Ideas for a better legal approach will also be examined with special reference to acid attacks as a crime, and the validity of specific legal provisions for female victims.

  2. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Qin, Hao; Kumar, Rupesh; Alléaume, Romain

    2016-07-01

    We identify and study a security loophole in continuous-variable quantum key distribution (CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent-state CVQKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CVQKD. We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criterion imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible countermeasures against the saturation attack and propose a countermeasure based on Gaussian postselection that can be implemented by classical postprocessing and may allow one to distill the secret key when the raw measurement data are partly saturated.

  3. The influence of weather on migraine – are migraine attacks predictable?

    PubMed Central

    Hoffmann, Jan; Schirra, Tonio; Lo, Hendra; Neeb, Lars; Reuter, Uwe; Martus, Peter

    2015-01-01

    Objective The study aimed at elucidating a potential correlation between specific meteorological variables and the prevalence and intensity of migraine attacks as well as exploring a potential individual predictability of a migraine attack based on meteorological variables and their changes. Methods Attack prevalence and intensity of 100 migraineurs were correlated with atmospheric pressure, relative air humidity, and ambient temperature in 4-h intervals over 12 consecutive months. For each correlation, meteorological parameters at the time of the migraine attack as well as their variation within the preceding 24 h were analyzed. For migraineurs showing a positive correlation, logistic regression analysis was used to assess the predictability of a migraine attack based on meteorological information. Results In a subgroup of migraineurs, a significant weather sensitivity could be observed. In contrast, pooled analysis of all patients did not reveal a significant association. An individual prediction of a migraine attack based on meteorological data was not possible, mainly as a result of the small prevalence of attacks. Interpretation The results suggest that only a subgroup of migraineurs is sensitive to specific weather conditions. Our findings may provide an explanation as to why previous studies, which commonly rely on a pooled analysis, show inconclusive results. The lack of individual attack predictability indicates that the use of preventive measures based on meteorological conditions is not feasible. PMID:25642431

  4. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackerman, G; Abhayaratne, P; Bale, J

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CImore » facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a

  5. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.

    PubMed

    Wang, Chundong; Zhu, Likun; Gong, Liangyi; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun

    2018-03-15

    With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.

  6. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information

    PubMed Central

    Wang, Chundong; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun

    2018-01-01

    With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks. PMID:29543773

  7. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-03-31

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less

  8. A decision framework for managing risk to airports from terrorist attack.

    PubMed

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. © 2014 Society for Risk Analysis.

  9. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less

  10. Psychological distress and prejudice following terror attacks in France.

    PubMed

    Goodwin, Robin; Kaniasty, Krzysztof; Sun, Shaojing; Ben-Ezra, Menachem

    2017-08-01

    Terrorist attacks have the capacity to threaten our beliefs about the world, cause distress across populations and promote discrimination towards particular groups. We examined the impact of two different types of attacks in the same city and same year on psychological distress and probable posttraumatic stress symptoms, and the moderating effects of religion or media use on distress/posttraumatic symptoms and inter-group relations. Two panel surveys four weeks after the January 2015 Charlie Hebdo attack (N = 1981) and the November 2015 Bataclan concert hall/restaurant attacks (N = 1878), measured intrinsic religiosity, social and traditional media use, psychological distress (K6), probable posttraumatic stress symptoms (proposed ICD-11), symbolic racism and willingness to interact with Muslims by non-Muslims. Prevalence of serious mental illness (K6 score > 18) was higher after November 2015 attacks (7.0% after the first attack, 10.2% the second, χ2 (1) = 5.67, p < 0.02), as were probable posttraumatic stress symptoms (11.9% vs. 14.1%; χ2 (1) = 4.15, p < 0.04). In structural equation analyses, sex, age, geographic proximity, media use and religiosity were associated with distress, as was the interaction between event and religiosity. Distress was then associated with racism symbolism and willingness to interact with Muslims. Implications are considered for managing psychological trauma across populations, and protecting inter-group harmony. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination ofmore » food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.« less

  12. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    NASA Astrophysics Data System (ADS)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  13. Technosocial Modeling of IED Threat Scenarios and Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiationmore » of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.« less

  14. Sleep Deprivation Attack Detection in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  15. Interval forecasting of cyber-attacks on industrial control systems

    NASA Astrophysics Data System (ADS)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  16. Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.

    PubMed

    Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H

    2010-06-01

    Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.

  17. Symptom Induction and De-escalation in the Treatment of Panic Attacks.

    ERIC Educational Resources Information Center

    Dattilio, Frank M.

    1990-01-01

    Describes technique known as symptom induction and de-escalation for panic attacks in which goal is to reproduce the type of situation that may precipitate an attack and then to show the client how the attacks can be "turned on" as well as "turned off." (ABL)

  18. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    NASA Astrophysics Data System (ADS)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  19. Korean immigrants' knowledge of heart attack symptoms and risk factors.

    PubMed

    Hwang, Seon Y; Ryan, Catherine J; Zerwic, Julie Johnson

    2008-02-01

    This study assessed the knowledge of heart attack symptoms and risk factors in a convenience sample of Korean immigrants. A total of 116 Korean immigrants in a Midwestern metropolitan area were recruited through Korean churches and markets. Knowledge was assessed using both open-ended questions and a structured questionnaire. Latent class cluster analysis and Chi-square tests were used to analyze the data. About 76% of the sample had at least one self-reported risk factor for cardiovascular disease. Using an open-ended question, the majority of subjects could only identify one symptom. In the structured questionnaire, subjects identified a mean of 5 out of 10 heart attack symptoms and a mean of 5 out of 9 heart attack risk factors. Latent class cluster analysis showed that subjects clustered into two groups for both risk factors and symptoms: a high knowledge group and a low knowledge group. Subjects who clustered into the risk factor low knowledge group (48%) were more likely than the risk factor high knowledge group to be older than 65 years, to have lower education, to not know to use 911 when a heart attack occurred, and to not have a family history of heart attack. Korean immigrants' knowledge of heart attack symptoms and risk factors was variable, ranging from high to very low. Education should be focused on those at highest risk for a heart attack, which includes the elderly and those with risk factors.

  20. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nichols, Jeff A.; Curtis, Laura

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary tomore » cause this response.« less

  1. Conservation biology: lion attacks on humans in Tanzania.

    PubMed

    Packer, Craig; Ikanda, Dennis; Kissui, Bernard; Kushnir, Hadas

    2005-08-18

    Large carnivores inspire opposition to conservation efforts owing to their impact on livestock and human safety. Here we analyse the pattern of lion attacks over the past 15 years on humans in Tanzania, which has the largest population of lions in Africa, and find that they have killed more than 563 Tanzanians since 1990 and injured at least 308. Attacks have increased dramatically during this time: they peak at harvest time each year and are most frequent in areas with few prey apart from bush pigs (Potamochoerus larvatus), the most common nocturnal crop pest. Our findings provide an important starting point for devising strategies to reduce the risk to rural Tanzanians of lion attacks.

  2. PAH Emission from Disks around Intermediate-Mass Stars: The Peculiar Aroma of Hydrocarbons Orbiting Herbig Ae/Be Stars

    NASA Astrophysics Data System (ADS)

    Keller, L. D.; Sloan, G. C.

    2009-12-01

    Over half of the intermediate-mass young stellar objects in the Galaxy (e.g. Herbig Ae/Be stars or HAeBe) have high-contrast emission in the mid-infrared spectral features of polycyclic aromatic hydrocarbons (PAHs) above the continuum produced by thermal emission from dust in the circumstellar disks. We have examined the PAH emission in detail for 30 HAeBe stars observed with the Spitzer IRS. We have identified some trends that, should they survive in a larger sample of HAeBe stars, will allow us to infer large-scale disk geometry (both inner and outer) and the degree of photo-processing of organic molecular material in HAeBe disks: HAeBe stars apparently have distinctive PAH spectra among the many other astronomical environments that are characterized by strong PAH emission; strong PAH emission is not necessarily an indicator of a particular disk geometry; PAH spectra of HAeBe stars change systematically with stellar effective temperature; PAH in HAeBe disks are ionized. As part of a Spitzer archival project we are applying our spectral analysis methods to an even larger sample of HAeBe stars observed with the IRS and currently available in the Spitzer archive. Here we report preliminary results as we begin the larger study.

  3. Feasibility randomised multicentre, double-blind, double-dummy controlled trial of anakinra, an interleukin-1 receptor antagonist versus intramuscular methylprednisolone for acute gout attacks in patients with chronic kidney disease (ASGARD): protocol study.

    PubMed

    Balasubramaniam, Gowrie; Parker, Trisha; Turner, David; Parker, Mike; Scales, Jonathan; Harnett, Patrick; Harrison, Michael; Ahmed, Khalid; Bhagat, Sweta; Marianayagam, Thiraupathy; Pitzalis, Costantino; Mallen, Christian; Roddy, Edward; Almond, Mike; Dasgupta, Bhaskar

    2017-09-05

    Acute gout occurs in people with chronic kidney disease, who are commonly older people with comorbidities such as hypertension, heart disease and diabetes. Potentially harmful treatments are administered to these vulnerable patients due to a lack of clear evidence. Newly available treatment that targets a key inflammatory pathway in acute gout attacks provides an opportunity to undertake the first-ever trial specifically looking treating people with kidney disease. This paper describes the protocol for a feasibility randomised controlled trial (RCT) comparing anakinra, a novel interleukin-1 antagonist versus steroids in people with chronic kidney disease (ASGARD). ASGARD is a two-parallel group double-blind, double-dummy multicentre RCT comparing anakinra 100 mg, an interleukin-1 antagonist, subcutaneous for 5 days against intramuscular methylprednisolone 120 mg. The primary objective is to assess the feasibility of the trial design and procedures for a definitive RCT. The specific aims are: (1) test recruitment and retention rates and willingness to be randomised; (2) test eligibility criteria; (3) collect and analyse outcome data to inform sample and power calculations for a trial of efficacy; (4) collect economic data to inform a future economic evaluation estimating costs of treatment and (5) assess capacity of the project to scale up to a national multicentre trial. We will also gather qualitative insights from participants. It aims to recruit 32 patients with a 1:1 randomisation. Information from this feasibility study will help design a definitive trial and provide general information in designing acute gout studies. The London-Central Ethics Committee approved the protocol. The results will be disseminated in peer-reviewed journals and at scientific conferences. EudraCT No. 2015-001787-19, NCT/Clinicalstrials.gov No. NCT02578394, pre-results, WHO Universal Trials Reference No. U1111-1175-1977. NIHR Grant PB-PG-0614-34090. © Article author(s) (or their

  4. Major depressive disorder with anger attacks and cardiovascular risk factors.

    PubMed

    Fraguas, Renerio; Iosifescu, Dan V; Bankier, Bettina; Perlis, Roy; Clementi-Craven, Nicoletta; Alpert, Jonathan; Fava, Maurizio

    2007-01-01

    Depression and anger have been separately associated with cardiovascular risk factors. We investigated if major depressive disorder (MDD) with concomitant anger attacks was associated with cardiovascular risk factors. We measured total serum cholesterol, glycemia, resting blood pressure, and smoking parameters in 333 (52.9% women) MDD nonpsychotic outpatients, mean age of 39.4 years. MDD was diagnosed with the Structured Clinical Interview (SCID) in accordance with the Diagnostic and Statistic Manual of Mental Disorders, Third Edition, Revised (DSM-III-R). The presence of anger attacks was established with the Massachusetts General Hospital Anger Attacks Questionnaire. In a logistic regression analysis, anger attacks were independently associated with cholesterol levels > or = 200 mg/dL (odds ratio [OR], 2.16; 95% confidence interval [CI], 1.18-3.94) and years of smoking > 11 (OR, 2.59; 95% CI, 1.32-5.04). MDD with anger attacks was significantly associated with increased cholesterol levels and years of smoking.

  5. Clopidogrel with aspirin in acute minor stroke or transient ischemic attack.

    PubMed

    Wang, Yongjun; Wang, Yilong; Zhao, Xingquan; Liu, Liping; Wang, David; Wang, Chunxue; Wang, Chen; Li, Hao; Meng, Xia; Cui, Liying; Jia, Jianping; Dong, Qiang; Xu, Anding; Zeng, Jinsheng; Li, Yansheng; Wang, Zhimin; Xia, Haiqin; Johnston, S Claiborne

    2013-07-04

    Stroke is common during the first few weeks after a transient ischemic attack (TIA) or minor ischemic stroke. Combination therapy with clopidogrel and aspirin may provide greater protection against subsequent stroke than aspirin alone. In a randomized, double-blind, placebo-controlled trial conducted at 114 centers in China, we randomly assigned 5170 patients within 24 hours after the onset of minor ischemic stroke or high-risk TIA to combination therapy with clopidogrel and aspirin (clopidogrel at an initial dose of 300 mg, followed by 75 mg per day for 90 days, plus aspirin at a dose of 75 mg per day for the first 21 days) or to placebo plus aspirin (75 mg per day for 90 days). All participants received open-label aspirin at a clinician-determined dose of 75 to 300 mg on day 1. The primary outcome was stroke (ischemic or hemorrhagic) during 90 days of follow-up in an intention-to-treat analysis. Treatment differences were assessed with the use of a Cox proportional-hazards model, with study center as a random effect. Stroke occurred in 8.2% of patients in the clopidogrel-aspirin group, as compared with 11.7% of those in the aspirin group (hazard ratio, 0.68; 95% confidence interval, 0.57 to 0.81; P<0.001). Moderate or severe hemorrhage occurred in seven patients (0.3%) in the clopidogrel-aspirin group and in eight (0.3%) in the aspirin group (P=0.73); the rate of hemorrhagic stroke was 0.3% in each group. Among patients with TIA or minor stroke who can be treated within 24 hours after the onset of symptoms, the combination of clopidogrel and aspirin is superior to aspirin alone for reducing the risk of stroke in the first 90 days and does not increase the risk of hemorrhage. (Funded by the Ministry of Science and Technology of the People's Republic of China; CHANCE ClinicalTrials.gov number, NCT00979589.).

  6. From Inpatient to Ambulatory Care: The Introduction of a Rapid Access Transient Ischaemic Attack Service.

    PubMed

    Maddula, Mohana; Adams, Laura; Donnelly, Jonathan

    2018-06-01

    Background : Transient Ischaemic Attacks (TIA) should be treated as a medical emergency. While high-risk TIAs have higher stroke risks than low-risk patients, there is an inherent limitation to this risk stratification, as some low-risk patients may have undiagnosed high-risk conditions. Inequity of care for TIA patients was observed, such that high-risk patients received urgent assessment through acute admission, while low-risk patients faced long waits for clinical consultation. A redesign of the TIA service was planned to offer timely assessment for all patients and avoid acute admission for high-risk patients. Methods : Service reconfiguration was undertaken to set up a daily weekday rapid access TIA clinic where patients would be assessed, investigated, and treated. Results : A re-audit of clinic performance showed a significant increase in the number of patients seen in the ages of 18 to 52. The median time from referral to clinical consultation improved from 10 days to 1. There were similar significant improvements seen in median time to brain imaging (from 10.5 days to 1), and carotid ultrasound (from 10 days to all scans being performed on the same day). Conclusions : The redesigned service achieved the objective of offering urgent assessment and investigations for all TIA patients, including low-risk patients, while avoiding the acute admission for high-risk patients. We share our experience of establishing a successful rapid access ambulatory service without any additional resources.

  7. Pattern association--a key to recognition of shark attacks.

    PubMed

    Cirillo, G; James, H

    2004-12-01

    Investigation of a number of shark attacks in South Australian waters has lead to recognition of pattern similarities on equipment recovered from the scene of such attacks. Six cases are presented in which a common pattern of striations has been noted.

  8. Detecting Payload Attacks on Programmable Logic Controllers (PLCs)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan

    Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less

  9. Marital history and survival after a heart attack.

    PubMed

    Dupre, Matthew E; Nelson, Alicia

    2016-12-01

    Heart disease is the leading cause of death in the United States and nearly one million Americans will have a heart attack this year. Although the risks associated with a heart attack are well established, we know surprisingly little about how marital factors contribute to survival in adults afflicted with heart disease. This study uses a life course perspective and longitudinal data from the Health and Retirement Study to examine how various dimensions of marital life influence survival in U.S. older adults who suffered a heart attack (n = 2197). We found that adults who were never married (odds ratio [OR] = 1.73), currently divorced (OR = 1.70), or widowed (OR = 1.34) were at significantly greater risk of dying after a heart attack than adults who were continuously married; and the risks were not uniform over time. We also found that the risk of dying increased by 12% for every additional marital loss and decreased by 7% for every one-tenth increase in the proportion of years married. After accounting for more than a dozen socioeconomic, psychosocial, behavioral, and physiological factors, we found that current marital status remained the most robust indicator of survival following a heart attack. The implications of the findings are discussed in the context of life course inequalities in chronic disease and directions for future research. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Recovery of human remains after shark attack.

    PubMed

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  11. Methodological factors in determining rates of dementia in transient ischemic attack and stroke: (I) impact of baseline selection bias.

    PubMed

    Pendlebury, Sarah T; Chen, Ping-Jen; Bull, Linda; Silver, Louise; Mehta, Ziyah; Rothwell, Peter M

    2015-03-01

    Many previous studies on dementia in stroke have restrictive inclusion criteria, which may result in underestimation of dementia rates. We undertook a large prospective population-based study of all transient ischemic attack and stroke to determine the impact of study entry criteria on measured rates of pre- and postevent dementia. All patients with acute transient ischemic attack or stroke from a defined population of 92 728 are referred from primary care or at hospital admission to the Oxford Vascular Study (2002-2007) and have baseline clinical and cognitive assessment and follow-up. We examined the impact of early death, other nonavailability, and commonly used selection criteria, on measured rates of dementia. Among 1236 patients (mean age/SD 75.2/12.1 years, 582 men, 403 transient ischemic attack), 139 died or were otherwise unavailable for baseline assessment, 319 had prior dependency, 425 had comorbidity, 512 were aged ≥80 years, 85 were dysphasic, and 502 were hospitalized. Pre-event dementia was 3-fold higher in patients dying preascertainment (10/47, 21%) and twice as high in other nonassessed (14/92, 15%) versus assessed patients (69/1097, 6%; P=0.0006 and P=0.002) and was several-fold higher in those with prior functional impairment (24% versus 3%; P<0.0001), age >80 years (13% versus 3%; P<0.0001), dysphasia (11% versus 7%; P<0.0001), and comorbidity (10% versus 6%; P=0.04). Findings for postevent dementia were similar: prior functional impairment (40% versus 13%; P<0.0001), age >80 years (28% versus 10%; P<0.0001), dysphasia (39% versus 15%; P<0.0001), and comorbidity (20% versus 15%; P=0.04). Exclusion of patients unavailable for assessment, and other widely used selection criteria, results in underestimation of the measured rate of dementia associated with transient ischemic attack and stroke. © 2015 American Heart Association, Inc.

  12. Efficacy of alprazolam sublingual tablets in the treatment of the acute phase of panic disorders.

    PubMed

    Márquez, Miguel; Arenoso, Hector; Caruso, Norberto

    2011-01-01

    Panic disorder affects 2-5% of the general population. In Argentina, one million people would be affected with a 91% rate of psychiatric comorbidity. AIM; To compare efficacy parameters between sublingual (ALP-SL) and conventional (ALP-CT) tablets of alprazolam in the treatment of acute phase of panic disorder with and without agoraphobia. A comparative, multicenter (6 sites), double blind, randomized study was carried out. A total of 190 outpatients with (n=117) and without (n=73) agoraphobia were treated with ALP-SL or ALP-CT for 12 weeks. Outcome was assessed with the Clinical Global Impressions (CGI-S/CGI-I), Hamilton Rating Scale for Anxiety (HAM-A), Arizona Sexual Experiences Scale (ASEX), Patient Global Impression (PGI), Psychological General Well-Being Index (PGWBI), Panic Disorder Severity Scale (PDSS) also by the number of panic attacks and extension and intensity of panic attacks and anticipatory anxiety. RESULTS. Both treatments resulted in statistically significant clinical improvement in all measures. ASEX presented no changes during the study. The average dose of alprazolam for 12 weeks was 1.36 ± 0.70 mg/day (1.39 ± 0.77 ALP-CT and 1.33 ± 0.64 ALP-SL). With ALP-SL, panic attacks were shorter (p < 0.05) with shorter extension (p=0.16) and intensity of anticipatory anxiety (p=0.14). The treatment was well tolerated, there being no differences between both groups. Alprazolam has been demonstrated to have efficacy, safety and good tolerability in the treatment of the acute phase of panic disorder, the sublingual tablets showing some comparative advantages.

  13. Improved Fake-State Attack to the Quantum Key Distribution Systems

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wang, Jian; Tang, Chao-jing

    2012-09-01

    It has been showed that most commercial quantum cryptosystems are vulnerable to the fake-state attacks, which employ the loophole that the avalanche photodiodes as single photon detectors still produce detection events in the linear mode. However, previous fake-state attacks may be easily prevented by either installing a watch dog or reconfiguring the dead-time assigning component. In this paper, we present a new technique to counteract the after-pulse effect ever enhanced by the fake-state attacks, in order to lower the quantum bit error rate. Obviously, it is more difficult to detect the presented attack scheme. Indeed, it contributes to promoting of implementing a secure quantum cryptosystem in real life.

  14. Practical security and privacy attacks against biometric hashing using sparse recovery

    NASA Astrophysics Data System (ADS)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  15. Serial agonistic attacks by greylag goose families, Anser anser, against the same opponent

    PubMed Central

    Scheiber, Isabella B.R.; Kotrschal, Kurt; Weiß, Brigitte M.

    2011-01-01

    It is known from primates that alliance partners may support each other’s interests in competition with others, for example, through repeated agonistic attacks against a particular individual. We examined serial aggressive interactions between greylag goose families and other flock members. We found that repeated attacks towards the same individual were common and that up to five serial attacks by family members followed an initial attack. Family size did not affect the frequency of such serial attacks. Juvenile geese evidently benefited most from active social support through serial attacks. About 60% of the juveniles’ lost primary interactions were subsequently reversed by another family member. This may be one of the reasons why juveniles rank higher in the social hierarchy than would be expected from their age and size alone. Losses in serial attacks predominantly occurred against other, presumably higher-ranking, family geese and ganders. We propose three major functions/consequences of serial attacks. Analogous to primates, serial attacks in greylag geese may serve to reinforce a losing experience of an opponent defeated in a preceding attack. On the side of the winning family, serial attacks may reinforce the experience of winning. Both winning and losing experiences are linked with physiological consequences in higher vertebrates, affecting the future social performance of winners or losers. Finally, serial attacks may signal the agonistic potential of a family to other flock members. This is supported by heart rate data, which indicate that greylags are competent to interpret third-party relationships. PMID:21984838

  16. Optimum Use of Acute Treatments for Hereditary Angioedema: Evidence-Based Expert Consensus

    PubMed Central

    Longhurst, Hilary

    2018-01-01

    Acute treatment of hereditary angioedema due to C1 inhibitor deficiency has become available in the last 10 years and has greatly improved patients’ quality of life. Two plasma-derived C1 inhibitors (Berinert and Cinryze), a recombinant C1 inhibitor (Ruconest/Conestat alpha), a kallikrein inhibitor (Ecallantide), and a bradykinin B2 receptor inhibitor (Icatibant) are all effective. Durably good response is maintained over repeated treatments and several years. All currently available prophylactic agents are associated with breakthrough attacks, therefore an acute treatment plan is essential for every patient. Experience has shown that higher doses of C1 inhibitor than previously recommended may be desirable, although only recombinant C1 inhibitor has been subject to full dose–response evaluation. Treatment of early symptoms of an attack, with any licensed therapy, results in milder symptoms, more rapid resolution and shorter duration of attack, compared with later treatment. All therapies have been shown to be well-tolerated, with low risk of serious adverse events. Plasma-derived C1 inhibitors have a reassuring safety record regarding lack of transmission of virus or other infection. Thrombosis has been reported in association with plasma-derived C1 inhibitor in some case series. Ruconest was associated with anaphylaxis in a single rabbit-allergic volunteer, but no further anaphylaxis has been reported in those not allergic to rabbits despite, in a few cases, prior IgE sensitization to rabbit or milk protein. Icatibant is associated with high incidence of local reactions but not with systemic effects. Ecallantide may cause anaphylactoid reactions and is given under supervision. For children and pregnant women, plasma-derived C1 inhibitor has the best evidence of safety and currently remains first-line treatment. PMID:29594115

  17. Optimum Use of Acute Treatments for Hereditary Angioedema: Evidence-Based Expert Consensus.

    PubMed

    Longhurst, Hilary

    2017-01-01

    Acute treatment of hereditary angioedema due to C1 inhibitor deficiency has become available in the last 10 years and has greatly improved patients' quality of life. Two plasma-derived C1 inhibitors (Berinert and Cinryze), a recombinant C1 inhibitor (Ruconest/Conestat alpha), a kallikrein inhibitor (Ecallantide), and a bradykinin B2 receptor inhibitor (Icatibant) are all effective. Durably good response is maintained over repeated treatments and several years. All currently available prophylactic agents are associated with breakthrough attacks, therefore an acute treatment plan is essential for every patient. Experience has shown that higher doses of C1 inhibitor than previously recommended may be desirable, although only recombinant C1 inhibitor has been subject to full dose-response evaluation. Treatment of early symptoms of an attack, with any licensed therapy, results in milder symptoms, more rapid resolution and shorter duration of attack, compared with later treatment. All therapies have been shown to be well-tolerated, with low risk of serious adverse events. Plasma-derived C1 inhibitors have a reassuring safety record regarding lack of transmission of virus or other infection. Thrombosis has been reported in association with plasma-derived C1 inhibitor in some case series. Ruconest was associated with anaphylaxis in a single rabbit-allergic volunteer, but no further anaphylaxis has been reported in those not allergic to rabbits despite, in a few cases, prior IgE sensitization to rabbit or milk protein. Icatibant is associated with high incidence of local reactions but not with systemic effects. Ecallantide may cause anaphylactoid reactions and is given under supervision. For children and pregnant women, plasma-derived C1 inhibitor has the best evidence of safety and currently remains first-line treatment.

  18. A Randomized Trial of Ketorolac vs. Sumatripan vs. Placebo Nasal Spray (KSPN) for Acute Migraine.

    PubMed

    Rao, Aruna S; Gelaye, Bizu; Kurth, Tobias; Dash, Paul D; Nitchie, Haley; Peterlin, B Lee

    2016-02-01

    To compare the efficacy of ketorolac nasal spray (NS) vs. placebo and sumatriptan NS for the acute treatment of migraine. This was a randomized, double-blind, placebo and active-comparator, crossover study. Adult migraineurs were randomized to ketorolac NS 31.5 mg, sumatriptan NS 20 mg, or placebo to treat three moderate to severe migraine attacks and switched treatments with each attack. Patients seeking headache care at a headache center or in response to community advertisement were recruited. Adult participants with episodic migraine who experienced ≥2 migraine attacks per month were eligible for the Ketorolac vs. Sumatriptan vs. Placebo Nasal Spray migraine study. Participants were randomized to treatment arms by a research pharmacist, in a 1:1:1 ratio using computer-generated lists. The primary outcome was 2-hour pain relief. Secondary outcomes included 2-hour pain freedom and absence of migraine associated symptoms, and 24-hour sustained pain relief and pain freedom. Of the 72 randomized participants, 54 (75%) treated at least one attack and 49 (68%) completed all three treatments, for a total of 152 treated migraine attacks. Both ketorolac NS (72.5%, P < .001) and sumatriptan NS (69.4%, P = .001) were more effective than placebo (38.3%) for 2-hour pain relief and 2-hour pain freedom (ketorolac: 43.1%, P = .004; sumatriptan: 36.7%, P = .046; placebo: 18.4%). Ketorolac NS, but not sumatriptan NS, was more effective than placebo in 2-hour absence of nausea. Both ketorolac NS and sumatriptan NS were more effective than placebo for 24-hour sustained pain relief (ketorolac: 49%, P < .001; sumatriptan: 31%, P = .01, placebo: 20%). Only ketorolac NS was superior to placebo for 24-hour (ketorolac: 35.3%, P = .003; sumatriptan: 22.4%, P = .18, placebo: 12.2%) sustained pain freedom. Nasal burning and dysgeusia were the most common adverse effects for active treatments. This study supports that ketorolac NS is superior to placebo and

  19. Panic Attacks and Panic Disorder in the American Indian Community

    PubMed Central

    Sawchuk, Craig N.; Roy-Byrne, Peter; Noonan, Carolyn; Craner, Julia R.; Goldberg, Jack; Manson, Spero; Buchwald, Dedra

    2016-01-01

    Panic disorder is a common mental health condition, but little is known about panic disorder in non-Caucasian populations. The purpose of this study is to describe the epidemiology, clinical features, and comorbidities of panic attacks and panic disorder in two large American Indian (AI) tribes (N = 3,084). A culturally-adapted version of the Composite International Diagnostic Interview assessed panic attacks, panic disorder, and various psychiatric comorbidities. After adjusting for age, gender, and tribe, linear and logistic regression analyses were conducted to compare AIs with panic disorder to those with panic attacks only on clinical characteristics and panic symptoms. Approximately 8.5% (N = 234) of American Indians reported a lifetime history of panic attacks. Among individuals with panic attacks, comorbid posttraumatic stress disorder was higher in females (p = 0.03) and comorbid alcohol-related disorders were higher in males (p ≤ 0.001). The prevalence and clinical features of panic attacks and panic disorder in American Indians were similar to epidemiologic studies with majority populations. However, in contrast to earlier research, panic symptoms were similar in both males and females, and different patterns of comorbidity emerged. Future research should examine the availability and accessibility of evidence-based panic treatments for this traditionally underserved population. PMID:27720578

  20. Panic attacks and panic disorder in the American Indian community.

    PubMed

    Sawchuk, Craig N; Roy-Byrne, Peter; Noonan, Carolyn; Craner, Julia R; Goldberg, Jack; Manson, Spero; Buchwald, Dedra

    2017-05-01

    Panic disorder is a common mental health condition, but little is known about panic disorder in non-Caucasian populations. The purpose of this study is to describe the epidemiology, clinical features, and comorbidities of panic attacks and panic disorder in two large American Indian (AI) tribes (N=3084). A culturally-adapted version of the Composite International Diagnostic Interview assessed panic attacks, panic disorder, and various psychiatric comorbidities. After adjusting for age, gender, and tribe, linear and logistic regression analyses were conducted to compare AIs with panic disorder to those with panic attacks only on clinical characteristics and panic symptoms. Approximately 8.5% (N=234) of American Indians reported a lifetime history of panic attacks. Among individuals with panic attacks, comorbid posttraumatic stress disorder was higher in females (p=0.03) and comorbid alcohol-related disorders were higher in males (p≤0.001). The prevalence and clinical features of panic attacks and panic disorder in American Indians were similar to epidemiologic studies with majority populations. However, in contrast to earlier research, panic symptoms were similar in both males and females, and different patterns of comorbidity emerged. Future research should examine the availability and accessibility of evidence-based panic treatments for this traditionally underserved population. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. The maul of the wild. Animal attacks can produce significant trauma.

    PubMed

    Conrad, L

    1994-03-01

    Wild-animal attacks are almost an anachronism in our day and age. They remind us that humans can still be food or prey. Cougar attacks, though rare, produce significant trauma. Characteristic patterns of injury and wound infection should be appropriately identified and treated. As we protect wild-animal species and acknowledge their right to share territory, interactions--and possibly attacks--are likely to increase. Awareness, education, knowledge and prevention, rather than the elimination of animal populations, may be the best way to control wild-animal attacks on humans in the future.

  2. VTAC: virtual terrain assisted impact assessment for cyber attacks

    NASA Astrophysics Data System (ADS)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  3. A prospective evaluation of pancreatic exocrine function in patients with acute pancreatitis: correlation with extent of necrosis and pancreatic endocrine insufficiency.

    PubMed

    Boreham, B; Ammori, B J

    2003-01-01

    The aim of this prospective study was to assess pancreatic exocrine function in patients recovering from a first attack of acute pancreatitis, and to evaluate its relationship to severity of attack, extent of pancreatic necrosis and severity of pancreatic endocrine insufficiency. Between December 2000 and November 2001, 23 patients were prospectively evaluated. Pancreatic exocrine function was measured by the faecal elastase-1 test and insufficiency was classified as moderately impaired or severely impaired. Pancreatic necrosis was determined by contrast-enhanced CT scan, and its extent was categorised according to Balthazar's classification. The severity of pancreatic endocrine insufficiency was categorised according to insulin dependence. Attacks were classified as mild (n = 16) or severe (n = 7) according to the Atlanta criteria. Pancreatic exocrine insufficiency was significantly more frequent in patients recovering from severe attacks than mild (n = 6, 86% vs. n = 2, 13%; p = 0.002), and in those who developed pancreatic necrosis or pseudocyst than those who did not (6 of 7 patients vs. 2 of 16 patients, and 5 of 5 patients vs. 3 of 18 patients respectively; p = 0.002). The development of exocrine insufficiency correlated strongly with the extent of pancreatic necrosis (r = -0.754, p < 0.001), and the severity of pancreatic endocrine insufficiency (n = 4, r = -0.453, p = 0.03). Pancreatic exocrine insufficiency is a common occurrence in patients recovering from severe acute pancreatitis, and its severity correlates with the extent of pancreatic necrosis and the severity of concomitant pancreatic endocrine insufficiency. Copyright 2003 S. Karger AG, Basel and IAP

  4. Fallout risk following a major nuclear attack on the United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harvey, T.F.; Shapiro, C.S.; Wittler, R.F.

    Fallout distributions are calculated for nuclear attacks on the contiguous United States. Four attack scenarios are treated, including counterforce and counterforce-countervalue attacks, for meteorological conditions associated with a typical day in summer and one in winter. The countervalue attacks contain mostly airbursts. To determine fallout effects, the population surviving the prompt effects is first calculated. For the prompt effects, a 'conflagration-type' model is used. The counterforce attack produces about 8 million prompt deaths, and the counterforce-countervalue case projects 98 million prompt deaths. Partial relocation before attack to low-risk fallout areas at least 15 km from potential strategic targets would resultmore » in a decrease in projections of deaths by tens of millions. For fallout risk calculations, only the dose received in the first 48 h (the early or local fallout) is considered. Populations are assumed to be sheltered, with a shelter protection factor profile that varies for a large urban area, a small urban area, or a rural area. With these profiles, without relocation, the fallout fatalities for all four attack scenarios are calculated to be less than one million people. This can be compared to fallout fatalities of about 10 million for a hypothetical unsheltered 'phantom' population.« less

  5. Fallout risk following a major nuclear attack on the United States.

    PubMed

    Harvey, T F; Shapiro, C S; Wittler, R F

    1992-01-01

    Fallout distributions are calculated for nuclear attacks on the contiguous United States. Four attack scenarios are treated, including counterforce and counterforce-countervalue attacks, for meteorological conditions associated with a typical day in summer and one in winter. The countervalue attacks contain mostly airbursts. To determine fallout effects, the population surviving the prompt effects is first calculated. For the prompt effects, a "conflagration-type" model is used. The counterforce attack produces about 8 million prompt deaths, and the counterforce-countervalue case projects 98 million prompt deaths. Partial relocation before attack to low-risk fallout areas at least 15 km from potential strategic targets would result in a decrease in projections of deaths by tens of millions. For fallout risk calculations, only the dose received in the first 48 h (the early or local fallout) is considered. Populations are assumed to be sheltered, with a shelter protection factor profile that varies for a large urban area, a small urban area, or a rural area. With these profiles, without relocation, the fallout fatalities for all four attack scenarios are calculated to be less than one million people. This can be compared to fallout fatalities of about 10 million for a hypothetical unsheltered "phantom" population.

  6. Develop a solution for protecting and securing enterprise networks from malicious attacks

    NASA Astrophysics Data System (ADS)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  7. Spear Phishing Attack Detection

    DTIC Science & Technology

    2011-03-24

    the insider amongst senior leaders of an organization [Mes08], the undercover detective within a drug cartel, or the classic secret agent planted in...to a mimicry attack that shapes the embedded malware to have a statistical distribution similar to "normal" or benign behavior. 2.3.1.3

  8. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    NASA Astrophysics Data System (ADS)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  9. Understanding public confidence in government to prevent terrorist attacks.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered tomore » small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.« less

  10. Internet-based information-seeking behavior for transient ischemic attack.

    PubMed

    Abedi, Vida; Mbaye, Marieme; Tsivgoulis, Georgios; Male, Shailesh; Goyal, Nitin; Alexandrov, Andrei V; Zand, Ramin

    2015-12-01

    In recent years, Internet became an increasingly important tool for accessing health information and is being used more frequently to promote public health. To use Google search data to explore information seeking behavior for transient ischemic attack. We selected two groups of keywords related to transient ischemic attack: 'Transient Ischemic Attack' and 'Mini Stroke'. We obtained all available online search data performed in the United States from the Google search engine for a 10-year span--January 2004 to December 2013. The monthly and daily search data for the selected keywords were analyzed--using moving average--to explore the trends, peaks, and declining effects. There were three significant concurrent peaks in the Google search data for the selected keywords. Each peak was directly associated with media coverage and news headlines related to the incident of transient ischemic attack in a public figure. Following each event, it took three- to seven-days for the search trend to return to its respective average value. Furthermore, the trend was steady for 'Transient Ischemic Attack'; however, the search interest for the keyword 'Mini Stroke' shows a steady increase. The overall search interest for the selected keywords was significantly higher in the southeastern United States. Our study shows that changes in online search behavior can be associated with media coverage of key events (in our case transient ischemic attack) in public figures. These findings suggest that multimedia health promotion campaigns might be more effective, if increased promptly after similar media coverage. © 2015 World Stroke Organization.

  11. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  12. Panic Attacks and Panic Disorder

    MedlinePlus

    ... triggers severe physical reactions when there is no real danger or apparent cause. Panic attacks can be ... a loved one A traumatic event, such as sexual assault or a serious accident Major changes in your ...

  13. An Exploration of Hypotheses that Explain Herbivore and Pathogen Attack in Restored Plant Communities

    PubMed Central

    Blaisdell, G. Kai; Roy, Bitty A.; Pfeifer-Meister, Laurel; Bridgham, Scott D.

    2015-01-01

    Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to increased attack on one host species due to transmission from another host species, or enemy dilution may lead to reduced attack on a host that would otherwise have more attack, (iv) physical characteristics of the plant community may influence attack, and (v) plant vigor may affect attack. Restoration experiments with replicated plant communities provide an exceptional opportunity to explore these hypotheses. To explore the relative predictive strengths of these related hypotheses and to investigate the potential effect of several restoration site preparation techniques, we surveyed arthropod herbivore and fungal pathogen attack on the six most common native plant species in a restoration experiment. Multi-model inference revealed a weak but consistent negative correlation with pathogen attack and host diversity across the plant community, and no correlation between herbivory and host diversity. Our analyses also revealed host species-specific relationships between attack and abundance of the target host species, other native plant species, introduced plant species, and physical community characteristics. We found no relationship between enemy attack and plant vigor. We found minimal differences in plant community composition among several diverse site preparation techniques, and limited effects of site preparation techniques on attack. The strongest associations of community characteristics with attack varied among plant species with no community-wide patterns, suggesting that no single hypothesis successfully predicts the dominant community-wide trends in enemy attack. PMID:25699672

  14. Hereditary Angioedema Nationwide Study in Slovenia Reveals Four Novel Mutations in SERPING1 Gene

    PubMed Central

    Rijavec, Matija; Korošec, Peter; Šilar, Mira; Zidarn, Mihaela; Miljković, Jovan; Košnik, Mitja

    2013-01-01

    Hereditary angioedema (HAE) is a rare autosomal dominant disease characterized by swelling of the face, lips, tongue, larynx, genitalia, or extremities, with abdominal pain caused by intra-abdominal edema. HAE is caused by mutations affecting the C1 inhibitor gene, SERPING1, resulting in low levels of C1 inhibitor (Type I HAE) or normal levels of ineffective C1 inhibitor (Type II HAE). A nationwide survey identified nine unrelated families with HAE in Slovenia, among whom 17 individuals from eight families were recruited for genetic analyses. A diagnosis of HAE was established in the presence of clinical and laboratory criteria (low C1 inhibitor antigenic levels and/or function), followed up by a positive family history. Genetic studies were carried out using PCR and sequencing to detect SERPING1 mutations in promoter, noncoding exon 1, the 7 coding exons, and exon-intron boundaries. Multiplex ligation-dependent probe amplification was performed in order to search for large deletions/duplications in SERPING1 gene. A mutation responsible for HAE was identified in patients from seven families with the disease. In HAE type I families, one previously reported substitution (Gln67Stop, c.265C>T) and four novel mutations were identified. The new mutations included two missense substitutions, Ser128Phe (c.449C>T), and Glu429Lys (c.1351G>A), together with two frameshift mutations, indel (c.49delGinsTT) and deletion (c.593_594delCT). Both families with HAE type II harbored the two well-known substitutions affecting the arginyl residue at the reactive center in exon 8, Arg444Cys (c.1396C>T) and Arg444His (c.1397G>A), respectively. In one patient only the homozygous variant g.566T>C (c.-21T>C) was identified. Our study identified four novel mutations in the Slovenian HAE population, highlighting the heterogeneity of mutations in the SERPING1 gene causing C1 inhibitor deficiency and HAE. In a single patient with HAE a homozygous variant g.566T>C (c.-21T>C) might be responsible

  15. Hereditary angioedema nationwide study in Slovenia reveals four novel mutations in SERPING1 gene.

    PubMed

    Rijavec, Matija; Korošec, Peter; Šilar, Mira; Zidarn, Mihaela; Miljković, Jovan; Košnik, Mitja

    2013-01-01

    Hereditary angioedema (HAE) is a rare autosomal dominant disease characterized by swelling of the face, lips, tongue, larynx, genitalia, or extremities, with abdominal pain caused by intra-abdominal edema. HAE is caused by mutations affecting the C1 inhibitor gene, SERPING1, resulting in low levels of C1 inhibitor (Type I HAE) or normal levels of ineffective C1 inhibitor (Type II HAE). A nationwide survey identified nine unrelated families with HAE in Slovenia, among whom 17 individuals from eight families were recruited for genetic analyses. A diagnosis of HAE was established in the presence of clinical and laboratory criteria (low C1 inhibitor antigenic levels and/or function), followed up by a positive family history. Genetic studies were carried out using PCR and sequencing to detect SERPING1 mutations in promoter, noncoding exon 1, the 7 coding exons, and exon-intron boundaries. Multiplex ligation-dependent probe amplification was performed in order to search for large deletions/duplications in SERPING1 gene. A mutation responsible for HAE was identified in patients from seven families with the disease. In HAE type I families, one previously reported substitution (Gln67Stop, c.265C>T) and four novel mutations were identified. The new mutations included two missense substitutions, Ser128Phe (c.449C>T), and Glu429Lys (c.1351G>A), together with two frameshift mutations, indel (c.49delGinsTT) and deletion (c.593_594delCT). Both families with HAE type II harbored the two well-known substitutions affecting the arginyl residue at the reactive center in exon 8, Arg444Cys (c.1396C>T) and Arg444His (c.1397G>A), respectively. In one patient only the homozygous variant g.566T>C (c.-21T>C) was identified. Our study identified four novel mutations in the Slovenian HAE population, highlighting the heterogeneity of mutations in the SERPING1 gene causing C1 inhibitor deficiency and HAE. In a single patient with HAE a homozygous variant g.566T>C (c.-21T>C) might be responsible

  16. A Cyber-Attack Detection Model Based on Multivariate Analyses

    NASA Astrophysics Data System (ADS)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.

  17. Robust allocation of a defensive budget considering an attacker's private information.

    PubMed

    Nikoofal, Mohammad E; Zhuang, Jun

    2012-05-01

    Attackers' private information is one of the main issues in defensive resource allocation games in homeland security. The outcome of a defense resource allocation decision critically depends on the accuracy of estimations about the attacker's attributes. However, terrorists' goals may be unknown to the defender, necessitating robust decisions by the defender. This article develops a robust-optimization game-theoretical model for identifying optimal defense resource allocation strategies for a rational defender facing a strategic attacker while the attacker's valuation of targets, being the most critical attribute of the attacker, is unknown but belongs to bounded distribution-free intervals. To our best knowledge, no previous research has applied robust optimization in homeland security resource allocation when uncertainty is defined in bounded distribution-free intervals. The key features of our model include (1) modeling uncertainty in attackers' attributes, where uncertainty is characterized by bounded intervals; (2) finding the robust-optimization equilibrium for the defender using concepts dealing with budget of uncertainty and price of robustness; and (3) applying the proposed model to real data. © 2011 Society for Risk Analysis.

  18. Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks

    PubMed Central

    Chen, Xi; Zhu, Yuefei

    2017-01-01

    Network address shuffling is a novel moving target defense (MTD) that invalidates the address information collected by the attacker by dynamically changing or remapping the host’s network addresses. However, most network address shuffling methods are limited by the limited address space and rely on the host’s static domain name to map to its dynamic address; therefore these methods cannot effectively defend against random scanning attacks, and cannot defend against an attacker who knows the target’s domain name. In this paper, we propose a network defense method based on random domain name and address mutation (RDAM), which increases the scanning space of the attacker through a dynamic domain name method and reduces the probability that a host will be hit by an attacker scanning IP addresses using the domain name system (DNS) query list and the time window methods. Theoretical analysis and experimental results show that RDAM can defend against scanning attacks and worm propagation more effectively than general network address shuffling methods, while introducing an acceptable operational overhead. PMID:28489910

  19. Classifier fusion for VoIP attacks classification

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  20. Bio-inspired diversity for increasing attacker workload

    NASA Astrophysics Data System (ADS)

    Kuhn, Stephen

    2014-05-01

    Much of the traffic in modern computer networks is conducted between clients and servers, rather than client-toclient. As a result, servers represent a high-value target for collection and analysis of network traffic. As they reside at a single network location (i.e. IP/MAC address) for long periods of time. Servers present a static target for surveillance, and a unique opportunity to observe the network traffic. Although servers present a heightened value for attackers, the security community as a whole has shifted more towards protecting clients in recent years leaving a gap in coverage. In addition, servers typically remain active on networks for years, potentially decades. This paper builds on previous work that demonstrated a proof of concept leveraging existing technology for increasing attacker workload. Here we present our clean slate approach to increasing attacker workload through a novel hypervisor and micro-kernel, utilizing next generation virtualization technology to create synthetic diversity of the server's presence including the hardware components.

  1. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    PubMed

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2017-05-01

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  2. Phenomenology of panic attacks: a descriptive study of panic disorder patients' self-reports.

    PubMed

    Aronson, T A; Logue, C M

    1988-01-01

    The phenomenology of panic disorder and panic attacks was systematically assessed in 46 consecutive patients. The results suggest that DSM-III criteria include several symptoms that are not frequently present during a panic attack and that DSM-III's characterization of a panic attack is imprecise and misleading. Panic attacks were found to vary in intensity, frequency, spontaneity, and associated symptoms. A panic attack typically presents as a unified symptom complex of psychic anxiety and multiple somatic symptoms in multiple body systems. It occurs in a crescendolike pattern, is self-limited, and often leaves the subject weak or shaken. The temporal course as much as the symptomatic presentation defines a panic attack.

  3. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may helpmore » address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-system’s state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.« less

  4. Factors influencing care seeking for a self-defined worst panic attack.

    PubMed

    Katerndahl, David A

    2002-04-01

    Only 60 percent of persons who experience panic attacks seek treatment for them, many at the emergency department. The author documented care-seeking behaviors among persons living in the community who had experienced panic attacks and studied determinants of care seeking. In-depth structured interviews were conducted with 97 randomly selected community-dwelling adults who met DSM-III-R criteria for panic attacks. Participants were asked whether they had contemplated using or had actually used medical, alternative, and family sources of care when they had experienced their worst attack. Seventy-seven participants (79 percent) had considered using a general medical or mental health site when they experienced their worst attack. Of these, 50 (52 percent) had actually used such a site. General medical sites were contemplated more often (72 percent of participants) than mental health sites (27 percent), particularly emergency departments (43 percent) and family physicians' offices (34 percent). Other sources, such as friends or family members, alternative sites, and self-treatment, were contemplated less often. Once contemplated, certain sources were readily used, such as ambulances, family members, and self-treatment. Several factors were significantly associated with whether a person contemplated seeking care: access or barriers to treatment, perception of symptoms and of the reasons for the panic attack, and family-related variables. Contemplation and use of a mental health site after a panic attack was rare among the participants in this study. Further study of determinants of care seeking may help explain why persons who experience panic attacks fail to seek treatment or seek treatment from non-mental health sources.

  5. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    ERIC Educational Resources Information Center

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  6. Heart Lesion After the First Attack of the Rheumatic Fever 22 Years Experience in Single Centre

    PubMed Central

    Bejiqi, Ramush A.; Retkoceri, Ragip; Zeka, Naim; Bejiqi, Hana; Retkoceri, Arber

    2015-01-01

    Background: Acute rheumatic fever and its sequels, rheumatic heart diseases, remain major unsolved preventable health problems in Kosovo population, particularly among the disadvantages indigenous Albanian and Egyptians people. In Kosovo, despite of performing secondary prophylaxis with benzathine penicillin, acute rheumatic fever hospitalization rates have remained essentially unchanged for the last 20 years. The role of echocardiography in the diagnosis of acute rheumatic carditis was established over the last 20 years. Aims: In this study we aimed to determine the prevalence of rheumatic heart disease in children from Kosovo population with first attack of acute rheumatic fever. Also, we presented that echocardiography examination detects a greater prevalence of rheumatic heart disease than other diagnostic procedures. We aimed to compare the sensitivity and specificity of cardiac auscultation, ECG record, lab analysis to echocardiography and to determine the feasibility of specific age in this setting. Methods: To optimize accurate diagnosis of rheumatic fever and rheumatic heart disease, we utilized two group models. In the first group of 388 children, hospitalized and treated before 1999, diagnosis of rheumatic fever was decided basing on the clinical and laboratory findings whereas in second group (221 children treated from1999 to 2010) clinical and lab diagnosis were amplified also on the detection by echocardiography. Conclusion: In second group, using echocardiography as a method of diagnosis and assessment children with rheumatic fever, we found high rates of undetected rheumatic heart disease in this high-risk group population. Echocardiographic examination of children with rheumatic fever for rheumatic heart disease may over diagnose rheumatic heart disease unless congenital mitral valve anomalies and physiological regurgitation are excluded. PMID:25870479

  7. The Spatial and Temporal Patterns of Insurgent Attacks

    DTIC Science & Technology

    2014-06-13

    INTRODUCTION We must not rely on changing the hearts and minds of terrorists. The motivation for terrorism results from long-term social, cultural and...psychological pressures, which are difficult to alter. But motivation is only part of the formula for terrorism. The other is opportunity for attack that...terrorists; motivation and opportunity reduction brings more immediate protection. In any case, easy opportunities encourage terrorists to attack

  8. Prediction of the noise from a propeller at angle of attack

    NASA Technical Reports Server (NTRS)

    Krejsa, Eugene A.

    1990-01-01

    An analysis is presented to predict the noise of a propeller at angle of attack. The analysis is an extension of that reported by Mani which predicted the change in noise due to angle of attack to both unsteady loading and to azimuthal variation of the radiation efficiency of steady noise sources. Mani's analysis, however, was limited to small angles of attack. The analysis reported herein removes this small angle limitation. Results from the analysis are compared with the data of Woodward for a single rotation propeller and a counter rotating propeller. The comparison shows that including the effect of angle of attack on the steady noise sources significantly improves the agreement with data. Including higher order effects of angle of attack, while changing the predicted noise at far forward and aft angles, has little effect near the propeller plane.

  9. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  10. Hypothermia during migraine attacks.

    PubMed

    Porta-Etessam, Jesús; Cuadrado, María L; Rodríguez-Gómez, Octavio; Valencia, Cristina; García-Ptacek, Sara

    2010-11-01

    Episodic spontaneous hypothermia is an infrequent disorder. Here, the case of a patient with migraine who experienced hypothermia during her migraine attacks is presented. The authors propose that larger clinical series should be studied to evaluate the occurrence of hypothermia in migraine, as well as the possible influence of some preventive regimens in this setting.

  11. Signs of an asthma attack

    MedlinePlus

    ... Bronchial asthma - attack References Durrani SR, Busse WW. Management of asthma in adolescents and adults. In: Adkinson NF Jr, Bochner BS, Burks AW, et al, eds. Middleton's Allergy Principles and Practice . 8th ed. Philadelphia, PA: Elsevier Saunders; ...

  12. EVALUATION OF THE CHANGES IN THE NASAL CAVITY DURING THE MIGRAINE ATTACK

    PubMed Central

    Arslan, H. Hüseyin; Tokgöz, Erkan; Yıldızoğlu, Üzeyir; Durmaz, Abdullah; Bek, Semai; Gerek, Mustafa

    2012-01-01

    Objectives There are some subjective symptoms involving the nasal cavity such as nasal congestion during a migraine attack. In this study, we aimed to evaluate the possible changes occuring in the nasal cavity, during headache in migraine patients. Material and Methods Subjects with migraine were studied. The control group was consisted with tension-type headache patients. The severity of the headache and accompanying complaints were assessed by visual analog scale, and nasal mucosa was assessed by anterior rhinoscopy and endoscopy. Resistance of the nasal cavity was evaluated with anterior rhinomanometry. The data obtained during the attack periods and attack free periods were compared. Results 25 migraine patients and 15 tension-type headache patients were enrolled. It was found that 19 subjects (%76) of migraine group and 5 of tension-type headache group were suffering from nasal congestion during the attack, and that the differences between the groups were statistically significant (p<0.05). The average of total nasal resistance in migraine patients was 0,57±0,60 kPa/L/sn during migraine attacks and 0,28±0,14 kPa/L/sn during attack free periods. The average of total nasal resistance in tension-type headache patients was 0,32±0,14 kPa/L/sn during attack periods and 0,31±0,20 kPa/L/sn during attack free periods. In the migraine group, the change of nasal resistance between during the attack and attack free periods was found statistically significant, while there was no statistically significant difference in the tension-type headache group. Conclusion According to the results of this study, complaining of nasal obstruction and nasal airway resistance increases during migraine attacks. Cause and effect relationship between nasal obstruction and pain is not clear and clinical trials are needed to determine the effect of nasal obstruction treatment (mucosal decongestion etc.) on the complaint of pain. PMID:25072974

  13. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  14. Attack Classification Schema for Smart City WSNs

    PubMed Central

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-01-01

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN. PMID:28379192

  15. Attack Classification Schema for Smart City WSNs.

    PubMed

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  16. Effects of sarin on the nervous system in rescue team staff members and police officers 3 years after the Tokyo subway sarin attack.

    PubMed

    Nishiwaki, Y; Maekawa, K; Ogawa, Y; Asukai, N; Minami, M; Omae, K

    2001-11-01

    Although the clinical manifestations of acute sarin poisoning have been reported in detail, no comprehensive study of the chronic physical and psychiatric effects of acute sarin poisoning has been carried out. To clarify the chronic effects of sarin on the nervous system, a cross-sectional epidemiologic study was conducted 3 years after the Tokyo subway sarin attack. Subjects consisted of the rescue team staff members and police officers who had worked at the disaster site. Subjects consisted of 56 male exposed subjects and 52 referent subjects matched for age and occupation. A neurobehavioral test, stabilometry, and measurement of vibration perception thresholds were performed, as well as psychometric tests to assess traumatic stress symptoms. The exposed group performed less well in the backward digit span test than the referent group in a dose-effect manner. This result was the same after controlling for possible confounding factors and was independent of traumatic stress symptoms. In other tests of memory function, except for the Benton visual retention test (mean correct answers), effects related to exposure were also suggested, although they were not statistically significant. In contrast, the dose-effect relationships observed in the neurobehavioral tests (psychomotor function) were unclear. None of the stabilometry and vibration perception threshold parameters had any relation to exposure. Our findings suggest the chronic decline of memory function 2 years and 10 months to 3 years and 9 months after exposure to sarin in the Tokyo subway attack, and further study is needed.

  17. Effects of sarin on the nervous system in rescue team staff members and police officers 3 years after the Tokyo subway sarin attack.

    PubMed Central

    Nishiwaki, Y; Maekawa, K; Ogawa, Y; Asukai, N; Minami, M; Omae, K

    2001-01-01

    Although the clinical manifestations of acute sarin poisoning have been reported in detail, no comprehensive study of the chronic physical and psychiatric effects of acute sarin poisoning has been carried out. To clarify the chronic effects of sarin on the nervous system, a cross-sectional epidemiologic study was conducted 3 years after the Tokyo subway sarin attack. Subjects consisted of the rescue team staff members and police officers who had worked at the disaster site. Subjects consisted of 56 male exposed subjects and 52 referent subjects matched for age and occupation. A neurobehavioral test, stabilometry, and measurement of vibration perception thresholds were performed, as well as psychometric tests to assess traumatic stress symptoms. The exposed group performed less well in the backward digit span test than the referent group in a dose-effect manner. This result was the same after controlling for possible confounding factors and was independent of traumatic stress symptoms. In other tests of memory function, except for the Benton visual retention test (mean correct answers), effects related to exposure were also suggested, although they were not statistically significant. In contrast, the dose-effect relationships observed in the neurobehavioral tests (psychomotor function) were unclear. None of the stabilometry and vibration perception threshold parameters had any relation to exposure. Our findings suggest the chronic decline of memory function 2 years and 10 months to 3 years and 9 months after exposure to sarin in the Tokyo subway attack, and further study is needed. PMID:11713003

  18. Network Security Risk Assessment System Based on Attack Graph and Markov Chain

    NASA Astrophysics Data System (ADS)

    Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian

    2017-10-01

    Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.

  19. Towards A Taxonomy Of Attacks Against Energy Control Systems

    NASA Astrophysics Data System (ADS)

    Fleury, Terry; Khurana, Himanshu; Welch, Von

    Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.

  20. Learn What a Heart Attack Feels Like--It Could Save Your Life

    MedlinePlus

    Learn What a Heart Attack Feels Like— It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to ... heart attack warning signs. Your chest hurts or feels squeezed. One or both arms, your back, shoulders, ...