Science.gov

Sample records for acute hae attacks

  1. [Hereditary angioedema. Treatment of acute attacks in Argentina].

    PubMed

    Malbrán, Alejandro; Malbrán, Eloisa; Menéndez, Alejandra; Fernández Romero, Diego S

    2014-01-01

    In the world, hereditary angioedema (HAE) affects 1 every 50000 persons. It is characterized by highly disabling and recurrent episodes of cutaneous, abdominal and laryngeal episodes of angioedema. Asphyxia related mortality ranges from 15 to 50%. In Argentina a plasma derived C1 inhibitor concentrate (pdC1INH) has been available for the treatment of acute attacks for many decades, however, only15 (26%) out of 58 patients had received pdC1INH at least once until 2008, and only2 (3.4%) had used it regularly. After worldwide approval of the new drugs for the treatment of acute HAE attacks, adding icatibant to pdC1INH in Argentina, and after publication of the therapeutic guide for the country, 42 (82%) out of 51 patients from the original group has pdC1INH available to treat their next attack. However, 16 (18%) patients continue without access to medication and other 15 (35.7%) obtain their therapy spuriously through some other affected relative in their environment. Only 12 (28.6%) patients of the group self-treated at home. Access to treatment has greatly improved, but needs to be extended to all patients and self-treatment at home should be encouraged.

  2. Recent developments in the treatment of acute abdominal and facial attacks of hereditary angioedema: focus on human C1 esterase inhibitor

    PubMed Central

    Cardona, Lourdes Pastó; Bellfill, Ramon Lleonart; Caus, Joaquim Marcoval

    2010-01-01

    Hereditary angioedema (HAE) is a potentially fatal genetic disorder typified by a deficiency (type I) or dysfunction (type II) of the C1-inhibitor (C1-INH) and characterized by swelling of the extremities, face, trunk, abdominal viscera, and upper airway. Type III is normal estrogen-sensitive C1-INH HAE. Bradykinin, the main mediator of HAE, binds to endothelial B2 receptors, increasing vascular permeability and resulting in edema. HAE management includes short- and long-term prophylaxis. For treating acute episodes, C1-INH concentrate is recommended with regression of symptoms achieved in 30–90 min. Infusions of 500–1000 U have been used in Europe for years. Two plasma-derived C1-INH concentrates have been licensed recently in the United States: Berinert® for treating acute attacks and Cinryze® for prophylaxis in adolescent/adult patients. A recombinant C1-INH that is being considered for approval (conestat alfa) exhibited significant superiority versus placebo. Ecallantide (Kalbitor®) is a selective kallikrein inhibitor recently licensed in the United States for treating acute attacks in patients aged >16 years. It is administered in three 10-mg subcutaneous injections with the risk of anaphylactic reactions. Icatibant (Firazyr®) is a bradykinin B2 receptor competitor. It is administered subcutaneously as a 30-mg injection and approved in Europe but not in the United States. PMID:23776358

  3. Improving patient outcomes in hereditary angioedema: reducing attack frequency using routine prevention with C1 inhibitor concentrate

    PubMed Central

    Dominas, Nina; Hoffmann, Thomas K; Bas, Murat; Greve, Jens

    2014-01-01

    Hereditary angioedema (HAE) is a rare inherited disorder, characterised by recurrent oedema attacks in various regions of the body. In HAE, mutations in the C1 esterase inhibitor (C1-INH) gene result in decreased C1-INH concentrations (type I HAE) or functionally deficient C1-INH (type II HAE), leading to inappropriate activation of the kallikrein–kinin system and release of vasoactive mediators. Treatment of HAE aims to manage acute attacks (using replacement C1-INH or bradykinin B2 receptor antagonist) or prevent attacks through prophylaxis (using C1-INH or attenuated androgens). We present a case of a 67-year-old man with HAE who suffered a high number of breakthrough HAE attacks while undergoing long-term prophylaxis with attenuated androgens. Androgen therapy was safely discontinued and routine prevention therapy with C1-INH (1000 U) introduced as part of an individualised management approach, in line with published clinical trial data, which improved patient outcomes in terms of HAE attack frequency and severity. PMID:24850548

  4. Imaging Recommendations for Acute Stroke and Transient Ischemic Attack Patients

    PubMed Central

    Wintermark, Max; Sanelli, Pina C.; Albers, Gregory W.; Bello, Jacqueline A.; Derdeyn, Colin P.; Hetts, Steven W.; Johnson, Michele H.; Kidwell, Chelsea S.; Lev, Michael H.; Liebeskind, David S.; Rowley, Howard A.; Schaefer, Pamela W.; Sunshine, Jeffrey L.; Zaharchuk, Greg; Meltzer, Carolyn C.

    2014-01-01

    In the article entitled “Imaging Recommendations for Acute Stroke and Transient Ischemic Attack Patients: A Joint Statement by the American Society of Neuroradiology, the American College of Radiology and the Society of NeuroInterventional Surgery”, we are proposing a simple, pragmatic approach that will allow the reader to develop an optimal imaging algorithm for stroke patients at their institution. PMID:23948676

  5. Acute kidney injury after massive attack of Africanised bees

    PubMed Central

    Bridi, Ramaiane A; Balbi, Andre Luis; Neves, Precil M; Ponce, Daniela

    2014-01-01

    Acute kidney injury (AKI) is a well-documented complication of massive attack by Africanised bees and can be observed 48–72 h after the accident. We report a case of Africanised bees attack followed by severe and lethal AKI. A 56-year-old man was admitted to emergency department after a massive attack of Africanised bees (>1000 bee stings). He was unconscious, presenting with hypotension and tachycardia. Mechanical ventilation, volume expansion and care for anaphylaxis were instituted. The patient was transferred to the intensive care unit (ICU) and after 48 h he developed rhabdomyolysis, oliguria, increased creatinine levels, hyperkalaemia and refractory acidosis. A diagnosis of AKI secondary to rhabdomyolysis and shock was made. The patient was treated with a prolonged course of haemodialysis. However, he progressed to refractory shock and died 5 days after admission. PMID:24618864

  6. Repeat treatment of acute hereditary angioedema attacks with open-label icatibant in the FAST-1 trial

    PubMed Central

    Malbrán, A; Riedl, M; Ritchie, B; Smith, W B; Yang, W; Banerji, A; Hébert, J; Gleich, G J; Hurewitz, D; Jacobson, K W; Bernstein, J A; Khan, D A; Kirkpatrick, C H; Resnick, D; Li, H; Fernández Romero, D S; Lumry, W

    2014-01-01

    Hereditary angioedema (HAE) is characterized by potentially life-threatening recurrent episodes of oedema. The open-label extension (OLE) phase of the For Angioedema Subcutaneous Treatment (FAST)-1 trial (NCT00097695) evaluated the efficacy and safety of repeated icatibant exposure in adults with multiple HAE attacks. Following completion of the randomized, controlled phase, patients could receive open-label icatibant (30 mg subcutaneously) for subsequent attacks. The primary end-point was time to onset of primary symptom relief, as assessed by visual analogue scale (VAS). Descriptive statistics were reported for cutaneous/abdominal attacks 1–10 treated in the OLE phase and individual laryngeal attacks. Post-hoc analyses were conducted in patients with ≥ 5 attacks across the controlled and OLE phases. Safety was evaluated throughout. During the OLE phase, 72 patients received icatibant for 340 attacks. For cutaneous/abdominal attacks 1–10, the median time to onset of primary symptom relief was 1·0–2·0 h. For laryngeal attacks 1–12, patient-assessed median time to initial symptom improvement was 0·3–1·2 h. Post-hoc analyses showed the time to onset of symptom relief based on composite VAS was consistent across repeated treatments with icatibant. One injection of icatibant was sufficient to treat 88·2% of attacks; rescue medication was required in 5·3% of attacks. No icatibant-related serious adverse events were reported. Icatibant provided consistent efficacy and was well tolerated for repeated treatment of HAE attacks. PMID:24749847

  7. Current characteristics associated with hereditary angioedema attacks and treatment: the home infusion based patient experience.

    PubMed

    Tachdjian, Raffi; Banerji, Aleena; Guyer, Autumn; Morphew, Tricia

    2015-01-01

    This article presents a current perspective on the characteristics of hereditary angioedema (HAE) attacks and treatment as captured by a home infusion service. Retrospective data on 158 HAE patients who were enrolled in this acute treatment program were analyzed for factors surrounding an attack. The majority of patients had a high level of disease severity at baseline (88%), with a higher than expected likelihood of having a positive family history (87.8%). The most likely times for patients to call for home treatment were just before and during working hours (6:00 A.M.-5:00 P.M.). Eighty-three percent had more than one alternate mode of medication. Factors associated with a severe attack included an overall severe rating of HAE attacks in the previous year, an abdominal attack alone or a combination of peripheral and abdominal attacks versus a peripheral attack alone, and the use of two doses rather than one for treatment of the current attack. Average time to relief onset was 43.5 minutes. One dose of ecallantide was sufficient to treat the majority of attacks, and a second dose was needed in 23.6% of patients experiencing a severe attack. However, patients who reported both a severe attack rating during the previous year and experiencing only a peripheral current attack were more likely to experience a severe current attack. Acute treatment paradigms for HAE remain diverse. Understanding factors driving these decisions could help alleviate the overall burden of this disease and help overcome some of the challenges faced by the patients and their caretakers and improve their quality of life. Enhanced capture and analysis of prodromal factors in future studies should help us further alleviate the burden of this disease.

  8. The triggers or precipitants of the acute migraine attack.

    PubMed

    Kelman, L

    2007-05-01

    The aim of this study was to evaluate and define the triggers of the acute migraine attack. Patients rated triggers on a 0-3 scale for the average headache. Demographics, prodrome, aura, headache characteristics, postdrome, medication responsiveness, acute and chronic disability, sleep characteristics and social and personal characteristics were also recorded. One thousand two hundred and seven International Classification of Headache Disorders-2 (1.1-1.2, and 1.5.1) patients were evaluated, of whom 75.9% reported triggers (40.4% infrequently, 26.7% frequently and 8.8% very frequently). The trigger frequencies were stress (79.7%), hormones in women (65.1%), not eating (57.3%), weather (53.2%), sleep disturbance (49.8%), perfume or odour (43.7%), neck pain (38.4%), light(s) (38.1%), alcohol (37.8%), smoke (35.7%), sleeping late (32.0%), heat (30.3%), food (26.9%), exercise (22.1%) and sexual activity (5.2%). Triggers were more likely to be associated with a more florid acute migraine attack. Differences were seen between women and men, aura and no aura, episodic and chronic migraine, and between migraine and probable migraine.

  9. C1-inhibitor therapy for hereditary angioedema attacks: prospective patient assessments of health-related quality of life.

    PubMed

    Bewtra, Againdra K; Levy, Robyn J; Jacobson, Kraig W; Wasserman, Richard L; Machnig, Thomas; Craig, Timothy J

    2012-01-01

    C1-inhibitor (INH) concentrate, which is recommended as first-line treatment for acute hereditary angioedema (HAE) attacks in many countries, was recently approved in the United States. We sought to solicit patients' feedback about their health-related quality of life (HRQoL) while being treated with C1-INH concentrate for acute HAE attacks under real-world conditions, as well as the personal impact of the availability of C1-INH on lifestyle and mental health domains. Subjects enrolled in an open-label study of C1-INH at 20 U/kg for acute HAE attacks were invited to participate in a prospectively designed survey to solicit "real-time" patient responses that were collected via an interactive voice response service or online with a personal computer. Eighteen subjects submitted 60 quarterly HRQoL and treatment impact survey responses over 29 months. Seventeen of 18 patients responding reported mean short form 12 HRQoL scores that were within a normal range. More than one-half indicated that C1-INH availability made them feel somewhat or much better, and >80% reported having a better outlook on the future and feeling more secure about the danger of life-threatening attacks. These data confirm a high level of HRQoL and a positive impact in lifestyle and emotional domains among patients who were treated for acute attacks of HAE with C1-INH concentrate.

  10. Generation of plasmin during acute attacks of hereditary angioedema.

    PubMed

    Cugno, M; Hack, C E; de Boer, J P; Eerenberg, A J; Agostoni, A; Cicardi, M

    1993-01-01

    Hereditary angioedema is caused by a genetic deficiency of C1-inhibitor, a serine protease inhibitor that regulates activation of complement, contact, and fibrinolytic systems. Symptoms (bouts of subcutaneous and mucous swelling) depend on the release of a vasoactive mediator, probably through activation of these three systems. We studied the interrelationship among complement, contact, and fibrinolytic activation in 23 patients with hereditary angiodema, 18 during remission and five during an attack, by measuring plasma levels of C1-C1 inhibitor, factor XIIa-C1 inhibitor, kallikrein-C1 inhibitor, and plasmin-alpha 2-antiplasmin complexes, tissue plasminogen activator, and urokinase plasminogen activator. In addition, cleavage of high-molecular weight kininogen was detected by sodium dodecyl sulfate polyacrylamide gel electrophoresis analysis and quantified by densitometry. During remission, plasma levels of C1-C1 inhibitor complexes were elevated (p = 0.0002), whereas the other parameters were within the normal range. During acute attacks, not only plasma levels of C1-C1 inhibitor complexes but also those of plasmin-alpha 2-antiplasmin complexes (P = 0.0009) and cleaved high-molecular weight kininogen were elevated. A positive correlation between plasmin-alpha 2-antiplasmin complexes and cleaved high-molecular weight kininogen was observed (r = 0.75, p < 0.001). This article presents the first in vivo evidence that supports the concept that release of vasoactive mediators in hereditary angiodema attacks is associated with the activation of the fibrinolytic system.

  11. Home treatment of attacks with conestat alfa in hereditary angioedema due to C1-inhibitor deficiency.

    PubMed

    Farkas, Henriette; Csuka, Dorottya; Veszeli, Nóra; Zotter, Zsuzsanna; Szabó, Erika; Varga, Lilian

    2014-01-01

    Conestat alfa, a recombinant human C1 inhibitor (rhC1-INH) is a novel therapeutic option for the acute treatment of hereditary angioedema due to C1-INH (HAE-C1-INH) deficiency. Our aim was to investigate the efficacy and safety profile of conestat alfa in patients with HAE-C1-INH, under real-life conditions. We analyzed 65 edematous episodes requiring acute treatment and occurring in two female HAE-C1-INH patients. The patients were treated at home with rhC1-INH per occasion. They recorded the time of rhC1-INH administration, the time to the onset of improvement, and time to the complete resolution of symptoms, as well as the side effects. Symptom severity and patient satisfaction were measured with a visual analog scale (VAS). Thirty-three HAE attacks occurred in submucosal tissue, 17 in subcutaneous tissue, and 15 had mixed locations. After the administration of rhC1-INH, clinical symptoms improved within 0.50 (0.17-4.50 hours) hours and resolved completely within 9.00 (1.67-58.75 hours) hours. The time between the onset of the attack and the administration of rhC1-INH was correlated with the time when the symptoms stopped worsening (R = 0.3212; p = 0.0096) and the time to complete resolution of the symptoms (R = 0.4774; p < 0.0001). The time to response to the drug differed with attack location. The efficacy and safety of rhC1-INH persisted after repeated use. None of the patients experienced a recurrence of the HAE attack or drug-related systemic adverse events. The mean VAS score of patient satisfaction was 93.14. Home treatment with rhC1-INH was an effective and well-tolerated therapy for all types of HAE attacks.

  12. Diffusion Weighted Imaging in Acute Attacks of Multiple Sclerosis

    PubMed Central

    Davoudi, Yasmin; Foroughipour, Mohsen; Torabi, Reza; Layegh, Parvaneh; Matin, Nassim; Shoeibi, Ali

    2016-01-01

    Background Multiple sclerosis (MS) is one of the most common autoimmune disorders of the central nervous system. In spite of various imaging modalities, the definitive diagnosis of MS remains challenging. Objectives This study was designed to evaluate the usefulness of diffusion weighted imaging (DWI) in the diagnosis of acute MS attack and to compare its results with contrast enhanced MRI (CE-MRI). Patients and Methods In this cross sectional study, seventy patients with definite diagnosis of relapsing-remitting MS were included. CE-MRI using 0.1 mmol/kg gadolinium as well as DWI sequences were performed for all patients. The percentage of patients with positive DWI was compared with the results of CE-MRI and the consistency between the two imaging modalities was evaluated. Moreover, the relationship between the time of onset of patient’s symptoms and test results for both methods were investigated. Results CE-MRI yielded positive results for 61 (87%) patients and DWI yielded positive for 53 (76%) patients. In fifty patients (71.42%), both tests were positive and in six cases (8.57%), both were negative. The test results of three patients turned out to be positive in DWI, while they tested negative in CE-MRI. There was no significant relationship between the results of CE-MRI as well as DWI and the time of imaging from the onset of symptoms. Conclusion These data indicate that while CE-MRI will depict more positive results, there are cases in which DWI will show a positive result while CE-MRI is negative. We suggest that the combination of these two imaging modalities might yield more positive results in diagnosing acute MS attack giving rise to a more accurate diagnosis.

  13. Nanofiltered C1 esterase inhibitor (human) for hereditary angioedema attacks in pregnant women.

    PubMed

    Baker, James W; Craig, Timothy J; Riedl, Marc A; Banerji, Aleena; Fitts, David; Kalfus, Ira N; Uknis, Marc E

    2013-01-01

    Data are limited on hereditary angioedema (HAE) in pregnant women and the safety and efficacy of therapies for treatment and prevention of HAE attacks during pregnancy. Prospective studies are unlikely given the rarity of HAE and ethical considerations regarding enrollment of pregnant female subjects in clinical trials. A retrospective analysis of clinical trial and compassionate-use data was conducted to identify subjects who received nanofiltered C1 esterase inhibitor (C1 INH-nf; human) during pregnancy. This study evaluates the efficacy and safety of human C1 INH-nf for treatment and prevention of HAE attacks in pregnant women. Data from pregnant subjects enrolled in either open-label extensions of two randomized, double-blind, placebo-controlled trials of C1 INH-nf or in a compassionate-use program were retrospectively analyzed for efficacy (e.g., total attacks, attack frequency during prophylaxis, and monthly attack rates) and safety (e.g., pregnancy outcomes and adverse events). C1 INH-nf was administered as acute treatment, preprocedural prophylaxis, or routine prophylaxis. C1 INH-nf prophylaxis substantially reduced monthly attack rates. Of 16 subjects, 13 delivered 14 healthy neonates (1 set of twins). Two adverse fetal outcomes were reported; neither was considered by the principal investigator to be related to C1 INH-nf. One subject's pregnancy outcome was unknown. This analysis shows a favorable risk-benefit profile for C1 INH-nf for managing HAE during pregnancy. NCT Identifier: NCT00438815; NCT00462709. PMID:23484892

  14. Acute stress disorder in hospitalised victims of 26/11-terror attack on Mumbai, India.

    PubMed

    Balasinorwala, Vanshree Patil; Shah, Nilesh

    2010-11-01

    The 26/11 terror attacks on Mumbai have been internationally denounced. Acute stress disorder is common in victims of terror. To find out the prevalence and to correlate acute stress disorder, 70 hospitalised victims of terror were assessed for presence of the same using DSM-IV TR criteria. Demographic data and clinical variables were also collected. Acute stress disorder was found in 30% patients. On demographic profile and severity of injury, there were some interesting observations and differences between the victims who developed acute stress disorder and those who did not; though none of the differences reached the level of statistical significance. This study documents the occurrence of acute stress disorder in the victims of 26/11 terror attack.

  15. Prevention of comorbidity and acute attack of gout by uric acid lowering therapy.

    PubMed

    Joo, Kowoon; Kwon, Seong-Ryul; Lim, Mie-Jin; Jung, Kyong-Hee; Joo, Hoyeon; Park, Won

    2014-05-01

    The object of this study was to evaluate the effect of uric acid lowering therapy in reducing the new development of comorbidities and the frequency of acute attacks in gout patients. We retrospectively reviewed patients who were diagnosed to have gout with at least 3 yr of follow up. They were divided into 2 groups; 53 patients with mean serum uric acid level (sUA)<6 mg/dL and 147 patients with mean sUA≥6 mg/dL. Comorbidities of gout such as hypertension (HTN), type II diabetes mellitus (DM), chronic kidney disease, cardiovascular disease (CVD) and urolithiasis were compared in each group at baseline and at last follow-up visit. Frequency of acute gout attacks were also compared between the groups. During the mean follow up period of 7.6 yr, the yearly rate of acute attack and the new development of HTN, DM, CVD and urolithiasis was lower in the adequately treated group compared to the inadequately treated group. Tight control of uric acid decreases the incidence of acute gout attacks and comorbidities of gout such as HTN, DM, CVD and urolithiasis.

  16. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed. PMID:25527240

  17. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  18. RNAi-mediated silencing of hepatic Alas1 effectively prevents and treats the induced acute attacks in acute intermittent porphyria mice.

    PubMed

    Yasuda, Makiko; Gan, Lin; Chen, Brenden; Kadirvel, Senkottuvelan; Yu, Chunli; Phillips, John D; New, Maria I; Liebow, Abigail; Fitzgerald, Kevin; Querbes, William; Desnick, Robert J

    2014-05-27

    The acute hepatic porphyrias are inherited disorders of heme biosynthesis characterized by life-threatening acute neurovisceral attacks. Factors that induce the expression of hepatic 5-aminolevulinic acid synthase 1 (ALAS1) result in the accumulation of the neurotoxic porphyrin precursors 5-aminolevulinic acid (ALA) and porphobilinogen (PBG), which recent studies indicate are primarily responsible for the acute attacks. Current treatment of these attacks involves i.v. administration of hemin, but a faster-acting, more effective, and safer therapy is needed. Here, we describe preclinical studies of liver-directed small interfering RNAs (siRNAs) targeting Alas1 (Alas1-siRNAs) in a mouse model of acute intermittent porphyria, the most common acute hepatic porphyria. A single i.v. dose of Alas1-siRNA prevented the phenobarbital-induced biochemical acute attacks for approximately 2 wk. Injection of Alas1-siRNA during an induced acute attack significantly decreased plasma ALA and PBG levels within 8 h, more rapidly and effectively than a single hemin infusion. Alas1-siRNA was well tolerated and a therapeutic dose did not cause hepatic heme deficiency. These studies provide proof-of-concept for the clinical development of RNA interference therapy for the prevention and treatment of the acute attacks of the acute hepatic porphyrias.

  19. Efficacy of parecoxib, sumatriptan, and rizatriptan in the treatment of acute migraine attacks.

    PubMed

    Müller, Thomas; Lohse, Lutz

    2011-01-01

    Triptans and analgetic nonsteroidal inflammatory drugs reduce acute pain syndromes in migraine. A further treatment option for an acute headache attack in patients with migraine may be the application of cyclooxygenase-2-specific inhibitors, as they have anti-inflammatory and analgesic properties. The objective of this pilot study was to investigate the effects of an oral fast-dissolving tablet of 10 mg of rizatriptan, an intravenous infusion of 40 mg of parecoxib, and a subcutaneous pen injection of sumatriptan (6 mg/0.5 mL) on pain relief in 3 cohorts of patients with episodic migraine. They were treated owing to the acute onset of a pain attack as a case of emergency. They were randomized to treatment with sumatriptan, rizatriptan, or parecoxib. The participants completed a visual analog scale for pain intensity at baseline before the drug administration and then after intervals of 20, 30, 60, and 120 minutes. Rizatriptan, parecoxib, and sumatriptan reduced pain symptoms. Twenty and 30 minutes after drug intake, rizatriptan was more efficacious than parecoxib and sumatriptan, and parecoxib was more effective than sumatriptan. Only a significant difference between rizatriptan and sumatriptan was found after 60 and 120 minutes. This trial demonstrates the effectiveness of a parecoxib infusion in the treatment of acute migraine and that the circumvention of the first pass effect of the liver by rizatriptan may be beneficial for fast pain relief. PMID:21996647

  20. A Puzzle of Vestibular Physiology in a Meniere's Disease Acute Attack

    PubMed Central

    Martinez-Lopez, Marta; Manrique-Huarte, Raquel; Perez-Fernandez, Nicolas

    2015-01-01

    The aim of this paper is to present for the first time the functional evaluation of each of the vestibular receptors in the six semicircular canals in a patient diagnosed with Meniere's disease during an acute attack. A 54-year-old lady was diagnosed with left Meniere's disease who during her regular clinic review suffers an acute attack of vertigo, with fullness and an increase of tinnitus in her left ear. Spontaneous nystagmus and the results in the video head-impulse test (vHIT) are shown before, during, and after the attack. Nystagmus was initially left beating and a few minutes later an upbeat component was added. No skew deviation was observed. A decrease in the gain of the vestibuloocular reflex (VOR) and the presence of overt saccades were observed when the stimuli were in the plane of the left superior semicircular canal. At the end of the crisis nystagmus decreased and vestibuloocular reflex returned to almost normal. A review of the different possibilities to explain these findings points to a hypothetical utricular damage. PMID:26167320

  1. Transient ischemic attack as an unusual initial manifestation of acute promyelocytic leukemia.

    PubMed

    Liu, Lifeng; Yuan, Xiaoling

    2016-07-01

    Patients with acute promyelocytic leukemia (APL) are prone to both bleeding and thrombosis. Both of these have a significant impact on the morbidity and mortality of patients with this disease. Here we report a case of a 41-year-old male, who presented with transient ischemic attack (TIA) and early neurological deterioration (END) as initial manifestations prior to an ultimate diagnosis of APL. This patient had no cerebrovascular risk factors or familial cerebrovascular disease. The patient experienced an acute ischemic stroke, verified by magnetic resonance imaging (MRI), in less than 24 h after his second hospital admission. Some APL patients suffer from cerebral ischemia as an initial manifestation or during induction therapy, and patients presenting this condition may continue to deteriorate until their death during hospitalization. Thus, APL should be considered as a possible underlying disease in patients with TIA without cerebrovascular risk factors. Delayed diagnosis and treatment of APL can be fatal.

  2. Primary Position Upbeat Nystagmus during an Acute Attack of Multiple Sclerosis

    PubMed Central

    Kim, Jee-Ae; Jeong, In-Hye; Lim, Young-Min

    2014-01-01

    Background and Purpose Ocular manifestation is one of the frequent signs of an acute attack in multiple sclerosis (MS), although primary position upbeat nystagmus (PPUN) is rare. The purpose of this study is to determine the incidence of PPUN in MS and to determine the lesions that are responsible for this sign. Methods The medical records of 120 MS patients with acute brain lesions were reviewed over a consecutive period of 9 years; of these, 6 patients were found to have PPUN. Other ocular motor abnormalities were analyzed in combination with upbeat nystagmus, video-oculographic findings, and lesions detected on brain MRI. Results Lesions in the pontine tegmentum involving the medial longitudinal fasciculus (MLF) and ventral tegmental tract (VTT) were the most common, being observed in three of the six patients with PPUN. One patient exhibited caudal medullary lesions bilaterally affecting the paramedian portion of the posterior tegmentum, and two patients exhibited multiple lesions involving the pons with the cerebral peduncle or medulla. In five patients, other ocular motor dysfunctions, such as gaze-evoked nystagmus (n=3) and internuclear ophthalmoplegia (n=1), were found in combination with upbeat nystagmus. Conclusions PPUN is an infrequent, ocular manifestation noted during an acute attack of MS, and was observed in 5% of the present cases. Brainstem lesions in these cases primarily involved the pontine tegmentum and the caudal medulla. These findings support the theory that upbeat nystagmus is attributable to damage to the upward vestibulo-ocular reflex pathway related to the vestibular nucleus, VTT, and interconnecting pathways. PMID:24465261

  3. National Heart Attack Alert Program position paper: chest pain centers and programs for the evaluation of acute cardiac ischemia.

    PubMed

    Zalenski, R J; Selker, H P; Cannon, C P; Farin, H M; Gibler, W B; Goldberg, R J; Lambrew, C T; Ornato, J P; Rydman, R J; Steele, P

    2000-05-01

    The National Heart Attack Alert Program (NHAAP), which is coordinated by the National Heart, Lung, and Blood Institute (NHLBI), promotes the early detection and optimal treatment of patients with acute myocardial infarction and other acute coronary ischemic syndromes. The NHAAP, having observed the development and growth of chest pain centers in emergency departments with special interest, created a task force to evaluate such centers and make recommendations pertaining to the management of patients with acute cardiac ischemia. This position paper offers recommendations to assist emergency physicians in EDs, including those with chest pain centers, in providing comprehensive care for patients with acute cardiac ischemia. PMID:10783408

  4. Sumatriptan (subcutaneous route of administration) for acute migraine attacks in adults

    PubMed Central

    Derry, Christopher J; Derry, Sheena; Moore, R Andrew

    2014-01-01

    Background Migraine is a highly disabling condition for the individual and also has wide-reaching implications for society, healthcare services, and the economy. Sumatriptan is an abortive medication for migraine attacks, belonging to the triptan family. Subcutaneous administration may be preferable to oral for individuals experiencing nausea and/or vomiting Objectives To determine the efficacy and tolerability of subcutaneous sumatriptan compared to placebo and other active interventions in the treatment of acute migraine attacks in adults. Search methods We searched Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE, online databases, and reference lists for studies through 13 October 2011. Selection criteria We included randomised, double-blind, placebo- and/or active-controlled studies using subcutaneous sumatriptan to treat a migraine headache episode, with at least 10 participants per treatment arm. Data collection and analysis Two review authors independently assessed trial quality and extracted data. We used numbers of participants achieving each outcome to calculate relative risk (or ‘risk ratio’) and numbers needed to treat to benefit (NNT) or harm (NNH) compared to placebo or a different active treatment. Main results Thirty-five studies (9365 participants) compared subcutaneous sumatriptan with placebo or an active comparator. Most of the data were for the 6 mg dose. Sumatriptan surpassed placebo for all efficacy outcomes. For sumatriptan 6 mg versus placebo the NNTs were 2.9, 2.3, 2.2, and 2.1 for pain-free at one and two hours, and headache relief at one and two hours, respectively, and 6.1 for sustained pain-free at 24 hours. Results for the 4 mg and 8 mg doses were similar to the 6 mg dose, with 6 mg significantly better than 4 mg only for pain-free at one hour, and 8 mg significantly better than 6 mg only for headache relief at one hour. There was no evidence of increased migraine relief if a second dose of sumatriptan 6

  5. Elevated D-dimers in attacks of hereditary angioedema are not associated with increased thrombotic risk

    PubMed Central

    Reshef, A; Zanichelli, A; Longhurst, H; Relan, A; Hack, C E

    2015-01-01

    Background Recommended management of attacks of hereditary angioedema (HAE) due to C1 esterase inhibitor (C1-INH) deficiency (C1-INH-HAE) includes therapy with exogenous C1INH. Thrombotic/thromboembolic events (TEE) have been reported with plasma-derived C1INH, but so far none with recombinant human C1INH (rhC1INH). This phase III, randomized, placebo (saline)-controlled study evaluated the safety of rhC1INH 50 IU/kg for the treatment of acute attacks in 74 patients with C1-INH-HAE. Methods Monitoring for TEE and assessment of risk of deep vein thrombosis (DVT) by the Wells prediction rule were performed, and levels of fibrin degradation products (plasma D-dimers) were assessed before study drug administration (baseline), 2 h, and 7 days posttreatment. Results Plasma D-dimer levels were elevated in 80% of the patients (median [25th–75th percentiles]: 2149 [480–5105] μg/l; normal ≤250 μg/l) and were higher in patients with submucosal (abdominal, oropharyngeal–laryngeal) attacks (3095 [890–10000] μg/l; n = 29) compared with subcutaneous (peripheral, facial) attacks (960 [450–4060] μg/l; n = 35). Median plasma D-dimer levels were comparable across treatment groups at baseline (1874 [475–4568] μg/l rhC1INH; 2259 [586–7533] μg/l saline) and 2 h postinfusion (2389 [760–4974] μg/l rhC1INH; 2550 [310–8410] μg/l saline); median plasma D-dimer levels were decreased by Day 7 in both groups (425 [232–3240] μg/l rhC1INH; 418 [246–2318] μg/l saline). No increased risk of DVT was identified, nor any TEE reported in rhC1INH treated or controls. Conclusion Elevated plasma D-dimer levels were associated with acute C1-INH-HAE attacks, particularly with submucosal involvement. However, rhC1INH therapy was not associated with thrombotic events. PMID:25640891

  6. Are doctors still failing to assess and treat asthma attacks? An audit of the management of acute attacks in a health district.

    PubMed

    Pinnock, H; Johnson, A; Young, P; Martin, N

    1999-06-01

    This audit aimed to observe the management of acute asthma by primary and secondary care within a Health District. Asthma attacks occurring during the first 6 weeks of 1996 to patients between the ages of 3 and 74 years in Canterbury and Thanet District were notified by general practitioners, out-of-hours co-operatives and hospitals. Data were obtained retrospectively from the patient records. A total of 378 episodes was registered: 342 (90%) to primary care. Of these 234 (76% of patients aged 6 years or over) had a peak flow recorded; 114 (30%) were given emergency bronchodilation: oxygen was not used in primary care; 204 (54%) were given systemic steroids; and 43 (11%) were referred for hospital care of whom 36 were admitted. Of the attacks, 212 (69% of the patients aged 6 years or over) could be classified by percentage predicted peak flow and management compared to the Guidelines published by the British Thoracic Society. Twenty-eight patients presented with 'life-threatening' asthma: 20 (71%) were given emergency bronchodilation; oxygen was used in only two; 24 (86%) were given systemic steroids; and six (21%) were referred for admission. In their confidential enquiry into the asthma deaths the British Thoracic Society identified a failure to appreciate the severity of the attack, resulting in inadequate emergency treatment and delay in referring to hospital. These data suggest that, 15 years later, these problems may still exist.

  7. Contact system activation in patients with HAE and normal C1 inhibitor function.

    PubMed

    Ghannam, Arije; Defendi, Federica; Charignon, Delphine; Csopaki, Françoise; Favier, Bertrand; Habib, Mohammed; Cichon, Sven; Drouet, Christian

    2013-11-01

    In addition to hereditary angioedema (HAE) with C1 inhibitor (C1INH) deficiency, a type of HAE with dominant inheritance and normal C1INH function (HAE with normal C1INH) has been described. This relates to contact phase activation with exaggerated kinin formation, and mutations in the coagulation factor XII gene have been identified in some affected families, but the cause of the disease has remained elusive in a majority of families. Several triggering factors are responsible for developing kinin forming system, with participation of endothelium and mast cell component. Angioedema conditions meet the accumulation of kinins with failed kinin catabolism. PMID:24176216

  8. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  9. Serum Procalcitonin as a Useful Serologic Marker for Differential Diagnosis between Acute Gouty Attack and Bacterial Infection

    PubMed Central

    Song, Jung-Soo

    2016-01-01

    Purpose Patients with gout are similar to those with bacterial infection in terms of the nature of inflammation. Herein we compared the differences in procalcitonin (PCT) levels between these two inflammatory conditions and evaluated the ability of serum PCT to function as a clinical marker for differential diagnosis between acute gouty attack and bacterial infection. Materials and Methods Serum samples were obtained from 67 patients with acute gouty arthritis and 90 age-matched patients with bacterial infection. Serum PCT levels were measured with an enzyme-linked fluorescent assay. Results Serum PCT levels in patients with acute gouty arthritis were significantly lower than those in patients with bacterial infection (0.096±0.105 ng/mL vs. 4.94±13.763 ng/mL, p=0.001). However, erythrocyte sedimentation rate (ESR) and C-reactive protein (CRP) levels showed no significant differences between the two groups. To assess the ability of PCT to discriminate between acute gouty arthritis and bacterial infection, the areas under the curves (AUCs) of serum PCT, uric acid, and CRP were 0.857 [95% confidence interval (CI), 0.798–0.917, p<0.001], 0.808 (95% CI, 0.738–0.878, p<0.001), and 0.638 (95% CI, 0.544–0.731, p=0.005), respectively. There were no significant differences in ESR and white blood cell counts between these two conditions. With a cut-off value of 0.095 ng/mL, the sums of sensitivity and specificity of PCT were the highest (81.0% and 80.6%, respectively). Conclusion Serum PCT levels were significantly lower in patients with acute gouty attack than in patients with bacterial infection. Thus, serum PCT can be used as a useful serologic marker to differentiate between acute gouty arthritis and bacterial infections. PMID:27401644

  10. Importance of Diffusion Weighted Magnetic Resonance Imaging in Evaluation of the Treatment Efficacy in Multiple Sclerosis Patients with Acute Attacks

    PubMed Central

    Sahin, Tuna; Bozgeyik, Zülküf; Menzilcioglu, Mehmet Sait; Citil, Serdal; Erbay, Mehmet Fatih

    2015-01-01

    Summary Background We planned to investigate contribution of DWMR to the treatment efficacy with ADC values which were measured in acute and chronic plaque before and after MS treatment. ADC changes in normal appearing white matter (NAWM) in patients with MS and healthy volunteers were also evaluated in this study. Material/Methods 25 patients with MS and 30 healthy subjects with normal brain MR findings were included to our study. Contrast enhancement in plaque was evaluated as an acute, and non-contrast enhancement in plaque was evaluated as a chronic. Also, ADC measurements were performed using the same parameters in NAWM in plaque neighborhood and volunteers. Results were compared with appropriate statistical methods. Results ADC values in acute and chronic plaques were decreased after the treatment, and these reductions were statistically significant for acute plaqus in b500 and for chronic plaques in b500 and b1000. The mean ADC values were measured as 1.53±0.49×10−3 and 1.43±0.58×10−3 in acute plaques and 1.40±0.35×10−3 and 1.34±0.36×10−3 mm2/sec in chronic plaques before and after the treatment. Conclusions We think that DWMR have important role due to quantitative measurement ability in the evaluation of the treatment efficacy of the MS patients with acute attack in addition to contrast-enhanced MR sequence. PMID:26740826

  11. Heterogeneity of peripheral blood reticulocytes: a flow cytometric analysis with monoclonal antibody HAE9 and thiazole orange.

    PubMed

    Mechetner, E B; Sedmak, D D; Barth, R F

    1991-09-01

    The expression of a human erythroid cell surface antigen recognized by monoclonal antibody (mAB) HAE9 has been studied on peripheral blood reticulocytes by one- and two-color flow cytometry. Total reticulocyte count was determined using Thiazole Orange (TO) and flow cytometry. In normal individuals, 4.56% of reticulocytes were stained by FITC-labeled mAB HAE9. The correlation between reticulocyte percentage by TO and HAE9 staining was 0.828 (P less than 0.0001) in patients with hematocrits less than 0.25. A HAE9-positive reticulocyte percentage of 6-44% was observed when analyzed by two-color flow cytometry with TO and mAB HAE9. These findings, in conjunction with previous studies, suggest that mAB HAE9 recognizes an early, less differentiated population of peripheral blood reticulocytes. Enumeration of immature reticulocytes may be of clinical utility.

  12. HMS-Related Hemolysis after Acute Attacks of Plasmodium vivax Malaria

    PubMed Central

    Mitjà, Oriol; Hays, Russell; Malken, James; Ipai, Anthony; Kangapu, Samson; Robson, Jenny; Bassat, Quique

    2011-01-01

    Among a cohort of 1,213 cases treated for Plasmodium vivax malaria from an isolated Papua New Guinean population, seven adults with severe and sustained hemolytic anemia after clearance of the peripheral parasitemia were prospectively investigated. All the patients fulfilled the criteria for hyper-reactive malarial splenomegaly and in 2 of 7 cases an IgG warm antibody was identified. Hereditary hemolytic anemia was excluded in 5 of 5 patients. All treated cases improved after an initial high dose of prednisone and antimalarial chemoprophylaxis. The persistence of marked anemia in a patient with splenomegaly after a P. vivax attack should raise the suspicion of hyper-reactive malarial splenomegaly. PMID:21976560

  13. Inpatient deaths from acute myocardial infarction, 1982-92: analysis of data in the Nottingham heart attack register.

    PubMed Central

    Brown, N.; Young, T.; Gray, D.; Skene, A. M.; Hampton, J. R.

    1997-01-01

    OBJECTIVE: To assess longitudinal trends in admissions, management, and inpatient mortality from acute myocardial infarction over 10 years. DESIGN: Retrospective analysis based on the Nottingham heart attack register. SETTING: Two district general hospitals serving a defined urban and rural population. SUBJECTS: All patients admitted with a confirmed acute myocardial infarction during 1982-4 and 1989-92 (excluding 1991, when data were not collected). MAIN OUTCOME MEASURES: Numbers of patients, background characteristics, time from onset of symptoms to admission, ward of admission, treatment, and inpatient mortality. RESULTS: Admissions with acute myocardial infarction increased from 719 cases in 1982 to 960 in 1992. The mean age increased from 62.1 years to 66.6 years (P < 0.001), the duration of stay fell from 8.7 days to 7.2 days (P < 0.001), and the proportion of patients aged 75 years and over admitted to a coronary care unit increased significantly from 29.1% to 61.2%. A higher proportion of patients were admitted to hospital within 6 hours of onset of their symptoms in 1989-92 than in 1982-4, but 15% were still admitted after the time window for thrombolysis. Use of beta blockers increased threefold between 1982 and 1992, aspirin was used in over 70% of patients after 1989, and thrombolytic use increased 1.3-fold between 1989 and 1992. Age and sex adjusted odds ratios for inpatient mortality remained unchanged over the study period. CONCLUSIONS: Despite an increasing uptake of the "proved" treatments, inpatient mortality from myocardial infarction did not change between 1982 and 1992. PMID:9251546

  14. Attack rate and household secondary attack rate of acute conjunctivitis during an outbreak in South India: A community-based survey

    PubMed Central

    Thekkur, Pruthu; Reddy, Mahendra M; Naik, Bijaya Nanda; Subitha, L; Kar, Sitanshu Sekhar

    2016-01-01

    Introduction: Knowledge on epidemiology of the disease in the contemporary world will help to develop appropriate strategies to curtail the transmission during an outbreak. This study was carried out during an outbreak of conjunctivitis in selected areas of Puducherry, South India, to assess the attack rate of conjunctivitis, identify factors associated with developing conjunctivitis and calculate household secondary attack rate (HSAR) of conjunctivitis and its correlates. Methodology: During December 2014, a community-based survey was conducted in a selected urban and rural area in Puducherry, South India. Simple random sampling was used to select primary sampling units and systematic sampling to select households. All individuals in the selected households were studied. A questionnaire was used to obtain data on sociodemographic characteristics, conjunctivitis during September-November, 2014, and number of household contacts who developed conjunctivitis within 7 days of index case. The attack rate and HSAR of conjunctivitis was expressed as percentage. Multivariate logistic regression was used to find factors independently associated with developing conjunctivitis and also 100% HSAR. Results: Of 3193 study participants from 772 households, 509 (15.9%, 95% confidence interval 14.7-17.2%) had an attack of conjunctivitis during the reference period. Of the 772 households, 218 (28.2%) had at least one case of conjunctivitis. Of 218 households, 33 (15.1%) households had 100% HSAR. Lower age, not being unemployed, low socioeconomic status, and residing in rural area were independently associated with developing conjunctivitis. Index case being male and living in a household with ≥5 members were independently associated with 100% HSAR. Conclusion: In the outbreak under study, more than one-fourth of households had at least one case of conjunctivitis and about one in every six individuals had an attack of conjunctivitis. PMID:27221677

  15. Presenting symptoms and onset-to-arrival time in patients with acute stroke and transient ischemic attack.

    PubMed

    Gargano, Julia Warner; Wehner, Susan; Reeves, Mathew J

    2011-11-01

    Delayed arrival to the emergency department (ED) precludes most stroke patients from receiving thrombolytic treatment. Our objective in this study was to examine the association between presenting symptoms and onset-to-arrival time (ie, time between onset of symptoms to arrival at the ED) in a statewide stroke registry. Demographics, clinical data, and presenting symptoms were collected for patients with acute stroke or symptomatic transient ischemic attack (TIA) admitted to 15 Michigan hospitals (n = 1922). Polytomous logistic regression models were developed to test the association between presenting symptoms and onset-to-arrival time (classified as <2 hours, 2-6 hours, or >6 hours/unknown). Onset-to-arrival time was <2 hours in 19% of the patients, 2-6 hours in 22%, and >6 hours/unknown in 59%. Unilateral symptoms (reported by 40%) and speech difficulties (reported by 22%) were associated with increased likelihood of arriving within 2 hours (unilateral: adjusted odds ratio [aOR], 1.5; 95% confidence interval [CI], 1.1-1.9; speech: aOR, 1.6; 95% CI, 1.2-2.2). Difficulty with walking, balance, or dizziness (12%), confusion (9%), loss of consciousness (6.7%) and falls (3.4%) were associated with lower likelihood of arriving within 2 hours (walking: aOR, 0.7; 95% CI, 0.4-1.0; confusion: aOR, 0.5; 95% CI, 0.3-0.8; consciousness: aOR, 0.5; 95% CI, 0.1-0.9; falls: aOR, 0.4; 95% CI, 0.3-0.9). Presenting symptoms were strongly associated with time of arrival; patients with unilateral symptoms and speech difficulties were more likely to seek care early. Future studies should consider including more specific patient-level data to identify psychosocial and behavioral aspects of recognition and action to stroke symptoms. PMID:20719538

  16. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  17. Efficacy of C1 esterase inhibitor concentrate in treatment of cutaneous attacks of hereditary angioedema

    PubMed Central

    Bork, Konrad; Craig, Timothy J.; Bernstein, Jonathan A.; Feuersenger, Henrike; Machnig, Thomas

    2015-01-01

    Background: Although treatment with C1 esterase inhibitor (C1-INH) concentrate is well established for hereditary angioedema (HAE) attacks in general, data that assess its efficacy for cutaneous attack treatment are sparse. Objective: To assess efficacy of plasma-derived, nanofiltered C1-INH concentrate for cutaneous attack treatment by comparing treated attacks from the uncontrolled I.M.P.A.C.T.2 study with historical data for untreated attacks. Methods: Cutaneous attack data from patients with HAE who were treated for cutaneous edema with 20 IU/kg body weight C1-INH concentrate in the uncontrolled I.M.P.A.C.T.2 study (38 patients) were compared with data from untreated patients from an historical data base (46 patients) and included subset analyses for facial edema (treated group, 21 patients; untreated group, 33 patients) and peripheral edema (30 patients in each group). Average attack duration (AAD) per patient was the efficacy end point used to compare treated and untreated patients. Differences were assessed with a Wilcoxon test (primary analysis) and a log-rank test; AAD per patient was analyzed descriptively and graphically with Kaplan-Meier curves. Results: The AAD per patient of all cutaneous attacks or facial and peripheral cutaneous attack subsets was significantly faster with C1-INH treatment than without treatment (Wilcoxon and log-rank tests, both p < 0.0001 for all comparisons). Mean AADs per patient for all, facial, and peripheral attacks were 2.04, 1.45, and 2.16 days, respectively, in the C1-INH–treated group, and were 3.74, 4.45, and 2.98 days, respectively, in the untreated group. Kaplan-Meier curves corroborated the observed group differences. Conclusion: Treatment of cutaneous HAE attacks (all attacks or facial and peripheral attack subsets) with 20 IU/kg C1-INH concentrate provided faster attack resolution compared with no treatment. PMID:25803207

  18. Prevalence, causes and risk factors of hospital readmissions after acute stroke and transient ischemic attack: a systematic review and meta-analysis.

    PubMed

    Zhong, Weibin; Geng, Na; Wang, Pengfei; Li, Zhenguang; Cao, Lili

    2016-08-01

    Acute stroke and transient ischemic attack (TIA) is a great burden not only during hospitalization but also after hospital discharge. The objective of this meta-analysis was to evaluate the hospital readmissions, causes and risk factors after survival of acute stroke and TIA. Pubmed, Web of Science, Cochrane Library, OVID and EMBASE databases were searched to identify studies reporting hospital readmissions after acute stroke and TIA. The primary outcomes were hospital readmission rates during 30 days and 1 year after discharge. The primary causes and risk factors of hospital readmissions were also identified. Ten studies with 253,680 patients were eligible for inclusion. The pooled 30-day and 1-year hospital readmission rates were 17.4 % (95 % CI, 12.7-23.5 %) and 42.5 % (95 % CI, 34.1-51.3 %), respectively. The three major causes of 30-day hospital readmissions were infection (19.9 %), coronary artery disease (CAD) (17.8 %) and recurrent stroke (16.0 %) successively, while the three major causes were recurrent stroke (19.4 %), infection (19.3 %) and CAD (16.3 %) during 1 year's follow-up. There were more patients with CAD in readmits group than that in control group (p = 0.030). The length of index admission, defined as any eligible admission to an acute care hospital assessed in the measure for the outcome, was longer (p = 0.000) and admission National Institutes of Health Stroke Score (NIHSS) was higher (p = 0.002) in readmits group than these in control group. In conclusion, there is high risk of early and long-term hospital readmissions after survival of acute stroke and TIA. These patients with coronary artery disease, longer length of index admission and higher NIHSS deserve deep attention after hospital discharge.

  19. Prevalence, causes and risk factors of hospital readmissions after acute stroke and transient ischemic attack: a systematic review and meta-analysis.

    PubMed

    Zhong, Weibin; Geng, Na; Wang, Pengfei; Li, Zhenguang; Cao, Lili

    2016-08-01

    Acute stroke and transient ischemic attack (TIA) is a great burden not only during hospitalization but also after hospital discharge. The objective of this meta-analysis was to evaluate the hospital readmissions, causes and risk factors after survival of acute stroke and TIA. Pubmed, Web of Science, Cochrane Library, OVID and EMBASE databases were searched to identify studies reporting hospital readmissions after acute stroke and TIA. The primary outcomes were hospital readmission rates during 30 days and 1 year after discharge. The primary causes and risk factors of hospital readmissions were also identified. Ten studies with 253,680 patients were eligible for inclusion. The pooled 30-day and 1-year hospital readmission rates were 17.4 % (95 % CI, 12.7-23.5 %) and 42.5 % (95 % CI, 34.1-51.3 %), respectively. The three major causes of 30-day hospital readmissions were infection (19.9 %), coronary artery disease (CAD) (17.8 %) and recurrent stroke (16.0 %) successively, while the three major causes were recurrent stroke (19.4 %), infection (19.3 %) and CAD (16.3 %) during 1 year's follow-up. There were more patients with CAD in readmits group than that in control group (p = 0.030). The length of index admission, defined as any eligible admission to an acute care hospital assessed in the measure for the outcome, was longer (p = 0.000) and admission National Institutes of Health Stroke Score (NIHSS) was higher (p = 0.002) in readmits group than these in control group. In conclusion, there is high risk of early and long-term hospital readmissions after survival of acute stroke and TIA. These patients with coronary artery disease, longer length of index admission and higher NIHSS deserve deep attention after hospital discharge. PMID:27129874

  20. Heart Attack

    MedlinePlus

    ... attack treatment works best when it's given right after symptoms occur. Prompt treatment of a heart attack can help prevent or limit damage to the heart and prevent sudden death. Call 9-1-1 Right Away A heart ...

  1. Angioedema attacks in patients with hereditary angioedema: Local manifestations of a systemic activation process.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Zeerleder, Sacha; Drouet, Christian; Zuraw, Bruce; Hack, C Erik

    2016-08-01

    Hereditary angioedema (HAE) caused by a deficiency of functional C1-inhibitor (C1INH) becomes clinically manifest as attacks of angioedema. C1INH is the main inhibitor of the contact system. Poor control of a local activation process of this system at the site of the attack is believed to lead to the formation of bradykinin (BK), which increases local vasopermeability and mediates angioedema on interaction with BK receptor 2 on the endothelium. However, several observations in patients with HAE are difficult to explain from a pathogenic model claiming a local activation process at the site of the angioedema attack. Therefore we postulate an alternative model for angioedema attacks in patients with HAE, which assumes a systemic, fluid-phase activation of the contact system to generate BK and its breakdown products. Interaction of these peptides with endothelial receptors that are locally expressed in the affected tissues rather than with receptors constitutively expressed by the endothelium throughout the whole body explains that such a systemic activation process results in local manifestations of an attack. In particular, BK receptor 1, which is induced on the endothelium by inflammatory stimuli, such as kinins and cytokines, meets the specifications of the involved receptor. The pathogenic model discussed here also provides an explanation for why angioedema can occur at multiple sites during an attack and why HAE attacks respond well to modest increases of circulating C1INH activity levels because inhibition of fluid-phase Factor XIIa and kallikrein requires lower C1INH levels than inhibition of activator-bound factors. PMID:27246526

  2. Angioedema attacks in patients with hereditary angioedema: Local manifestations of a systemic activation process.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Zeerleder, Sacha; Drouet, Christian; Zuraw, Bruce; Hack, C Erik

    2016-08-01

    Hereditary angioedema (HAE) caused by a deficiency of functional C1-inhibitor (C1INH) becomes clinically manifest as attacks of angioedema. C1INH is the main inhibitor of the contact system. Poor control of a local activation process of this system at the site of the attack is believed to lead to the formation of bradykinin (BK), which increases local vasopermeability and mediates angioedema on interaction with BK receptor 2 on the endothelium. However, several observations in patients with HAE are difficult to explain from a pathogenic model claiming a local activation process at the site of the angioedema attack. Therefore we postulate an alternative model for angioedema attacks in patients with HAE, which assumes a systemic, fluid-phase activation of the contact system to generate BK and its breakdown products. Interaction of these peptides with endothelial receptors that are locally expressed in the affected tissues rather than with receptors constitutively expressed by the endothelium throughout the whole body explains that such a systemic activation process results in local manifestations of an attack. In particular, BK receptor 1, which is induced on the endothelium by inflammatory stimuli, such as kinins and cytokines, meets the specifications of the involved receptor. The pathogenic model discussed here also provides an explanation for why angioedema can occur at multiple sites during an attack and why HAE attacks respond well to modest increases of circulating C1INH activity levels because inhibition of fluid-phase Factor XIIa and kallikrein requires lower C1INH levels than inhibition of activator-bound factors.

  3. The assessment of frequency estimates of Hae III-generated VNTR profiles in various reference databases.

    PubMed

    Budowle, B; Monson, K L; Giusti, A M; Brown, B L

    1994-03-01

    The likelihood of occurrence of 1964 Hae III-generated target DNA profiles was estimated using fixed bin frequencies from various regional and ethnic databases and the multiplication rule. The databases generally were from the following major categories: Black, Caucasian, Hispanic, Oriental, and American Indian. It was found that subdivision, either by ethnic group or by U.S. geographic region, within a major population group did not substantially affect forensic estimates of the likelihood of occurrence of a DNA profile. As expected, the greatest variation in estimates for within-group estimates was among American Indian databases. Because the greatest variation in statistical estimates occurs across-major population groups, in most cases, there will be no unfair bias applying general population database estimates. Therefore, based on empirical data, there is no demonstrable need for using alternate approaches, such as the ceiling approach, to derive statistical estimates. The current practice of using general population databases and the multiplication rule provides valid estimates of the likelihood of occurrence of a DNA profile. PMID:7910844

  4. Inherent illnesses and attacks: an ethnographic study of interpretations of childhood Acute Respiratory Infections (ARIs) in Manhiça, southern Mozambique

    PubMed Central

    2011-01-01

    Background Pneumonia is a leading cause of childhood hospitalisation and child mortality in Africa. This study explores local interpretations of Acute Respiratory Infections (ARIs), focusing on caretakers of children under five in the context of hospital care seeking. Methods The study took place in Manhiça, southern Mozambique and used Focused Ethnographic Study tools (FES) including field exercises and interviews. Results Understandings of terms used to describe ARIs differed between caretakers and hospital staff. Children's sicknesses that hospital staff diagnosed as ARIs were interpreted by caretakers as intermittent "attacks" of xifuva, a permanent, inherent and incurable chest illness. Caretakers thought that it was possible to manage and treat the attacks, which were caused by immediate natural factors such as food or the weather, but not the underlying illness, which was seen as having more indirect and social causes. Explanations of illness could not be neatly separated into pluralistic categories, but were characterised by syncretism, with "lay" and "biomedical" terms and concepts intermingling in practical care-seeking interactions between caretakers and health staff. Conclusions Health promotion should take into account the syncretism involved in explanations of ARIs in the context of practical care seeking for children. In doing so, it should draw upon lay interpretations and terminologies in order to stress the importance of seeking hospital care for all xifuva-type illnesses as well as seeking care for any subsequent attacks of an already diagnosed xifuva. However, this should be undertaken with awareness that the meanings of the terms used in practical care-seeking interactions may change over time. Health communication about ARIs should therefore be ongoing and evidence-based, even if ARIs appear to be well understood. PMID:21752260

  5. A Search for HAeBe stars in the bar of the Large Magellanic Cloud based on optical variability

    NASA Astrophysics Data System (ADS)

    de Wit, W. J.; Beaulieu, J. P.; Lamers, H. J. G. L. M.

    2002-12-01

    We searched the EROS1 database consisting of 80 000 stars in the bar of the Large Magellanic Cloud for blue objects with irregular photometric behavior similar to Galactic Herbig Ae/Be (HAeBe) stars. We found 14 new objects in addition to the discovery of 7 HAeBe candidate stars found in our previous studies. Based on their light curve and colours we classify these new objects also as EROS LMC HAeBe Candidates (ELHCs). The objects are located in an area of enhanced 60 mu m emission, which indicates a star forming region. The stars are concentrated in three areas and the majority of the objects are clustered round the N 120 nebular complex. The light curves are interpreted with a simple model, involving obscuration by an inhomogeneous orbiting circumstellar dust cloud as the dominant cause of the variability. We find that the dust orbiting the stars is at a radial distance in the order of 10 to a few 100 AUs. Most of the objects are ``bluer-when-fainter''. This is attributed to the presence of a (blue) scattering nebula with a size smaller than the point spread function of the photometric images. The stellar parameters are derived from the photometry. The luminosity of the stars is in the range of 3.4 < log (L/Lsolar) < 4.2 and the colours indicate spectral types O or B. The stars are located in the HR-diagram above the birthline for Galactic stars by about 1 dex in luminosity. The method used to detect the ELHCs stars on optical variability criteria is discussed. We show that our sample of HAeBe candidates in the EROS1 field of view is complete up to V =~ 16.5 mfor the typical amplitude and time scale of the ELHCs.

  6. Imaging recommendations for acute stroke and transient ischemic attack patients: a joint statement by the American Society of Neuroradiology, the American College of Radiology and the Society of NeuroInterventional Surgery.

    PubMed

    Wintermark, Max; Sanelli, Pina C; Albers, Gregory W; Bello, Jacqueline A; Derdeyn, Colin P; Hetts, Steven W; Johnson, Michele H; Kidwell, Chelsea S; Lev, Michael H; Liebeskind, David S; Rowley, Howard A; Schaefer, Pamela W; Sunshine, Jeffrey L; Zaharchuk, Greg; Meltzer, Carolyn C

    2013-11-01

    In the article entitled "Imaging Recommendations for Acute Stroke and Transient Ischemic Attack Patients: A Joint Statement by the American Society of Neuroradiology, the American College of Radiology and the Society of NeuroInterventional Surgery", we are proposing a simple, pragmatic approach that will allow the reader to develop an optimal imaging algorithm for stroke patients at their institution. PMID:23948676

  7. Disrupting ER-associated protein degradation suppresses the abscission defect of a weak hae hsl2 mutant in Arabidopsis

    PubMed Central

    Baer, John; Taylor, Isaiah; Walker, John C.

    2016-01-01

    In Arabidopsis thaliana, the process of abscission, or the shedding of unwanted organs, is mediated by two genes, HAESA (HAE) and HAESA-LIKE 2 (HSL2), encoding receptor-like protein kinases (RLKs). The double loss-of-function mutant hae-3 hsl2-3 is completely deficient in floral abscission, but, interestingly, the hae-3 hsl2-9 mutant displays a less severe defect. This mutant was chosen for an ethyl methanesulfonate (EMS) screen to isolate enhancer and suppressor mutants, and two such suppressors are the focus of this study. Pooled DNA from the F2 generation of a parental backcross was analyzed by genome sequencing to reveal candidate genes, two of which complement the suppressor phenotype. These genes, EMS-MUTAGENIZED BRI1 SUPPRESSOR 3 (EBS3) and EBS4, both encode mannosyltransferases involved in endoplasmic reticulum (ER)-associated degradation (ERAD) of proteins. Further analysis of these suppressor lines revealed that suppressor mutations are acting solely on the partially functional hsl2-9 mutant receptor to modify the abscission phenotype. Expressing a hsl2-9–yellow fluorescent protein (YFP) transgene in ebs3 mutants yields a higher fluorescent signal than in EBS3/ebs3, suggesting that these mutants restore abscission by disrupting ERAD to allow accumulation of the hsl2-9 receptor, which probably escapes degradation to be trafficked to the plasma membrane to regain signaling. PMID:27566817

  8. Screening for cognitive impairment with the Montreal Cognitive Assessment in Chinese patients with acute mild stroke and transient ischaemic attack: a validation study

    PubMed Central

    Zuo, Lijun; Dong, Yanhong; Zhu, Rongyan; Jin, Zhao; Li, Zixiao; Wang, Yilong; Zhao, Xingquan; Sachdev, Perminder; Zhang, Wei; Wang, Yongjun

    2016-01-01

    Objective We aimed to establish the cut-off point of the Montreal Cognitive Assessment (MoCA-Beijing) in screening for cognitive impairment (CI) within 2 weeks of mild stroke or transient ischaemic attack (TIA). Methods A total of 80 acute mild ischaemic stroke patients and 22 TIA patients were recruited. They received the MoCA-Beijing and a formal neuropsychological test battery. CI was defined by 1.5 SD below the established norms on a formal neuropsychological test battery. Results Most stroke and TIA patients were in their 50s (53.95±11.43 years old), with greater than primary school level of education. The optimal cut-off point for MoCA-Beijing in discriminating patients with CI from those with no cognitive impairment (NCI) was 22/23 (sensitivity 85%, specificity 88%, positive predictive value=91%, negative predictive value=80%, classification accuracy=86%). The predominant cognitive deficits were characteristic of frontal-subcortical impairment, such as visuomotor speed (46.08%), attention/executive function (42.16%) and visuospatial ability (40.20%). Conclusions A MoCA-Beijing cut-off score of 22/23 is optimally sensitive and specific for detecting CI after mild stroke, and TIA in the acute stroke phase, and is recommended for routine clinical practice. PMID:27406642

  9. The Role of Inspiratory Muscle Training in Sickle Cell Anemia Related Pulmonary Damage due to Recurrent Acute Chest Syndrome Attacks

    PubMed Central

    Camcıoğlu, Burcu; Boşnak-Güçlü, Meral; Karadallı, Müşerrefe Nur; Akı, Şahika Zeynep; Türköz-Sucak, Gülsan

    2015-01-01

    Background. The sickling of red blood cells causes a constellation of musculoskeletal, cardiovascular, and pulmonary manifestations. A 32-year-old gentleman with sickle cell anemia (SCA) had been suffering from recurrent acute chest syndrome (ACS). Aim. To examine the effects of inspiratory muscle training (IMT) on pulmonary functions, respiratory and peripheral muscle strength, functional exercise capacity, and quality of life in this patient with SCA. Methods. Functional exercise capacity was evaluated using six-minute walk test, respiratory muscle strength using mouth pressure device, hand grip strength using hand-held dynamometer, pain using Visual Analogue Scale, fatigue using Fatigue Severity Scale, dyspnea using Modified Medical Research Council Scale, and health related quality of life using European Organization for Research and Treatment of Cancer QOL measurement. Results. A significant improvement has been demonstrated in respiratory muscle strength, functional exercise capacity, pain, fatigue, dyspnea, and quality of life. There was no admission to emergency department due to acute chest syndrome in the following 12 months after commencing regular erythrocytapheresis. Conclusion. This is the first report demonstrating the beneficial effects of inspiratory muscle training on functional exercise capacity, respiratory muscle strength, pain, fatigue, dyspnea, and quality of life in a patient with recurrent ACS. PMID:26060589

  10. The Role of Inspiratory Muscle Training in Sickle Cell Anemia Related Pulmonary Damage due to Recurrent Acute Chest Syndrome Attacks.

    PubMed

    Camcıoğlu, Burcu; Boşnak-Güçlü, Meral; Karadallı, Müşerrefe Nur; Akı, Şahika Zeynep; Türköz-Sucak, Gülsan

    2015-01-01

    Background. The sickling of red blood cells causes a constellation of musculoskeletal, cardiovascular, and pulmonary manifestations. A 32-year-old gentleman with sickle cell anemia (SCA) had been suffering from recurrent acute chest syndrome (ACS). Aim. To examine the effects of inspiratory muscle training (IMT) on pulmonary functions, respiratory and peripheral muscle strength, functional exercise capacity, and quality of life in this patient with SCA. Methods. Functional exercise capacity was evaluated using six-minute walk test, respiratory muscle strength using mouth pressure device, hand grip strength using hand-held dynamometer, pain using Visual Analogue Scale, fatigue using Fatigue Severity Scale, dyspnea using Modified Medical Research Council Scale, and health related quality of life using European Organization for Research and Treatment of Cancer QOL measurement. Results. A significant improvement has been demonstrated in respiratory muscle strength, functional exercise capacity, pain, fatigue, dyspnea, and quality of life. There was no admission to emergency department due to acute chest syndrome in the following 12 months after commencing regular erythrocytapheresis. Conclusion. This is the first report demonstrating the beneficial effects of inspiratory muscle training on functional exercise capacity, respiratory muscle strength, pain, fatigue, dyspnea, and quality of life in a patient with recurrent ACS. PMID:26060589

  11. Heart Attack

    MedlinePlus

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  12. Heart Attack

    MedlinePlus

    ... lower “bad” cholesterol (also called LDL, or low-density lipoprotein) levels and may help increase “good” cholesterol (also called HDL, or high-density lipoprotein). If you have had a heart attack, ...

  13. A case of hereditary angioedema involving recurrent abdominal attacks.

    PubMed

    Kasamatsu, Yoshihiro; Yoshinoya, Kiyokazu; Kasamatsu, Yu; Yamamoto, Tetsuro; Horiuchi, Takahiko; Kadoya, Masatoshi

    2011-01-01

    A 44-year-old Japanese woman was diagnosed with type 1 hereditary angioedema (HAE) at the age of 30. In March 2007, she began suffering from severe abdominal pain due to intestinal edema. After treatment with C1-INH concentrate, her symptoms disappeared. However, during the subsequent three years, the frequency of the attacks increased continuously, and C1-INH concentrate was necessary for treatment of every attack. The increase in the number of attacks might have been due to the frequent injection of C1-INH concentrate or the deterioration of her disease course. In a genetic investigation, the patient was found to have a novel mutation in the C1-INH gene. PMID:22129507

  14. Shark attack.

    PubMed

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  15. Coronary Artery Dissection: Not Just a Heart Attack

    MedlinePlus

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  16. Activation of the complement, coagulation, fibrinolytic and kallikrein-kinin systems during attacks of hereditary angioedema.

    PubMed

    Nielsen, E W; Johansen, H T; Høgåsen, K; Wuillemin, W; Hack, C E; Mollnes, T E

    1996-08-01

    Five patients with hereditary angioedema (HAE) were studied during attacks and remission as were healthy controls. The high levels of C1/C1-INH complexes, low C4 and high ratio C4 activation products (C4bc)/C4 also differed significantly during remission compared to controls. During attacks C4bc/C4 increased (922-2007; P = 0.022, remission versus attacks, median values throughout), C2 and CH50 dropped (111-31%; P = 0.043 and 110-36%; P = 0.016, respectively), TCC (C5b-9) increased (0.88-1.23 AU/ml; P = 0.028). Cleavage of HK increased to be almost complete during attacks (20-90%; P = 0.009). While factor XIa/serpin-complexes did not increase, a more than twofold rise in thrombin/antithrombin-complexes (0.20-0.50 microgram/l; P = 0.009) and in plasmin/alpha-2-antiplasmin-complexes (7.3-17 nmol/l; P = 0.028) was observed. For the first time cascade activation in HAE was studied simultaneously, and corroborates that attacks lead to activation of the kallikrein-kinin system, fibrinolysis and early part of the classical complement pathway. In addition, the authors present novel data of terminal complement and coagulation activation, the latter apparently not via FXIa.

  17. Complement metabolism in man: hypercatabolism of the fourth (C4) and third (C3) components in patients with renal allograft rejection and hereditary angioedema (HAE)

    PubMed Central

    Carpenter, Charles B.; Ruddy, Shaun; Shehadeh, Isam H.; Müller-Eberhard, Hans J.; Merrill, John P.; Austen, K. Frank

    1969-01-01

    Highly purified and radioiodinated human C4 and (or) C3 were administered to patients with renal allografts in rejection, with hereditary angioedema (HAE), with chronic glomerulonephritis, and to control subjects. The latter group included normal individuals, anephric patients before transplantation, and stable renal allograft recipients. The catabolic rates of these complement proteins were determined by analysis of the disappearance of plasma protein-bound radioactivity (km), and by direct measurement of urinary excretion of radioactivity (ku). The correlation coefficient between these two methods was 0.96. The mean ±2 SD for catabolic rates in the control subjects was 0.9-2.7% plasma pool/hr for C4 and 0.9-2.0% plasma pool/hr for C3. Patients experiencing renal allograft rejection had unstable levels of C4 and C3, and exhibited moderate hypercatabolism of both proteins. One patient with chronic glomerulonephritis had hypercatabolism of C4 and C3 in the presence of stable normal serum levels. In patients with HAE who had extremely low levels of C4, catabolic rates for C4 were markedly elevated (3.7, 5.8, 7.0 and 8.8%/hr). Analysis of plasma curves in HAE revealed a three component disappearance curve instead of the two component curve in control subjects receiving the same preparation. Even though C3 levels were normal, moderate hypercatabolism of C3 was also present in HAE (2.6, 2.8, 2.8, and 3.2% of pool/hr). The marked hypercatabolism of C4 in HAE constitutes the first direct evidence for the in vivo destruction by uninhibited C1 esterase of its natural substrate C4. The moderate hypercatabolism of C3 is consistent with the in vivo formation of C3-convertase. Images PMID:4894302

  18. Acute Bronchitis

    MedlinePlus

    ... bronchitis? Acute bronchitis is almost always caused by viruses that attack the lining of the bronchial tree ... infection. As your body fights back against these viruses, more swelling occurs and more mucus is produced. ...

  19. Heart Attack Recovery FAQs

    MedlinePlus

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  20. Identification and characterization of CbeI, a novel thermostable restriction enzyme from Caldicellulosiruptor bescii DSM 6725 and a member of a new subfamily of HaeIII-like enzymes.

    PubMed

    Chung, Dae-Hwan; Huddleston, Jennifer R; Farkas, Joel; Westpheling, Janet

    2011-11-01

    Potent HaeIII-like DNA restriction activity was detected in cell-free extracts of Caldicellulosiruptor bescii DSM 6725 using plasmid DNA isolated from Escherichia coli as substrate. Incubation of the plasmid DNA in vitro with HaeIII methyltransferase protected it from cleavage by HaeIII nuclease as well as cell-free extracts of C. bescii. The gene encoding the putative restriction enzyme was cloned and expressed in E. coli with a His-tag at the C-terminus. The purified protein was 38 kDa as predicted by the 981-bp nucleic acid sequence, was optimally active at temperatures between 75°C and 85°C, and was stable for more than 1 week when stored at 35°C. The cleavage sequence was determined to be 5'-GG/CC-3', indicating that CbeI is an isoschizomer of HaeIII. A search of the C. bescii genome sequence revealed the presence of both a HaeIII-like restriction endonuclease (Athe 2438) and DNA methyltransferase (Athe 2437). Preliminary analysis of other Caldicellulosiruptor species suggested that this restriction/modification activity is widespread in this genus. A phylogenetic analysis based on sequence alignment and conserved motif searches identified features of CbeI distinct from other members of this group and classified CbeI as a member of a novel subfamily of HaeIII-like enzymes.

  1. Conservation of the abscission signaling peptide IDA during Angiosperm evolution: withstanding genome duplications and gain and loss of the receptors HAE/HSL2

    PubMed Central

    Stø, Ida M.; Orr, Russell J. S.; Fooyontphanich, Kim; Jin, Xu; Knutsen, Jonfinn M. B.; Fischer, Urs; Tranbarger, Timothy J.; Nordal, Inger; Aalen, Reidunn B.

    2015-01-01

    The peptide INFLORESCENCE DEFICIENT IN ABSCISSION (IDA), which signals through the leucine-rich repeat receptor-like kinases HAESA (HAE) and HAESA-LIKE2 (HSL2), controls different cell separation events in Arabidopsis thaliana. We hypothesize the involvement of this signaling module in abscission processes in other plant species even though they may shed other organs than A. thaliana. As the first step toward testing this hypothesis from an evolutionarily perspective we have identified genes encoding putative orthologs of IDA and its receptors by BLAST searches of publically available protein, nucleotide and genome databases for angiosperms. Genes encoding IDA or IDA-LIKE (IDL) peptides and HSL proteins were found in all investigated species, which were selected as to represent each angiosperm order with available genomic sequences. The 12 amino acids representing the bioactive peptide in A. thaliana have virtually been unchanged throughout the evolution of the angiosperms; however, the number of IDL and HSL genes varies between different orders and species. The phylogenetic analyses suggest that IDA, HSL2, and the related HSL1 gene, were present in the species that gave rise to the angiosperms. HAE has arisen from HSL1 after a genome duplication that took place after the monocot—eudicots split. HSL1 has also independently been duplicated in the monocots, while HSL2 has been lost in gingers (Zingiberales) and grasses (Poales). IDA has been duplicated in eudicots to give rise to functionally divergent IDL peptides. We postulate that the high number of IDL homologs present in the core eudicots is a result of multiple whole genome duplications (WGD). We substantiate the involvement of IDA and HAE/HSL2 homologs in abscission by providing gene expression data of different organ separation events from various species. PMID:26579174

  2. About Heart Attacks

    MedlinePlus

    ... survive. A heart attack occurs when the blood flow that brings oxygen to the heart muscle is severely reduced or ... survive. A heart attack occurs when the blood flow that brings oxygen to the heart muscle is severely reduced or ...

  3. High Frequency Migraine Is Associated with Lower Acute Pain Sensitivity and Abnormal Insula Activity Related to Migraine Pain Intensity, Attack Frequency, and Pain Catastrophizing

    PubMed Central

    Mathur, Vani A.; Moayedi, Massieh; Keaser, Michael L.; Khan, Shariq A.; Hubbard, Catherine S.; Goyal, Madhav; Seminowicz, David A.

    2016-01-01

    Migraine is a pain disorder associated with abnormal brain structure and function, yet the effect of migraine on acute pain processing remains unclear. It also remains unclear whether altered pain-related brain responses and related structural changes are associated with clinical migraine characteristics. Using fMRI and three levels of thermal stimuli (non-painful, mildly painful, and moderately painful), we compared whole-brain activity between 14 migraine patients and 14 matched controls. Although, there were no significant differences in pain thresholds nor in pre-scan pain ratings to mildly painful thermal stimuli, patients did have aberrant suprathreshold nociceptive processing. Brain imaging showed that, compared to controls, patients had reduced activity in pain modulatory regions including left dorsolateral prefrontal, posterior parietal, and middle temporal cortices and, at a lower-threshold, greater activation in the right mid-insula to moderate pain vs. mild pain. We also found that pain-related activity in the insula was associated with clinical variables in patients, including associations between: bilateral anterior insula and pain catastrophizing (PCS); bilateral anterior insula and contralateral posterior insula and migraine pain intensity; and bilateral posterior insula and migraine frequency at a lower-threshold. PCS and migraine pain intensity were also negatively associated with activity in midline regions including posterior cingulate and medial prefrontal cortices. Diffusion tensor imaging revealed a negative correlation between fractional anisotropy (a measure of white matter integrity; FA) and migraine duration in the right mid-insula and a positive correlation between left mid-insula FA and PCS. In sum, while patients showed lower sensitivity to acute noxious stimuli, the neuroimaging findings suggest enhanced nociceptive processing and significantly disrupted modulatory networks, particularly involving the insula, associated with indices

  4. The Validation Study of Neurofilament Heavy Chain and 8-hydroxy-2'-deoxyguanosine as Plasma Biomarkers of Clinical/Paraclinical Activity in First and Relapsing-Remitting Demyelination Acute Attacks.

    PubMed

    Ljubisavljevic, S; Stojanovic, I; Basic, J; Pavlovic, D A

    2016-10-01

    Although current evidence mainly suggests immunopathogenesis of demyelination and neurodegeneration in multiple sclerosis (MS), there are results which document the importance of other factors, such as oxidative stress and its mediated injuries. The oxidative stress intensity in axonal damage during acute demyelination is little known. We performed this study as a cross-sectional biomarker validation study in order to evaluate the parameters of axonal damage (phosphorylated neurofilaments heavy chain (pNF-H)) and oxidative stress (8-hydroxy-2'-deoxyguanosine (8-OHdG)) in plasma of patients with initial and relapsing-remitting demyelination attacks, defined as clinically isolated syndrome (CIS) and relapsing-remitting multiple sclerosis (RRMS); and the correlations between these parameters and biological (index of blood brain barrier (BBB) permeability), clinical (index of disease progression), and radiological (T1-Gd-enhancing lesion volume) activities of disease. Both parameters were increased in CIS and RRMS compared to control subjects (p < 0.05). The positive correlations were observed between 8-OHdG values and index of BBB permeability, clinical severity of disease, and demyelinated brain lesion volume, in CIS group (r > 0.50; p < 0.05). Similar correlations were obtained between pNF-H values and the above parameters, as well as the index of disease progression, in RRMS group (r > 0.30; p < 0.05). There was a significant correlation between values of 8-OHdG and pNF-H only in CIS group, r = 0.52, p < 0.05. While the plasma values of 8-OHdG reflect the degree of acute demyelination in CIS, pNF-H values reflect that in RRMS. The obtained results must be reevaluated in similar prospective studies related to their prognostic values. PMID:27295058

  5. Seven Deadliest Network Attacks

    SciTech Connect

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  6. Wild boar attacks.

    PubMed

    Gunduz, Abdulkadir; Turedi, Suleyman; Nuhoglu, Irfan; Kalkan, Asim; Turkmen, Suha

    2007-01-01

    Attacks on humans by wild boar (Sus scrofa) are occasionally reported in rural areas of Turkey. While fatalities are rare, individuals may sustain significant soft tissue trauma. Lower extremity lacerations of up to 10 cm in length and 4 cm deep were seen in the 3 cases reviewed. Injuries to the upper abdomen and chest occurred in one case. Attacks frequently occur in forested areas covered by dense brushwood, and their incidence is increased during the rutting season. In contrast to other large, feral animal attacks, injuries sustained from wild boar typically are limited to the lower extremities. This case series examines 3 attacks by wild boar in rural Turkey.

  7. AVP-825 Breath-Powered Intranasal Delivery System Containing 22 mg Sumatriptan Powder vs 100 mg Oral Sumatriptan in the Acute Treatment of Migraines (The COMPASS Study): A Comparative Randomized Clinical Trial Across Multiple Attacks

    PubMed Central

    Tepper, Stewart J; Cady, Roger K; Silberstein, Stephen; Messina, John; Mahmoud, Ramy A; Djupesland, Per G; Shin, Paul; Siffert, Joao

    2015-01-01

    Objective The objective of this study was to compare the efficacy, tolerability, and safety of AVP-825, an investigational bi-directional breath-powered intranasal delivery system containing low-dose (22 mg) sumatriptan powder, vs 100 mg oral sumatriptan for acute treatment of migraine in a double-dummy, randomized comparative efficacy clinical trial allowing treatment across multiple migraine attacks. Background In phases 2 and 3, randomized, placebo-controlled trials, AVP-825 provided early and sustained relief of moderate or severe migraine headache in adults, with a low incidence of triptan-related adverse effects. Methods This was a randomized, active-comparator, double-dummy, cross-over, multi-attack study (COMPASS; NCT01667679) with two ≤12-week double-blind periods. Subjects experiencing 2-8 migraines/month in the past year were randomized 1:1 using computer-generated sequences to AVP-825 plus oral placebo tablet or an identical placebo delivery system plus 100 mg oral sumatriptan tablet for the first period; patients switched treatment for the second period in this controlled comparative design. Subjects treated ≤5 qualifying migraines per period within 1 hour of onset, even if pain was mild. The primary end-point was the mean value of the summed pain intensity differences through 30 minutes post-dose (SPID-30) using Headache Severity scores. Secondary outcomes included pain relief, pain freedom, pain reduction, consistency of response across multiple migraines, migraine-associated symptoms, and atypical sensations. Safety was also assessed. Results A total of 275 adults were randomized, 174 (63.3%) completed the study (ie, completed the second treatment period), and 185 (67.3%) treated at least one migraine in both periods (1531 migraines assessed). There was significantly greater reduction in migraine pain intensity with AVP-825 vs oral sumatriptan in the first 30 minutes post-dose (least squares mean SPID-30 = 10.80 vs 7.41, adjusted mean

  8. Safety and efficacy of non-vitamin K oral anticoagulant treatment compared with warfarin in patients with non-valvular atrial fibrillation who develop acute ischemic stroke or transient ischemic attack: a multicenter prospective cohort study (daVinci study).

    PubMed

    Saji, Naoki; Kimura, Kazumi; Tateishi, Yohei; Fujimoto, Shigeru; Kaneko, Nobuyuki; Urabe, Takao; Tsujino, Akira; Iguchi, Yasuyuki

    2016-11-01

    The safety and efficacy of non-vitamin K oral anticoagulant (NOAC) compared with warfarin in treating patients with non-valvular atrial fibrillation (NVAF) who developed acute ischemic stroke or transient ischemic attack (AIS/TIA), particularly those receiving tissue-plasminogen activator (tPA) therapy, remains unclear. Between April 2012 and December 2014, we conducted a multicenter prospective cohort study to assess the current clinical practice for treating such patients. We divided the patients into two groups according to the administration of oral anticoagulants (warfarin or NOACs) and tPA therapy. The risk of any hemorrhagic or ischemic event was compared within 1 month after the onset of stroke. We analyzed 235 patients with AIS/TIA including 73 who received tPA therapy. Oral anticoagulants were initiated within 2-4 inpatient days. NOACs were administered to 49.8 % of patients, who were predominantly male, younger, had small infarcts, lower NIHSS scores, and had a lower all-cause mortality rate (0 vs. 4.2 %, P = 0.06) and a lower risk of any ischemic events (6.0 vs. 7.6 %, P = 0.797) compared with warfarin users. The prevalence of all hemorrhagic events was equivalent between the two groups. Early initiation of NOACs after tPA therapy appeared to lower the risk of hemorrhagic events, although there was no significant difference (0 vs. 5.6 %, P = 0.240). Although more clinicians are apt to prescribe NOACs in minor ischemic stroke, NOAC treatment may provide a potential benefit in such cases. Early initiation of NOACs after tPA therapy may reduce the risk of hemorrhagic events compared with warfarin.

  9. Transient Ischemic Attack

    MedlinePlus

    Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only ... TIA is that with TIA the blockage is transient (temporary). TIA symptoms occur rapidly and last a ...

  10. Signs of a Heart Attack

    MedlinePlus

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  11. A fatal leopard attack.

    PubMed

    Hejna, Petr

    2010-05-01

    A rare case of a big cat fatal attack is presented. A male leopard that had escaped from its unlocked cage attacked a 26-year-old male zoo worker. The man sustained penetrating injuries to the neck with consequent external bleeding. The man died while being transported to the hospital as a result of the injuries sustained. The wounds discovered on the victim's body corresponded with the known methods of leopard attacks and with findings on the carcasses of animals killed by leopards in the wild. The conclusion of the medicolegal investigation was that the underlying cause of death was a bite wound to the neck which lacerated the left internal jugular vein, the two main branches of the left external carotid artery, and the cervical spine. The cause of death was massive external bleeding. Special attention is paid to the general pattern of injuries sustained from big cat attacks.

  12. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... of patients with unstable angina/non-ST-elevation myocardial infarction (updating the 2007 guideline and replacing the 2011 ...

  13. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  14. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  15. Shark attack in Natal.

    PubMed

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  16. Fatal crocodile attack.

    PubMed

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out.

  17. Word Attack Model.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A limited analysis of alternative approaches to phonemic-level word attack instruction is provided in this document. The instruction segment begins with training in letter-sound correspondences for which mastery of certain skills is assumed. Instruction ends with the decoding of novel items having a consonant-vowel-consonant construction. Contents…

  18. Acute Hepatic Porphyria

    PubMed Central

    Bissell, D. Montgomery; Wang, Bruce

    2015-01-01

    The porphyrias comprise a set of diseases, each representing an individual defect in one of the eight enzymes mediating the pathway of heme synthesis. The diseases are genetically distinct but have in common the overproduction of heme precursors. In the case of the acute (neurologic) porphyrias, the cause of symptoms appears to be overproduction of a neurotoxic precursor. For the cutaneous porphyrias, it is photosensitizing porphyrins. Some types have both acute and cutaneous manifestations. The clinical presentation of acute porphyria consists of abdominal pain, nausea, and occasionally seizures. Only a small minority of those who carry a mutation for acute porphyria have pain attacks. The triggers for an acute attack encompass certain medications and severely decreased caloric intake. The propensity of females to acute attacks has been linked to internal changes in ovarian physiology. Symptoms are accompanied by large increases in delta-aminolevulinic acid and porphobilinogen in plasma and urine. Treatment of an acute attack centers initially on pain relief and elimination of inducing factors such as medications; glucose is administered to reverse the fasting state. The only specific treatment is administration of intravenous hemin. An important goal of treatment is preventing progression of the symptoms to a neurological crisis. Patients who progress despite hemin administration have undergone liver transplantation with complete resolution of symptoms. A current issue is the unavailability of a rapid test for urine porphobilinogen in the urgent-care setting. PMID:26357631

  19. Facial dog attack injuries.

    PubMed

    Lin, Wei; Patil, Pavan Manohar

    2015-02-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to successful management of such wounds are meticulous cleansing of the wound, careful debridement, primary repair, appropriate antibiotic therapy, and rabies and tetanus immunization where indicated. This review presents an overview of the epidemiology, presentation, management of such emergencies, and the recent advances in the care of such patients. PMID:25829713

  20. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  1. [Cerebral infarction and transient ischemic attack].

    PubMed

    Sahara, Noriyuki; Kuwashiro, Takahiro; Okada, Yasushi

    2016-04-01

    Japanese Guidelines for the Management of Stroke 2015 was published. Here, we describe several points revised from the 2009 edition about "Cerebral infarction and transient ischemic attack (TIA)". The revision points are as follows; 1. Extension of possible time window of intravenous recombinant tissue-plasminogen activator treatment (from within 3 hours to within 4.5 hours); 2. Antiplatelet therapy in acute stage (dual antiplatelet therapy (DAPT) for non-cardioembolic ischemic stroke or TIA); 3. Endovascular recanalization therapy in acute stage; 4. Antiplatelet therapy in chronic stage (Cilostazol is recommended similar to aspirin or clopidogrel); 5. Non-vitamin K antagonist oral anticoagulants (NOACs) for non-valvular atrial fibrillation (NVAF) stroke or TIA patients; 6. Management of TIA. We explain the revised points of the guideline in the text.

  2. [Cerebral infarction and transient ischemic attack].

    PubMed

    Sahara, Noriyuki; Kuwashiro, Takahiro; Okada, Yasushi

    2016-04-01

    Japanese Guidelines for the Management of Stroke 2015 was published. Here, we describe several points revised from the 2009 edition about "Cerebral infarction and transient ischemic attack (TIA)". The revision points are as follows; 1. Extension of possible time window of intravenous recombinant tissue-plasminogen activator treatment (from within 3 hours to within 4.5 hours); 2. Antiplatelet therapy in acute stage (dual antiplatelet therapy (DAPT) for non-cardioembolic ischemic stroke or TIA); 3. Endovascular recanalization therapy in acute stage; 4. Antiplatelet therapy in chronic stage (Cilostazol is recommended similar to aspirin or clopidogrel); 5. Non-vitamin K antagonist oral anticoagulants (NOACs) for non-valvular atrial fibrillation (NVAF) stroke or TIA patients; 6. Management of TIA. We explain the revised points of the guideline in the text. PMID:27333757

  3. Feedback on heart attack.

    PubMed

    Pearce, Lynne

    2016-04-13

    The Royal Brompton & Harefield NHS Foundation Trust in London is the largest heart and lung centre in the UK. This article explores a project carried out by nurses at the trust looking at the experiences of having an acute myocardial infarction, and how patients felt about taking part in a research study. PMID:27532071

  4. Feedback on heart attack.

    PubMed

    Pearce, Lynne

    2016-04-13

    The Royal Brompton & Harefield NHS Foundation Trust in London is the largest heart and lung centre in the UK. This article explores a project carried out by nurses at the trust looking at the experiences of having an acute myocardial infarction, and how patients felt about taking part in a research study.

  5. Acute rheumatic fever

    PubMed Central

    Cumming, Gordon R.

    1974-01-01

    While rheumatic fever is relatively uncommon except where there are poor and crowded living conditions, sporadic acute attacks continue to occur in a family or pediatric medical practice. The physician's role in management of the sore throat in the diagnosis of suspected cases of rheumatic fever and in follow-up for continued prophylaxis is discussed. The frequency of admissions and presenting features of 159 patients with acute rheumatic fever is reviewed. Continued surveillance is required if we are to achieve a further reduction in attack rate and complications. PMID:4419123

  6. Sulfate attack expansion mechanisms

    SciTech Connect

    Müllauer, Wolfram Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  7. Hereditary angioedema: what the gastroenterologist needs to know

    PubMed Central

    Ali, M Aamir; Borum, Marie L

    2014-01-01

    Up to 93% of patients with hereditary angioedema (HAE) experience recurrent abdominal pain. Many of these patients, who often present to emergency departments, primary care physicians, general surgeons, or gastroenterologists, are misdiagnosed for years and undergo unnecessary testing and surgical procedures. Making the diagnosis of HAE can be challenging because symptoms and attack locations are often inconsistent from one episode to the next. Abdominal attacks are common and can occur without other attack locations. An early, accurate diagnosis is central to managing HAE. Unexplained abdominal pain, particularly when accompanied by swelling of the face and extremities, suggests the diagnosis of HAE. A family history and radiologic imaging demonstrating edematous bowel also support an HAE diagnosis. Once HAE is suspected, C4 and C1 esterase inhibitor (C1-INH) laboratory studies are usually diagnostic. Patients with HAE may benefit from recently approved specific treatments, including plasma-derived C1-INH or recombinant C1-INH, a bradykinin B2-receptor antagonist, or a kallikrein inhibitor as first-line therapy and solvent/detergent-treated or fresh frozen plasma as second-line therapy for acute episodes. Short-term or long-term prophylaxis with nanofiltered C1-INH or attenuated androgens will prevent or reduce the frequency and severity of episodes. Gastroenterologists can play a critical role in identifying and treating patients with HAE, and should have a high index of suspicion when encountering patients with recurrent, unexplained bouts of abdominal pain. Given the high rate of abdominal attacks in HAE, it is important for gastroenterologists to appropriately diagnose and promptly recognize and treat HAE, or refer patients with HAE to an allergist. PMID:25429234

  8. Acute asthma during pregnancy.

    PubMed Central

    Stenius-Aarniala, B. S.; Hedman, J.; Teramo, K. A.

    1996-01-01

    BACKGROUND: Acute asthma during pregnancy is potentially dangerous to the fetus. The aim of this study was to investigate the effect of an acute attack of asthma during pregnancy on the course of pregnancy or delivery, or the health of the newborn infant, and to identify undertreatment as a possible cause of the exacerbations. METHODS: Five hundred and four pregnant asthmatic subjects were prospectively followed and treated. The data on 47 patients with an attack of asthma during pregnancy were compared with those of 457 asthmatics with no recorded acute exacerbation and with 237 healthy parturients. RESULTS: Of 504 asthmatics, 177 patients were not initially treated with inhaled corticosteroids. Of these, 17% had an acute attack compared with only 4% of the 257 patients who had been on inhaled anti-inflammatory treatment from the start of pregnancy. There were no differences between the groups as to length of gestation, length of the third stage of labour, or amount of haemorrhage after delivery. No differences were observed between pregnancies with and without an exacerbation with regard to relative birth weight, incidence of malformations, hypoglycaemia, or need for phototherapy for jaundice during the neonatal period. CONCLUSIONS: Patients with inadequate inhaled anti-inflammatory treatment during pregnancy run a higher risk of suffering an acute attack of asthma than those treated with an anti-inflammatory agent. However, if the acute attack of asthma is relatively mild and promptly treated, it does not have a serious effect on the pregnancy, delivery, or the health of the newborn infant. PMID:8733495

  9. Acute Migraine Treatment in Adults.

    PubMed

    Becker, Werner J

    2015-06-01

    There are many options for acute migraine attack treatment, but none is ideal for all patients. This study aims to review current medical office-based acute migraine therapy in adults and provides readers with an organized approach to this important facet of migraine treatment. A general literature review includes a review of several recent published guidelines. Acetaminophen, 4 nonsteroidal anti-inflammatory drugs (NSAIDs) (ibuprofen, acetylsalicylic acid [ASA], naproxen sodium, and diclofenac potassium), and 7 triptans (almotriptan, eletriptan, frovatriptan, naratriptan, rizatriptan, sumatriptan, and zolmitriptan) have good evidence for efficacy and form the core of acute migraine treatment. NSAID-triptan combinations, dihydroergotamine, non-opioid combination analgesics (acetaminophen, ASA, and caffeine), and several anti-emetics (metoclopramide, domperidone, and prochlorperazine) are additional evidence-based options. Opioid containing combination analgesics may be helpful in specific patients, but should not be used routinely. Clinical features to be considered when choosing an acute migraine medication include usual headache intensity, usual rapidity of pain intensity increase, nausea, vomiting, degree of disability, patient response to previously used medications, history of headache recurrence with previous attacks, and the presence of contraindications to specific acute medications. Available acute medications can be organized into 4 treatment strategies, including a strategy for attacks of mild to moderate severity (strategy one: acetaminophen and/or NSAIDs), a triptan strategy for patients with severe attacks and for attacks not responding to strategy one, a refractory attack strategy, and a strategy for patients with contraindications to vasoconstricting drugs. Acute treatment of migraine attacks during pregnancy, lactation, and for patients with chronic migraine is also discussed. In chronic migraine, it is particularly important that medication

  10. Estimation of EuroQol 5-Dimensions health status utility values in hereditary angioedema

    PubMed Central

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen; Hautamaki, Emily; Sisic, Zlatko; Boysen, Henrik B; Caballero, Teresa

    2016-01-01

    Objective To estimate health status utility (preference) weights for hereditary angioedema (HAE) during an attack and between attacks using data from the Hereditary Angioedema Burden of Illness Study in Europe (HAE-BOIS-Europe) survey. Utility measures quantitatively describe the net impact of a condition on a patient’s life; a score of 0.0 reflects death and 1.0 reflects full health. Study design and methods The HAE-BOIS-Europe was a cross-sectional survey conducted in Spain, Germany, and Denmark to assess the real-world experience of HAE from the patient perspective. Survey items that overlapped conceptually with the EuroQol 5-Dimensions (EQ-5D) domains (pain/discomfort, mobility, self-care, usual activities, and anxiety/depression) were manually crosswalked to the corresponding UK population-based EQ-5D utility weights. EQ-5D utilities were computed for each respondent in the HAE-BOIS-Europe survey for acute attacks and between attacks. Results Overall, a total of 111 HAE-BOIS-Europe participants completed all selected survey items and thus allowed for computation of EQ-5D-based utilities. The mean utilities for an HAE attack and between attacks were 0.44 and 0.72, respectively. Utilities for an acute attack were dependent on the severity of pain of the last attack (0.61 for no pain or mild pain, 0.47 for moderate pain, and 0.08 for severe pain). There were no significant differences across countries. Mean utilities derived from the study approach compare sensibly with other disease states for both acute attacks and between attacks. Conclusion The impacts of HAE translate into substantial health status disutilities associated with acute attacks as well as between attacks, documenting that the detrimental effects of HAE are meaningful from the patient perspective. Results were consistent across countries with regard to pain severity and in comparison to similar disease states. The results can be used to raise awareness of HAE as a serious disease with wide

  11. Estimation of EuroQol 5-Dimensions health status utility values in hereditary angioedema

    PubMed Central

    Aygören-Pürsün, Emel; Bygum, Anette; Beusterien, Kathleen; Hautamaki, Emily; Sisic, Zlatko; Boysen, Henrik B; Caballero, Teresa

    2016-01-01

    Objective To estimate health status utility (preference) weights for hereditary angioedema (HAE) during an attack and between attacks using data from the Hereditary Angioedema Burden of Illness Study in Europe (HAE-BOIS-Europe) survey. Utility measures quantitatively describe the net impact of a condition on a patient’s life; a score of 0.0 reflects death and 1.0 reflects full health. Study design and methods The HAE-BOIS-Europe was a cross-sectional survey conducted in Spain, Germany, and Denmark to assess the real-world experience of HAE from the patient perspective. Survey items that overlapped conceptually with the EuroQol 5-Dimensions (EQ-5D) domains (pain/discomfort, mobility, self-care, usual activities, and anxiety/depression) were manually crosswalked to the corresponding UK population-based EQ-5D utility weights. EQ-5D utilities were computed for each respondent in the HAE-BOIS-Europe survey for acute attacks and between attacks. Results Overall, a total of 111 HAE-BOIS-Europe participants completed all selected survey items and thus allowed for computation of EQ-5D-based utilities. The mean utilities for an HAE attack and between attacks were 0.44 and 0.72, respectively. Utilities for an acute attack were dependent on the severity of pain of the last attack (0.61 for no pain or mild pain, 0.47 for moderate pain, and 0.08 for severe pain). There were no significant differences across countries. Mean utilities derived from the study approach compare sensibly with other disease states for both acute attacks and between attacks. Conclusion The impacts of HAE translate into substantial health status disutilities associated with acute attacks as well as between attacks, documenting that the detrimental effects of HAE are meaningful from the patient perspective. Results were consistent across countries with regard to pain severity and in comparison to similar disease states. The results can be used to raise awareness of HAE as a serious disease with wide

  12. WILD PIG ATTACKS ON HUMANS

    SciTech Connect

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  13. No link between OC use and heart attack.

    PubMed

    1999-10-01

    A retrospective study conducted in England, Scotland, and Wales concluded that there is no significant increase in the risk of acute myocardial infarction (AMI/heart attack) in women who use modern low-estrogen dose oral contraceptives (OCs). The study matched 448 women aged 16-44 years who had suffered a heart attack with 1728 women in the control group. The leader of the study stated that women should be warned of the classical risk factors for AMI, particularly smoking, and not the OC that they are taking. Furthermore, researchers in the UK study revealed that of the women under age 45 years who suffered a heart attack, 87% were not taking an OC. Moreover, majority of these women had at least one or more known cardiovascular risk factors. In addition, the older studies clarified that the increase in risk for thrombotic diseases, including AMI, is applicable primarily to older high-dose OCs.

  14. Genetic attack on neural cryptography.

    PubMed

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  15. Genetic attack on neural cryptography

    SciTech Connect

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  16. Attack vulnerability of complex networks

    NASA Astrophysics Data System (ADS)

    Holme, Petter; Kim, Beom Jun; Yoon, Chang No; Han, Seung Kee

    2002-05-01

    We study the response of complex networks subject to attacks on vertices and edges. Several existing complex network models as well as real-world networks of scientific collaborations and Internet traffic are numerically investigated, and the network performance is quantitatively measured by the average inverse geodesic length and the size of the largest connected subgraph. For each case of attacks on vertices and edges, four different attacking strategies are used: removals by the descending order of the degree and the betweenness centrality, calculated for either the initial network or the current network during the removal procedure. It is found that the removals by the recalculated degrees and betweenness centralities are often more harmful than the attack strategies based on the initial network, suggesting that the network structure changes as important vertices or edges are removed. Furthermore, the correlation between the betweenness centrality and the degree in complex networks is studied.

  17. Resource distribution in multiple attacks with imperfect detection of the attack outcome.

    PubMed

    Levitin, Gregory; Hausken, Kjell

    2012-02-01

    This article extends the previous research of consecutive attacks strategy by assuming that an attacker observes the outcome of each attack imperfectly. With given probabilities it may wrongly identify a destroyed target as undestroyed, and wrongly identify an undestroyed target as destroyed. The outcome of each attack is determined by a contest success function that depends on the amount of resources allocated by the defender and the attacker to each attack. The article suggests a probabilistic model of the multiple attacks and analyzes how the target destruction probability and the attacker's relative resource expenditure are impacted by the two probabilities of incorrect observation, the attacker's and defender's resource ratio, the contest intensity, the number of attacks, and the resource distribution across attacks. We analyze how the attacker chooses the number of attacks, the attack stopping rule, and the optimal resource distribution across attacks to maximize its utility.

  18. Additive attacks on speaker recognition

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  19. Duloxetine-related panic attacks.

    PubMed

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-03-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients' trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who responded to duloxetine treatment administered in the initial dose of 30 mg per day with as many as three panic attacks in two days. Upon duloxetine withdrawal, these panic attacks ceased as well. The patient continued tianeptine and alprazolam treatment during which no significant side-effects had been seen, so that she gradually recovered. Some of the available literature sources have suggested the possibility of duloxetine administration to the end of generalised anxiety disorder and panic attack treatment. However, they are outnumbered by the contributions reporting about duloxetine-related anxiety, aggressiveness and panic attacks. In line with the foregoing, further monitoring of each and every duloxetine-administered patient group needs to be pursued so as to be able to evaluate treatment benefits and weigh them against risks of anxiety or panic attack onset.

  20. Paraplegia due to Spinal Epidermoid Cyst Rupture at Asthma Attack

    PubMed Central

    Kim, Kweon Young; Kang, Jung Hun; Choi, Dae Woo; Lee, Min Hong

    2013-01-01

    Spinal epidermoid cyst is less than 1% of the entire spinal cord tumor and a rare tumor. It is a slowly proliferating benign tumor and can be a result of either congenital or acquired factors. In particular, reports of acute paraplegia due to spinal epidermoid cyst rupture are very rare. Since authors experienced paraplegia resulting from congenital spinal epidermoid cyst rupture during an asthma attack, it is reported with a review of literature. PMID:23705125

  1. Myocardial perfusion imaging study of CO(2)-induced panic attack.

    PubMed

    Soares-Filho, Gastão L F; Machado, Sergio; Arias-Carrión, Oscar; Santulli, Gaetano; Mesquita, Claudio T; Cosci, Fiammetta; Silva, Adriana C; Nardi, Antonio E

    2014-01-15

    Chest pain is often seen alongside with panic attacks. Moreover, panic disorder has been suggested as a risk factor for cardiovascular disease and even a trigger for acute coronary syndrome. Patients with coronary artery disease may have myocardial ischemia in response to mental stress, in which panic attack is a strong component, by an increase in coronary vasomotor tone or sympathetic hyperactivity setting off an increase in myocardial oxygen consumption. Indeed, coronary artery spasm was presumed to be present in cases of cardiac ischemia linked to panic disorder. These findings correlating panic disorder with coronary artery disease lead us to raise questions about the favorable prognosis of chest pain in panic attack. To investigate whether myocardial ischemia is the genesis of chest pain in panic attacks, we developed a myocardial perfusion study through research by myocardial scintigraphy in patients with panic attacks induced in the laboratory by inhalation of 35% carbon dioxide. In conclusion, from the data obtained, some hypotheses are discussed from the viewpoint of endothelial dysfunction and microvascular disease present in mental stress response. PMID:24188891

  2. Trigeminal nociceptive transmission in migraineurs predicts migraine attacks.

    PubMed

    Stankewitz, Anne; Aderjan, David; Eippert, Falk; May, Arne

    2011-02-01

    Several lines of evidence suggest a major role of the trigeminovascular system in the pathogenesis of migraine. Using functional magnetic resonance imaging (fMRI), we compared brain responses during trigeminal pain processing in migraine patients with those of healthy control subjects. The main finding is that the activity of the spinal trigeminal nuclei in response to nociceptive stimulation showed a cycling behavior over the migraine interval. Although interictal (i.e., outside of attack) migraine patients revealed lower activations in the spinal trigeminal nuclei compared with controls, preictal (i.e., shortly before attack) patients showed activity similar to controls, which demonstrates that the trigeminal activation level increases over the pain-free migraine interval. Remarkably, the distance to the next headache attack was predictable by the height of the signal intensities in the spinal nuclei. Migraine patients scanned during the acute spontaneous migraine attack showed significantly lower signal intensities in the trigeminal nuclei compared with controls, demonstrating activity levels similar to interictal patients. Additionally we found-for the first time using fMRI-that migraineurs showed a significant increase in activation of dorsal parts of the pons, previously coined "migraine generator." Unlike the dorsal pons activation usually linked to migraine attacks, the gradient-like activity following nociceptive stimulation in the spinal trigeminal neurons likely reflects a raise in susceptibility of the brain to generate the next attack, as these areas increase their activity long before headache starts. This oscillating behavior may be a key player in the generation of migraine headache, whereas attack-specific pons activations are most likely a secondary event.

  3. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  4. Eyespots divert attacks by fish.

    PubMed

    Kjernsmo, Karin; Merilaita, Sami

    2013-09-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish' own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments. PMID:23864602

  5. Eyespots divert attacks by fish

    PubMed Central

    Kjernsmo, Karin; Merilaita, Sami

    2013-01-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish’ own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments. PMID:23864602

  6. Eyespots divert attacks by fish.

    PubMed

    Kjernsmo, Karin; Merilaita, Sami

    2013-09-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish' own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments.

  7. Evolution of serum amylase, lipase and immunoreactive trypsin during pancreatitis attacks.

    PubMed

    Courtois, P; Art, G; Vertongen, F; Franckson, J R

    1985-01-01

    The characteristics of the blood curves of alpha-amylase (SA), pancreatic lipase (SL) and immunoreactive trypsin (SIT) have been analyzed in a series of patients daily explored throughout the evolution of pancreatitis attacks; urines were also collected to estimate the amylase-creatinine clearance ratio (ACCR). The following results were obtained. a). The 3 enzymes profiles ran roughly parallel during an acute attack. b). SL rose far higher than SA at the onset of the attack but its decay displayed a shorter half-life than the latter; these features resulted in an absence of systematic difference between their times of return to normal levels at the end of the attack. c). SIT more closely correlated with SL than with SA. d). In common hospital practice, simultaneous SA and SL determinations were proving a more reliable help to diagnose pancreatitis attack than ACCR. PMID:3878108

  8. Evaluation of Word Attack Skills.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A framework for more apt and sensitive evaluation of generalized word attack skill--the heart of oral reading skill--is presented. The paper envisions the design and development of oral reading instruction as bounded by a fully-specified evaluation scheme. (Author)

  9. Detection of complex cyber attacks

    NASA Astrophysics Data System (ADS)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  10. The humanistic burden of hereditary angioedema: Impact on health-related quality of life, productivity, and depression.

    PubMed

    Lumry, William R; Castaldo, Anthony J; Vernon, Margaret K; Blaustein, Marc B; Wilson, David A; Horn, Patrick T

    2010-01-01

    Hereditary angioedema (HAE) is a rare, autosomal dominant disorder characterized by recurrent acute attacks of swelling of the larynx, abdomen, and periphery. This study was designed to assess the humanistic burden of illness associated with HAE. HAE burden was assessed via a web-based survey of patients that solicited information on attack characterization, treatment, side effects, pain, and functional and emotional burden of disease management. In addition to HAE-specific sections, the survey used three standardized instruments to compare HAE patient data to normative (healthy) and chronic disease populations: the 12-Item Short Form (SF-12) Health Survey, the Work Productivity and Activity Impairment-General Health (WPAI-GH) questionnaire, and the Hamilton Depression Inventory-Short Form (HDI-SF). A total of 457 HAE patients responded to the survey (response rate, ∼19%). Patients reported significantly poorer health-related quality of life versus population norms, based on the SF-12 Physical Component Summary (mean, 43.7 versus 49.6; p < 0.001) and Mental Component Summary (mean, 42.6 versus 49.4; p < 0.001). HAE patients also had higher mean HDI-SF scores than population norms (8.1 ± 6.5 versus 3.1 ± 3.0; p < 0.001), with 42.5% of HAE patients scoring >8.5, indicative of depressive symptomatology. Productivity was also markedly impaired in all WPAI-GH categories, including 34% overall work impairment. Because of their most recent HAE attack, workers lost a mean of 3.3 days; students lost a mean of 1.9 days. HAE results in considerable humanistic burden to patients across physical and mental health domains; negatively impacts education, career, and work productivity; and compounds the substantial economic burdens that are reported separately.

  11. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    PubMed

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  12. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  13. Attack Vulnerability of Network Controllability.

    PubMed

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  14. Generic attack approaches for industrial control systems.

    SciTech Connect

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  15. Recombinant human C1 esterase inhibitor in the management of hereditary angioedema.

    PubMed

    Riedl, Marc

    2015-07-01

    Hereditary angioedema (HAE), a rare autosomal dominant genetic disorder, is caused by a deficiency in functional C1 esterase inhibitor (C1-INH). This potentially life-threatening condition manifests as recurrent attacks of subcutaneous and submucosal swelling of the skin, gastrointestinal tract and larynx. The management of HAE includes treatment of acute episodes, short-term prophylaxis in preparation for exposure to known triggers and long-term prophylaxis to decrease the incidence and severity of HAE attacks. Four products are approved in the USA for the treatment of acute attacks of HAE, including one human plasma-derived C1-INH therapy, a recombinant human C1-INH product (rhC1-INH), a plasma kallikrein inhibitor and a bradykinin B2 receptor antagonist. In addition, one human plasma-derived C1-INH therapy and danazol are approved for prophylaxis of HAE attacks. rhC1-INH, extracted from the milk of transgenic rabbits, is a glycoprotein of 478 amino acids with an identical amino acid sequence to the endogenous human C1-INH protein. Population pharmacokinetic analysis of rhC1-INH supports an intravenous dosing strategy of 50 U/kg (maximum 4200 U). The safety and efficacy of rhC1-INH in the treatment of acute attacks in patients with HAE were demonstrated in three randomized, double-blind, placebo-controlled studies and two open-label extension studies. In a pilot prophylaxis study, weekly administration of rhC1-INH 50 U/kg for 8 weeks reduced the incidence of HAE attacks and was well tolerated. Administration of rhC1-INH has not been associated with the development of anti-drug antibodies or antibodies to anti-host-related impurities.

  16. Diabetes Ups Risk of Heart Attack Death

    MedlinePlus

    ... news/fullstory_159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated ... are much more likely to die after a heart attack than people without the blood sugar condition, a ...

  17. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  18. Rational self-directed hypnotherapy: a treatment for panic attacks.

    PubMed

    Der, D F; Lewington, P

    1990-01-01

    A single-subject research design was employed to assess the efficacy of rational self-directed hypnotherapy in the treatment of panic attacks. Presenting symptoms were acute fear, dizziness, constricted throat, upset stomach, loss of appetite, loss of weight, insomnia, fear of doctors, and fear of returning to work. Treatment lasted 13 weeks plus a 2-week baseline and posttherapy period and a 6-month follow-up. Objective measurements (MMPI, TSCS, POMS) and self-report assessments (physiological symptoms and a subjective stress inventory) were implemented. Using hypnosis and guided imagery, the subject reviewed critical incidents identifying self-defeating components within a cognitive paradigm, revising and rehearsing these incidents. Results showed an increased sense of control, improved self-concept, elimination of pathological symptoms, and cessation of panic attacks.

  19. Biomechanics of knife stab attacks.

    PubMed

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  20. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  1. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  2. Ballistic Beloniformes attacking through Snell's Window.

    PubMed

    Day, R D; Mueller, F; Carseldine, L; Meyers-Cherry, N; Tibbetts, I R

    2016-02-01

    Needlefishes (Beloniformes) were observed employing a range of stalking and attacking behaviours to attack schools of bait fishes ranging from the use of tactics common to predatory fishes to a novel behaviour: the use of leaping, aerial attacks. These aerial attacks are suggested to serve two purposes: to extend the attack range of the needlefishes and to reduce their prey's potential for evasion. Furthermore, a third purpose is hypothesized that the needlefishes are taking advantage of Snell's Window, an optical effect which may mask their approach to their prey.

  3. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  4. 'Crescendo' transient ischemic attacks: clinical and angiographic correlations.

    PubMed

    Rothrock, J F; Lyden, P D; Yee, J; Wiederholt, W C

    1988-02-01

    Forty-seven consecutive patients presenting acutely with repetitive symptoms indicative of anterior circulation ischemia ("crescendo" transient ischemic attacks) were evaluated to identify clinical features that might reliably predict the presence of significant stenosis, ulceration, or both in the presumably symptomatic internal carotid artery. Angiographic or intraoperative correlation was obtained in all patients, and 26 (55%) were found to have anatomically significant disease. Of 20 patients with signs or symptoms suggestive of cortical ischemia, amaurosis fugax, or both, 17 (85%) had "positive" angiograms; of 18 with numbness/weakness only, 9 (50%) had positive angiograms; of 9 whose symptoms suggested lacunar ischemia, none had positive angiograms.

  5. Adolescent Vulnerability Following the September 11th Terrorist Attacks: A Study of Parents and Their Children

    ERIC Educational Resources Information Center

    Gil-Rivas, Virginia; Holman, E. Alison; Silver, Roxane Cohen

    2004-01-01

    Approximately 2 weeks after September 11th, adolescents from a national sample of households who were indirectly exposed to the terrorist attacks through the media completed a Web-based survey that assessed event-related acute stress symptoms. One year later, these adolescents (N = 142) and a randomly selected parent from their household completed…

  6. Cystitis - acute

    MedlinePlus

    Uncomplicated urinary tract infection; UTI - acute; Acute bladder infection; Acute bacterial cystitis ... International clinical practice guidelines for the treatment of acute uncomplicated cystitis and pyelonephritis in women: A 2010 ...

  7. Preparedness for an anthrax attack.

    PubMed

    Franz, David R

    2009-12-01

    Bacillus anthracis is a long-known bacterial organism with a uniquely stable spore stage. Its stability and the lethal disease which results when the spore is inhaled made it a favorite of state-sponsored biological weapons programs throughout the Cold War era. It is also believed to be high on the list of candidate microbial agents which could be used by terrorist groups or lone actors. Its unique characteristics make protection of humans, especially civilians, from an intentional biological attack very difficult. The author argues that an all-hazards/public health approach - which would also be needed for any natural or deliberate outbreak, no matter the agent - should serve as a foundation of preparation for the specific anthrax countermeasures. Because B. anthracis is a unique organism, specific countermeasures for anthrax detection, diagnostics, prophylaxis and therapy, should be developed in nations or regions where the threat of biological attack is believed to warrant such preparation. Other considerations for a nation interested in anthrax preparedness are discussed.

  8. Shoulder injuries from attacking motion

    NASA Astrophysics Data System (ADS)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  9. Migraine attacks the Basal Ganglia

    PubMed Central

    2011-01-01

    Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human) brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF) to a matched (gender, age, age of onset and type of medication) group of patients whose migraine episodes progressed (HF). Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine. PMID:21936901

  10. Preparedness for an anthrax attack.

    PubMed

    Franz, David R

    2009-12-01

    Bacillus anthracis is a long-known bacterial organism with a uniquely stable spore stage. Its stability and the lethal disease which results when the spore is inhaled made it a favorite of state-sponsored biological weapons programs throughout the Cold War era. It is also believed to be high on the list of candidate microbial agents which could be used by terrorist groups or lone actors. Its unique characteristics make protection of humans, especially civilians, from an intentional biological attack very difficult. The author argues that an all-hazards/public health approach - which would also be needed for any natural or deliberate outbreak, no matter the agent - should serve as a foundation of preparation for the specific anthrax countermeasures. Because B. anthracis is a unique organism, specific countermeasures for anthrax detection, diagnostics, prophylaxis and therapy, should be developed in nations or regions where the threat of biological attack is believed to warrant such preparation. Other considerations for a nation interested in anthrax preparedness are discussed. PMID:19619577

  11. Efficacy and Tolerability of STOPAIN for a Migraine Attack

    PubMed Central

    St. Cyr, Andrea; Chen, Ashley; Bradley, Kathleen C.; Yuan, Hsiangkuo; Silberstein, Stephen D.; Young, William B.

    2015-01-01

    Objective: To determine whether topical menthol 6% gel will relieve a migraine attack. Materials and Methods: A single-center, open-label pilot trial of 25 patients with at least 1 year of diagnosed episodic migraine and <15 headache days per month. Patients treated one migraine attack with STOPAIN topical menthol 6% gel to skull base within 2 h of headache onset. Headache pain severity was assessed prior to and after gel application. Results: Thirty-two patients enrolled and 25 completed the study. Prior to treatment, 7 patients had mild pain, 13 moderate pain, and 5 severe pain. Two hours following gel application, 7 (28%) patients had no pain, 7 (28%) mild pain, 6 (25%) moderate pain, and 5 (20%) severe pain. The majority of patients had similar pain intensity (8; 32%) or improvement (13; 52%). At 24-h, only two non-rescued patients still had mild headache. Of the 25 completers, 2 patients took rescue medication prior to the 2-h period, and an additional 10 patients rescued between 2 and 24 h. Conclusion: Study results showed a significant improvement in headache intensity by 2 h after gel application. This pilot study shows STOPAIN gel may be effective in treating an acute migraine attack. PMID:25699012

  12. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  13. Risk factors of transient ischemic attack: An overview

    PubMed Central

    Khare, Supreet

    2016-01-01

    Transient ischemic attack (TIA) is a transient episode of neurologic dysfunction caused due to loss of blood flow to the brain or spinal cord without acute infarction. Depending on the area of the brain involved, symptoms of TIA vary widely from patient to patient. Since the blockage period in TIA is very short-lived, there is no permanent damage. Risk factors for TIA include family history of stroke or TIA, age above 55 years or older, higher risk of TIA in males than females, high blood pressure, diabetes mellitus, and tobacco smoking. Genetics, race, and imbalance in lipid profile are other risk factors of TIA. TIA is usually diagnosed after taking a thorough history and a physical examination. Several radiological tests such as computed tomography and magnetic resonance imaging are useful in the evaluation of patients who have had a TIA. Ultrasound of the neck and an echocardiogram of the heart are other tests useful in the diagnosis and evaluation of the attack. The treatment following acute recovery from a TIA depends on the underlying cause. Patients who have more than 70% stenosis of the carotid artery, removal of atherosclerotic plaque is usually done by carotid endarterectomy surgery. One-third of the people with TIA can later have recurrent TIAs and one-third can have a stroke because of permanent nerve cell loss. Having a TIA is a risk factor for eventually having a stroke. Educating the patients and inculcating lifestyle modifications in them are initial steps to minimize the prevalence of transient ischemic attack. PMID:27134474

  14. Risk factors of transient ischemic attack: An overview.

    PubMed

    Khare, Supreet

    2016-01-01

    Transient ischemic attack (TIA) is a transient episode of neurologic dysfunction caused due to loss of blood flow to the brain or spinal cord without acute infarction. Depending on the area of the brain involved, symptoms of TIA vary widely from patient to patient. Since the blockage period in TIA is very short-lived, there is no permanent damage. Risk factors for TIA include family history of stroke or TIA, age above 55 years or older, higher risk of TIA in males than females, high blood pressure, diabetes mellitus, and tobacco smoking. Genetics, race, and imbalance in lipid profile are other risk factors of TIA. TIA is usually diagnosed after taking a thorough history and a physical examination. Several radiological tests such as computed tomography and magnetic resonance imaging are useful in the evaluation of patients who have had a TIA. Ultrasound of the neck and an echocardiogram of the heart are other tests useful in the diagnosis and evaluation of the attack. The treatment following acute recovery from a TIA depends on the underlying cause. Patients who have more than 70% stenosis of the carotid artery, removal of atherosclerotic plaque is usually done by carotid endarterectomy surgery. One-third of the people with TIA can later have recurrent TIAs and one-third can have a stroke because of permanent nerve cell loss. Having a TIA is a risk factor for eventually having a stroke. Educating the patients and inculcating lifestyle modifications in them are initial steps to minimize the prevalence of transient ischemic attack.

  15. "Homicide by heart attack" revisited.

    PubMed

    Turner, Staci A; Barnard, Jeffrey J; Spotswood, Sheila D; Prahlow, Joseph A

    2004-05-01

    The sudden death of a person caused by an arrhythmia that is induced by physical and/or emotional stress provoked by the criminal activity of another person is sometimes referred to as "homicide by heart attack." Published criteria for such an event relate to situations where no physical contact occurs between the perpetrator and the victim. Situations involving physical contact, but with absence of lethal injuries, are frequently treated is a similar fashion by forensic pathologists. Herein, we propose a set of modified criteria, which include cases where physical contact has occurred. Five examples of so-called "homicide by heart attack" are presented, including a 40-year-old man who was struck in the head with a wooden statue, a 74-year-old man who was punched in the jaw by a robber, a 66-year-old woman who was started awake by a home-intruder, a 67-year-old woman who struggled with a would-be purse-snatcher in a parking lot, and a 52-year-old man who was in a physical altercation with a younger man. In each instance, autopsy revealed the presence of severe, underlying heart disease, as well as absence of lethal injuries. In each case, investigative information was such that the emotional and/or physical stress associated with the criminal activity of another individual was deemed contributory to the death. The presumed mechanism of death in each case was a cardiac dysrhythmia related to underlying heart disease, but initiated by the emotional and/or physical stress.

  16. Transient ischemic attack as a medical emergency.

    PubMed

    Okada, Yasushi

    2014-01-01

    Since transient ischemic attack (TIA) is regarded as a medical emergency with high risk for early stroke recurrence, the underlying mechanisms should be immediately clarified to conclude a definitive diagnosis and provide early treatment. Early risk stratification using ABCD(2) scores can predict the risk of ischemic stroke occurring after TIA. Carotid ultrasonography (US) can evaluate the degree of stenosis, plaque properties and flow velocity of ICA lesions. High-risk mobile plaques can be classified by carotid US, and aortogenic sources of emboli can be detected by transesophageal echocardiography. Cardiac monitoring and blood findings are thought to play a key role in a diagnosis of cardioembolic TIA. Diffusion-weighted imaging (DWI)-MRI and MR angiography are also indispensable to understand the mechanism of TIA and cerebral circulation. To prevent subsequent stroke arising from TIA, antiplatelet and anticoagulant therapies should be started immediately along with comprehensive management of life-style, hypertension, diabetes mellitus, dyslipidemia and other atherosclerotic diseases. Carotid endarterectomy and endovascular intervention are critical for treating symptomatic patients with significant stenosis of ICA. A novel concept of acute cerebrovascular syndrome (ACVS) has recently been advocated to increase awareness of TIA among citizens, patients and medical professionals. TIA should be recognized as the last opportunity to avoid irreversible ischemic stroke and its sequelae. The clinical relevance of the new concept of ACVS is advocated by early recurrence after TIA, analysis of high-risk TIA, treatment strategies and the optimal management of TIA. Raising TIA awareness should also proceed across many population sectors. PMID:24157554

  17. Perioperative management for patients with hereditary angioedema

    PubMed Central

    Williams, Anesu H.

    2015-01-01

    Hereditary angioedema (HAE) is a rare autosomal dominant disease that results from mutations in the C1-esterase inhibitor (C1-INH) gene. HAE is characterized by recurrent episodes of angioedema of the skin (face, extremities, genitalia, trunk), the gastrointestinal tract, and respiratory tract. Symptoms experienced can be debilitating, may impact quality of life, and can be life threatening. Preventing attacks particularly for patients undergoing procedures is critical. Patients with HAE may now treat acute attacks or prevent attacks with medications that have recently become available in the United States; however, these same medications can be used for perioperative management for patients undergoing medical, surgical, and dental procedures. Periprocedural planning is important for patients to reduce the incidence of acute attacks. Education is critical and increasing awareness of short-term prophylaxis options will allow providers to develop an appropriate action plan for their patients. The goal of this review is to increase awareness for HAE treating physicians, surgeons, anesthesia, and emergency room physicians by examining the available treatment options, researching the literature, and summarizing available data for periprocedural management. The availability of treatment options has increased over the past few years, expanding options for physicians and patients living with HAE and improve safety during the perioperative period and at the time of other procedures. PMID:25860171

  18. Cued Panic Attacks in Body Dysmorphic Disorder

    PubMed Central

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  19. The cost of attack in competing networks.

    PubMed

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  20. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting...

  1. The enduring mental health impact of the September 11th terrorist attacks: challenges and lessons learned.

    PubMed

    Ozbay, Fatih; Auf der Heyde, Tanja; Reissman, Dori; Sharma, Vansh

    2013-09-01

    The authors review the existing literature on the mental health impact of the September 11th attacks and the implications for disaster mental health clinicians and policy makers. The authors discuss the demographic characteristics of those affected and the state of mental health needs and existing mental health delivery services; the nature of the disaster and primary impacts on lives, infrastructure, and socioeconomic factors; the acute aftermath in the days and weeks after the attacks; the persistent mental health impact and evolution of services of the postacute aftermath; and the implications for future disaster mental health practitioners and policy makers. PMID:23954056

  2. The enduring mental health impact of the September 11th terrorist attacks: challenges and lessons learned.

    PubMed

    Ozbay, Fatih; Auf der Heyde, Tanja; Reissman, Dori; Sharma, Vansh

    2013-09-01

    The authors review the existing literature on the mental health impact of the September 11th attacks and the implications for disaster mental health clinicians and policy makers. The authors discuss the demographic characteristics of those affected and the state of mental health needs and existing mental health delivery services; the nature of the disaster and primary impacts on lives, infrastructure, and socioeconomic factors; the acute aftermath in the days and weeks after the attacks; the persistent mental health impact and evolution of services of the postacute aftermath; and the implications for future disaster mental health practitioners and policy makers.

  3. Combating Memory Corruption Attacks On Scada Devices

    NASA Astrophysics Data System (ADS)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  4. An Network Attack Modeling Method Based on MLL-AT

    NASA Astrophysics Data System (ADS)

    Fen, Yan; Xinchun, Yin; Hao, Huang

    In this paper, the method of modeling attack using attack tree is researched. The main goal is effectively using attack tree to model and express multi-stage network attacks. We expand and improve the traditional attack tree. The attack nodes in traditional attack tree are redefined, and the attack risk of leaf node is quantified. On those basis, the mentality and method of building MLL-AT (Multi-Level & Layer Attack Tree) are proposed. The improved attack tree can model attack more accurately, in particular to multi-stage network attacks. And the new model can also be used to evaluate system's risk, to distinguish between varying system security threat degrees caused by different attack sequences.

  5. Acute Bronchitis

    MedlinePlus

    ... tightness. There are two main types of bronchitis: acute and chronic. Most cases of acute bronchitis get better within several days. But your ... that cause colds and the flu often cause acute bronchitis. These viruses spread through the air when ...

  6. Novel Psychological Formulation and Treatment of "Tic Attacks" in Tourette Syndrome.

    PubMed

    Robinson, Sally; Hedderly, Tammy

    2016-01-01

    One important, but underreported, phenomenon in Tourette syndrome (TS) is the occurrence of "tic attacks." These episodes have been described at conferences as sudden bouts of tics and/or functional tic-like movements, lasting from 15 min to several hours. They have also been described by patients in online TS communities. To date, there are no reports of tic attacks in the literature. The aim of this article is to stimulate discussion and inform clinical practices by describing the clinical presentation of 12 children (mean age 11 years and 3 months; SD = 2 years and 4 months) with TS and tic attacks, with a detailed case report for one case (13-year-old male). These children commonly present acutely to casualty departments and undergo unnecessary medical investigations. Interestingly, all children reported comorbid anxiety, with worries about the tics themselves and an increased internal focus of attention on tics once the attacks had started. In keeping with other children, the index case reported a strong internal focus of attention, with a relationship between physiological sensations/tic urges, worries about having tic attacks, and behavioral responses (e.g., body scanning, situational avoidance, and other responses). In our experience, the attacks reduce with psychological therapy, for example, the index case attended 13 sessions of therapy that included metacognitive and attention training techniques, as well as cognitive-behavioral strategies. Following treatment, an improvement was seen across a range of measures assessing tics, mood, anxiety, and quality of life. Thus, psychological techniques used to treat anxiety disorders are effective at supporting a reduction in tic attacks through modifying attention, worry processes, and negative beliefs. It is hypothesized that an attentional style of threat monitoring, difficulties tolerating internal sensory urges, cognitive misattributions, and maladaptive coping strategies contribute to the

  7. Novel Psychological Formulation and Treatment of "Tic Attacks" in Tourette Syndrome.

    PubMed

    Robinson, Sally; Hedderly, Tammy

    2016-01-01

    One important, but underreported, phenomenon in Tourette syndrome (TS) is the occurrence of "tic attacks." These episodes have been described at conferences as sudden bouts of tics and/or functional tic-like movements, lasting from 15 min to several hours. They have also been described by patients in online TS communities. To date, there are no reports of tic attacks in the literature. The aim of this article is to stimulate discussion and inform clinical practices by describing the clinical presentation of 12 children (mean age 11 years and 3 months; SD = 2 years and 4 months) with TS and tic attacks, with a detailed case report for one case (13-year-old male). These children commonly present acutely to casualty departments and undergo unnecessary medical investigations. Interestingly, all children reported comorbid anxiety, with worries about the tics themselves and an increased internal focus of attention on tics once the attacks had started. In keeping with other children, the index case reported a strong internal focus of attention, with a relationship between physiological sensations/tic urges, worries about having tic attacks, and behavioral responses (e.g., body scanning, situational avoidance, and other responses). In our experience, the attacks reduce with psychological therapy, for example, the index case attended 13 sessions of therapy that included metacognitive and attention training techniques, as well as cognitive-behavioral strategies. Following treatment, an improvement was seen across a range of measures assessing tics, mood, anxiety, and quality of life. Thus, psychological techniques used to treat anxiety disorders are effective at supporting a reduction in tic attacks through modifying attention, worry processes, and negative beliefs. It is hypothesized that an attentional style of threat monitoring, difficulties tolerating internal sensory urges, cognitive misattributions, and maladaptive coping strategies contribute to the

  8. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  9. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    NASA Astrophysics Data System (ADS)

    Muramatsu, Daigo

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  10. Attack detection in unattended sensor networks

    NASA Astrophysics Data System (ADS)

    Wu, Curt; Monnier, Camille; Fry, Gerald; Girod, Lewis; Luke, Jahn

    2010-04-01

    Because sensor networks are often deployed in hostile environments where their security and integrity may be compromised, it is essential to maximize the reliability and trustworthiness of existing and envisioned sensor networks. During operations, the sensor network must be robust to deception, node compromise, and various other attacks, while maintaining the operator's situational awareness regarding the health and integrity of the system. To address these needs, we have designed a Framework to Ensure and Assess Trustworthiness in Sensor systems (FEATS) to identify attacks on sensor system integrity and inform the operator of sensor data trustworthiness. We have developed and validated unsupervised anomaly detection algorithms for sensor data captured from an experimental acoustic sensor platform under a number of attack scenarios. The platform, which contains four audio microphones, was exposed to two physical attacks (audio filtering and audio playback) as well as a live replay attack (replaying live audio data that is captured at a remote location), which is analogous to a wormhole attack in the routing layer. With our unsupervised learning algorithms, we were able to successfully identify the presence of various attacks.

  11. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  12. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  13. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  14. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  15. Acute otitis media in children. Are antibiotics always appropriate?

    PubMed

    Del Mar, C; Glasziou, P

    1998-01-01

    A recent analysis of the evidence suggests that, in Western countries the use of antibiotics as initial treatment for children with acute otitis media benefits one out of 20 children by reducing pain in the acute phase. There is no evident benefit for deafness, recurrent attacks or complications. This suggests that we should use antibiotics less readily.

  16. Thatcher condemns attacks on abortion mp.

    PubMed

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  17. Recovery of infrastructure networks after localised attacks

    NASA Astrophysics Data System (ADS)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  18. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  19. Diabetes - preventing heart attack and stroke

    MedlinePlus

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  20. Identifying and Analyzing Web Server Attacks

    SciTech Connect

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  1. Recovery of infrastructure networks after localised attacks

    PubMed Central

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  2. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  3. Correlations in complex networks under attack.

    PubMed

    Srivastava, Animesh; Mitra, Bivas; Ganguly, Niloy; Peruani, Fernando

    2012-09-01

    For any initially correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initially assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initially uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations. PMID:23030979

  4. Death by attack from a domestic buffalo.

    PubMed

    Bakkannavar, Shankar M; Monteiro, Francis N P; Bhagavath, Prashantha; Pradeep Kumar, G

    2010-02-01

    Attacks on humans by domestic animals causing fatal injuries are not uncommon in rural areas of India. But injuries due to buffalo gore are rarely observed in villages and are different from other casualties like stab injuries, road fatalities, etc. As the victims of buffalo attack are usually recovered from the fields or forest, the investigating officer could be mislead as to the nature of infliction of fatal injuries to a possible homicide. The injuries caused by the horns of buffaloes are of various shapes, sizes and directions. They are violent and goring in nature. The wound sustained may be contusions, lacerations, criss-cross wounds, penetration of body cavities, and sometimes fractures. In the absence of any eye witness, it becomes very difficult to believe the unsuspecting domestic water buffalo as attacker. This case is reported for its rarity, for the awareness of the possible injuries in such unnatural deaths, and factors predisposing to a buffalo attack.

  5. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  6. Progression of alcoholic acute to chronic pancreatitis.

    PubMed Central

    Ammann, R W; Muellhaupt, B

    1994-01-01

    Alcoholic chronic pancreatitis usually progresses from acute attacks to chronic pancreatitis within one to 19 years. The factors responsible for the appreciable variability in progression are unclear. In this study the relation between progression and the incidence and severity of acute episodes in a large cohort of patients with alcoholic chronic pancreatitis was analysed. All patients with at least one documented episode of acute pancreatitis have been studied prospectively over the past 30 years according to our protocol. Patients were classified according to their long term course into (a) calcific (n = 185), (b) non-calcific (n = 30), and (c) non-progressive (n = 39) chronic pancreatitis groups. The yearly incidence of acute attacks of pancreatitis was significantly higher in groups (a) and (b) than in group (c). Furthermore, the progression rate to advanced chronic pancreatitis (groups (a) and (b)) correlated with the incidence of severe pancreatitis (associated with pseudocysts in more than 55%). Pseudocysts were located primarily in the cephalic pancreas in groups (a) and (b) (58-71%) and in the pancreatic tail in group (c) (61%). In conclusion, these data suggest that the progression of acute to chronic pancreatitis is closely related to the incidence and severity of acute attacks. This finding and the primary location of pseudocysts in the cephalic pancreas (groups (a) plus (b)) are compatible with the 'necrosis-fibrosis' pathogenetic hypothesis. PMID:8174996

  7. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  8. Heart Attack - Multiple Languages: MedlinePlus

    MedlinePlus

    ... Arabic) النوبة القلبية - العربية Bilingual PDF Health Information Translations Bosnian (Bosanski) Heart Attack Srčani udar - Bosanski (Bosnian) Bilingual PDF Health Information Translations Chinese - Simplified (简体中文) Heart Attack 心脏病发作 - 简体中文 (Chinese - ...

  9. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  10. Awareness of heart attack and stroke symptoms among Hispanic male adults living in the United States.

    PubMed

    Lutfiyya, May Nawal; Bardales, Ricardo; Bales, Robert; Aguero, Carlos; Brady, Shelly; Tobar, Adriana; McGrath, Cynthia; Zaiser, Julia; Lipsky, Martin S

    2010-10-01

    There is evidence that Hispanic men are a high risk group for treatment delay for both heart attack and stroke. More targeted research is needed to elucidate this specific population's knowledge of warning signs for these acute events. This study sought to describe within-group disparities in Hispanic men's knowledge of heart attack and stroke symptomology. Multivariate techniques were used to analyze a multi-year Behavioral Risk Factor Surveillance Heart and Stroke module database. The data were cross-sectional and focused on health risk factors and behaviors. The research participants were U.S. male Hispanic adults aged 18-99. The main outcome measure for the study was heart attack and stroke symptom knowledge score. Multivariate logistic regression analysis yielded that Hispanic men aged >or=18 years who earned low scores on the composite heart attack and stroke knowledge questions (range 0-8 points) were more likely to: have less than a high school education, have deferred medical care because of cost, not have an identified health care provider, and be uninsured. There were significant within-group differences. Targeting educational efforts toward older (>or=55 years) Hispanic men with less than high school education, those who do not have an identified health care provider or health insurance, and who defer health care because of cost could be ways to improve the outcome of acute vascular events among the U.S. Hispanic adult male population.

  11. An update of clinical management of acute intermittent porphyria

    PubMed Central

    Pischik, Elena; Kauppinen, Raili

    2015-01-01

    Acute intermittent porphyria (AIP) is due to a deficiency of the third enzyme, the hydroxymethylbilane synthase, in heme biosynthesis. It manifests with occasional neuropsychiatric crises associated with overproduction of porphyrin precursors, aminolevulinic acid and porphobilinogen. The clinical criteria of an acute attack include the paroxysmal nature and various combinations of symptoms, such as abdominal pain, autonomic dysfunction, hyponatremia, muscle weakness, or mental symptoms, in the absence of other obvious causes. Intensive abdominal pain without peritoneal signs, acute peripheral neuropathy, and encephalopathy usually with seizures or psychosis are the key symptoms indicating possible acute porphyria. More than fivefold elevation of urinary porphobilinogen excretion together with typical symptoms of an acute attack is sufficient to start a treatment. Currently, the prognosis of the patients with AIP is good, but physicians should be aware of a potentially fatal outcome of the disease. Mutation screening and identification of type of acute porphyria can be done at the quiescent phase of the disease. The management of patients with AIP include following strategies: A, during an acute attack: 1) treatment with heme preparations, if an acute attack is severe or moderate; 2) symptomatic treatment of autonomic dysfunctions, polyneuropathy and encephalopathy; 3) exclusion of precipitating factors; and 4) adequate nutrition and fluid therapy. B, during remission: 1) exclusion of precipitating factors (education of patients and family doctors), 2) information about on-line drug lists, and 3) mutation screening for family members and education about precipitating factors in mutation-positive family members. C, management of patients with recurrent attacks: 1) evaluation of the lifestyle, 2) evaluation of hormonal therapy in women, 3) prophylactic heme therapy, and 4) liver transplantation in patients with severe recurrent attacks. D, follow-up of the AIP

  12. Pathologic features of fatal shark attacks.

    PubMed

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  13. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  14. The neurologic manifestations of the acute porphyrias.

    PubMed

    Simon, Neil G; Herkes, Geoffrey K

    2011-09-01

    The porphyrias are diseases characterised by accumulation of porphyrins and porphyrin precursors owing to enzymatic deficiencies of the haem synthetic pathway. In the acute hepatic porphyrias accumulation of porphyrin precursors, in particular delta-aminolaevulinic acid (ALA), cause dysfunction of the central, peripheral and autonomic nervous systems. This leads to the characteristic clinical findings of abdominal pain, neuropsychiatric symptoms and neuropathy. The exact pathogenic mechanism is not clear but evidence to date suggests both direct toxic effects of ALA and intracellular metabolic derangement contribute to the neurologic disorders. This review explores the mechanisms of neural dysfunction in the acute porphyrias and the resultant clinical features of an acute attack.

  15. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  16. Characterization of attacks on public telephone networks

    NASA Astrophysics Data System (ADS)

    Lorenz, Gary V.; Manes, Gavin W.; Hale, John C.; Marks, Donald; Davis, Kenneth; Shenoi, Sujeet

    2001-02-01

    The U.S. Public Telephone Network (PTN) is a massively connected distributed information systems, much like the Internet. PTN signaling, transmission and operations functions must be protected from physical and cyber attacks to ensure the reliable delivery of telecommunications services. The increasing convergence of PTNs with wireless communications systems, computer networks and the Internet itself poses serious threats to our nation's telecommunications infrastructure. Legacy technologies and advanced services encumber well-known and as of yet undiscovered vulnerabilities that render them susceptible to cyber attacks. This paper presents a taxonomy of cyber attacks on PTNs in converged environments that synthesizes exploits in computer and communications network domains. The taxonomy provides an opportunity for the systematic exploration of mitigative and preventive strategies, as well as for the identification and classification of emerging threats.

  17. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  18. A Traceability Attack against e-Passports

    NASA Astrophysics Data System (ADS)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  19. Resistance of the double random phase encryption against various attacks.

    PubMed

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-01

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  20. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    NASA Astrophysics Data System (ADS)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  1. Counterfactual attack on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wnang, Jian; Tang, Chao Jing

    2012-05-01

    It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.

  2. Identifying inference attacks against healthcare data repositories

    PubMed Central

    Vaidya, Jaideep; Shafiq, Basit; Jiang, Xiaoqian; Ohno-Machado, Lucila

    Health care data repositories play an important role in driving progress in medical research. Finding new pathways to discovery requires having adequate data and relevant analysis. However, it is critical to ensure the privacy and security of the stored data. In this paper, we identify a dangerous inference attack against naive suppression based approaches that are used to protect sensitive information. We base our attack on the querying system provided by the Healthcare Cost and Utilization Project, though it applies in general to any medical database providing a query capability. We also discuss potential solutions to this problem. PMID:24303279

  3. Differential attack on mini-AES

    NASA Astrophysics Data System (ADS)

    Ajeng Gemellia, Asadini Dwi; Indarjani, Santi

    2012-05-01

    This paper presents the results of differential attack on Mini-AES algorithm. The differential trails are constructed using all combinations of propagation ratio without repetition. To give practical results, we implement the key extraction for differential characteristics which have the highest and lowest probability as a comparison. Based on total propagation ratio and complexity resulted, Mini-AES algorithms are vulnerable to differential attack. The best differential characteristic is the differential characteristic using a single active s-box with the propagation ratio of 8 / 16.

  4. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  5. Triage of casualties after nuclear attack.

    PubMed

    Pledger, H G

    1986-09-20

    Casualties from a nuclear attack on the United Kingdom would overwhelm the health services, and health workers would be faced with many more people seeking help than could be offered treatment. Discussion is needed to determine which methods of medical and non-medical triage would be acceptable and feasible.

  6. The anthrax attacks 10 years later.

    PubMed

    Bush, Larry M; Perez, Maria T

    2012-01-01

    Ten years ago, just weeks after the September 11 attacks, the United States experienced a deliberate act of bioterrorism. Through use of the postal service, anthrax spores were widely disseminated, including to homes, the Senate, and major newsrooms, resulting in morbidity and mortality and effectively disrupting our way of life and revealing our vulnerability. Even though such attacks had been the subject of much writing and had been planned for, detection of and the appropriate response to an attack with an agent from the so-called "Category 'A' List" had only been considered in theoretical terms. What transpired during the following difficult weeks, including how public health and federal government agencies performed, has been both praised and criticized. An intertwined epidemiologic and criminal investigation of such magnitude was unprecedented in U.S. history. To address the question of whether we as a nation are now better prepared for future threats involving biologic agents, it is important to learn from the lessons of the 2001 anthrax attacks, including the critical role of clinicians in surveillance. As physicians involved in diagnosing anthrax in the index case and alerting authorities, we offer our perspective on these events a decade after their occurrence. PMID:21969275

  7. CASE STUDY: DIELDRIN ATTACK IN DALYAN LAGOON

    EPA Science Inventory

    During the first two weeks of December 2005, NATO sponsored an Advanced Study Institute (ASI) in Istanbul, Turkey. Part of this ASI involved a case study of a terrorist attack, where a chemical was assumed to be dumped into Sulunger Lake in Turkey. This chapter documents the re...

  8. Intrusion-Tolerant Replication under Attack

    ERIC Educational Resources Information Center

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  9. Rhode Island School Terrorist Attack Preparedness

    ERIC Educational Resources Information Center

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  10. Shark Attack! Sinking Your Teeth into Anatomy.

    ERIC Educational Resources Information Center

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  11. Association between Terror Attacks and Suicide Attempts

    ERIC Educational Resources Information Center

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  12. Union, States Wage Frontal Attack on NCLB

    ERIC Educational Resources Information Center

    Keller, Bess; Sack, Joetta L.

    2005-01-01

    Widespread sniping at the Bush administration's centerpiece education law escalated into a frontal attack as the nation's largest teachers' union. Several school districts sued federal officials over the measure, just a day after the Utah legislature approved a bill challenging the reach of the law. The National Education Association's suit…

  13. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  14. Drugs and acute porphyrias: reasons for a hazardous relationship.

    PubMed

    Roveri, Giulia; Nascimbeni, Fabio; Rocchi, Emilio; Ventura, Paolo

    2014-11-01

    The porphyrias are a group of metabolic diseases caused by inherited or acquired enzymatic deficiency in the metabolic pathway of heme biosynthesis. Simplistically, they can be considered as storage diseases, because the partial enzymatic defect gives rise to a metabolic "bottleneck" in the biosynthetic pathway and hence to an accumulation of different metabolic intermediates, potentially toxic and responsible for the various (cutaneous or neurovisceral) clinical manifestations observed in these diseases. In the acute porphyrias (acute intermittent porphyria, hereditary coproporphyria, variegate porphyria, and the very rare delta-aminolevulinic acid dehydratase ALAD-d porphyria), the characteristic severe neurovisceral involvement is mainly ascribed to a tissue accumulation of delta-aminolevulinic acid, a neurotoxic nonporphyrin precursor. Many different factors, both endogenous and exogenous, may favor the accumulation of this precursor in patients who are carriers of an enzymatic defect consistent with an acute porphyria, thus contributing to trigger the serious (and potentially fatal) clinical manifestations of the disease (acute porphyric attacks). To date, many different drugs are known to be able to precipitate an acute porphyric attack, so that the acute porphyrias are also considered as pharmacogenetic or toxygenetic diseases. This article reviews the different biochemical mechanisms underlying the capacity of many drugs to precipitate a porphyric acute attack (drug porphyrogenicity) in carriers of genetic mutations responsible for acute porphyrias, and addresses the issue of prescribing drugs for patients affected by these rare, but extremely complex, diseases.

  15. Recovery of human remains after shark attack.

    PubMed

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  16. Valsartan-induced acute pancreatitis.

    PubMed

    Can, Burak; Sali, Mursel; Batman, Adnan; Yilmaz, Hasan; Korkmaz, Ugur; Celebi, Altay; Senturk, Omer; Hulagu, Sadettin

    2014-01-01

    Gastrointestinal toxicity is uncommon among patients treated with angiotensin II receptor antagonists. A 58-year-old man presented with nausea, vomiting and constant pain in the epigastrium that radiated to the flanks. He received treatment with valsartan (160 mg daily) for hypertension. The clinical, biochemical and radiological findings were compatible with a diagnosis of acute pancreatitis. After the patient achieved a clinical and biochemical recovery, the valsartan therapy was started again. Six weeks later, he returned to the hospital with an attack of pancreatitis. Subsequently, he returned with repeated attacks of pancreatitis twice, and the valsartan was discontinued. Ten months after the treatment, the patient had no complaints. When severe abdominal symptoms occur for no apparent reason during treatment with valsartan, a diagnosis of pancreatitis should be considered.

  17. Self-administered C1 esterase inhibitor concentrates for the management of hereditary angioedema: usability and patient acceptance.

    PubMed

    Li, Huamin Henry

    2016-01-01

    Hereditary angioedema (HAE) is a rare genetic disease characterized by episodic subcutaneous or submucosal swelling. The primary cause for the most common form of HAE is a deficiency in functional C1 esterase inhibitor (C1-INH). The swelling caused by HAE can be painful, disfiguring, and life-threatening. It reduces daily function and compromises the quality of life of affected individuals and their caregivers. Among different treatment strategies, replacement with C1-INH concentrates is employed for on-demand treatment of acute attacks and long-term prophylaxis. Three human plasma-derived C1-INH preparations are approved for HAE treatment in the US, the European Union, or both regions: Cinryze(®), Berinert(®), and Cetor(®); however, only Cinryze is approved for long-term prophylaxis. Postmarketing studies have shown that home therapy (self-administered or administered by a caregiver) is a convenient and safe option preferred by many HAE patients. In this review, we summarize the role of self-administered plasma-derived C1-INH concentrate therapy with Cinryze at home in the prophylaxis of HAE. PMID:27660422

  18. Self-administered C1 esterase inhibitor concentrates for the management of hereditary angioedema: usability and patient acceptance

    PubMed Central

    Li, Huamin Henry

    2016-01-01

    Hereditary angioedema (HAE) is a rare genetic disease characterized by episodic subcutaneous or submucosal swelling. The primary cause for the most common form of HAE is a deficiency in functional C1 esterase inhibitor (C1-INH). The swelling caused by HAE can be painful, disfiguring, and life-threatening. It reduces daily function and compromises the quality of life of affected individuals and their caregivers. Among different treatment strategies, replacement with C1-INH concentrates is employed for on-demand treatment of acute attacks and long-term prophylaxis. Three human plasma-derived C1-INH preparations are approved for HAE treatment in the US, the European Union, or both regions: Cinryze®, Berinert®, and Cetor®; however, only Cinryze is approved for long-term prophylaxis. Postmarketing studies have shown that home therapy (self-administered or administered by a caregiver) is a convenient and safe option preferred by many HAE patients. In this review, we summarize the role of self-administered plasma-derived C1-INH concentrate therapy with Cinryze at home in the prophylaxis of HAE. PMID:27660422

  19. Self-administered C1 esterase inhibitor concentrates for the management of hereditary angioedema: usability and patient acceptance

    PubMed Central

    Li, Huamin Henry

    2016-01-01

    Hereditary angioedema (HAE) is a rare genetic disease characterized by episodic subcutaneous or submucosal swelling. The primary cause for the most common form of HAE is a deficiency in functional C1 esterase inhibitor (C1-INH). The swelling caused by HAE can be painful, disfiguring, and life-threatening. It reduces daily function and compromises the quality of life of affected individuals and their caregivers. Among different treatment strategies, replacement with C1-INH concentrates is employed for on-demand treatment of acute attacks and long-term prophylaxis. Three human plasma-derived C1-INH preparations are approved for HAE treatment in the US, the European Union, or both regions: Cinryze®, Berinert®, and Cetor®; however, only Cinryze is approved for long-term prophylaxis. Postmarketing studies have shown that home therapy (self-administered or administered by a caregiver) is a convenient and safe option preferred by many HAE patients. In this review, we summarize the role of self-administered plasma-derived C1-INH concentrate therapy with Cinryze at home in the prophylaxis of HAE.

  20. Finasteride use and acute pancreatitis in Taiwan.

    PubMed

    Lai, Shih-Wei; Lai, Hsueh-Chou; Lin, Cheng-Li; Liao, Kuan-Fu

    2015-06-01

    The aim of this study was to examine whether there is an association between finasteride use and the risk of acute pancreatitis. This population-based case-control study used the database of the Taiwan National Health Insurance Program. There were 2,530 male subjects aged 40-84 years with a first-attack of acute pancreatitis during the period of 1998-2011 as the case group and 10,119 randomly selected subjects without acute pancreatitis as the control group. Both groups were matched by age and index year of diagnosing acute pancreatitis. Subjects who never had finasteride prescription were defined as "never use." Subjects who at least received 1 prescription for finasteride before the date of diagnosing acute pancreatitis were defined as "ever use." The association of acute pancreatitis with finasteride use was examined by the odds ratio (OR) and 95% confidence interval (CI) using the multivariable unconditional logistic regression model. The crude OR of acute pancreatitis was 1.78 (95%CI 1.33, 2.39) for subjects with ever use of finasteride, when compared with subjects with never use of finasteride. After adjusting for potential confounders, the adjusted OR of acute pancreatitis decreased to 1.25 (95%CI 0.90, 1.73) for subjects with ever use of finasteride, but no statistical significance was seen. No association can be detected between finasteride use and the risk of acute pancreatitis.

  1. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    NASA Astrophysics Data System (ADS)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  2. Heart Attack Before 50 Ups Early Death Risk

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_160692.html Heart Attack Before 50 Ups Early Death Risk But healthy ... News) -- The risk of early death after a heart attack has lessened over the past 30 years among ...

  3. Anger, Heavy Exertion: Fast Track to A Heart Attack?

    MedlinePlus

    ... html Anger, Heavy Exertion: Fast Track to a Heart Attack? But researchers suggest that artery-clogging plaque has ... physical exertion may be triggers for a first heart attack in some people, new research suggests. In the ...

  4. Poorer Heart Attack Victims, Especially Women, Fare Worse: Study

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_161722.html Poorer Heart Attack Victims, Especially Women, Fare Worse: Study Doctors need ... 2016 THURSDAY, Oct. 27, 2016 (HealthDay News) -- Younger heart attack survivors who struggle to afford health care and ...

  5. Expected versus unexpected panic attacks: a naturalistic prospective study.

    PubMed

    Kenardy, J; Taylor, C B

    1999-01-01

    The purpose of this study was to identify factors that are associated with expectation of panic attacks as well as to validate the hypothesized tendency to identify false (panic) alarms in panic disorder. Ten women with panic disorder were assessed naturalistically using computer-assisted self-monitoring. This allowed for prospective assessment of expected versus unexpected panic attacks. Expectation of panic attacks was associated with panic occurrence, as well as elevated sense of threat or danger, anxiety, helplessness, avoidance, distress about physical symptoms, physical sensations, and catastrophic thoughts prior to the attack. In general, the state measured prior to unexpected attacks did not differ from ongoing nonpanic state. Furthermore, none of the variables measured during the attacks were able to distinguish unexpected attacks from expected attacks.

  6. [Suppressing effect of the serotonin 5HT1B/D receptor agonist rizatriptan on calcitonin gene-related peptide (CGRP) concentration in migraine attacks].

    PubMed

    Stepień, Adam; Jagustyn, Piotr; Trafny, Elzbieta Anna; Widerkiewicz, Krzysztof

    2003-01-01

    Calcitonin gene-related peptide (CGRP) is one of the neuropeptides most abundant in the nervous tissue. Recent studies indicate that local cranial release of CGRP from the trigeminal nerve perivascular endings within arachnoidea plays an important role in the pathophysiology of migraine attacks and cluster headaches. Elevated CGRP levels in cranial venous blood (in the jugular vein) during an acute spontaneous migraine attack have been reported in rather few studies so far. Sumatriptan--a selective serotonin 5HT1B/D receptor agonist, highly effective in terminating migraine attacks, decreases the elevated CGRP level back to normal. The aim of our study was to determine the effect of rizatriptan (a drug from a new generation of triptans) on CGRP release in migraine attacks. In 45 patients suffering from migraine attacks with and without aura, plasma CGRP levels were assessed during an attack twice: before treatment and two hours after rizatriptan administration. In the group under study the plasma CGRP level before treatment was significantly higher than that measured two hours after rizatriptan administration. The decrease in CGRP levels was associated with subsidence of the migraine attack. There was no difference between migraine patients with and without aura. These results suggest that triptans as serotonin 5HT1B/D receptor agonists decrease CGRP plasma concentration in migraine attacks. PMID:15174248

  7. Surgical treatment of severe attacks of ulcerative colitis, with special reference to the advantages of early operation.

    PubMed

    Goligher, J C; Hoffman, D C; de Dombal, F T

    1970-12-19

    The management and outcome of 258 severe attacks of ulcerative colitis from 1952 to 1969 has been reviewed. If remission did not occur during an initial course of intensive medical treatment, including administration of corticosteroids, operation (generally ileostomy with proctocolectomy or subtotal colectomy) was performed. This took place some 12 to 17 days after admission as a rule during the years 1952-63, but usually within five to seven days from 1964 to 1969.Roughly half the attacks underwent spontaneous remission during the two periods, but the medical mortality was 4.8% in the former and 0.7% in the latter, the operative mortality 20.0 and 7.0%, and the overall mortality 11.3 and 4.5% respectively. The lowering of the mortality was particularly striking in severe first attacks and in severe attacks in patients over 60 years of age.Perforation of the colon was found in 21 cases, or nearly 20% of 112 patients coming to operation during attacks, being commoner in the first period (32.5%) than in the second (11.1%). The immediate mortality of all such operations was 11.6%; in cases with perforation it was 28.6%.Acute colonic dilatation was observed in 28 cases. All but one were treated by emergency colectomy, at which the colon was noted to be perforated in 11. The mortality of these operations was 18.5%.Follow-up of the 140 patients who survived without coming to operation during their attacks shows that 52 (37.1%) subsequently underwent surgical treatment either during further attacks or electively.Though all 258 attacks were thought at the time to be due to ordinary ulcerative colitis, subsequent pathological examination of operative specimens derived from 98 patients who came to urgent or subsequent operation during the 1964-9 period revealed that the lesion in the large bowel was Crohn's disease in 17 instances. PMID:5491253

  8. The Meniere attack: an ischemia/reperfusion disorder of inner ear sensory tissues.

    PubMed

    Foster, C A; Breeze, R E

    2013-12-01

    We believe Meniere attacks arise as a chance association of endolymphatic hydrops and vascular risk factors for intracerebral ischemia. Hydrops acts as a variable Starling resistor upon the inner ear vasculature that is capable of inducing ischemic attacks only in people with reduced perfusion pressure in the ear. The unique characteristics of the attacks (loss of vestibular response and hearing acutely followed by a return to apparent normalcy over hours) are explained by the differential sensitivity of the inner ear tissues to transient ischemia, with the sensory tissues (dendrites, hair cells) vulnerable to hours-long ischemia/reperfusion injury, and the stria vulnerable to ischemia due to its high metabolic rate. Permanent hearing loss and vestibular damage after many attacks would result when small areas of irreversible sensory cell damage accumulate and become confluent. This theory is supported by the strong correlation of hydrops with Meniere attacks, the finding that autoregulation of cochlear blood flow is impaired in the hydropic ear, and studies demonstrating that symptoms and signs in people and in animal models vary with conditions that alter perfusion pressure in the inner ear. Induction of Meniere attacks in animal models requires both hydrops and a mechanism that reduces perfusion pressure, such as epinephrine injection or head dependency. There is a strong clinical association between Meniere attacks and disorders that increase the risk for cerebrovascular ischemia, such as migraine. The excitable tissues in the sensory structures have long been known to be more vulnerable to ischemia than the remaining aural tissues, and are now known to be vulnerable to excitotoxicity induced by ischemia/reperfusion. This correlates well with autopsy evidence of damage to dendrites and hair cells and with strial atrophy in late Meniere disease cases. If this hypothesis is confirmed, treatment of vascular risk factors may allow control of symptoms and result in a

  9. Two fatal tiger attacks in zoos.

    PubMed

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  10. Cascade-based attacks on complex networks

    NASA Astrophysics Data System (ADS)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  11. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  12. Cell phone camera ballistics: attacks and countermeasures

    NASA Astrophysics Data System (ADS)

    Steinebach, Martin; Liu, Huajian; Fan, Peishuai; Katzenbeisser, Stefan

    2010-01-01

    Multimedia forensics deals with the analysis of multimedia data to gather information on its origin and authenticity. One therefore needs to distinguish classical criminal forensics (which today also uses multimedia data as evidence) and multimedia forensics where the actual case is based on a media file. One example for the latter is camera forensics where pixel error patters are used as fingerprints identifying a camera as the source of an image. Of course multimedia forensics can become a tool for criminal forensics when evidence used in a criminal investigation is likely to be manipulated. At this point an important question arises: How reliable are these algorithms? Can a judge trust their results? How easy are they to manipulate? In this work we show how camera forensics can be attacked and introduce a potential countermeasure against these attacks.

  13. Making MANET secured against malicious attack

    NASA Astrophysics Data System (ADS)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  14. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    NASA Astrophysics Data System (ADS)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  15. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  16. Enhancing network robustness against malicious attacks

    NASA Astrophysics Data System (ADS)

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider , Proc. Natl. Acad. Sci. USAPNASA60027-842410.1073/pnas.1009440108 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (Rn), we propose a link-robustness index (Rl). We show that solely enhancing Rn cannot guarantee the improvement of Rl. Moreover, the structure of an Rl-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the Rn and Rl into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  17. Enhancing network robustness against malicious attacks.

    PubMed

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider et al., Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (R(n)), we propose a link-robustness index (R(l)). We show that solely enhancing R(n) cannot guarantee the improvement of R(l). Moreover, the structure of an R(l)-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the R(n) and R(l) into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  18. Sulfate attack on cement-stabilized sand

    SciTech Connect

    Rollings, R.S.; Burkes, J.P.; Rollings, M.P.

    1999-05-01

    A 3.5-km (2.2 mi) section of a road in Georgia developed unexpected transverse bumps within 6 months after construction. The source of the bumps appeared to be expansion within the cement-stabilized base course. Laboratory examination of samples from areas showing distress revealed the presence of ettringite, a calcium sulfoaluminate the formation of which can be accompanied by severe expansion. This expansive materials was the probable cause of the volume changes causing the transverse bumps. The calcium and alumina needed to form ettringite ware available from the portland cement and the stabilized soil`s clay minerals. The source of the sulfur was identified as the well water that was mixed with the cement-stabilized base. Sulfate attack of cement-stabilized soils is a relatively infrequent problem, but it is highly destructive when it occurs. Currently, there are no firm criteria for identifying when sulfate attack of a cement-stabilized soil is a potential problem nor are there established methods of preventing the attack.

  19. Enhancing network robustness against malicious attacks.

    PubMed

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider et al., Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (R(n)), we propose a link-robustness index (R(l)). We show that solely enhancing R(n) cannot guarantee the improvement of R(l). Moreover, the structure of an R(l)-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the R(n) and R(l) into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved. PMID:23005185

  20. The relevance of an elevation in the plasma vasopressin levels to the pathogenesis of Meniere's attack.

    PubMed

    Aoki, M; Asai, M; Nishihori, T; Mizuta, K; Ito, Y; Ando, K

    2007-11-01

    An elevation of plasma vasopressin levels has been frequently observed in Meniere's disease patients. However, little is known regarding the mechanism behind this elevation. The plasma vasopressin levels and plasma osmolality were therefore determined in 18 diagnosed Meniere's disease patients and 20 patients with other types of vertigo, who required admission for severe vertigo attacks. All participants were given questionnaires regarding their clinical and psychological status, including their stress levels and depression status, to evaluate environmental stress events. The plasma vasopressin levels of Meniere's disease patients in the acute phase (4.1 +/- 1.37 pg/ml) were significantly higher compared with with those of other vertigo patients in the acute phase (2.1 +/- 0.41 pg/ml) (P < 0.01). The average plasma osmolality of the Meniere's disease group was higher than that of the other vertigo patients group (P < 0.05). No significant difference in reported stress levels, depression status and prevalence of primary headache between the groups was observed. The plasma vasopressin showed no significant correlation with the patients' clinical data (occurrence of emesis or nausea, prevalence of primary headache, depression status and stress). No correlation between the plasma vasopressin and the plasma osmolarity was observed in the Meniere's disease group. These results suggest that the elevation of plasma vasopressin in the acute phase of Meniere's disease is therefore related to the pathogenesis of Meniere's attacks, and the results obtained may provide helpful information for distinguishing between Meniere's disease and other various inner ear diseases.

  1. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  2. Real Time Recognition of Heart Attack in a Smart Phone

    PubMed Central

    Rad, Mahshid Zomorodi; Ghuchani, Saeed Rahati; Bahaadinbeigy, Kambiz; Khalilzadeh, Mohammad Mahdi

    2015-01-01

    Background: In many countries, including our own, cardiovascular disease is the most common cause of mortality and morbidity. Myocardial infarction (heart attack) is of particular importance in heart disease as well as time and type of reaction to acute myocardial infarction and these can be a determining factor in patients’ outcome. Methods: In order to reduce physician attendance time and keep patients informed about their condition, the smart phone as a common communication device has been used to process data and determine patients’ ECG signals. For ECG signal analysis, we used time domain methods for extracting the ST-segment as the most important feature of the signal to detect myocardial infarction and the thresholding methods and linear classifiers by LabVIEW Mobile Module were used to determine signal risk. Results: The sensitivity and specificity as criteria to evaluate the algorithm were 98% and 93.3% respectively in real time. Conclusions: This algorithm, because of the low computational load and high speed, makes it possible to run in a smart phone. Using Bluetooth to send the data from a portable monitoring system to a smart phone facilitates the real time applications. By using this program on the patient’s mobile, timely detection of infarction so to inform patients is possible and mobile services such as SMS and calling for a physician’s consultation can be done. PMID:26236081

  3. Minor Stroke and Transient Ischemic Attack: Research and Practice

    PubMed Central

    Yakhkind, Aleksandra; McTaggart, Ryan A.; Jayaraman, Mahesh V.; Siket, Matthew S.; Silver, Brian; Yaghi, Shadi

    2016-01-01

    A majority of patients with ischemic stroke present with mild deficits for which aggressive management is not often pursued. Comprehensive work-up and appropriate intervention for minor strokes and transient ischemic attacks (TIAs) point toward better patient outcomes, lower costs, and fewer cases of disability. Imaging is a key modality to guide treatment and predict stroke recurrence. Patients with large vessel occlusions have been found to suffer worse outcomes and could benefit from intervention. Whether intravenous thrombolytic therapy decreases disability in minor stroke patients and whether acute endovascular intervention improves functional outcomes in patients with minor stroke and known large vessel occlusion remain controversial. Studies are ongoing to determine ideal antiplatelet therapy for stroke and TIA, while ongoing statin therapy, surgical management for patients with carotid stenosis, and anticoagulation for patients with atrial fibrillation have all been proven to decrease the rate of stroke recurrence and improve outcomes. This review summarizes the current evidence and discusses the standard of care for patients with minor stroke and TIA. PMID:27375548

  4. Adaptive resistance: A tumor strategy to evade immune attack

    PubMed Central

    Yao, Sheng; Chen, Lieping

    2014-01-01

    A dilemma in cancer immunology is that, although patients often develop active anti-tumor immune responses, the tumor still outgrows. It has become clear that under the pressure of the host’s immune system, cancer cells have adapted elaborate tactics to reduce their immunogenicity (also known as immunoselection) and/or to actively suppress immune cells and promote immune tolerance (also known as immunosubversion). In this issue of the European Journal of Immunology, Dolen and Esendagli [Eur. J. Immunol. 2013. 43: 747–757] show that acute myeloid leukemia (AML) cells develop an adaptive immune phenotype switching mechanism: In response to attack by activated T cells, the leukemia cells quickly downregulate the T-cell costimulatory ligand B7-H2 and reciprocally upregulate the coinhibitory ligands B7-H1 and B7-DC in order to shut down T-cell activation via the PD-1 pathway. These novel findings and their relevance for cancer immunotherapy, especially potential applications in PD-1 check-point blockade therapy are discussed in this Commentary. PMID:23381914

  5. Attack or retreat: contrasted defensive tactics used by Cyprian honeybee colonies under attack from hornets.

    PubMed

    Papachristoforou, Alexandros; Rortais, Agnès; Sueur, Jérôme; Arnold, Gérard

    2011-02-01

    This study describes the tactics used by Cyprian honeybees (Apis mellifera cypria) to defend their colonies against hornet (Vespa orientalis orientalis) attacks. We use simulated hornet attacks and a combination of video recordings and image analysis to reveal, for the first time, contrasted intra-subspecies defensive tactics that operate at the colony level during predation. In some colonies, when attacked, the numbers of guards at the hive entrance increases rapidly to attack, engulf, and kill invading hornets. In other colonies, guards avoid conflicts with hornets by retreating gradually and by forming a defensive line of honeybees at the hive entrance. Retreater colonies have propolis walls at the hive entrances with small apertures that are too narrow to allow the hornet to access the hive and that therefore reinforces entrance protection. On the contrary, attacker colonies have propolis walls with large openings through which the hornet can pass; these bees block the hornet's access by intensively guarding the hive entrance. We experimentally destroy propolis walls to test whether colonies consistently rebuild walls with the same intrinsic characteristics and we also monitor the survival rate of each anti-predator tactic after massive natural predation by hornets.

  6. Liver transplantation as a cure for acute intermittent porphyria.

    PubMed

    Soonawalla, Zahir F; Orug, Taner; Badminton, Michael N; Elder, George H; Rhodes, Jonathan M; Bramhall, Simon R; Elias, Elwyn

    2004-02-28

    Acute intermittent porphyria occasionally causes frequent and crippling acute neurovisceral attacks associated with increased hepatic production of porphyrin precursors, resulting in long-term damage, poor quality of life, and shortened life expectancy. There has been no cure for this condition, but replacement of deficient hepatic enzymes might restore excretion of porphyrin precursors to normal and prevent acute attacks. We aimed to treat severe acute intermittent porphyria in a 19-year-old woman by liver transplantation. After the transplant, concentrations of haem precursors in the patient's urine returned to normal, and 1.5 years later her quality of life was good. Our report suggests some hope of cure for selected patients with severe forms of this disease. PMID:15001330

  7. Emergency Mental Health Services for Children After the Terrorist Attacks of September 11, 2001.

    PubMed

    Bruckner, Tim A; Kim, Yonsu; Lubens, Pauline; Singh, Amrita; Snowden, Lonnie; Chakravarthy, Bharath

    2016-01-01

    Much literature documents elevated psychiatric symptoms among adults after the terrorist attacks of September 11, 2001 (9/11). We, however, know of no research in children that examines emergency mental health services following 9/11. We test whether children's emergency services for crisis mental health care rose above expected values in September 2001. We applied time-series methods to California Medicaid claims (1999-2003; N = 127,200 visits). Findings in California indicate an 8.7% increase of children's emergency mental health visits statistically attributable to 9/11. Non-Hispanic white more than African American children account for this acute rise in emergency services.

  8. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    PubMed

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  9. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    PubMed Central

    Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature. PMID:24959606

  10. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  11. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework. PMID:25807571

  12. Acute gastroenteritis.

    PubMed

    Graves, Nancy S

    2013-09-01

    Acute gastroenteritis is a common infectious disease syndrome, causing a combination of nausea, vomiting, diarrhea, and abdominal pain. There are more than 350 million cases of acute gastroenteritis in the United States annually and 48 million of these cases are caused by foodborne bacteria. Traveler's diarrhea affects more than half of people traveling from developed countries to developing countries. In adult and pediatric patients, the prevalence of Clostridium difficile is increasing. Contact precautions, public health education, and prudent use of antibiotics are necessary goals in decreasing the prevalence of Clostridium difficle. Preventing dehydration or providing appropriate rehydration is the primary supportive treatment of acute gastroenteritis.

  13. Explosive attack: Lessons learned in Seyed Al Shohada mosque attack, April 2008, Shiraz, Iran

    PubMed Central

    Paydar, Shahram; Sharifian, Maryam; Parvaz, Shahram Boland; Abbasi, Hamid Reza; Moradian, Mohamad javad; Roozbeh, Jamshid; Nikghbalian, Saman; Sagheb, Mohammad Mahdi; Ghaffarpasand, Fariborz; Salehi, Oveis; Dehghani, Javad

    2012-01-01

    Introduction: The threat of explosive attacks has become a worldwide problem. Bombing is the preferred method of attacks. These attacks result in specific physical and psychiatric trauma. In this paper, we present an epidemiologic description of the physical injuries of patients who survived the explosive attack in Seyed Al Shohada mosque April 2008 Shiraz, Iran. Materials and Methods: All medical records of the patients admitted at Shiraz Hospitals on April 2008 due to Seyed Al Shohada mosque bombing attacks, Shiraz, Iran, were reviewed. Results: A total of 202 patients were referred to the hospitals over 24 h following the terrorist attack. One hundred sixty-four patients were admitted for short periods of observation (<24 h). Thirty-eight patients needed more than 1 day of hospitalization. The mean age of the patients was 26.2 (range 2 to 51) years. One hundred thirty-five (66.8%) patients were males. Twenty-six (12.8%) were children. Burn was the most prevalent cause of admission. Five (13.5%) patients needed chest tube insertion and eight (21%) needed skin grafts due to burn. Overall, 12 patients expired (5%). Three (25%) of them were children (2 and 6, and 11 years old). Mortality rate was significantly higher among the children than adults (P value <0.05). The most important cause of death was head trauma which was seen in five (41.6%) of the expired patients followed by burn (including air way burn) in four (33%), and internal bleeding in three (25%). Patients with head trauma had significantly a higher rate of mortality than other patients (P value <0.05). Discussion: Following a bombing attack, numerous victims were brought to the emergency unit suffering from a combination of multi-organ injuries caused by the blast, penetrating injuries caused by shrapnel and other debris, and burns. It is important for a physician to be familiar with the clinical features and treatments of explosive attacks victims. Early management of patients at the scene and

  14. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  15. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.

  16. Challenges in the successful management of a case of acute intermittent porphyria in India.

    PubMed

    Patell, Rushad; Dosi, Rupal; Joshi, Harsh; Shah, Purav; Tripathi, Rishi

    2016-07-01

    Acute intermittent porphyria (AIP) is a rare metabolic disease involving a defect in haem biosynthesis resulting in the accumulation and excessive secretion of porphyrins and its precursors. Acute attacks present with episodes of severe abdominal pain, nausea, confusion and severe life-threatening seizures. A high index of suspicion is required for the initial diagnosis of AIP.

  17. Cardiogenic embolism producing crescendo transient ischemic attacks.

    PubMed

    Geraghty, Patrick J; Oak, Jack; Choi, Eric T

    2005-09-01

    Lateralizing, repetitive transient ischemic attacks are characteristic of symptomatic carotid bifurcation atherosclerotic plaques. We report a case in which a cardiogenic embolus, after lodging at the left carotid bifurcation, produced crescendo episodes of expressive aphasia and mild right upper extremity weakness. Complete neurological recovery was achieved following emergent carotid embolectomy and endarterectomy. This case demonstrates that the laminar nature of internal carotid blood flow may result in the localization of embolic events to a single region of the cerebral vasculature, regardless of the source lesion in the carotid artery. The role of endoluminal techniques in the diagnosis and management of such lesions is discussed.

  18. Bobcat attack on a cottontail rabbit

    USGS Publications Warehouse

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  19. Sulfate attack in lime-treated subbases

    SciTech Connect

    Day, D.C.; Salami, M.R.; Rollings, R.S.

    1995-06-01

    Sulfate-induced heave or buckling in pavements is the phenomenon that occurs when the calcium in various lime-based stabilizers combines with the alumina and sulfate present in clay to form calcium sulfoaluminate, or ettringite. Ettringite, a crystal, can grow between clay particles, pushing them apart and causing swelling in the soil. When this happens in pavement subbases, the resulting heaving may cause the pavement to rupture and fail, sometimes in a dramatic way. In this paper the authors examine the mechanism of sulfate attack, review some of the work done on this problem, and present some examples of pavement failures.

  20. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    SciTech Connect

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely

  1. Acute Pericarditis

    MedlinePlus

    ... large pericardial effusions). Acute pericarditis usually responds to colchicine or NSAIDs (such as aspirin and ibuprofen ) taken ... reduce pain but relieves it by reducing inflammation. Colchicine also decreases the chance of pericarditis returning later. ...

  2. Sleep bruxism possibly triggered by multiple sclerosis attacks and treated successfully with botulinum toxin: Report of three cases.

    PubMed

    Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit

    2015-09-01

    Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack.

  3. Acute treatment of migraine headaches.

    PubMed

    Taylor, Frederick R

    2010-04-01

    Optimum acute treatment of migraine requires prevention of headache as a top priority. Recognition of the multitude of migraine presentations, the frequency of total headache attacks, and number of days of headache disability are critical. Successful treatment requires excellent patient-clinician communication enhancing confidence and mutual trust based on patient needs and preferences. Optimum management of acute migraine nearly always requires pharmacologic treatment for rapid resolution. Migraine-specific triptans, dihydroergotamine, and several antiinflammatories have substantial empirical clinical efficacy. Older nonspecific drugs, particularly butalbital and opioids, contribute to medication overuse headache and are to be avoided. Clinicians should utilize evidence-based acute migraine-specific therapy stressing the imperative acute treatment goal of early intervention, but not too often with the correct drug, formulation, and dose. This therapy needs to provide cost-effective fast results, meaningful to the patient while minimizing the need for additional drugs. Migraine-ACT evaluates 2-hour pain freedom with return to normal function, comfort with treatment, and consistency of response. Employ a thoroughly educated patient, formulary, testimonials, stratification, and rational cotherapy against the race to central sensitization for optimum outcomes. PMID:20352584

  4. Error and attack tolerance of complex networks

    NASA Astrophysics Data System (ADS)

    Albert, Réka; Jeong, Hawoong; Barabási, Albert-László

    2000-07-01

    Many complex systems display a surprising degree of tolerance against errors. For example, relatively simple organisms grow, persist and reproduce despite drastic pharmaceutical or environmental interventions, an error tolerance attributed to the robustness of the underlying metabolic network. Complex communication networks display a surprising degree of robustness: although key components regularly malfunction, local failures rarely lead to the loss of the global information-carrying ability of the network. The stability of these and other complex systems is often attributed to the redundant wiring of the functional web defined by the systems' components. Here we demonstrate that error tolerance is not shared by all redundant systems: it is displayed only by a class of inhomogeneously wired networks, called scale-free networks, which include the World-Wide Web, the Internet, social networks and cells. We find that such networks display an unexpected degree of robustness, the ability of their nodes to communicate being unaffected even by unrealistically high failure rates. However, error tolerance comes at a high price in that these networks are extremely vulnerable to attacks (that is, to the selection and removal of a few nodes that play a vital role in maintaining the network's connectivity). Such error tolerance and attack vulnerability are generic properties of communication networks.

  5. Spontaneous subperiosteal hematoma precipitated by anxiety attack.

    PubMed

    Swanenberg, Irene M; Rizzuti, Allison E; Shinder, Roman

    2013-12-01

    A 60-year-old woman presented with diplopia and left periorbital edema and pressure, which developed during an anxiety attack the previous day. Examination revealed left inferotemporal globe dystopia, periorbital edema, ecchymosis, and limitation in supraduction. Orbital MRI confirmed the diagnosis of a superior subperiosteal orbital hematoma. The patient's signs and symptoms rapidly resolved with administration of oral corticosteroids. The patient remains asymptomatic with complete resolution of orbital signs at 3-month follow-up. Subperiosteal orbital hematoma (SOH) is a rare condition in which blood accumulates between the bony orbit and separated periosteum, and is often due to blunt head trauma. Non-traumatic SOH (NTSOH) is exceedingly rare and usually associated with known coagulopathies or tendency to bleed. However, few cases of spontaneous NTSOH have been reported without any such predisposition and are thought to be caused by sudden elevations in intrathoracic and intracranial venous pressure such as vomiting, coughing, SCUBA diving, weight lifting and labor. We herein describe the presentation, radiography and outcome of a unique case of spontaneous NTSOH following an anxiety attack. PMID:24063522

  6. Baiting Inside Attackers Using Decoy Documents

    NASA Astrophysics Data System (ADS)

    Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore J.

    The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user modeling and profiling techniques, policy and access enforcement techniques, and misuse detection. In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to exfiltrate and use sensitive information. The goal is to confuse and confound an adversary requiring more effort to identify real information from bogus information and provide a means of detecting when an attempt to exploit sensitive information has occurred. “Decoy Documents” are automatically generated and stored on a file system by the D3 System with the aim of enticing a malicious user. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. The decoy documents contain several different types of bogus credentials that when used, trigger an alert. We also embed “stealthy beacons” inside the documents that cause a signal to be emitted to a server indicating when and where the particular decoy was opened. We evaluate decoy documents on honeypots penetrated by attackers demonstrating the feasibility of the method.

  7. Spontaneous subperiosteal hematoma precipitated by anxiety attack.

    PubMed

    Swanenberg, Irene M; Rizzuti, Allison E; Shinder, Roman

    2013-12-01

    A 60-year-old woman presented with diplopia and left periorbital edema and pressure, which developed during an anxiety attack the previous day. Examination revealed left inferotemporal globe dystopia, periorbital edema, ecchymosis, and limitation in supraduction. Orbital MRI confirmed the diagnosis of a superior subperiosteal orbital hematoma. The patient's signs and symptoms rapidly resolved with administration of oral corticosteroids. The patient remains asymptomatic with complete resolution of orbital signs at 3-month follow-up. Subperiosteal orbital hematoma (SOH) is a rare condition in which blood accumulates between the bony orbit and separated periosteum, and is often due to blunt head trauma. Non-traumatic SOH (NTSOH) is exceedingly rare and usually associated with known coagulopathies or tendency to bleed. However, few cases of spontaneous NTSOH have been reported without any such predisposition and are thought to be caused by sudden elevations in intrathoracic and intracranial venous pressure such as vomiting, coughing, SCUBA diving, weight lifting and labor. We herein describe the presentation, radiography and outcome of a unique case of spontaneous NTSOH following an anxiety attack.

  8. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  9. Panic attack triggering myocardial ischemia documented by myocardial perfusion imaging study. A case report

    PubMed Central

    2012-01-01

    Background Chest pain, a key element in the investigation of coronary artery disease is often regarded as a benign prognosis when present in panic attacks. However, panic disorder has been suggested as an independent risk factor for long-term prognosis of cardiovascular diseases and a trigger of acute myocardial infarction. Objective Faced with the extreme importance in differentiate from ischemic to non-ischemic chest pain, we report a case of panic attack induced by inhalation of 35% carbon dioxide triggering myocardial ischemia, documented by myocardial perfusion imaging study. Discussion Panic attack is undoubtedly a strong component of mental stress. Patients with coronary artery disease may present myocardial ischemia in mental stress response by two ways: an increase in coronary vasomotor tone or a sympathetic hyperactivity leading to a rise in myocardial oxygen consumption. Coronary artery spasm was presumed to be present in cases of cardiac ischemia linked to panic disorder. Possibly the carbon dioxide challenge test could trigger myocardial ischemia by the same mechanisms. Conclusion The use of mental stress has been suggested as an alternative method for myocardial ischemia investigation. Based on translational medicine objectives the use of CO2 challenge followed by Sestamibi SPECT could be a useful method to allow improved application of research-based knowledge to the medical field, specifically at the interface of PD and cardiovascular disease. PMID:22999016

  10. Relation of the Timing of Onset of Rhinitis and Cough to Asthma Attack in Children.

    PubMed

    Sugimura, Tetsu; Ozaki, Yukiko; Tananari, Yoshifumi; Yamakawa, Rumi; Hirata, Rumiko

    2016-01-01

    If the risk of progression to asthma could be predicted in patients with rhinitis, prevention of asthma might become possible. The purpose of this study was to clarify the relationship between the duration of rhinitis symptoms and acute asthma attacks in children with a history of asthma who were not on treatment for asthma. In 94 children with a history of asthma who were asymptomatic after completing asthma treatment, we investigated the onset and duration of nasal discharge and cough related to allergic rhinitis. Then the children were followed up for 2 weeks and were classified into either an asthma attack group (Group A) or non-asthma group(Group B). A total of 78 subjects were evaluated after 16 were excluded. The duration of nasal discharge was significantly shorter in Group A than in Group B (5.5±1.9 days vs. 10.4±3.1 days, P<0.0001). The interval between the onset of cough and nasal discharge was -1.0±3.1 days in Group A and -5.7±4.1 days in Group B (P<0.0001). The risk of progression to asthma attack may be higher when the onset of cough precedes nasal discharge or when nasal discharge has a short duration and cough shows an early onset. These results may provide assistance when selecting patients for early anti-allergy therapy from among those presenting with upper respiratory tract symptoms. PMID:27237939

  11. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  12. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  13. Maintaining defender's reputation in anomaly detection against insider attacks.

    PubMed

    Zhang, Nan; Yu, Wei; Fu, Xinwen; Das, Sajal K

    2010-06-01

    We address issues related to establishing a defender's reputation in anomaly detection against two types of attackers: 1) smart insiders, who learn from historic attacks and adapt their strategies to avoid detection/punishment, and 2) naïve attackers, who blindly launch their attacks without knowledge of the history. In this paper, we propose two novel algorithms for reputation establishment--one for systems solely consisting of smart insiders and the other for systems in which both smart insiders and naïve attackers are present. The theoretical analysis and performance evaluation show that our reputation-establishment algorithms can significantly improve the performance of anomaly detection against insider attacks in terms of the tradeoff between detection and false positives.

  14. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  15. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  16. Non-harmful insertion of data mimicking computer network attacks

    DOEpatents

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  17. Countermeasures for unintentional and intentional video watermarking attacks

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  18. Attribution Of Cyber Attacks On Process Control Systems

    NASA Astrophysics Data System (ADS)

    Hunker, Jeffrey; Hutchinson, Robert; Margulies, Jonathan

    The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of attributable activity, an important first step towards a more complete attribution methodology for the control systems community.

  19. Identification of cooling tower wood attack and methods of control

    SciTech Connect

    Song, P.; Trulear, M.G.

    1986-01-01

    Biological and chemical attack can greatly accelerate the deterioration of cooling tower wood. The damage, once inflicted, is irreversible and often results in premature and costly wood replacement. Biological attack is more serious than chemical, and is difficult to detect. Control of both types is essential for good tower maintenance A review of wood structures, types of attack and methods of control are presented. Effects of alkaline cooling water operation on wood deterioration are also discussed.

  20. Acute ischemic stroke update.

    PubMed

    Baldwin, Kathleen; Orr, Sean; Briand, Mary; Piazza, Carolyn; Veydt, Annita; McCoy, Stacey

    2010-05-01

    Stroke is the third most common cause of death in the United States and is the number one cause of long-term disability. Legislative mandates, largely the result of the American Heart Association, American Stroke Association, and Brain Attack Coalition working cooperatively, have resulted in nationwide standardization of care for patients who experience a stroke. Transport to a skilled facility that can provide optimal care, including immediate treatment to halt or reverse the damage caused by stroke, must occur swiftly. Admission to a certified stroke center is recommended for improving outcomes. Most strokes are ischemic in nature. Acute ischemic stroke is a heterogeneous group of vascular diseases, which makes targeted treatment challenging. To provide a thorough review of the literature since the 2007 acute ischemic stroke guidelines were developed, we performed a search of the MEDLINE database (January 1, 2004-July 1, 2009) for relevant English-language studies. Results (through July 1, 2009) from clinical trials included in the Internet Stroke Center registry were also accessed. Results from several pivotal studies have contributed to our knowledge of stroke. Additional data support the efficacy and safety of intravenous alteplase, the standard of care for acute ischemic stroke since 1995. Due to these study results, the American Stroke Association changed its recommendation to extend the time window for administration of intravenous alteplase from within 3 hours to 4.5 hours of symptom onset; this recommendation enables many more patients to receive the drug. Other findings included clinically useful biomarkers, the role of inflammation and infection, an expanded role for placement of intracranial stents, a reduced role for urgent carotid endarterectomy, alternative treatments for large-vessel disease, identification of nontraditional risk factors, including risk factors for women, and newly published pediatric stroke guidelines. In addition, new devices for

  1. An optical angle of attack sensor

    NASA Astrophysics Data System (ADS)

    McDevitt, T. Kevin; Owen, F. Kevin

    A major source of transonic and supersonic wind-tunnel test data uncertainty is due to angle of attack (alpha) measurement errors caused by unknown sting and balance deflections under load. A novel laser-based instrument has been developed to enable continuous time-dependent alpha measurements to be made without signal dropout. Detectors capable of 0.01-deg resolution over an 18-deg range and 0.03-deg resolution over a 44-deg range with time-dependent outputs of 60 Hz have been developed. This capability is sufficient to provide accurate real-time alpha information for correlation with model balance measurements during transport and fighter model testing. Proof-of-concept experiments, along with the results of recent measurements conducted at the NASA Ames 9 x 7-ft supersonic wind tunnel, are presented. Experiments were also conducted to determine the reliable range, sensitivity, and long-term stability of the instrument.

  2. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  3. Resveratrol products resulting by free radical attack

    NASA Astrophysics Data System (ADS)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  4. Marr's Attacks: On Reductionism and Vagueness.

    PubMed

    Eliasmith, Chris; Kolbeck, Carter

    2015-04-01

    It has been suggested that Marr took the three levels he famously identifies to be independent. In this paper, we argue that Marr's view is more nuanced. Specifically, we show that the view explicitly articulated in his work attempts to integrate the levels, and in doing so results in Marr attacking both reductionism and vagueness. The result is a perspective in which both high-level information-processing constraints and low-level implementational constraints play mutually reinforcing and constraining roles. We discuss our recent work on Spaun-currently the world's largest functional brain model-that demonstrates the positive impact of this kind of unifying integration of Marr's levels. We argue that this kind of integration avoids his concerns with both reductionism and vagueness. In short, we suggest that the methods behind Spaun can be used to satisfy Marr's explicit interest in combining high-level functional and detailed mechanistic explanations.

  5. European industry attacks proposed carbon tax

    SciTech Connect

    Roberts, M.

    1995-08-09

    The European chemical industry, facing growing political support for the European Commission`s latest version of the carbon dioxide (CO{sub 2})-energy tax, has renewed its attacks on the proposed law. Simon de Bree, chairman of DSM and president of the European Chemical Industry Council (Cefic; Brussels), last week wrote to Jacques Santer, president of the commission, and Solana Madariaga, current president of Europe Union`s (EU) Council of Ministers, saying the tax was {open_quotes}totally unacceptable and irresponsible in terms of EU competitiveness.{close_quotes} He says it {open_quotes}has nothing to do anymore with the protection of the environment and has instead become a normal additional taxation, disguised, for opportunistic reasons, as an environmental protection measurement.{close_quotes}

  6. Inorganic nanoparticles engineered to attack bacteria.

    PubMed

    Miller, Kristen P; Wang, Lei; Benicewicz, Brian C; Decho, Alan W

    2015-11-01

    Antibiotics were once the golden bullet to constrain infectious bacteria. However, the rapid and continuing emergence of antibiotic resistance (AR) among infectious microbial pathogens has questioned the future utility of antibiotics. This dilemma has recently fueled the marriage of the disparate fields of nanochemistry and antibiotics. Nanoparticles and other types of nanomaterials have been extensively developed for drug delivery to eukaryotic cells. However, bacteria have very different cellular architectures than eukaryotic cells. This review addresses the chemistry of nanoparticle-based antibiotic carriers, and how their technical capabilities are now being re-engineered to attack, kill, but also non-lethally manipulate the physiologies of bacteria. This review also discusses the surface functionalization of inorganic nanoparticles with small ligand molecules, polymers, and charged moieties to achieve drug loading and controllable release.

  7. Detecting Cyber Attacks On Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  8. Techniques for Judging Intent Behind Network Based Cyber Attacks

    SciTech Connect

    Allen, J M

    2004-01-28

    This project developed a prototype system that can rapidly differentiate between undirected cyber attacks, and those that have a more specific and concerning intent behind them. The system responds to important cyber attacks in a tactically significant way as the attack is proceeding. It is also creates a prioritized list for the human analysts allowing them to focus on the threats mostly likely to be of interest. In the recent years the volume of attacks over the internet has increased exponentially, as they have become more and more automated. The result of this is that real threats are harder and harder to distinguish from the general threat. It is possible with our current systems to identify network packets that originated from thousands of IP addresses as probing a site like LLNL in a single day. Human analysis of these threats does not result in information that can be used for tactical response because most of the attacks are short and over before the human starts the analysis. Only a very small percentage of attacks can even be evaluated manually due to the volume. This project developed methods, and prototyped tools, that can identify attacks, slow the attack down and aid in the process of prioritizing detections. The project demonstrated that such methods exist, and that practical implementations exist for modern computers and networks. We call the tools created D.I.A.G. or Determining Internet Attackers Goals.

  9. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  10. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  11. Hereditary and acquired angioedema: problems and progress: proceedings of the third C1 esterase inhibitor deficiency workshop and beyond.

    PubMed

    Agostoni, Angelo; Aygören-Pürsün, Emel; Binkley, Karen E; Blanch, Alvaro; Bork, Konrad; Bouillet, Laurence; Bucher, Christoph; Castaldo, Anthony J; Cicardi, Marco; Davis, Alvin E; De Carolis, Caterina; Drouet, Christian; Duponchel, Christiane; Farkas, Henriette; Fáy, Kálmán; Fekete, Béla; Fischer, Bettina; Fontana, Luigi; Füst, George; Giacomelli, Roberto; Gröner, Albrecht; Hack, C Erik; Harmat, George; Jakenfelds, John; Juers, Mathias; Kalmár, Lajos; Kaposi, Pál N; Karádi, István; Kitzinger, Arianna; Kollár, Tímea; Kreuz, Wolfhart; Lakatos, Peter; Longhurst, Hilary J; Lopez-Trascasa, Margarita; Martinez-Saguer, Inmaculada; Monnier, Nicole; Nagy, István; Németh, Eva; Nielsen, Erik Waage; Nuijens, Jan H; O'grady, Caroline; Pappalardo, Emanuela; Penna, Vincenzo; Perricone, Carlo; Perricone, Roberto; Rauch, Ursula; Roche, Olga; Rusicke, Eva; Späth, Peter J; Szendei, George; Takács, Edit; Tordai, Attila; Truedsson, Lennart; Varga, Lilian; Visy, Beáta; Williams, Kayla; Zanichelli, Andrea; Zingale, Lorenza

    2004-09-01

    Hereditary angioedema (HAE), a rare but life-threatening condition, manifests as acute attacks of facial, laryngeal, genital, or peripheral swelling or abdominal pain secondary to intra-abdominal edema. Resulting from mutations affecting C1 esterase inhibitor (C1-INH), inhibitor of the first complement system component, attacks are not histamine-mediated and do not respond to antihistamines or corticosteroids. Low awareness and resemblance to other disorders often delay diagnosis; despite availability of C1-INH replacement in some countries, no approved, safe acute attack therapy exists in the United States. The biennial C1 Esterase Inhibitor Deficiency Workshops resulted from a European initiative for better knowledge and treatment of HAE and related diseases. This supplement contains work presented at the third workshop and expanded content toward a definitive picture of angioedema in the absence of allergy. Most notably, it includes cumulative genetic investigations; multinational laboratory diagnosis recommendations; current pathogenesis hypotheses; suggested prophylaxis and acute attack treatment, including home treatment; future treatment options; and analysis of patient subpopulations, including pediatric patients and patients whose angioedema worsened during pregnancy or hormone administration. Causes and management of acquired angioedema and a new type of angioedema with normal C1-INH are also discussed. Collaborative patient and physician efforts, crucial in rare diseases, are emphasized. This supplement seeks to raise awareness and aid diagnosis of HAE, optimize treatment for all patients, and provide a platform for further research in this rare, partially understood disorder.

  12. Do we really need to panic in all acute vision loss in ICU? Acute angle-closure glaucoma.

    PubMed

    Akal, Ali; Kucuk, Ahmet; Yalcin, Funda; Yalcin, Saban

    2014-08-01

    Acute angle closure glaucoma is a sight-threatening situation characterized by a sudden and marked rise in intraocular pressure (IOP) due to obstruction of aqueous humour outflow. Many local (ocular drops, nasal and nebulized agents) and systemic drugs (e.g. atropine, adrenaline, ephedrine, some psychoactive and antiepileptic drugs) that are widely used in intensive care units have the potential to precipitate such an acute attack. In this case report, we describe progressive visual loss due to acute angle-closure glaucoma (AACG) in a 59 year old female patient followed in the ICU due to a massive pulmonary embolism.

  13. Asthma in adults (acute)

    PubMed Central

    2011-01-01

    Introduction About 10% of adults have suffered an attack of asthma, and up to 5% of these have severe disease that responds poorly to treatment. Patients with severe disease have an increased risk of death, but patients with mild to moderate disease are also at risk of exacerbations. Most guidelines about the management of asthma follow stepwise protocols. This review does not endorse or follow any particular protocol, but presents the evidence about specific interventions. Methods and outcomes We conducted a systematic review and aimed to answer the following clinical question: What are the effects of treatments for acute asthma? We searched: Medline, Embase, The Cochrane Library, and other important databases up to April 2010 (Clinical Evidence reviews are updated periodically; please check our website for the most up-to-date version of this review). We included harms alerts from relevant organisations such as the US Food and Drug Administration (FDA) and the UK Medicines and Healthcare products Regulatory Agency (MHRA). Results We found 100 systematic reviews, RCTs, or observational studies that met our inclusion criteria. We performed a GRADE evaluation of the quality of evidence for interventions. Conclusions In this systematic review we present information relating to the effectiveness and safety of the following interventions: beta2 agonists (plus ipratropium bromide, pressured metered-dose inhalers, short-acting continuous nebulised, short-acting intermittent nebulised, short-acting iv, and inhaled formoterol); corticosteroids (inhaled); corticosteroids (single oral, combined inhaled, and short courses); education about acute asthma; generalist care; helium–oxygen mixture (heliox); magnesium sulphate (iv and adding isotonic nebulised magnesium to inhaled beta2 agonists); mechanical ventilation; oxygen supplementation (controlled 28% oxygen and controlled 100% oxygen); and specialist care. PMID:21463536

  14. Zebrafish Models for Human Acute Organophosphorus Poisoning.

    PubMed

    Faria, Melissa; Garcia-Reyero, Natàlia; Padrós, Francesc; Babin, Patrick J; Sebastián, David; Cachot, Jérôme; Prats, Eva; Arick Ii, Mark; Rial, Eduardo; Knoll-Gellida, Anja; Mathieu, Guilaine; Le Bihanic, Florane; Escalon, B Lynn; Zorzano, Antonio; Soares, Amadeu M V M; Raldúa, Demetrio

    2015-10-22

    Terrorist use of organophosphorus-based nerve agents and toxic industrial chemicals against civilian populations constitutes a real threat, as demonstrated by the terrorist attacks in Japan in the 1990 s or, even more recently, in the Syrian civil war. Thus, development of more effective countermeasures against acute organophosphorus poisoning is urgently needed. Here, we have generated and validated zebrafish models for mild, moderate and severe acute organophosphorus poisoning by exposing zebrafish larvae to different concentrations of the prototypic organophosphorus compound chlorpyrifos-oxon. Our results show that zebrafish models mimic most of the pathophysiological mechanisms behind this toxidrome in humans, including acetylcholinesterase inhibition, N-methyl-D-aspartate receptor activation, and calcium dysregulation as well as inflammatory and immune responses. The suitability of the zebrafish larvae to in vivo high-throughput screenings of small molecule libraries makes these models a valuable tool for identifying new drugs for multifunctional drug therapy against acute organophosphorus poisoning.

  15. Zebrafish Models for Human Acute Organophosphorus Poisoning.

    PubMed

    Faria, Melissa; Garcia-Reyero, Natàlia; Padrós, Francesc; Babin, Patrick J; Sebastián, David; Cachot, Jérôme; Prats, Eva; Arick Ii, Mark; Rial, Eduardo; Knoll-Gellida, Anja; Mathieu, Guilaine; Le Bihanic, Florane; Escalon, B Lynn; Zorzano, Antonio; Soares, Amadeu M V M; Raldúa, Demetrio

    2015-01-01

    Terrorist use of organophosphorus-based nerve agents and toxic industrial chemicals against civilian populations constitutes a real threat, as demonstrated by the terrorist attacks in Japan in the 1990 s or, even more recently, in the Syrian civil war. Thus, development of more effective countermeasures against acute organophosphorus poisoning is urgently needed. Here, we have generated and validated zebrafish models for mild, moderate and severe acute organophosphorus poisoning by exposing zebrafish larvae to different concentrations of the prototypic organophosphorus compound chlorpyrifos-oxon. Our results show that zebrafish models mimic most of the pathophysiological mechanisms behind this toxidrome in humans, including acetylcholinesterase inhibition, N-methyl-D-aspartate receptor activation, and calcium dysregulation as well as inflammatory and immune responses. The suitability of the zebrafish larvae to in vivo high-throughput screenings of small molecule libraries makes these models a valuable tool for identifying new drugs for multifunctional drug therapy against acute organophosphorus poisoning. PMID:26489395

  16. Zebrafish Models for Human Acute Organophosphorus Poisoning

    PubMed Central

    Faria, Melissa; Garcia-Reyero, Natàlia; Padrós, Francesc; Babin, Patrick J.; Sebastián, David; Cachot, Jérôme; Prats, Eva; Arick II, Mark; Rial, Eduardo; Knoll-Gellida, Anja; Mathieu, Guilaine; Le Bihanic, Florane; Escalon, B. Lynn; Zorzano, Antonio; Soares, Amadeu M.V.M; Raldúa, Demetrio

    2015-01-01

    Terrorist use of organophosphorus-based nerve agents and toxic industrial chemicals against civilian populations constitutes a real threat, as demonstrated by the terrorist attacks in Japan in the 1990 s or, even more recently, in the Syrian civil war. Thus, development of more effective countermeasures against acute organophosphorus poisoning is urgently needed. Here, we have generated and validated zebrafish models for mild, moderate and severe acute organophosphorus poisoning by exposing zebrafish larvae to different concentrations of the prototypic organophosphorus compound chlorpyrifos-oxon. Our results show that zebrafish models mimic most of the pathophysiological mechanisms behind this toxidrome in humans, including acetylcholinesterase inhibition, N-methyl-D-aspartate receptor activation, and calcium dysregulation as well as inflammatory and immune responses. The suitability of the zebrafish larvae to in vivo high-throughput screenings of small molecule libraries makes these models a valuable tool for identifying new drugs for multifunctional drug therapy against acute organophosphorus poisoning. PMID:26489395

  17. Acute Pancreatitis

    PubMed Central

    Geokas, Michael C.

    1972-01-01

    For many decades two types of acute pancreatitis have been recognized: the edematous or interstitial and the hemorrhagic or necrotic. In most cases acute pancreatitis is associated with alcoholism or biliary tract disease. Elevated serum or urinary α-amylase is the most important finding in diagnosis. The presence of methemalbumin in serum and in peritoneal or pleural fluid supports the diagnosis of the hemorrhagic form of the disease in patients with a history and enzyme studies suggestive of pancreatitis. There is no characteristic clinical picture in acute pancreatitis, and its complications are legion. Pancreatic pseudocyst is probably the most common and pancreatic abscess is the most serious complication. The pathogenetic principle is autodigestion, but the precise sequence of biochemical events is unclear, especially the mode of trypsinogen activation and the role of lysosomal hydrolases. A host of metabolic derangements have been identified in acute pancreatitis, involving lipid, glucose, calcium and magnesium metabolism and changes of the blood clotting mechanism, to name but a few. Medical treatment includes intestinal decompression, analgesics, correction of hypovolemia and other supportive and protective measures. Surgical exploration is advisable in selected cases, when the diagnosis is in doubt, and is considered imperative in the presence of certain complications, especially pancreatic abscess. PMID:4559467

  18. Utilization of mental health services following the September 11th terrorist attacks in Manhattan, New York City.

    PubMed

    Boscarino, Joseph A; Galea, Sandro; Ahern, Jennifer; Resnick, Heidi; Vlahov, David

    2002-01-01

    To assess mental health utilization in Manhattan following the September 11th terrorist attacks, a random-digit-dial telephone survey was conducted 5 to 8 weeks afterwards, among 988 randomly selected adult householders over 17 years old (females = 52%; whites = 72%; mean age = 42). 16.9% (95% confidence interval [CI] = 14.4-19.5) of residents reported using mental health services 30 days before the attacks and 19.4% (95% CI = 16.7-22.2) reported using these services 30 days afterwards (pre/post NcMemar's chi2 = 8.0, df = 1, p = 0.005, odds ratio[OR] = 2.0). 10.0% (95% CI = 7.9-12.0) increased mental health utilization 30 days after the attacks, compared to 30 days before and 5.3% (95% CI = 3.7-6.9) decreased utilization. Risk factors associated with increased mental health utilization in multivariate analyses included: being 45-64 years of age (vs. 65+; OR = 8.3, p = 0.011) female gender (OR = 2.3, p = 0.004), experiencing 4+ lifetime traumatic events (vs. none; OR = 3.5, p = 0.002), experiencing 2+ stressful life events in the past 12 months (vs. none; OR = 3.3, p < 0.001), and experiencing an acute panic attack during the disaster (OR = 3.3, p < 0.001). Neither current post-traumatic stress disorder (PTSD) nor current depression was predictive of increased post-disaster utilization when panic attack was included in the multivariate analysis. While we did find a statistically significant increase in pre- vs. post-disaster utilization among the general population in Manhattan this increase was not substantial, except among specific subgroups, including those who had a perievent panic attack, among those exposed to previous stressors, among women, and among those less than 65 years old.

  19. Acute Porphyria in a Patient with Arnold Chiari Malformation

    PubMed Central

    Shen, Jianbin; O’Keefe, Kevin; Webb, Lisa B.; DeGirolamo, Angela

    2015-01-01

    Patient: Female, 33 Final Diagnosis: Acute porphyria Symptoms: Abdominal pain • alternating bowel habits Medication: Metronidazole • bactrim • oxybutynin Clinical Procedure: EMG • porhyria workup Specialty: Neurology Objective: Rare disease Background: Acute porphyria and Arnold Chiari malformation are both uncommon genetic disorders without known association. The insidious onset, non-specific clinical manifestations, and precipitating factors often cause diagnosis of acute porphyria to be missed, particularly in patients with comorbidities. Case Report: A women with Arnold Chiari malformation type II who was treated with oxybutynin and antibiotics, including Bactrim for neurogenic bladder and recurrent urinary tract infection, presented with non-specific abdominal pain, constipation, and diarrhea. After receiving Flagyl for C. difficile colitis, the patient developed psychosis, ascending paralysis, and metabolic derangements. She underwent extensive neurological workup due to her congenital neurological abnormalities, most of which were unremarkable. As a differential diagnosis of Guillain Barré syndrome, acute porphyria was then considered and ultimately proved to be the diagnosis. After hematin administration and intense rehabilitation, the patient slowly recovered from the full-blown acute porphyria attack. Conclusions: This case report, for the first time, documents acute porphyria attack as a result of a sequential combination of 3 common medications. This is the first case report of the concomitant presence of both acute porphyria and Arnold Chiari malformation, 2 genetic disorders with unclear association. PMID:25697467

  20. The acute hepatic porphyrias: current status and future challenges.

    PubMed

    Siegesmund, Marko; van Tuyll van Serooskerken, Anne-Moniek; Poblete-Gutiérrez, Pamela; Frank, Jorge

    2010-10-01

    The porphyrias are predominantly inherited metabolic disorders, which result from a specific deficiency of one of the eight enzymes along the pathway of haem biosynthesis. Historically, they have been classified into hepatic and erythropoietic forms, based on the primary site of expression of the prevailing dysfunctional enzyme. From a clinical point of view, however, it is more convenient to subdivide them into acute and non-acute porphyrias, thereby primarily considering the potential occurrence of life-threatening acute neurovisceral attacks. Unrecognised or untreated, such an acute porphyric attack is associated with a significant mortality of up to 10%. The acute hepatic porphyrias comprise acute intermittent porphyria, variegate porphyria, hereditary coproporphyria, and δ-aminolevulinic acid dehydratase deficiency porphyria. Making a precise diagnosis may be difficult because the different types of porphyrias may show overlapping clinical and biochemical characteristics. To date, the therapeutic possibilities are limited and mainly symptomatic. In this overview we report on what is currently known about pathogenesis, clinic, diagnostics, and therapy of the acute hepatic porphyrias. We further point out actual and future challenges in the management of these diseases.

  1. Treatment of hereditary angioedema with plasma-derived C1 inhibitor

    PubMed Central

    Prematta, Michael J; Prematta, Tracy; Craig, Timothy J

    2008-01-01

    Background: Plasma-derived C1 inhibitor (C1-INH) concentrate is a treatment option for acute hereditary angioedema (HAE) attacks and is considered the standard-of-care in many countries, although it is not yet available in the United States. Studies are still being conducted to establish its safety and efficacy as required by the FDA. Objective: To review the medical literature to determine if C1-INH concentrate is a safe and effective treatment for acute HAE attacks. Methods: The following keywords were searched in PubMed and OVID: C1 esterase inhibitor, C1-inhibitor, C1 inhibitor, and hereditary angioedema treatment. English-language articles were searched from 1966 to the present to look for studies demonstrating the efficacy and the safety of C1-INH concentrate. Results: The English-language literature search revealed several studies showing significantly improved relief of HAE symptoms with the administration of C1-INH concentrate – many studies demonstrated some improvement of symptoms within 30 minutes. Side effects have been similar to placebo, and no proven cases of viral transmission have occurred in over 20 years. Conclusion: C1-INH concentrate appears to be a very safe and effective treatment option for HAE. PMID:19209279

  2. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... a person loses consciousness and has no pulse. Death occurs within minutes if the victim does not receive treatment. What is the link? These two distinct heart conditions are linked. Sudden cardiac arrest can occur after a heart attack, or during recovery. Heart attacks increase the risk ...

  3. Sequential defense against random and intentional attacks in complex networks

    NASA Astrophysics Data System (ADS)

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  4. New Attacks on Animal Researchers Provoke Anger and Worry

    ERIC Educational Resources Information Center

    Guterman, Lila

    2008-01-01

    This article reports on firebomb attacks at the homes of two animal researchers which have provoked anger and unease. The firebomb attacks, which set the home of a neuroscientist at the University of California at Santa Cruz aflame and destroyed a car parked in the driveway of another university researcher's home, have left researchers and…

  5. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    ERIC Educational Resources Information Center

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  6. [Banana tree pests attacking Heliconia latispatha Benth. (Heliconiaceae)].

    PubMed

    Watanabe, Maria A

    2007-01-01

    In mid-May 2005, the caterpillars Antichloris eriphia (Fabr.) (Lepidoptera: Arctiidae) and Calligo illioneus (Cramer) (Lepidoptera: Nymphalidae) which are banana tree pests, were found attacking six-month old stalks of Heliconia latispatha Benth., planted near a banana tree plantation in Jaguariuna, SP, Brazil. The attack by C. illioneus is observed by the first time in Brazil.

  7. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  8. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  9. Pattern association--a key to recognition of shark attacks.

    PubMed

    Cirillo, G; James, H

    2004-12-01

    Investigation of a number of shark attacks in South Australian waters has lead to recognition of pattern similarities on equipment recovered from the scene of such attacks. Six cases are presented in which a common pattern of striations has been noted.

  10. Is There Anybody There? A Psychodynamic View of Panic Attack.

    ERIC Educational Resources Information Center

    Rizq, Rosemary

    2002-01-01

    Presents a process analysis of a psychodynamic intervention for a client with panic attacks. Discusses how a psychodynamic understanding of the complex etiology of the client's panic attacks that ultimately produced improved coping skills and a subjective sense of improvement for her. Process analysis is used to illustrate the theoretical base,…

  11. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  12. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  13. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  14. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  15. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  16. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  17. Are Risk Assessments of a Terrorist Attack Coherent?

    ERIC Educational Resources Information Center

    Mandel, David R.

    2005-01-01

    Four experiments examined 3 types of violations of coherence criteria in risk assessments of a terrorist attack. First, the requirement that extensionally equivalent descriptions be assigned the same probability (i.e., additivity) was violated. Unpacking descriptions of an attack into subtypes led to an increase in assessed risk. Second,…

  18. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    ERIC Educational Resources Information Center

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes that "Dateline NBC'"s…

  19. [Acute myocardial infarction during sport].

    PubMed

    Fujiwara, M; Asakuma, S; Nakamura, K; Nakamura, T; Yasutomi, N; Iwasaki, T

    1995-10-01

    Thirty patients with acute myocardial infarction which occurred during sport were investigated to identify the type of sport, prodromata, situations at the onset of disease, habit of exercise, preceding medical evaluation, coronary risk factors, and coronary angiographic findings. Infarction occurred during golf in 12 patients, bowling in 4, gateball in 4, jogging or running in 5, baseball in 2, and tennis or table tennis in 3. The majority of the patients were playing ball games. Twenty-seven patients were men (90%) and 3 were women (10%). All patients had played the same kind of sport for several years. Twenty-four patients had one or more coronary risk factors, and especially 18 patients smoked cigarettes. Nine patients had experienced anterior chest pain but only two patients had received medical evaluation. Coronary angiography was performed in 25 patients (83.3%), revealing single-vessel disease in 14, two-vessel disease in 6, three-vessel disease in 4, and disease of all left main coronary trunks in 1. The acute episode of infarction occurred mainly in spring or fall. Many patients with acute myocardial infarction occurring during sport participate in sports of low or moderate dynamic and low static exercises which are generally regarded safe. Many patients had enjoyed their sports regularly for a long time. Though many patients had coronary risk factors, only a few had received a medical check before their heart attack.

  20. Increased use of cigarettes, alcohol, and marijuana among Manhattan, New York, residents after the September 11th terrorist attacks.

    PubMed

    Vlahov, David; Galea, Sandro; Resnick, Heidi; Ahern, Jennifer; Boscarino, Joseph A; Bucuvalas, Michael; Gold, Joel; Kilpatrick, Dean

    2002-06-01

    The September 11, 2001, terrorist attacks were the largest human-made disaster in the United States since the Civil War. Studies after earlier disasters have reported rates of psychological disorders in the acute postdisaster period. However, data on postdisaster increases in substance use are sparse. A random digit dial telephone survey was conducted to estimate the prevalence of increased cigarette smoking, alcohol consumption, and marijuana use among residents of Manhattan, New York City, 5-8 weeks after the attacks. Among 988 persons included, 28.8% reported an increase in use of any of these three substances, 9.7% reported an increase in smoking, 24.6% reported an increase in alcohol consumption, and 3.2% reported an increase in marijuana use. Persons who increased smoking of cigarettes and marijuana were more likely to experience posttraumatic stress disorder than were those who did not (24.2% vs. 5.6% posttraumatic stress disorder for cigarettes; 36.0% vs. 6.6% for marijuana). Depression was more common among those who increased than for those who did not increase cigarette smoking (22.1 vs. 8.2%), alcohol consumption (15.5 vs. 8.3%), and marijuana smoking (22.3 vs. 9.4%). The results of this study suggest a substantial increase in substance use in the acute postdisaster period after the September 11th attacks. Increase in use of different substances may be associated with the presence of different comorbid psychiatric conditions.

  1. Expected losses, insurability, and benefits from reducing vulnerability to attacks.

    SciTech Connect

    Nozick, Linda Karen; Carlson, Rolf Erik; Turnquist, Mark Alan

    2004-03-01

    A model of malicious attacks against an infrastructure system is developed that uses a network representation of the system structure together with a Hidden Markov Model of an attack at a node of that system and a Markov Decision Process model of attacker strategy across the system as a whole. We use information systems as an illustration, but the analytic structure developed can also apply to attacks against physical facilities or other systems that provide services to customers. This structure provides an explicit mechanism to evaluate expected losses from malicious attacks, and to evaluate changes in those losses that would result from system hardening. Thus, we provide a basis for evaluating the benefits of system hardening. The model also allows investigation of the potential for the purchase of an insurance contract to cover the potential losses when safeguards are breached and the system fails.

  2. Optimal attack strategy of complex networks based on tabu search

    NASA Astrophysics Data System (ADS)

    Deng, Ye; Wu, Jun; Tan, Yue-jin

    2016-01-01

    The problem of network disintegration has broad applications and recently has received growing attention, such as network confrontation and disintegration of harmful networks. This paper presents an optimized attack strategy model for complex networks and introduces the tabu search into the network disintegration problem to identify the optimal attack strategy, which is a heuristic optimization algorithm and rarely applied to the study of network robustness. The efficiency of the proposed solution was verified by comparing it with other attack strategies used in various model networks and real-world network. Numerical experiments suggest that our solution can improve the effect of network disintegration and that the "best" choice for node failure attacks can be identified through global searches. Our understanding of the optimal attack strategy may also shed light on a new property of the nodes within network disintegration and deserves additional study.

  3. Simulated predator attacks on flocks: a comparison of tactics.

    PubMed

    Demšar, Jure; Lebar Bajec, Iztok

    2014-01-01

    It is not exactly known why birds aggregate in coordinated flocks. The most common hypothesis proposes that the reason is protection from predators. Most of the currently developed examples of individual-based predator-prey models assume predators are attracted to the center of a highly coordinated flock. This proposed attraction of a predator to a flock would appear to be contradictory to an alternate hypothesis that flocks evolved as a protection against predation. In an attempt to resolve this apparent conflict, in this article we use a fuzzy individual-based model to study three attack tactics (attack center, attack nearest, attack isolated) and analyze the success of predation on two types of prey (social and individualistic). Our simulations revealed that social flocking (as opposed to individualistic behavior) is the optimal anti-predatory response to predators attacking mainly isolated individuals. PMID:24730766

  4. IVs to Skip for Immunizing WEP against FMS Attack

    NASA Astrophysics Data System (ADS)

    Kobara, Kazukuni; Imai, Hideki

    The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive skip methods reveal information on the WEP key since most of them depend on the WEP key and the patterns of the skipped IV reveal it. In order to skip IVs safely, the skip patterns must be chosen carefully. In this paper, we review the attack conditions (6) and (7), whose success probability is the highest, 0.05, amongst all known conditions to guess one key-byte from one packet. Then we identify their safe skip patterns.

  5. Step to improve neural cryptography against flipping attacks.

    PubMed

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  6. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  7. Weak laws against acid attacks on women: an Indian perspective.

    PubMed

    Ahmad, Nehaluddin

    2012-01-01

    Acid attacks, especially on women, have seen an alarming growth in India over the last decade. While these attacks can be attributed to various factors such as the social weakness of women in a male-dominated society, the situation is exacerbated by the general neglect of the lawmakers. As acid is inexpensive and easily available, it serves as an ideal weapon for the perpetrators. Further, as this offence is bailable in certain situations, the punishment does not act as a sufficient deterrent in most cases. This paper describes the horrendous effects that acid attacks have on the victims physically, psychologically and socially. It also examines the contemporary laws governing acid attacks on victims and offenders. Ideas for a better legal approach will also be examined with special reference to acid attacks as a crime, and the validity of specific legal provisions for female victims.

  8. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  9. Neurons under viral attack: victims or warriors?

    PubMed

    Chakraborty, Swarupa; Nazmi, Arshed; Dutta, Kallol; Basu, Anirban

    2010-01-01

    When the central nervous system (CNS) is under viral attack, defensive antiviral responses must necessarily arise from the CNS itself to rapidly and efficiently curb infections with minimal collateral damage to the sensitive, specialized and non-regenerating neural tissue. This presents a unique challenge because an intact blood-brain barrier (BBB) and lack of proper lymphatic drainage keeps the CNS virtually outside the radar of circulating immune cells that are at constant vigilance for antigens in peripheral tissues. Limited antigen presentation skills of CNS cells in comparison to peripheral tissues is because of a total lack of dendritic cells and feeble expression of major histocompatibility complex (MHC) proteins in neurons and glia. However, research over the past two decades has identified immune effector mechanisms intrinsic to the CNS for immediate tackling, attenuating and clearing of viral infections, with assistance pouring in from peripheral circulation in the form of neutralizing antibodies and cytotoxic T cells at a later stage. Specialized CNS cells, microglia and astrocytes, were regarded as sole sentinels of the brain for containing a viral onslaught but neurons held little recognition as a potential candidate for protecting itself from the proliferation and pathogenesis of neurotropic viruses. Accumulating evidence however indicates that extracellular insult causes neurons to express immune factors characteristic of lymphoid tissues. This article aims to comprehensively analyze current research on this conditional alteration in the protein expression repertoire of neurons and the role it plays in CNS innate immune response to counter viral infections.

  10. Prodromes and predictors of migraine attack.

    PubMed

    Rossi, Paolo; Ambrosini, Anna; Buzzi, M Gabriella

    2005-01-01

    Premonitory symptoms of migraine include a wide and heterogeneous collection of cognitive, psychic and physical changes preceding and forewarning of an attack by a few hours to 2-3 days. To date, premonitory symptoms have received little attention in the literature, being treated more as a curiosity than as a primary feature of migraine. This paper provides an extensive critical review of this neglected area of migraine research in the light of the recent advances in our understanding of the pathogenetic mechanisms of migraine. Epidemiological and clinical studies that have investigated the premonitory symptoms of migraine lack scientific rigour, producing conflicting results, whilst genetic and pathophysiological investigations are still in their very early stages. There is evidence supporting the idea that premonitory symptoms could be used as a phenotypical marker to identify subgroups of migraineurs which could show correlations with specific clinical expressions of the disease, genotypes, or responses to treatments. Future studies are needed to clarify the clinical, pathophysiological and therapeutic significance of premonitory symptoms. PMID:16483459

  11. Node Survival in Networks under Correlated Attacks.

    PubMed

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles.

  12. Helicobacter pylori defense against oxidative attack.

    PubMed

    Stent, Andrew; Every, Alison L; Sutton, Philip

    2012-03-15

    Helicobacter pylori is a microaerophilic, gram-negative pathogen of the human stomach. Despite the chronic active gastritis that develops following colonization, H. pylori is able to persist unharmed in the stomach for decades. Much of the damage caused by gastric inflammation results from the accumulation of reactive oxygen/nitrogen species within the stomach environment, which can induce oxidative damage in a wide range of biological molecules. Without appropriate defenses, this oxidative damage would be able to rapidly kill nearby H. pylori, but the organism employs a range of measures, including antioxidant enzymes, biological repair systems, and inhibitors of oxidant generation, to counter the attack. Despite the variety of measures employed to defend against oxidative injury, these processes are intimately interdependent, and any deficiency within the antioxidant system is generally sufficient to cause substantial impairment of H. pylori viability and persistence. This review provides an overview of the development of oxidative stress during H. pylori gastritis and examines the methods the organism uses to survive the resultant damage.

  13. Node Survival in Networks under Correlated Attacks

    PubMed Central

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles. PMID:25932635

  14. Pirate attacks affect Indian Ocean climate research

    NASA Astrophysics Data System (ADS)

    Smith, Shawn R.; Bourassa, Mark A.; Long, Michael

    2011-07-01

    Pirate attacks in the Gulf of Aden and the Indian Ocean off the coast of Somalia nearly doubled from 111 in 2008 to 217 in 2009 [International Maritime Bureau, 2009, International Maritime Bureau, 2010]. Consequently, merchant vessel traffic in the area around Somalia significantly decreased. Many of these merchant vessels carry instruments that record wind and other weather conditions near the ocean surface, and alterations in ship tracks have resulted in a hole sized at about 2.5 million square kilometers in the marine weather-observing network off the coast of Somalia. The data void exists in the formation region of the Somali low-level jet, a wind pattern that is one of the main drivers of the Indian summer monsoon. Further, a stable, multidecadal record has been interrupted, and consequently, long-term analyses of the jet derived from surface wind data are now showing artificial anomalies that will affect efforts by scientists to identify interannual to decadal variations in the climate of the northwestern Indian Ocean.

  15. Pre-Attack Symptomatology and Temperament as Predictors of Children's Responses to the September 11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Smith, Kimberlee I.; Meltzoff, Andrew N.

    2005-01-01

    Background: The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Method: Children's responses were assessed in a community sample of children in Seattle, Washington,…

  16. Acute Vestibulopathy

    PubMed Central

    Cha, Yoon-Hee

    2011-01-01

    The presentation of acute vertigo may represent both a common benign disorder or a life threatening but rare one. Familiarity with the common peripheral vestibular disorders will allow the clinician to rapidly “rule-in” a benign disorder and recognize when further testing is required. Key features of vertigo required to make an accurate diagnosis are duration, chronicity, associated symptoms, and triggers. Bedside tests that are critical to the diagnosis of acute vertigo include the Dix-Hallpike maneuver and canalith repositioning manuever, occlusive ophthalmoscopy, and the head impulse test. The goal of this review is to provide the clinician with the clinical and pathophysiologic background of the most common disorders that present with vertigo to develop a logical differential diagnosis and management plan. PMID:23983835

  17. [Acute diarrhea].

    PubMed

    Burgmann, Konstantin; Schoepfer, Alain

    2014-09-01

    Diarrhea, defined as three or more loose or watery stools per day, represents a frequent problem in outpatients as well as inpatients. As most of the patients with acute diarrhea show a self-limiting disease course, the main challenge for the physician is to discriminate patients for whom symptomatic therapy is sufficient from those with severe disease course and threatening complications. This review aims to provide a practical guidance for such decisions.

  18. Incomplete Reiter's syndrome following chemotherapy of acute myeloid leukaemia.

    PubMed Central

    Dharmasena, F.; Englert, H.; Catovsky, D.; Galton, D. A.; Drysdale, H. C.

    1986-01-01

    Reiter's syndrome and other reactive arthritides have been described following infection with various organisms although they can occur in unusual circumstances without an obvious infectious precipitant. We have recently witnessed two attacks of reactive arthritis and keratoderma blenorrhagica occurring in an HLA B27 adult male following chemotherapy on two separate occasions with the same drugs for acute myeloid leukaemia. No attacks occurred before or following the cessation of these drugs. This supports the view that in Reiter's syndrome a common pathogenic pathway is triggered by an 'arthritogenic factor' which in this case appears to have been chemical. PMID:3476917

  19. Presentation attack detection for face recognition using light field camera.

    PubMed

    Raghavendra, R; Raja, Kiran B; Busch, Christoph

    2015-03-01

    The vulnerability of face recognition systems isa growing concern that has drawn the interest from both academic and research communities. Despite the availability of a broad range of face presentation attack detection (PAD)(or countermeasure or antispoofing) schemes, there exists no superior PAD technique due to evolution of sophisticated presentation attacks (or spoof attacks). In this paper, we present a new perspective for face presentation attack detection by introducing light field camera (LFC). Since the use of a LFC can record the direction of each incoming ray in addition to the intensity, it exhibits an unique characteristic of rendering multiple depth(or focus) images in a single capture. Thus, we present a novel approach that involves exploring the variation of the focus between multiple depth (or focus) images rendered by the LFC that in turn can be used to reveal the presentation attacks. To this extent, we first collect a new face artefact database using LFC that comprises of 80 subjects. Face artefacts are generated by simulating two widely used attacks, such as photo print and electronic screen attack. Extensive experiments carried out on the light field face artefact database have revealed the outstanding performance of the proposed PAD scheme when benchmarked with various well established state-of-the-art schemes. PMID:25622320

  20. Falsification Attacks against WPA-TKIP in a Realistic Environment

    NASA Astrophysics Data System (ADS)

    Todo, Yosuke; Ozawa, Yuki; Ohigashi, Toshihiro; Morii, Masakatu

    In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP). A previous realistic attack succeeds only for a network that supports IEEE 802.11e QoS features by both an access point (AP) and a client, and it has an execution time of 12-15min, in which it recovers a message integrity code (MIC) key from an ARP packet. Our first attack reduces the execution time for recovering a MIC key. It can recover the MIC key within 7-8min. Our second attack expands its targets that can be attacked. This attack focuses on a new vulnerability of QoS packet processing, and this vulnerability can remove the condition that the AP supports IEEE 802.11e. In addition, we discovered another vulnerability by which our attack succeeds under the condition that the chipset of the client supports IEEE 802.11e even if the client disables this standard through the OS. We demonstrate that chipsets developed by several kinds of vendors have the same vulnerability.

  1. Optimal response to attacks on the open science grids.

    SciTech Connect

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  2. Risk factors for hypertensive attack during pheochromocytoma resection

    PubMed Central

    Kwon, Se Yun; Lee, Kyung Seop; Lee, Jun Nyung; Ha, Yun-Sok; Choi, Seock Hwan; Kim, Hyun Tae; Kim, Tae-Hwan; Yoo, Eun Sang

    2016-01-01

    Purpose We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. Materials and Methods Data from 53 patients diagnosed with pheochromocytoma at Kyungpook National Uriversity Medical Center between January 2000 and June 2012 were retrospectively analyzed. The subjects were divided into 2 groups depending on the presence or absence of hypertensive attack at the time of surgery. Patient demographic characteristics and preoperative evaluations were assessed for their prognostic relevance with respect to hypertensive attack. A univariate analysis was conducted, and a multivariate logistic regression analysis was also performed. Results In the univariate analysis, systolic blood pressure at presentation, preoperative hormonal status (including epinephrine, norepinephrine, vanillylmandelic acid, and metanephrine levels in a 24-hour urine sample), tumor size, and postoperative systolic blood pressure were significantly associated with the development of hypertensive attack. In the multivariate analysis, preoperative epinephrine level and tumor size were independent factors that predicted hypertensive attack. The highest odds ratio for tumor size (2.169) was obtained at a cutoff value of 4.25 cm and the highest odds ratio for preoperative epinephrine (1.020) was obtained at a cutoff value of 166.3 µg/d. Conclusions In this study, a large tumor size and an elevated preoperative urinary epinephrine level were risk factors for intraoperative hypertensive attack in patients with pheochromocytoma. PMID:27194549

  3. New therapies for hereditary angioedema: disease outlook changes dramatically.

    PubMed

    Frank, Michael M; Jiang, Haixiang

    2008-01-01

    Hereditary angioedema (HAE) is an autosomal dominant disease associated with episodic attacks of nonpitting edema that may affect any external or mucosal body surface. Attacks most often affect the extremities, causing local swelling, the GI tract, leading to severe abdominal pain, and the mouth and throat, at times causing asphyxiation. Most patients with HAE have low levels of the plasma serine protease inhibitor C1 inhibitor. The edema in these patients is caused by unregulated generation of bradykinin. Effective chronic therapy of patients with impeded androgens or plasmin inhibitors has been available for decades, but in the United States, we do not have therapy for acute attacks. Five companies have completed or are in the process of conducting phase 3 clinical trials, double-blind, placebo-controlled studies of products designed to terminate acute attacks or to be used in prophylaxis. Two companies, Lev Pharmaceuticals and CSL Behring, have preparations of C1 inhibitor purified from plasma that have been used in Europe for decades (trade names Cinryze and Berinert P, respectively). One company, Pharming, has developed a recombinant C1 inhibitor preparation. One company, Dyax, is testing a kallikrein inhibitor (ecallantide), and one company, Jerini, is completing testing of a bradykinin type 2 receptor antagonist (Icatibant). Although little has been published thus far, all of these products may prove effective. It is likely that HAE treatment will change dramatically within the next few years.

  4. New therapies for hereditary angioedema: disease outlook changes dramatically.

    PubMed

    Frank, Michael M; Jiang, Haixiang

    2008-01-01

    Hereditary angioedema (HAE) is an autosomal dominant disease associated with episodic attacks of nonpitting edema that may affect any external or mucosal body surface. Attacks most often affect the extremities, causing local swelling, the GI tract, leading to severe abdominal pain, and the mouth and throat, at times causing asphyxiation. Most patients with HAE have low levels of the plasma serine protease inhibitor C1 inhibitor. The edema in these patients is caused by unregulated generation of bradykinin. Effective chronic therapy of patients with impeded androgens or plasmin inhibitors has been available for decades, but in the United States, we do not have therapy for acute attacks. Five companies have completed or are in the process of conducting phase 3 clinical trials, double-blind, placebo-controlled studies of products designed to terminate acute attacks or to be used in prophylaxis. Two companies, Lev Pharmaceuticals and CSL Behring, have preparations of C1 inhibitor purified from plasma that have been used in Europe for decades (trade names Cinryze and Berinert P, respectively). One company, Pharming, has developed a recombinant C1 inhibitor preparation. One company, Dyax, is testing a kallikrein inhibitor (ecallantide), and one company, Jerini, is completing testing of a bradykinin type 2 receptor antagonist (Icatibant). Although little has been published thus far, all of these products may prove effective. It is likely that HAE treatment will change dramatically within the next few years. PMID:18206518

  5. Brain-heart connection and the risk of heart attack.

    PubMed

    Singh, R B; Kartik, C; Otsuka, K; Pella, D; Pella, J

    2002-01-01

    Autonomic functions, such as increased sympathetic and parasympathetic activity and the brain's suprachiasmatic nucleus, higher nervous centres, depression, hostility and aggression appear to be important determinants of heart rate variability (HRV), which is, itself, an important risk factor of myocardial infarction, arrhythmias, sudden death, heart failure and atherosclerosis. The circadian rhythm of these complications with an increased occurrence in the second quarter of the day may be due to autonomic dysfunction as well as to the presence of excitatory brain and heart tissues. While increased sympathetic activity is associated with increased levels of cortisol, catecholamines, serotonin, renin, aldosterone, angiotensin and free radicals; increased parasympathetic activity may be associated with greater levels of acetylecholine, dopamine, nitric oxide, endorphins, coenzyme Q10, antioxidants and other protective factors. Recent studies indicate that hyperglycemia, diabetes, hyperlipidemia, ambient pollution, insulin resistance and mental stress can increase the risk of low HRV. These risk factors, which are known to favour cardiovascular disease, seem to act by decreasing HRV. There is evidence that regular fasting may modulate HRV and other risk factors of heart attack. While exercise is known to decrease HRV, exercise training may not have any adverse effect on HRV. In a recent study among 202 patients with acute myocardial infarction (AMI), the incidence of onset of chest pain was highest in the second quarter of the day (41.0%), mainly between 4.0-8.0 AM, followed by the fourth quarter, usually after large meals (28.2%). Emotion was the second most common trigger (43.5%). Cold weather was a predisposing factor in 29.2% and hot temperature (> 40 degrees celsius) was common in 24.7% of the patients. Dietary n-3 fatty acids and coenzyme Q10 have been found to prevent the increased circadian occurrence of cardiac events in our randomized controlled trials

  6. TCPL: A Defense against wormhole attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  7. Cherry Consumption and the Risk of Recurrent Gout Attacks

    PubMed Central

    Zhang, Yuqing; Neogi, Tuhina; Chen, Clara; Chaisson, Christine; Hunter, David; Choi, Hyon K.

    2012-01-01

    Objective To study the relation between cherry intake and the risk of recurrent gout attacks among individuals with gout. Methods We conducted a case-crossover study to examine associations of a set of putative risk factors with recurrent gout attacks. Individuals with gout were prospectively recruited and followed online for one year. Participants were asked about the following information when experiencing a gout attack: the onset date of the gout attack, symptoms and signs, medications (including anti-gout medications), and potential risk factors (including daily intake of cherries and cherry extract) during the 2-day period prior to the gout attack. We assessed the same exposure information over 2-day control periods. We estimated the risk of recurrent gout attacks related to cherry intake using conditional logistic regression. Results Our study included 633 individuals with gout. Cherry intake over a 2-day period was associated with a 35% lower risk of gout attacks compared with no intake (multivariate odds ratio [OR] = 0.65, 95% CI: 0.50-0.85). Cherry extract intake showed a similar inverse association (multivariate OR=0.55, 95% CI: 0.30-0.98). The effect of cherry intake persisted across subgroups by sex, obesity status, purine intake, alcohol use, diuretic use, and use of anti-gout medications. When cherry intake was combined with allopurinol use, the risk of gout attacks was 75% lower than periods without either exposure (OR=0.25, 95% CI: 0.15-0.42). Conclusions These findings suggest that cherry intake is associated with a lower risk of gout attacks. PMID:23023818

  8. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  9. Smoking Behavior and Alcohol Consumption in Individuals With Panic Attacks

    PubMed Central

    Mathew, Amanda R.; Norton, Peter J.; Zvolensky, Michael J.; Buckner, Julia D.; Smits, Jasper A. J.

    2011-01-01

    Individuals with anxiety often report greater smoking and drinking behaviors relative to those without a history of anxiety. In particular, smoking and alcohol use have been directly implicated among individuals experiencing panic attacks, diagnosed with panic disorder, or high on panic-relevant risk factors such as anxiety sensitivity. Less is known, however, about specific features of panic that may differentiate among those who do or do not use cigarettes or alcohol. The purpose of the current study was to replicate previous research findings of an association between panic symptomatology, cigarette smoking, and alcohol consumption, as well as extend findings by examining whether specific symptoms of panic attacks differentiated among those who do or do not use cigarettes or alcohol. Participants (n = 489) completed the Panic Attack Questionnaire-IV, a highly detailed assessment of panic attacks and symptoms, as well as self-report measures of smoking history and alcohol use. Consistent with previous research, participants who reported a history of panic attacks (n = 107) were significantly more likely to report current daily or lifetime daily cigarette smoking, and significantly greater hazardous or harmful alcohol use than participants with no panic history (n = 382). Although smoking and hazardous alcohol use were highly associated regardless of panic status, participants with panic attacks showed elevated hazardous alcohol use after controlling for daily or lifetime smoking. Surprisingly, although participants who reported having had at least one panic attack were more likely to smoke, panic attack symptoms, intensity, or frequency did not differentiate panickers who did or did not smoke. Furthermore, panic-related variables were not shown to differentially relate to problematic drinking among panickers. Implications for understanding the complex relationship between panic attacks and smoking and drinking behaviors are discussed. PMID:21915160

  10. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    SciTech Connect

    Nichols, Jeff A. {Cyber Sciences}; Curtis, Laura

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.

  11. Towards A Taxonomy Of Attacks Against Energy Control Systems

    NASA Astrophysics Data System (ADS)

    Fleury, Terry; Khurana, Himanshu; Welch, Von

    Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.

  12. A Cyber-Attack Detection Model Based on Multivariate Analyses

    NASA Astrophysics Data System (ADS)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.

  13. Recurrence of Panic Attacks after Influenza Vaccination: Two Case Reports

    PubMed Central

    Kim, Han-Joon; Jeon, Sang-Won; Yoon, Ho-Kyoung

    2016-01-01

    Human influenza is a contagious respiratory illness caused by the influenza virus. The influenza vaccination is recommended annually, but several adverse effects related to allergic reactions have been reported. Panic attacks are also known to occur, but no case of a panic attack adverse effect has been reported in South Korea. We present two cases of panic disorder patients whose symptoms were aggravated by the influenza vaccination. We assumed that dysregulation of T-lymphocytes in panic disorder patients could have a role in activating various kinds of cytokines and chemokines, which then can lead to panic attack aggravation. PMID:27776395

  14. Current state of hereditary angioedema management: A patient survey

    PubMed Central

    Busse, Paula; Christiansen, Sandra C.; Li, Henry; Lumry, William; Davis-Lorton, Mark; Bernstein, Jonathan A.; Frank, Michael; Castaldo, Anthony; Long, Janet F.; Zuraw, Bruce L.; Riedl, Marc

    2015-01-01

    Hereditary angioedema (HAE) is a chronic disease with a high burden of disease that is poorly understood and often misdiagnosed. Availability of treatments, including C1 esterase inhibitor (C1INH) replacement, ecallantide, and icatibant, marks a significant advance for HAE patients. We aimed to better understand the current state of HAE care, from a patient perspective, after the introduction of several novel therapies. One session of the United States Hereditary Angioedema Association 2013 patient summit was devoted to data collection for this study. Patients attending the summit were self-selected, and HAE diagnosis was self-reported. Survey questions assessed patient characteristics, burden of disease, and treatment. Participant responses were captured using an audience response system. We surveyed 149 (80%) type I and II HAE (HAE-C1INH) and 37 (20%) HAE with normal C1INH (HAE-nlC1INH) patients. HAE-C1INH (72%) and HAE-nlCINH patients (76%) equally reported that HAE had a significant impact on quality of life (QOL). A third of HAE-C1INH patients were diagnosed within one year of their first HAE attack, but another third reported a delay of more than 10 years. Most HAE-C1INH (88%) and HAE-nlC1INH (76%) patients had on-demand treatment available. HAE-C1INH patients frequently had an individual treatment plan (76%) compared with 50% of HAE-nlC1INH patients. Most HAE-C1INH patients went to the emergency department (ED) or were hospitalized less than once every six months (80%). Our findings show that HAE management is improving with good access to on-demand and prophylactic treatment options. However, HAE patients still have a significant burden of disease and continued research and educational efforts are needed. PMID:25976438

  15. Current state of hereditary angioedema management: a patient survey.

    PubMed

    Banerji, Aleena; Busse, Paula; Christiansen, Sandra C; Li, Henry; Lumry, William; Davis-Lorton, Mark; Bernstein, Jonathan A; Frank, Michael; Castaldo, Anthony; Long, Janet F; Zuraw, Bruce L; Riedl, Marc

    2015-01-01

    Hereditary angioedema (HAE) is a chronic disease with a high burden of disease that is poorly understood and often misdiagnosed. Availability of treatments, including C1 esterase inhibitor (C1INH) replacement, ecallantide, and icatibant, marks a significant advance for HAE patients. We aimed to better understand the current state of HAE care, from a patient perspective, after the introduction of several novel therapies. One session of the United States Hereditary Angioedema Association 2013 patient summit was devoted to data collection for this study. Patients attending the summit were self-selected, and HAE diagnosis was self-reported. Survey questions assessed patient characteristics, burden of disease, and treatment. Participant responses were captured using an audience response system. We surveyed 149 (80%) type I and II HAE (HAE-C1INH) and 37 (20%) HAE with normal C1INH (HAE-nlC1INH) patients. HAE-C1INH (72%) and HAE-nlCINH patients (76%) equally reported that HAE had a significant impact on quality of life (QOL). A third of HAE-C1INH patients were diagnosed within one year of their first HAE attack, but another third reported a delay of more than 10 years. Most HAE-C1INH (88%) and HAE-nlC1INH (76%) patients had on-demand treatment available. HAE-C1INH patients frequently had an individual treatment plan (76%) compared with 50% of HAE-nlC1INH patients. Most HAE-C1INH patients went to the emergency department (ED) or were hospitalized less than once every six months (80%). Our findings show that HAE management is improving with good access to on-demand and prophylactic treatment options. However, HAE patients still have a significant burden of disease and continued research and educational efforts are needed.

  16. Degree-based attacks and defense strategies in complex networks

    NASA Astrophysics Data System (ADS)

    Yehezkel, Aviv; Cohen, Reuven

    2012-12-01

    We study the stability of random scale-free networks to degree-dependent attacks. We present analytical and numerical results to compute the critical fraction pc of nodes that need to be removed for destroying the network under this attack for different attack parameters. We study the effect of different defense strategies, based on the addition of a constant number of links on network robustness. We test defense strategies based on adding links to either low degree, middegree or high degree nodes. We find using analytical results and simulations that the middegree nodes defense strategy leads to the largest improvement to the network robustness against degree-based attacks. We also test these defense strategies on an internet autonomous systems map and obtain similar results.

  17. After-gate attack on a quantum cryptosystem

    NASA Astrophysics Data System (ADS)

    Wiechers, C.; Lydersen, L.; Wittmann, C.; Elser, D.; Skaar, J.; Marquardt, Ch; Makarov, V.; Leuchs, G.

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  18. Vulnerability of complex networks under path-based attacks

    NASA Astrophysics Data System (ADS)

    Pu, Cun-Lai; Cui, Wei

    2015-02-01

    We investigate vulnerability of complex networks including model networks and real-world networks subject to path-based attacks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  19. Sex Suffers for Younger Adults After Heart Attack

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_160722.html Sex Suffers for Younger Adults After Heart Attack Lack ... who don't talk to their doctors about sex in the first few weeks after a heart ...

  20. Heart Attack Symptoms | NIH MedlinePlus the Magazine

    MedlinePlus

    ... oxygen. If not treated quickly, the heart muscle fails to pump and begins to die. The most common heart attack symptom in men and women is chest pain or discomfort. However, women also are somewhat ...

  1. An unusual case of predation: dog pack or cougar attack?

    PubMed

    Fonseca, Gabriel M; Palacios, Rocío

    2013-01-01

    Injuries produced by animals are capable of leaving severe patterns and in some cases may result in the death of the attacked individual. Law enforcement authorities may come to erroneous conclusions about the source of the bites based on their awareness of animals present and similarities of the injuries to the untrained eye, with dreadful consequences. Expertise of a carnivore biologist and an odontologist that indentifies the particularities of bite marks may be useful for identifying the attacking species. We present the investigation of a fatal dog pack attack involving a 43-year-old man in Bell Ville (Argentina) where the evidence provided by a forensic dentist and a biologist was categorical for establishing the animal species involved. Because of the unusual characteristics of the wounds and the initial hypothesis made by local authorities of a cougar attack, habits and specific patterns of both dog pack and cougar predation on humans are discussed. PMID:22971181

  2. Taking vitamin D could halve the risk of asthma attacks.

    PubMed

    2016-09-21

    Cochrane library research has found that giving a daily oral vitamin D supplement to people with mild to moderate asthma reduced the risk of severe attacks requiring hospital admission or emergency department attendance from 6% to about 3%. PMID:27654533

  3. Polysomnographic findings in nights preceding a migraine attack.

    PubMed

    Göder, R; Fritzer, G; Kapsokalyvas, A; Kropp, P; Niederberger, U; Strenge, H; Gerber, W D; Aldenhoff, J B

    2001-02-01

    Sleep recordings were performed in eight patients to analyse sleep alterations preceding migraine attacks. Polysomnographic recordings from nights before an attack were compared with nights without following migraine. We analysed standard sleep parameters and electroencephalogram (EEG) power spectra. The main findings preceding migraine attacks were a significant decrease in the number of arousals, a decrease in rapid eye movement (REM) density, a significant decrease of beta power in the slow wave sleep, and a decrease of alpha power during the first REM period. The results suggest a decrease in cortical activation during sleep preceding migraine attacks. According to the models of sleep regulation, alterations in the function of aminergic or cholinergic brainstem nuclei have to be discussed. PMID:11298661

  4. Supersonic flow around circular cones at angles of attack

    NASA Technical Reports Server (NTRS)

    Ferri, Antonio

    1951-01-01

    The properties of conical flow without axial symmetry are analyzed. The flow around cones of circular cross section at small angles of attack is determined by correctly considering the effect of the entropy gradients in the flow.

  5. Quantum cloning attacks against PUF-based quantum authentication systems

    NASA Astrophysics Data System (ADS)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-08-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  6. Wing-alone aerodynamic characteristics at high angles of attack

    NASA Technical Reports Server (NTRS)

    Stallings, R. L., Jr.; Lamb, M.

    1981-01-01

    An experimental investigation has been conducted to determine wing-alone supersonic aerodynamic characteristics at high angles of attack. The family of wings tested varied in aspect ratio from 0.5 to 4.0 and taper ratio from 0.0 to 1.0. The wings were tested at angles of attack ranging from 0 to 60 deg and Mach numbers from 1.6 to 4.6. The aerodynamic characteristics were obtained by integrating local pressures measured over the wing surface. Comparison of these data with the limited available data from the literature indicate the present data are free of sting interference effects through the test range of angle of attack. Presented and discussed are results showing the effects of model geometry, Mach number and angle of attack on aerodynamic characteristics consisting of normal force, pitching moment, bending moment, longitudinal center-of-pressure locations, and lateral center-of-pressure locations.

  7. New records of Pipunculidae attacking proconiine sharpshooter (Auchenorrhyncha: Cicadellidae: Proconiini)

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Five records of Pipunculidae (Diptera) attacking proconiine sharpshooters (Auchenorrhyncha: Cicadellidae) are documented here for the first time. Eudorylas alternatus (Cresson) is documented as a parasitoid of Cuerna obtusa Oman and Beamer, and Oncometopia orbona (Fabricius) is recorded as being at...

  8. VTAC: virtual terrain assisted impact assessment for cyber attacks

    NASA Astrophysics Data System (ADS)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  9. Prevention of Tunneling Attack in endairA

    NASA Astrophysics Data System (ADS)

    Fanaei, Mohammad; Fanian, Ali; Berenjkoub, Mehdi

    endairA is one of the most secure on-demand ad hoc network source routing protocols which provides several defense mechanisms against so many types of attacks. In this paper, we prove the vulnerability of endairA to the tunneling attack by presenting an attack scenario against it. We also propose a new security mechanism to defend it against the tunneling attack by the utilization of the delay between receiving and sending its control packets computed locally by all intermediate nodes. Our proposed security mechanism can detect probable tunnels in the route as well as approximate locations of the adversarial nodes. It needs no time synchronization between mobile nodes of the network. It also does not change the number of control packets involved in endairA and only modifies the RREP messages slightly.

  10. Exposure Science for Terrorist Attacks and Theaters of Military Conflict: Minimizing Contact with Toxicants

    PubMed Central

    Lioy, Paul J.

    2014-01-01

    The strategies for protecting our deployed U.S. Forces are outlined in National Research Council documents published in 1999–2000. This article summarizes experiences and information gathered and interpreted regarding population and rescue workers’ exposures in the aftermath of the 2001 World Trade Center attacks, with the aim to provide insights on issues related to military deployment to locations with hazardous agents. Issues coveted include phases of exposure, materials of concern, detection equipment, and personal protection equipment. The focus is on human exposure issues, which are primarily associated with strategies 1 through 3 of the National Research Council’s report entitled “Protecting Those Who Serve: Strategies to Protect the Health of Deployed U.S. Forces”. Contact and duration of contact with hazardous substances are critical areas of concern, which require prevention and intervention procedures and protocols to reduce the incidence of acute and long-term health outcomes. PMID:21916334

  11. Exposure science for terrorist attacks and theaters of military conflict: minimizing contact with toxicants.

    PubMed

    Lioy, Paul J

    2011-07-01

    The strategies for protecting our deployed U.S. Forces are outlined in National Research Council documents published in 1999-2000. This article summarizes experiences and information gathered and interpreted regarding population and rescue workers' exposures in the aftermath of the 2001 World Trade Center attacks, with the aim to provide insights on issues related to military deployment to locations with hazardous agents. Issues covered include phases of exposure, materials of concern, detection equipment, and personal protection equipment. The focus is on human exposure issues, which are primarily associated with strategies 1 through 3 of the National Research Council's report entitled "Protecting Those Who Serve: Strategies to Protect the Health of Deployed U.S. Forces". Contact and duration of contact with hazardous substances are critical areas of concern, which require prevention and intervention procedures and protocols to reduce the incidence of acute and long-term health outcomes. PMID:21916334

  12. Successful attack on permutation-parity-machine-based neural cryptography.

    PubMed

    Seoane, Luís F; Ruttor, Andreas

    2012-02-01

    An algorithm is presented which implements a probabilistic attack on the key-exchange protocol based on permutation parity machines. Instead of imitating the synchronization of the communicating partners, the strategy consists of a Monte Carlo method to sample the space of possible weights during inner rounds and an analytic approach to convey the extracted information from one outer round to the next one. The results show that the protocol under attack fails to synchronize faster than an eavesdropper using this algorithm.

  13. Security solution against denial of service attacks in BESIP system

    NASA Astrophysics Data System (ADS)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  14. Three cases giant panda attack on human at Beijing Zoo.

    PubMed

    Zhang, Peixun; Wang, Tianbing; Xiong, Jian; Xue, Feng; Xu, Hailin; Chen, Jianhai; Zhang, Dianying; Fu, Zhongguo; Jiang, Baoguo

    2014-01-01

    Panda is regarded as Chinese national treasure. Most people always thought they were cute and just ate bamboo and had never imagined a panda could be vicious. Giant panda attacks on human are rare. There, we present three cases of giant panda attacks on humans at the Panda House at Beijing Zoo from September 2006 to June 2009 to warn people of the giant panda's potentially dangerous behavior.

  15. Three cases giant panda attack on human at Beijing Zoo

    PubMed Central

    Zhang, Peixun; Wang, Tianbing; Xiong, Jian; Xue, Feng; Xu, Hailin; Chen, Jianhai; Zhang, Dianying; Fu, Zhongguo; Jiang, Baoguo

    2014-01-01

    Panda is regarded as Chinese national treasure. Most people always thought they were cute and just ate bamboo and had never imagined a panda could be vicious. Giant panda attacks on human are rare. There, we present three cases of giant panda attacks on humans at the Panda House at Beijing Zoo from September 2006 to June 2009 to warn people of the giant panda’s potentially dangerous behavior. PMID:25550978

  16. Captive tiger attack: case report and review of the literature.

    PubMed

    Schiller, Henry J; Cullinane, Daniel C; Sawyer, Mark D; Zietlow, Scott P

    2007-05-01

    Tigers, as well as other large predators, are being held in private settings with increasing frequency. Unregulated private "zoos" are cropping up in many rural and suburban settings across the country. The number of attacks from captive predators also is on the rise. This case highlights the potentially violent and aggressive nature of wild animals held in captivity. Treatment principals and wounding patterns of large cat attacks are emphasized.

  17. Investigation of fibrous cap stresses on vulnerable plaques leading to heart attacks.

    PubMed

    Hsiao, Hao-Ming; Wu, Yi-Yu; Tsai, Bo-Chian; Chen, Yung-Chi; Cheng, Yu-Han

    2015-01-01

    Rupture-prone plaques in the coronary arteries, called ``vulnerable plaques'', are recognized as the key factor in acute myocardial infarction. Vulnerable plaques have a thin fibrous cap over a large fatty core and are highly susceptible to rupture. In general, this type of plaque rupture is mainly associated with stress concentrated on the fibrous cap. Fibrous cap stresses are counted among the most important factors in the plaque rupture process and must be taken into consideration when assessing the plaque vulnerability leading to heart attacks. The objective of this paper was to investigate the effects of nitinol stent deployment on the morphological changes of vulnerable plaques and then to propose a new stent design concept for effectively reducing fibrous cap stresses and the associated rupture risk. The deployment of a self-expanding nitinol stent was modeled, and the resulting stress distribution on the fibrous cap was investigated. The fibrous cap stresses were more uniformly distributed and the maximum stress was reduced by 13% when the crown number of the stent was increased. This study demonstrates an excellent approach to stent design that could effectively reduce the risk of a vulnerable plaque rupturing and causing a heart attack. PMID:26684564

  18. Stressful reactions and panic attacks induced by flumazenil in chronic benzodiazepine users.

    PubMed

    Bernik, M A; Gorenstein, C; Vieira Filho, A H

    1998-01-01

    The acute effects of flumazenil, a benzodiazepine (BZD) receptor antagonist in long-term BZD users were used as a possible test to detect physiological dependence. Thirty-four subjects (20 females, 14 males) aged 26-48 years (mean + SD, 42.4+/-8.5 years), all chronic users of low doses of diazepam (5-20 mg/day, 14.2+/-4.8 mg/day) for 5 to 28 years (10.5+/-6 years), received a single 1-mg i.v. flumazenil dose or saline, infused slowly under double-blind conditions. Physiological dependence was suggested as all patients receiving flumazenil developed an anxiety reaction while the placebo group did not. Flumazenil triggered a qualitatively different reaction amounting to a panic attack during infusion in nine out of 15 patients. These patients had a diagnosis of panic disorder or a history of panic attacks. Caution should be exercised when giving flumazenil to panic patients who are taking BZDs as maintenance treatment.

  19. Gene scanning and heart attack risk.

    PubMed

    Barth, Andreas S; Tomaselli, Gordon F

    2016-04-01

    Coronary heart disease remains the leading cause of death in the Western World. The advent of microarray and next-generation sequencing technologies has generated multi-dimensional data sets, allowing for new pathophysiological insights into this complex disease. To date, genome-wide association studies (GWAS) have identified 152 associated loci and 320 candidate genes, contributing to the genetic risk of coronary artery disease (CAD) and acute myocardial infarction (AMI). The majority of single nucleotide polymorphisms (SNPs) mediate their risk by unknown mechanisms. A functional analysis based on Gene Ontology and KEGG pathways of candidate genes that are associated with CAD/AMI-SNPs showed the strongest evidence for genes regulating cholesterol metabolism. Additional clusters were significantly enriched for pathways, which play prominent roles during AMI and the development of atherosclerotic plaques in vascular tissue, including focal adhesion/extracellular matrix interaction, TGF-β signaling, apoptosis, regulation of vascular smooth muscle contraction, angiogenesis, calcium ion binding, and transcription factors. A systems genetics approach, which incorporates genetic risk with gene expression data, metabolomic data, and protein biochemistry into genome-wide network studies, holds promise to elucidate the complex interplay between genetic risk and environmental factors for coronary artery disease.

  20. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  1. Willingness to pay for reductions in angina pectoris attacks.

    PubMed

    Kartman, B; Andersson, F; Johannesson, M

    1996-01-01

    To compare the costs of health care programs, with the benefits, the values of changes in health status must be expressed in monetary terms. The development of methods to estimate willingness to pay for changes in health status is therefore of interest. This paper reports the results of a contingent valuation study measuring willingness to pay for reductions in angina pectoris attacks. An innovative study design allowed analysis on the data on willingness to pay using two approaches, a binary question and a bidding-game technique. Percentage reductions in anginal attacks were varied randomly in different subsamples, and data were collected about angina pectoris status, attack rate, and income to test the internal validity of the contingent valuation method. Willingness to pay for a 50% reduction in the attack rate for three months was estimated to be about SEK 2,500 ($345) with the binary approach, and about SEK 2,100 ($290) using the bidding-game technique. Regression analyses showed that income, angina pectoris status, attack rate, and percentage reduction in attack rate were all related to willingness to pay, in agreement with the authors' hypothesis.

  2. Facial injuries following hyena attack in rural eastern Ethiopia.

    PubMed

    Fell, M J; Ayalew, Y; McClenaghan, F C; McGurk, M

    2014-12-01

    Hyenas are effective hunters and will consider humans as potential prey if the need and opportunity arise. This study describes the circumstances of hyena attacks, the patterns of injuries sustained, and reconstruction in a resource-poor setting. As part of a charitable surgical mission to Ethiopia in 2012, 45 patients with facial deformities were reviewed, of whom four were victims of hyena attacks. A semi-structured interview was performed to ascertain the circumstances of the attack and the subsequent consequences. The age of the victims at the time of attack varied from 5 to 50 years. The attacks occurred when the victims were alone and vulnerable and took place in outdoor open spaces, during the evening or at night. The initial lunge was made to the facial area; if the jaws closed on the facial bones they were crushed, but in all cases the soft tissues were grasped and torn from the underlying bone. Reconstruction was dictated by the extent of soft tissue loss but could normally be obtained by use of local or regional flaps. Hyenas have been shown to attack humans in a predictable way and cause injuries that typically involve the soft tissues of the face. PMID:25132572

  3. A comparative analysis of network robustness against different link attacks

    NASA Astrophysics Data System (ADS)

    Duan, Boping; Liu, Jing; Zhou, Mingxing; Ma, Liangliang

    2016-04-01

    Recently, the study of optimizing network robustness has attracted increasing attentions, and the constraint that every node's degree cannot be changed is considered. Although this constraint maintains the node degree distribution consistently in order to reserve the structure of networks, it makes the network structure be lack of flexibility since many network structure always transform in the modern society. Given this consideration, in this paper, we analyze the robustness of networks through setting a new constraint; that is, only the number of edges should be unchanged. Then, we use the link-robustness index (Rl) as the measure of the network robustness against either random failures or intentional attacks, and make a comparative analysis of network robustness against different types of link attacks. Moreover, we use four types of networks as initial networks, namely scale-free networks, random networks, regular networks, and small-world networks. The experimental results show that the values of robustness measures for the optimized networks starting from different initial networks are similar under different link attacks, but the network topologies may be different. That is to say, networks with different topologies may have similar robustness in terms of the robustness measures. We also find that the optimized networks obtained by one link attack may not robust against other link attacks, sometimes, even weaker than the original networks. Therefore, before building networks, it is better to study which type of link attacks may happen.

  4. Quantum hacking: attacking practical quantum key distribution systems

    NASA Astrophysics Data System (ADS)

    Qi, Bing; Fung, Chi-Hang Fred; Zhao, Yi; Ma, Xiongfeng; Tamaki, Kiyoshi; Chen, Christine; Lo, Hoi-Kwong

    2007-09-01

    Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfections and violate some of the assumptions in a security proof. Here, we report two types of eavesdropping attacks against a practical QKD system. The first one is "time-shift" attack, which is applicable to QKD systems with gated single photon detectors (SPDs). In this attack, the eavesdropper, Eve, exploits the time mismatch between the open windows of the two SPDs. She can acquire a significant amount of information on the final key by simply shifting the quantum signals forwards or backwards in time domain. Our experimental results in [9] with a commercial QKD system demonstrate that, under this attack, the original QKD system is breakable. This is the first experimental demonstration of a feasible attack against a commercial QKD system. This is a surprising result. The second one is "phase-remapping" attack [10]. Here, Eve exploits the fact that a practical phase modulator has a finite response time. In principle, Eve could change the encoded phase value by time-shifting the signal pulse relative to the reference pulse.

  5. Facial injuries following hyena attack in rural eastern Ethiopia.

    PubMed

    Fell, M J; Ayalew, Y; McClenaghan, F C; McGurk, M

    2014-12-01

    Hyenas are effective hunters and will consider humans as potential prey if the need and opportunity arise. This study describes the circumstances of hyena attacks, the patterns of injuries sustained, and reconstruction in a resource-poor setting. As part of a charitable surgical mission to Ethiopia in 2012, 45 patients with facial deformities were reviewed, of whom four were victims of hyena attacks. A semi-structured interview was performed to ascertain the circumstances of the attack and the subsequent consequences. The age of the victims at the time of attack varied from 5 to 50 years. The attacks occurred when the victims were alone and vulnerable and took place in outdoor open spaces, during the evening or at night. The initial lunge was made to the facial area; if the jaws closed on the facial bones they were crushed, but in all cases the soft tissues were grasped and torn from the underlying bone. Reconstruction was dictated by the extent of soft tissue loss but could normally be obtained by use of local or regional flaps. Hyenas have been shown to attack humans in a predictable way and cause injuries that typically involve the soft tissues of the face.

  6. Modeling Partial Attacks with Alloy (Transcript of Discussion)

    NASA Astrophysics Data System (ADS)

    Lin, Amerson

    The reason we went into this research, was that we found that partial attacks were extremely hard to model in terms of a language that could be used by an automated tool. Now there are three reasons why this is so. The first is that it is hard to identify these attacks even by hand, because you have to be really creative in thinking, what constitutes a reduction in entropy of the secret, that is significant, because a partial attack is really anything that reduces entropy, it's just that it does not reduce the entropy to zero, which would be a case of a complete attack. Next, it's hard to describe that in a formal language, part of that problem comes from the definition, you have to define what you want to be the goal, if the secret is the entire password, then getting one letter is pretty much a partial attack, but if the secret is that one letter, then getting that one letter is a complete attack. And lastly, applying that logic, how do you measure entropy, how do you measure information leakage, that's also very difficult.

  7. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  8. Modeling attacker-defender interactions in information networks.

    SciTech Connect

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  9. Sleep panic attacks: a micro-movement analysis.

    PubMed

    Brown, Terry M; Uhde, Thomas W

    2003-01-01

    Earlier work by our group and others has pointed to a role for movement during sleep in sleep-panic attacks. Specifically, our group has reported that panic disorder patients, as a group, appear to move more during sleep than age-matched controls, whereas the subgroup of panic disorder who "panic" during sleep move less on the nights they experience sleep-panic attacks than they do on nights without sleep-panic attacks. We studied the movement of sleep-panic patients in a more detailed fashion with more than one sleep movement index. Fourteen patients with sleep-panic attacks were compared with 14 waking panic patients, 13 social phobic patients, and 14 normal controls. Subjects from the other groups were age matched to the sleep-panic group. Their comparison study night corresponded to the night number of the sleep-panic attack. Sleep-panic patients did move less on panic nights than did the normal controls on the corresponding sleep-panic night according to two separate sleep movement indices. Although not statistically significant, sleep-panic patients also moved less on their panic night than did either of the other anxious groups on corresponding nights. Rechtshaffen and Kales' Movement Time (MT) measure appears to overestimate actual min of movement during sleep in all subjects. The movement noted in sleep-panic patients may have some role in the pathophysiology of sleep-panic attacks. A possible mechanism is explained.

  10. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting.

    PubMed

    Zhao, H Vicky; Wu, Min; Wang, Z Jane; Liu, K J Ray

    2005-05-01

    Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Unique identification information is embedded into each distributed copy of multimedia signal and serves as a digital fingerprint. Collusion attack is a cost-effective attack against digital fingerprinting, where colluders combine several copies with the same content but different fingerprints to remove or attenuate the original fingerprints. In this paper, we investigate the average collusion attack and several basic nonlinear collusions on independent Gaussian fingerprints, and study their effectiveness and the impact on the perceptual quality. With unbounded Gaussian fingerprints, perceivable distortion may exist in the fingerprinted copies as well as the copies after the collusion attacks. In order to remove this perceptual distortion, we introduce bounded Gaussian-like fingerprints and study their performance under collusion attacks. We also study several commonly used detection statistics and analyze their performance under collusion attacks. We further propose a preprocessing technique of the extracted fingerprints specifically for collusion scenarios to improve the detection performance.

  11. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    NASA Astrophysics Data System (ADS)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  12. Human behaviour can trigger large carnivore attacks in developed countries

    PubMed Central

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E.; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-01-01

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores. PMID:26838467

  13. Human behaviour can trigger large carnivore attacks in developed countries.

    PubMed

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-01-01

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores. PMID:26838467

  14. Larval defense against attack from parasitoid wasps requires nociceptive neurons.

    PubMed

    Robertson, Jessica L; Tsubouchi, Asako; Tracey, W Daniel

    2013-01-01

    Parasitoid wasps are a fierce predator of Drosophila larvae. Female Leptopilina boulardi (LB) wasps use a sharp ovipositor to inject eggs into the bodies of Drosophila melanogaster larvae. The wasp then eats the Drosophila larva alive from the inside, and an adult wasp ecloses from the Drosophila pupal case instead of a fly. However, the Drosophila larvae are not defenseless as they may resist the attack of the wasps through somatosensory-triggered behavioral responses. Here we describe the full range of behaviors performed by the larval prey in immediate response to attacks by the wasps. Our results suggest that Drosophila larvae primarily sense the wasps using their mechanosensory systems. The range of behavioral responses included both "gentle touch" like responses as well as nociceptive responses. We found that the precise larval response depended on both the somatotopic location of the attack, and whether or not the larval cuticle was successfully penetrated during the course of the attack. Interestingly, nociceptive responses are more likely to be triggered by attacks in which the cuticle had been successfully penetrated by the wasp. Finally, we found that the class IV neurons, which are necessary for mechanical nociception, were also necessary for a nociceptive response to wasp attacks. Thus, the class IV neurons allow for a nociceptive behavioral response to a naturally occurring predator of Drosophila.

  15. Enhancing community integrity of networks against multilevel targeted attacks

    NASA Astrophysics Data System (ADS)

    Ma, Lijia; Gong, Maoguo; Cai, Qing; Jiao, Licheng

    2013-08-01

    The community structure and the robustness are two important properties of networks for analyzing the functionality of complex systems. The community structure is crucial to understand the potential functionality of complex systems, while the robustness is indispensable to protect the functionality of complex systems from malicious attacks. When a network suffers from an unpredictable attack, its structural integrity would be damaged. Earlier studies focused on the integrity of the node structure or the edge structure when a network suffers from a single-level malicious attack on the nodes or the edges. In this study, we model the attack on the network as a two-level targeted one. Then, we propose a community robustness index to evaluate the integrality of the community structure when the network suffers from the modeled attack. The proposed index plays an important role in analyzing the ability of the real systems to resist unpredictable failures. Finally, based on the proposed community robustness index, a greedy algorithm is devised to mitigate the network attack. Experiments on three real network systems show that with minor changes in links the community robustness of networks can be greatly improved. The results also demonstrate that the community structures in the optimized networks remain practically unchanged compared with the original ones.

  16. Larval Defense against Attack from Parasitoid Wasps Requires Nociceptive Neurons

    PubMed Central

    Robertson, Jessica L.; Tsubouchi, Asako; Tracey, W. Daniel

    2013-01-01

    Parasitoid wasps are a fierce predator of Drosophila larvae. Female Leptopilina boulardi (LB) wasps use a sharp ovipositor to inject eggs into the bodies of Drosophila melanogaster larvae. The wasp then eats the Drosophila larva alive from the inside, and an adult wasp ecloses from the Drosophila pupal case instead of a fly. However, the Drosophila larvae are not defenseless as they may resist the attack of the wasps through somatosensory-triggered behavioral responses. Here we describe the full range of behaviors performed by the larval prey in immediate response to attacks by the wasps. Our results suggest that Drosophila larvae primarily sense the wasps using their mechanosensory systems. The range of behavioral responses included both “gentle touch” like responses as well as nociceptive responses. We found that the precise larval response depended on both the somatotopic location of the attack, and whether or not the larval cuticle was successfully penetrated during the course of the attack. Interestingly, nociceptive responses are more likely to be triggered by attacks in which the cuticle had been successfully penetrated by the wasp. Finally, we found that the class IV neurons, which are necessary for mechanical nociception, were also necessary for a nociceptive response to wasp attacks. Thus, the class IV neurons allow for a nociceptive behavioral response to a naturally occurring predator of Drosophila. PMID:24205297

  17. Impact modeling and prediction of attacks on cyber targets

    NASA Astrophysics Data System (ADS)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  18. Understanding public confidence in government to prevent terrorist attacks.

    SciTech Connect

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  19. Tranexamic acid as maintenance treatment for non-histaminergic angioedema: analysis of efficacy and safety in 37 patients.

    PubMed

    Wintenberger, C; Boccon-Gibod, I; Launay, D; Fain, O; Kanny, G; Jeandel, P Y; Martin, L; Gompel, A; Bouillet, L

    2014-10-01

    Angioedema (AE) is a clinical syndrome characterized by localised swelling lasting several hours. The swelling is often recurring and can be lethal if it is located in the laryngeal region. Much progress has been made recently in the treatment of acute episodes, but no consensus has been reached on maintenance treatment. We have performed a national retrospective observational study to assess the use of tranexamic acid (TA) as maintenance treatment for non-histaminergic AE [hereditary AE (HAE) or idiopathic non-histaminergic AE]. Records for 64 cases were collected from 1 October 2012 to 31 August 2013; 37 of these were included (12 HAE with C1-inhibitor deficiency, six with HAE with normal C1-inhibitor and 19 idiopathic non-histaminergic AE). When treated with TA over six months, the number of attacks was reduced by 75% in 17 patients, 10 patients showed a lower level of reduction and 10 had the same number of attacks. In no instances were symptoms increased. No thromboembolic events were observed, and the main side effects were digestive in nature. Thus, TA, which is well tolerated and inexpensive, appears to be an effective maintenance treatment for some patients with HAE or idiopathic non-histaminergic AE.

  20. Tranexamic acid as maintenance treatment for non-histaminergic angioedema: analysis of efficacy and safety in 37 patients

    PubMed Central

    Wintenberger, C; Boccon-Gibod, I; Launay, D; Fain, O; Kanny, G; Jeandel, P Y; Martin, L; Gompel, A; Bouillet, L

    2014-01-01

    Angioedema (AE) is a clinical syndrome characterized by localised swelling lasting several hours. The swelling is often recurring and can be lethal if it is located in the laryngeal region. Much progress has been made recently in the treatment of acute episodes, but no consensus has been reached on maintenance treatment. We have performed a national retrospective observational study to assess the use of tranexamic acid (TA) as maintenance treatment for non-histaminergic AE [hereditary AE (HAE) or idiopathic non-histaminergic AE]. Records for 64 cases were collected from 1 October 2012 to 31 August 2013; 37 of these were included (12 HAE with C1-inhibitor deficiency, six with HAE with normal C1-inhibitor and 19 idiopathic non-histaminergic AE). When treated with TA over six months, the number of attacks was reduced by 75% in 17 patients, 10 patients showed a lower level of reduction and 10 had the same number of attacks. In no instances were symptoms increased. No thromboembolic events were observed, and the main side effects were digestive in nature. Thus, TA, which is well tolerated and inexpensive, appears to be an effective maintenance treatment for some patients with HAE or idiopathic non-histaminergic AE. PMID:24827773

  1. Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems

    SciTech Connect

    Bri Rolston

    2005-09-01

    Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments.

  2. Being, thinking, creating: when war attacks the setting and the transference counter-attacks.

    PubMed

    Khair Badawi, Marie-Thérèse; Badawi, Marie-Thérèse Khair

    2011-04-01

    When trauma enters into the reality of the analyst and of the analysand, when it attacks the setting, what becomes of the analyst's role? How can transformations be brought about? With reference to three clinical situations, the author attempts to explore how the articulation between transference and countertransference - the inter-relation - structures the situation; the analyst must remain in his or her role as analyst through managing to create and to reflect upon the clinical aspects of that situation when faced with the unpredictability of what war brings in its wake. It then becomes possible to see how the work of the negative can be confined to the outer limits of the setting.

  3. Factors governing risk of cougar attacks on humans

    USGS Publications Warehouse

    Mattson, David; Logan, Kenneth; Sweanor, Linda

    2011-01-01

    Since the 1980s wildlife managers in the United States and Canada have expressed increasing concern about the physical threat posed by cougars (Puma concolor) to humans. We developed a conceptual framework and analyzed 386 human–cougar encounters (29 fatal attacks, 171 instances of nonfatal contact, and 186 close-threatening encounters) to provide information relevant to public safety. We conceived of human injury and death as the outcome of 4 transitions affected by different suites of factors: (1) a human encountering a cougar: (2) given an encounter, odds that the cougar would be aggressive; (3) given aggression, odds that the cougar would attack; and (4) given an attack, odds that the human would die. We developed multivariable logistic regression models to explain variation in odds at transitions three and four using variables pertaining to characteristics of involved people and cougars. Young (≤ 2.5 years) or unhealthy (by weight, condition, or disease) cougars were more likely than any others to be involved in close (typically <5 m) encounters that threatened the involved person. Of cougars in close encounters, females were more likely than males to attack, and of attacking animals, adults were more likely than juveniles to kill the victim (32% versus 9% fatality, respectively). During close encounters, victims who used a weapon killed the involved cougar in 82% of cases. Other mitigating behaviors (e.g., yelling, backing away, throwing objects, increasing stature) also substantially lessened odds of attack. People who were moving quickly or erratically when an encounter happened (running, playing, skiing, snowshoeing, biking, ATV-riding) were more likely to be attacked and killed compared to people who were less active (25% versus 8% fatality). Children (≤ 10 years) were more likely than single adults to be attacked, but intervention by people of any age reduced odds of a child’s death by 4.6×. Overall, cougar attacks on people in Canada and the

  4. Acute sinusitis.

    PubMed

    Feldt, Brent; Dion, Gregory R; Weitzel, Erik K; McMains, Kevin C

    2013-10-01

    Sinusitis is a common patient complaint that carries with it a large economic burden. It is one of the most common reasons patients visit their primary care physician. Acute bacterial rhinosinusitis (ABRS) can be distinguished from other forms of rhinosinusitis based on symptom duration of <4 weeks in a patient with purulent rhinorrhea associated with facial pain or pressure. Native upper aerodigestive tract bacteria are the most common etiologic agents. Treatment of ABRS is targeted primarily at symptom improvement. Amoxicillin can be used based on the clinical scenario and patient comorbidities. Computed tomographic scans are reserved for complicated presentations or when there is concern for intracranial extension or other complications. A systematic approach to ABRS will allow for improved patient quality of life and a decreased overall economic burden of this common entity.

  5. Value of ABCD2-F in Predicting Cerebral Ischemic Attacks: Three Months Follow-Up after the Primary Attack.

    PubMed

    Chardoli, Mojtaba; Firoozabadi, Nader H; Nouri, Mohsen; Rahimi-Movaghar, Vafa

    2016-06-01

    Cerebrovascular attack (CVA) and transient ischemic attack (TIA) are major causes of emergency department visits around the globe. A significant number of these patients may experience repeat attacks if left untreated. Several risk stratifying scoring systems have been developed in recent years to point out the high risk patients. ABCD2 is based on age, blood pressure, clinical status, diabetes mellitus, and duration of symptoms and is used commonly for this purpose. In this study, we were to enhance its sensitivity and specificity with the addition of another criterion namely atrial fibrillation and making ABCD2-F. A prospective study in two hospitals was performed and 138 patients diagnosed with TIA/CVA were enrolled. Demographic, clinical, and paraclinical data of all patients were registered. All patients were followed for three months for any sign or symptom of a recurrent ischemic attack. Recurrent ischemic attacks happened in 9.4% of the patients. None of the criteria of ABCD2-F was associated with higher chance of ischemic attacks. Similarly, ABCD2-F was not different between patients with or without repeat cerebral ischemia. The addition of atrial fibrillation to ABCD2 did not enhance the accuracy of this scoring system to detect patients high risk for repeat cerebral ischemia. More studies in the future to improve sensitivity and specificity of this test are warranted. PMID:27306346

  6. Catecholamines and estrogen are involved in the pathogenesis of emotional stress-induced acute heart attack.

    PubMed

    Ueyama, Takashi; Kasamatsu, Ken; Hano, Takuzo; Tsuruo, Yoshihiro; Ishikura, Fuminobu

    2008-12-01

    Emotional stress triggers takotsubo cardiomyopathy in postmenopausal women. Clinical analysis of autonomic nervous function has revealed a transient increase of sympathetic nervous activity and decrease of vagal nervous activity. Immobilization (IMO) stress of rats can reproduce the electrocardiographic and left ventriculographic changes that occur in takotsubo cardiomyopathy, both of which are prevented by combined blockade of alpha- and beta-adrenoceptors. Estrogen supplementation partially attenuated these cardiac changes. It also attenuated the IMO-induced increase of c-Fos immunoreactivity, or c-fos mRNA expression in the lateral septum, medial amygdaloid nucleus, paraventricular hypothalamic nucleus, dorsomedial hypothalamic nucleus, laterodorsal tegmental nucleus, and locus ceruleus; these regions contain central sympathetic neurons and neurons with immunoreactive estrogen receptors. It also downregulated c-fos mRNA expression in the adrenal gland and the heart, suggesting an increase of estrogen attenuated the stress-induced hypothalamo-sympathoadrenal outflow from the central nervous system to the target organs. Estrogen treatment also upregulated the levels of cardioprotective substances, such as atrial natriuretic peptide and heat shock protein 70, in the heart. These data suggest that reduction of estrogen levels following menopause might be involved in the primary cause of takotsubo cardiomyopathy both by indirect action on the nervous system and by direct action on the heart.

  7. [Acute paraphrenic states in the clinical presentation of attack-like schizophrenia].

    PubMed

    Subbotskaya, N V

    2015-01-01

    Цель исследования — изучение психопатологической структуры острого парафренного синдрома при разных вариантах течения шизофрении. Материал и методы. Проведено обследование 60 больных. Результаты и обсуждение. Выделено три варианта острого парафренного синдрома: с доминированием чувственного бреда, с доминированием проявлений синдрома Кандинского—Клерамбо и с доминированием конфабуляторных расстройств. Установлено, что для рекуррентной шизофрении характерно развитие острого парафренного синдрома с чувственным бредом, для близкой к вялотекущей приступообразно-прогредиентной шизофрении — развитие острого парафренного синдрома с чувственным бредом в сочетании с интерпретативным, для близкой к юношеской злокачественной приступообразно-прогредиентной шизофрении — развитие острого парафренного синдрома с преобладанием синдрома Кандинского—Клерамбо и чувственных форм бреда, для близкой к параноидной приступообразно-прогредиентной шизофрении наиболее характерно развитие острого парафренного синдрома с преобладанием синдрома Кандинского—Клерамбо и острого парафренного синдрома с конфабуляторными расстройствами. Подтверждена нозологическая специфичность острого парафренного синдрома при приступообразно-прогредиентной шизофрении.

  8. Two seconds is all it takes: European starlings (Sturnus vulgaris) increase levels of circulating glucocorticoids after witnessing a brief raptor attack.

    PubMed

    Jones, Blake C; Smith, Adam D; Bebus, Sara E; Schoech, Stephan J

    2016-02-01

    Researchers typically study "acute" activation of the hypothalamic-pituitary-adrenal (HPA) axis by measuring levels of circulating glucocorticoids in animals that have been exposed to a predator or a cue from a predator (e.g., odor), or have experienced a standardized capture-and-restraint protocol, all of which are many minutes in duration. However, exposure to predators in the "wild", either as the subject of an attack or as a witness to an attack, is generally much shorter as most depredation attempts upon free-living animals last <5s. Yet, whether a stimulus lasting only seconds can activate the HPA axis is unknown. To determine if a stimulus of a few seconds triggers a glucocorticoid response, we measured levels of corticosterone (CORT; the primary avian glucocorticoid) in wild-caught European starlings (Sturnus vulgaris) after they witnessed a brief (<2-8s) raptor attack upon a conspecific, a human "attack" (i.e., a researcher handling a conspecific), and an undisturbed control. Witnesses of a raptor attack responded with CORT levels comparable to that induced by a standardized capture-and-restraint protocol. Glucocorticoid levels of individuals following the control treatment were similar to baseline levels, and those that witnessed a human "attack" had intermediate levels. Our results demonstrate that witnessing a predator attack of very brief duration triggers a profound adrenocortical stress response. Given the considerable evidence of a role for glucocorticoids in learning and memory, such a response may affect how individuals learn to recognize and appropriately react to predators. PMID:26522494

  9. Attacks, applications, and evaluation of known watermarking algorithms with Checkmark

    NASA Astrophysics Data System (ADS)

    Meerwald, Peter; Pereira, Shelby

    2002-04-01

    The Checkmark benchmarking tool was introduced to provide a framework for application-oriented evaluation of watermarking schemes. In this article we introduce new attacks and applications into the existing Checkmark framework. In addition to describing new attacks and applications, we also compare the performance of some well-known watermarking algorithms (proposed by Bruyndonckx,Cox, Fridrich, Dugad, Kim, Wang, Xia, Xie, Zhu and Pereira) with respect to the Checkmark benchmark. In particular, we consider the non-geometric application which contains tests that do not change the geometry of image. This attack constraint is artificial, but yet important for research purposes since a number of algorithms may be interesting, but would score poorly with respect to specific applications simply because geometric compensation has not been incorporated. We note, however, that with the help of image registration, even research algorithms that do not have counter-measures against geometric distortion -- such as a template or reference watermark -- can be evaluated. In the first version of the Checkmark benchmarking program, application-oriented evaluation was introduced, along with many new attacks not already considered in the literature. A second goal of this paper is to introduce new attacks and new applications into the Checkmark framework. In particular, we introduce the following new applications: video frame watermarking, medical imaging and watermarking of logos. Video frame watermarking includes low compression attacks and distortions which warp the edges of the video as well as general projective transformations which may result from someone filming the screen at a cinema. With respect to medical imaging, only small distortions are considered and furthermore it is essential that no distortions are present at embedding. Finally for logos, we consider images of small sizes and particularly compression, scaling, aspect ratio and other small distortions. The challenge

  10. Bilateral acute angle-closure glaucoma after dexfenfluramine treatment.

    PubMed

    Denis, P; Charpentier, D; Berros, P; Touameur, S

    1995-01-01

    We report the case of a patient with narrow angles who had an attack of bilateral acute angle-closure glaucoma precipitated by dexfenfluramine, a serotoninergic drug developed for appetite suppression. Although the exact mechanism remains uncertain, the pupillary block observed in our case may be the result of the serotoninergic or indirect parasympatholytic properties of the drug on the iris sphincter muscle. Serotonergic psychoactive drugs should be prescribed cautiously in patients with known narrow angles and should be monitored by an ophthalmologist.

  11. T-cell-mediated ganglionitis associated with acute sensory neuronopathy.

    PubMed

    Hainfellner, J A; Kristoferitsch, W; Lassmann, H; Bernheimer, H; Neisser, A; Drlicek, M; Beer, F; Budka, H

    1996-04-01

    A 67-year-old man presented with acute painful sensory loss, areflexia, ataxia, urinary retention, and severe constipation and became unable to walk within 2 weeks. He died suddenly 5 weeks after the onset of symptoms. Autopsy revealed widespread inflammation of sensory and autonomic ganglia with immunocytochemical evidence of a CD8+ T cell-mediated cytotoxic attack against ganglion neurons. This observation suggests a novel pathogenetic mechanism of immune-mediated human ganglion cell damage comparable to mechanisms operating in polymyositis.

  12. Transient nonvisualization of the gallbladder by Tc-99m HIDA cholescintigraphy in acute pancreatitis: concise communication

    SciTech Connect

    Edlund, G.; Kempi, V.; van der Linden, W.

    1982-02-01

    In five of seven patients with acute pancreatitis, Tc-99m HIDA scintigraphy failed to visualize the gallbladder. In all five patients the gallbladder was later found to be normal and in three of them normal filling was obtained at a repeat examination performed after the attack had subsided. Transient nonvisualization of the gallbladder in acute pancreatitis is probably due to disturbed motility of the biliary tree.

  13. Capacity and optimal collusion attack channels for Gaussian fingerprinting games

    NASA Astrophysics Data System (ADS)

    Wang, Ying; Moulin, Pierre

    2007-02-01

    In content fingerprinting, the same media covertext - image, video, audio, or text - is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to "remove" their fingerprints and forge a pirated copy. To trace the forgery back to members of the coalition, we need fingerprinting codes that can reliably identify the fingerprints of those members. Researchers have been focusing on designing or testing fingerprints for Gaussian host signals and the mean square error (MSE) distortion under some classes of collusion attacks, in terms of the detector's error probability in detecting collusion members. For example, under the assumptions of Gaussian fingerprints and Gaussian attacks (the fingerprinted signals are averaged and then the result is passed through a Gaussian test channel), Moulin and Briassouli1 derived optimal strategies in a game-theoretic framework that uses the detector's error probability as the performance measure for a binary decision problem (whether a user participates in the collusion attack or not); Stone2 and Zhao et al. 3 studied average and other non-linear collusion attacks for Gaussian-like fingerprints; Wang et al. 4 stated that the average collusion attack is the most efficient one for orthogonal fingerprints; Kiyavash and Moulin 5 derived a mathematical proof of the optimality of the average collusion attack under some assumptions. In this paper, we also consider Gaussian cover signals, the MSE distortion, and memoryless collusion attacks. We do not make any assumption about the fingerprinting codes used other than an embedding distortion constraint. Also, our only assumptions about the attack channel are an expected distortion constraint, a memoryless constraint, and a fairness constraint. That is, the colluders are allowed to use any arbitrary nonlinear strategy subject to the above

  14. Robustness of network of networks under targeted attack

    NASA Astrophysics Data System (ADS)

    Dong, Gaogao; Gao, Jianxi; Du, Ruijin; Tian, Lixin; Stanley, H. Eugene; Havlin, Shlomo

    2013-05-01

    The robustness of a network of networks (NON) under random attack has been studied recently [Gao , Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.107.195701 107, 195701 (2011)]. Understanding how robust a NON is to targeted attacks is a major challenge when designing resilient infrastructures. We address here the question how the robustness of a NON is affected by targeted attack on high- or low-degree nodes. We introduce a targeted attack probability function that is dependent upon node degree and study the robustness of two types of NON under targeted attack: (i) a tree of n fully interdependent Erdős-Rényi or scale-free networks and (ii) a starlike network of n partially interdependent Erdős-Rényi networks. For any tree of n fully interdependent Erdős-Rényi networks and scale-free networks under targeted attack, we find that the network becomes significantly more vulnerable when nodes of higher degree have higher probability to fail. When the probability that a node will fail is proportional to its degree, for a NON composed of Erdős-Rényi networks we find analytical solutions for the mutual giant component P∞ as a function of p, where 1-p is the initial fraction of failed nodes in each network. We also find analytical solutions for the critical fraction pc, which causes the fragmentation of the n interdependent networks, and for the minimum average degree k¯min below which the NON will collapse even if only a single node fails. For a starlike NON of n partially interdependent Erdős-Rényi networks under targeted attack, we find the critical coupling strength qc for different n. When q>qc, the attacked system undergoes an abrupt first order type transition. When q≤qc, the system displays a smooth second order percolation transition. We also evaluate how the central network becomes more vulnerable as the number of networks with the same coupling strength q increases. The limit of q=0 represents no dependency, and the results are consistent with

  15. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 10, 2010 Continuation of the National Emergency With Respect to Certain TerroristAttacks Consistent... terrorist attacks of September 11, 2001,and the continuing and immediate threat of further attacks on...

  16. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 9, 2011 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent... terrorist attacks of September 11, 2001, and the continuing and immediate threat of further attacks on...

  17. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 11, 2012 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent... terrorist attacks of September 11, 2001, and the continuing and immediate threat of further attacks on...

  18. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 10, 2013 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent... terrorist attacks of September 11, 2001, and the continuing and immediate threat of further attacks on...

  19. Learn What a Heart Attack Feels Like--It Could Save Your Life

    MedlinePlus

    Learn What a Heart Attack Feels Like— It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do ... your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all ...

  20. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks

    PubMed Central

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-01-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems. PMID:27609483

  1. Deterring watermark collusion attacks using signal processing techniques

    NASA Astrophysics Data System (ADS)

    Lemma, Aweke N.; van der Veen, Michiel

    2007-02-01

    Collusion attack is a malicious watermark removal attack in which the hacker has access to multiple copies of the same content with different watermarks and tries to remove the watermark using averaging. In the literature, several solutions to collusion attacks have been reported. The main stream solutions aim at designing watermark codes that are inherently resistant to collusion attacks. The other approaches propose signal processing based solutions that aim at modifying the watermarked signals in such a way that averaging multiple copies of the content leads to a significant degradation of the content quality. In this paper, we present signal processing based technique that may be deployed for deterring collusion attacks. We formulate the problem in the context of electronic music distribution where the content is generally available in the compressed domain. Thus, we first extend the collusion resistance principles to bit stream signals and secondly present experimental based analysis to estimate a bound on the maximum number of modified versions of a content that satisfy good perceptibility requirement on one hand and destructive averaging property on the other hand.

  2. Learning from history: The Glasgow Airport terrorist attack.

    PubMed

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  3. Gait biometrics under spoofing attacks: an experimental investigation

    NASA Astrophysics Data System (ADS)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  4. Vulnerability of complex networks under three-level-tree attacks

    NASA Astrophysics Data System (ADS)

    Hao, Yao-hui; Han, Ji-hong; Lin, Yi; Liu, Lin

    2016-11-01

    We investigate vulnerability of complex networks including model networks and real world networks subject to three-level-tree attack. Specifically, we remove three different three-level-tree structures: RRN (Random Root Node), MaxDRN (Max Degree Root Node) and MinDRN (Min Degree Root Node) from a network iteratively until there is no three-level-tree left. Results demonstrate that random network is more robust than scale-free network against three tree attacks, and the robustness of random network decreases as the < k > increases. And scale-free network shows different characteristics in different tree attack modes. The robustness of scale-free is not affected by the < k > parameters for RRN, but increases as the < k > increases for MinDRN. The important thing is that MaxDRN is the most effective in the three tree attack modes, especially for scale-free network. These findings supplement and extend the previous attack results on nodes and edges, and can thus help us better explain the vulnerability of different networks, and provide an insight into more tolerant real complex systems design.

  5. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks

    NASA Astrophysics Data System (ADS)

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-09-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.

  6. Automatic analysis of attack data from distributed honeypot network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Voznak, MIroslav; Rezac, Filip; Partila, Pavol; Tomala, Karel

    2013-05-01

    There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server communicates only with authorized honeypots. The centralized server also automatically analyses data from each honeypot. Results of this analysis and also other statistical data about malicious activity are simply accessible through a built-in web server. All statistical and analysis reports serve as information basis for an algorithm which classifies different types of used VoIP attacks. The web interface then brings a tool for quick comparison and evaluation of actual attacks in all monitored networks. The article describes both, the honeypots nodes in distributed architecture, which monitor suspicious activity, and also methods and algorithms used on the server side for analysis of gathered data.

  7. QTc dispersion and P-wave dispersion during migraine attacks.

    PubMed

    Duru, M; Melek, I; Seyfeli, E; Duman, T; Kuvandik, G; Kaya, H; Yalçin, F

    2006-06-01

    The aim of this study was to investigate increase of QTc dispersion and P-wave dispersion during migraine attacks. Fifty-five patients (16-65 years of age, 49 women, six men) with migraine were included in our study. Heart rate, QTc interval, maximum and minimum QTc interval, QTc dispersion, maximum and minimum P-wave duration and P-wave dispersion were measured from 12-lead ECG recording during migraine attacks and pain-free periods. ECGs were transferred to a personal computer via a scanner and then used for magnification of x400 by Adobe Photoshop software. Maximum QTc interval (454 +/- 24 ms vs. 429 +/- 23 ms, P < 0.001), QTc interval (443 +/- 26 ms vs. 408 +/- 22 ms, P < 0.001) and QTc dispersion (63 +/- 18 ms vs. 43 +/- 14 ms, P < 0.001) were found significantly higher during migraine attacks compared with pain-free periods. Maximum P-wave duration (107 +/- 11 ms vs. 100 +/- 11 ms, P < 0.001) and P-wave dispersion (45 +/- 13 ms vs. 35 +/- 13 ms, P < 0.001) were found higher during migraine attacks than pain-free periods. We concluded that migraine attacks are associated with increased QTc and P-wave dispersion compared with pain-free periods.

  8. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks.

    PubMed

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-09-09

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.

  9. Learning from history: The Glasgow Airport terrorist attack.

    PubMed

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future. PMID:25416378

  10. Pharmacokinetics of rizatriptan tablets during and between migraine attacks.

    PubMed

    Cutler, N R; Jhee, S S; Majumdar, A K; McLaughlin, D; Brucker, M J; Carides, A D; Kramer, M S; Matzura-Wolfe, D; Reines, S A; Goldberg, M R

    1999-04-01

    Gastric stasis during migraine attacks results in delayed absorption of several orally administered antimigraine agents. This study, as part of a larger trial, was conducted to examine the pharmacokinetics of rizatriptan tablets during and between migraine attacks. Participating patients met IHS criteria for migraine with or without aura, and suffered between one and eight migraines per month for the previous 6 months. In part 1 of the study, 21 patients were randomized to receive a single 5-mg tablet of rizatriptan or placebo in the migraine-free state. In part 2, the same patients were treated during migraine with rizatriptan 5-mg tablets (n=18) or placebo (n=3). Blood samples were obtained before dosing and 0.25, 0.5, 0.75, 1, 1.5, 2, 3, 4, 6, 8, and 12 hours after dosing. The plasma concentration profile (ie, AUC((0-infinity)), C(max), T(max)) of rizatriptan 5-mg tablets administered during and between migraine attacks were comparable. The median T(max) for rizatriptan between and during attacks was 1 hour, indicating rapid absorption even during a migraine attack. Rizatriptan 5 mg was well tolerated and 67% of the patients experienced headache relief 2 hours postdose. PMID:15613223

  11. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks.

    PubMed

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-01-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems. PMID:27609483

  12. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Chong Hee; Avoine, Gildas

    RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since the adversary does not change any data between the reader and the tag. Recently distance bounding protocols measuring the round-trip time between the reader and the tag have been researched to prevent this attack.

  13. Incidence of Stroke and Transient Ischemic Attack in Croatia: A Population Based Study.

    PubMed

    Kadojić, Dragutin; Demarin, Vida; Dikanović, Marinko; Lusić, Ivo; Tuskan-Mohar, Lidija; Trkanjec, Zlatko; Mihaljević, Ivan; Kadojić, Mira; Bitunjac, Milan; Vranjes, Zeljko

    2015-09-01

    The aim of this population based neuroepidemiological study was to establish the real incidence rates of acute cerebrovascular disease (CVD): stroke and transient ischemic attack (TIA) in the Republic of Croatia. Multicentric study included 89 501 persons of all ages in four regional centres in Croatia: Zagreb, Osijek + Slavonski Brod, Rijeka and Split. The following incidence rates of stroke, expressed at population of 100 000, have been established: Zagreb 290.52, Osijek + Slavonski Brod 302.14, Rijeka 219.65, Split 195.82. Incidence rate of stroke for the Republic of Croatia is 251.39. The following incidence rates of TIA, expressed at population of 100,000, have been established: Zagreb 87.15, Osijek + Slavonski Brod 156.53, Rijeka 90.11, Split 59.10. Incidence rate of TIA for the Republic of Croatia is 100.55. In the continental part of Croatia (Zagreb, Osijek + Slavonski Brod) incidence rate of stroke is higher by 45%, while incidence rate of TIA is higher by 82% than in the coastal part of Croatia, probably due to different lifestyle and environmental factors. The study has shown relatively high incidence rates of acute CVD (stroke and TIA) in the Republic of Croatia, which proves that CVD are a great public health problem.

  14. A family with acute intermittent porphyria.

    PubMed

    Billoo, Abdul Gaffar; Lone, Saira Waqar

    2008-05-01

    Porphyrias are inherited defects in heme metabolism that result in excessive secretion of porphyrins and porphyrin precursors. Porphyrias can be classified into acute, (neuropsychiatric), cutaneous and mixed forms. There are seven main types of porphyrias; acute intermittent porphyria and plumboporphyria are predominantly neuropsychiatric; congenital erythropoietic porphyria, porphyria cutanea tarda and erythropoietic protoporphyria have predominantly cutaneous manifestations and hereditary coproporphyria and variegate porphyria are classified as mixed as they both have neuropsychiatric and cutaneous features. They cause life-threatening attacks of neurovisceral symptoms that mimic many other acute medical and psychiatric conditions. Lack of clinical recognition often delays effective treatment, and inappropriate diagnostic tests may lead to misdiagnosis and inappropriate treatment. Although the specific enzyme and gene defect have been identified, diagnosis and treatment of these disorders present formidable challenges because their signs and symptoms mimic other common conditions. We present a case report of a 13 years old girl who suffers from acute intermittent porphyria and the family tree showing all members who suffer from it.

  15. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    SciTech Connect

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo'; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-09-10

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  16. Conservation biology: lion attacks on humans in Tanzania.

    PubMed

    Packer, Craig; Ikanda, Dennis; Kissui, Bernard; Kushnir, Hadas

    2005-08-18

    Large carnivores inspire opposition to conservation efforts owing to their impact on livestock and human safety. Here we analyse the pattern of lion attacks over the past 15 years on humans in Tanzania, which has the largest population of lions in Africa, and find that they have killed more than 563 Tanzanians since 1990 and injured at least 308. Attacks have increased dramatically during this time: they peak at harvest time each year and are most frequent in areas with few prey apart from bush pigs (Potamochoerus larvatus), the most common nocturnal crop pest. Our findings provide an important starting point for devising strategies to reduce the risk to rural Tanzanians of lion attacks.

  17. Effects of dopamine agonists on hypothalamic defensive attack in cats.

    PubMed

    Maeda, H; Sato, T; Maki, S

    1985-07-01

    The effects of methamphetamine (MAT) and apomorphine (APO), dopamine agonists, were studied in 16 cats to evaluate their effects on threshold for defensive attack behavior elicited by electrical stimulation of the ventromedial hypothalamic nucleus (VMH). Directed attack and hissing were selected from elementary responses as constituting a defensive attack. Hissing threshold was measured in two situations, one with human provocation and the other without provocation. MAT administered systemically lowered the thresholds for all three types of responses in a dose-related manner (0.5, 1.0, and 3.0 mg/kg). The effects of 1.0 mg/kg of APO were almost identical to those observed with 0.5 or 1.0 mg/kg of MAT. These results suggest that MAT-induced aggressive behavior may be mediated by a dopamine-induced increase in the excitability of the VMH. PMID:4059404

  18. A Model of Biological Attacks on a Realistic Population

    NASA Astrophysics Data System (ADS)

    Carley, Kathleen M.; Fridsma, Douglas; Casman, Elizabeth; Altman, Neal; Chen, Li-Chiou; Kaminsky, Boris; Nave, Demian; Yahja, Alex

    The capability to assess the impacts of large-scale biological attacks and the efficacy of containment policies is critical and requires knowledge-intensive reasoning about social response and disease transmission within a complex social system. There is a close linkage among social networks, transportation networks, disease spread, and early detection. Spatial dimensions related to public gathering places such as hospitals, nursing homes, and restaurants, can play a major role in epidemics [Klovdahl et. al. 2001]. Like natural epidemics, bioterrorist attacks unfold within spatially defined, complex social systems, and the societal and networked response can have profound effects on their outcome. This paper focuses on bioterrorist attacks, but the model has been applied to emergent and familiar diseases as well.

  19. Is adiponectin a risk factor for transient ischaemic attacks?

    PubMed

    Sener, Ufuk; Uludag, Irem Fatma; Kose, Sukran; Ozcelik, Murat; Zorlu, Yasar

    2015-01-01

    Adiponectin is an adipocytokine, and it plays a role in atherosclerosis. The role of adiponectin in the development of ischaemic stroke is controversial. Up to now, adiponectin was not evaluated in transient ischaemic stroke. In this study, we investigated the relationship between adiponectin and transient ischaemic attack. Forty patients with transient ischaemic attack were included into the study. In all patients, traditional risk factors of ischaemic stroke and intima-media thickness of carotid arteries were determined. Also, the relationship between these parameters and adiponectin levels were examined. No difference was found in terms of adiponectin levels between patients and healthy subjects. In addition, there was no association between adiponectin levels and traditional risk factors. Our results suggest that adiponectin may not be a predictive risk factor of transient ischaemic attack.

  20. Ultrasonic anemometer angle of attack errors under turbulent conditions

    NASA Astrophysics Data System (ADS)

    Nakai, T.

    2009-12-01

    Measurements of eddy fluxes are premised on the assumption that wind speeds are measured accurately by an ultrasonic anemometer. Recently, ultrasonic anemometers have been shown to suffer errors depending on the angle of attack, which is the angle between the wind vector and the horizontal. The correction of these errors resulted in general increases in eddy fluxes. However, since the check of the angle of attack dependent error was carried out in the wind tunnel experiment, which would be under the condition of nearly laminar flow, the applicability of this correction to the field data under turbulent conditions has been questioned. In this study, angle of attack dependencies of wind speeds measured by Gill Windmaster ultrasonic anemometers were assessed by field experiment over meadow, considered to be turbulent conditions. By using five identical anemometers, two pairs of systems were prepared: two anemometers for references and one between them for tilt. The dependencies of (co)sine responses of anemometers on angles of attack of 0 to -90 degrees in 10-degree steps and 45 degrees were checked, and clarified that the angle of attack dependent errors occur also under turbulent conditions, with results similar to the wind tunnel experiments. Sine responses of vertical wind speeds depended not only on vertical angle of attack but also on horizontal wind direction, which had not been considered in previous studies. For more robust correction, alternative calibration functions were obtained empirically so as to reasonably explain our field experimental results. Applying this new correction, eddy fluxes increased substantially even over meadow, which is somewhat aerodynamically smooth compared with forests or agricultural fields.

  1. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  2. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    SciTech Connect

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4

  3. Defending networks against denial-of-service attacks

    NASA Astrophysics Data System (ADS)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  4. Grievous Temporal and Occipital Injury Caused by a Bear Attack

    PubMed Central

    Thada, Nikhil Dinaker; Rao, Pallavi; Thada, Smitha Rani; Prasad, Kishore Chandra

    2013-01-01

    Bear attacks are reported from nearly every part of the world. The chance of a human encountering a bear increases as the remote bear territory diminishes. The sloth bear is one of the three species of bears found in India, which inhabits the forests of India and its neighboring countries. Here we describe a teenager who came to us with a critical injury involving the face, temporal and occipital bones inflicted by a sloth bear attack. He underwent a temporal exploration, facial nerve decompression, pinna reconstruction, and occipital bone repair to save him from fatality. PMID:24396623

  5. Fingerprinting Codes for Multimedia Data against Averaging Attack

    NASA Astrophysics Data System (ADS)

    Yagi, Hideki; Matsushima, Toshiyasu; Hirasawa, Shigeichi

    Code construction for digital fingerprinting, which is a copyright protection technique for multimedia, is considered. Digital fingerprinting should deter collusion attacks, where several fingerprinted copies of the same content are mixed to disturb their fingerprints. In this paper, we consider the averaging attack, which is known to be effective for multimedia fingerprinting with the spread spectrum technique. We propose new methods for constructing fingerprinting codes to increase the coding rate of conventional fingerprinting codes, while they guarantee to identify the same number of colluders. Due to the new fingerprinting codes, the system can deal with a larger number of users to supply digital contents.

  6. Burton Award Talk: Science Under Attack: Intelligent Design

    NASA Astrophysics Data System (ADS)

    Krauss, Lawrence

    2005-04-01

    Science is under attack in many places throughout our society, from the White House to the classroom. I will concentrate my remarks here on the emerging threat to science education associated with the effort to have Intelligent Design incorporated into high school science curricula. While this may appear to be primarily an attack on evolutionary biology, it is in fact motivated by an effort to undermine the teaching of science itself as a discipline based on the scientific method. Moreover, the key proponents of this methodology are not misguided scientists, they are highly refined political operatives who are motivated by a desire to incorporate religion directly in science classes.

  7. [The tropical rat mite Ornithonyssus bacoti attacks humans in Iceland.].

    PubMed

    Skírnisson, K

    2001-12-01

    In the summer of 2001 the obligate, intermittent tropical rat mite Ornithonyssus bacoti attacked humans in an Icelandic household where infected Mongolian gerbils (Meriones unguiculatus), bought in a local pet shop, had been kept for few months. After a rapid proliferation the mite started attacking the humans living in the house. A boy sharing room with the pets suffered from extensive dermatitis. Optimal conditions for O. bacoti are at 24-26 degrees C and a relative humidity of 47%. Similar conditions frequently occur indoors in Icelandic premises. Therefore, if O. bacoti has been noticed indoors, necessary measures should be undertaken to immediately eliminate the pest. PMID:17019023

  8. Jaguar attack on a child: case report and literature review.

    PubMed

    Iserson, Kenneth V; Francis, Adama M

    2015-03-01

    Jaguar attacks on humans rarely occur in the wild. When they do, they are often fatal. We describe a jaguar attack on a three-year-old girl near her home deep in a remote area of the Guyanese jungle. The patient had a complex but, relatively, rapid transport to a medical treatment facility for her life-threatening injuries. The child, who suffered typical jaguar-inflicted injury patterns and survived, is highlighted. We review jaguar anatomy, environmental status, hunting and killing behaviors, and discuss optimal medical management, given the resource-limited treatment environment of this international emergency medicine case.

  9. Patrol detection for replica attacks on wireless sensor networks.

    PubMed

    Wang, Liang-Min; Shi, Yang

    2011-01-01

    Replica attack is a critical concern in the security of wireless sensor networks. We employ mobile nodes as patrollers to detect replicas distributed in different zones in a network, in which a basic patrol detection protocol and two detection algorithms for stationary and mobile modes are presented. Then we perform security analysis to discuss the defense strategies against the possible attacks on the proposed detection protocol. Moreover, we show the advantages of the proposed protocol by discussing and comparing the communication cost and detection probability with some existing methods.

  10. Low aspect ratio wings at high angles of attack

    NASA Technical Reports Server (NTRS)

    Stallings, R. L., Jr.

    1986-01-01

    A comprehensive evaluation is made of experimental data compiled to date for the flowfields and aerodynamic forces that occur at high angles of attack for low aspect ratio wings with delta, rectangular, clipped delta, and strake/wing planform geometries. Attention is given to wing leading edge-generated vortex breakdown, aspect ratio and compressibility effects, and strake vortex effects on main wing areas. Although the nonlinear effects created by a wing-body combination significantly alter wing-alone aerodynamics, the wing-alone data presented are vital to the development of prediction methodologies for large angle of attack aerodynamics.

  11. A practical timing attack on RSA over a LAN

    NASA Astrophysics Data System (ADS)

    Lodato, Mark J.; Jouny, Ismail

    2006-04-01

    Today, the specific implementation of a cryptosystem is of possibly greater importance than the underlying cryptographic algorithm itself. Through side-channel cryptanalysis, an adversary may deduce a secret key just by monitoring implementation-specific side channels, such as execution time or power consumption during a cryptographic operation. In this paper, we describe a successful remote timing attack against a server running a protocol similar to SSL. Using a fully-automated attack on Chinese Remaindering Theorem (CRT) implementations of RSA, we show it is practical to recover a 1024-bit key in under an hour over a local area network.

  12. Jaguar Attack on a Child: Case Report and Literature Review

    PubMed Central

    Iserson, Kenneth V.; Francis, Adama M.

    2015-01-01

    Jaguar attacks on humans rarely occur in the wild. When they do, they are often fatal. We describe a jaguar attack on a three-year-old girl near her home deep in a remote area of the Guyanese jungle. The patient had a complex but, relatively, rapid transport to a medical treatment facility for her life-threatening injuries. The child, who suffered typical jaguar-inflicted injury patterns and survived, is highlighted. We review jaguar anatomy, environmental status, hunting and killing behaviors, and discuss optimal medical management, given the resource-limited treatment environment of this international emergency medicine case. PMID:25834674

  13. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  14. Hydrogen attack - Influence of hydrogen sulfide. [on carbon steel

    NASA Technical Reports Server (NTRS)

    Eliezer, D.; Nelson, H. G.

    1978-01-01

    An experimental study is conducted on 12.5-mm-thick SAE 1020 steel (plain carbon steel) plate to assess hydrogen attack at room temperature after specimen exposure at 525 C to hydrogen and a blend of hydrogen sulfide and hydrogen at a pressure of 3.5 MN/sq m for exposure times up to 240 hr. The results are discussed in terms of tensile properties, fissure formation, and surface scales. It is shown that hydrogen attack from a high-purity hydrogen environment is severe, with the formation of numerous methane fissures and bubbles along with a significant reduction in the room-temperature tensile yield and ultimate strengths. However, no hydrogen attack is observed in the hydrogen/hydrogen sulfide blend environment, i.e. no fissure or bubble formation occurred and the room-temperature tensile properties remained unchanged. It is suggested that the observed porous discontinuous scale of FeS acts as a barrier to hydrogen entry, thus reducing its effective equilibrium solubility in the iron lattice. Therefore, hydrogen attack should not occur in pressure-vessel steels used in many coal gasification processes.

  15. Possibility of spoof attack against robustness of multibiometric authentication systems

    NASA Astrophysics Data System (ADS)

    Hariri, Mahdi; Shokouhi, Shahriar Baradaran

    2011-07-01

    Multibiometric systems have been recently developed in order to overcome some weaknesses of single biometric authentication systems, but security of these systems against spoofing has not received enough attention. In this paper, we propose a novel practical method for simulation of possibilities of spoof attacks against a biometric authentication system. Using this method, we model matching scores from standard to completely spoofed genuine samples. Sum, product, and Bayes fusion rules are applied for score level combination. The security of multimodal authentication systems are examined and compared with the single systems against various spoof possibilities. However, vulnerability of fused systems is considerably increased against spoofing, but their robustness is generally higher than single matcher systems. In this paper we show that robustness of a combined system is not always higher than a single system against spoof attack. We propose empirical methods for upgrading the security of multibiometric systems, which contain how to organize and select biometric traits and matchers against various possibilities of spoof attack. These methods provide considerable robustness and present an appropriate reason for using combined systems against spoof attacks.

  16. Sleep Deprivation Attack Detection in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  17. Extracranial arterial aneurysms: a cause of crescendo transient ischaemic attacks.

    PubMed

    Paterson, H M; Holdsworth, R J

    2000-12-01

    Crescendo transient ischaemic attacks (TIAs) should be regarded as a medical emergency. Patients require hospitalisation with urgent assessment and symptom control with anticoagulant therapy. We report on three patients, all of whom had atherosclerotic aneurysmal disease of the extracranial arterial circulation who presented with crescendo TIAs. The possibility of extracranial aneurysmal disease should always be considered and excluded.

  18. Angle of Attack Modulation for Mars Entry Terminal State Optimization

    NASA Technical Reports Server (NTRS)

    Lafleur, Jarret M.; Cerimele, Christopher J.

    2009-01-01

    From the perspective of atmospheric entry, descent, and landing (EDL), one of the most foreboding destinations in the solar system is Mars due in part to its exceedingly thin atmosphere. To benchmark best possible scenarios for evaluation of potential Mars EDL system designs, a study is conducted to optimize the entry-to-terminal-state portion of EDL for a variety of entry velocities and vehicle masses, focusing on the identification of potential benefits of enabling angle of attack modulation. The terminal state is envisioned as one appropriate for the initiation of terminal descent via parachute or other means. A particle swarm optimizer varies entry flight path angle, ten bank profile points, and ten angle of attack profile points to find maximum-final-altitude trajectories for a 10 30 m ellipsled at 180 different combinations of values for entry mass, entry velocity, terminal Mach number, and minimum allowable altitude. Parametric plots of maximum achievable altitude are shown, as are examples of optimized trajectories. It is shown that appreciable terminal state altitude gains (2.5-4.0 km) over pure bank angle control may be possible if angle of attack modulation is enabled for Mars entry vehicles. Gains of this magnitude could prove to be enabling for missions requiring high-altitude landing sites. Conclusions are also drawn regarding trends in the bank and angle of attack profiles that produce the optimal trajectories in this study, and directions for future work are identified.

  19. Assessment and Intervention for Academic Task Attack Strategy Competencies

    ERIC Educational Resources Information Center

    Busse, R. T.; Lee, Charlene

    2015-01-01

    Many students who underachieve in schools may not be learning as effectively as they could. Direct assessments such as the Academic Competence Evaluation Scales (ACES), School Motivation and Learning Strategies Inventory (SMALSI), and the Academic Task Attack Checklist System (ATACS) can be used to evaluate students' knowledge and use of…

  20. Management of victims of urban chemical attack: the French approach.

    PubMed

    Laurent, J F; Richter, F; Michel, A

    1999-10-01

    Since the early 1980s several disasters involving mass release of toxic substances have focused the attention of different administrations and the fire services into producing protocols and guidelines for action in civilian situations. The bomb attack in the Tokyo subway, in March 1995, made it clear that a terrorist attack using highly toxic agents is now feasible. Management of disasters in the civil sector in France is based upon two interlinked plans: the Red Plan, which covers on-site organisation, and the White Plan, which concerns the interface with hospital services. Special procedures have been developed to adapt the Red and White Plans for use in the event of toxic attack and concern the deployment of emergency responding personnel, the provision of life support and antidotes in the contaminated zone, the prevention of secondary contamination and the transport and reception of victims at the hospital. Based on the established principle of pre-hospital resuscitation and well-tried assistance plans, this doctrine allows a safe and effective response to terrorist attacks as well as to other toxic release incidents. PMID:10617333

  1. Male Brown-headed Cowbird Attacks and Kills a Nestling

    USGS Publications Warehouse

    Igl, L.D.

    2003-01-01

    I observed a male Brown-headed Cowbird (Molothrus ater) attack and kill a nestling of an unidentified passerine in a grassland field in Day County, South Dakota, in June 2000. The killing or removal of nestlings by female cowbirds has been reported by others, but this behavior has not been documented previously in male cowbirds.

  2. Optimality of Gaussian attacks in continuous-variable quantum cryptography.

    PubMed

    Navascués, Miguel; Grosshans, Frédéric; Acín, Antonio

    2006-11-10

    We analyze the asymptotic security of the family of Gaussian modulated quantum key distribution protocols for continuous-variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.

  3. Exercise Following a Heart Attack: Some Special Considerations.

    ERIC Educational Resources Information Center

    Fardy, Paul S.

    This paper presents information on the effectiveness of exercise programs for heart attack victims. Some of the observations come from unpublished results of a two year experiment of the National Exercise and Heart Disease Project. The paper first establishes that a group exercise program with trained supervision is advantageous for people with…

  4. The Tokyo subway sarin attack--lessons learned.

    PubMed

    Okumura, T; Hisaoka, T; Yamada, A; Naito, T; Isonuma, H; Okumura, S; Miura, K; Sakurada, M; Maekawa, H; Ishimatsu, S; Takasu, N; Suzuki, K

    2005-09-01

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin.

  5. Posttraumatic Stress Disorder Following the September 11, 2001, Terrorist Attacks

    PubMed Central

    Neria, Yuval; DiGrande, Laura; Adams, Ben G.

    2012-01-01

    The September 11, 2001 (9/11), terrorist attacks were unprecedented in their magnitude and aftermath. In the wake of the attacks, researchers reported a wide range of mental and physical health outcomes, with posttraumatic stress disorder (PTSD) the one most commonly studied. In this review, we aim to assess the evidence about PTSD among highly exposed populations in the first 10 years after the 9/11 attacks. We performed a systematic review. Eligible studies included original reports based on the full Diagnostic and Statistical Manual of Mental Disorders (4th ed., rev.; American Psychiatric Association, 2000) criteria of PTSD among highly exposed populations such as those living or working within close proximity to the World Trade Center (WTC) and the Pentagon in New York City and Washington, DC, respectively, and first responders, including rescue, cleaning, and recovery workers. The large body of research conducted after the 9/11 attacks in the past decade suggests that the burden of PTSD among persons with high exposure to 9/11 was substantial. PTSD that was 9/11-related was associated with a wide range of correlates, including sociodemographic and background factors, event exposure characteristics, loss of life of significant others, and social support factors. Few studies used longitudinal study design or clinical assessments, and no studies reported findings beyond six years post-9/11, thus hindering documentation of the long-term course of confirmed PTSD. Future directions for research are discussed. PMID:21823772

  6. Vulnerabilities in GSM technology and feasibility of selected attacks

    NASA Astrophysics Data System (ADS)

    Voznak, M.; Prokes, M.; Sevcik, L.; Frnda, J.; Toral-Cruz, Homer; Jakovlev, Sergej; Fazio, Peppino; Mehic, M.; Mikulec, M.

    2015-05-01

    Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem's occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting - Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.

  7. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  8. The Rape of a Discipline: Home Economics under Attack.

    ERIC Educational Resources Information Center

    Thompson, Patricia J.

    Changes in a Home Economics curriculum at Lehman College of the City University of New York from 1979-1988 are examined, and a line of inquiry first reported in 1983 is continued. A secondary, feminist analysis of the earlier data, combined with the current data, discloses the extent to which the patriarchal academy will go to attack the "mental…

  9. Cultural Connections: Bowl with Frieze of Lions Attacking Bulls

    ERIC Educational Resources Information Center

    School Arts: The Art Education Magazine for Teachers, 2004

    2004-01-01

    This article gives a brief description of the piece of art titled "Bowl with Frieze of Lions Attacking Bulls" which is thought to be the product of a court or palace of the Neo-Assyrian period and dates to the late seventh to eighth century BC, between the reigns of Sargon and Ashurbanipal. The article highlights the piece's most notable cultural…

  10. Molten Salt Techniques for Students: Attacking Hematite with Pyrosulfate.

    ERIC Educational Resources Information Center

    Atkinson, George F.

    1986-01-01

    Discusses materials needed, procedures used, and typical results obtained for an experiment involving a dry attack of ores with pyrosulfate flux. The experiment has been carried out by about 150 students a year with a demonstrator-to-student ratio of about 1:15 with no serious accidents. (JN)

  11. Assessing Sexual Abuse/Attack Histories with Bariatric Surgery Patients

    ERIC Educational Resources Information Center

    Mahony, David

    2010-01-01

    This study assessed sexual abuse/attack histories in 537 bariatric surgery patients using the PsyBari. The prevalence rates found were lower (15.5%, 19.3% of women, 5.2% of men) than other studies that used bariatric surgery patients but consistent with studies that used nonbariatric obese subjects. Furthermore, bariatric surgery patients who…

  12. X-31 high angle of attack control system performance

    NASA Technical Reports Server (NTRS)

    Huber, Peter; Seamount, Patricia

    1994-01-01

    The design goals for the X-31 flight control system were: (1) level 1 handling qualities during post-stall maneuvering (30 to 70 degrees angle-of-attack); (2) thrust vectoring to enhance performance across the flight envelope; and (3) adequate pitch-down authority at high angle-of-attack. Additional performance goals are discussed. A description of the flight control system is presented, highlighting flight control system features in the pitch and roll axes and X-31 thrust vectoring characteristics. The high angle-of-attack envelope clearance approach will be described, including a brief explanation of analysis techniques and tools. Also, problems encountered during envelope expansion will be discussed. This presentation emphasizes control system solutions to problems encountered in envelope expansion. An essentially 'care free' envelope was cleared for the close-in-combat demonstrator phase. High angle-of-attack flying qualities maneuvers are currently being flown and evaluated. These results are compared with pilot opinions expressed during the close-in-combat program and with results obtained from the F-18 HARV for identical maneuvers. The status and preliminary results of these tests are discussed.

  13. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    SciTech Connect

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-09-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  14. Revising School Attack Protections since 9/11

    ERIC Educational Resources Information Center

    Black, Susan

    2004-01-01

    The terrorist attacks of September 11, 2001, prompted federal officials to step up campaigns to make schools safe. After visiting Ground Zero at New York City's World Trade Center, Education Secretary Rodney Paige sent each chief state school officer suggestions for managing school crises. Many states also have school safety plans in place. New…

  15. Parent-Reported Predictors of Adolescent Panic Attacks.

    ERIC Educational Resources Information Center

    Hayward, Chris; Wilson, Kimberly A.; Lagle, Kristy; Killen, Joel D.; Taylor, C. Barr

    2004-01-01

    Objective: To identify parent-reported risk factors for adolescent panic attacks. Method: Structured diagnostic interviews were obtained from 770 parents of participants in a school-based risk factor study for adolescent panic. Parent-reported risk factors assessed included characteristics of the child (negative affect, separation anxiety disorder…

  16. Defeating Insider Attacks via Autonomic Self-Protective Networks

    ERIC Educational Resources Information Center

    Sibai, Faisal M.

    2012-01-01

    There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…

  17. Attacks on the Freedom To Learn. 1986-1987 Report.

    ERIC Educational Resources Information Center

    People for the American Way, Washington, DC.

    Documenting a cumulative attack on the freedom to learn, which strikes at the heart of public education, this report describes how censorship has grown since 1982, highlighting trends that have emerged over five years, the actors, the challenges, and the results. Following an introduction, the report documents the state of censorship for…

  18. What Should We Expect after the next Attack?

    ERIC Educational Resources Information Center

    Silver, Roxane Cohen; Fischhoff, Baruch

    2011-01-01

    A test of any science is its ability to predict events under specified conditions. A test for the psychology represented in this special issue of the American Psychologist is its ability to predict individual and social behavior in the aftermath of a next terror attack. This article draws on that science to make such predictions. These predictions…

  19. Endangered Education: How Corporate Polluters Are Attacking Environmental Education.

    ERIC Educational Resources Information Center

    Bohart, Barbara; Manilov, Marianne; Schwarz, Tamara

    This report claims that an attack has been waged on environmental education to derail the re-authorization of the National Environmental Education Act and to de-stabilize and de-fund environmental education in the United States. Presented in the media as a grassroots movement, stories have appeared in local, state, and national media that…

  20. Hypergame theory applied to cyber attack and defense

    NASA Astrophysics Data System (ADS)

    House, James Thomas; Cybenko, George

    2010-04-01

    This work concerns cyber attack and defense in the context of game theory--specifically hypergame theory. Hypergame theory extends classical game theory with the ability to deal with differences in players' expertise, differences in their understanding of game rules, misperceptions, and so forth. Each of these different sub-scenarios, or subgames, is associated with a probability--representing the likelihood that the given subgame is truly "in play" at a given moment. In order to form an optimal attack or defense policy, these probabilities must be learned if they're not known a-priori. We present hidden Markov model and maximum entropy approaches for accurately learning these probabilities through multiple iterations of both normal and modified game play. We also give a widely-applicable approach for the analysis of cases where an opponent is aware that he is being studied, and intentionally plays to spoil the process of learning and thereby obfuscate his attributes. These are considered in the context of a generic, abstract cyber attack example. We demonstrate that machine learning efficacy can be heavily dependent on the goals and styles of participant behavior. To this end detailed simulation results under various combinations of attacker and defender behaviors are presented and analyzed.

  1. Delimiting Democratic Debate: The Fordham Institute's Attack on Democratic Values

    ERIC Educational Resources Information Center

    Leahey, Christopher R.

    2005-01-01

    Reflecting on the current debate on how to teach about the terrorist attacks of September 11, 2001, and the subsequent U.S. invasions of Afghanistan and Iraq, this article examines Thomas B. Fordham Institute's Terrorists, Despots, and Democracy: What Our Children Need to Know, one of the several publications produced by the Fordham Institute that…

  2. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  3. Technosocial Modeling of IED Threat Scenarios and Attacks

    SciTech Connect

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

  4. Database Relation Watermarking Resilient against Secondary Watermarking Attacks

    NASA Astrophysics Data System (ADS)

    Gupta, Gaurav; Pieprzyk, Josef

    There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.

  5. [Etiological factors of acute pancreatitis].

    PubMed

    Spicák, J

    2002-09-01

    Acute pancreatitis develops immediately after the causative impulse, while chronic pancreatitis develops after the long-term action of the noxious agent. A typical representative of acute pancreatitis is biliary pancreatitis, chronic pancreatitis develops in alcoholism and has a long latency. As alcoholic pancreatitis is manifested at first as a rule by a potent attack, it is classified in this stage as acute pancreatitis. The most frequent etiological factors in our civilization are thus cholelithiasis and alcoholism (both account for 20-50% in different studies). The assumed pathogenetic principles in acute biliary pancreatitis are the common canal of both efferent ducts above the obturated papilla, duodenopancreatic reflux and intrapancreatic hypertension. A detailed interpretation is however lacking. The pathogenesis of alcoholic pancreatitis is more complicated. Among others some part is played by changes in the calcium concentration and fusion of cellular membranes. Idiopathic pancreatitis occurs in up to 10%, part of the are due to undiagnosed alcoholism and cholelithiasis. Other etiologies are exceptional. Similarly as in cholelithiasis pancreatitis develops also during other pathological processes in the area of the papilla of Vater such as dysfunction of the sphincter of Oddi, ampulloma and juxtapapillary diverticulum, it is however usually mild. The incidence of postoperative pancreatitis is declining. Its lethality is 30% and the diagnosis is difficult. In the pathogenesis changes of the ion concentration are involved, hypoxia and mechanical disorders of the integrity of the gland. Pancreatitis develops in association with other infections--frequently in mumps, rarely in hepatitis, tuberculosis, typhoid and mycoses. Viral pancreatitis is usually mild. In parasitoses pancreatitis develops due to a block of the papilla Vateri. In hyperparathyroidism chronic pancreatitis is more likely to develop, recent data are lacking. As to dyslipoproteinaemias

  6. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  7. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  8. Attack propagation of high-powered intrachannel crosstalk in transparent optical networks

    NASA Astrophysics Data System (ADS)

    Sun, Zeyu; Peng, Yunfeng; Long, Keping

    2011-10-01

    Transparent optical networks (TON) are becoming increasingly attractive, but transparency introduces security threats, e.g., intrachannel crosstalk attack, to optical networks. In this letter, three attack scenarios, i.e., attack propagation within an optical cross connect (OXC), the secondary attacker traverses successive OXCs and original attacker traverses successive OXCs, are investigated. The scenarios accompanied with gain competition attack are also simulated as comparison. Bit-error-rate (BER), and eye diagram penalties are estimated via VPItransMakerTM. Our work proved that the attack signal will propagate intrachannel crosstalk attack to successive three OXCs but with limited two stages of optical switches in each OXC. The BER will be somewhat higher in case gain competition attack exists. The results will be useful for future managing, planning, and designing on TONs.

  9. Pentoxifylline Treatment in Acute Pancreatitis (AP)

    ClinicalTrials.gov

    2016-09-14

    Acute Pancreatitis (AP); Gallstone Pancreatitis; Alcoholic Pancreatitis; Post-ERCP/Post-procedural Pancreatitis; Trauma Acute Pancreatitis; Hypertriglyceridemia Acute Pancreatitis; Idiopathic (Unknown) Acute Pancreatitis; Medication Induced Acute Pancreatitis; Cancer Acute Pancreatitis; Miscellaneous (i.e. Acute on Chronic Pancreatitis)

  10. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  11. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  12. Complications of acute pancreatitis: clinical and CT evaluation.

    PubMed

    Balthazar, Emil J

    2002-12-01

    Mortality of acute pancreatitis is dependent on the development of potentially lethal complications that can coexist and occur at any time following an acute attack. The nature and clinical relevance of these complications differ, contingent on the time of occurrence following a severe episode of pancreatitis. They can be divided into (1), early complications that manifest at the onset or within the first 2 to 3 days, (2) intermediate complications that occur predominantly during the second to fifth week, and (3) late complications that usually manifest months or years following the resolution of an acute attack. Early complications are systemic in nature with diverse clinical manifestations of the cardiovascular, pulmonary, renal, and/or metabolic systems. Intermediate complications are abdominal, pancreatic, and retroperitoneal, and are mostly septic in nature, associated with pancreatic or peripancreatic fat necrosis and pseudocysts. Late, life-threatening complications are mainly vascular or hemorrhagic in nature or involve the development of chronic pancreatic ascites. The early detection and objective evaluation of these complications by clinical and imaging methods leads to specific treatment options in the continuous attempt to decrease mortality rates in acute pancreatitis.

  13. Low Heat Pain Thresholds in Migraineurs Between Attacks

    PubMed Central

    Schwedt, Todd J.; Zuniga, Leslie; Chong, Catherine D.

    2014-01-01

    Background/Objective Between attacks, migraine is associated with hypersensitivities to sensory stimuli. The objective of this study was to investigate hypersensitivity to pain in migraineurs between attacks. Methods Cutaneous heat pain thresholds were measured in 112 migraineurs, migraine free for ≥48 hours, and 75 healthy controls. Pain thresholds at the head and at the arm were compared between migraineurs and controls using two-tailed t-tests. Amongst migraineurs, correlations between heat pain thresholds and headache frequency, allodynia symptom severity, and time interval until next headache were calculated. Results Migraineurs had lower pain thresholds than controls at the head (43.9°C+/−3.2°C vs. 45.1°C+/−3.0°C, p=.015) and arm (43.2°C+/−3.4°C vs. 44.8°C+/−3.3°C, p<0.001). There were not significant correlations between pain thresholds and headache frequency or allodynia symptom severity. For the 41 migraineurs for whom time to next headache was known, there were positive correlations between time to next headache and pain thresholds at the head (r=.352, p=.024) and arm (r=.312, p=.047). Conclusions This study provides evidence that migraineurs have low heat pain thresholds between migraine attacks. Mechanisms underlying these lower pain thresholds could also predispose the migraineur to their next migraine attack, a hypothesis supported by finding positive correlations between pain thresholds and time to next migraine attack. PMID:25246520

  14. Buffeting of NACA 0012 airfoil at high angle of attack

    NASA Astrophysics Data System (ADS)

    Zhou, Tong; Dowell, Earl

    2014-11-01

    Buffeting is a fluid instability caused by flow separation or shock wave oscillations in the flow around a bluff body. Typically there is a dominant frequency of these flow oscillations called Strouhal or buffeting frequency. In prior work several researchers at Duke University have noted the analogy between the classic Von Karman Vortex Street behind a bluff body and the flow oscillations that occur for flow around a NACA 0012 airfoil at sufficiently large angle of attack. Lock-in is found for certain combinations of airfoil oscillation (pitching motion) frequencies and amplitudes when the frequency of the airfoil motion is sufficiently close to the buffeting frequency. The goal of this paper is to explore the flow around a static and an oscillating airfoil at high angle of attack by developing a method for computing buffet response. Simulation results are compared with experimental data. Conditions for the onset of buffeting and lock-in of a NACA 0012 airfoil at high angle of attack are determined. Effects of several parameters on lift coefficient and flow response frequency are studied including Reynolds number, angle of attack and blockage ratio of the airfoil size to the wind tunnel dimensions. Also more detailed flow field characteristics are determined. For a static airfoil, a universal Strouhal number scaling has been found for angles of attack from 30° to 90°, where the flow around airfoil is fully separated. For an oscillating airfoil, conditions for lock-in are discussed. Differences between the lock-in case and the unlocked case are also studied. The second affiliation: Duke University.

  15. Attacks by packs of dogs involving predation on human beings

    PubMed Central

    Borchelt, Peter L.; Lockwood, Randall; Beck, Alan M.; Voith, Victoria L.

    1983-01-01

    Dog bites are a medical problem for millions of people, children being the most common victims. Human deaths attributable to dog bite injury (not rabies) are relatively infrequent. There have been some epidemiologic reviews, but this study is the first attempt to arrive at an understanding of bites involving predation on human beings by conducting behavioral examinations under controlled conditions of the dogs involved, and by interviewing victims, witnesses, and people familiar with the animals. The three cases studied involved two fatalities and an attack that was nearly fatal. The victims were 11, 14, and 81. In each case, owned pet dogs consumed some human tissue. The severity of the victims' injuries was not the consequence of a single dog bite, but the result of repeated attacks by dogs behaving as a social group. Factors that might contribute to a dog's regarding human beings as potential prey were examined, including hunger, prior predation, group behaviors, defense of territory, previous interactions with people, the presence of estrous female dogs, and environmental stimuli. In two of the cases, it was possible, by using similar stimuli, to duplicate the circumstances at the time of the attack. The results of the observations showed the value of behavioral analysis and simulations methods in evaluating possible factors in dog attacks. Among the many factors probably involved in severe dog attacks are the size, number, and nutritional status of the dogs; the dogs' previous aggressive contacts with people; the victim's age, size, health, and behavior; and the absence of other human beings in the vicinity. Imagesp61-ap61-bp61-c PMID:6828639

  16. Acute Disseminated Encephalomyelitis

    MedlinePlus

    ... sometimes misdiagnosed as a severe first attack of multiple sclerosis (MS), since the symptoms and the appearance of the ... ADEM has several features which differentiate it from MS. First, unlike MS patients, persons with ADEM will ...

  17. A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs

    NASA Astrophysics Data System (ADS)

    Chen, Honglong; Lou, Wei; Wang, Zhi

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sniffs packets at one point in the network, tunnels them through a wired or wireless link to another point, and the other of which relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization process and propose a novel consistency-based secure localization scheme against wormhole attacks, which includes wormhole attack detection, valid locators identification and self-localization. We also conduct the simulations to demonstrate the effectiveness of our proposed scheme.

  18. The anatomy of a shark attack: a case report and review of the literature.

    PubMed

    Caldicott, D G; Mahajani, R; Kuhn, M

    2001-07-01

    Shark attacks are rare but are associated with a high morbidity and significant mortality. We report the case of a patient's survival from a shark attack and their subsequent emergency medical and surgical management. Using data from the International Shark Attack File, we review the worldwide distribution and incidence of shark attack. A review of the world literature examines the features which make shark attacks unique pathological processes. We offer suggestions for strategies of management of shark attack, and techniques for avoiding adverse outcomes in human encounters with these endangered creatures.

  19. Pre-Attack Stress-Load, Appraisals, and Coping in Children's Responses to the 9/11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Meltzoff, Andrew N.

    2006-01-01

    Background: Appraisal and coping following a disaster are important factors in children's post-traumatic stress (PTS) symptoms. However, little is known about predictors of disaster coping responses. This study examined stress-load, appraisals and coping styles measured prior to the September 11 terrorist attacks as predictors of 9/11-specific…

  20. Acute Lymphocytic Leukemia

    MedlinePlus

    ... hard for blood to do its work. In acute lymphocytic leukemia (ALL), also called acute lymphoblastic leukemia, there are too ... of white blood cells called lymphocytes or lymphoblasts. ALL is the most common type of cancer in ...

  1. Acute kidney failure

    MedlinePlus

    Kidney failure; Renal failure; Renal failure - acute; ARF; Kidney injury - acute ... There are many possible causes of kidney damage. They include: ... cholesterol (cholesterol emboli) Decreased blood flow due to very ...

  2. Acute arterial occlusion - kidney

    MedlinePlus

    Acute renal arterial thrombosis; Renal artery embolism; Acute renal artery occlusion; Embolism - renal artery ... main artery to the kidney is called the renal artery. Reduced blood flow through the renal artery ...

  3. Acute cerebellar ataxia

    MedlinePlus

    Cerebellar ataxia; Ataxia - acute cerebellar; Cerebellitis; Post-varicella acute cerebellar ataxia; PVACA ... virus. Viral infections that may cause this include chickenpox , Coxsackie disease, Epstein-Barr, and echovirus . Other causes ...

  4. Novel Vasoregulatory Aspects of Hereditary Angioedema: the Role of Arginine Vasopressin, Adrenomedullin and Endothelin-1.

    PubMed

    Kajdácsi, Erika; Jani, Péter K; Csuka, Dorottya; Varga, Lilian; Prohászka, Zoltán; Farkas, Henriette; Cervenak, László

    2016-02-01

    The elevation of bradykinin (BK) level during attacks of hereditary angioedema due to C1-Inhibitor deficiency (C1-INH-HAE) is well known. We previously demonstrated that endothelin-1 (ET-1) level also increases during C1-INH-HAE attacks. Although BK and ET-1 are both potent vasoactive peptides, the vasoregulatory aspect of the pathomechanism of C1-INH-HAE has not yet been investigated. Hence we studied the levels of vasoactive peptides in controls and in C1-INH-HAE patients, as well as evaluated their changes during C1-INH-HAE attacks. The levels of arginine vasopressin (AVP), adrenomedullin (ADM) and ET-1 were measured in the plasma of 100 C1-INH-HAE patients in inter-attack periods and of 111 control subjects, using BRAHMS Kryptor technologies. In 18 of the 100 C1-INH-HAE patients, the levels of vasoactive peptides were compared in blood samples obtained during attacks, or in inter-attack periods. AVP, ADM and ET-1 levels were similar in inter-attack samples from C1-INH-HAE patients and in the samples of controls, although cardiovascular risk has an effect on the levels of vasoactive peptides in both groups. The levels of all three vasoactive peptides increased during C1-INH-HAE attacks. Moreover, the levels of ET-1 and ADM as well as their changes during attacks were significantly correlated. This study demonstrated that vascular regulation by vasoactive peptides is affected during C1-INH-HAE attacks. Our results suggest that the cooperation of several vasoactive peptides may be necessary to counterbalance the actions of excess BK, and to terminate the attacks. This may reveal a novel pathophysiological aspect of C1-INH-HAE.

  5. [Case with postoperative acute angle-closure glaucoma].

    PubMed

    Mihara, Ryosuke; Tanaka, Motoshige; Nakahira, Junko; Fujitate, Yasutaka; Minami, Toshiaki

    2011-08-01

    A 59-year-old man who had undergone biopsy of cervical lymph node under general anesthesia developed an attack of acute angle-closure glaucoma the night after the surgery. He had had no eye symptoms before. He complained of visual disorder, nausea, eye pain, and dizziness after the surgery. His intraocular pressure in the right eye was high (69 mmHg), and an ophthalmologist diagnosed it as acute angle-closure glaucoma. Dropping lotion in the eyes and the intravenous administration were not effective. His intraocular pressure decreased immediatery after laser iridotomy, and his symptoms improved. When the symptoms of eye pain and visual impairment appeared after the surgery, we should take acute angle-closure glaucoma into consideration and treat it as soon as possible.

  6. Local immune system in oviduct physiology and pathophysiology: attack or tolerance?

    PubMed

    Marey, M A; Yousef, M S; Kowsar, R; Hambruch, N; Shimizu, T; Pfarrer, C; Miyamoto, A

    2016-07-01

    The local immune system in the oviduct has a unique ability to deal with pathogens, allogeneic spermatozoa, and the semi-allogeneic embryo. To achieve this, it seems likely that the oviduct possesses an efficient and strictly controlled immune system that maintains optimal conditions for fertilization and early embryo development. The presence of a proper sperm and/or embryo-oviduct interaction begs the question of whether the local immune system in the oviduct exerts beneficial or deleterious effects on sperm and early embryo; support or attack?. A series of studies has revealed that bovine oviduct epithelial cells (BOECs) are influenced by preovulatory levels of Estradiol-17β, progesterone, and LH to maintain an immunologic homeostasis in bovine oviduct, via inhibition of proinflammatory responses that are detrimental to allogenic sperm. Under pathologic conditions, the mucosal immune system initiates the inflammatory response to the infection; the bacterial lipopolysaccharide (LPS) at low concentrations induces a proinflammatory response with increased expression of TLR-4, PTGS2, IL-1β, NFκB1, and TNFα, resulting in tissue damage. At higher concentrations, however, LPS induces a set of anti-inflammatory genes (TLR-2, IL-4, IL-10, and PTGES) that may initiate a tissue repair. This response of BOECs is accompanied by the secretion of acute phase protein, suggesting that BOECs react to LPS with a typical acute proinflammatory response. Under physiological conditions, polymorphonuclear neutrophils (PMN) are existent in the oviductal fluid during preovulatory period in the bovine. Interestingly, the bovine oviduct downregulates sperm phagocytosis by PMN via prostaglandin E2 (PGE2) action. In addition, the angiotensin-endothelin-PGE2 system controlling oviduct contraction may fine-tune the PMN phagocytic behavior to sperm in the oviduct. Importantly, a physiological range of PGE2 supplies anti-inflammatory balance in BOEC. Our recent results show that the sperm

  7. Local immune system in oviduct physiology and pathophysiology: attack or tolerance?

    PubMed

    Marey, M A; Yousef, M S; Kowsar, R; Hambruch, N; Shimizu, T; Pfarrer, C; Miyamoto, A

    2016-07-01

    The local immune system in the oviduct has a unique ability to deal with pathogens, allogeneic spermatozoa, and the semi-allogeneic embryo. To achieve this, it seems likely that the oviduct possesses an efficient and strictly controlled immune system that maintains optimal conditions for fertilization and early embryo development. The presence of a proper sperm and/or embryo-oviduct interaction begs the question of whether the local immune system in the oviduct exerts beneficial or deleterious effects on sperm and early embryo; support or attack?. A series of studies has revealed that bovine oviduct epithelial cells (BOECs) are influenced by preovulatory levels of Estradiol-17β, progesterone, and LH to maintain an immunologic homeostasis in bovine oviduct, via inhibition of proinflammatory responses that are detrimental to allogenic sperm. Under pathologic conditions, the mucosal immune system initiates the inflammatory response to the infection; the bacterial lipopolysaccharide (LPS) at low concentrations induces a proinflammatory response with increased expression of TLR-4, PTGS2, IL-1β, NFκB1, and TNFα, resulting in tissue damage. At higher concentrations, however, LPS induces a set of anti-inflammatory genes (TLR-2, IL-4, IL-10, and PTGES) that may initiate a tissue repair. This response of BOECs is accompanied by the secretion of acute phase protein, suggesting that BOECs react to LPS with a typical acute proinflammatory response. Under physiological conditions, polymorphonuclear neutrophils (PMN) are existent in the oviductal fluid during preovulatory period in the bovine. Interestingly, the bovine oviduct downregulates sperm phagocytosis by PMN via prostaglandin E2 (PGE2) action. In addition, the angiotensin-endothelin-PGE2 system controlling oviduct contraction may fine-tune the PMN phagocytic behavior to sperm in the oviduct. Importantly, a physiological range of PGE2 supplies anti-inflammatory balance in BOEC. Our recent results show that the sperm

  8. Targeted attack on networks coupled by connectivity and dependency links

    NASA Astrophysics Data System (ADS)

    Du, Ruijin; Dong, Gaogao; Tian, Lixin; Liu, Runran

    2016-05-01

    Coupled systems used to increase capacity were shown beneficial as long as it does not open pathways to cascades. Previous studies on the robustness of coupled networks except for interdependent networks are almost the cases of random attack. Many challenges remain exist in targeted-attack problem of coupled networks. Since nodes within coupled networks show different functions for each network, this paper both analytically and numerically analyzed the robustness of coupled networks under three types of targeted attacking strategies, including attacking on nodes by considering internal and external degree, internal degree only, and external degree only. For coupled network with both interdependent and interconnected links, all degree distributions of intra- and inter-connectivity links are Poissonian, we find the system undergoes from second to first order phase transition as coupling strength q increases. The fraction of nodes in the giant component P∞ at stable state, the critical phase transition threshold pc (first order threshold pcI and second order threshold pcII), and the critical point (pc ,qc) separating the first and second order phase transitions are analytically obtained for three types of attacking strategies with attacking probability parameter α = 0 , 1. We also find the system becomes more vulnerable as the average degree of intra-links k ¯ or inter-links K ¯ decreases. Therefore, the minimum average degrees k¯min and K¯min to maintain the system stable are obtained for the case of α = 0 , 1. Moreover, we discussed three typical cases of coupled networks, interdependent networks (K ¯ = 0), interacting networks (q = 0) and bipartite network (k = 0, q = 0), the analytical expressions of P∞, pc and (pc ,qc) (only for interdependent) are given respectively. Besides, we study the equivalence relations between interdependent networks and coupled networks with connectivity and dependency links for the same pc. The results imply that we can

  9. Predicting severity of acute pancreatitis.

    PubMed

    Rau, Bettina M

    2007-04-01

    Severity stratification is a critical issue in acute pancreatitis that strongly influences diagnostic and therapeutic decision making. According to the widely used Atlanta classification, "severe" disease comprises various local and systemic complications that are associated with an increased risk of mortality. However, results from recent clinical studies indicate that these complications vary in their effect on outcome, and many are not necessarily life threatening on their own. Therefore, "severe," as defined by Atlanta, must be distinguished from "prognostic," aiming at nonsurvival. In the first week after disease onset, pancreatitis-related organ failure is the preferred variable for predicting severity and prognosis because it outweighs morphologic complications. Contrast-enhanced CT and MRI allow for accurate stratification of local severity beyond the first week after symptom onset. Among the biochemical markers, C-reactive protein is still the parameter of choice to assess attack severity, although prognostic estimation is not possible. Other markers, including pancreatic protease activation peptides, interleukins-6 and -8, and polymorphonuclear elastase are useful early indicators of severity. Procalcitonin is one of the most promising single markers for assessment of major complications and prognosis throughout the disease course.

  10. Acute Intermittent Porphyria in Argentina: An Update

    PubMed Central

    Cerbino, Gabriela Nora; Gerez, Esther Noemí; Varela, Laura Sabina; Melito, Viviana Alicia; Parera, Victoria Estela; Rossetti, María Victoria

    2015-01-01

    Porphyrias are a group of metabolic diseases that arise from deficiencies in the heme biosynthetic pathway. A partial deficiency in hydroxymethylbilane synthase (HMBS) produces a hepatic disorder named Acute Intermittent Porphyria (AIP); the acute porphyria is more frequent in Argentina. In this paper we review the results obtained for 101 Argentinean AIP families and 6 AIP families from foreign neighbour countries studied at molecular level at Centro de Investigaciones sobre Porfirinas y Porfirias (CIPYP). Thirty-five different mutations were found, of which 14 were described for the first time in our population. The most prevalent type of mutations was the missense mutations (43%) followed by splice defects (26%) and small deletions (20%). An odd case of a double heterozygous presentation of AIP in a foreign family from Paraguay is discussed. Moreover, it can be noted that 38 new families were found carrying the most frequent mutation in Argentina (p.G111R), increasing to 55.66% the prevalence of this genetic change in our population and adding further support to our previous hypothesis of a founder effect for this mutation in Argentina. Identification of patients with an overt AIP is important because treatment depends on an accurate diagnosis, but more critical is the identification of asymptomatic relatives to avoid acute attacks which may progress to death. PMID:26075277

  11. Acute intermittent porphyria in Argentina: an update.

    PubMed

    Cerbino, Gabriela Nora; Gerez, Esther Noemí; Varela, Laura Sabina; Melito, Viviana Alicia; Parera, Victoria Estela; Batlle, Alcira; Rossetti, María Victoria

    2015-01-01

    Porphyrias are a group of metabolic diseases that arise from deficiencies in the heme biosynthetic pathway. A partial deficiency in hydroxymethylbilane synthase (HMBS) produces a hepatic disorder named Acute Intermittent Porphyria (AIP); the acute porphyria is more frequent in Argentina. In this paper we review the results obtained for 101 Argentinean AIP families and 6 AIP families from foreign neighbour countries studied at molecular level at Centro de Investigaciones sobre Porfirinas y Porfirias (CIPYP). Thirty-five different mutations were found, of which 14 were described for the first time in our population. The most prevalent type of mutations was the missense mutations (43%) followed by splice defects (26%) and small deletions (20%). An odd case of a double heterozygous presentation of AIP in a foreign family from Paraguay is discussed. Moreover, it can be noted that 38 new families were found carrying the most frequent mutation in Argentina (p.G111R), increasing to 55.66% the prevalence of this genetic change in our population and adding further support to our previous hypothesis of a founder effect for this mutation in Argentina. Identification of patients with an overt AIP is important because treatment depends on an accurate diagnosis, but more critical is the identification of asymptomatic relatives to avoid acute attacks which may progress to death.

  12. An overview of novel therapies for acute hereditary angioedema.

    PubMed

    Firszt, Rafael; Frank, Michael M

    2010-12-01

    Hereditary angioedema is an episodic swelling disorder with autosomal dominant inheritance. Attacks are characterized by nonpitting edema of external or mucosal body surfaces. Patients often present with swelling of the extremities, abdominal pain, and swelling of the mouth and throat, which can at times lead to asphyxiation. The disease is caused by a mutation in the gene encoding the complement C1-inhibitor protein, which leads to unregulated production of bradykinin. Long-term therapy has depended on the use of attenuated androgens or plasmin inhibitors but in the US there was, until recently, no specific therapy for acute attacks. As well, many patients with hereditary angioedema in the US were either not adequately controlled on previously available therapies or required doses of medications that exposed them to the risk of serious adverse effects. Five companies have completed or are currently conducting phase III clinical trials in the development of specific therapies to terminate acute attacks or to be used as prophylaxis. These products are based on either replacement therapy with purified plasma-derived or recombinant C1-inhibitor, or inhibition of the kinin-generating pathways with a recombinant plasma kallikrein inhibitor or bradykinin type 2 receptor antagonist. Published studies thus far suggest that all of these products are likely to be effective. These new therapies will likely lead to a totally new approach in treating hereditary angioedema. PMID:20866113

  13. Rheumatoid Arthritis When Your Immune System Attacks Your Body | NIH MedlinePlus the Magazine

    MedlinePlus

    ... Understanding Rheumatoid Arthritis (RA) Rheumatoid Arthritis When Your Immune System Attacks Your Body Past Issues / Summer 2014 Table ... disease, which means the arthritis results from your immune system attacking your body's own tissues. The course of ...

  14. Are Omega-3s Linked to Lower Risk for Fatal Heart Attack?

    MedlinePlus

    ... Omega-3s Linked to Lower Risk for Fatal Heart Attack? These vital nutrients are found in seafood, nuts ... these people, nearly 8,000 suffered a first heart attack over time, which resulted in 2,781 deaths. ...

  15. Lupus: When the Body Attacks Itself | NIH MedlinePlus the Magazine

    MedlinePlus

    ... of this page please turn JavaScript on. Feature: Lupus Lupus: When the Body Attacks Itself Past Issues / Spring 2014 Table of Contents fast facts 1 Lupus occurs when the body's immune system attacks the ...

  16. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 10, 2009 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent... national emergency declared on September 14, 2001, in Proclamation 7463, with respect to the...

  17. Talk With Your Health Care Provider About Taking Aspirin to Prevent Heart Attack

    MedlinePlus

    ... q What are my chances of having a heart attack? q Would I benefit from taking aspirin? q ... Health Care Provider About Taking Aspirin to Prevent Heart Attacks Did you know that aspirin can be an ...

  18. Can You Recognize a Heart Attack or Stroke? What To Do When Every Moment Counts

    MedlinePlus

    ... our exit disclaimer . Subscribe Can You Recognize a Heart Attack or Stroke? What To Do When Every Moment ... When it comes to life-threatening conditions like heart attack or stroke, every minute counts. Get to know ...

  19. Aspirin for Reducing Your Risk of Heart Attack and Stroke: Know the Facts

    MedlinePlus

    ... of Aspirin Aspirin for Reducing Your Risk of Heart Attack and Stroke: Know the Facts Share Tweet Linkedin ... example, using aspirin to lower the risk of heart attack and clot-related strokes. In these cases, the ...

  20. Heart Failure After Heart Attack Tied to Cancer Risk in Study

    MedlinePlus

    ... gov/news/fullstory_159804.html Heart Failure After Heart Attack Tied to Cancer Risk in Study Preliminary finding ... News) -- People who develop heart failure after a heart attack may also face a higher risk of cancer, ...