Science.gov

Sample records for allocates electronic attack

  1. Cost of equity in homeland security resource allocation in the face of a strategic attacker.

    PubMed

    Shan, Xiaojun; Zhuang, Jun

    2013-06-01

    Hundreds of billions of dollars have been spent in homeland security since September 11, 2001. Many mathematical models have been developed to study strategic interactions between governments (defenders) and terrorists (attackers). However, few studies have considered the tradeoff between equity and efficiency in homeland security resource allocation. In this article, we fill this gap by developing a novel model in which a government allocates defensive resources among multiple potential targets, while reserving a portion of defensive resources (represented by the equity coefficient) for equal distribution (according to geographical areas, population, density, etc.). Such a way to model equity is one of many alternatives, but was directly inspired by homeland security resource allocation practice. The government is faced with a strategic terrorist (adaptive adversary) whose attack probabilities are endogenously determined in the model. We study the effect of the equity coefficient on the optimal defensive resource allocations and the corresponding expected loss. We find that the cost of equity (in terms of increased expected loss) increases convexly in the equity coefficient. Furthermore, such cost is lower when: (a) government uses per-valuation equity; (b) the cost-effectiveness coefficient of defense increases; and (c) the total defense budget increases. Our model, results, and insights could be used to assist policy making.

  2. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    PubMed

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. PMID:26713543

  3. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    PubMed

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation.

  4. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect

    Lemaster, Michelle Nicole; Gay, David M.; Ehlen, Mark Andrew; Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  5. Electronic Tool for Distribution and Allocation of Heart on Donation and Transplantation in Mexico.

    PubMed

    Maqueda Tenorio, S E; Meixueiro Daza, L A; Maqueda Estrada, S

    2016-03-01

    In Mexico and globally, organs and/or tissues donated from deceased people are insufficient to cover the demand for transplants. In 2014, a rate of 3.6 organ donors per million in habitants was recorded; this is reflected in the transplants performed, including heart transplantation, with a rate of 0.4 per million population. According to the legal framework of Mexico, the National Transplant Center is responsible for coordinating National Subsystem of donation and transplantation, and one of its functions is to integrate and backup information regarding donation and transplantation through the National Transplant Registry System. In July 2015, 45 people were registered in the database of patients waiting for a heart transplant, of which 34.61% were female recipients and 65.39% male. Distribution and allocation processes are a key element to provide a fair distribution for those patients waiting for that organ; thus the creation of an electronic tool is proposed, one that aims to support the decision of the donation and/or transplants coordination committee by providing the necessary elements to make this process more efficient. PMID:27110003

  6. Reducing Clinical Trial Monitoring Resource Allocation and Costs Through Remote Access to Electronic Medical Records

    PubMed Central

    Uren, Shannon C.; Kirkman, Mitchell B.; Dalton, Brad S.; Zalcberg, John R.

    2013-01-01

    Purpose: With electronic medical records (eMRs), the option now exists for clinical trial monitors to perform source data verification (SDV) remotely. We report on a feasibility study of remote access to eMRs for SDV and the potential advantages of such a process in terms of resource allocation and cost. Methods: The Clinical Trials Unit at the Peter MacCallum Cancer Centre, in collaboration with Novartis Pharmaceuticals Australia, conducted a 6-month feasibility study of remote SDV. A Novartis monitor was granted dedicated software and restricted remote access to the eMR portal of the cancer center, thereby providing an avenue through which perform SDV. Results: Six monitoring visits were conducted during the study period, four of which were performed remotely. The ability to conduct two thirds of the monitoring visits remotely in this complex phase III study resulted in an overall cost saving to Novartis. Similarly, remote monitoring eased the strain on internal resources, particularly monitoring space and hospital computer terminal access, at the cancer center. Conclusion: Remote access to patient eMRs for SDV is feasible and is potentially an avenue through which resources can be more efficiently used. Although this feasibility study involved limited numbers, there is no limit to scaling these processes to any number of patients enrolled onto large clinical trials. PMID:23633977

  7. Effects of nitrogen form on growth, CO₂ assimilation, chlorophyll fluorescence, and photosynthetic electron allocation in cucumber and rice plants.

    PubMed

    Zhou, Yan-hong; Zhang, Yi-li; Wang, Xue-min; Cui, Jin-xia; Xia, Xiao-jian; Shi, Kai; Yu, Jing-quan

    2011-02-01

    Cucumber and rice plants with varying ammonium (NH(4)(+)) sensitivities were used to examine the effects of different nitrogen (N) sources on gas exchange, chlorophyll (Chl) fluorescence quenching, and photosynthetic electron allocation. Compared to nitrate (NO(3)(-))-grown plants, cucumber plants grown under NH(4)(+)-nutrition showed decreased plant growth, net photosynthetic rate, stomatal conductance, intercellular carbon dioxide (CO(2)) level, transpiration rate, maximum photochemical efficiency of photosystem II, and O(2)-independent alternative electron flux, and increased O(2)-dependent alternative electron flux. However, the N source had little effect on gas exchange, Chl a fluorescence parameters, and photosynthetic electron allocation in rice plants, except that NH(4)(+)-grown plants had a higher O(2)-independent alternative electron flux than NO(3)(-)-grown plants. NO(3)(-) reduction activity was rarely detected in leaves of NH(4)(+)-grown cucumber plants, but was high in NH(4)(+)-grown rice plants. These results demonstrate that significant amounts of photosynthetic electron transport were coupled to NO(3)(-) assimilation, an effect more significant in NO(3)(-)-grown plants than in NH(4)(+)-grown plants. Meanwhile, NH(4)(+)-tolerant plants exhibited a higher demand for the reduced form of nicotinamide adenine dinucleotide phosphate (NADPH) for NO(3)(-) reduction, regardless of the N form supplied, while NH(4)(+)-sensitive plants had a high water-water cycle activity when NH(4)(+) was supplied as the sole N source.

  8. Resource distribution in multiple attacks with imperfect detection of the attack outcome.

    PubMed

    Levitin, Gregory; Hausken, Kjell

    2012-02-01

    This article extends the previous research of consecutive attacks strategy by assuming that an attacker observes the outcome of each attack imperfectly. With given probabilities it may wrongly identify a destroyed target as undestroyed, and wrongly identify an undestroyed target as destroyed. The outcome of each attack is determined by a contest success function that depends on the amount of resources allocated by the defender and the attacker to each attack. The article suggests a probabilistic model of the multiple attacks and analyzes how the target destruction probability and the attacker's relative resource expenditure are impacted by the two probabilities of incorrect observation, the attacker's and defender's resource ratio, the contest intensity, the number of attacks, and the resource distribution across attacks. We analyze how the attacker chooses the number of attacks, the attack stopping rule, and the optimal resource distribution across attacks to maximize its utility.

  9. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  10. Heart Attack

    MedlinePlus

    ... attack treatment works best when it's given right after symptoms occur. Prompt treatment of a heart attack can help prevent or limit damage to the heart and prevent sudden death. Call 9-1-1 Right Away A heart ...

  11. Heart Attack

    MedlinePlus

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  12. Web-based Electronic Sharing and RE-allocation of Assets

    SciTech Connect

    Leverett, Dave; Miller, Robert A.; Berlin, Gary J.

    2002-09-09

    The Electronic Asses Sharing Program is a web-based application that provides the capability for complex-wide sharing and reallocation of assets that are excess, under utilized, or un-utilized. through a web-based fron-end and supporting has database with a search engine, users can search for assets that they need, search for assets needed by others, enter assets they need, and enter assets they have available for reallocation. In addition, entire listings of available assets and needed assets can be viewed. The application is written in Java, the hash database and search engine are in Object-oriented Java Database Management (OJDBM). The application will be hosted on an SRS-managed server outside the Firewall and access will be controlled via a protected realm. An example of the application can be viewed at the followinig (temporary) URL: http://idgdev.srs.gov/servlet/srs.weshare.WeShare

  13. Web-based Electronic Sharing and RE-allocation of Assets

    2002-09-09

    The Electronic Asses Sharing Program is a web-based application that provides the capability for complex-wide sharing and reallocation of assets that are excess, under utilized, or un-utilized. through a web-based fron-end and supporting has database with a search engine, users can search for assets that they need, search for assets needed by others, enter assets they need, and enter assets they have available for reallocation. In addition, entire listings of available assets and needed assetsmore » can be viewed. The application is written in Java, the hash database and search engine are in Object-oriented Java Database Management (OJDBM). The application will be hosted on an SRS-managed server outside the Firewall and access will be controlled via a protected realm. An example of the application can be viewed at the followinig (temporary) URL: http://idgdev.srs.gov/servlet/srs.weshare.WeShare« less

  14. Heart Attack

    MedlinePlus

    ... lower “bad” cholesterol (also called LDL, or low-density lipoprotein) levels and may help increase “good” cholesterol (also called HDL, or high-density lipoprotein). If you have had a heart attack, ...

  15. Shark attack.

    PubMed

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  16. Resource Allocation.

    ERIC Educational Resources Information Center

    Stennett, R. G.

    A research allocation formula employed in London, Ontario elementary schools, as well as supporting data on the method, are provided in this report. Attempts to improve on the traditional methods of resource allocation in London's schools were based on two principles: (1) that need for a particular service could and should be determined…

  17. Heart Attack Recovery FAQs

    MedlinePlus

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  18. Optimal Resource Allocation in Electrical Network Defense

    SciTech Connect

    Yao, Y; Edmunds, T; Papageorgiou, D; Alvarez, R

    2004-01-15

    Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasures when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or

  19. Moonlight avoidance in gerbils reveals a sophisticated interplay among time allocation, vigilance and state-dependent foraging.

    PubMed

    Kotler, Burt P; Brown, Joel; Mukherjee, Shomen; Berger-Tal, Oded; Bouskila, Amos

    2010-05-22

    Foraging animals have several tools for managing the risk of predation, and the foraging games between them and their predators. Among these, time allocation is foremost, followed by vigilance and apprehension. Together, their use influences a forager's time allocation and giving-up density (GUD) in depletable resource patches. We examined Allenby's gerbils (Gerbilus andersoni allenbyi) exploiting seed resource patches in a large vivarium under varying moon phases in the presence of a red fox (Vulpes vulpes). We measured time allocated to foraging patches electronically and GUDs from seeds left behind in resource patches. From these, we estimated handling times, attack rates and quitting harvest rates (QHRs). Gerbils displayed greater vigilance (lower attack rates) at brighter moon phases (full < wane < wax < new). Similarly, they displayed higher GUDs at brighter moon phases (wax > full > new > wane). Finally, gerbils displayed higher QHRs at new and waxing moon phases. Differences across moon phases not only reflect changing time allocation and vigilance, but changes in the state of the foragers and their marginal value of energy. Early in the lunar cycle, gerbils rely on vigilance and sacrifice state to avoid risk; later they defend state at the cost of increased time allocation; finally their state can recover as safe opportunities expand. In the predator-prey foraging game, foxes may contribute to these patterns of behaviours by modulating their own activity in response to the opportunities presented in each moon phase.

  20. Moonlight avoidance in gerbils reveals a sophisticated interplay among time allocation, vigilance and state-dependent foraging.

    PubMed

    Kotler, Burt P; Brown, Joel; Mukherjee, Shomen; Berger-Tal, Oded; Bouskila, Amos

    2010-05-22

    Foraging animals have several tools for managing the risk of predation, and the foraging games between them and their predators. Among these, time allocation is foremost, followed by vigilance and apprehension. Together, their use influences a forager's time allocation and giving-up density (GUD) in depletable resource patches. We examined Allenby's gerbils (Gerbilus andersoni allenbyi) exploiting seed resource patches in a large vivarium under varying moon phases in the presence of a red fox (Vulpes vulpes). We measured time allocated to foraging patches electronically and GUDs from seeds left behind in resource patches. From these, we estimated handling times, attack rates and quitting harvest rates (QHRs). Gerbils displayed greater vigilance (lower attack rates) at brighter moon phases (full < wane < wax < new). Similarly, they displayed higher GUDs at brighter moon phases (wax > full > new > wane). Finally, gerbils displayed higher QHRs at new and waxing moon phases. Differences across moon phases not only reflect changing time allocation and vigilance, but changes in the state of the foragers and their marginal value of energy. Early in the lunar cycle, gerbils rely on vigilance and sacrifice state to avoid risk; later they defend state at the cost of increased time allocation; finally their state can recover as safe opportunities expand. In the predator-prey foraging game, foxes may contribute to these patterns of behaviours by modulating their own activity in response to the opportunities presented in each moon phase. PMID:20053649

  1. Moonlight avoidance in gerbils reveals a sophisticated interplay among time allocation, vigilance and state-dependent foraging

    PubMed Central

    Kotler, Burt P.; Brown, Joel; Mukherjee, Shomen; Berger-Tal, Oded; Bouskila, Amos

    2010-01-01

    Foraging animals have several tools for managing the risk of predation, and the foraging games between them and their predators. Among these, time allocation is foremost, followed by vigilance and apprehension. Together, their use influences a forager's time allocation and giving-up density (GUD) in depletable resource patches. We examined Allenby's gerbils (Gerbilus andersoni allenbyi) exploiting seed resource patches in a large vivarium under varying moon phases in the presence of a red fox (Vulpes vulpes). We measured time allocated to foraging patches electronically and GUDs from seeds left behind in resource patches. From these, we estimated handling times, attack rates and quitting harvest rates (QHRs). Gerbils displayed greater vigilance (lower attack rates) at brighter moon phases (full < wane < wax < new). Similarly, they displayed higher GUDs at brighter moon phases (wax > full > new > wane). Finally, gerbils displayed higher QHRs at new and waxing moon phases. Differences across moon phases not only reflect changing time allocation and vigilance, but changes in the state of the foragers and their marginal value of energy. Early in the lunar cycle, gerbils rely on vigilance and sacrifice state to avoid risk; later they defend state at the cost of increased time allocation; finally their state can recover as safe opportunities expand. In the predator–prey foraging game, foxes may contribute to these patterns of behaviours by modulating their own activity in response to the opportunities presented in each moon phase. PMID:20053649

  2. A Model of the Regulation of Nitrogenase Electron Allocation in Legume Nodules (II. Comparison of Empirical and Theoretical Studies in Soybean).

    PubMed Central

    Moloney, A. H.; Guy, R. D.; Layzell, D. B.

    1994-01-01

    In N2-fixing legumes, the proportion of total electron flow through nitrogenase (total nitrogenase activity, TNA) that is used for N2 fixation is called the electron allocation coefficient (EAC). Previous studies have proposed that EAC is regulated by the competitive inhibition of H2 on N2 fixation and that the degree of H2 inhibition can be affected by a nodule's permeability to gas diffusion. To test this hypothesis, EAC was measured in soybean (Glycine max L. Merr.) nodules exposed to various partial pressures of H2 and N2, with or without changes in TNA or nodule permeability to gas diffusion, and the results were compared with the predictions of a mathematical model that combined equations for gas diffusion and competitive inhibition of N2 fixation (A. Moloney and D.B. Layzell [1993] Plant Physiol 103: 421-428). The empirical data clearly showed that decreases in EAC were associated with increases in external pH2, decreases in external pN2, and decreases in nodule permeability to O2 diffusion. The model predicted similar trends in EAC, and the small deviations that occurred between measured and predicted values could be readily accounted for by altering one or more of the following model assumptions: K1(H2) of nitrogenase (range from 2-4% H2), Km(N2) of nitrogenase (range from 4-5% N2), the allocation of less than 100% of whole-nodule respiration to tissues within the diffusion barrier, and the presence of a diffusion pathway that is open pore versus closed pore. The differences in the open-pore and closed-pore versions of the model suggest that it may be possible to use EAC measurements as a tool for the study of legume nodule diffusion barrier structure and function. The ability of the model to predict EAC provided strong support for the hypothesis that H2 inhibition of N2 fixation plays a major role in the in vivo control of EAC and that the presence of a variable barrier to gas diffusion affects the H2 and N2 concentration in the infected cell and

  3. About Heart Attacks

    MedlinePlus

    ... survive. A heart attack occurs when the blood flow that brings oxygen to the heart muscle is severely reduced or ... survive. A heart attack occurs when the blood flow that brings oxygen to the heart muscle is severely reduced or ...

  4. Seven Deadliest Network Attacks

    SciTech Connect

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  5. Wild boar attacks.

    PubMed

    Gunduz, Abdulkadir; Turedi, Suleyman; Nuhoglu, Irfan; Kalkan, Asim; Turkmen, Suha

    2007-01-01

    Attacks on humans by wild boar (Sus scrofa) are occasionally reported in rural areas of Turkey. While fatalities are rare, individuals may sustain significant soft tissue trauma. Lower extremity lacerations of up to 10 cm in length and 4 cm deep were seen in the 3 cases reviewed. Injuries to the upper abdomen and chest occurred in one case. Attacks frequently occur in forested areas covered by dense brushwood, and their incidence is increased during the rutting season. In contrast to other large, feral animal attacks, injuries sustained from wild boar typically are limited to the lower extremities. This case series examines 3 attacks by wild boar in rural Turkey.

  6. Transient Ischemic Attack

    MedlinePlus

    Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only ... TIA is that with TIA the blockage is transient (temporary). TIA symptoms occur rapidly and last a ...

  7. Computer Processor Allocator

    2004-03-01

    The Compute Processor Allocator (CPA) provides an efficient and reliable mechanism for managing and allotting processors in a massively parallel (MP) computer. It maintains information in a database on the health. configuration and allocation of each processor. This persistent information is factored in to each allocation decision. The CPA runs in a distributed fashion to avoid a single point of failure.

  8. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  9. Signs of a Heart Attack

    MedlinePlus

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  10. A fatal leopard attack.

    PubMed

    Hejna, Petr

    2010-05-01

    A rare case of a big cat fatal attack is presented. A male leopard that had escaped from its unlocked cage attacked a 26-year-old male zoo worker. The man sustained penetrating injuries to the neck with consequent external bleeding. The man died while being transported to the hospital as a result of the injuries sustained. The wounds discovered on the victim's body corresponded with the known methods of leopard attacks and with findings on the carcasses of animals killed by leopards in the wild. The conclusion of the medicolegal investigation was that the underlying cause of death was a bite wound to the neck which lacerated the left internal jugular vein, the two main branches of the left external carotid artery, and the cervical spine. The cause of death was massive external bleeding. Special attention is paid to the general pattern of injuries sustained from big cat attacks.

  11. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... of patients with unstable angina/non-ST-elevation myocardial infarction (updating the 2007 guideline and replacing the 2011 ...

  12. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  13. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  14. Shark attack in Natal.

    PubMed

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  15. Fatal crocodile attack.

    PubMed

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out.

  16. Word Attack Model.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A limited analysis of alternative approaches to phonemic-level word attack instruction is provided in this document. The instruction segment begins with training in letter-sound correspondences for which mastery of certain skills is assumed. Instruction ends with the decoding of novel items having a consonant-vowel-consonant construction. Contents…

  17. Facial dog attack injuries.

    PubMed

    Lin, Wei; Patil, Pavan Manohar

    2015-02-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to successful management of such wounds are meticulous cleansing of the wound, careful debridement, primary repair, appropriate antibiotic therapy, and rabies and tetanus immunization where indicated. This review presents an overview of the epidemiology, presentation, management of such emergencies, and the recent advances in the care of such patients. PMID:25829713

  18. TCPL: A Defense against wormhole attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  19. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  20. The Unobtrusive Memory Allocator

    2003-03-31

    This library implements a memory allocator/manager which ask its host program or library for memory refions to manage rather than requesting them from the operating system. This allocator supports multiple distinct heaps within a single executable, each of which may grow either upward or downward in memory. The GNU mmalloc library has been modified in such a way that its allocation algorithms have been preserved, but the manner in which it obtains regions to managemore » has been changed to request memory from the host program or library. Additional modifications allow the allocator to manage each heap as either upward or downward-growing. By allowing the hosting program or library to determine what memory is managed, this package allows a greater degree of control than other memory allocation/management libraries. Additional distinguishing features include the ability to manage multiple distinct heaps with in a single executable, each of which may grow either upward or downward in memory. The most common use of this library is in conjunction with the Berkeley Unified Parallel C (UPC) Runtime Library. This package is a modified version of the LGPL-licensed "mmalloc" allocator from release 5.2 of the "gdb" debugger's source code.« less

  1. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  2. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    SciTech Connect

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risks of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.

  3. Sulfate attack expansion mechanisms

    SciTech Connect

    Müllauer, Wolfram Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  4. Approaches to Resource Allocation

    ERIC Educational Resources Information Center

    Dressel, Paul; Simon, Lou Anna Kimsey

    1976-01-01

    Various budgeting patterns and strategies are currently in use, each with its own particular strengths and weaknesses. Neither cost-benefit analysis nor cost-effectiveness analysis offers any better solution to the allocation problem than do the unsupported contentions of departments or the historical unit costs. An operable model that performs…

  5. Electron

    NASA Astrophysics Data System (ADS)

    Springford, Michael

    1997-03-01

    1. J. J. Thomson and the discovery of the electron A. B. P. Pippard; 2. The isolated electron W. N. Cottingham; 3. The relativistic electron D. I. Olive; 4. The electron glue B. L. Gyorffy; 5. The electron fluid P. Coleman; 6. The magnetic electron G. G. Lonzarich; 7. The paired electron A. J. Leggett; 8. The heavy electron M. Springford; 9. The coherent electron Y. Imry and M. Peskin; 10. The composite electron R. Nicholas; 11. The electron in the cosmos M. S. Longair.

  6. Electron

    NASA Astrophysics Data System (ADS)

    Springford, Michael

    2008-12-01

    1. J. J. Thomson and the discovery of the electron A. B. P. Pippard; 2. The isolated electron W. N. Cottingham; 3. The relativistic electron D. I. Olive; 4. The electron glue B. L. Gyorffy; 5. The electron fluid P. Coleman; 6. The magnetic electron G. G. Lonzarich; 7. The paired electron A. J. Leggett; 8. The heavy electron M. Springford; 9. The coherent electron Y. Imry and M. Peskin; 10. The composite electron R. Nicholas; 11. The electron in the cosmos M. S. Longair.

  7. Myrmics Memory Allocator

    SciTech Connect

    Lymperis, S.

    2011-09-23

    MMA is a stand-alone memory management system for MPI clusters. It implements a shared Partitioned Global Address Space, where multiple MPI processes request objects from the allocator and the latter provides them with system-wide unique memory addresses for each object. It provides applications with an intuitive way of managing the memory system in a unified way, thus enabling easier writing of irregular application code.

  8. Synaptic Tagging During Memory Allocation

    PubMed Central

    Rogerson, Thomas; Cai, Denise; Frank, Adam; Sano, Yoshitake; Shobe, Justin; Aranda, Manuel L.; Silva, Alcino J.

    2014-01-01

    There is now compelling evidence that the allocation of memory to specific neurons (neuronal allocation) and synapses (synaptic allocation) in a neurocircuit is not random and that instead specific mechanisms, such as increases in neuronal excitability and synaptic tagging and capture, determine the exact sites where memories are stored. We propose an integrated view of these processes, such that neuronal allocation, synaptic tagging and capture, spine clustering and metaplasticity reflect related aspects of memory allocation mechanisms. Importantly, the properties of these mechanisms suggest a set of rules that profoundly affect how memories are stored and recalled. PMID:24496410

  9. 50 CFR 660.323 - Pacific whiting allocations, allocation attainment, and inseason allocation reapportionment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Pacific whiting allocations, allocation attainment, and inseason allocation reapportionment. 660.323 Section 660.323 Wildlife and Fisheries FISHERY...) FISHERIES OFF WEST COAST STATES West Coast Groundfish Fisheries § 660.323 Pacific whiting...

  10. WILD PIG ATTACKS ON HUMANS

    SciTech Connect

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. Presentation attack detection for face recognition using light field camera.

    PubMed

    Raghavendra, R; Raja, Kiran B; Busch, Christoph

    2015-03-01

    The vulnerability of face recognition systems isa growing concern that has drawn the interest from both academic and research communities. Despite the availability of a broad range of face presentation attack detection (PAD)(or countermeasure or antispoofing) schemes, there exists no superior PAD technique due to evolution of sophisticated presentation attacks (or spoof attacks). In this paper, we present a new perspective for face presentation attack detection by introducing light field camera (LFC). Since the use of a LFC can record the direction of each incoming ray in addition to the intensity, it exhibits an unique characteristic of rendering multiple depth(or focus) images in a single capture. Thus, we present a novel approach that involves exploring the variation of the focus between multiple depth (or focus) images rendered by the LFC that in turn can be used to reveal the presentation attacks. To this extent, we first collect a new face artefact database using LFC that comprises of 80 subjects. Face artefacts are generated by simulating two widely used attacks, such as photo print and electronic screen attack. Extensive experiments carried out on the light field face artefact database have revealed the outstanding performance of the proposed PAD scheme when benchmarked with various well established state-of-the-art schemes. PMID:25622320

  12. [Organ allocation. Ethical issues].

    PubMed

    Cattorini, P

    2010-01-01

    The criteria for allocating organs are one of the most debated ethical issue in the transplantation programs. The article examines some rules and principles followed by "Nord Italia Transplant program", summarized in its Principles' Charter and explained in a recent interdisciplinary book. General theories of justice and their application to individual clinical cases are commented and evaluated, in order to foster a public, democratic, transparent debate among professionals and citizens, scientific associations and customers' organizations. Some specific moral dilemmas are focused regarding the concepts of proportionate treatment, unselfish donation by living persons, promotion of local institutions efficiency. PMID:20677677

  13. Genetic attack on neural cryptography.

    PubMed

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  14. Genetic attack on neural cryptography

    SciTech Connect

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  15. Attack vulnerability of complex networks

    NASA Astrophysics Data System (ADS)

    Holme, Petter; Kim, Beom Jun; Yoon, Chang No; Han, Seung Kee

    2002-05-01

    We study the response of complex networks subject to attacks on vertices and edges. Several existing complex network models as well as real-world networks of scientific collaborations and Internet traffic are numerically investigated, and the network performance is quantitatively measured by the average inverse geodesic length and the size of the largest connected subgraph. For each case of attacks on vertices and edges, four different attacking strategies are used: removals by the descending order of the degree and the betweenness centrality, calculated for either the initial network or the current network during the removal procedure. It is found that the removals by the recalculated degrees and betweenness centralities are often more harmful than the attack strategies based on the initial network, suggesting that the network structure changes as important vertices or edges are removed. Furthermore, the correlation between the betweenness centrality and the degree in complex networks is studied.

  16. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  17. Additive attacks on speaker recognition

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  18. Duloxetine-related panic attacks.

    PubMed

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-03-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients' trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who responded to duloxetine treatment administered in the initial dose of 30 mg per day with as many as three panic attacks in two days. Upon duloxetine withdrawal, these panic attacks ceased as well. The patient continued tianeptine and alprazolam treatment during which no significant side-effects had been seen, so that she gradually recovered. Some of the available literature sources have suggested the possibility of duloxetine administration to the end of generalised anxiety disorder and panic attack treatment. However, they are outnumbered by the contributions reporting about duloxetine-related anxiety, aggressiveness and panic attacks. In line with the foregoing, further monitoring of each and every duloxetine-administered patient group needs to be pursued so as to be able to evaluate treatment benefits and weigh them against risks of anxiety or panic attack onset.

  19. Computationally efficient control allocation

    NASA Technical Reports Server (NTRS)

    Durham, Wayne (Inventor)

    2001-01-01

    A computationally efficient method for calculating near-optimal solutions to the three-objective, linear control allocation problem is disclosed. The control allocation problem is that of distributing the effort of redundant control effectors to achieve some desired set of objectives. The problem is deemed linear if control effectiveness is affine with respect to the individual control effectors. The optimal solution is that which exploits the collective maximum capability of the effectors within their individual physical limits. Computational efficiency is measured by the number of floating-point operations required for solution. The method presented returned optimal solutions in more than 90% of the cases examined; non-optimal solutions returned by the method were typically much less than 1% different from optimal and the errors tended to become smaller than 0.01% as the number of controls was increased. The magnitude of the errors returned by the present method was much smaller than those that resulted from either pseudo inverse or cascaded generalized inverse solutions. The computational complexity of the method presented varied linearly with increasing numbers of controls; the number of required floating point operations increased from 5.5 i, to seven times faster than did the minimum-norm solution (the pseudoinverse), and at about the same rate as did the cascaded generalized inverse solution. The computational requirements of the method presented were much better than that of previously described facet-searching methods which increase in proportion to the square of the number of controls.

  20. Generalized multidimensional dynamic allocation method.

    PubMed

    Lebowitsch, Jonathan; Ge, Yan; Young, Benjamin; Hu, Feifang

    2012-12-10

    Dynamic allocation has received considerable attention since it was first proposed in the 1970s as an alternative means of allocating treatments in clinical trials which helps to secure the balance of prognostic factors across treatment groups. The purpose of this paper is to present a generalized multidimensional dynamic allocation method that simultaneously balances treatment assignments at three key levels: within the overall study, within each level of each prognostic factor, and within each stratum, that is, combination of levels of different factors Further it offers capabilities for unbalanced and adaptive designs for trials. The treatment balancing performance of the proposed method is investigated through simulations which compare multidimensional dynamic allocation with traditional stratified block randomization and the Pocock-Simon method. On the basis of these results, we conclude that this generalized multidimensional dynamic allocation method is an improvement over conventional dynamic allocation methods and is flexible enough to be applied for most trial settings including Phases I, II and III trials.

  1. Research on allocation efficiency of the daisy chain allocation algorithm

    NASA Astrophysics Data System (ADS)

    Shi, Jingping; Zhang, Weiguo

    2013-03-01

    With the improvement of the aircraft performance in reliability, maneuverability and survivability, the number of the control effectors increases a lot. How to distribute the three-axis moments into the control surfaces reasonably becomes an important problem. Daisy chain method is simple and easy to be carried out in the design of the allocation system. But it can not solve the allocation problem for entire attainable moment subset. For the lateral-directional allocation problem, the allocation efficiency of the daisy chain can be directly measured by the area of its subset of attainable moments. Because of the non-linear allocation characteristic, the subset of attainable moments of daisy-chain method is a complex non-convex polygon, and it is difficult to solve directly. By analyzing the two-dimensional allocation problems with a "micro-element" idea, a numerical calculation algorithm is proposed to compute the area of the non-convex polygon. In order to improve the allocation efficiency of the algorithm, a genetic algorithm with the allocation efficiency chosen as the fitness function is proposed to find the best pseudo-inverse matrix.

  2. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  3. Eyespots divert attacks by fish.

    PubMed

    Kjernsmo, Karin; Merilaita, Sami

    2013-09-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish' own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments. PMID:23864602

  4. Eyespots divert attacks by fish

    PubMed Central

    Kjernsmo, Karin; Merilaita, Sami

    2013-01-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish’ own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments. PMID:23864602

  5. Eyespots divert attacks by fish.

    PubMed

    Kjernsmo, Karin; Merilaita, Sami

    2013-09-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish' own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments.

  6. The Principal as Resource Allocator.

    ERIC Educational Resources Information Center

    Peterson, Kent D.

    The effect of political influences on the allocation of personnel, money, facilities, and equipment by elementary school principals is discussed in this paper. The use of Zald's political economy framework as a tool for understanding the principal's role in allocating resources is described by the author. He suggests that the principal occupies a…

  7. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  8. 24 CFR 92.50 - Formula allocation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Formula allocation. 92.50 Section... Development HOME INVESTMENT PARTNERSHIPS PROGRAM Allocation Formula § 92.50 Formula allocation. (a) Jurisdictions eligible for a formula allocation. HUD will provide allocations of funds in amounts determined...

  9. 23 CFR 1240.15 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Allocations. 1240.15 Section 1240.15 Highways NATIONAL... GUIDELINES SAFETY INCENTIVE GRANTS FOR USE OF SEAT BELTS-ALLOCATIONS BASED ON SEAT BELT USE RATES Determination of Allocations § 1240.15 Allocations. (a) Funds allocated under this part shall be available...

  10. Resource Balancing Control Allocation

    NASA Technical Reports Server (NTRS)

    Frost, Susan A.; Bodson, Marc

    2010-01-01

    Next generation aircraft with a large number of actuators will require advanced control allocation methods to compute the actuator commands needed to follow desired trajectories while respecting system constraints. Previously, algorithms were proposed to minimize the l1 or l2 norms of the tracking error and of the control effort. The paper discusses the alternative choice of using the l1 norm for minimization of the tracking error and a normalized l(infinity) norm, or sup norm, for minimization of the control effort. The algorithm computes the norm of the actuator deflections scaled by the actuator limits. Minimization of the control effort then translates into the minimization of the maximum actuator deflection as a percentage of its range of motion. The paper shows how the problem can be solved effectively by converting it into a linear program and solving it using a simplex algorithm. Properties of the algorithm are investigated through examples. In particular, the min-max criterion results in a type of resource balancing, where the resources are the control surfaces and the algorithm balances these resources to achieve the desired command. A study of the sensitivity of the algorithms to the data is presented, which shows that the normalized l(infinity) algorithm has the lowest sensitivity, although high sensitivities are observed whenever the limits of performance are reached.

  11. Evaluation of Word Attack Skills.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A framework for more apt and sensitive evaluation of generalized word attack skill--the heart of oral reading skill--is presented. The paper envisions the design and development of oral reading instruction as bounded by a fully-specified evaluation scheme. (Author)

  12. Detection of complex cyber attacks

    NASA Astrophysics Data System (ADS)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  13. A decision framework for managing risk to airports from terrorist attack.

    PubMed

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period.

  14. A decision framework for managing risk to airports from terrorist attack.

    PubMed

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. PMID:25109326

  15. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    PubMed

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  16. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  17. Attack Vulnerability of Network Controllability.

    PubMed

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  18. Generic attack approaches for industrial control systems.

    SciTech Connect

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  19. Collaborative Resource Allocation

    NASA Technical Reports Server (NTRS)

    Wang, Yeou-Fang; Wax, Allan; Lam, Raymond; Baldwin, John; Borden, Chester

    2007-01-01

    Collaborative Resource Allocation Networking Environment (CRANE) Version 0.5 is a prototype created to prove the newest concept of using a distributed environment to schedule Deep Space Network (DSN) antenna times in a collaborative fashion. This program is for all space-flight and terrestrial science project users and DSN schedulers to perform scheduling activities and conflict resolution, both synchronously and asynchronously. Project schedulers can, for the first time, participate directly in scheduling their tracking times into the official DSN schedule, and negotiate directly with other projects in an integrated scheduling system. A master schedule covers long-range, mid-range, near-real-time, and real-time scheduling time frames all in one, rather than the current method of separate functions that are supported by different processes and tools. CRANE also provides private workspaces (both dynamic and static), data sharing, scenario management, user control, rapid messaging (based on Java Message Service), data/time synchronization, workflow management, notification (including emails), conflict checking, and a linkage to a schedule generation engine. The data structure with corresponding database design combines object trees with multiple associated mortal instances and relational database to provide unprecedented traceability and simplify the existing DSN XML schedule representation. These technologies are used to provide traceability, schedule negotiation, conflict resolution, and load forecasting from real-time operations to long-range loading analysis up to 20 years in the future. CRANE includes a database, a stored procedure layer, an agent-based middle tier, a Web service wrapper, a Windows Integrated Analysis Environment (IAE), a Java application, and a Web page interface.

  20. Diabetes Ups Risk of Heart Attack Death

    MedlinePlus

    ... news/fullstory_159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated ... are much more likely to die after a heart attack than people without the blood sugar condition, a ...

  1. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  2. Deterring watermark collusion attacks using signal processing techniques

    NASA Astrophysics Data System (ADS)

    Lemma, Aweke N.; van der Veen, Michiel

    2007-02-01

    Collusion attack is a malicious watermark removal attack in which the hacker has access to multiple copies of the same content with different watermarks and tries to remove the watermark using averaging. In the literature, several solutions to collusion attacks have been reported. The main stream solutions aim at designing watermark codes that are inherently resistant to collusion attacks. The other approaches propose signal processing based solutions that aim at modifying the watermarked signals in such a way that averaging multiple copies of the content leads to a significant degradation of the content quality. In this paper, we present signal processing based technique that may be deployed for deterring collusion attacks. We formulate the problem in the context of electronic music distribution where the content is generally available in the compressed domain. Thus, we first extend the collusion resistance principles to bit stream signals and secondly present experimental based analysis to estimate a bound on the maximum number of modified versions of a content that satisfy good perceptibility requirement on one hand and destructive averaging property on the other hand.

  3. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.

    PubMed

    Kroshl, William M; Sarkani, Shahram; Mazzuchi, Thomas A

    2015-09-01

    This article presents ongoing research that focuses on efficient allocation of defense resources to minimize the damage inflicted on a spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural disasters such as hurricanes, earthquakes, or even accidental systems failures and the problem of allocating resources to defend against an opponent who is aware of, and anticipating, the defender's efforts to mitigate the threat. Our approach is to utilize a combination of integer programming and agent-based modeling to allocate the defensive resources. We conceptualize the problem as a Stackelberg "leader follower" game where the defender first places his assets to defend key areas of the network, and the attacker then seeks to inflict the maximum damage possible within the constraints of resources and network structure. The criticality of arcs in the network is estimated by a deterministic network interdiction formulation, which then informs an evolutionary agent-based simulation. The evolutionary agent-based simulation is used to determine the allocation of resources for attackers and defenders that results in evolutionary stable strategies, where actions by either side alone cannot increase its share of victories. We demonstrate these techniques on an example network, comparing the evolutionary agent-based results to a more traditional, probabilistic risk analysis (PRA) approach. Our results show that the agent-based approach results in a greater percentage of defender victories than does the PRA-based approach.

  4. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.

    PubMed

    Kroshl, William M; Sarkani, Shahram; Mazzuchi, Thomas A

    2015-09-01

    This article presents ongoing research that focuses on efficient allocation of defense resources to minimize the damage inflicted on a spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural disasters such as hurricanes, earthquakes, or even accidental systems failures and the problem of allocating resources to defend against an opponent who is aware of, and anticipating, the defender's efforts to mitigate the threat. Our approach is to utilize a combination of integer programming and agent-based modeling to allocate the defensive resources. We conceptualize the problem as a Stackelberg "leader follower" game where the defender first places his assets to defend key areas of the network, and the attacker then seeks to inflict the maximum damage possible within the constraints of resources and network structure. The criticality of arcs in the network is estimated by a deterministic network interdiction formulation, which then informs an evolutionary agent-based simulation. The evolutionary agent-based simulation is used to determine the allocation of resources for attackers and defenders that results in evolutionary stable strategies, where actions by either side alone cannot increase its share of victories. We demonstrate these techniques on an example network, comparing the evolutionary agent-based results to a more traditional, probabilistic risk analysis (PRA) approach. Our results show that the agent-based approach results in a greater percentage of defender victories than does the PRA-based approach. PMID:25683347

  5. Biomechanics of knife stab attacks.

    PubMed

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  6. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  7. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  8. 15 CFR 335.4 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Allocation. 335.4 Section 335.4... § 335.4 Allocation. (a) For HTS 9902.51.11 and HTS 9902.51.15 each Tariff Rate Quota will be allocated separately. Allocation will be based on an applicant's Worsted Wool Suit production, on a weighted...

  9. Preserving the allocation ratio at every allocation with biased coin randomization and minimization in studies with unequal allocation.

    PubMed

    Kuznetsova, Olga M; Tymofyeyev, Yevgen

    2012-04-13

    The demand for unequal allocation in clinical trials is growing. Most commonly, the unequal allocation is achieved through permuted block randomization. However, other allocation procedures might be required to better approximate the allocation ratio in small samples, reduce the selection bias in open-label studies, or balance on baseline covariates. When these allocation procedures are generalized to unequal allocation, special care is to be taken to preserve the allocation ratio at every allocation step. This paper offers a way to expand the biased coin randomization to unequal allocation that preserves the allocation ratio at every allocation. The suggested expansion works with biased coin randomization that balances only on treatment group totals and with covariate-adaptive procedures that use a random biased coin element at every allocation. Balancing properties of the allocation ratio preserving biased coin randomization and minimization are described through simulations. It is demonstrated that these procedures are asymptotically protected against the shift in the rerandomization distribution identified for some examples of minimization with 1:2 allocation. The asymptotic shift in the rerandomization distribution of the difference in treatment means for an arbitrary unequal allocation procedure is explicitly derived in the paper.

  10. Ballistic Beloniformes attacking through Snell's Window.

    PubMed

    Day, R D; Mueller, F; Carseldine, L; Meyers-Cherry, N; Tibbetts, I R

    2016-02-01

    Needlefishes (Beloniformes) were observed employing a range of stalking and attacking behaviours to attack schools of bait fishes ranging from the use of tactics common to predatory fishes to a novel behaviour: the use of leaping, aerial attacks. These aerial attacks are suggested to serve two purposes: to extend the attack range of the needlefishes and to reduce their prey's potential for evasion. Furthermore, a third purpose is hypothesized that the needlefishes are taking advantage of Snell's Window, an optical effect which may mask their approach to their prey.

  11. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  12. Collective credit allocation in science

    PubMed Central

    Shen, Hua-Wei; Barabási, Albert-László

    2014-01-01

    Collaboration among researchers is an essential component of the modern scientific enterprise, playing a particularly important role in multidisciplinary research. However, we continue to wrestle with allocating credit to the coauthors of publications with multiple authors, because the relative contribution of each author is difficult to determine. At the same time, the scientific community runs an informal field-dependent credit allocation process that assigns credit in a collective fashion to each work. Here we develop a credit allocation algorithm that captures the coauthors’ contribution to a publication as perceived by the scientific community, reproducing the informal collective credit allocation of science. We validate the method by identifying the authors of Nobel-winning papers that are credited for the discovery, independent of their positions in the author list. The method can also compare the relative impact of researchers working in the same field, even if they did not publish together. The ability to accurately measure the relative credit of researchers could affect many aspects of credit allocation in science, potentially impacting hiring, funding, and promotion decisions. PMID:25114238

  13. Collective credit allocation in science.

    PubMed

    Shen, Hua-Wei; Barabási, Albert-László

    2014-08-26

    Collaboration among researchers is an essential component of the modern scientific enterprise, playing a particularly important role in multidisciplinary research. However, we continue to wrestle with allocating credit to the coauthors of publications with multiple authors, because the relative contribution of each author is difficult to determine. At the same time, the scientific community runs an informal field-dependent credit allocation process that assigns credit in a collective fashion to each work. Here we develop a credit allocation algorithm that captures the coauthors' contribution to a publication as perceived by the scientific community, reproducing the informal collective credit allocation of science. We validate the method by identifying the authors of Nobel-winning papers that are credited for the discovery, independent of their positions in the author list. The method can also compare the relative impact of researchers working in the same field, even if they did not publish together. The ability to accurately measure the relative credit of researchers could affect many aspects of credit allocation in science, potentially impacting hiring, funding, and promotion decisions. PMID:25114238

  14. Software For Allocation Of Tolerances

    NASA Technical Reports Server (NTRS)

    Fernandez, Ken; Raman, Shivakumar; Pulat, Simin

    1992-01-01

    Collection of computer programs being developed to assist engineers in allocating tolerances to dimensions of components and assemblies. System reflects tolerancing expertise of design and manufacturing engineers; helps engineers maintain comprehensive tolerancing policy and overview that might otherwise get lost when attending to details of design and manufacturing processes. Necessary to allocate tolerances for three main reasons: tolerances allow for variations in dimensions of components as manufactured; assembly of two or more components, dimensions lie between specified limits; and part replaced must fit in place.

  15. Preparedness for an anthrax attack.

    PubMed

    Franz, David R

    2009-12-01

    Bacillus anthracis is a long-known bacterial organism with a uniquely stable spore stage. Its stability and the lethal disease which results when the spore is inhaled made it a favorite of state-sponsored biological weapons programs throughout the Cold War era. It is also believed to be high on the list of candidate microbial agents which could be used by terrorist groups or lone actors. Its unique characteristics make protection of humans, especially civilians, from an intentional biological attack very difficult. The author argues that an all-hazards/public health approach - which would also be needed for any natural or deliberate outbreak, no matter the agent - should serve as a foundation of preparation for the specific anthrax countermeasures. Because B. anthracis is a unique organism, specific countermeasures for anthrax detection, diagnostics, prophylaxis and therapy, should be developed in nations or regions where the threat of biological attack is believed to warrant such preparation. Other considerations for a nation interested in anthrax preparedness are discussed.

  16. Shoulder injuries from attacking motion

    NASA Astrophysics Data System (ADS)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  17. Migraine attacks the Basal Ganglia

    PubMed Central

    2011-01-01

    Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human) brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF) to a matched (gender, age, age of onset and type of medication) group of patients whose migraine episodes progressed (HF). Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine. PMID:21936901

  18. Preparedness for an anthrax attack.

    PubMed

    Franz, David R

    2009-12-01

    Bacillus anthracis is a long-known bacterial organism with a uniquely stable spore stage. Its stability and the lethal disease which results when the spore is inhaled made it a favorite of state-sponsored biological weapons programs throughout the Cold War era. It is also believed to be high on the list of candidate microbial agents which could be used by terrorist groups or lone actors. Its unique characteristics make protection of humans, especially civilians, from an intentional biological attack very difficult. The author argues that an all-hazards/public health approach - which would also be needed for any natural or deliberate outbreak, no matter the agent - should serve as a foundation of preparation for the specific anthrax countermeasures. Because B. anthracis is a unique organism, specific countermeasures for anthrax detection, diagnostics, prophylaxis and therapy, should be developed in nations or regions where the threat of biological attack is believed to warrant such preparation. Other considerations for a nation interested in anthrax preparedness are discussed. PMID:19619577

  19. Task allocation among multiple intelligent robots

    NASA Technical Reports Server (NTRS)

    Gasser, L.; Bekey, G.

    1987-01-01

    Researchers describe the design of a decentralized mechanism for allocating assembly tasks in a multiple robot assembly workstation. Currently, the approach focuses on distributed allocation to explore its feasibility and its potential for adaptability to changing circumstances, rather than for optimizing throughput. Individual greedy robots make their own local allocation decisions using both dynamic allocation policies which propagate through a network of allocation goals, and local static and dynamic constraints describing which robots are elibible for which assembly tasks. Global coherence is achieved by proper weighting of allocation pressures propagating through the assembly plan. Deadlock avoidance and synchronization is achieved using periodic reassessments of local allocation decisions, ageing of allocation goals, and short-term allocation locks on goals.

  20. Regulating nutrient allocation in plants

    SciTech Connect

    Udvardi, Michael; Yang, Jiading; Worley, Eric

    2014-12-09

    The invention provides coding and promoter sequences for a VS-1 and AP-2 gene, which affects the developmental process of senescence in plants. Vectors, transgenic plants, seeds, and host cells comprising heterologous VS-1 and AP-2 genes are also provided. Additionally provided are methods of altering nutrient allocation and composition in a plant using the VS-1 and AP-2 genes.

  1. Administrators' Decisions about Resource Allocation

    ERIC Educational Resources Information Center

    Knight, William E.; Folkins, John W.; Hakel, Milton D.; Kennell, Richard P.

    2011-01-01

    Do academic administrators make decisions about resource allocation differently depending on the discipline receiving the funding? Does an administrator's academic identity influence these decisions? This study explored those questions with a sample of 1,690 academic administrators at doctoral-research universities. Participants used fictional…

  2. Report on Tribal Priority Allocations.

    ERIC Educational Resources Information Center

    Bureau of Indian Affairs (Dept. of Interior), Washington, DC.

    As part of Bureau of Indian Affairs (BIA) funding, Tribal Priority Allocations (TPA) are the principal source of funds for tribal governments and agency offices at the reservation level. According to their unique needs and circumstances, tribes may prioritize funding among eight general categories: government, human services, education, public…

  3. The Discipline of Asset Allocation.

    ERIC Educational Resources Information Center

    Petzel, Todd E.

    2000-01-01

    Discussion of asset allocation for college/university endowment funds focuses on three levels of risk: (1) the absolute risk of the portfolio (usually leading to asset diversification); (2) the benchmark risk (usually comparison with peer institutions; and (3) personal career risk (which may incline managers toward maximizing short-term returns,…

  4. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  5. Attack robustness of cascading load model in interdependent networks

    NASA Astrophysics Data System (ADS)

    Wang, Jianwei; Wu, Yuedan; Li, Yun

    2015-08-01

    Considering the weight of a node and the coupled strength of two interdependent nodes in the different networks, we propose a method to assign the initial load of a node and construct a new cascading load model in the interdependent networks. Assuming that a node in one network will fail if its degree is 0 or its dependent node in the other network is removed from the network or the load on it exceeds its capacity, we study the influences of the assortative link (AL) and the disassortative link (DL) patterns between two networks on the robustness of the interdependent networks against cascading failures. For better evaluating the network robustness, from the local perspective of a node we present a new measure to qualify the network resiliency after targeted attacks. We show that the AL patterns between two networks can improve the robust level of the entire interdependent networks. Moreover, we obtain how to efficiently allocate the initial load and select some nodes to be protected so as to maximize the network robustness against cascading failures. In addition, we find that some nodes with the lower load are more likely to trigger the cascading propagation when the distribution of the load is more even, and also give the reasonable explanation. Our findings can help to design the robust interdependent networks and give the reasonable suggestion to optimize the allocation of the protection resources.

  6. "Homicide by heart attack" revisited.

    PubMed

    Turner, Staci A; Barnard, Jeffrey J; Spotswood, Sheila D; Prahlow, Joseph A

    2004-05-01

    The sudden death of a person caused by an arrhythmia that is induced by physical and/or emotional stress provoked by the criminal activity of another person is sometimes referred to as "homicide by heart attack." Published criteria for such an event relate to situations where no physical contact occurs between the perpetrator and the victim. Situations involving physical contact, but with absence of lethal injuries, are frequently treated is a similar fashion by forensic pathologists. Herein, we propose a set of modified criteria, which include cases where physical contact has occurred. Five examples of so-called "homicide by heart attack" are presented, including a 40-year-old man who was struck in the head with a wooden statue, a 74-year-old man who was punched in the jaw by a robber, a 66-year-old woman who was started awake by a home-intruder, a 67-year-old woman who struggled with a would-be purse-snatcher in a parking lot, and a 52-year-old man who was in a physical altercation with a younger man. In each instance, autopsy revealed the presence of severe, underlying heart disease, as well as absence of lethal injuries. In each case, investigative information was such that the emotional and/or physical stress associated with the criminal activity of another individual was deemed contributory to the death. The presumed mechanism of death in each case was a cardiac dysrhythmia related to underlying heart disease, but initiated by the emotional and/or physical stress.

  7. Node ID based detection of Sybil attack in mobile wireless sensor network

    NASA Astrophysics Data System (ADS)

    Sharmila, S.; Umamaheswari, G.

    2013-10-01

    Security is the major issue in wireless sensor networks and many defence mechanisms have been developed to secure the network from these alarming attacks by detecting the malicious nodes which hinder the performance of the network. Sybil attack can make the network vulnerable. Sybil attack means a node which illegitimately claims multiple identities. This attack threatens wireless sensor network in routing, voting system, fair resource allocation, data aggregation and misbehaviour detection. Hence, the research is carried out to prevent the Sybil attack and improve the network performance. The node ID-based scheme is proposed, where the detection is based on node registration, consisting of two phases and the assignment of ID to the node is done dynamically. The ID's corresponding to the nodes registered is at the base station and the node active time is monitored, any abnormalities in the above phases confirm the presence of Sybil nodes in the network. The scheme is simulated using NS2. The energy consumed for this algorithm is 2.3 J. The proposed detection scheme is analysed based on the network's PDR and found that the throughput has improved, which prove that this scheme may be used in the environment where security is needed.

  8. Cued Panic Attacks in Body Dysmorphic Disorder

    PubMed Central

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  9. A Systems Approach for Allocating Educational Space.

    ERIC Educational Resources Information Center

    Florida Univ., Gainesville. Center for Community Needs Assessment.

    A computer simulation model for allocating facilities and physical space is presented as a means of optimally allocating available educational resources. The model allows the decisionmaker to change specific program allocations, system parameters, and other controllable variables in order to determine the effects, both cost and utility, of these…

  10. 40 CFR 74.26 - Allocation formula.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) SULFUR DIOXIDE OPT-INS Allowance Calculations for Combustion Sources § 74.26 Allocation formula. (a) The Administrator will calculate the annual allowance allocation for a combustion source based on the data... 40 Protection of Environment 16 2010-07-01 2010-07-01 false Allocation formula. 74.26 Section...

  11. 49 CFR 262.5 - Allocation requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Allocation requirements. 262.5 Section 262.5... IMPROVEMENT PROJECTS § 262.5 Allocation requirements. At least fifty percent of all grant funds awarded under... than $20,000,000 each. Designated, high-priority projects will be excluded from this allocation...

  12. 39 CFR 3060.12 - Asset allocation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Asset allocation. 3060.12 Section 3060.12 Postal... COMPETITIVE PRODUCTS ENTERPRISE § 3060.12 Asset allocation. Within 6 months of January 23, 2009, and for each... competitive products enterprise using a method of allocation based on appropriate revenue or cost...

  13. 15 CFR 923.110 - Allocation formula.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Allocation formula. 923.110 Section... MANAGEMENT COASTAL ZONE MANAGEMENT PROGRAM REGULATIONS Allocation of Section 306 Program Administration Grants § 923.110 Allocation formula. (a) As required by subsection 306(a), the Secretary may make...

  14. 25 CFR 39.902 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Allocation. 39.902 Section 39.902 Indians BUREAU OF... Maintenance and Minor Repair Fund § 39.902 Allocation. (a) Interim Maintenance and Minor Repair funds shall be... determining school allocations shall be taken from the facilities inventory maintained by the Division...

  15. 24 CFR 945.203 - Allocation plan.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Allocation plan. 945.203 Section... FAMILIES Application and Approval Procedures § 945.203 Allocation plan. (a) Applicable terminology. (1) As used in this section, the terms “initial allocation plan” refers to the PHA's first submission of...

  16. 24 CFR 594.15 - Allocation amounts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Allocation amounts. 594.15 Section... DEVELOPMENT COMMUNITY FACILITIES JOHN HEINZ NEIGHBORHOOD DEVELOPMENT PROGRAM Funding Allocation and Criteria § 594.15 Allocation amounts. (a) Amounts and match requirement. HUD will make grants, in the form...

  17. Communication patterns and allocation strategies.

    SciTech Connect

    Leung, Vitus Joseph; Mache, Jens Wolfgang; Bunde, David P.

    2004-01-01

    Motivated by observations about job runtimes on the CPlant system, we use a trace-driven microsimulator to begin characterizing the performance of different classes of allocation algorithms on jobs with different communication patterns in space-shared parallel systems with mesh topology. We show that relative performance varies considerably with communication pattern. The Paging strategy using the Hilbert space-filling curve and the Best Fit heuristic performed best across several communication patterns.

  18. Minority Transportation Expenditure Allocation Model

    SciTech Connect

    Vyas, Anant D.; Santini, Danilo J.; Marik, Sheri K.

    1993-04-12

    MITRAM (Minority TRansportation expenditure Allocation Model) can project various transportation related attributes of minority (Black and Hispanic) and majority (white) populations. The model projects vehicle ownership, vehicle miles of travel, workers, new car and on-road fleet fuel economy, amount and share of household income spent on gasoline, and household expenditures on public transportation and taxis. MITRAM predicts reactions to sustained fuel price changes for up to 10 years after the change.

  19. The cost of attack in competing networks.

    PubMed

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  20. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting...

  1. Combating Memory Corruption Attacks On Scada Devices

    NASA Astrophysics Data System (ADS)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  2. Methods, media, and systems for detecting attack on a digital processing device

    DOEpatents

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  3. Allocating Variability and Reserve Requirements (Presentation)

    SciTech Connect

    Kirby, B.; King, J.; Milligan, M.

    2011-10-01

    This presentation describes how you could conceivably allocate variability and reserve requirements, including how to allocate aggregation benefits. Conclusions of this presentation are: (1) Aggregation provides benefits because individual requirements are not 100% correlated; (2) Method needed to allocate reduced requirement among participants; (3) Differences between allocation results are subtle - (a) Not immediately obvious which method is 'better'; (b) Many are numerically 'correct', they sum to the physical requirement; (c) Many are not 'fair', Results depend on sub-aggregation and/or the order individuals are included; and (4) Vector allocation method is simple and fair.

  4. An Network Attack Modeling Method Based on MLL-AT

    NASA Astrophysics Data System (ADS)

    Fen, Yan; Xinchun, Yin; Hao, Huang

    In this paper, the method of modeling attack using attack tree is researched. The main goal is effectively using attack tree to model and express multi-stage network attacks. We expand and improve the traditional attack tree. The attack nodes in traditional attack tree are redefined, and the attack risk of leaf node is quantified. On those basis, the mentality and method of building MLL-AT (Multi-Level & Layer Attack Tree) are proposed. The improved attack tree can model attack more accurately, in particular to multi-stage network attacks. And the new model can also be used to evaluate system's risk, to distinguish between varying system security threat degrees caused by different attack sequences.

  5. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  6. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    NASA Astrophysics Data System (ADS)

    Muramatsu, Daigo

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  7. 40 CFR 96.53 - Recordation of NOX allowance allocations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... PROGRAMS (CONTINUED) NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS FOR STATE... allocated to an allocation set-aside. (c) Serial numbers for allocated NO X allowances. When allocating...

  8. 40 CFR 96.53 - Recordation of NOX allowance allocations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PROGRAMS (CONTINUED) NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO 2 TRADING PROGRAMS FOR STATE... allocated to an allocation set-aside. (c) Serial numbers for allocated NO X allowances. When allocating...

  9. 45 CFR 402.31 - Determination of allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ASSISTANCE GRANTS State Allocations § 402.31 Determination of allocations. (a) Allocation formula. Allocations will be computed according to a formula using the following factors and weights: (1) 50...

  10. 45 CFR 402.31 - Determination of allocations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... State Allocations § 402.31 Determination of allocations. (a) Allocation formula. Allocations will be computed according to a formula using the following factors and weights: (1) 50 percent based on the...

  11. Attack detection in unattended sensor networks

    NASA Astrophysics Data System (ADS)

    Wu, Curt; Monnier, Camille; Fry, Gerald; Girod, Lewis; Luke, Jahn

    2010-04-01

    Because sensor networks are often deployed in hostile environments where their security and integrity may be compromised, it is essential to maximize the reliability and trustworthiness of existing and envisioned sensor networks. During operations, the sensor network must be robust to deception, node compromise, and various other attacks, while maintaining the operator's situational awareness regarding the health and integrity of the system. To address these needs, we have designed a Framework to Ensure and Assess Trustworthiness in Sensor systems (FEATS) to identify attacks on sensor system integrity and inform the operator of sensor data trustworthiness. We have developed and validated unsupervised anomaly detection algorithms for sensor data captured from an experimental acoustic sensor platform under a number of attack scenarios. The platform, which contains four audio microphones, was exposed to two physical attacks (audio filtering and audio playback) as well as a live replay attack (replaying live audio data that is captured at a remote location), which is analogous to a wormhole attack in the routing layer. With our unsupervised learning algorithms, we were able to successfully identify the presence of various attacks.

  12. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  13. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  14. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  15. 10 CFR 217.53 - Types of allocation orders.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Types of allocation orders. 217.53 Section 217.53 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Allocation Actions § 217.53 Types of allocation orders. There are three types of allocation orders available for communicating allocation...

  16. Resource allocation using constraint propagation

    NASA Technical Reports Server (NTRS)

    Rogers, John S.

    1990-01-01

    The concept of constraint propagation was discussed. Performance increases are possible with careful application of these constraint mechanisms. The degree of performance increase is related to the interdependence of the different activities resource usage. Although this method of applying constraints to activities and resources is often beneficial, it is obvious that this is no panacea cure for the computational woes that are experienced by dynamic resource allocation and scheduling problems. A combined effort for execution optimization in all areas of the system during development and the selection of the appropriate development environment is still the best method of producing an efficient system.

  17. Constrained Allocation Flux Balance Analysis.

    PubMed

    Mori, Matteo; Hwa, Terence; Martin, Olivier C; De Martino, Andrea; Marinari, Enzo

    2016-06-01

    New experimental results on bacterial growth inspire a novel top-down approach to study cell metabolism, combining mass balance and proteomic constraints to extend and complement Flux Balance Analysis. We introduce here Constrained Allocation Flux Balance Analysis, CAFBA, in which the biosynthetic costs associated to growth are accounted for in an effective way through a single additional genome-wide constraint. Its roots lie in the experimentally observed pattern of proteome allocation for metabolic functions, allowing to bridge regulation and metabolism in a transparent way under the principle of growth-rate maximization. We provide a simple method to solve CAFBA efficiently and propose an "ensemble averaging" procedure to account for unknown protein costs. Applying this approach to modeling E. coli metabolism, we find that, as the growth rate increases, CAFBA solutions cross over from respiratory, growth-yield maximizing states (preferred at slow growth) to fermentative states with carbon overflow (preferred at fast growth). In addition, CAFBA allows for quantitatively accurate predictions on the rate of acetate excretion and growth yield based on only 3 parameters determined by empirical growth laws.

  18. Constrained Allocation Flux Balance Analysis.

    PubMed

    Mori, Matteo; Hwa, Terence; Martin, Olivier C; De Martino, Andrea; Marinari, Enzo

    2016-06-01

    New experimental results on bacterial growth inspire a novel top-down approach to study cell metabolism, combining mass balance and proteomic constraints to extend and complement Flux Balance Analysis. We introduce here Constrained Allocation Flux Balance Analysis, CAFBA, in which the biosynthetic costs associated to growth are accounted for in an effective way through a single additional genome-wide constraint. Its roots lie in the experimentally observed pattern of proteome allocation for metabolic functions, allowing to bridge regulation and metabolism in a transparent way under the principle of growth-rate maximization. We provide a simple method to solve CAFBA efficiently and propose an "ensemble averaging" procedure to account for unknown protein costs. Applying this approach to modeling E. coli metabolism, we find that, as the growth rate increases, CAFBA solutions cross over from respiratory, growth-yield maximizing states (preferred at slow growth) to fermentative states with carbon overflow (preferred at fast growth). In addition, CAFBA allows for quantitatively accurate predictions on the rate of acetate excretion and growth yield based on only 3 parameters determined by empirical growth laws. PMID:27355325

  19. Latent IBP Compound Dirichlet Allocation.

    PubMed

    Archambeau, Cedric; Lakshminarayanan, Balaji; Bouchard, Guillaume

    2015-02-01

    We introduce the four-parameter IBP compound Dirichlet process (ICDP), a stochastic process that generates sparse non-negative vectors with potentially an unbounded number of entries. If we repeatedly sample from the ICDP we can generate sparse matrices with an infinite number of columns and power-law characteristics. We apply the four-parameter ICDP to sparse nonparametric topic modelling to account for the very large number of topics present in large text corpora and the power-law distribution of the vocabulary of natural languages. The model, which we call latent IBP compound Dirichlet allocation (LIDA), allows for power-law distributions, both, in the number of topics summarising the documents and in the number of words defining each topic. It can be interpreted as a sparse variant of the hierarchical Pitman-Yor process when applied to topic modelling. We derive an efficient and simple collapsed Gibbs sampler closely related to the collapsed Gibbs sampler of latent Dirichlet allocation (LDA), making the model applicable in a wide range of domains. Our nonparametric Bayesian topic model compares favourably to the widely used hierarchical Dirichlet process and its heavy tailed version, the hierarchical Pitman-Yor process, on benchmark corpora. Experiments demonstrate that accounting for the power-distribution of real data is beneficial and that sparsity provides more interpretable results. PMID:26353244

  20. Constrained Allocation Flux Balance Analysis

    PubMed Central

    Mori, Matteo; Hwa, Terence; Martin, Olivier C.

    2016-01-01

    New experimental results on bacterial growth inspire a novel top-down approach to study cell metabolism, combining mass balance and proteomic constraints to extend and complement Flux Balance Analysis. We introduce here Constrained Allocation Flux Balance Analysis, CAFBA, in which the biosynthetic costs associated to growth are accounted for in an effective way through a single additional genome-wide constraint. Its roots lie in the experimentally observed pattern of proteome allocation for metabolic functions, allowing to bridge regulation and metabolism in a transparent way under the principle of growth-rate maximization. We provide a simple method to solve CAFBA efficiently and propose an “ensemble averaging” procedure to account for unknown protein costs. Applying this approach to modeling E. coli metabolism, we find that, as the growth rate increases, CAFBA solutions cross over from respiratory, growth-yield maximizing states (preferred at slow growth) to fermentative states with carbon overflow (preferred at fast growth). In addition, CAFBA allows for quantitatively accurate predictions on the rate of acetate excretion and growth yield based on only 3 parameters determined by empirical growth laws. PMID:27355325

  1. Thatcher condemns attacks on abortion mp.

    PubMed

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  2. Recovery of infrastructure networks after localised attacks

    NASA Astrophysics Data System (ADS)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  3. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  4. Diabetes - preventing heart attack and stroke

    MedlinePlus

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  5. Identifying and Analyzing Web Server Attacks

    SciTech Connect

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  6. Recovery of infrastructure networks after localised attacks

    PubMed Central

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  7. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  8. Correlations in complex networks under attack.

    PubMed

    Srivastava, Animesh; Mitra, Bivas; Ganguly, Niloy; Peruani, Fernando

    2012-09-01

    For any initially correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initially assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initially uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations. PMID:23030979

  9. Death by attack from a domestic buffalo.

    PubMed

    Bakkannavar, Shankar M; Monteiro, Francis N P; Bhagavath, Prashantha; Pradeep Kumar, G

    2010-02-01

    Attacks on humans by domestic animals causing fatal injuries are not uncommon in rural areas of India. But injuries due to buffalo gore are rarely observed in villages and are different from other casualties like stab injuries, road fatalities, etc. As the victims of buffalo attack are usually recovered from the fields or forest, the investigating officer could be mislead as to the nature of infliction of fatal injuries to a possible homicide. The injuries caused by the horns of buffaloes are of various shapes, sizes and directions. They are violent and goring in nature. The wound sustained may be contusions, lacerations, criss-cross wounds, penetration of body cavities, and sometimes fractures. In the absence of any eye witness, it becomes very difficult to believe the unsuspecting domestic water buffalo as attacker. This case is reported for its rarity, for the awareness of the possible injuries in such unnatural deaths, and factors predisposing to a buffalo attack.

  10. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  11. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  12. Heart Attack - Multiple Languages: MedlinePlus

    MedlinePlus

    ... Arabic) النوبة القلبية - العربية Bilingual PDF Health Information Translations Bosnian (Bosanski) Heart Attack Srčani udar - Bosanski (Bosnian) Bilingual PDF Health Information Translations Chinese - Simplified (简体中文) Heart Attack 心脏病发作 - 简体中文 (Chinese - ...

  13. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  14. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  15. An intelligent allocation algorithm for parallel processing

    NASA Technical Reports Server (NTRS)

    Carroll, Chester C.; Homaifar, Abdollah; Ananthram, Kishan G.

    1988-01-01

    The problem of allocating nodes of a program graph to processors in a parallel processing architecture is considered. The algorithm is based on critical path analysis, some allocation heuristics, and the execution granularity of nodes in a program graph. These factors, and the structure of interprocessor communication network, influence the allocation. To achieve realistic estimations of the executive durations of allocations, the algorithm considers the fact that nodes in a program graph have to communicate through varying numbers of tokens. Coarse and fine granularities have been implemented, with interprocessor token-communication duration, varying from zero up to values comparable to the execution durations of individual nodes. The effect on allocation of communication network structures is demonstrated by performing allocations for crossbar (non-blocking) and star (blocking) networks. The algorithm assumes the availability of as many processors as it needs for the optimal allocation of any program graph. Hence, the focus of allocation has been on varying token-communication durations rather than varying the number of processors. The algorithm always utilizes as many processors as necessary for the optimal allocation of any program graph, depending upon granularity and characteristics of the interprocessor communication network.

  16. Computational models and resource allocation for supercomputers

    NASA Technical Reports Server (NTRS)

    Mauney, Jon; Agrawal, Dharma P.; Harcourt, Edwin A.; Choe, Young K.; Kim, Sukil

    1989-01-01

    There are several different architectures used in supercomputers, with differing computational models. These different models present a variety of resource allocation problems that must be solved. The computational needs of a program must be cast in terms of the computational model supported by the supercomputer, and this must be done in a way that makes effective use of the machine's resources. This is the resource allocation problem. The computational models of available supercomputers and the associated resource allocation techniques are surveyed. It is shown that many problems and solutions appear repeatedly in very different computing environments. Some case studies are presented, showing concrete computational models and the allocation strategies used.

  17. Divergence in plant and microbial allocation strategies explains continental patterns in microbial allocation and biogeochemical fluxes.

    PubMed

    Averill, Colin

    2014-10-01

    Allocation trade-offs shape ecological and biogeochemical phenomena at local to global scale. Plant allocation strategies drive major changes in ecosystem carbon cycling. Microbial allocation to enzymes that decompose carbon vs. organic nutrients may similarly affect ecosystem carbon cycling. Current solutions to this allocation problem prioritise stoichiometric tradeoffs implemented in plant ecology. These solutions may not maximise microbial growth and fitness under all conditions, because organic nutrients are also a significant carbon resource for microbes. I created multiple allocation frameworks and simulated microbial growth using a microbial explicit biogeochemical model. I demonstrate that prioritising stoichiometric trade-offs does not optimise microbial allocation, while exploiting organic nutrients as carbon resources does. Analysis of continental-scale enzyme data supports the allocation patterns predicted by this framework, and modelling suggests large deviations in soil C loss based on which strategy is implemented. Therefore, understanding microbial allocation strategies will likely improve our understanding of carbon cycling and climate.

  18. Constant time worker thread allocation via configuration caching

    DOEpatents

    Eichenberger, Alexandre E; O'Brien, John K. P.

    2014-11-04

    Mechanisms are provided for allocating threads for execution of a parallel region of code. A request for allocation of worker threads to execute the parallel region of code is received from a master thread. Cached thread allocation information identifying prior thread allocations that have been performed for the master thread are accessed. Worker threads are allocated to the master thread based on the cached thread allocation information. The parallel region of code is executed using the allocated worker threads.

  19. Pathologic features of fatal shark attacks.

    PubMed

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  20. Defending against ballistic missile attacks

    SciTech Connect

    Frelk, J.J.; Tait, G.E.

    1990-01-01

    This book is a compendium of information on the proliferation of ballistic missiles and other defense issues. This volume describes recent SDI advances in crystal clear language. It explains how the marriage of ultra-compact electronics and rocketry has created the smart bullet or brilliant pebble--a projectile with a tiny but powerful compute brain. The brilliant pebble tracks it target by sensing the heat the target emits, as a snake does when tracking a small mammal. Then, guided by its miniaturized computer brain, the brilliant pebble steers itself into the target and destroys it by force of the impact. In this latest form, the brilliant pebble even has the ability to take sightings on the stars, setting its course by celestial navigation.

  1. Coronary Artery Dissection: Not Just a Heart Attack

    MedlinePlus

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  2. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  4. How to Do Random Allocation (Randomization)

    PubMed Central

    Shin, Wonshik

    2014-01-01

    Purpose To explain the concept and procedure of random allocation as used in a randomized controlled study. Methods We explain the general concept of random allocation and demonstrate how to perform the procedure easily and how to report it in a paper. PMID:24605197

  5. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 3 2011-01-01 2011-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  6. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  7. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  8. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  9. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  10. Thematic Mapper data for forest resource allocation

    NASA Technical Reports Server (NTRS)

    Zeff, Ilene S.; Merry, Carolyn J.

    1993-01-01

    A technique for classifying a Landsat Thematic Mapper image was demonstrated on the Wayne National Forest of southeastern Ohio. The classified image was integrated into a geographic information system database, and prescriptive forest land use allocation models were developed using the techniques of cartographic modeling. Timber harvest sites and accompanying haul roads were allocated.

  11. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  12. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  13. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  14. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  15. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  16. 45 CFR 304.15 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... FEDERAL FINANCIAL PARTICIPATION § 304.15 Cost allocation. A State agency in support of its claims under title IV-D of the Social Security Act must have an approved cost allocation plan on file with the Department in accordance with the requirements contained in Subpart E of 45 CFR part 95. Subpart E also...

  17. 45 CFR 304.15 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... FEDERAL FINANCIAL PARTICIPATION § 304.15 Cost allocation. A State agency in support of its claims under title IV-D of the Social Security Act must have an approved cost allocation plan on file with the Department in accordance with the requirements contained in Subpart E of 45 CFR part 95. Subpart E also...

  18. Resource Allocation in Classrooms. Final Report.

    ERIC Educational Resources Information Center

    Thomas, J. Alan

    This report deals with the allocation of resources within classrooms and homes. It is based on the assumption that learning occurs through a set of processes that require the utilization of human and material resources. It is assumed that the study of resource allocation at the micro level will help provide an understanding of the effect on…

  19. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  20. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  1. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare Department of Health and Human Services GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  2. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  3. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  4. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Foreign Fishing § 600.517 Allocations. The...

  5. 24 CFR 594.15 - Allocation amounts.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 3 2011-04-01 2010-04-01 true Allocation amounts. 594.15 Section... § 594.15 Allocation amounts. (a) Amounts and match requirement. HUD will make grants, in the form of... for less than the maximum amount established by statute, and to limit the number of times a...

  6. 45 CFR 304.15 - Cost allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Welfare Regulations Relating to Public Welfare OFFICE OF CHILD SUPPORT ENFORCEMENT (CHILD SUPPORT... FEDERAL FINANCIAL PARTICIPATION § 304.15 Cost allocation. A State agency in support of its claims under title IV-D of the Social Security Act must have an approved cost allocation plan on file with...

  7. Acquisitions Allocations: Fairness, Equity and Bundled Pricing.

    ERIC Educational Resources Information Center

    Packer, Donna

    2001-01-01

    Examined the effect of an interdisciplinary Web-based citation database with full text, the ProQuest Research Library, on the Western State University library's acquisitions allocation plan. Used list price of full-text journals to calculate increases in acquisitions funding. A list of articles discussing formula allocation is appended.…

  8. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... PCGFMP. Allocation of black rockfish is described in paragraph (l) of this section. Allocation of Pacific... RF North of 40°10′ N. lat. 81 18 Minor Slope RF South of 40°10′ N. lat. 63 37 Dover Sole 95 5 English... through the biennial harvest specifications and management measures process. (k) (l) Black...

  9. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... PCGFMP. Allocation of black rockfish is described in paragraph (l) of this section. Allocation of Pacific... RF North of 40°10′ N. lat. 81 18 Minor Slope RF South of 40°10′ N. lat. 63 37 Dover Sole 95 5 English... through the biennial harvest specifications and management measures process. (k) (l) Black...

  10. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... PCGFMP. Allocation of black rockfish is described in paragraph (l) of this section. Allocation of Pacific... Dover Sole 95 5 English Sole 95 5 Petrale Sole 95 5 Arrowtooth Flounder 95 5 Starry Flounder 50 50 Other... measures process. (l) Black rockfish harvest guideline. The commercial tribal harvest guideline for...

  11. 44 CFR 304.4 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Allocations. 304.4 Section 304.4 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS CONSOLIDATED GRANTS TO INSULAR AREAS § 304.4 Allocations. For each Federal...

  12. 23 CFR 660.107 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Allocations. 660.107 Section 660.107 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION ENGINEERING AND TRAFFIC OPERATIONS SPECIAL PROGRAMS (DIRECT FEDERAL) Forest Highways § 660.107 Allocations. On October 1 of each fiscal year, the FHWA...

  13. 15 CFR 336.4 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Allocation. 336.4 Section 336.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) INTERNATIONAL... § 336.4 Allocation. (a) The Tariff Rate Quota licenses will be issued to eligible manufacturers on...

  14. 48 CFR 5452.249 - Allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Allocation. 5452.249 Section 5452.249 Federal Acquisition Regulations System DEFENSE LOGISTICS AGENCY, DEPARTMENT OF DEFENSE SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 5452.249 Allocation. The...

  15. 48 CFR 5452.249 - Allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Allocation. 5452.249 Section 5452.249 Federal Acquisition Regulations System DEFENSE LOGISTICS AGENCY, DEPARTMENT OF DEFENSE SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 5452.249 Allocation. The...

  16. 48 CFR 5452.249 - Allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 7 2011-10-01 2011-10-01 false Allocation. 5452.249 Section 5452.249 Federal Acquisition Regulations System DEFENSE LOGISTICS AGENCY, DEPARTMENT OF DEFENSE SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 5452.249 Allocation. The...

  17. 45 CFR 205.150 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ASSISTANCE PROGRAMS § 205.150 Cost allocation. A State plan under title I, IV-A, X, XIV, or XVI (AABD) of the Social Security Act must provide that the State agency will have an approved cost allocation plan on file with the Department in accordance with the requirements contained in subpart E of 45 CFR part...

  18. Resource Allocation in Public Research Universities

    ERIC Educational Resources Information Center

    Santos, Jose L.

    2007-01-01

    The purpose of this study was to conduct an econometric analysis of internal resource allocation. Two theories are used for this study of resource allocation in public research universities, and these are: (1) Theory of the Firm; and (2) Resource Dependence Theory. This study used the American Association of Universities Data Exchange (AAUDE)…

  19. 42 CFR 457.228 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... accordance with the requirements contained in subpart E of 45 CFR part 95. Subpart E also sets forth the... 42 Public Health 4 2011-10-01 2011-10-01 false Cost allocation. 457.228 Section 457.228 Public...; Reduction of Federal Medical Payments § 457.228 Cost allocation. A State plan must provide that the...

  20. 42 CFR 433.34 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Department in accordance with the requirements contained in subpart E of 45 CFR part 95. Subpart E also sets... 42 Public Health 4 2011-10-01 2011-10-01 false Cost allocation. 433.34 Section 433.34 Public... Provisions § 433.34 Cost allocation. A State plan under Title XIX of the Social Security Act must...

  1. Rethinking Reinforcement: Allocation, Induction, and Contingency

    ERIC Educational Resources Information Center

    Baum, William M.

    2012-01-01

    The concept of reinforcement is at least incomplete and almost certainly incorrect. An alternative way of organizing our understanding of behavior may be built around three concepts: "allocation," "induction," and "correlation." Allocation is the measure of behavior and captures the centrality of choice: All behavior entails choice and consists of…

  2. Making sense of peak load cost allocations

    SciTech Connect

    Power, T.M.

    1995-03-15

    When it comes to cost allocation, common wisdom assigns costs in proportion to class contributions to peak loads, The justification is simple: Since the equipment had to be sized to meet peak day loads, those costs should be allocated on the same basis. Many different peak allocators have been developed on this assumption: single coincident peak contribution, sum of coincident peaks, noncoincident peak, average and excess demand, peak and average demand, base and extra capacity, and so on. Such pure peak-load allocators may not be politically acceptable, but conceptually, at least, they appear to offer the only defensible approach. Nevertheless, where capacity can be added with significant economies of scale, making cost allocations in proportion to peak loads violates well-known relationships between economics and engineering. What is missing is any tracing of the way in which the peak-load design criteria actually influence the cost incurred.

  3. 49 CFR 33.53 - Types of allocation orders.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Allocation Actions § 33.53 Types of allocation orders. There are three types of allocation orders available for communicating allocation actions. These are: (a) Set-aside: An official action that requires a... 49 Transportation 1 2013-10-01 2013-10-01 false Types of allocation orders. 33.53 Section...

  4. 7 CFR 761.205 - Computing the formula allocation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Computing the formula allocation. 761.205 Section 761... Funds to State Offices § 761.205 Computing the formula allocation. (a) The formula allocation for FO, CL... program that the National Office allocates to a State Office. formula allocation = (amount available...

  5. Characterization of attacks on public telephone networks

    NASA Astrophysics Data System (ADS)

    Lorenz, Gary V.; Manes, Gavin W.; Hale, John C.; Marks, Donald; Davis, Kenneth; Shenoi, Sujeet

    2001-02-01

    The U.S. Public Telephone Network (PTN) is a massively connected distributed information systems, much like the Internet. PTN signaling, transmission and operations functions must be protected from physical and cyber attacks to ensure the reliable delivery of telecommunications services. The increasing convergence of PTNs with wireless communications systems, computer networks and the Internet itself poses serious threats to our nation's telecommunications infrastructure. Legacy technologies and advanced services encumber well-known and as of yet undiscovered vulnerabilities that render them susceptible to cyber attacks. This paper presents a taxonomy of cyber attacks on PTNs in converged environments that synthesizes exploits in computer and communications network domains. The taxonomy provides an opportunity for the systematic exploration of mitigative and preventive strategies, as well as for the identification and classification of emerging threats.

  6. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  7. A Traceability Attack against e-Passports

    NASA Astrophysics Data System (ADS)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  8. Resistance of the double random phase encryption against various attacks.

    PubMed

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-01

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  9. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    NASA Astrophysics Data System (ADS)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  10. Counterfactual attack on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wnang, Jian; Tang, Chao Jing

    2012-05-01

    It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.

  11. Identifying inference attacks against healthcare data repositories

    PubMed Central

    Vaidya, Jaideep; Shafiq, Basit; Jiang, Xiaoqian; Ohno-Machado, Lucila

    Health care data repositories play an important role in driving progress in medical research. Finding new pathways to discovery requires having adequate data and relevant analysis. However, it is critical to ensure the privacy and security of the stored data. In this paper, we identify a dangerous inference attack against naive suppression based approaches that are used to protect sensitive information. We base our attack on the querying system provided by the Healthcare Cost and Utilization Project, though it applies in general to any medical database providing a query capability. We also discuss potential solutions to this problem. PMID:24303279

  12. Differential attack on mini-AES

    NASA Astrophysics Data System (ADS)

    Ajeng Gemellia, Asadini Dwi; Indarjani, Santi

    2012-05-01

    This paper presents the results of differential attack on Mini-AES algorithm. The differential trails are constructed using all combinations of propagation ratio without repetition. To give practical results, we implement the key extraction for differential characteristics which have the highest and lowest probability as a comparison. Based on total propagation ratio and complexity resulted, Mini-AES algorithms are vulnerable to differential attack. The best differential characteristic is the differential characteristic using a single active s-box with the propagation ratio of 8 / 16.

  13. Control Allocation with Load Balancing

    NASA Technical Reports Server (NTRS)

    Bodson, Marc; Frost, Susan A.

    2009-01-01

    Next generation aircraft with a large number of actuators will require advanced control allocation methods to compute the actuator commands needed to follow desired trajectories while respecting system constraints. Previously, algorithms were proposed to minimize the l1 or l2 norms of the tracking error and of the actuator deflections. The paper discusses the alternative choice of the l(infinity) norm, or sup norm. Minimization of the control effort translates into the minimization of the maximum actuator deflection (min-max optimization). The paper shows how the problem can be solved effectively by converting it into a linear program and solving it using a simplex algorithm. Properties of the algorithm are also investigated through examples. In particular, the min-max criterion results in a type of load balancing, where the load is th desired command and the algorithm balances this load among various actuators. The solution using the l(infinity) norm also results in better robustness to failures and to lower sensitivity to nonlinearities in illustrative examples.

  14. Two Reconfigurable Flight-Control Design Methods: Robust Servomechanism and Control Allocation

    NASA Technical Reports Server (NTRS)

    Burken, John J.; Lu, Ping; Wu, Zheng-Lu; Bahm, Cathy

    2001-01-01

    Two methods for control system reconfiguration have been investigated. The first method is a robust servomechanism control approach (optimal tracking problem) that is a generalization of the classical proportional-plus-integral control to multiple input-multiple output systems. The second method is a control-allocation approach based on a quadratic programming formulation. A globally convergent fixed-point iteration algorithm has been developed to make onboard implementation of this method feasible. These methods have been applied to reconfigurable entry flight control design for the X-33 vehicle. Examples presented demonstrate simultaneous tracking of angle-of-attack and roll angle commands during failures of the fight body flap actuator. Although simulations demonstrate success of the first method in most cases, the control-allocation method appears to provide uniformly better performance in all cases.

  15. Dynamically allocating sets of fine-grained processors to running computations

    NASA Technical Reports Server (NTRS)

    Middleton, David

    1988-01-01

    Researchers explore an approach to using general purpose parallel computers which involves mapping hardware resources onto computations instead of mapping computations onto hardware. Problems such as processor allocation, task scheduling and load balancing, which have traditionally proven to be challenging, change significantly under this approach and may become amenable to new attacks. Researchers describe the implementation of this approach used by the FFP Machine whose computation and communication resources are repeatedly partitioned into disjoint groups that match the needs of available tasks from moment to moment. Several consequences of this system are examined.

  16. Shift-invariant target in allocation problems.

    PubMed

    Mandal, Saumen; Biswas, Atanu

    2014-07-10

    We provide a template for finding target allocation proportions in optimal allocation designs where the target will be invariant for both shifts in location and scale of the response distributions. One possible application of such target allocation proportions is to carry out a response-adaptive allocation. While most of the existing designs are invariant for any change in scale of the underlying distributions, they are not location invariant in most of the cases. First, we indicate this serious flaw in the existing literature and illustrate how this lack of location invariance makes the performance of the designs very poor in terms of allocation for any drastic change in location, such as the changes from degrees centigrade to degrees Fahrenheit. We illustrate that unless a target allocation is location invariant, it might lead to a completely irrelevant and useless target for allocation. Then we discuss how such location invariance can be achieved for general continuous responses. We illustrate the proposed method using some real clinical trial data. We also indicate the possible extension of the procedure for more than two treatments at hand and in the presence of covariates.

  17. 47 CFR 76.924 - Allocation to service cost categories.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... allocator has been specified by the Commission are to be allocated among the service cost categories and the... analysis is not possible, common costs for which no allocator has been specified by the Commission...

  18. 47 CFR 76.924 - Allocation to service cost categories.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... allocator has been specified by the Commission are to be allocated among the service cost categories and the... analysis is not possible, common costs for which no allocator has been specified by the Commission...

  19. 47 CFR 76.924 - Allocation to service cost categories.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... allocator has been specified by the Commission are to be allocated among the service cost categories and the... analysis is not possible, common costs for which no allocator has been specified by the Commission...

  20. Linear modelling of attentional resource allocation

    NASA Technical Reports Server (NTRS)

    Pierce, B.

    1978-01-01

    Eight subjects time-shared performance of two compensatory tracking tasks under conditions when both were of constant difficulty, and when the control order of one task (designated primary) was varied over time within a trial. On line performance feedback was presented on half of the trials. The data are interpreted in terms of a linear model of the operator's attention allocation system, and suggest that this allocation is strongly suboptimal. Furthermore, the limitations in reallocating attentional resources between tasks, in response to difficulty fluctuations were not reduced by augmented performance feedback. Some characteristics of the allocation system are described, and reasons for its limitations suggested.

  1. Resource allocation framework for heterogeneous SPMD interactive television environments

    NASA Astrophysics Data System (ADS)

    Hensgen, Debra A.

    2001-07-01

    A framework for autonomously controlling resource allocation at the application level in a distributed, heterogeneous multi-tasking SPMD environment called Operator-controlled, distributed resource allocation is motivated and described. The environment requiring such resource allocation is typified by the interactive television environment. In an interactive television environment, applications that are intended to execute within a virtual machine environment on a viewer's integrated receiver decoder (IRD), are encoded and broadcast with the audio-video television program. Different viewers make different choices to cause the application, which is identically downloaded to each IRD, to execute differently, hence comprising a multi-tasking SPMD environment. In current deployments, the IRDs are furnished by the operator who ensures that each IRD has sufficient resources to execute each and every program that is broadcast concurrently; hence, two viewers making exactly the same choices will execute the downloaded application identically. In the future, IRDs are expected to be available at retail stores, purchased by consumers that may choose more or less functionality so long as the IRD has the minimally acceptable functionality according to standards that are currently being developed by the middleware and consumer electronics vendors in conjunction with broadcasters and MSOs.

  2. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  3. Triage of casualties after nuclear attack.

    PubMed

    Pledger, H G

    1986-09-20

    Casualties from a nuclear attack on the United Kingdom would overwhelm the health services, and health workers would be faced with many more people seeking help than could be offered treatment. Discussion is needed to determine which methods of medical and non-medical triage would be acceptable and feasible.

  4. The anthrax attacks 10 years later.

    PubMed

    Bush, Larry M; Perez, Maria T

    2012-01-01

    Ten years ago, just weeks after the September 11 attacks, the United States experienced a deliberate act of bioterrorism. Through use of the postal service, anthrax spores were widely disseminated, including to homes, the Senate, and major newsrooms, resulting in morbidity and mortality and effectively disrupting our way of life and revealing our vulnerability. Even though such attacks had been the subject of much writing and had been planned for, detection of and the appropriate response to an attack with an agent from the so-called "Category 'A' List" had only been considered in theoretical terms. What transpired during the following difficult weeks, including how public health and federal government agencies performed, has been both praised and criticized. An intertwined epidemiologic and criminal investigation of such magnitude was unprecedented in U.S. history. To address the question of whether we as a nation are now better prepared for future threats involving biologic agents, it is important to learn from the lessons of the 2001 anthrax attacks, including the critical role of clinicians in surveillance. As physicians involved in diagnosing anthrax in the index case and alerting authorities, we offer our perspective on these events a decade after their occurrence. PMID:21969275

  5. CASE STUDY: DIELDRIN ATTACK IN DALYAN LAGOON

    EPA Science Inventory

    During the first two weeks of December 2005, NATO sponsored an Advanced Study Institute (ASI) in Istanbul, Turkey. Part of this ASI involved a case study of a terrorist attack, where a chemical was assumed to be dumped into Sulunger Lake in Turkey. This chapter documents the re...

  6. Intrusion-Tolerant Replication under Attack

    ERIC Educational Resources Information Center

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  7. Rhode Island School Terrorist Attack Preparedness

    ERIC Educational Resources Information Center

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  8. Shark Attack! Sinking Your Teeth into Anatomy.

    ERIC Educational Resources Information Center

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  9. Association between Terror Attacks and Suicide Attempts

    ERIC Educational Resources Information Center

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  10. Union, States Wage Frontal Attack on NCLB

    ERIC Educational Resources Information Center

    Keller, Bess; Sack, Joetta L.

    2005-01-01

    Widespread sniping at the Bush administration's centerpiece education law escalated into a frontal attack as the nation's largest teachers' union. Several school districts sued federal officials over the measure, just a day after the Utah legislature approved a bill challenging the reach of the law. The National Education Association's suit…

  11. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  12. Recovery of human remains after shark attack.

    PubMed

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  13. Medical mitigation model: quantifying the benefits of the public health response to a chemical terrorism attack.

    PubMed

    Good, Kevin; Winkel, David; VonNiederhausern, Michael; Hawkins, Brian; Cox, Jessica; Gooding, Rachel; Whitmire, Mark

    2013-06-01

    The Chemical Terrorism Risk Assessment (CTRA) and Chemical Infrastructure Risk Assessment (CIRA) are programs that estimate the risk of chemical terrorism attacks to help inform and improve the US defense posture against such events. One aspect of these programs is the development and advancement of a Medical Mitigation Model-a mathematical model that simulates the medical response to a chemical terrorism attack and estimates the resulting number of saved or benefited victims. At the foundation of the CTRA/CIRA Medical Mitigation Model is the concept of stock-and-flow modeling; "stocks" are states that individuals progress through during the event, while "flows" permit and govern movement from one stock to another. Using this approach, the model is able to simulate and track individual victims as they progress from exposure to an end state. Some of the considerations in the model include chemical used, type of attack, route and severity of exposure, response-related delays, detailed treatment regimens with efficacy defined as a function of time, medical system capacity, the influx of worried well individuals, and medical countermeasure availability. As will be demonstrated, the output of the CTRA/CIRA Medical Mitigation Model makes it possible to assess the effectiveness of the existing public health response system and develop and examine potential improvement strategies. Such a modeling and analysis capability can be used to inform first-responder actions/training, guide policy decisions, justify resource allocation, and direct knowledge-gap studies.

  14. Medical mitigation model: quantifying the benefits of the public health response to a chemical terrorism attack.

    PubMed

    Good, Kevin; Winkel, David; VonNiederhausern, Michael; Hawkins, Brian; Cox, Jessica; Gooding, Rachel; Whitmire, Mark

    2013-06-01

    The Chemical Terrorism Risk Assessment (CTRA) and Chemical Infrastructure Risk Assessment (CIRA) are programs that estimate the risk of chemical terrorism attacks to help inform and improve the US defense posture against such events. One aspect of these programs is the development and advancement of a Medical Mitigation Model-a mathematical model that simulates the medical response to a chemical terrorism attack and estimates the resulting number of saved or benefited victims. At the foundation of the CTRA/CIRA Medical Mitigation Model is the concept of stock-and-flow modeling; "stocks" are states that individuals progress through during the event, while "flows" permit and govern movement from one stock to another. Using this approach, the model is able to simulate and track individual victims as they progress from exposure to an end state. Some of the considerations in the model include chemical used, type of attack, route and severity of exposure, response-related delays, detailed treatment regimens with efficacy defined as a function of time, medical system capacity, the influx of worried well individuals, and medical countermeasure availability. As will be demonstrated, the output of the CTRA/CIRA Medical Mitigation Model makes it possible to assess the effectiveness of the existing public health response system and develop and examine potential improvement strategies. Such a modeling and analysis capability can be used to inform first-responder actions/training, guide policy decisions, justify resource allocation, and direct knowledge-gap studies. PMID:22744439

  15. Optimal Resource Allocation in Library Systems

    ERIC Educational Resources Information Center

    Rouse, William B.

    1975-01-01

    Queueing theory is used to model processes as either waiting or balking processes. The optimal allocation of resources to these processes is defined as that which maximizes the expected value of the decision-maker's utility function. (Author)

  16. METHODS OF ANALYSIS FOR WASTE LOAD ALLOCATION

    EPA Science Inventory

    This research has addressed several unresolved questions concerning the allocation of allowable waste loads among multiple wastewater dischargers within a water quality limited stream segment. First, the traditional assumptions about critical design conditions for waste load allo...

  17. Optimality versus stability in water resource allocation.

    PubMed

    Read, Laura; Madani, Kaveh; Inanloo, Bahareh

    2014-01-15

    Water allocation is a growing concern in a developing world where limited resources like fresh water are in greater demand by more parties. Negotiations over allocations often involve multiple groups with disparate social, economic, and political status and needs, who are seeking a management solution for a wide range of demands. Optimization techniques for identifying the Pareto-optimal (social planner solution) to multi-criteria multi-participant problems are commonly implemented, although often reaching agreement for this solution is difficult. In negotiations with multiple-decision makers, parties who base decisions on individual rationality may find the social planner solution to be unfair, thus creating a need to evaluate the willingness to cooperate and practicality of a cooperative allocation solution, i.e., the solution's stability. This paper suggests seeking solutions for multi-participant resource allocation problems through an economics-based power index allocation method. This method can inform on allocation schemes that quantify a party's willingness to participate in a negotiation rather than opt for no agreement. Through comparison of the suggested method with a range of distance-based multi-criteria decision making rules, namely, least squares, MAXIMIN, MINIMAX, and compromise programming, this paper shows that optimality and stability can produce different allocation solutions. The mismatch between the socially-optimal alternative and the most stable alternative can potentially result in parties leaving the negotiation as they may be too dissatisfied with their resource share. This finding has important policy implications as it justifies why stakeholders may not accept the socially optimal solution in practice, and underlies the necessity of considering stability where it may be more appropriate to give up an unstable Pareto-optimal solution for an inferior stable one. Authors suggest assessing the stability of an allocation solution as an

  18. Neural-Network Processor Would Allocate Resources

    NASA Technical Reports Server (NTRS)

    Eberhardt, Silvio P.; Moopenn, Alexander W.

    1990-01-01

    Global optimization problems solved quickly. Neural-network processor optimizes allocation of M resources among N expenditures according to cost of pairing each resource with each expenditure and subject to limit on number of resources feeding into each expenditure and/or limit on number of expenditures to which each resource allocated. One cell performs several analog and digital functions. Potential applications include assignment of jobs, scheduling, dispatching, and planning of military maneuvers.

  19. Frequency allocations accommodate new commercial applications

    NASA Astrophysics Data System (ADS)

    Stiglitz, Martin R.; Blanchard, Christine

    1992-07-01

    An overview is presented of the 1992 World Administrative Radio Frequency Conference whose principal responsibility is to review and update the International Radio Regulations, including the International Table of Frequency Allocations and the procedures for utilizing the allocations. Consideration is given to the earth exploration-satellite service, the space research space operation, general-satellite service, and wind profiler radar. Attention is given to shortwave or HF broadcasting, mobile and mobile-satellite services and future public land mobile telecommunications systems.

  20. Electronic Neural Networks

    NASA Technical Reports Server (NTRS)

    Thakoor, Anil

    1990-01-01

    Viewgraphs on electronic neural networks for space station are presented. Topics covered include: electronic neural networks; electronic implementations; VLSI/thin film hybrid hardware for neurocomputing; computations with analog parallel processing; features of neuroprocessors; applications of neuroprocessors; neural network hardware for terrain trafficability determination; a dedicated processor for path planning; neural network system interface; neural network for robotic control; error backpropagation algorithm for learning; resource allocation matrix; global optimization neuroprocessor; and electrically programmable read only thin-film synaptic array.

  1. The mechanism of erosion of metallic materials under cavitation attack

    NASA Technical Reports Server (NTRS)

    Rao, B. C. S.; Buckley, D. H.

    1985-01-01

    The mean depth of penetration rates (MDPRs) of eight polycrystalline metallic materials, Al 6061-T6, Cu, brass, phosphor bronze, Ni, Fe, Mo, and Ti-5Al-2.5Sn exposed to cavitation attack in a viscous mineral oil with a 20 kHz ultrasonic oscillator vibrating at 50 micron amplitude are reported. The titanium alloy followed by molybdenum have large incubation periods and small MDPRs. The incubation periods correlate linearly with the inverse of hardness and the average MDPRs correlate linearly with the inverse of tensile strength of materials. The linear relationships yield better statistical parameters than geometric and exponential relationships. The surface roughness and the ratio of pit depth to pit width (h/a) increase with the duration of cavitation attack. The ratio h/a varies from 0.1 to 0.8 for different materials. Recent investigations (20) using scanning electron microscopy to study deformation and pit formation features are briefly reviewed. Investigations with single crystals indicate that the geometry of pits and erosion are dependent on their orientation.

  2. Allocation of authority in European health policy.

    PubMed

    Adolph, Christopher; Greer, Scott L; Massard da Fonseca, Elize

    2012-11-01

    Although many study the effects of different allocations of health policy authority, few ask why countries assign responsibility over different policies as they do. We test two broad theories: fiscal federalism, which predicts rational governments will concentrate information-intensive operations at lower levels, and redistributive and regulatory functions at higher levels; and "politicized federalism", which suggests a combination of systematic and historically idiosyncratic political variables interfere with efficient allocation of authority. Drawing on the WHO Health in Transition country profiles, we present new data on the allocation of responsibility for key health care policy tasks (implementation, provision, finance, regulation, and framework legislation) and policy areas (primary, secondary and tertiary care, public health and pharmaceuticals) in the 27 EU member states and Switzerland. We use a Bayesian multinomial mixed logit model to analyze how different countries arrive at different allocations of authority over each task and area of health policy, and find the allocation of powers broadly follows fiscal federalism. Responsibility for pharmaceuticals, framework legislation, and most finance lodges at the highest levels of government, acute and primary care in the regions, and provision at the local and regional levels. Where allocation does not follow fiscal federalism, it appears to reflect ethnic divisions, the population of states and regions, the presence of mountainous terrain, and the timing of region creation. PMID:22858423

  3. Allocation Games: Addressing the Ill-Posed Nature of Allocation in Life-Cycle Inventories.

    PubMed

    Hanes, Rebecca J; Cruze, Nathan B; Goel, Prem K; Bakshi, Bhavik R

    2015-07-01

    Allocation is required when a life cycle contains multi-functional processes. One approach to allocation is to partition the embodied resources in proportion to a criterion, such as product mass or cost. Many practitioners apply multiple partitioning criteria to avoid choosing one arbitrarily. However, life cycle results from different allocation methods frequently contradict each other, making it difficult or impossible for the practitioner to draw any meaningful conclusions from the study. Using the matrix notation for life-cycle inventory data, we show that an inventory that requires allocation leads to an ill-posed problem: an inventory based on allocation is one of an infinite number of inventories that are highly dependent upon allocation methods. This insight is applied to comparative life-cycle assessment (LCA), in which products with the same function but different life cycles are compared. Recently, there have been several studies that applied multiple allocation methods and found that different products were preferred under different methods. We develop the Comprehensive Allocation Investigation Strategy (CAIS) to examine any given inventory under all possible allocation decisions, enabling us to detect comparisons that are not robust to allocation, even when the comparison appears robust under conventional partitioning methods. While CAIS does not solve the ill-posed problem, it provides a systematic way to parametrize and examine the effects of partitioning allocation. The practical usefulness of this approach is demonstrated with two case studies. The first compares ethanol produced from corn stover hydrolysis, corn stover gasification, and corn grain fermentation. This comparison was not robust to allocation. The second case study compares 1,3-propanediol (PDO) produced from fossil fuels and from biomass, which was found to be a robust comparison. PMID:26061700

  4. Allocation Games: Addressing the Ill-Posed Nature of Allocation in Life-Cycle Inventories.

    PubMed

    Hanes, Rebecca J; Cruze, Nathan B; Goel, Prem K; Bakshi, Bhavik R

    2015-07-01

    Allocation is required when a life cycle contains multi-functional processes. One approach to allocation is to partition the embodied resources in proportion to a criterion, such as product mass or cost. Many practitioners apply multiple partitioning criteria to avoid choosing one arbitrarily. However, life cycle results from different allocation methods frequently contradict each other, making it difficult or impossible for the practitioner to draw any meaningful conclusions from the study. Using the matrix notation for life-cycle inventory data, we show that an inventory that requires allocation leads to an ill-posed problem: an inventory based on allocation is one of an infinite number of inventories that are highly dependent upon allocation methods. This insight is applied to comparative life-cycle assessment (LCA), in which products with the same function but different life cycles are compared. Recently, there have been several studies that applied multiple allocation methods and found that different products were preferred under different methods. We develop the Comprehensive Allocation Investigation Strategy (CAIS) to examine any given inventory under all possible allocation decisions, enabling us to detect comparisons that are not robust to allocation, even when the comparison appears robust under conventional partitioning methods. While CAIS does not solve the ill-posed problem, it provides a systematic way to parametrize and examine the effects of partitioning allocation. The practical usefulness of this approach is demonstrated with two case studies. The first compares ethanol produced from corn stover hydrolysis, corn stover gasification, and corn grain fermentation. This comparison was not robust to allocation. The second case study compares 1,3-propanediol (PDO) produced from fossil fuels and from biomass, which was found to be a robust comparison.

  5. Hierarchical dynamic allocation procedures based on modified Zelen's approach in multiregional studies with unequal allocation.

    PubMed

    Kuznetsova, Olga M; Tymofyeyev, Yevgen

    2014-01-01

    Morrissey, McEntegart, and Lang (2010) showed that in multicenter studies with equal allocation to several treatment arms, the modified Zelen's approach provides excellent within-center and across-study balance in treatment assignments. In this article, hierarchical balancing procedures for equal allocation to more than two arms (with some elements different from earlier versions) and their unequal allocation expansions that incorporate modified Zelen's approach at the center level are described. The balancing properties of the described procedures for a case study of a multiregional clinical trial with 1:2 allocation where balance within regions as well as in other covariates is required are examined through simulations.

  6. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    NASA Astrophysics Data System (ADS)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  7. Heart Attack Before 50 Ups Early Death Risk

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_160692.html Heart Attack Before 50 Ups Early Death Risk But healthy ... News) -- The risk of early death after a heart attack has lessened over the past 30 years among ...

  8. Anger, Heavy Exertion: Fast Track to A Heart Attack?

    MedlinePlus

    ... html Anger, Heavy Exertion: Fast Track to a Heart Attack? But researchers suggest that artery-clogging plaque has ... physical exertion may be triggers for a first heart attack in some people, new research suggests. In the ...

  9. Poorer Heart Attack Victims, Especially Women, Fare Worse: Study

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_161722.html Poorer Heart Attack Victims, Especially Women, Fare Worse: Study Doctors need ... 2016 THURSDAY, Oct. 27, 2016 (HealthDay News) -- Younger heart attack survivors who struggle to afford health care and ...

  10. Expected versus unexpected panic attacks: a naturalistic prospective study.

    PubMed

    Kenardy, J; Taylor, C B

    1999-01-01

    The purpose of this study was to identify factors that are associated with expectation of panic attacks as well as to validate the hypothesized tendency to identify false (panic) alarms in panic disorder. Ten women with panic disorder were assessed naturalistically using computer-assisted self-monitoring. This allowed for prospective assessment of expected versus unexpected panic attacks. Expectation of panic attacks was associated with panic occurrence, as well as elevated sense of threat or danger, anxiety, helplessness, avoidance, distress about physical symptoms, physical sensations, and catastrophic thoughts prior to the attack. In general, the state measured prior to unexpected attacks did not differ from ongoing nonpanic state. Furthermore, none of the variables measured during the attacks were able to distinguish unexpected attacks from expected attacks.

  11. Two fatal tiger attacks in zoos.

    PubMed

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  12. Cascade-based attacks on complex networks

    NASA Astrophysics Data System (ADS)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  13. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  14. Cell phone camera ballistics: attacks and countermeasures

    NASA Astrophysics Data System (ADS)

    Steinebach, Martin; Liu, Huajian; Fan, Peishuai; Katzenbeisser, Stefan

    2010-01-01

    Multimedia forensics deals with the analysis of multimedia data to gather information on its origin and authenticity. One therefore needs to distinguish classical criminal forensics (which today also uses multimedia data as evidence) and multimedia forensics where the actual case is based on a media file. One example for the latter is camera forensics where pixel error patters are used as fingerprints identifying a camera as the source of an image. Of course multimedia forensics can become a tool for criminal forensics when evidence used in a criminal investigation is likely to be manipulated. At this point an important question arises: How reliable are these algorithms? Can a judge trust their results? How easy are they to manipulate? In this work we show how camera forensics can be attacked and introduce a potential countermeasure against these attacks.

  15. Making MANET secured against malicious attack

    NASA Astrophysics Data System (ADS)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  16. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    NASA Astrophysics Data System (ADS)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  17. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  18. Enhancing network robustness against malicious attacks

    NASA Astrophysics Data System (ADS)

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider , Proc. Natl. Acad. Sci. USAPNASA60027-842410.1073/pnas.1009440108 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (Rn), we propose a link-robustness index (Rl). We show that solely enhancing Rn cannot guarantee the improvement of Rl. Moreover, the structure of an Rl-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the Rn and Rl into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  19. Enhancing network robustness against malicious attacks.

    PubMed

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider et al., Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (R(n)), we propose a link-robustness index (R(l)). We show that solely enhancing R(n) cannot guarantee the improvement of R(l). Moreover, the structure of an R(l)-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the R(n) and R(l) into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved.

  20. Sulfate attack on cement-stabilized sand

    SciTech Connect

    Rollings, R.S.; Burkes, J.P.; Rollings, M.P.

    1999-05-01

    A 3.5-km (2.2 mi) section of a road in Georgia developed unexpected transverse bumps within 6 months after construction. The source of the bumps appeared to be expansion within the cement-stabilized base course. Laboratory examination of samples from areas showing distress revealed the presence of ettringite, a calcium sulfoaluminate the formation of which can be accompanied by severe expansion. This expansive materials was the probable cause of the volume changes causing the transverse bumps. The calcium and alumina needed to form ettringite ware available from the portland cement and the stabilized soil`s clay minerals. The source of the sulfur was identified as the well water that was mixed with the cement-stabilized base. Sulfate attack of cement-stabilized soils is a relatively infrequent problem, but it is highly destructive when it occurs. Currently, there are no firm criteria for identifying when sulfate attack of a cement-stabilized soil is a potential problem nor are there established methods of preventing the attack.

  1. Enhancing network robustness against malicious attacks.

    PubMed

    Zeng, An; Liu, Weiping

    2012-06-01

    In a recent work [Schneider et al., Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. Using a greedy algorithm, they found that the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement (R(n)), we propose a link-robustness index (R(l)). We show that solely enhancing R(n) cannot guarantee the improvement of R(l). Moreover, the structure of an R(l)-optimized network is found to be entirely different from that of an onion network. In order to design robust networks that are resistant to a more realistic attack condition, we propose a hybrid greedy algorithm that takes both the R(n) and R(l) into account. We validate the robustness of our generated networks against malicious attacks mixed with both nodes and links failure. Finally, some economical constraints for swapping the links in real networks are considered, and significant improvement in both aspects of robustness is still achieved. PMID:23005185

  2. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General objective. The allocation planning process should provide for the equitable distribution of available...

  3. 10 CFR 217.54 - Elements of an allocation order.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Allocations System regulation (10 CFR part 217), which is part of the Federal Priorities and Allocations System”; and (e) A current copy of the Energy Priorities and Allocations System regulation (10 CFR part... 10 Energy 3 2014-01-01 2014-01-01 false Elements of an allocation order. 217.54 Section...

  4. 49 CFR 33.54 - Elements of an allocation order.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Priorities and Allocations System regulation (49 CFR Part 33)”; and (e) A current copy of the Transportation Priorities and Allocations System regulation (49 CFR Part 33) as of the date of the allocation... 49 Transportation 1 2012-10-01 2012-10-01 false Elements of an allocation order. 33.54 Section...

  5. 49 CFR 33.54 - Elements of an allocation order.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Priorities and Allocations System regulation (49 CFR Part 33)”; and (e) A current copy of the Transportation Priorities and Allocations System regulation (49 CFR Part 33) as of the date of the allocation... 49 Transportation 1 2013-10-01 2013-10-01 false Elements of an allocation order. 33.54 Section...

  6. 49 CFR 33.54 - Elements of an allocation order.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Priorities and Allocations System regulation (49 CFR Part 33)”; and (e) A current copy of the Transportation Priorities and Allocations System regulation (49 CFR Part 33) as of the date of the allocation... 49 Transportation 1 2014-10-01 2014-10-01 false Elements of an allocation order. 33.54 Section...

  7. 10 CFR 217.54 - Elements of an allocation order.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Allocations System regulation (10 CFR part 217), which is part of the Federal Priorities and Allocations System”; and (e) A current copy of the Energy Priorities and Allocations System regulation (10 CFR part... 10 Energy 3 2012-01-01 2012-01-01 false Elements of an allocation order. 217.54 Section...

  8. 10 CFR 217.54 - Elements of an allocation order.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Allocations System regulation (10 CFR part 217), which is part of the Federal Priorities and Allocations System”; and (e) A current copy of the Energy Priorities and Allocations System regulation (10 CFR part... 10 Energy 3 2013-01-01 2013-01-01 false Elements of an allocation order. 217.54 Section...

  9. The Use of Different Rules to Allocate Reward and Punishment.

    ERIC Educational Resources Information Center

    Mueller, Charles W.

    Much research has been conducted about how and when individuals allocate rewards, yet little research exists concerning the allocation of punishment. The process of allocating negative outcomes may be different from the decision making process for positive outcomes. To examine the decision making process for allocating rewards and punishment,…

  10. 49 CFR 198.13 - Grant allocation formula.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Grant allocation formula. 198.13 Section 198.13... PIPELINE SAFETY PROGRAMS Grant Allocation § 198.13 Grant allocation formula. (a) Beginning in calendar year... state agency comments on any proposed changes to the allocation formula. (f) Grants are limited to...

  11. 49 CFR 198.13 - Grant allocation formula.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 3 2014-10-01 2014-10-01 false Grant allocation formula. 198.13 Section 198.13... PIPELINE SAFETY PROGRAMS Grant Allocation § 198.13 Grant allocation formula. (a) Beginning in calendar year... state agency comments on any proposed changes to the allocation formula. (f) Grants are limited to...

  12. 49 CFR 198.13 - Grant allocation formula.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Grant allocation formula. 198.13 Section 198.13... PIPELINE SAFETY PROGRAMS Grant Allocation § 198.13 Grant allocation formula. (a) Beginning in calendar year... state agency comments on any proposed changes to the allocation formula. (f) Grants are limited to...

  13. 47 CFR 64.903 - Cost allocation manuals.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Cost allocation manuals. 64.903 Section 64.903... RULES RELATING TO COMMON CARRIERS Allocation of Costs § 64.903 Cost allocation manuals. (a) Each... mid-sized incumbent local exchange carriers is required to file a cost allocation manual...

  14. 40 CFR 96.53 - Recordation of NOX allowance allocations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... allocated to an allocation set-aside. (c) Serial numbers for allocated NO X allowances. When allocating NOX... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Recordation of NOX allowance... PROGRAMS (CONTINUED) NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS FOR...

  15. 26 CFR 1.514(e)-1 - Allocation rules.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Allocation rules. 1.514(e)-1 Section 1.514(e)-1... Allocation rules. Where only a portion of property is debt-financed property, proper allocation of the basis...)(iii) of § 1.514(b)-1 for illustrations of proper allocation....

  16. 7 CFR 761.202 - Timing of allocations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Timing of allocations. 761.202 Section 761.202... AGRICULTURE SPECIAL PROGRAMS GENERAL PROGRAM ADMINISTRATION Allocation of Farm Loan Programs Funds to State Offices § 761.202 Timing of allocations. The Agency's National Office allocates funds for FO and OL...

  17. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 4 2011-04-01 2011-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General... authority, consistent with the relative housing needs of each allocation area within the field...

  18. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 26 Internal Revenue 2 2012-04-01 2012-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§ 1.141-1.... Thus, allocations generally may be made using any reasonable, consistently applied accounting...

  19. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 2 2013-04-01 2013-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§ 1.141-1.... Thus, allocations generally may be made using any reasonable, consistently applied accounting...

  20. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§ 1.141-1.... Thus, allocations generally may be made using any reasonable, consistently applied accounting...

  1. 10 CFR 455.30 - Allocation of funds.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Allocation of funds. 455.30 Section 455.30 Energy... § 455.30 Allocation of funds. (a) DOE will allocate available funds among the States for two purposes... that are eligible pursuant to § 455.91, up to 100 percent of the funds allocated to the State by...

  2. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... Thus, allocations generally may be made using any reasonable, consistently applied accounting method... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§...

  3. Impact of hormonal crosstalk on plant resistance and fitness under multi-attacker conditions

    PubMed Central

    Vos, Irene A.; Moritz, Liselotte; Pieterse, Corné M. J.; Van Wees, Saskia C. M.

    2015-01-01

    The hormone salicylic acid (SA) generally induces plant defenses against biotrophic pathogens. Jasmonic acid (JA) and its oxylipin derivatives together with ethylene (ET) are generally important hormonal regulators of induced plant defenses against necrotrophic pathogens, whereas JAs together with abscisic acid (ABA) are implicated in induced plant defenses against herbivorous insects. Hormonal crosstalk between the different plant defense pathways has often been hypothesized to be a cost-saving strategy that has evolved as a means of the plant to reduce allocation costs by repression of unnecessary defenses, thereby minimizing trade-offs between plant defense and growth. However, proof for this hypothesis has not been demonstrated yet. In this study the impact of hormonal crosstalk on disease resistance and fitness of Arabidopsis thaliana when under multi-species attack was investigated. Induction of SA- or JA/ABA-dependent defense responses by the biotrophic pathogen Hyaloperonospora arabidopsidis or the herbivorous insect Pieris rapae, respectively, was shown to reduce the level of induced JA/ET-dependent defense against subsequent infection with the necrotrophic pathogen Botrytis cinerea. However, despite the enhanced susceptibility to this second attacker, no additional long-term negative effects were observed on plant fitness when plants had been challenged by multiple attackers. Similarly, when plants were grown in dense competition stands to enlarge fitness effects of induced defenses, treatment with a combination of SA and MeJA did not cause additional negative effects on plant fitness in comparison to the single MeJA treatment. Together, these data support the notion that hormonal crosstalk in plants during multi-attacker interactions allows plants to prioritize their defenses, while limiting the fitness costs associated with induction of defenses. PMID:26347758

  4. 75 FR 33748 - Amateur Radio Use of the Allocation at 5 MHz

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ...) by filing paper copies. See Electronic Filing of Documents in Rulemaking Proceedings, 63 FR 24121... and 97 to read as follows: PART 2--FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND... transmitter PEP will be multiplied by the antenna gain relative to a dipole or the equivalent calculation...

  5. Carbon allocation to ectomycorrhizal fungi correlates with belowground allocation in culture studies.

    PubMed

    Hobbie, Erik A

    2006-03-01

    Ectomycorrhizal fungi form symbioses with most temperate and boreal tree species, but difficulties in measuring carbon allocation to these symbionts have prevented the assessment of their importance in forest ecosystems. Here, I surveyed allocation patterns in 14 culture studies and five field studies of ectomycorrhizal plants. In culture studies, allocation to ectomycorrhizal fungi (NPPf) was linearly related to total belowground net primary production (NPPb) by the equation NPPf = 41.5% x NPPb - 11.3% (r2 = 0.55, P < 0.001) and ranged from 1% to 21% of total net primary production. As a percentage of NPP, allocation to ectomycorrhizal fungi was highest at lowest plant growth rates and lowest nutrient availabilities. Because total belowground allocation can be estimated using carbon balance techniques, these relationships should allow ecologists to incorporate mycorrhizal fungi into existing ecosystem models. In field studies, allocation to ectomycorrhizal fungi ranged from 0% to 22% of total allocation, but wide differences in measurement techniques made intercomparisons difficult. Techniques such as fungal in-growth cores, root branching-order studies, and isotopic analyses could refine our estimates of turnover rates of fine roots, mycorrhizae, and extraradical hyphae. Together with ecosystem modeling, such techniques could soon provide good estimates of the relative importance of root vs. fungal allocation in belowground carbon budgets.

  6. An Analysis and Allocation System for Library Collections Budgets: The Comprehensive Allocation Process (CAP)

    ERIC Educational Resources Information Center

    Lyons, Lucy Eleonore; Blosser, John

    2012-01-01

    The "Comprehensive Allocation Process" (CAP) is a reproducible decision-making structure for the allocation of new collections funds, for the reallocation of funds within stagnant budgets, and for budget cuts in the face of reduced funding levels. This system was designed to overcome common shortcomings of current methods. Its philosophical…

  7. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  8. Attack or retreat: contrasted defensive tactics used by Cyprian honeybee colonies under attack from hornets.

    PubMed

    Papachristoforou, Alexandros; Rortais, Agnès; Sueur, Jérôme; Arnold, Gérard

    2011-02-01

    This study describes the tactics used by Cyprian honeybees (Apis mellifera cypria) to defend their colonies against hornet (Vespa orientalis orientalis) attacks. We use simulated hornet attacks and a combination of video recordings and image analysis to reveal, for the first time, contrasted intra-subspecies defensive tactics that operate at the colony level during predation. In some colonies, when attacked, the numbers of guards at the hive entrance increases rapidly to attack, engulf, and kill invading hornets. In other colonies, guards avoid conflicts with hornets by retreating gradually and by forming a defensive line of honeybees at the hive entrance. Retreater colonies have propolis walls at the hive entrances with small apertures that are too narrow to allow the hornet to access the hive and that therefore reinforces entrance protection. On the contrary, attacker colonies have propolis walls with large openings through which the hornet can pass; these bees block the hornet's access by intensively guarding the hive entrance. We experimentally destroy propolis walls to test whether colonies consistently rebuild walls with the same intrinsic characteristics and we also monitor the survival rate of each anti-predator tactic after massive natural predation by hornets.

  9. Flexible resource allocation during plant defense responses

    PubMed Central

    Schultz, Jack C.; Appel, Heidi M.; Ferrieri, Abigail P.; Arnold, Thomas M.

    2013-01-01

    Plants are organisms composed of modules connected by xylem and phloem transport streams. Attack by both insects and pathogens elicits sometimes rapid defense responses in the attacked module. We have also known for some time that proteins are often reallocated away from pathogen-infected tissues, while the same infection sites may draw carbohydrates to them. This has been interpreted as a tug of war in which the plant withdraws critical resources to block microbial growth while the microbes attempt to acquire more resources. Sink-source regulated transport among modules of critical resources, particularly carbon and nitrogen, is also altered in response to attack. Insects and jasmonate can increase local sink strength, drawing carbohydrates that support defense production. Shortly after attack, carbohydrates may also be drawn to the root. The rate and direction of movement of photosynthate or signals in phloem in response to attack is subject to constraints that include branching, degree of connection among tissues, distance between sources and sinks, proximity, strength, and number of competing sinks, and phloem loading/unloading regulators. Movement of materials (e.g., amino acids, signals) to or from attack sites in xylem is less well understood but is partly driven by transpiration. The root is an influential sink and may regulate sink-source interactions and transport above and below ground as well as between the plant and the rhizosphere and nearby, connected plants. Research on resource translocation in response to pathogens or herbivores has focused on biochemical mechanisms; whole-plant research is needed to determine which, if any, of these plant behaviors actually influence plant fitness. PMID:23986767

  10. Biomass Resource Allocation among Competing End Uses

    SciTech Connect

    Newes, E.; Bush, B.; Inman, D.; Lin, Y.; Mai, T.; Martinez, A.; Mulcahy, D.; Short, W.; Simpkins, T.; Uriarte, C.; Peck, C.

    2012-05-01

    The Biomass Scenario Model (BSM) is a system dynamics model developed by the U.S. Department of Energy as a tool to better understand the interaction of complex policies and their potential effects on the biofuels industry in the United States. However, it does not currently have the capability to account for allocation of biomass resources among the various end uses, which limits its utilization in analysis of policies that target biomass uses outside the biofuels industry. This report provides a more holistic understanding of the dynamics surrounding the allocation of biomass among uses that include traditional use, wood pellet exports, bio-based products and bioproducts, biopower, and biofuels by (1) highlighting the methods used in existing models' treatments of competition for biomass resources; (2) identifying coverage and gaps in industry data regarding the competing end uses; and (3) exploring options for developing models of biomass allocation that could be integrated with the BSM to actively exchange and incorporate relevant information.

  11. Task mapping for non-contiguous allocations.

    SciTech Connect

    Leung, Vitus Joseph; Bunde, David P.; Ebbers, Johnathan; Price, Nicholas W.; Swank, Matthew.; Feer, Stefan P.; Rhodes, Zachary D.

    2013-02-01

    This paper examines task mapping algorithms for non-contiguously allocated parallel jobs. Several studies have shown that task placement affects job running time for both contiguously and non-contiguously allocated jobs. Traditionally, work on task mapping either uses a very general model where the job has an arbitrary communication pattern or assumes that jobs are allocated contiguously, making them completely isolated from each other. A middle ground between these two cases is the mapping problem for non-contiguous jobs having a specific communication pattern. We propose several task mapping algorithms for jobs with a stencil communication pattern and evaluate them using experiments and simulations. Our strategies improve the running time of a MiniApp by as much as 30% over a baseline strategy. Furthermore, this improvement increases markedly with the job size, demonstrating the importance of task mapping as systems grow toward exascale.

  12. Allocation of Attention by Fishing Vessel Watchkeepers

    NASA Astrophysics Data System (ADS)

    Findlay, Malcolm

    2006-05-01

    This study examines the way in which attention is allocated by watchkeepers on fishing vessels and identifies differences in the approach displayed by individuals with different levels of training and experience. A method of analysing the way in which attention is allocated on a sample of UK fishing vessels is described. It was found that both skippers and mates allocated disproportionate amounts of attention to fishfinding equipment at certain stages of the fishing trip, while crewmen were heavily reliant upon the track plotter both while fishing and on passage. Those with more training and experience appeared to treat the array of navigation and control components as an integrated system, while untrained crewmen dealt with each aspect in isolation.

  13. Competing Principles for Allocating Health Care Resources.

    PubMed

    Carter, Drew; Gordon, Jason; Watt, Amber M

    2016-10-01

    We clarify options for conceptualizing equity, or what we refer to as justice, in resource allocation. We do this by systematically differentiating, expounding, and then illustrating eight different substantive principles of justice. In doing this, we compare different meanings that can be attributed to "need" and "the capacity to benefit" (CTB). Our comparison is sharpened by two analytical tools. First, quantification helps to clarify the divergent consequences of allocations commended by competing principles. Second, a diagrammatic approach developed by economists Culyer and Wagstaff offers a visual and conceptual aid. Of the eight principles we illustrate, only two treat as relevant both a person's initial health state and a person's CTB per resource unit expended: (1) allocate resources so as to most closely equalize final health states and (2) allocate resources so as to equally restore health states to population norms. These allocative principles ought to be preferred to the alternatives if one deems relevant both a person's initial health state and a person's CTB per resource unit expended. Finally, we examine some possibilities for conceptualizing benefits as relative to how badly off someone is, extending Parfit's thought on Prioritarianism (a prioritizing of the worst off). Questions arise as to how much intervention effects accruing to the worse off count for more and how this changes with improving health. We explicate some recent efforts to answer these questions, including in Dutch and British government circles. These efforts can be viewed as efforts to operationalize need as an allocative principle. Each effort seeks to maximize in the aggregate quanta of effect that are differentially valued in favor of the worst off. In this respect, each effort constitutes one type of Prioritarianism, which Parfit failed to differentiate from other types.

  14. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    PubMed

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  15. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    PubMed Central

    Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature. PMID:24959606

  16. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  17. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework. PMID:25807571

  18. The Allocation of Federal Expenditures Among States

    NASA Technical Reports Server (NTRS)

    Lee, Maw Lin

    1967-01-01

    This study explores factors associated with the allocation offederal expenditures by states and examines the implications of theseexpenditures on the state by state distribution of incomes. Theallocation of federal expenditures is functionally oriented toward theobjectives for which various government programs are set up. Thegeographical distribution of federal expenditures, therefore, washistorically considered to be a problem incidental to governmentactivity. Because of this, relatively little attention was given tothe question of why some states receive more federal allocation thanothers. In addition, the implications of this pattern of allocationamong the several states have not been intensively investigated.

  19. Effects of generalist herbivory on resistance and resource allocation by the invasive plant, Phytolacca americana.

    PubMed

    Huang, Wei; Ding, Jianqing

    2016-04-01

    Successful invasions by exotic plants are often attributed to a loss of co-evolved specialists and a re-allocation of resources from defense to growth and reproduction. However, invasive plants are rarely completely released from insect herbivory because they are frequently attacked by generalists in their introduced ranges. The novel generalist community may also affect the invasive plant's defensive strategies and resource allocation. Here, we tested this hypothesis using American pokeweed (Phytolacca americana L.), a species that has become invasive in China, which is native to North America. We examined resistance, tolerance, growth and reproduction of plant populations from both China and the USA when plants were exposed to natural generalist herbivores in China. We found that leaf damage was greater for invasive populations than for native populations, indicating that plants from invasive ranges had lower resistance to herbivory than those from native ranges. A regression of the percentage of leaf damage against mass showed that there was no significant difference in tolerance between invasive and native populations, even though the shoot, root, fruit and total mass were larger for invasive populations than for native populations. These results suggest that generalist herbivores are important drivers mediating the defensive strategies and resource allocation of the invasive American pokeweed.

  20. Explosive attack: Lessons learned in Seyed Al Shohada mosque attack, April 2008, Shiraz, Iran

    PubMed Central

    Paydar, Shahram; Sharifian, Maryam; Parvaz, Shahram Boland; Abbasi, Hamid Reza; Moradian, Mohamad javad; Roozbeh, Jamshid; Nikghbalian, Saman; Sagheb, Mohammad Mahdi; Ghaffarpasand, Fariborz; Salehi, Oveis; Dehghani, Javad

    2012-01-01

    Introduction: The threat of explosive attacks has become a worldwide problem. Bombing is the preferred method of attacks. These attacks result in specific physical and psychiatric trauma. In this paper, we present an epidemiologic description of the physical injuries of patients who survived the explosive attack in Seyed Al Shohada mosque April 2008 Shiraz, Iran. Materials and Methods: All medical records of the patients admitted at Shiraz Hospitals on April 2008 due to Seyed Al Shohada mosque bombing attacks, Shiraz, Iran, were reviewed. Results: A total of 202 patients were referred to the hospitals over 24 h following the terrorist attack. One hundred sixty-four patients were admitted for short periods of observation (<24 h). Thirty-eight patients needed more than 1 day of hospitalization. The mean age of the patients was 26.2 (range 2 to 51) years. One hundred thirty-five (66.8%) patients were males. Twenty-six (12.8%) were children. Burn was the most prevalent cause of admission. Five (13.5%) patients needed chest tube insertion and eight (21%) needed skin grafts due to burn. Overall, 12 patients expired (5%). Three (25%) of them were children (2 and 6, and 11 years old). Mortality rate was significantly higher among the children than adults (P value <0.05). The most important cause of death was head trauma which was seen in five (41.6%) of the expired patients followed by burn (including air way burn) in four (33%), and internal bleeding in three (25%). Patients with head trauma had significantly a higher rate of mortality than other patients (P value <0.05). Discussion: Following a bombing attack, numerous victims were brought to the emergency unit suffering from a combination of multi-organ injuries caused by the blast, penetrating injuries caused by shrapnel and other debris, and burns. It is important for a physician to be familiar with the clinical features and treatments of explosive attacks victims. Early management of patients at the scene and

  1. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  2. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.

  3. Cardiogenic embolism producing crescendo transient ischemic attacks.

    PubMed

    Geraghty, Patrick J; Oak, Jack; Choi, Eric T

    2005-09-01

    Lateralizing, repetitive transient ischemic attacks are characteristic of symptomatic carotid bifurcation atherosclerotic plaques. We report a case in which a cardiogenic embolus, after lodging at the left carotid bifurcation, produced crescendo episodes of expressive aphasia and mild right upper extremity weakness. Complete neurological recovery was achieved following emergent carotid embolectomy and endarterectomy. This case demonstrates that the laminar nature of internal carotid blood flow may result in the localization of embolic events to a single region of the cerebral vasculature, regardless of the source lesion in the carotid artery. The role of endoluminal techniques in the diagnosis and management of such lesions is discussed.

  4. Bobcat attack on a cottontail rabbit

    USGS Publications Warehouse

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  5. Sulfate attack in lime-treated subbases

    SciTech Connect

    Day, D.C.; Salami, M.R.; Rollings, R.S.

    1995-06-01

    Sulfate-induced heave or buckling in pavements is the phenomenon that occurs when the calcium in various lime-based stabilizers combines with the alumina and sulfate present in clay to form calcium sulfoaluminate, or ettringite. Ettringite, a crystal, can grow between clay particles, pushing them apart and causing swelling in the soil. When this happens in pavement subbases, the resulting heaving may cause the pavement to rupture and fail, sometimes in a dramatic way. In this paper the authors examine the mechanism of sulfate attack, review some of the work done on this problem, and present some examples of pavement failures.

  6. Behind the Resource Domino. Part II: Allocation

    ERIC Educational Resources Information Center

    Thiemann, F. C.; Bumbarger, C. S.

    1972-01-01

    Discusses the problem of allocation and acquisition of resources from an administrative point of view. Suggests that an administrator's accountability as a leader is fixed in how efficiently and effectively resources are deployed in the organizational goal attainment efforts. (Author/DN)

  7. Ground data systems resource allocation process

    NASA Technical Reports Server (NTRS)

    Berner, Carol A.; Durham, Ralph; Reilly, Norman B.

    1989-01-01

    The Ground Data Systems Resource Allocation Process at the Jet Propulsion Laboratory provides medium- and long-range planning for the use of Deep Space Network and Mission Control and Computing Center resources in support of NASA's deep space missions and Earth-based science. Resources consist of radio antenna complexes and associated data processing and control computer networks. A semi-automated system was developed that allows operations personnel to interactively generate, edit, and revise allocation plans spanning periods of up to ten years (as opposed to only two or three weeks under the manual system) based on the relative merit of mission events. It also enhances scientific data return. A software system known as the Resource Allocation and Planning Helper (RALPH) merges the conventional methods of operations research, rule-based knowledge engineering, and advanced data base structures. RALPH employs a generic, highly modular architecture capable of solving a wide variety of scheduling and resource sequencing problems. The rule-based RALPH system has saved significant labor in resource allocation. Its successful use affirms the importance of establishing and applying event priorities based on scientific merit, and the benefit of continuity in planning provided by knowledge-based engineering. The RALPH system exhibits a strong potential for minimizing development cycles of resource and payload planning systems throughout NASA and the private sector.

  8. 45 CFR 1355.57 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) OFFICE OF HUMAN DEVELOPMENT SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES THE ADMINISTRATION ON CHILDREN, YOUTH AND FAMILIES, FOSTER CARE MAINTENANCE PAYMENTS, ADOPTION ASSISTANCE, AND CHILD AND FAMILY SERVICES GENERAL § 1355.57 Cost allocation....

  9. 42 CFR 457.228 - Cost allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 4 2014-10-01 2014-10-01 false Cost allocation. 457.228 Section 457.228 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) STATE CHILDREN'S HEALTH INSURANCE PROGRAMS (SCHIPs) ALLOTMENTS AND GRANTS TO STATES...

  10. 45 CFR 400.13 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... costs, both direct and indirect, appropriately between the Refugee Resettlement Program (RRP) and other programs which it administers. (b) Within the RRP, a State must allocate costs appropriately among its CMA grant, social services grant, and any other Refugee Resettlement Program (RRP) grants which it...

  11. Issues in organ procurement, allocation, and transplantation.

    PubMed

    Nierste, Deborah

    2013-01-01

    Organ transplantation extends lives and improves health but presents complex ethical dilemmas for nurses caring for donors, recipients, and their families. This article overviews organ procurement and allocation, discusses ethical dilemmas in transplantation, and offers strategies from professional and biblical perspectives for coping with moral distress and maintaining compassionate care. PMID:23607154

  12. 50 CFR 660.320 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Allocations. 660.320 Section 660.320 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE (CONTINUED) FISHERIES OFF WEST COAST STATES West Coast Groundfish Fisheries §...

  13. 42 CFR 433.34 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Department in accordance with the requirements contained in subpart E of 45 CFR part 95. Subpart E also sets... 42 Public Health 4 2010-10-01 2010-10-01 false Cost allocation. 433.34 Section 433.34 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES...

  14. 42 CFR 457.228 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... accordance with the requirements contained in subpart E of 45 CFR part 95. Subpart E also sets forth the... 42 Public Health 4 2010-10-01 2010-10-01 false Cost allocation. 457.228 Section 457.228 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES...

  15. 20 CFR 631.82 - Substate allocation.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... THE JOB TRAINING PARTNERSHIP ACT Disaster Relief Employment Assistance § 631.82 Substate allocation..., within such disaster areas. The remainder of such funds may be reserved by the Governor for use, in... with such major disaster. (b) The JTPA title III program substate grantee for the disaster area...

  16. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... whiting is described in paragraph (i) of this section and in the PCGFMP. Allocation of black rockfish is... Slope RF South of 40°10′ N. lat. 63 37 Dover Sole 95 5 English Sole 95 5 Petrale Sole 95 5 Arrowtooth... management measures process. (l) Black rockfish harvest guideline. The commercial tribal harvest...

  17. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... whiting is described in paragraph (i) of this section and in the PCGFMP. Allocation of black rockfish is... Dover Sole 95 5 English Sole 95 5 Petrale Sole 95 5 Arrowtooth Flounder 95 5 Starry Flounder 50 50 Other... through the biennial harvest specifications and management measures process. (l) Black rockfish...

  18. Resource Allocation in High Schools. Final Report.

    ERIC Educational Resources Information Center

    Hartman, William T.

    This study investigated the resource allocation process--how school administrators obtain the proper resources to operate their schools, distribute the available resources among the various school programs appropriately, and manage resources for effective educational results--in four high schools during the 1984-85 school year. Information was…

  19. 20 CFR 631.82 - Substate allocation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Substate allocation. 631.82 Section 631.82 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR PROGRAMS UNDER TITLE III OF THE JOB TRAINING PARTNERSHIP ACT Disaster Relief Employment Assistance § 631.82 Substate...

  20. Discrete Resource Allocation in Visual Working Memory

    ERIC Educational Resources Information Center

    Barton, Brian; Ester, Edward F.; Awh, Edward

    2009-01-01

    Are resources in visual working memory allocated in a continuous or a discrete fashion? On one hand, flexible resource models suggest that capacity is determined by a central resource pool that can be flexibly divided such that items of greater complexity receive a larger share of resources. On the other hand, if capacity in working memory is…

  1. 45 CFR 400.13 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Welfare Regulations Relating to Public Welfare OFFICE OF REFUGEE RESETTLEMENT, ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES REFUGEE RESETTLEMENT PROGRAM Grants to States for Refugee Resettlement Award of Grants to States § 400.13 Cost allocation. (a) A State must...

  2. Allocation of Resources. SPEC Kit 31.

    ERIC Educational Resources Information Center

    Association of Research Libraries, Washington, DC. Office of Management Studies.

    This kit on resource allocation in academic and research libraries contains nine primary source documents and a concise summary of a 1976 Association of Research Libraries (ARL) survey on management of fiscal spending activities in ARL libraries. Based on responses from 70 libraries, the summary discusses 3 specific subjects within the general…

  3. 50 CFR 648.87 - Sector allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... permit sanctions pursuant to 15 CFR part 904. If an ACE allocated to a sector is not exceeded in a given... CFR part 904, each sector, permit/vessel owner, and vessel operator participating in the sector may be..., the stock-level ACL plus the carryover amount, does not exceed the stock overfishing limit. Any...

  4. Principles of allocation of health care resources.

    PubMed Central

    Knox, E G

    1978-01-01

    The methods and principles of allocating centrally provided health care resources to regions and areas are reviewed using the report of the Resource Allocation Working Party (RAWP) (Department of Health and Social Security, 1976) and the consultative document (Department of Health and Social Security, 1976a) as a basis. A range of practical problems arising from these papers (especially the report of the RAWP) is described and traced to the terms of reference. It is concluded that the RAWP misinterpreted aspects of social and administrative reality, and it failed to recognise clearly that the several principles on which it had to work conflicted with each other and demanded decisions of priority. The consequential errors led to (a) an injudicious imposition of 'objectivity' at all levels of allocation, (b) an unjustified insistence that the same method be used at each administrative level in an additive and transitive manner, (c) the exclusion of general practitioner services from their considerations, (d) a failure to delineate those decisions which are in fact political decisions, thus to concatenate them, inappropriately, with technical and professional issues. The main requirement in a revised system is for a mechanism which allocates different priorities to different principles at each appropriate administrative and distributive level, and adapts the working methods of each tier to meet separately defined objectives. PMID:262585

  5. Ethics and resource allocation: an economist's view.

    PubMed

    McGuire, A

    1986-01-01

    This paper debates some of the issues involved in attempting to apply economic analysis to the health care sector when medical ethics plays such an important part in determining the allocation of resources in that sector. Two distinct ethical positions are highlighted as being fundamental to the understanding of resource allocation in this sector -- deontological and utilitarian theories of ethics. It is argued that medical ethics are often narrowly conceived in that there is a tendency for the individual, rather than society at large, to form the focal point of the production of the service "health care'. Thus medical ethics have been dominated by individualistic ethical coded which do not fully consider questions relating to resource allocation at a social level. It is further argued that the structure of the health care sector augments these "individualistic' ethics. It is also suggested that different actors in the health care sector address questions of resource allocation with respect to different time periods, and that this serves to further enhance the influence of "individualistic' ethical codes in this sector.

  6. 15 CFR 923.110 - Allocation formula.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE OCEAN AND COASTAL RESOURCE MANAGEMENT COASTAL ZONE MANAGEMENT PROGRAM REGULATIONS Allocation of Section 306 Program Administration... Coastal Zone Act Reauthorization Amendments of 1990, 1 to 1 for any fiscal year. (2) For programs...

  7. 15 CFR 923.110 - Allocation formula.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE OCEAN AND COASTAL RESOURCE MANAGEMENT COASTAL ZONE MANAGEMENT PROGRAM REGULATIONS Allocation of Section 306 Program Administration... Coastal Zone Act Reauthorization Amendments of 1990, 1 to 1 for any fiscal year. (2) For programs...

  8. 15 CFR 923.110 - Allocation formula.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE OCEAN AND COASTAL RESOURCE MANAGEMENT COASTAL ZONE MANAGEMENT PROGRAM REGULATIONS Allocation of Section 306 Program Administration... Coastal Zone Act Reauthorization Amendments of 1990, 1 to 1 for any fiscal year. (2) For programs...

  9. Resource Allocation Patterns and Student Achievement

    ERIC Educational Resources Information Center

    James, Lori; Pate, James; Leech, Donald; Martin, Ellice; Brockmeier, Lantry; Dees, Elizabeth

    2011-01-01

    This quantitative research study was designed to examine the relationship between system resource allocation patterns and student achievement, as measured by eighth grade Criterion-Referenced Competency Test (CRCT) mathematics, eighth grade CRCT reading, eleventh grade Georgia High School Graduation Test (GHSGT) mathematics, eleventh grade and…

  10. 23 CFR 660.107 - Allocations.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 23 Highways 1 2012-04-01 2012-04-01 false Allocations. 660.107 Section 660.107 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION ENGINEERING AND TRAFFIC OPERATIONS SPECIAL PROGRAMS... approved Federal Lands Coordinated Technology Implementation Program studies....

  11. 24 CFR 574.130 - Formula allocations.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...-five percent is allocated among qualifying cities, but not States, where the per capita incidence of...'s with higher than average per capita incidence of AIDS. The high incidence factor is computed by... the high incidence factors for all EMSA's with higher than average per capita incidence of AIDS....

  12. 24 CFR 574.130 - Formula allocations.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...-five percent is allocated among qualifying cities, but not States, where the per capita incidence of...'s with higher than average per capita incidence of AIDS. The high incidence factor is computed by... the high incidence factors for all EMSA's with higher than average per capita incidence of AIDS....

  13. Error and attack tolerance of complex networks

    NASA Astrophysics Data System (ADS)

    Albert, Réka; Jeong, Hawoong; Barabási, Albert-László

    2000-07-01

    Many complex systems display a surprising degree of tolerance against errors. For example, relatively simple organisms grow, persist and reproduce despite drastic pharmaceutical or environmental interventions, an error tolerance attributed to the robustness of the underlying metabolic network. Complex communication networks display a surprising degree of robustness: although key components regularly malfunction, local failures rarely lead to the loss of the global information-carrying ability of the network. The stability of these and other complex systems is often attributed to the redundant wiring of the functional web defined by the systems' components. Here we demonstrate that error tolerance is not shared by all redundant systems: it is displayed only by a class of inhomogeneously wired networks, called scale-free networks, which include the World-Wide Web, the Internet, social networks and cells. We find that such networks display an unexpected degree of robustness, the ability of their nodes to communicate being unaffected even by unrealistically high failure rates. However, error tolerance comes at a high price in that these networks are extremely vulnerable to attacks (that is, to the selection and removal of a few nodes that play a vital role in maintaining the network's connectivity). Such error tolerance and attack vulnerability are generic properties of communication networks.

  14. Spontaneous subperiosteal hematoma precipitated by anxiety attack.

    PubMed

    Swanenberg, Irene M; Rizzuti, Allison E; Shinder, Roman

    2013-12-01

    A 60-year-old woman presented with diplopia and left periorbital edema and pressure, which developed during an anxiety attack the previous day. Examination revealed left inferotemporal globe dystopia, periorbital edema, ecchymosis, and limitation in supraduction. Orbital MRI confirmed the diagnosis of a superior subperiosteal orbital hematoma. The patient's signs and symptoms rapidly resolved with administration of oral corticosteroids. The patient remains asymptomatic with complete resolution of orbital signs at 3-month follow-up. Subperiosteal orbital hematoma (SOH) is a rare condition in which blood accumulates between the bony orbit and separated periosteum, and is often due to blunt head trauma. Non-traumatic SOH (NTSOH) is exceedingly rare and usually associated with known coagulopathies or tendency to bleed. However, few cases of spontaneous NTSOH have been reported without any such predisposition and are thought to be caused by sudden elevations in intrathoracic and intracranial venous pressure such as vomiting, coughing, SCUBA diving, weight lifting and labor. We herein describe the presentation, radiography and outcome of a unique case of spontaneous NTSOH following an anxiety attack. PMID:24063522

  15. Baiting Inside Attackers Using Decoy Documents

    NASA Astrophysics Data System (ADS)

    Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore J.

    The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user modeling and profiling techniques, policy and access enforcement techniques, and misuse detection. In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to exfiltrate and use sensitive information. The goal is to confuse and confound an adversary requiring more effort to identify real information from bogus information and provide a means of detecting when an attempt to exploit sensitive information has occurred. “Decoy Documents” are automatically generated and stored on a file system by the D3 System with the aim of enticing a malicious user. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. The decoy documents contain several different types of bogus credentials that when used, trigger an alert. We also embed “stealthy beacons” inside the documents that cause a signal to be emitted to a server indicating when and where the particular decoy was opened. We evaluate decoy documents on honeypots penetrated by attackers demonstrating the feasibility of the method.

  16. Spontaneous subperiosteal hematoma precipitated by anxiety attack.

    PubMed

    Swanenberg, Irene M; Rizzuti, Allison E; Shinder, Roman

    2013-12-01

    A 60-year-old woman presented with diplopia and left periorbital edema and pressure, which developed during an anxiety attack the previous day. Examination revealed left inferotemporal globe dystopia, periorbital edema, ecchymosis, and limitation in supraduction. Orbital MRI confirmed the diagnosis of a superior subperiosteal orbital hematoma. The patient's signs and symptoms rapidly resolved with administration of oral corticosteroids. The patient remains asymptomatic with complete resolution of orbital signs at 3-month follow-up. Subperiosteal orbital hematoma (SOH) is a rare condition in which blood accumulates between the bony orbit and separated periosteum, and is often due to blunt head trauma. Non-traumatic SOH (NTSOH) is exceedingly rare and usually associated with known coagulopathies or tendency to bleed. However, few cases of spontaneous NTSOH have been reported without any such predisposition and are thought to be caused by sudden elevations in intrathoracic and intracranial venous pressure such as vomiting, coughing, SCUBA diving, weight lifting and labor. We herein describe the presentation, radiography and outcome of a unique case of spontaneous NTSOH following an anxiety attack.

  17. Resource allocation in circuit-switched all-optical networks

    NASA Astrophysics Data System (ADS)

    Marquis, Douglas; Barry, Richard A.; Finn, Steven G.; Parikh, Salil A.; Swanson, Eric A.; Thomas, Robert E.

    1996-03-01

    We describe an all-optical network testbed deployed in the Boston area, and research surrounding the allocation of optical resources -- frequencies and time slots -- within the network. The network was developed by a consortium of AT&T Bell Laboratories, Digital Equipment Corporation, and Massachusetts Institute of Technology under a grant from ARPA. The network is organized as a hierarchy consisting of local, metropolitan, and wide area nodes tea support optical broadcast and routing modes. Frequencies are shared and reused to enhance network scalability. Electronic access is provided through optical terminals that support multiple services having data rates between 10 Mbps/user and 10 Gbps/user. Of particular interest for this work is the 'B-service,' which simultaneously hops frequency and time slots on each optical terminal to allow frequency sharing within the AON. B-service provides 1.244 Gbps per optical terminal, with bandwidth for individual connections divided in increments as small as 10 Mbps. We have created interfaces between the AON and commercially available electronic circuit-switched and packet-switched networks. The packet switches provide FDDI (datacomm), T3 (telecomm), and ATM/SONET switching at backplane rates of over 3 Gbps. We show results on network applications that dynamically allocate optical bandwidth between electronic packet-switches based on the offered load presented by users. Bandwidth allocation granularity is proportional to B-Service slots (10-1244 Mbps), and switching times are on the order of one second. We have also studied the effects of wavelength changers upon the network capacity and blocking probabilities in wide area all-optical networks. Wavelength changers allow a change in the carrier frequency (within the network) without disturbing the data modulation. The study includes both a theoretical model of blocking probabilities based on network design parameters, and a computer simulation of blocking in networks with and

  18. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  19. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  20. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  1. Maintaining defender's reputation in anomaly detection against insider attacks.

    PubMed

    Zhang, Nan; Yu, Wei; Fu, Xinwen; Das, Sajal K

    2010-06-01

    We address issues related to establishing a defender's reputation in anomaly detection against two types of attackers: 1) smart insiders, who learn from historic attacks and adapt their strategies to avoid detection/punishment, and 2) naïve attackers, who blindly launch their attacks without knowledge of the history. In this paper, we propose two novel algorithms for reputation establishment--one for systems solely consisting of smart insiders and the other for systems in which both smart insiders and naïve attackers are present. The theoretical analysis and performance evaluation show that our reputation-establishment algorithms can significantly improve the performance of anomaly detection against insider attacks in terms of the tradeoff between detection and false positives.

  2. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.

    PubMed

    Sittig, Dean F; Singh, Hardeep

    2016-01-01

    Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users. PMID:27437066

  3. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks

    PubMed Central

    Singh, Hardeep

    2016-01-01

    Summary Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user’s computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users. PMID:27437066

  4. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.

    PubMed

    Sittig, Dean F; Singh, Hardeep

    2016-01-01

    Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.

  5. Sulfate Attack of Cement-Based Material with Limestone Filler Exposed to Different Environments

    NASA Astrophysics Data System (ADS)

    Gao, Xiaojian; Ma, Baoguo; Yang, Yingzi; Su, Anshuang

    2008-08-01

    Mortar prisms made with OPC cement plus 30% mass of limestone filler were stored in various sulfate solutions at different temperatures for periods of up to 1 year, the visual appearance was inspected at intervals, and the flexural and compressive strength development with immersion time was measured according to the Chinese standard GB/T17671-1999. Samples were selected from the surface of prisms after 1 year immersion and examined by x-ray diffraction (XRD), Fourier transform infrared spectroscopy (FTIR), laser-raman spectroscopy and scanning electron microscopy (SEM). The results show that MgSO4 solution is more aggressive than Na2SO4 solution, and Mg2+ ions reinforce the thaumasite sulfate attack on the limestone filler cement mortars. The increase of solution temperature accelerates both magnesium attack and sulfate attack on the limestone filler cement mortar, and leads to more deleterious products including gypsum, ettringite and brucite formed on the surface of mortars after 1 year storage in sulfate solutions. Thaumasite forms in the mortars containing limestone filler after exposure to sulfate solutions at both 5 °C and 20 °C. It reveals that the thaumasite form of sulfate attack is not limited to low-temperature conditions.

  6. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  7. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  8. Non-harmful insertion of data mimicking computer network attacks

    DOEpatents

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  9. Countermeasures for unintentional and intentional video watermarking attacks

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  10. Attribution Of Cyber Attacks On Process Control Systems

    NASA Astrophysics Data System (ADS)

    Hunker, Jeffrey; Hutchinson, Robert; Margulies, Jonathan

    The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of attributable activity, an important first step towards a more complete attribution methodology for the control systems community.

  11. Identification of cooling tower wood attack and methods of control

    SciTech Connect

    Song, P.; Trulear, M.G.

    1986-01-01

    Biological and chemical attack can greatly accelerate the deterioration of cooling tower wood. The damage, once inflicted, is irreversible and often results in premature and costly wood replacement. Biological attack is more serious than chemical, and is difficult to detect. Control of both types is essential for good tower maintenance A review of wood structures, types of attack and methods of control are presented. Effects of alkaline cooling water operation on wood deterioration are also discussed.

  12. THE 1985 NAPAP EMISSIONS INVENTORY: DEVELOPMENT OF SPECIES ALLOCATION FACTORS

    EPA Science Inventory

    The report describes the methodologies and data bases used to develop species allocation factors and data processing software used to develop the 1985 National Acid Precipitation Assessment Program (NAPAP) Modelers' Emissions Inventory (Version 2). Species allocation factors were...

  13. An optical angle of attack sensor

    NASA Astrophysics Data System (ADS)

    McDevitt, T. Kevin; Owen, F. Kevin

    A major source of transonic and supersonic wind-tunnel test data uncertainty is due to angle of attack (alpha) measurement errors caused by unknown sting and balance deflections under load. A novel laser-based instrument has been developed to enable continuous time-dependent alpha measurements to be made without signal dropout. Detectors capable of 0.01-deg resolution over an 18-deg range and 0.03-deg resolution over a 44-deg range with time-dependent outputs of 60 Hz have been developed. This capability is sufficient to provide accurate real-time alpha information for correlation with model balance measurements during transport and fighter model testing. Proof-of-concept experiments, along with the results of recent measurements conducted at the NASA Ames 9 x 7-ft supersonic wind tunnel, are presented. Experiments were also conducted to determine the reliable range, sensitivity, and long-term stability of the instrument.

  14. [Cerebral infarction and transient ischemic attack].

    PubMed

    Sahara, Noriyuki; Kuwashiro, Takahiro; Okada, Yasushi

    2016-04-01

    Japanese Guidelines for the Management of Stroke 2015 was published. Here, we describe several points revised from the 2009 edition about "Cerebral infarction and transient ischemic attack (TIA)". The revision points are as follows; 1. Extension of possible time window of intravenous recombinant tissue-plasminogen activator treatment (from within 3 hours to within 4.5 hours); 2. Antiplatelet therapy in acute stage (dual antiplatelet therapy (DAPT) for non-cardioembolic ischemic stroke or TIA); 3. Endovascular recanalization therapy in acute stage; 4. Antiplatelet therapy in chronic stage (Cilostazol is recommended similar to aspirin or clopidogrel); 5. Non-vitamin K antagonist oral anticoagulants (NOACs) for non-valvular atrial fibrillation (NVAF) stroke or TIA patients; 6. Management of TIA. We explain the revised points of the guideline in the text.

  15. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  16. Resveratrol products resulting by free radical attack

    NASA Astrophysics Data System (ADS)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  17. Marr's Attacks: On Reductionism and Vagueness.

    PubMed

    Eliasmith, Chris; Kolbeck, Carter

    2015-04-01

    It has been suggested that Marr took the three levels he famously identifies to be independent. In this paper, we argue that Marr's view is more nuanced. Specifically, we show that the view explicitly articulated in his work attempts to integrate the levels, and in doing so results in Marr attacking both reductionism and vagueness. The result is a perspective in which both high-level information-processing constraints and low-level implementational constraints play mutually reinforcing and constraining roles. We discuss our recent work on Spaun-currently the world's largest functional brain model-that demonstrates the positive impact of this kind of unifying integration of Marr's levels. We argue that this kind of integration avoids his concerns with both reductionism and vagueness. In short, we suggest that the methods behind Spaun can be used to satisfy Marr's explicit interest in combining high-level functional and detailed mechanistic explanations.

  18. European industry attacks proposed carbon tax

    SciTech Connect

    Roberts, M.

    1995-08-09

    The European chemical industry, facing growing political support for the European Commission`s latest version of the carbon dioxide (CO{sub 2})-energy tax, has renewed its attacks on the proposed law. Simon de Bree, chairman of DSM and president of the European Chemical Industry Council (Cefic; Brussels), last week wrote to Jacques Santer, president of the commission, and Solana Madariaga, current president of Europe Union`s (EU) Council of Ministers, saying the tax was {open_quotes}totally unacceptable and irresponsible in terms of EU competitiveness.{close_quotes} He says it {open_quotes}has nothing to do anymore with the protection of the environment and has instead become a normal additional taxation, disguised, for opportunistic reasons, as an environmental protection measurement.{close_quotes}

  19. Inorganic nanoparticles engineered to attack bacteria.

    PubMed

    Miller, Kristen P; Wang, Lei; Benicewicz, Brian C; Decho, Alan W

    2015-11-01

    Antibiotics were once the golden bullet to constrain infectious bacteria. However, the rapid and continuing emergence of antibiotic resistance (AR) among infectious microbial pathogens has questioned the future utility of antibiotics. This dilemma has recently fueled the marriage of the disparate fields of nanochemistry and antibiotics. Nanoparticles and other types of nanomaterials have been extensively developed for drug delivery to eukaryotic cells. However, bacteria have very different cellular architectures than eukaryotic cells. This review addresses the chemistry of nanoparticle-based antibiotic carriers, and how their technical capabilities are now being re-engineered to attack, kill, but also non-lethally manipulate the physiologies of bacteria. This review also discusses the surface functionalization of inorganic nanoparticles with small ligand molecules, polymers, and charged moieties to achieve drug loading and controllable release.

  20. Detecting Cyber Attacks On Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  1. [Cerebral infarction and transient ischemic attack].

    PubMed

    Sahara, Noriyuki; Kuwashiro, Takahiro; Okada, Yasushi

    2016-04-01

    Japanese Guidelines for the Management of Stroke 2015 was published. Here, we describe several points revised from the 2009 edition about "Cerebral infarction and transient ischemic attack (TIA)". The revision points are as follows; 1. Extension of possible time window of intravenous recombinant tissue-plasminogen activator treatment (from within 3 hours to within 4.5 hours); 2. Antiplatelet therapy in acute stage (dual antiplatelet therapy (DAPT) for non-cardioembolic ischemic stroke or TIA); 3. Endovascular recanalization therapy in acute stage; 4. Antiplatelet therapy in chronic stage (Cilostazol is recommended similar to aspirin or clopidogrel); 5. Non-vitamin K antagonist oral anticoagulants (NOACs) for non-valvular atrial fibrillation (NVAF) stroke or TIA patients; 6. Management of TIA. We explain the revised points of the guideline in the text. PMID:27333757

  2. Techniques for Judging Intent Behind Network Based Cyber Attacks

    SciTech Connect

    Allen, J M

    2004-01-28

    This project developed a prototype system that can rapidly differentiate between undirected cyber attacks, and those that have a more specific and concerning intent behind them. The system responds to important cyber attacks in a tactically significant way as the attack is proceeding. It is also creates a prioritized list for the human analysts allowing them to focus on the threats mostly likely to be of interest. In the recent years the volume of attacks over the internet has increased exponentially, as they have become more and more automated. The result of this is that real threats are harder and harder to distinguish from the general threat. It is possible with our current systems to identify network packets that originated from thousands of IP addresses as probing a site like LLNL in a single day. Human analysis of these threats does not result in information that can be used for tactical response because most of the attacks are short and over before the human starts the analysis. Only a very small percentage of attacks can even be evaluated manually due to the volume. This project developed methods, and prototyped tools, that can identify attacks, slow the attack down and aid in the process of prioritizing detections. The project demonstrated that such methods exist, and that practical implementations exist for modern computers and networks. We call the tools created D.I.A.G. or Determining Internet Attackers Goals.

  3. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  4. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  5. The allocation of ecosystem net primary productivity in tropical forests

    PubMed Central

    Malhi, Yadvinder; Doughty, Christopher; Galbraith, David

    2011-01-01

    The allocation of the net primary productivity (NPP) of an ecosystem between canopy, woody tissue and fine roots is an important descriptor of the functioning of that ecosystem, and an important feature to correctly represent in terrestrial ecosystem models. Here, we collate and analyse a global dataset of NPP allocation in tropical forests, and compare this with the representation of NPP allocation in 13 terrestrial ecosystem models. On average, the data suggest an equal partitioning of allocation between all three main components (mean 34 ± 6% canopy, 39 ± 10% wood, 27 ± 11% fine roots), but there is substantial site-to-site variation in allocation to woody tissue versus allocation to fine roots. Allocation to canopy (leaves, flowers and fruit) shows much less variance. The mean allocation of the ecosystem models is close to the mean of the data, but the spread is much greater, with several models reporting allocation partitioning outside of the spread of the data. Where all main components of NPP cannot be measured, litterfall is a good predictor of overall NPP (r2 = 0.83 for linear fit forced through origin), stem growth is a moderate predictor and fine root production a poor predictor. Across sites the major component of variation of allocation is a shifting allocation between wood and fine roots, with allocation to the canopy being a relatively invariant component of total NPP. This suggests the dominant allocation trade-off is a ‘fine root versus wood’ trade-off, as opposed to the expected ‘root–shoot’ trade-off; such a trade-off has recently been posited on theoretical grounds for old-growth forest stands. We conclude by discussing the systematic biases in estimates of allocation introduced by missing NPP components, including herbivory, large leaf litter and root exudates production. These biases have a moderate effect on overall carbon allocation estimates, but are smaller than the observed range in allocation values across sites. PMID

  6. 7 CFR 3430.311 - Allocation of research funds.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 15 2013-01-01 2013-01-01 false Allocation of research funds. 3430.311 Section 3430... ADMINISTRATIVE PROVISIONS Agriculture and Food Research Initiative § 3430.311 Allocation of research funds. (a) Fundamental research. Of the amount allocated by the Director for research, not less than 60 percent shall...

  7. 7 CFR 3430.311 - Allocation of research funds.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 15 2012-01-01 2012-01-01 false Allocation of research funds. 3430.311 Section 3430... ADMINISTRATIVE PROVISIONS Agriculture and Food Research Initiative § 3430.311 Allocation of research funds. (a) Fundamental research. Of the amount allocated by the Director for research, not less than 60 percent shall...

  8. Reward Allocation and Academic versus Social Orientation toward School.

    ERIC Educational Resources Information Center

    Peterson, Candida C.; Peterson, James L.

    1978-01-01

    Correlates 138 elementary school children's views about the purposes of school to their styles of reward allocation: academically motivated students allocated rewards equally to two hypothetical performers who had unequally helped a teacher perform a manual chore, while socially motivated children allocated rewards in an equity (performance-based)…

  9. 40 CFR 97.142 - CAIR NOX allowance allocations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 22 2012-07-01 2012-07-01 false CAIR NOX allowance allocations. 97.142... (CONTINUED) FEDERAL NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS CAIR NOX Allowance Allocations § 97.142 CAIR NOX allowance allocations. (a)(1) The baseline heat input (in mmBtu) used...

  10. 40 CFR 96.42 - NOX allowance allocations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 22 2012-07-01 2012-07-01 false NOX allowance allocations. 96.42... (CONTINUED) NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS FOR STATE IMPLEMENTATION PLANS NOX Allowance Allocations § 96.42 NOX allowance allocations. (a)(1) The heat input (in mmBtu) used...

  11. 40 CFR 97.42 - NOX allowance allocations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 22 2012-07-01 2012-07-01 false NOX allowance allocations. 97.42... (CONTINUED) FEDERAL NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS NOX Allowance Allocations § 97.42 NOX allowance allocations. (a)(1) The heat input (in mmBtu) used for calculating...

  12. 40 CFR 96.142 - CAIR NOX allowance allocations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 22 2012-07-01 2012-07-01 false CAIR NOX allowance allocations. 96.142... (CONTINUED) NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS FOR STATE IMPLEMENTATION PLANS CAIR NOX Allowance Allocations § 96.142 CAIR NOX allowance allocations. (a)(1) The baseline heat...

  13. 14 CFR 93.215 - Initial allocation of slots.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Carrier IFR Operations at High Density Traffic Airports § 93.215 Initial allocation of slots. (a) Each air... of the air carrier and commuter operator scheduling committees, shall be allocated those slots... records of the scheduling committees, shall be allocated in conformity with those records. The...

  14. 14 CFR 93.215 - Initial allocation of slots.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES Allocation of Commuter and Air Carrier IFR Operations at High Density Traffic Airports § 93.215 Initial allocation of slots. (a) Each air... of the air carrier and commuter operator scheduling committees, shall be allocated those...

  15. 14 CFR 93.215 - Initial allocation of slots.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES Allocation of Commuter and Air Carrier IFR Operations at High Density Traffic Airports § 93.215 Initial allocation of slots. (a) Each air... of the air carrier and commuter operator scheduling committees, shall be allocated those...

  16. 7 CFR 761.205 - Computing the formula allocation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Computing the formula allocation. 761.205 Section 761... Farm Loan Programs Funds to State Offices § 761.205 Computing the formula allocation. (a) The formula... funds for a loan program that the National Office allocates to a State Office. formula...

  17. 7 CFR 761.205 - Computing the formula allocation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false Computing the formula allocation. 761.205 Section 761... Farm Loan Programs Funds to State Offices § 761.205 Computing the formula allocation. (a) The formula... funds for a loan program that the National Office allocates to a State Office. formula...

  18. 47 CFR 76.924 - Allocation to service cost categories.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... equipment basket based on direct analysis of the origin of the costs. (ii) Where allocation based on direct analysis is not possible, common costs for which no allocator has been specified by the Commission shall... be found, common costs shall be allocated to each service cost category based on the ratio of...

  19. 5 CFR 319.202 - Allocation of positions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 1 2014-01-01 2014-01-01 false Allocation of positions. 319.202 Section 319.202 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS EMPLOYMENT IN SENIOR-LEVEL AND SCIENTIFIC AND PROFESSIONAL POSITIONS Position Allocations and Establishment § 319.202 Allocation of positions. SL and...

  20. Motivation and Competence as Determinants of Young Children's Reward Allocation

    ERIC Educational Resources Information Center

    Nelson, Sharon A.; Dweck, Carol S.

    1977-01-01

    This study examined the effects of allocation instructions and self-interest on preschool children's use of the rule of equity in situations involving reward allocation. Results showed that when the demand for equity was explicit and self-interest was removed, all children used equity in allocating rewards. (Author/JMB)

  1. 10 CFR 490.703 - Biodiesel fuel use credit allocation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Biodiesel fuel use credit allocation. 490.703 Section 490.703 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Biodiesel Fuel Use Credit § 490.703 Biodiesel fuel use credit allocation. (a) DOE shall allocate to a fleet...

  2. Reward Allocation among Chinese High School Students in Hong Kong.

    ERIC Educational Resources Information Center

    Chiu, Chi-Yue

    1989-01-01

    Examined effects of personality and performance on reward allocation. Subjects were 89 Hong Kong senior high school students. Results showed that the subjects took into consideration the recipient's personality when they allocated reward to a relatively low performer. Personality was not a factor in allocation of reward to a high performer. (GG)

  3. 47 CFR 32.22 - Comprehensive interperiod tax allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 2 2013-10-01 2013-10-01 false Comprehensive interperiod tax allocation. 32.22... interperiod tax allocation. (a) Companies shall apply interperiod tax allocation (tax normalization) to all book/tax temporary differences which would be considered material for published financial...

  4. 47 CFR 32.22 - Comprehensive interperiod tax allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 2 2014-10-01 2014-10-01 false Comprehensive interperiod tax allocation. 32.22... interperiod tax allocation. (a) Companies shall apply interperiod tax allocation (tax normalization) to all book/tax temporary differences which would be considered material for published financial...

  5. 47 CFR 32.22 - Comprehensive interperiod tax allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Comprehensive interperiod tax allocation. 32.22... interperiod tax allocation. (a) Companies shall apply interperiod tax allocation (tax normalization) to all book/tax temporary differences which would be considered material for published financial...

  6. 47 CFR 32.22 - Comprehensive interperiod tax allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 2 2012-10-01 2012-10-01 false Comprehensive interperiod tax allocation. 32.22... interperiod tax allocation. (a) Companies shall apply interperiod tax allocation (tax normalization) to all book/tax temporary differences which would be considered material for published financial...

  7. 40 CFR 97.142 - CAIR NOX allowance allocations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 21 2011-07-01 2011-07-01 false CAIR NOX allowance allocations. 97.142... (CONTINUED) FEDERAL NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS CAIR NOX Allowance Allocations § 97.142 CAIR NOX allowance allocations. (a)(1) The baseline heat input (in mmBtu) used...

  8. 40 CFR 96.42 - NOX allowance allocations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 21 2014-07-01 2014-07-01 false NOX allowance allocations. 96.42... (CONTINUED) NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS FOR STATE IMPLEMENTATION PLANS NOX Allowance Allocations § 96.42 NOX allowance allocations. (a)(1) The heat input (in mmBtu) used...

  9. 40 CFR 96.42 - NOX allowance allocations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 21 2011-07-01 2011-07-01 false NOX allowance allocations. 96.42... (CONTINUED) NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS FOR STATE IMPLEMENTATION PLANS NOX Allowance Allocations § 96.42 NOX allowance allocations. (a)(1) The heat input (in mmBtu) used...

  10. 40 CFR 97.42 - NOX allowance allocations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 22 2013-07-01 2013-07-01 false NOX allowance allocations. 97.42... (CONTINUED) FEDERAL NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS NOX Allowance Allocations § 97.42 NOX allowance allocations. (a)(1) The heat input (in mmBtu) used for calculating...

  11. 40 CFR 97.42 - NOX allowance allocations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false NOX allowance allocations. 97.42... (CONTINUED) FEDERAL NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS NOX Allowance Allocations § 97.42 NOX allowance allocations. (a)(1) The heat input (in mmBtu) used for calculating...

  12. 40 CFR 96.42 - NOX allowance allocations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false NOX allowance allocations. 96.42... (CONTINUED) NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS FOR STATE IMPLEMENTATION PLANS NOX Allowance Allocations § 96.42 NOX allowance allocations. (a)(1) The heat input (in mmBtu) used...

  13. 40 CFR 96.42 - NOX allowance allocations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 22 2013-07-01 2013-07-01 false NOX allowance allocations. 96.42... (CONTINUED) NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO 2 TRADING PROGRAMS FOR STATE IMPLEMENTATION PLANS NOX Allowance Allocations § 96.42 NOX allowance allocations. (a)(1) The heat input (in mmBtu) used...

  14. 40 CFR 96.142 - CAIR NOX allowance allocations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 21 2011-07-01 2011-07-01 false CAIR NOX allowance allocations. 96.142... (CONTINUED) NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS FOR STATE IMPLEMENTATION PLANS CAIR NOX Allowance Allocations § 96.142 CAIR NOX allowance allocations. (a)(1) The baseline heat...

  15. 40 CFR 97.42 - NOX allowance allocations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 21 2011-07-01 2011-07-01 false NOX allowance allocations. 97.42... (CONTINUED) FEDERAL NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS NOX Allowance Allocations § 97.42 NOX allowance allocations. (a)(1) The heat input (in mmBtu) used for calculating...

  16. 20 CFR 632.252 - Allocation of funds.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Allocation of funds. 632.252 Section 632.252... EMPLOYMENT AND TRAINING PROGRAMS Summer Youth Employment and Training Programs § 632.252 Allocation of funds... available in the CETA, IV-C Fiscal Year 1983 program. (b) Allocations shall be made to eligible...

  17. 14 CFR 1260.61 - Allocation of risk/liability.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Allocation of risk/liability. 1260.61 Section 1260.61 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION GRANTS AND COOPERATIVE AGREEMENTS General Special Conditions § 1260.61 Allocation of risk/liability. Allocation of...

  18. 26 CFR 1.652(b)-3 - Allocation of deductions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Allocation of deductions. 1.652(b)-3 Section 1... (CONTINUED) INCOME TAXES Trusts Which Distribute Current Income Only § 1.652(b)-3 Allocation of deductions... not included in distributable net income does not affect allocation under this paragraph. For...

  19. 48 CFR 408.705-3 - Allocation process.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Allocation process. 408... Employing People Who Are Blind or Severely Disabled 408.705-3 Allocation process. (a) The chief of a contracting office may apply to a central nonprofit agency for a production allocation of specific supplies...

  20. 17 CFR 256.01-11 - Methods of allocation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Methods of allocation. 256.01... HOLDING COMPANY ACT OF 1935 General Instructions § 256.01-11 Methods of allocation. Indirect costs and... applicable and currently effective methods of allocation filed with the Commission. Both direct and...

  1. 26 CFR 1.456-3 - Method of allocation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 6 2010-04-01 2010-04-01 false Method of allocation. 1.456-3 Section 1.456-3...) INCOME TAXES Taxable Year for Which Items of Gross Income Included § 1.456-3 Method of allocation. (a... method of aggregation and allocation is consistently followed....

  2. 45 CFR 152.33 - Initial allocation of funds.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Initial allocation of funds. 152.33 Section 152.33...-EXISTING CONDITION INSURANCE PLAN PROGRAM Funding § 152.33 Initial allocation of funds. HHS will establish... State using a methodology consistent with that used to established allocations under the...

  3. 26 CFR 1.455-3 - Method of allocation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 6 2010-04-01 2010-04-01 false Method of allocation. 1.455-3 Section 1.455-3...) INCOME TAXES Taxable Year for Which Items of Gross Income Included § 1.455-3 Method of allocation. (a... reasonable manner, provided the method of aggregation and allocation is consistently followed....

  4. 10 CFR 470.15 - Allocation of funds.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Allocation of funds. 470.15 Section 470.15 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION APPROPRIATE TECHNOLOGY SMALL GRANTS PROGRAM § 470.15 Allocation of funds. (a) DOE shall annually allocate fiscal year funds available for support among the 10...

  5. 30 CFR 1206.260 - Allocation of washed coal.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Allocation of washed coal. 1206.260 Section... RESOURCES REVENUE PRODUCT VALUATION Federal Coal § 1206.260 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b)...

  6. 30 CFR 1206.260 - Allocation of washed coal.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Allocation of washed coal. 1206.260 Section... RESOURCES REVENUE PRODUCT VALUATION Federal Coal § 1206.260 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b)...

  7. 30 CFR 1206.459 - Allocation of washed coal.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Allocation of washed coal. 1206.459 Section... RESOURCES REVENUE PRODUCT VALUATION Indian Coal § 1206.459 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b)...

  8. 30 CFR 1206.260 - Allocation of washed coal.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Allocation of washed coal. 1206.260 Section... RESOURCES REVENUE PRODUCT VALUATION Federal Coal § 1206.260 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b)...

  9. 30 CFR 1206.459 - Allocation of washed coal.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Allocation of washed coal. 1206.459 Section... RESOURCES REVENUE PRODUCT VALUATION Indian Coal § 1206.459 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b)...

  10. 30 CFR 1206.459 - Allocation of washed coal.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Allocation of washed coal. 1206.459 Section... INTERIOR Natural Resources Revenue PRODUCT VALUATION Indian Coal § 1206.459 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it...

  11. 30 CFR 1206.260 - Allocation of washed coal.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Allocation of washed coal. 1206.260 Section... INTERIOR Natural Resources Revenue PRODUCT VALUATION Federal Coal § 1206.260 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it...

  12. 30 CFR 206.459 - Allocation of washed coal.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Allocation of washed coal. 206.459 Section 206... MANAGEMENT PRODUCT VALUATION Indian Coal § 206.459 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b) When the...

  13. 30 CFR 1206.459 - Allocation of washed coal.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Allocation of washed coal. 1206.459 Section... RESOURCES REVENUE PRODUCT VALUATION Indian Coal § 1206.459 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b)...

  14. 30 CFR 206.260 - Allocation of washed coal.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Allocation of washed coal. 206.260 Section 206... MANAGEMENT PRODUCT VALUATION Federal Coal § 206.260 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b) When the...

  15. 77 FR 54482 - Allocation of Costs Under the Simplified Methods

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-05

    ... Internal Revenue Service 26 CFR Part 1 RIN 1545-BG07 Allocation of Costs Under the Simplified Methods... document contains proposed regulations on allocating costs to certain property produced by the taxpayer or... resellers of property that are required to capitalize certain costs to the property and that allocate...

  16. 7 CFR 761.205 - Computing the formula allocation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Computing the formula allocation. 761.205 Section 761.205 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY... Funds to State Offices § 761.205 Computing the formula allocation. (a) The formula allocation for FO...

  17. 18 CFR 367.28 - Methods of allocation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Methods of allocation... Instructions § 367.28 Methods of allocation. Indirect costs and compensation for use of capital must be allocated to projects in accordance with the service company's applicable and currently effective methods...

  18. 12 CFR 211.43 - Allocated transfer risk reserve.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Allocated transfer risk reserve. 211.43 Section... risk reserve. (a) Establishment of Allocated Transfer Risk Reserve. A banking institution shall establish an allocated transfer risk reserve (ATRR) for specified international assets when required by...

  19. 10 CFR 490.703 - Biodiesel fuel use credit allocation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Biodiesel fuel use credit allocation. 490.703 Section 490.703 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Biodiesel Fuel Use Credit § 490.703 Biodiesel fuel use credit allocation. (a) DOE shall allocate to a fleet...

  20. 10 CFR 490.703 - Biodiesel fuel use credit allocation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Biodiesel fuel use credit allocation. 490.703 Section 490.703 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Biodiesel Fuel Use Credit § 490.703 Biodiesel fuel use credit allocation. (a) DOE shall allocate to a fleet...

  1. 26 CFR 1.642(h)-4 - Allocation.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 26 Internal Revenue 8 2011-04-01 2011-04-01 false Allocation. 1.642(h)-4 Section 1.642(h)-4...) INCOME TAXES (CONTINUED) Estates, Trusts, and Beneficiaries § 1.642(h)-4 Allocation. The carryovers and excess deductions to which section 642(h) applies are allocated among the beneficiaries succeeding to...

  2. 12 CFR 28.52 - Allocated transfer risk reserve.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Allocated transfer risk reserve. 28.52 Section 28.52 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY INTERNATIONAL BANKING... allocated transfer risk reserve. A banking institution shall establish an allocated transfer risk...

  3. 77 FR 2240 - Allocation and Apportionment of Interest Expense

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Internal Revenue Service 26 CFR Part 1 RIN 1545-BJ59 Allocation and Apportionment of Interest Expense... guidance relating to the allocation and apportionment of interest expense. The temporary regulations provide guidance concerning the allocation and apportionment of interest expense by corporations owning...

  4. 49 CFR 93.1 - Issuance of aircraft allocations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Issuance of aircraft allocations. 93.1 Section 93.1 Transportation Office of the Secretary of Transportation AIRCRAFT ALLOCATION § 93.1 Issuance of aircraft allocations. From time to time, the Director, Office of Emergency Transportation, issues...

  5. 49 CFR 93.1 - Issuance of aircraft allocations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Issuance of aircraft allocations. 93.1 Section 93.1 Transportation Office of the Secretary of Transportation AIRCRAFT ALLOCATION § 93.1 Issuance of aircraft allocations. From time to time, the Director, Office of Emergency Transportation, issues...

  6. 49 CFR 93.1 - Issuance of aircraft allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Issuance of aircraft allocations. 93.1 Section 93.1 Transportation Office of the Secretary of Transportation AIRCRAFT ALLOCATION § 93.1 Issuance of aircraft allocations. From time to time, the Director, Office of Emergency Transportation, issues...

  7. 49 CFR 93.1 - Issuance of aircraft allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Issuance of aircraft allocations. 93.1 Section 93.1 Transportation Office of the Secretary of Transportation AIRCRAFT ALLOCATION § 93.1 Issuance of aircraft allocations. From time to time, the Director, Office of Emergency Transportation, issues...

  8. 49 CFR 93.1 - Issuance of aircraft allocations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Issuance of aircraft allocations. 93.1 Section 93.1 Transportation Office of the Secretary of Transportation AIRCRAFT ALLOCATION § 93.1 Issuance of aircraft allocations. From time to time, the Director, Office of Emergency Transportation, issues...

  9. 26 CFR 1.642(h)-4 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Allocation. 1.642(h)-4 Section 1.642(h)-4...) INCOME TAXES Estates, Trusts, and Beneficiaries § 1.642(h)-4 Allocation. The carryovers and excess deductions to which section 642(h) applies are allocated among the beneficiaries succeeding to the...

  10. 12 CFR 28.52 - Allocated transfer risk reserve.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Allocated transfer risk reserve. 28.52 Section 28.52 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY INTERNATIONAL BANKING... allocated transfer risk reserve. A banking institution shall establish an allocated transfer risk...

  11. 49 CFR 198.13 - Grant allocation formula.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Grant allocation formula. 198.13 Section 198.13... PIPELINE SAFETY PROGRAMS Grant Allocation § 198.13 Grant allocation formula. (a) Beginning in calendar year... assigns weights to various performance factors reflecting program compliance, safety priorities,...

  12. 49 CFR 198.13 - Grant allocation formula.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 3 2013-10-01 2013-10-01 false Grant allocation formula. 198.13 Section 198.13... PIPELINE SAFETY PROGRAMS Grant Allocation § 198.13 Grant allocation formula. (a) Beginning in calendar year... assigns weights to various performance factors reflecting program compliance, safety priorities,...

  13. 7 CFR 761.205 - Computing the formula allocation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Computing the formula allocation. 761.205 Section 761... Farm Loan Programs Funds to State Offices § 761.205 Computing the formula allocation. (a) The formula... funds for a loan program that the National Office allocates to a State Office. formula...

  14. Response-Adaptive Allocation for Circular Data.

    PubMed

    Biswas, Atanu; Dutta, Somak; Laha, Arnab Kumar; Bakshi, Partho K

    2015-01-01

    Response-adaptive designs are used in phase III clinical trials to allocate a larger proportion of patients to the better treatment. Circular data is a natural outcome in many clinical trial setup, e.g., some measurements in opthalmologic studies, degrees of rotation of hand or waist, etc. There is no available work on response-adaptive designs for circular data. With reference to a dataset on cataract surgery we provide some response-adaptive designs where the responses are of circular nature and propose some test statistics for treatment comparison under adaptive data allocation procedure. Detailed simulation study and the analysis of the dataset, including redesigning the cataract surgery data, are carried out.

  15. The relationship between attention allocation and cheating.

    PubMed

    Pittarello, Andrea; Motro, Daphna; Rubaltelli, Enrico; Pluchino, Patrik

    2016-04-01

    Little is known about the relationship between attention allocation and dishonesty. The goal of the present work was to address this issue using the eyetracking methodology. We developed a novel task in which participants could honestly report seeing a particular card and lose money, or they could falsely report not seeing the card and not lose money. When participants cheated, they allocated less attention (i.e., shorter fixation durations and fewer fixations) to the card than when they behaved honestly. Our results suggest that when dishonesty pays, shifting attention away from undesirable information can serve as a self-deception strategy that allows individuals to serve their self-interests while maintaining a positive self-concept.

  16. Dynamic advance reservation with delayed allocation

    DOEpatents

    Vokkarane, Vinod; Somani, Arun

    2014-12-02

    A method of scheduling data transmissions from a source to a destination, includes the steps of: providing a communication system having a number of channels and a number of paths, each of the channels having a plurality of designated time slots; receiving two or more data transmission requests; provisioning the transmission of the data; receiving data corresponding to at least one of the two or more data transmission requests; waiting until an earliest requested start time T.sub.s; allocating at the current time each of the two or more data transmission requests; transmitting the data; and repeating the steps of waiting, allocating, and transmitting until each of the two or more data transmission requests that have been provisioned for a transmission of data is satisfied. A system to perform the method of scheduling data transmissions is also described.

  17. Rethinking Reinforcement: Allocation, Induction, and Contingency

    PubMed Central

    Baum, William M

    2012-01-01

    The concept of reinforcement is at least incomplete and almost certainly incorrect. An alternative way of organizing our understanding of behavior may be built around three concepts: allocation, induction, and correlation. Allocation is the measure of behavior and captures the centrality of choice: All behavior entails choice and consists of choice. Allocation changes as a result of induction and correlation. The term induction covers phenomena such as adjunctive, interim, and terminal behavior—behavior induced in a situation by occurrence of food or another Phylogenetically Important Event (PIE) in that situation. Induction resembles stimulus control in that no one-to-one relation exists between induced behavior and the inducing event. If one allowed that some stimulus control were the result of phylogeny, then induction and stimulus control would be identical, and a PIE would resemble a discriminative stimulus. Much evidence supports the idea that a PIE induces all PIE-related activities. Research also supports the idea that stimuli correlated with PIEs become PIE-related conditional inducers. Contingencies create correlations between “operant” activity (e.g., lever pressing) and PIEs (e.g., food). Once an activity has become PIE-related, the PIE induces it along with other PIE-related activities. Contingencies also constrain possible performances. These constraints specify feedback functions, which explain phenomena such as the higher response rates on ratio schedules in comparison with interval schedules. Allocations that include a lot of operant activity are “selected” only in the sense that they generate more frequent occurrence of the PIE within the constraints of the situation; contingency and induction do the “selecting.” PMID:22287807

  18. Rethinking reinforcement: allocation, induction, and contingency.

    PubMed

    Baum, William M

    2012-01-01

    The concept of reinforcement is at least incomplete and almost certainly incorrect. An alternative way of organizing our understanding of behavior may be built around three concepts: allocation, induction, and correlation. Allocation is the measure of behavior and captures the centrality of choice: All behavior entails choice and consists of choice. Allocation changes as a result of induction and correlation. The term induction covers phenomena such as adjunctive, interim, and terminal behavior-behavior induced in a situation by occurrence of food or another Phylogenetically Important Event (PIE) in that situation. Induction resembles stimulus control in that no one-to-one relation exists between induced behavior and the inducing event. If one allowed that some stimulus control were the result of phylogeny, then induction and stimulus control would be identical, and a PIE would resemble a discriminative stimulus. Much evidence supports the idea that a PIE induces all PIE-related activities. Research also supports the idea that stimuli correlated with PIEs become PIE-related conditional inducers. Contingencies create correlations between "operant" activity (e.g., lever pressing) and PIEs (e.g., food). Once an activity has become PIE-related, the PIE induces it along with other PIE-related activities. Contingencies also constrain possible performances. These constraints specify feedback functions, which explain phenomena such as the higher response rates on ratio schedules in comparison with interval schedules. Allocations that include a lot of operant activity are "selected" only in the sense that they generate more frequent occurrence of the PIE within the constraints of the situation; contingency and induction do the "selecting." PMID:22287807

  19. Rethinking reinforcement: allocation, induction, and contingency.

    PubMed

    Baum, William M

    2012-01-01

    The concept of reinforcement is at least incomplete and almost certainly incorrect. An alternative way of organizing our understanding of behavior may be built around three concepts: allocation, induction, and correlation. Allocation is the measure of behavior and captures the centrality of choice: All behavior entails choice and consists of choice. Allocation changes as a result of induction and correlation. The term induction covers phenomena such as adjunctive, interim, and terminal behavior-behavior induced in a situation by occurrence of food or another Phylogenetically Important Event (PIE) in that situation. Induction resembles stimulus control in that no one-to-one relation exists between induced behavior and the inducing event. If one allowed that some stimulus control were the result of phylogeny, then induction and stimulus control would be identical, and a PIE would resemble a discriminative stimulus. Much evidence supports the idea that a PIE induces all PIE-related activities. Research also supports the idea that stimuli correlated with PIEs become PIE-related conditional inducers. Contingencies create correlations between "operant" activity (e.g., lever pressing) and PIEs (e.g., food). Once an activity has become PIE-related, the PIE induces it along with other PIE-related activities. Contingencies also constrain possible performances. These constraints specify feedback functions, which explain phenomena such as the higher response rates on ratio schedules in comparison with interval schedules. Allocations that include a lot of operant activity are "selected" only in the sense that they generate more frequent occurrence of the PIE within the constraints of the situation; contingency and induction do the "selecting."

  20. Irrational time allocation in decision-making.

    PubMed

    Oud, Bastiaan; Krajbich, Ian; Miller, Kevin; Cheong, Jin Hyun; Botvinick, Matthew; Fehr, Ernst

    2016-01-13

    Time is an extremely valuable resource but little is known about the efficiency of time allocation in decision-making. Empirical evidence suggests that in many ecologically relevant situations, decision difficulty and the relative reward from making a correct choice, compared to an incorrect one, are inversely linked, implying that it is optimal to use relatively less time for difficult choice problems. This applies, in particular, to value-based choices, in which the relative reward from choosing the higher valued item shrinks as the values of the other options get closer to the best option and are thus more difficult to discriminate. Here, we experimentally show that people behave sub-optimally in such contexts. They do not respond to incentives that favour the allocation of time to choice problems in which the relative reward for choosing the best option is high; instead they spend too much time on problems in which the reward difference between the options is low. We demonstrate this by showing that it is possible to improve subjects' time allocation with a simple intervention that cuts them off when their decisions take too long. Thus, we provide a novel form of evidence that organisms systematically spend their valuable time in an inefficient way, and simultaneously offer a potential solution to the problem. PMID:26763695

  1. Irrational time allocation in decision-making.

    PubMed

    Oud, Bastiaan; Krajbich, Ian; Miller, Kevin; Cheong, Jin Hyun; Botvinick, Matthew; Fehr, Ernst

    2016-01-13

    Time is an extremely valuable resource but little is known about the efficiency of time allocation in decision-making. Empirical evidence suggests that in many ecologically relevant situations, decision difficulty and the relative reward from making a correct choice, compared to an incorrect one, are inversely linked, implying that it is optimal to use relatively less time for difficult choice problems. This applies, in particular, to value-based choices, in which the relative reward from choosing the higher valued item shrinks as the values of the other options get closer to the best option and are thus more difficult to discriminate. Here, we experimentally show that people behave sub-optimally in such contexts. They do not respond to incentives that favour the allocation of time to choice problems in which the relative reward for choosing the best option is high; instead they spend too much time on problems in which the reward difference between the options is low. We demonstrate this by showing that it is possible to improve subjects' time allocation with a simple intervention that cuts them off when their decisions take too long. Thus, we provide a novel form of evidence that organisms systematically spend their valuable time in an inefficient way, and simultaneously offer a potential solution to the problem.

  2. Legal briefing: organ donation and allocation.

    PubMed

    Pope, Thaddeus Mason

    2010-01-01

    This issue's "Legal Briefing" column covers legal developments pertaining to organ donation and allocation. This topic has been the subject of recent articles in JCE. Organ donation and allocation have also recently been the subjects of significant public policy attention. In the past several months, legislatures and regulatory agencies across the United States and across the world have changed, or considered changing, the methods for procuring and distributing human organs for transplantation. Currently, in the U.S., more than 100,000 persons are waiting for organ transplantation. In China, more than 1.5 million people are waiting. Given the chronic shortage of available organs (especially kidneys and livers) relative to demand, the primary focus of most legal developments has been on increasing the rate of donation. These and related developments are usefully divided into the following 12 topical categories: 1. Revised Uniform Anatomical Gift Act. 2. Presumed Consent and Opt-Out. 3. Mandated Choice. 4. Donation after Cardiac Death. 5. Payment and Compensation. 6. Donation by Prisoners. 7. Donor Registries. 8. Public Education. 9. Other Procurement Initiatives. 10. Lawsuits and Liability. 11. Trafficking and Tourism. 12. Allocation and Distribution. PMID:21089996

  3. Optimal allocation of trend following strategies

    NASA Astrophysics Data System (ADS)

    Grebenkov, Denis S.; Serror, Jeremy

    2015-09-01

    We consider a portfolio allocation problem for trend following (TF) strategies on multiple correlated assets. Under simplifying assumptions of a Gaussian market and linear TF strategies, we derive analytical formulas for the mean and variance of the portfolio return. We construct then the optimal portfolio that maximizes risk-adjusted return by accounting for inter-asset correlations. The dynamic allocation problem for n assets is shown to be equivalent to the classical static allocation problem for n2 virtual assets that include lead-lag corrections in positions of TF strategies. The respective roles of asset auto-correlations and inter-asset correlations are investigated in depth for the two-asset case and a sector model. In contrast to the principle of diversification suggesting to treat uncorrelated assets, we show that inter-asset correlations allow one to estimate apparent trends more reliably and to adjust the TF positions more efficiently. If properly accounted for, inter-asset correlations are not deteriorative but beneficial for portfolio management that can open new profit opportunities for trend followers. These concepts are illustrated using daily returns of three highly correlated futures markets: the E-mini S&P 500, Euro Stoxx 50 index, and the US 10-year T-note futures.

  4. Cognitive radio resource allocation based on coupled chaotic genetic algorithm

    NASA Astrophysics Data System (ADS)

    Zu, Yun-Xiao; Zhou, Jie; Zeng, Chang-Chang

    2010-11-01

    A coupled chaotic genetic algorithm for cognitive radio resource allocation which is based on genetic algorithm and coupled Logistic map is proposed. A fitness function for cognitive radio resource allocation is provided. Simulations are conducted for cognitive radio resource allocation by using the coupled chaotic genetic algorithm, simple genetic algorithm and dynamic allocation algorithm respectively. The simulation results show that, compared with simple genetic and dynamic allocation algorithm, coupled chaotic genetic algorithm reduces the total transmission power and bit error rate in cognitive radio system, and has faster convergence speed.

  5. Effects of pyridoxine supplementation on severity, frequency and duration of migraine attacks in migraine patients with aura: A double-blind randomized clinical trial study in Iran

    PubMed Central

    Sadeghi, Omid; Nasiri, Morteza; Maghsoudi, Zahra; Pahlavani, Naseh; Rezaie, Masoud; Askari, Gholamreza

    2015-01-01

    Background: Migraine is a chronic disease that affects nearly 6% of men and 18% of women worldwide. There are various drugs, which can successfully decrease migraine symptoms and frequency of migraine attacks, but these drugs usually are expensive. Hence, this study aimed to assess the effects of pyridoxine supplementation on severity, frequency and duration of migraine attacks as well as headache diary results (HDR). Methods: This double-blind randomized clinical trial study was conducted on 66 patients with migraine with aura (MA) in Khorshid and Emam Mosa Sadr clinics of Isfahan University of Medical Sciences, Iran, in 2013. Patients were randomly allocated to receive either pyridoxine supplements (80 mg pyridoxine per day) or placebo. Severity, frequency and duration of migraine attacks and HDR were measured at baseline and at the end of the study. Results: Mean age of patients was 34.24 ± 9.44 years old. Pyridoxine supplementation led to a significant decrease in headache severity (−2.20 ± 1.70 compared with −1 ± 1.50; P = 0.007), attacks duration (−8.30 ± 12.60 compared with −1.70 ± 9.60; P = 0.030) and HDR (−89.70 ± 134.60 compared with −6.10 ± 155.50; P = 0.040) compared with placebo, but was not effective on the frequency of migraine attacks (−2.30 ± 4 compared with −1.20 ± 7.80; P = 0.510). Conclusion: Pyridoxine supplementation in patients with MA was effective on headache severity, attacks duration and HDR, but did not affect the frequency of migraine attacks. PMID:26056551

  6. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... a person loses consciousness and has no pulse. Death occurs within minutes if the victim does not receive treatment. What is the link? These two distinct heart conditions are linked. Sudden cardiac arrest can occur after a heart attack, or during recovery. Heart attacks increase the risk ...

  7. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  8. Sequential defense against random and intentional attacks in complex networks

    NASA Astrophysics Data System (ADS)

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  9. New Attacks on Animal Researchers Provoke Anger and Worry

    ERIC Educational Resources Information Center

    Guterman, Lila

    2008-01-01

    This article reports on firebomb attacks at the homes of two animal researchers which have provoked anger and unease. The firebomb attacks, which set the home of a neuroscientist at the University of California at Santa Cruz aflame and destroyed a car parked in the driveway of another university researcher's home, have left researchers and…

  10. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    ERIC Educational Resources Information Center

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  11. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed. PMID:25527240

  12. [Banana tree pests attacking Heliconia latispatha Benth. (Heliconiaceae)].

    PubMed

    Watanabe, Maria A

    2007-01-01

    In mid-May 2005, the caterpillars Antichloris eriphia (Fabr.) (Lepidoptera: Arctiidae) and Calligo illioneus (Cramer) (Lepidoptera: Nymphalidae) which are banana tree pests, were found attacking six-month old stalks of Heliconia latispatha Benth., planted near a banana tree plantation in Jaguariuna, SP, Brazil. The attack by C. illioneus is observed by the first time in Brazil.

  13. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  14. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  15. Pattern association--a key to recognition of shark attacks.

    PubMed

    Cirillo, G; James, H

    2004-12-01

    Investigation of a number of shark attacks in South Australian waters has lead to recognition of pattern similarities on equipment recovered from the scene of such attacks. Six cases are presented in which a common pattern of striations has been noted.

  16. Is There Anybody There? A Psychodynamic View of Panic Attack.

    ERIC Educational Resources Information Center

    Rizq, Rosemary

    2002-01-01

    Presents a process analysis of a psychodynamic intervention for a client with panic attacks. Discusses how a psychodynamic understanding of the complex etiology of the client's panic attacks that ultimately produced improved coping skills and a subjective sense of improvement for her. Process analysis is used to illustrate the theoretical base,…

  17. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  18. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  19. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  20. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  1. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  2. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES, CERTIFICATIONS, AND APPROVALS FOR NUCLEAR POWER PLANTS General Provisions § 52.10 Attacks and destructive acts. Neither an applicant for a license to...

  3. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  4. Are Risk Assessments of a Terrorist Attack Coherent?

    ERIC Educational Resources Information Center

    Mandel, David R.

    2005-01-01

    Four experiments examined 3 types of violations of coherence criteria in risk assessments of a terrorist attack. First, the requirement that extensionally equivalent descriptions be assigned the same probability (i.e., additivity) was violated. Unpacking descriptions of an attack into subtypes led to an increase in assessed risk. Second,…

  5. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    ERIC Educational Resources Information Center

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes that "Dateline NBC'"s…

  6. Structural basis of complement membrane attack complex formation

    NASA Astrophysics Data System (ADS)

    Serna, Marina; Giles, Joanna L.; Morgan, B. Paul; Bubeck, Doryen

    2016-02-01

    In response to complement activation, the membrane attack complex (MAC) assembles from fluid-phase proteins to form pores in lipid bilayers. MAC directly lyses pathogens by a `multi-hit' mechanism; however, sublytic MAC pores on host cells activate signalling pathways. Previous studies have described the structures of individual MAC components and subcomplexes; however, the molecular details of its assembly and mechanism of action remain unresolved. Here we report the electron cryo-microscopy structure of human MAC at subnanometre resolution. Structural analyses define the stoichiometry of the complete pore and identify a network of interaction interfaces that determine its assembly mechanism. MAC adopts a `split-washer' configuration, in contrast to the predicted closed ring observed for perforin and cholesterol-dependent cytolysins. Assembly precursors partially penetrate the lipid bilayer, resulting in an irregular β-barrel pore. Our results demonstrate how differences in symmetric and asymmetric components of the MAC underpin a molecular basis for pore formation and suggest a mechanism of action that extends beyond membrane penetration.

  7. Expected losses, insurability, and benefits from reducing vulnerability to attacks.

    SciTech Connect

    Nozick, Linda Karen; Carlson, Rolf Erik; Turnquist, Mark Alan

    2004-03-01

    A model of malicious attacks against an infrastructure system is developed that uses a network representation of the system structure together with a Hidden Markov Model of an attack at a node of that system and a Markov Decision Process model of attacker strategy across the system as a whole. We use information systems as an illustration, but the analytic structure developed can also apply to attacks against physical facilities or other systems that provide services to customers. This structure provides an explicit mechanism to evaluate expected losses from malicious attacks, and to evaluate changes in those losses that would result from system hardening. Thus, we provide a basis for evaluating the benefits of system hardening. The model also allows investigation of the potential for the purchase of an insurance contract to cover the potential losses when safeguards are breached and the system fails.

  8. Optimal attack strategy of complex networks based on tabu search

    NASA Astrophysics Data System (ADS)

    Deng, Ye; Wu, Jun; Tan, Yue-jin

    2016-01-01

    The problem of network disintegration has broad applications and recently has received growing attention, such as network confrontation and disintegration of harmful networks. This paper presents an optimized attack strategy model for complex networks and introduces the tabu search into the network disintegration problem to identify the optimal attack strategy, which is a heuristic optimization algorithm and rarely applied to the study of network robustness. The efficiency of the proposed solution was verified by comparing it with other attack strategies used in various model networks and real-world network. Numerical experiments suggest that our solution can improve the effect of network disintegration and that the "best" choice for node failure attacks can be identified through global searches. Our understanding of the optimal attack strategy may also shed light on a new property of the nodes within network disintegration and deserves additional study.

  9. Simulated predator attacks on flocks: a comparison of tactics.

    PubMed

    Demšar, Jure; Lebar Bajec, Iztok

    2014-01-01

    It is not exactly known why birds aggregate in coordinated flocks. The most common hypothesis proposes that the reason is protection from predators. Most of the currently developed examples of individual-based predator-prey models assume predators are attracted to the center of a highly coordinated flock. This proposed attraction of a predator to a flock would appear to be contradictory to an alternate hypothesis that flocks evolved as a protection against predation. In an attempt to resolve this apparent conflict, in this article we use a fuzzy individual-based model to study three attack tactics (attack center, attack nearest, attack isolated) and analyze the success of predation on two types of prey (social and individualistic). Our simulations revealed that social flocking (as opposed to individualistic behavior) is the optimal anti-predatory response to predators attacking mainly isolated individuals. PMID:24730766

  10. IVs to Skip for Immunizing WEP against FMS Attack

    NASA Astrophysics Data System (ADS)

    Kobara, Kazukuni; Imai, Hideki

    The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive skip methods reveal information on the WEP key since most of them depend on the WEP key and the patterns of the skipped IV reveal it. In order to skip IVs safely, the skip patterns must be chosen carefully. In this paper, we review the attack conditions (6) and (7), whose success probability is the highest, 0.05, amongst all known conditions to guess one key-byte from one packet. Then we identify their safe skip patterns.

  11. Step to improve neural cryptography against flipping attacks.

    PubMed

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  12. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  13. Weak laws against acid attacks on women: an Indian perspective.

    PubMed

    Ahmad, Nehaluddin

    2012-01-01

    Acid attacks, especially on women, have seen an alarming growth in India over the last decade. While these attacks can be attributed to various factors such as the social weakness of women in a male-dominated society, the situation is exacerbated by the general neglect of the lawmakers. As acid is inexpensive and easily available, it serves as an ideal weapon for the perpetrators. Further, as this offence is bailable in certain situations, the punishment does not act as a sufficient deterrent in most cases. This paper describes the horrendous effects that acid attacks have on the victims physically, psychologically and socially. It also examines the contemporary laws governing acid attacks on victims and offenders. Ideas for a better legal approach will also be examined with special reference to acid attacks as a crime, and the validity of specific legal provisions for female victims.

  14. Deformation and erosion of f.c.c. metals and alloys under cavitation attack

    NASA Technical Reports Server (NTRS)

    Rao, B. C. S.; Buckley, D. H.

    1984-01-01

    Experimental investigations have been conducted to determine the early stages of cavitation attack on 6061-T6 aluminum alloy, electrolytic tough pitch copper, brass, and bronze, all having polycrystalline fcc matrices. The surface profiles and scanning electron micrographs show that the pits are initially formed at the grain boundaries, while the grain surfaces are progressively roughened by multiple slip and twinning. The initial erosion is noted to have occurred from the material in the grain boundaries, as well as by fragmentation of part of the grains. Further erosion occurred by shearing and necking of the surface undulations caused by plastic deformation. The mean penetration depth, computed on the basis of mass loss, was lowest on the bronze and greatest on the copper. Attention is given to the relation of cavitation attack to grain size, glide stress and stacking fault energy.

  15. A Systematic Review of the Literature on Posttraumatic Stress Disorder in Victims of Terrorist Attacks.

    PubMed

    Paz García-Vera, María; Sanz, Jesús; Gutiérrez, Sara

    2016-08-01

    This article was aimed at systematically reviewing the literature on posttraumatic stress disorder (PTSD) among victims of terrorist attacks. Electronic and hand searches of the literature identified 35 studies addressing PTSD prevalence based on validated diagnostic interviews. Overall, in the year after terrorist attacks, 33% to 39% of direct victims developed PTSD, whereas the percentage of indirect victims with PTSD was lower (4% in the affected community, 5%-6% among emergency, rescue, and recovery workers, and 17%-29% among relatives and friends of the injured or killed victims), but nonetheless above the prevalence in the general population. With the passing of time, a significant reduction of PTSD can be expected in the affected community and in the emergency and rescue personnel, but not in the injured victims, in the relatives and friends of the injured or killed victims, and in nontraditional, more vulnerable disaster workers. The implications of these results for the psychological treatment of terrorism victims are discussed.

  16. A Systematic Review of the Literature on Posttraumatic Stress Disorder in Victims of Terrorist Attacks.

    PubMed

    Paz García-Vera, María; Sanz, Jesús; Gutiérrez, Sara

    2016-08-01

    This article was aimed at systematically reviewing the literature on posttraumatic stress disorder (PTSD) among victims of terrorist attacks. Electronic and hand searches of the literature identified 35 studies addressing PTSD prevalence based on validated diagnostic interviews. Overall, in the year after terrorist attacks, 33% to 39% of direct victims developed PTSD, whereas the percentage of indirect victims with PTSD was lower (4% in the affected community, 5%-6% among emergency, rescue, and recovery workers, and 17%-29% among relatives and friends of the injured or killed victims), but nonetheless above the prevalence in the general population. With the passing of time, a significant reduction of PTSD can be expected in the affected community and in the emergency and rescue personnel, but not in the injured victims, in the relatives and friends of the injured or killed victims, and in nontraditional, more vulnerable disaster workers. The implications of these results for the psychological treatment of terrorism victims are discussed. PMID:27388691

  17. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  18. Neurons under viral attack: victims or warriors?

    PubMed

    Chakraborty, Swarupa; Nazmi, Arshed; Dutta, Kallol; Basu, Anirban

    2010-01-01

    When the central nervous system (CNS) is under viral attack, defensive antiviral responses must necessarily arise from the CNS itself to rapidly and efficiently curb infections with minimal collateral damage to the sensitive, specialized and non-regenerating neural tissue. This presents a unique challenge because an intact blood-brain barrier (BBB) and lack of proper lymphatic drainage keeps the CNS virtually outside the radar of circulating immune cells that are at constant vigilance for antigens in peripheral tissues. Limited antigen presentation skills of CNS cells in comparison to peripheral tissues is because of a total lack of dendritic cells and feeble expression of major histocompatibility complex (MHC) proteins in neurons and glia. However, research over the past two decades has identified immune effector mechanisms intrinsic to the CNS for immediate tackling, attenuating and clearing of viral infections, with assistance pouring in from peripheral circulation in the form of neutralizing antibodies and cytotoxic T cells at a later stage. Specialized CNS cells, microglia and astrocytes, were regarded as sole sentinels of the brain for containing a viral onslaught but neurons held little recognition as a potential candidate for protecting itself from the proliferation and pathogenesis of neurotropic viruses. Accumulating evidence however indicates that extracellular insult causes neurons to express immune factors characteristic of lymphoid tissues. This article aims to comprehensively analyze current research on this conditional alteration in the protein expression repertoire of neurons and the role it plays in CNS innate immune response to counter viral infections.

  19. Prodromes and predictors of migraine attack.

    PubMed

    Rossi, Paolo; Ambrosini, Anna; Buzzi, M Gabriella

    2005-01-01

    Premonitory symptoms of migraine include a wide and heterogeneous collection of cognitive, psychic and physical changes preceding and forewarning of an attack by a few hours to 2-3 days. To date, premonitory symptoms have received little attention in the literature, being treated more as a curiosity than as a primary feature of migraine. This paper provides an extensive critical review of this neglected area of migraine research in the light of the recent advances in our understanding of the pathogenetic mechanisms of migraine. Epidemiological and clinical studies that have investigated the premonitory symptoms of migraine lack scientific rigour, producing conflicting results, whilst genetic and pathophysiological investigations are still in their very early stages. There is evidence supporting the idea that premonitory symptoms could be used as a phenotypical marker to identify subgroups of migraineurs which could show correlations with specific clinical expressions of the disease, genotypes, or responses to treatments. Future studies are needed to clarify the clinical, pathophysiological and therapeutic significance of premonitory symptoms. PMID:16483459

  20. Node Survival in Networks under Correlated Attacks.

    PubMed

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles.

  1. Helicobacter pylori defense against oxidative attack.

    PubMed

    Stent, Andrew; Every, Alison L; Sutton, Philip

    2012-03-15

    Helicobacter pylori is a microaerophilic, gram-negative pathogen of the human stomach. Despite the chronic active gastritis that develops following colonization, H. pylori is able to persist unharmed in the stomach for decades. Much of the damage caused by gastric inflammation results from the accumulation of reactive oxygen/nitrogen species within the stomach environment, which can induce oxidative damage in a wide range of biological molecules. Without appropriate defenses, this oxidative damage would be able to rapidly kill nearby H. pylori, but the organism employs a range of measures, including antioxidant enzymes, biological repair systems, and inhibitors of oxidant generation, to counter the attack. Despite the variety of measures employed to defend against oxidative injury, these processes are intimately interdependent, and any deficiency within the antioxidant system is generally sufficient to cause substantial impairment of H. pylori viability and persistence. This review provides an overview of the development of oxidative stress during H. pylori gastritis and examines the methods the organism uses to survive the resultant damage.

  2. Node Survival in Networks under Correlated Attacks

    PubMed Central

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles. PMID:25932635

  3. Pirate attacks affect Indian Ocean climate research

    NASA Astrophysics Data System (ADS)

    Smith, Shawn R.; Bourassa, Mark A.; Long, Michael

    2011-07-01

    Pirate attacks in the Gulf of Aden and the Indian Ocean off the coast of Somalia nearly doubled from 111 in 2008 to 217 in 2009 [International Maritime Bureau, 2009, International Maritime Bureau, 2010]. Consequently, merchant vessel traffic in the area around Somalia significantly decreased. Many of these merchant vessels carry instruments that record wind and other weather conditions near the ocean surface, and alterations in ship tracks have resulted in a hole sized at about 2.5 million square kilometers in the marine weather-observing network off the coast of Somalia. The data void exists in the formation region of the Somali low-level jet, a wind pattern that is one of the main drivers of the Indian summer monsoon. Further, a stable, multidecadal record has been interrupted, and consequently, long-term analyses of the jet derived from surface wind data are now showing artificial anomalies that will affect efforts by scientists to identify interannual to decadal variations in the climate of the northwestern Indian Ocean.

  4. Pre-Attack Symptomatology and Temperament as Predictors of Children's Responses to the September 11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Smith, Kimberlee I.; Meltzoff, Andrew N.

    2005-01-01

    Background: The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Method: Children's responses were assessed in a community sample of children in Seattle, Washington,…

  5. Prey risk allocation in a grazing ecosystem.

    PubMed

    Gude, Justin A; Garrott, Robert A; Borkowski, John J; King, Fred

    2006-02-01

    Understanding the behaviorally mediated indirect effects of predators in ecosystems requires knowledge of predator-prey behavioral interactions. In predator-ungulate-plant systems, empirical research quantifying how predators affect ungulate group sizes and distribution, in the context of other influential variables, is particularly needed. The risk allocation hypothesis proposes that prey behavioral responses to predation risk depend on background frequencies of exposure to risk, and it can be used to make predictions about predator-ungulate-plant interactions. We determined non-predation variables that affect elk (Cervus elaphus) group sizes and distribution on a winter range in the Greater Yellowstone Ecosystem (GYE) using logistic and log-linear regression on surveys of 513 1-km2 areas conducted over two years. Employing model selection techniques, we evaluated risk allocation and other a priori hypotheses of elk group size and distributional responses to wolf (Canis lupus) predation risk while accounting for influential non-wolf-predation variables. We found little evidence that wolves affect elk group sizes, which were strongly influenced by habitat type and hunting by humans. Following predictions from the risk allocation hypothesis, wolves likely created a more dynamic elk distribution in areas that they frequently hunted, as elk tended to move following wolf encounters in those areas. This response should dilute elk foraging pressure on plant communities in areas where they are frequently hunted by wolves. We predict that this should decrease the spatial heterogeneity of elk impacts on grasslands in areas that wolves frequently hunt. We also predict that this should decrease browsing pressure on heavily browsed woody plant stands in certain areas, which is supported by recent research in the GYE. PMID:16705980

  6. Allocations for HANDI 2000 business management system

    SciTech Connect

    Wilson, D.

    1998-08-24

    The Data Integration 2000 Project will result in an integrated and comprehensive set of functional applications containing core information necessary to support the Project Hanford Management Contract. It is based on the Commercial-Off-The-Shelf product solution with commercially proven business processes. The COTS product solution set, of PassPort and People Soft software, supports finance, supply and chemical management/Material Safety Data Sheet, human resources. Allocations at Fluor Daniel Hanford are burdens added to base costs using a predetermined rate.

  7. Optimal load allocation of multiple fuel boilers.

    PubMed

    Dunn, Alex C; Du, Yan Yi

    2009-04-01

    This paper presents a new methodology for optimally allocating a set of multiple industrial boilers that each simultaneously consumes multiple fuel types. Unlike recent similar approaches in the utility industry that use soft computing techniques, this approach is based on a second-order gradient search method that is easy to implement without any specialized optimization software. The algorithm converges rapidly and the application yields significant savings benefits, up to 3% of the overall operating cost of industrial boiler systems in the examples given and potentially higher in other cases, depending on the plant circumstances. Given today's energy prices, this can yield significant savings benefits to manufacturers that raise steam for plant operations.

  8. An Improved Bank-to-Turn Command Allocation Strategy for TH-III

    NASA Astrophysics Data System (ADS)

    Tian, J.; Zhang, S.; Yang, H.; Jiang, Z.; Hu, F.

    2015-09-01

    In this paper, an improved bank-to-turn (BTT) command allocation strategy is investigated for TH-III (a small solid rocket) to track the standard trajectory. In a BTT system, the angle of attack and roll angle are principally used to guide the rocket, which are usually calculated through a polar converting logic (PCL) from the acceleration commands generated by traditional skid-to-turn (STT) guidance command in the prevalent guidance law. Whereas, the used arctangent operation in PCL would result in a mathematical singularity problem when the vertical acceleration command approaches zero. To circumvent this problem, an improved shortest path adjustment method in roll channel is proposed to calculate the roll angle command in the body coordinate frame. And when the vertical acceleration command approaches zero, an auxiliary STT maneuver is introduced to ensure providing adequate maneuver ability for vehicles in any directions. In order to decrease the magnitude of abrupt change of roll angle, two reasonable precondition is proposed for the maneuver form switch. Finally, the robustness and validity of the proposed allocation strategy are demonstrated through the Monte-Carlo numerical simulations under parameters uncertainties.

  9. Dynamic Patterns of Parasitism and Immunity across Host Development Influence Optimal Strategies of Resource Allocation.

    PubMed

    Tate, Ann T; Graham, Andrea L

    2015-10-01

    The integration of physiological mechanisms into life-history theory is an emerging frontier in our understanding of the constraints and drivers of life-history evolution. Dynamic patterns of antagonism between developmental and immunological pathways in juvenile insects illustrate the importance of mechanisms for determining life-history strategy optima in the face of trade-offs. For example, developmental interference occurs when developmental processes transiently take priority over resources or pathway architecture, preventing allocation to immunity or other traits. We designed a within-host model of infected larval development to explore the impact of developmental dynamics on optimal resource mobilization and allocation strategies as well as on larval resistance and tolerance phenotypes. The model incorporates mechanism-inspired functional forms of developmental interference with immunity against parasites that attack specific larval stages. We find that developmental interference generally increases optimal investment in constitutive immunity and decreases optimal resource mobilization rates, but the results are sensitive to the developmental stage at first infection. Moreover, developmental interference reduces resistance but generally increases tolerance of infection. We demonstrate the potential impact of these dynamics on empirical estimates of host susceptibility and discuss the general implications of incorporating realistic physiological mechanisms and developmental dynamics for life-history theory in insects and other organisms. PMID:26655573

  10. Dynamic Patterns of Parasitism and Immunity across Host Development Influence Optimal Strategies of Resource Allocation.

    PubMed

    Tate, Ann T; Graham, Andrea L

    2015-10-01

    The integration of physiological mechanisms into life-history theory is an emerging frontier in our understanding of the constraints and drivers of life-history evolution. Dynamic patterns of antagonism between developmental and immunological pathways in juvenile insects illustrate the importance of mechanisms for determining life-history strategy optima in the face of trade-offs. For example, developmental interference occurs when developmental processes transiently take priority over resources or pathway architecture, preventing allocation to immunity or other traits. We designed a within-host model of infected larval development to explore the impact of developmental dynamics on optimal resource mobilization and allocation strategies as well as on larval resistance and tolerance phenotypes. The model incorporates mechanism-inspired functional forms of developmental interference with immunity against parasites that attack specific larval stages. We find that developmental interference generally increases optimal investment in constitutive immunity and decreases optimal resource mobilization rates, but the results are sensitive to the developmental stage at first infection. Moreover, developmental interference reduces resistance but generally increases tolerance of infection. We demonstrate the potential impact of these dynamics on empirical estimates of host susceptibility and discuss the general implications of incorporating realistic physiological mechanisms and developmental dynamics for life-history theory in insects and other organisms.

  11. Falsification Attacks against WPA-TKIP in a Realistic Environment

    NASA Astrophysics Data System (ADS)

    Todo, Yosuke; Ozawa, Yuki; Ohigashi, Toshihiro; Morii, Masakatu

    In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP). A previous realistic attack succeeds only for a network that supports IEEE 802.11e QoS features by both an access point (AP) and a client, and it has an execution time of 12-15min, in which it recovers a message integrity code (MIC) key from an ARP packet. Our first attack reduces the execution time for recovering a MIC key. It can recover the MIC key within 7-8min. Our second attack expands its targets that can be attacked. This attack focuses on a new vulnerability of QoS packet processing, and this vulnerability can remove the condition that the AP supports IEEE 802.11e. In addition, we discovered another vulnerability by which our attack succeeds under the condition that the chipset of the client supports IEEE 802.11e even if the client disables this standard through the OS. We demonstrate that chipsets developed by several kinds of vendors have the same vulnerability.

  12. Optimal response to attacks on the open science grids.

    SciTech Connect

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  13. Risk factors for hypertensive attack during pheochromocytoma resection

    PubMed Central

    Kwon, Se Yun; Lee, Kyung Seop; Lee, Jun Nyung; Ha, Yun-Sok; Choi, Seock Hwan; Kim, Hyun Tae; Kim, Tae-Hwan; Yoo, Eun Sang

    2016-01-01

    Purpose We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. Materials and Methods Data from 53 patients diagnosed with pheochromocytoma at Kyungpook National Uriversity Medical Center between January 2000 and June 2012 were retrospectively analyzed. The subjects were divided into 2 groups depending on the presence or absence of hypertensive attack at the time of surgery. Patient demographic characteristics and preoperative evaluations were assessed for their prognostic relevance with respect to hypertensive attack. A univariate analysis was conducted, and a multivariate logistic regression analysis was also performed. Results In the univariate analysis, systolic blood pressure at presentation, preoperative hormonal status (including epinephrine, norepinephrine, vanillylmandelic acid, and metanephrine levels in a 24-hour urine sample), tumor size, and postoperative systolic blood pressure were significantly associated with the development of hypertensive attack. In the multivariate analysis, preoperative epinephrine level and tumor size were independent factors that predicted hypertensive attack. The highest odds ratio for tumor size (2.169) was obtained at a cutoff value of 4.25 cm and the highest odds ratio for preoperative epinephrine (1.020) was obtained at a cutoff value of 166.3 µg/d. Conclusions In this study, a large tumor size and an elevated preoperative urinary epinephrine level were risk factors for intraoperative hypertensive attack in patients with pheochromocytoma. PMID:27194549

  14. Transient ischemic attack as a medical emergency.

    PubMed

    Okada, Yasushi

    2014-01-01

    Since transient ischemic attack (TIA) is regarded as a medical emergency with high risk for early stroke recurrence, the underlying mechanisms should be immediately clarified to conclude a definitive diagnosis and provide early treatment. Early risk stratification using ABCD(2) scores can predict the risk of ischemic stroke occurring after TIA. Carotid ultrasonography (US) can evaluate the degree of stenosis, plaque properties and flow velocity of ICA lesions. High-risk mobile plaques can be classified by carotid US, and aortogenic sources of emboli can be detected by transesophageal echocardiography. Cardiac monitoring and blood findings are thought to play a key role in a diagnosis of cardioembolic TIA. Diffusion-weighted imaging (DWI)-MRI and MR angiography are also indispensable to understand the mechanism of TIA and cerebral circulation. To prevent subsequent stroke arising from TIA, antiplatelet and anticoagulant therapies should be started immediately along with comprehensive management of life-style, hypertension, diabetes mellitus, dyslipidemia and other atherosclerotic diseases. Carotid endarterectomy and endovascular intervention are critical for treating symptomatic patients with significant stenosis of ICA. A novel concept of acute cerebrovascular syndrome (ACVS) has recently been advocated to increase awareness of TIA among citizens, patients and medical professionals. TIA should be recognized as the last opportunity to avoid irreversible ischemic stroke and its sequelae. The clinical relevance of the new concept of ACVS is advocated by early recurrence after TIA, analysis of high-risk TIA, treatment strategies and the optimal management of TIA. Raising TIA awareness should also proceed across many population sectors. PMID:24157554

  15. Cherry Consumption and the Risk of Recurrent Gout Attacks

    PubMed Central

    Zhang, Yuqing; Neogi, Tuhina; Chen, Clara; Chaisson, Christine; Hunter, David; Choi, Hyon K.

    2012-01-01

    Objective To study the relation between cherry intake and the risk of recurrent gout attacks among individuals with gout. Methods We conducted a case-crossover study to examine associations of a set of putative risk factors with recurrent gout attacks. Individuals with gout were prospectively recruited and followed online for one year. Participants were asked about the following information when experiencing a gout attack: the onset date of the gout attack, symptoms and signs, medications (including anti-gout medications), and potential risk factors (including daily intake of cherries and cherry extract) during the 2-day period prior to the gout attack. We assessed the same exposure information over 2-day control periods. We estimated the risk of recurrent gout attacks related to cherry intake using conditional logistic regression. Results Our study included 633 individuals with gout. Cherry intake over a 2-day period was associated with a 35% lower risk of gout attacks compared with no intake (multivariate odds ratio [OR] = 0.65, 95% CI: 0.50-0.85). Cherry extract intake showed a similar inverse association (multivariate OR=0.55, 95% CI: 0.30-0.98). The effect of cherry intake persisted across subgroups by sex, obesity status, purine intake, alcohol use, diuretic use, and use of anti-gout medications. When cherry intake was combined with allopurinol use, the risk of gout attacks was 75% lower than periods without either exposure (OR=0.25, 95% CI: 0.15-0.42). Conclusions These findings suggest that cherry intake is associated with a lower risk of gout attacks. PMID:23023818

  16. Smoking Behavior and Alcohol Consumption in Individuals With Panic Attacks

    PubMed Central

    Mathew, Amanda R.; Norton, Peter J.; Zvolensky, Michael J.; Buckner, Julia D.; Smits, Jasper A. J.

    2011-01-01

    Individuals with anxiety often report greater smoking and drinking behaviors relative to those without a history of anxiety. In particular, smoking and alcohol use have been directly implicated among individuals experiencing panic attacks, diagnosed with panic disorder, or high on panic-relevant risk factors such as anxiety sensitivity. Less is known, however, about specific features of panic that may differentiate among those who do or do not use cigarettes or alcohol. The purpose of the current study was to replicate previous research findings of an association between panic symptomatology, cigarette smoking, and alcohol consumption, as well as extend findings by examining whether specific symptoms of panic attacks differentiated among those who do or do not use cigarettes or alcohol. Participants (n = 489) completed the Panic Attack Questionnaire-IV, a highly detailed assessment of panic attacks and symptoms, as well as self-report measures of smoking history and alcohol use. Consistent with previous research, participants who reported a history of panic attacks (n = 107) were significantly more likely to report current daily or lifetime daily cigarette smoking, and significantly greater hazardous or harmful alcohol use than participants with no panic history (n = 382). Although smoking and hazardous alcohol use were highly associated regardless of panic status, participants with panic attacks showed elevated hazardous alcohol use after controlling for daily or lifetime smoking. Surprisingly, although participants who reported having had at least one panic attack were more likely to smoke, panic attack symptoms, intensity, or frequency did not differentiate panickers who did or did not smoke. Furthermore, panic-related variables were not shown to differentially relate to problematic drinking among panickers. Implications for understanding the complex relationship between panic attacks and smoking and drinking behaviors are discussed. PMID:21915160

  17. Environmental flow allocation and statistics calculator

    USGS Publications Warehouse

    Konrad, Christopher P.

    2011-01-01

    The Environmental Flow Allocation and Statistics Calculator (EFASC) is a computer program that calculates hydrologic statistics based on a time series of daily streamflow values. EFASC will calculate statistics for daily streamflow in an input file or will generate synthetic daily flow series from an input file based on rules for allocating and protecting streamflow and then calculate statistics for the synthetic time series. The program reads dates and daily streamflow values from input files. The program writes statistics out to a series of worksheets and text files. Multiple sites can be processed in series as one run. EFASC is written in MicrosoftRegistered Visual BasicCopyright for Applications and implemented as a macro in MicrosoftOffice Excel 2007Registered. EFASC is intended as a research tool for users familiar with computer programming. The code for EFASC is provided so that it can be modified for specific applications. All users should review how output statistics are calculated and recognize that the algorithms may not comply with conventions used to calculate streamflow statistics published by the U.S. Geological Survey.

  18. Quadratic Programming for Allocating Control Effort

    NASA Technical Reports Server (NTRS)

    Singh, Gurkirpal

    2005-01-01

    A computer program calculates an optimal allocation of control effort in a system that includes redundant control actuators. The program implements an iterative (but otherwise single-stage) algorithm of the quadratic-programming type. In general, in the quadratic-programming problem, one seeks the values of a set of variables that minimize a quadratic cost function, subject to a set of linear equality and inequality constraints. In this program, the cost function combines control effort (typically quantified in terms of energy or fuel consumed) and control residuals (differences between commanded and sensed values of variables to be controlled). In comparison with prior control-allocation software, this program offers approximately equal accuracy but much greater computational efficiency. In addition, this program offers flexibility, robustness to actuation failures, and a capability for selective enforcement of control requirements. The computational efficiency of this program makes it suitable for such complex, real-time applications as controlling redundant aircraft actuators or redundant spacecraft thrusters. The program is written in the C language for execution in a UNIX operating system.

  19. Resource allocation to reproduction in animals.

    PubMed

    Kooijman, Sebastiaan A L M; Lika, Konstadia

    2014-11-01

    The standard Dynamic Energy Budget (DEB) model assumes that a fraction κ of mobilised reserve is allocated to somatic maintenance plus growth, while the rest is allocated to maturity maintenance plus maturation (in embryos and juveniles) or reproduction (in adults). All DEB parameters have been estimated for 276 animal species from most large phyla and all chordate classes. The goodness of fit is generally excellent. We compared the estimated values of κ with those that would maximise reproduction in fully grown adults with abundant food. Only 13% of these species show a reproduction rate close to the maximum possible (assuming that κ can be controlled), another 4% have κ lower than the optimal value, and 83% have κ higher than the optimal value. Strong empirical support hence exists for the conclusion that reproduction is generally not maximised. We also compared the parameters of the wild chicken with those of races selected for meat and egg production and found that the latter indeed maximise reproduction in terms of κ, while surface-specific assimilation was not affected by selection. We suggest that small values of κ relate to the down-regulation of maximum body size, and large values to the down-regulation of reproduction. We briefly discuss the ecological context for these findings.

  20. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    SciTech Connect

    Nichols, Jeff A. {Cyber Sciences}; Curtis, Laura

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.