Sample records for attack cellular handling

  1. Evaluation of High-Angle-of-Attack Handling Qualities for the X-31A Using Standard Evaluation Maneuvers

    NASA Technical Reports Server (NTRS)

    Stoliker, Patrick C.; Bosworth, John T.

    1996-01-01

    The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright-Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level 1/Level 2 performance. Lateral gross-acquisition testing results in Level 1/Level 2 ratings below 45 deg angle of attack, degrading into Level 3 as angle of attack increases. The fine-tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal-Smith, bandwidth, Smith-Geddes, and military specifications.

  2. Evaluation of High-Angle-of-Attack Handling Qualities for the X-31A Using Standard Evaluation Maneuvers

    NASA Technical Reports Server (NTRS)

    Stoliker, Patrick C.; Bosworth, John T.

    1997-01-01

    The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg. and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level l/Level 2 performance. Lateral gross-acquisition testing results in Level l/Level 2 ratings below 45 deg. angle of attack, degrading into Level 3 as angle of attack increases. The fine tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg. angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal Smith, bandwidth, Smith-Geddes, and military specifications.

  3. High-Alpha Handling Qualities Flight Research on the NASA F/A-18 High Alpha Research Vehicle

    NASA Technical Reports Server (NTRS)

    Wichman, Keith D.; Pahle, Joseph W.; Bahm, Catherine; Davidson, John B.; Bacon, Barton J.; Murphy, Patrick C.; Ostroff, Aaron J.; Hoffler, Keith D.

    1996-01-01

    A flight research study of high-angle-of-attack handling qualities has been conducted at the NASA Dryden Flight Research Center using the F/A-18 High Alpha Research Vehicle (HARV). The objectives were to create a high-angle-of-attack handling qualities flight database, develop appropriate research evaluation maneuvers, and evaluate high-angle-of-attack handling qualities guidelines and criteria. Using linear and nonlinear simulations and flight research data, the predictions from each criterion were compared with the pilot ratings and comments. Proposed high-angle-of-attack nonlinear design guidelines and proposed handling qualities criteria and guidelines developed using piloted simulation were considered. Recently formulated time-domain Neal-Smith guidelines were also considered for application to high-angle-of-attack maneuvering. Conventional envelope criteria were evaluated for possible extension to the high-angle-of-attack regime. Additionally, the maneuvers were studied as potential evaluation techniques, including a limited validation of the proposed standard evaluation maneuver set. This paper gives an overview of these research objectives through examples and summarizes result highlights. The maneuver development is described briefly, the criteria evaluation is emphasized with example results given, and a brief discussion of the database form and content is presented.

  4. Application of Cellular Automata to Detection of Malicious Network Packets

    ERIC Educational Resources Information Center

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  5. An Overview of Controls and Flying Qualities Technology on the F/A-18 High Alpha Research Vehicle

    NASA Technical Reports Server (NTRS)

    Pahle, Joseph W.; Wichman, Keith D.; Foster, John V.; Bundick, W. Thomas

    1996-01-01

    The NASA F/A-18 High Alpha Research Vehicle (HARV) has been the flight test bed of a focused technology effort to significantly increase maneuvering capability at high angles of attack. Development and flight test of control law design methodologies, handling qualities metrics, performance guidelines, and flight evaluation maneuvers are described. The HARV has been modified to include two research control effectors, thrust vectoring, and actuated forebody strakes in order to provide increased control power at high angles of attack. A research flight control system has been used to provide a flexible, easily modified capability for high-angle-of-attack research controls. Different control law design techniques have been implemented and flight-tested, including eigenstructure assignment, variable gain output feedback, pseudo controls, and model-following. Extensive piloted simulation has been used to develop nonlinear performance guide-lines and handling qualities criteria for high angles of attack. This paper reviews the development and evaluation of technologies useful for high-angle-of-attack control. Design, development, and flight test of the research flight control system, control laws, flying qualities specifications, and flight test maneuvers are described. Flight test results are used to illustrate some of the lessons learned during flight test and handling qualities evaluations.

  6. Flight test experience with high-alpha control system techniques on the F-14 airplane

    NASA Technical Reports Server (NTRS)

    Gera, J.; Wilson, R. J.; Enevoldson, E. K.; Nguyen, L. T.

    1981-01-01

    Improved handling qualities of fighter aircraft at high angles of attack can be provided by various stability and control augmentation techniques. NASA and the U.S. Navy are conducting a joint flight demonstration of these techniques on an F-14 airplane. This paper reports on the flight test experience with a newly designed lateral-directional control system which suppresses such high angle of attack handling qualities problems as roll reversal, wing rock, and directional divergence while simultaneously improving departure/spin resistance. The technique of integrating a piloted simulation into the flight program was used extensively in this program. This technique had not been applied previously to high angle of attack testing and required the development of a valid model to simulate the test airplane at extremely high angles of attack.

  7. Fourth High Alpha Conference, volume 1

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The goal of the Fourth High Alpha Conference was to focus on the flight validation of high angle-of-attack technologies and provide an in-depth review of the latest high angle-of-attack activities. Areas that were covered include: high angle-of-attack aerodynamics, propulsion and inlet dynamics, thrust vectoring, control laws and handling qualities, tactical utility, and forebody controls.

  8. Fourth High Alpha Conference, volume 3

    NASA Technical Reports Server (NTRS)

    1994-01-01

    Thie goal of this conference was to focus on the flight validation of high-angle-of-attack technologies and provide an in-depth review of the latest high-angle-of-attack activities. Areas covered include: (1) high-angle-of-attack aerodynamics; (2) propulsion and inlet dynamics; (3) thrust vectoring; (4) control laws and handling qualities; (5) tactical utility; and (6) forebody controls.

  9. A novel image encryption algorithm using chaos and reversible cellular automata

    NASA Astrophysics Data System (ADS)

    Wang, Xingyuan; Luan, Dapeng

    2013-11-01

    In this paper, a novel image encryption scheme is proposed based on reversible cellular automata (RCA) combining chaos. In this algorithm, an intertwining logistic map with complex behavior and periodic boundary reversible cellular automata are used. We split each pixel of image into units of 4 bits, then adopt pseudorandom key stream generated by the intertwining logistic map to permute these units in confusion stage. And in diffusion stage, two-dimensional reversible cellular automata which are discrete dynamical systems are applied to iterate many rounds to achieve diffusion on bit-level, in which we only consider the higher 4 bits in a pixel because the higher 4 bits carry almost the information of an image. Theoretical analysis and experimental results demonstrate the proposed algorithm achieves a high security level and processes good performance against common attacks like differential attack and statistical attack. This algorithm belongs to the class of symmetric systems.

  10. Fourth High Alpha Conference, volume 2

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The goal of the Fourth High Alpha Conference, held at the NASA Dryden Flight Research Center on July 12-14, 1994, was to focus on the flight validation of high angle of attack technologies and provide an in-depth review of the latest high angle of attack activities. Areas that were covered include high angle of attack aerodynamics, propulsion and inlet dynamics, thrust vectoring, control laws and handling qualities, and tactical utility.

  11. Adolescents and Exercise Induced Asthma

    ERIC Educational Resources Information Center

    Hansen, Pamela; Bickanse, Shanna; Bogenreif, Mike; VanSickle, Kyle

    2008-01-01

    This article defines asthma and exercise induced asthma, and provides information on the triggers, signs, and symptoms of an attack. It also gives treatments for these conditions, along with prevention guidelines on how to handle an attack in the classroom or on the practice field. (Contains 2 tables and 1 figure.)

  12. Cellular Manufacturing System with Dynamic Lot Size Material Handling

    NASA Astrophysics Data System (ADS)

    Khannan, M. S. A.; Maruf, A.; Wangsaputra, R.; Sutrisno, S.; Wibawa, T.

    2016-02-01

    Material Handling take as important role in Cellular Manufacturing System (CMS) design. In several study at CMS design material handling was assumed per pieces or with constant lot size. In real industrial practice, lot size may change during rolling period to cope with demand changes. This study develops CMS Model with Dynamic Lot Size Material Handling. Integer Linear Programming is used to solve the problem. Objective function of this model is minimizing total expected cost consisting machinery depreciation cost, operating costs, inter-cell material handling cost, intra-cell material handling cost, machine relocation costs, setup costs, and production planning cost. This model determines optimum cell formation and optimum lot size. Numerical examples are elaborated in the paper to ilustrate the characterictic of the model.

  13. Temporal variation in black-caiman-nest predation in varzea of central Brazilian amazonia

    PubMed Central

    2017-01-01

    On the Amazon floodplain, the main predators of black caiman (Melanosuchus niger) eggs are jaguars (Panthera onca), tegu lizards (Tupinambis teguixim), capuchin monkeys (Sapajus macrocephalus) and humans (Homo sapiens). In this study, we investigated the relationship between predator attacks on nests and incubation period, and evaluated the influence of initial predation on subsequent predation in the Mamirauá Sustainable Development Reserve. We also evaluated the influence of presence of females near the nests and manipulation of nests on the occurrence of attacks. We compared results from data obtained with camera traps and vestiges left by predators on estimates of rates of predation by different predators. Egg predation was recorded in 32% of the 658 black caiman nests monitored during two years. Our results suggest that the probability of predation on black caiman eggs is relatively constant throughout the incubation period and that predation on eggs was lower when adults, presumably females, were present. Careful opening of nests and handling of eggs did not increase the number of attacks on black caiman nests. Nest opening by a predator appeared to increase the chances of a subsequent attack because most of the attacks on nests occurred soon after a predator first opened the nest. However, attacks by another species of predator do not appear to be necessary to initiate attacks by any other species of predator. Results based on camera traps and vestiges differed, but use of vestiges was adequate for identifying the principal predators on eggs in black caiman nests and, in many circumstances, the vestiges may be better for estimating predation by humans. In this study, opening nests and handling eggs did not increase the number of attacks on black caiman nests. PMID:28854258

  14. Temporal variation in black-caiman-nest predation in varzea of central Brazilian amazonia.

    PubMed

    Torralvo, Kelly; Botero-Arias, Robinson; Magnusson, William E

    2017-01-01

    On the Amazon floodplain, the main predators of black caiman (Melanosuchus niger) eggs are jaguars (Panthera onca), tegu lizards (Tupinambis teguixim), capuchin monkeys (Sapajus macrocephalus) and humans (Homo sapiens). In this study, we investigated the relationship between predator attacks on nests and incubation period, and evaluated the influence of initial predation on subsequent predation in the Mamirauá Sustainable Development Reserve. We also evaluated the influence of presence of females near the nests and manipulation of nests on the occurrence of attacks. We compared results from data obtained with camera traps and vestiges left by predators on estimates of rates of predation by different predators. Egg predation was recorded in 32% of the 658 black caiman nests monitored during two years. Our results suggest that the probability of predation on black caiman eggs is relatively constant throughout the incubation period and that predation on eggs was lower when adults, presumably females, were present. Careful opening of nests and handling of eggs did not increase the number of attacks on black caiman nests. Nest opening by a predator appeared to increase the chances of a subsequent attack because most of the attacks on nests occurred soon after a predator first opened the nest. However, attacks by another species of predator do not appear to be necessary to initiate attacks by any other species of predator. Results based on camera traps and vestiges differed, but use of vestiges was adequate for identifying the principal predators on eggs in black caiman nests and, in many circumstances, the vestiges may be better for estimating predation by humans. In this study, opening nests and handling eggs did not increase the number of attacks on black caiman nests.

  15. F-8C digital CCV flight control laws

    NASA Technical Reports Server (NTRS)

    Hartmann, G. L.; Hauge, J. A.; Hendrick, R. C.

    1976-01-01

    A set of digital flight control laws were designed for the NASA F-8C digital fly-by-wire aircraft. The control laws emphasize Control Configured Vehicle (CCV) benefits. Specific pitch axis objectives were improved handling qualities, angle-of-attack limiting, gust alleviation, drag reduction in steady and maneuvering flight, and a capability to fly with reduced static stability. The lateral-directional design objectives were improved Dutch roll damping and turn coordination over a wide range in angle-of-attack. An overall program objective was to explore the use of modern control design methodilogy to achieve these specific CCV benefits. Tests for verifying system integrity, an experimental design for handling qualities evaluation, and recommended flight test investigations were specified.

  16. Uncertainty and Risk Management in Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Li, Jason; Ou, Xinming; Rajagopalan, Raj

    Handling cyber threats unavoidably needs to deal with both uncertain and imprecise information. What we can observe as potential malicious activities can seldom give us 100% confidence on important questions we care about, e.g. what machines are compromised and what damage has been incurred. In security planning, we need information on how likely a vulnerability can lead to a successful compromise to better balance security and functionality, performance, and ease of use. These information are at best qualitative and are often vague and imprecise. In cyber situational awareness, we have to rely on such imperfect information to detect real attacks and to prevent an attack from happening through appropriate risk management. This chapter surveys existing technologies in handling uncertainty and risk management in cyber situational awareness.

  17. A simulation investigation of scout/attack helicopter directional control requirements for hover and low-speed tasks

    NASA Technical Reports Server (NTRS)

    Bivens, Courtland C.; Guercio, Joseph G.

    1987-01-01

    A piloted simulator experiment was conducted to investigate directional axis handling qualities requirements for low speed and hover tasks performed by a Scout/Attack helicopter. Included were the directional characteristics of various candidate light helicopter family configurations. Also, the experiment focused on conventional single main/tail rotor configurations of the OH-58 series aircraft, where the first-order yaw-axis dynamic effects that contributed to the loss of tail rotor control were modeled. Five pilots flew 22 configurations under various wind conditions. Cooper-Harper handling quality ratings were used as the primary measure of merit of each configuration. The results of the experiment indicate that rotorcraft configurations with high directional gust sensitivity require greater minimum yaw damping to maintain satisfactory handling qualities during nap-of-the-Earth flying tasks. It was also determined that both yaw damping and control response are critical handling qualities parameters in performing the air-to-air target acquisition and tracking task. Finally, the lack of substantial yaw damping and larger values of gust sensitivity increased the possibility of loss of directional control at low airspeeds for the single main/tail rotor configurations.

  18. On effectiveness of network sensor-based defense framework

    NASA Astrophysics Data System (ADS)

    Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh

    2012-06-01

    Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.

  19. Selected Papers from the 1990 Meeting of the American Journalism Historians' Association (Coeur d'Alene, Idaho, October 2-7, 1990): Part 1.

    ERIC Educational Resources Information Center

    American Journalism Historians' Association.

    The following 12 papers, on a variety of topics, were given at the 1990 meeting of the American Journalism Historians' Association: (1) "'Let Jim Handle It': President Dwight D. Eisenhower's First Heart Attack and Jim Hagerty's Handling of the Media" (Joseph V. Trahan, III); (2) "Eisenhower's Pyrrhic Victory in 1956: Mixed Lessons…

  20. Level I center triage and mass casualties.

    PubMed

    Hoey, Brian A; Schwab, C William

    2004-05-01

    The world has been marked by a recent series of high-profile terrorist attacks, including the attack of September 11, 2001, in New York City. Similar to natural disasters, these attacks often result in a large number of casualties necessitating triage strategies. The end of the twentieth century was marked by the development of trauma systems in the United States and abroad. By their very nature, trauma centers are best equipped to handle mass casualties resulting from natural and manmade disasters. Triage assessment tools and scoring systems have evolved to facilitate this triage process and to potentially reduce the morbidity and mortality associated with these events.

  1. Develop a solution for protecting and securing enterprise networks from malicious attacks

    NASA Astrophysics Data System (ADS)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.

  2. Flight test of the X-29A at high angle of attack: Flight dynamics and controls

    NASA Technical Reports Server (NTRS)

    Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.

    1995-01-01

    The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.

  3. Flight test results for several light, canard-configured airplanes

    NASA Technical Reports Server (NTRS)

    Brown, Philip W.

    1987-01-01

    Brief flight evaluations of two different, light, composite constructed, canard and winglet configured airplanes were performed to assess their handling qualities; one airplane was a single engine, pusher design and the other a twin engine, push-pull configuration. An emphasis was placed on the slow speed/high angle of attack region for both airplanes and on the engine-out regime for the twin. Mission suitability assessment included cockpit and control layout, ground and airborne handling qualities, and turbulence response. Very limited performance data was taken. Stall/spin tests and the effects of laminar flow loss on performance and handling qualities were assessed on an extended range, single engine pusher design.

  4. Analysis of the longitudinal handling qualities and pilot-induced-oscillation tendencies of the High-Angle-of-Attack Research Vehicle (HARV)

    NASA Technical Reports Server (NTRS)

    Hess, Ronald A.

    1994-01-01

    The NASA High-Angle-of Attack Research Vehicle (HARV), a modified F-18 aircraft, experienced handling qualities problems in recent flight tests at NASA Dryden Research Center. Foremost in these problems was the tendency of the pilot-aircraft system to exhibit a potentially dangerous phenomenon known as a pilot-induced oscillation (PIO). When they occur, PIO's can severely restrict performance, sharply dimish mission capabilities, and can even result in aircraft loss. A pilot/vehicle analysis was undertaken with the goal of reducing these PIO tendencies and improving the overall vehicle handling qualities with as few changes as possible to the existing feedback/feedforward flight control laws. Utilizing a pair of analytical pilot models developed by the author, a pilot/vehicle analysis of the existing longitudinal flight control system was undertaken. The analysis included prediction of overall handling qualities levels and PIO susceptability. The analysis indicated that improvement in the flight control system was warranted and led to the formulation of a simple control stick command shaping filter. Analysis of the pilot/vehicle system with the shaping filter indicated significant improvements in handling qualities and PIO tendencies could be achieved. A non-real time simulation of the modified control system was undertaken with a realistic, nonlinear model of the current HARV. Special emphasis was placed upon those details of the command filter implementation which could effect safety of flight. The modified system is currently awaiting evaluation in the real-time, pilot-in-the-loop, Dual-Maneuvering-Simulator (DMS) facility at Langley.

  5. Protecting HVAC systems from bio-terrorism.

    PubMed

    Arterburn, Tom

    2003-01-01

    The FBI, in the wake of the September 11 attacks, issued an advisory to state and local law enforcement authorities and the public asking to remain especially alert to any unusual activities around ventilation systems. It noted that while the Bureau possessed no specific threats regarding the release of toxic chemicals into air handling systems, building owners and managers should be well-aware of the potential for contamination of such systems. This article presents recommendations of air-handling experts and associations for operators to consider.

  6. Guidelines for Managing Suspected Chemical and Biological Agent Incidents in Rail Tunnel Systems

    DOT National Transportation Integrated Search

    2002-03-01

    These emergency management guidelines are designed to help transit managers (1) prepare and implement standard operating procedures (SOPs) for handling potential and actual chemical or biological agent attacks in their rail tunnel system and (2) unde...

  7. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks.

    PubMed

    Saleh, Mohammed A; Abdul Manaf, Azizah

    2015-01-01

    The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  8. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    PubMed Central

    Saleh, Mohammed A.; Abdul Manaf, Azizah

    2015-01-01

    The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks. PMID:26065015

  9. Web Server Security on Open Source Environments

    NASA Astrophysics Data System (ADS)

    Gkoutzelis, Dimitrios X.; Sardis, Manolis S.

    Administering critical resources has never been more difficult that it is today. In a changing world of software innovation where major changes occur on a daily basis, it is crucial for the webmasters and server administrators to shield their data against an unknown arsenal of attacks in the hands of their attackers. Up until now this kind of defense was a privilege of the few, out-budgeted and low cost solutions let the defender vulnerable to the uprising of innovating attacking methods. Luckily, the digital revolution of the past decade left its mark, changing the way we face security forever: open source infrastructure today covers all the prerequisites for a secure web environment in a way we could never imagine fifteen years ago. Online security of large corporations, military and government bodies is more and more handled by open source application thus driving the technological trend of the 21st century in adopting open solutions to E-Commerce and privacy issues. This paper describes substantial security precautions in facing privacy and authentication issues in a totally open source web environment. Our goal is to state and face the most known problems in data handling and consequently propose the most appealing techniques to face these challenges through an open solution.

  10. Handling qualities related to stall/spin accidents of supersonic fighter aircraft

    NASA Technical Reports Server (NTRS)

    Anderson, S. B.

    1984-01-01

    This paper reviews the handling qualities which influence the high angle of attack (AOA) behavior of supersonic fighter aircraft in order to obtain a clearer understanding of the causes of stall/spin accidents. The results show that, because modern fighters suffer more serious consequences when control is lost, good handling qualities are essential for safe operation at high AOA. Relaxed static stability used on some fighter aircraft can result in control problems at high AOA owing to inertia coupling and the difficulty of a recovery from a deep stall. Indications are that the use of departure/spin resistance and an automatic spin prevention system will greatly improve the safety record for modern supersonic fighters.

  11. DECONTAMINATION WIPES FOR FIRST RESPONDERS - PHASE I

    EPA Science Inventory

    The threat of chemical or biological (CB) attack is real, and there is a recognized need for improved technologies to better respond to these situations. During a CB emergency, first responder units are critical for handling the emergency, and then restoring the environment wh...

  12. Kit systems for granulated decontamination formulations

    DOEpatents

    Tucker, Mark D.

    2010-07-06

    A decontamination formulation and method of making that neutralizes the adverse health effects of both chemical and biological compounds, especially chemical warfare (CW) and biological warfare (BW) agents, and toxic industrial chemicals. The formulation provides solubilizing compounds that serve to effectively render the chemical and biological compounds, particularly CW and BW compounds, susceptible to attack, and at least one reactive compound that serves to attack (and detoxify or kill) the compound. The formulation includes at least one solubilizing agent, a reactive compound, a sorbent additive, and water. A highly adsorbent sorbent additive (e.g., amorphous silica, sorbitol, mannitol, etc.) is used to "dry out" one or more liquid ingredients into a dry, free-flowing powder that has an extended shelf life, and is more convenient to handle and mix in the field. The formulation can be pre-mixed and pre-packaged as a multi-part kit system, where one or more of the parts are packaged in a powdered, granulated form for ease of handling and mixing in the field.

  13. Learning from history: The Glasgow Airport terrorist attack.

    PubMed

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  14. X-31 high angle of attack control system performance

    NASA Technical Reports Server (NTRS)

    Huber, Peter; Seamount, Patricia

    1994-01-01

    The design goals for the X-31 flight control system were: (1) level 1 handling qualities during post-stall maneuvering (30 to 70 degrees angle-of-attack); (2) thrust vectoring to enhance performance across the flight envelope; and (3) adequate pitch-down authority at high angle-of-attack. Additional performance goals are discussed. A description of the flight control system is presented, highlighting flight control system features in the pitch and roll axes and X-31 thrust vectoring characteristics. The high angle-of-attack envelope clearance approach will be described, including a brief explanation of analysis techniques and tools. Also, problems encountered during envelope expansion will be discussed. This presentation emphasizes control system solutions to problems encountered in envelope expansion. An essentially 'care free' envelope was cleared for the close-in-combat demonstrator phase. High angle-of-attack flying qualities maneuvers are currently being flown and evaluated. These results are compared with pilot opinions expressed during the close-in-combat program and with results obtained from the F-18 HARV for identical maneuvers. The status and preliminary results of these tests are discussed.

  15. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    PubMed Central

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  16. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    PubMed

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  17. Post-Stall Aerodynamic Modeling and Gain-Scheduled Control Design

    NASA Technical Reports Server (NTRS)

    Wu, Fen; Gopalarathnam, Ashok; Kim, Sungwan

    2005-01-01

    A multidisciplinary research e.ort that combines aerodynamic modeling and gain-scheduled control design for aircraft flight at post-stall conditions is described. The aerodynamic modeling uses a decambering approach for rapid prediction of post-stall aerodynamic characteristics of multiple-wing con.gurations using known section data. The approach is successful in bringing to light multiple solutions at post-stall angles of attack right during the iteration process. The predictions agree fairly well with experimental results from wind tunnel tests. The control research was focused on actuator saturation and .ight transition between low and high angles of attack regions for near- and post-stall aircraft using advanced LPV control techniques. The new control approaches maintain adequate control capability to handle high angle of attack aircraft control with stability and performance guarantee.

  18. KAMEDO report no. 87: bomb attack in Finnish shopping center, 2002.

    PubMed

    Deverell, Edward; Ortenwall, Per; Almgren, Ola; Riddez, Louis

    2007-01-01

    The detonation of a bomb in a shopping center in Vantaa, Finland, took place on 11 October 2002. Seven people died as a result and > 160 people required medical attention. Because the rescue teams were inadequately trained to respond to terrorist attacks, the event was handled according to protocol. A number of problems arose, including: people from different rescue agencies were difficult to distinguish from each other; there was inadequate communication between the incident site and the main hospital; relatives of victims were not kept informed; and psychiatric problems in the wake of the disaster were not addressed sufficiently.

  19. Impacts of Vehicle (In)Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chugg, J.; Rohde, K.

    Nuclear and radioactive material is routinely transported worldwide every day. Since 2010, the complexity of the transport vehicle to support such activities has grown exponentially. Many core functions of a vehicle are now handled by small embedded computer modules with more being added each year to enhance the owner’s experience and convenience. With a system as complex as today’s automobile, the potential for cyber security issues is certain. Hackers have begun exploring this new domain with public information increasingly disseminated. Because vehicles are allowed into and around secure nuclear facilities, the potential for using a vehicle as a new cybermore » entry point or vector into the facility is now plausible and must be mitigated. In addition, compromising such a vehicle could aide in illicit removal of nuclear material, putting sensitive cargo at risk. Because cyber attacks can now be introduced using vehicles, cyber security, needs to be integrated into an organization’s design basis threat document. Essentially, a vehicle now extends the perimeter for which security professionals are responsible.Electronic Control Units (ECU) responsible for handling all core and ancillary vehicle functions are interconnected using the controller area network (CAN) bus. A typical CAN network in a modern automobile contains 50 or more ECUs. The CAN protocol now supports a wide variety of areas, including automotive, road transportation, rail transportation, industrial automation, power generation, maritime, military vehicles, aviation, and medical devices. In many ways, the nuclear industry is employing the CAN bus protocol or other similar broadcast serial networks. This paper will provide an overview of the current state of automobile and CAN Bus security, as well as an overview of what has been publicly disclosed by many research organizations. It will then present several hypotheses of how vehicle security issues may impact nuclear activities. An initial discussion of how a vehicle can be used as a new threat vector to penetrate secure facilities will be presented. This includes how a modern automobile can be used as the exploitation mechanism for nearby devices such as laptops, cell phones, and wireless access points. Additional discussion will highlight how vehicle security might impact transportation of nuclear material through remote exploitation of a moving vehicle. The final discussion will include what possible implications might be relative to the physical protection systems at nuclear facilities. The audience will also be given details regarding the complexity of attack, thus implying the likelihood of successful exploitation, and information on how such attacks may be mitigated. Emerging security products for automobiles will be discussed and other mitigation methods will be detailed (e.g. disabling vehicle cellular modems). As a result, the audience will have a greater understanding of how to add vehicle security as a part of a comprehensive nuclear security policy.Finally, this paper will highlight the similarities between CAN Bus and other broadcast serial bus networks such as Profibus or DeviceNet, helping educate the reader on how susceptible this type of networking is to nefarious attacks and how it might affect components connected to many different nuclear systems, including control systems, safety systems, emergency systems, and support systems.« less

  20. Defending Against Advanced Persistent Threats Using Game-Theory.

    PubMed

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  1. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    NASA Technical Reports Server (NTRS)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  2. An image encryption algorithm based on 3D cellular automata and chaotic maps

    NASA Astrophysics Data System (ADS)

    Del Rey, A. Martín; Sánchez, G. Rodríguez

    2015-05-01

    A novel encryption algorithm to cipher digital images is presented in this work. The digital image is rendering into a three-dimensional (3D) lattice and the protocol consists of two phases: the confusion phase where 24 chaotic Cat maps are applied and the diffusion phase where a 3D cellular automata is evolved. The encryption method is shown to be secure against the most important cryptanalytic attacks.

  3. Factors affecting credibility in a simulated sexual harassment hearing.

    PubMed

    Gibbs, M; Sigal, J; Friedman, C R; Orosy-fildes, C

    1995-12-01

    This paper presents two studies investigating judgments in a simulated sexual harassment hearing in which 240 male and female undergraduates participated. The transcript presented a female student's allegations of sexual harassment against a male professor. In the first experiment, 4 versions of a transcript were created, varying the aggressiveness of the attack on the female student complainant and the status of the accused professor. The findings supported the hypothesis that an aggressive attack negatively affects believability of the victim. The findings are also consistent with previous studies, which found out that denial was an effective technique for handling attacks. In the second experiment, the case was modified as to the emotionality of both the victim and the accused and the time of the between the occurrence and the reporting of the alleged harassment incident (1 month vs. 6 months). The results indicated that emotionality was important to decisions about the severity of punishment and guilt; when the victim was emotional, the defendant was punished more severely. Both experiments indicated that process variables (e.g., aggressiveness of attack) might be important in the perception of sexual harassment.

  4. Handling and safety enhancement of race cars using active aerodynamic systems

    NASA Astrophysics Data System (ADS)

    Diba, Fereydoon; Barari, Ahmad; Esmailzadeh, Ebrahim

    2014-09-01

    A methodology is presented in this work that employs the active inverted wings to enhance the road holding by increasing the downward force on the tyres. In the proposed active system, the angles of attack of the vehicle's wings are adjusted by using a real-time controller to increase the road holding and hence improve the vehicle handling. The handling of the race car and safety of the driver are two important concerns in the design of race cars. The handling of a vehicle depends on the dynamic capabilities of the vehicle and also the pneumatic tyres' limitations. The vehicle side-slip angle, as a measure of the vehicle dynamic safety, should be narrowed into an acceptable range. This paper demonstrates that active inverted wings can provide noteworthy dynamic capabilities and enhance the safety features of race cars. Detailed analytical study and formulations of the race car nonlinear model with the airfoils are presented. Computer simulations are carried out to evaluate the performance of the proposed active aerodynamic system.

  5. Recycling Primer: Getting Back to Basics.

    ERIC Educational Resources Information Center

    Connecticut State Dept. of Environmental Protection, Hartford.

    The disposal of garbage is a complex issue. Four strategies have been developed to attack the problem. They deal with: (1) waste reduction; (2) recycling; (3) energy recovery; and (4) land filling. This handbook emphasizes recycling as a method of handling the problem of dealing with solid wastes. Included are a list of the categories and uses of…

  6. Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks

    PubMed Central

    Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae

    2016-01-01

    The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%. PMID:27494411

  7. Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.

    PubMed

    Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae

    2016-01-01

    The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.

  8. Social Distance and Immediate Informal Responses to Violent Victimization

    ERIC Educational Resources Information Center

    Jacques, Scott; Rennison, Callie Marie

    2013-01-01

    There are a number of ways that victims of violence informally handle attacks as they unfold. Their responses range in severity from physical resistance, to talking it out with the offender, to running away, to cooperating. Why do victims respond in a more or less severe manner? Cooney (2009) suggests that social distance is part of the answer:…

  9. Functional Response of Aphidoletes aphidimyza Rondani (Diptera: Cecidomyiidae) to Aphis gossypii Glover (Hemiptera: Aphididae): Effects of Vermicompost and Host Plant Cultivar.

    PubMed

    Mottaghinia, L; Hassanpour, M; Razmjou, J; Hosseini, M; Chamani, E

    2016-02-01

    Interactions between natural enemies and herbivores may be affected by application of fertilizers and different cultivars. We investigated the functional response of the predatory gall midge, Aphidoletes aphidimyza Rondani (Diptera: Cecidomyiidae) larvae to the nymphs of the melon aphid, Aphis gossypii Glover (Hemiptera: Aphididae), reared on two commonly grown cucumber cultivars in Iran (Khasib and Karim) treated with different vermicompost/soil ratios (0:100, 10:90, 20:80, and 30:70%). Based on logistic regression analysis, A. aphidimyza revealed a type II functional response to the aphid in all treatments. Attack rates and handling times of A. aphidimyza larvae on different vermicompost/soil ratios ranged from 0.076 to 0.140 h(-1) and 0.969 to 1.164 h on Khasib and from 0.092 to 0.123 h(-1) and 0.905 to 1.229 h on Karim, respectively. Furthermore, increasing the density of the melon aphid on both cultivars amended with vermicompost/soil ratios resulted in increased prey consumption by the predator. Density of trichomes increased when plants received higher concentrations of vermicompost. So, trichomes may be responsible for different attack rates and handling times of A. aphidimyza on both cultivars.

  10. A high-quality high-fidelity visualization of the September 11 attack on the World Trade Center.

    PubMed

    Rosen, Paul; Popescu, Voicu; Hoffmann, Christoph; Irfanoglu, Ayhan

    2008-01-01

    In this application paper, we describe the efforts of a multidisciplinary team towards producing a visualization of the September 11 Attack on the North Tower of New York's World Trade Center. The visualization was designed to meet two requirements. First, the visualization had to depict the impact with high fidelity, by closely following the laws of physics. Second, the visualization had to be eloquent to a nonexpert user. This was achieved by first designing and computing a finite-element analysis (FEA) simulation of the impact between the aircraft and the top 20 stories of the building, and then by visualizing the FEA results with a state-of-the-art commercial animation system. The visualization was enabled by an automatic translator that converts the simulation data into an animation system 3D scene. We built upon a previously developed translator. The translator was substantially extended to enable and control visualization of fire and of disintegrating elements, to better scale with the number of nodes and number of states, to handle beam elements with complex profiles, and to handle smoothed particle hydrodynamics liquid representation. The resulting translator is a powerful automatic and scalable tool for high-quality visualization of FEA results.

  11. Multiple-image hiding using super resolution reconstruction in high-frequency domains

    NASA Astrophysics Data System (ADS)

    Li, Xiao-Wei; Zhao, Wu-Xiang; Wang, Jun; Wang, Qiong-Hua

    2017-12-01

    In this paper, a robust multiple-image hiding method using the computer-generated integral imaging and the modified super-resolution reconstruction algorithm is proposed. In our work, the host image is first transformed into frequency domains by cellular automata (CA), to assure the quality of the stego-image, the secret images are embedded into the CA high-frequency domains. The proposed method has the following advantages: (1) robustness to geometric attacks because of the memory-distributed property of elemental images, (2) increasing quality of the reconstructed secret images as the scheme utilizes the modified super-resolution reconstruction algorithm. The simulation results show that the proposed multiple-image hiding method outperforms other similar hiding methods and is robust to some geometric attacks, e.g., Gaussian noise and JPEG compression attacks.

  12. Protecting ICS Systems Within the Energy Sector from Cyber Attacks

    NASA Astrophysics Data System (ADS)

    Barnes, Shaquille

    Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.

  13. [Tularemia in a jogger woman after the attack by a common buzzard (Buteo buteo): A "One Health" case report].

    PubMed

    Ehrensperger, F; Riederer, L; Friedl, A

    2018-03-01

    A female jogger was attacked by a common buzzard (Buteo buteo) and was scratched lightly at the back of the head. One week later she was taken ill with high fever and headache which was later diagnosed as ulcero-glandular tularemia in regional lymph nodes, caused by Francisella tularensis. Recovery was only achieved after several weeks of systemic antibiotic treatment (Gentamicin/ Ciprofloxacine). Tularemia is a well known zoonotic disease, called "rabbit fever", mainly affecting rabbits and hares, but also small rodents. Human infection occurs often following tick bites or bloodsucking insects, or in hunters or slaughterers handling infected animals. Bites by mice have also been reported as a cause of tularemia. For the first time we report this case of tularemia as a result of an attack by a bird of prey. We assume that the bird acted as a vector just carrying the F. tularensis on its claws or beak, but we cannot exclude an infection of the bird itself. Several other joggers had also been attacked by a common buzzard in the same area shortly after the above described event and one of these also became infected with F. tularensis.

  14. [Dangerous sharks in tropical seas].

    PubMed

    Maslin, J; Menard, G; Drouin, C; Pollet, L

    2000-01-01

    Sightseeing travel in tropical zones is a growing industry. The risks incurred by travelers depend on the destination, duration of stay, individual behavior, and type of leisure activity. Water sports expose visitors to encounters with dangerous marine animals. Shark attacks are rare but always serious occurrences. Divers should handle any shark, regardless of size, with due precaution. Prevention of shark attack depends on avoiding encounters by not attracting the attention of the shark and knowing the proper attitude to adopt in case an encounter should occur. Active and passive protection can be used, but each method has advantages and disadvantages depending on the situation. Rescue operations are difficult due to the gravity of injuries and their occurrence in a marine environment. This along with the nature of the aggressor explain that many attacks are immediately fatal. Wounds are often deep with involvement of bone, blood vessels, and nerves. A possible source of complication in survivors is infection, which can involve uncommon microorganisms associated with bacteria in sharks mouth or marine environment.

  15. Granulated decontamination formulations

    DOEpatents

    Tucker, Mark D.

    2007-10-02

    A decontamination formulation and method of making that neutralizes the adverse health effects of both chemical and biological compounds, especially chemical warfare (CW) and biological warfare (BW) agents, and toxic industrial chemicals. The formulation provides solubilizing compounds that serve to effectively render the chemical and biological compounds, particularly CW and BW compounds, susceptible to attack, and at least one reactive compound that serves to attack (and detoxify or kill) the compound. The formulation includes at least one solubilizing agent, a reactive compound, a sorbent additive, and water. A highly adsorbent sorbent additive (e.g., amorphous silica, sorbitol, mannitol, etc.) is used to "dry out" one or more liquid ingredients into a dry, free-flowing powder that has an extended shelf life, and is more convenient to handle and mix in the field.

  16. Influenza Virus Mounts a Two-Pronged Attack on Host RNA Polymerase II Transcription.

    PubMed

    Bauer, David L V; Tellier, Michael; Martínez-Alonso, Mónica; Nojima, Takayuki; Proudfoot, Nick J; Murphy, Shona; Fodor, Ervin

    2018-05-15

    Influenza virus intimately associates with host RNA polymerase II (Pol II) and mRNA processing machinery. Here, we use mammalian native elongating transcript sequencing (mNET-seq) to examine Pol II behavior during viral infection. We show that influenza virus executes a two-pronged attack on host transcription. First, viral infection causes decreased Pol II gene occupancy downstream of transcription start sites. Second, virus-induced cellular stress leads to a catastrophic failure of Pol II termination at poly(A) sites, with transcription often continuing for tens of kilobases. Defective Pol II termination occurs independently of the ability of the viral NS1 protein to interfere with host mRNA processing. Instead, this termination defect is a common effect of diverse cellular stresses and underlies the production of previously reported downstream-of-gene transcripts (DoGs). Our work has implications for understanding not only host-virus interactions but also fundamental aspects of mammalian transcription. Copyright © 2018 The Author(s). Published by Elsevier Inc. All rights reserved.

  17. T cells' immunological synapses induce polarization of brain astrocytes in vivo and in vitro: a novel astrocyte response mechanism to cellular injury.

    PubMed

    Barcia, Carlos; Sanderson, Nicholas S R; Barrett, Robert J; Wawrowsky, Kolja; Kroeger, Kurt M; Puntel, Mariana; Liu, Chunyan; Castro, Maria G; Lowenstein, Pedro R

    2008-08-20

    Astrocytes usually respond to trauma, stroke, or neurodegeneration by undergoing cellular hypertrophy, yet, their response to a specific immune attack by T cells is poorly understood. Effector T cells establish specific contacts with target cells, known as immunological synapses, during clearance of virally infected cells from the brain. Immunological synapses mediate intercellular communication between T cells and target cells, both in vitro and in vivo. How target virally infected astrocytes respond to the formation of immunological synapses established by effector T cells is unknown. Herein we demonstrate that, as a consequence of T cell attack, infected astrocytes undergo dramatic morphological changes. From normally multipolar cells, they become unipolar, extending a major protrusion towards the immunological synapse formed by the effector T cells, and withdrawing most of their finer processes. Thus, target astrocytes become polarized towards the contacting T cells. The MTOC, the organizer of cell polarity, is localized to the base of the protrusion, and Golgi stacks are distributed throughout the protrusion, reaching distally towards the immunological synapse. Thus, rather than causing astrocyte hypertrophy, antiviral T cells cause a major structural reorganization of target virally infected astrocytes. Astrocyte polarization, as opposed to hypertrophy, in response to T cell attack may be due to T cells providing a very focused attack, and thus, astrocytes responding in a polarized manner. A similar polarization of Golgi stacks towards contacting T cells was also detected using an in vitro allogeneic model. Thus, different T cells are able to induce polarization of target astrocytes. Polarization of target astrocytes in response to immunological synapses may play an important role in regulating the outcome of the response of astrocytes to attacking effector T cells, whether during antiviral (e.g. infected during HIV, HTLV-1, HSV-1 or LCMV infection), anti-transplant, autoimmune, or anti-tumor immune responses in vivo and in vitro.

  18. Defensive responses by a social caterpillar are tailored to different predators and change with larval instar and group size

    NASA Astrophysics Data System (ADS)

    McClure, Melanie; Despland, Emma

    2011-05-01

    Gregariousness in animals is widely accepted as a behavioral adaptation for protection from predation. However, predation risk and the effectiveness of a prey's defense can be a function of several other factors, including predator species and prey size or age. The objective of this study was to determine if the gregarious habit of Malacosoma disstria caterpillars is advantageous against invertebrate natural enemies, and whether it is through dilution or cooperative defenses. We also examined the effects of larval growth and group size on the rate and success of attacks. Caterpillars of M. disstria responded with predator-specific behaviors, which led to increased survival. Evasive behaviors were used against stinkbugs, while thrashing by fourth instar caterpillars and holding on to the silk mat by second instar caterpillars was most efficient against spider attacks. Collective head flicking and biting by groups of both second and fourth instar caterpillars were observed when attacked by parasitoids. Increased larval size decreased the average number of attacks by spiders but increased the number of attacks by both stinkbugs and parasitoids. However, increased body size decreased the success rate of attacks by all three natural enemies and increased handling time for both predators. Larger group sizes did not influence the number of attacks from predators but increased the number of attacks and the number of successful attacks from parasitoids. In all cases, individual risk was lower in larger groups. Caterpillars showed collective defenses against parasitoids but not against the walking predators. These results show that caterpillars use different tactics against different natural enemies. Overall, these tactics are both more diverse and more effective in fourth instar than in second instar caterpillars, confirming that growth reduces predation risk. We also show that grouping benefits caterpillars through dilution of risk, and, in the case of parasitoids, through group defenses. The decreased tendency to aggregate in the last larval instar may therefore be linked to decreasing predation risk.

  19. Mould exposure in museum personnel.

    PubMed

    Kolmodin-Hedman, B; Blomquist, G; Sikström, E

    1986-01-01

    In the basement archives of a local arts and crafts museum where the books and bookkeeping registers were handled, a woman on the museum staff had had ten attacks of fever, chill, nausea and cough during one year. The symptoms appeared at the end of the working day and disappeared after one to three days at home. No symptoms could be detected during the summer holidays. The books stored in the basement archives had earlier been stored in a small house with a leaky roof, which had led to the growth of mould on the books. When the books were handled at the museum, they were still covered with mould. The exposure measurements showed 10(6) CFU/m3 and a total of 10(8) microorganisms/m3.

  20. Has Democracy Destabilized East Asia

    DTIC Science & Technology

    2016-06-01

    handled the Fukushima triple disaster any better, Krauss makes an important point about the DPJ Prime Minister Hatoyama’s stance on the Marine Corps...attack, involved a domestic emergency. The nuclear disaster and tsunami were significant events that weighed on people’s minds, but it was the multitude...in the minds of Japanese voters, the administration’s reaction to the nuclear disaster and tsunami could be put under a broad “crisis management

  1. A piloted evaluation of an oblique-wing research aircraft motion simulation with decoupling control laws

    NASA Technical Reports Server (NTRS)

    Kempel, Robert W.; Mcneill, Walter E.; Gilyard, Glenn B.; Maine, Trindel A.

    1988-01-01

    The NASA Ames Research Center developed an oblique-wing research plane from NASA's digital fly-by-wire airplane. Oblique-wing airplanes show large cross-coupling in control and dynamic behavior which is not present on conventional symmetric airplanes and must be compensated for to obtain acceptable handling qualities. The large vertical motion simulator at NASA Ames-Moffett was used in the piloted evaluation of a proposed flight control system designed to provide decoupled handling qualities. Five discrete flight conditions were evaluated ranging from low altitude subsonic Mach numbers to moderate altitude supersonic Mach numbers. The flight control system was effective in generally decoupling the airplane. However, all participating pilots objected to the high levels of lateral acceleration encountered in pitch maneuvers. In addition, the pilots were more critical of left turns (in the direction of the trailing wingtip when skewed) than they were of right turns due to the tendency to be rolled into the left turns and out of the right turns. Asymmetric side force as a function of angle of attack was the primary cause of lateral acceleration in pitch. Along with the lateral acceleration in pitch, variation of rolling and yawing moments as functions of angle of attack caused the tendency to roll into left turns and out of right turns.

  2. Climate change effects on macrofaunal litter decomposition: the interplay of temperature, body masses and stoichiometry.

    PubMed

    Ott, David; Rall, Björn C; Brose, Ulrich

    2012-11-05

    Macrofauna invertebrates of forest floors provide important functions in the decomposition process of soil organic matter, which is affected by the nutrient stoichiometry of the leaf litter. Climate change effects on forest ecosystems include warming and decreasing litter quality (e.g. higher C : nutrient ratios) induced by higher atmospheric CO(2) concentrations. While litter-bag experiments unravelled separate effects, a mechanistic understanding of how interactions between temperature and litter stoichiometry are driving decomposition rates is lacking. In a laboratory experiment, we filled this void by quantifying decomposer consumption rates analogous to predator-prey functional responses that include the mechanistic parameters handling time and attack rate. Systematically, we varied the body masses of isopods, the environmental temperature and the resource between poor (hornbeam) and good quality (ash). We found that attack rates increased and handling times decreased (i) with body masses and (ii) temperature. Interestingly, these relationships interacted with litter quality: small isopods possibly avoided the poorer resource, whereas large isopods exhibited increased, compensatory feeding of the poorer resource, which may be explained by their higher metabolic demands. The combination of metabolic theory and ecological stoichiometry provided critically important mechanistic insights into how warming and varying litter quality may modify macrofaunal decomposition rates.

  3. Thiol-based copper handling by the copper chaperone Atox1.

    PubMed

    Hatori, Yuta; Inouye, Sachiye; Akagi, Reiko

    2017-04-01

    Human antioxidant protein 1 (Atox1) plays a crucial role in cellular copper homeostasis. Atox1 captures cytosolic copper for subsequent transfer to copper pumps in trans Golgi network, thereby facilitating copper supply to various copper-dependent oxidereductases matured within the secretory vesicles. Atox1 and other copper chaperones handle cytosolic copper using Cys thiols which are ideal ligands for coordinating Cu(I). Recent studies demonstrated reversible oxidation of these Cys residues in copper chaperones, linking cellular redox state to copper homeostasis. Highlighted in this review are unique redox properties of Atox1 and other copper chaperones. Also, summarized are the redox nodes in the cytosol which potentially play dominant roles in the redox regulation of copper chaperones. © 2016 IUBMB Life, 69(4):246-254, 2017. © 2017 International Union of Biochemistry and Molecular Biology.

  4. The adaptive function of tiger moth clicks against echolocating bats: an experimental and synthetic approach.

    PubMed

    Ratcliffe, John M; Fullard, James H

    2005-12-01

    We studied the efficiency and effects of the multiple sensory cues of tiger moths on echolocating bats. We used the northern long-eared bat, Myotis septentrionalis, a purported moth specialist that takes surface-bound prey (gleaning) and airborne prey (aerial hawking), and the dogbane tiger moth, Cycnia tenera, an eared species unpalatable to bats that possesses conspicuous colouration and sound-producing organs (tymbals). This is the first study to investigate the interaction of tiger moths and wild-caught bats under conditions mimicking those found in nature and to demand the use of both aerial hawking and gleaning strategies by bats. Further, it is the first to report spectrograms of the sounds produced by tiger moths while under aerial attack by echolocating bats. During both aerial hawking and gleaning trials, all muted C. tenera and perched intact C. tenera were attacked by M. septentrionalis, indicating that M. septentrionalis did not discriminate C. tenera from palatable moths based on potential echoic and/or non-auditory cues. Intact C. tenera were attacked significantly less often than muted C. tenera during aerial hawking attacks: tymbal clicks were therefore an effective deterrent in an aerial hawking context. During gleaning attacks, intact and muted C. tenera were always attacked and suffered similar mortality rates, suggesting that while handling prey this bat uses primarily chemical signals. Our results also show that C. tenera temporally matches the onset of click production to the ;approach phase' echolocation calls produced by aerial hawking attacking bats and that clicks themselves influence the echolocation behaviour of attacking bats. In the context of past research, these findings support the hypotheses that the clicks of arctiid moths are both an active defence (through echolocation disruption) and a reliable indicator of chemical defence against aerial-hawking bats. We suggest these signals are specialized for an aerial context.

  5. A Bitslice Implementation of Anderson's Attack on A5/1

    NASA Astrophysics Data System (ADS)

    Bulavintsev, Vadim; Semenov, Alexander; Zaikin, Oleg; Kochemazov, Stepan

    2018-03-01

    The A5/1 keystream generator is a part of Global System for Mobile Communications (GSM) protocol, employed in cellular networks all over the world. Its cryptographic resistance was extensively analyzed in dozens of papers. However, almost all corresponding methods either employ a specific hardware or require an extensive preprocessing stage and significant amounts of memory. In the present study, a bitslice variant of Anderson's Attack on A5/1 is implemented. It requires very little computer memory and no preprocessing. Moreover, the attack can be made even more efficient by harnessing the computing power of modern Graphics Processing Units (GPUs). As a result, using commonly available GPUs this method can quite efficiently recover the secret key using only 64 bits of keystream. To test the performance of the implementation, a volunteer computing project was launched. 10 instances of A5/1 cryptanalysis have been successfully solved in this project in a single week.

  6. Defending Against Advanced Persistent Threats Using Game-Theory

    PubMed Central

    König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker’s incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system’s protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest. PMID:28045922

  7. Integrated approach for investigating the durability of self-consolidating concrete to sulfate attack

    NASA Astrophysics Data System (ADS)

    Bassuoni, Mohamed Tamer F.

    The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion tests, the combined sulfate attack tests captured performance risks and complex damage mechanisms associated with the SCC pore structure and constituent materials. Sodium sulfate attack with wetting-drying cycles and/or partial immersion under temperate-hot conditions synergistically caused significant damage to specimens, especially to quaternary cementitious systems having very fine pore structure, due to the build-up of salt crystals and sulfate reaction products. The deleterious effects of sulfate reaction products and salt crystallization on all cementitious systems were more severe under the combined sodium sulfate and freezing-thawing exposure, with a potential of sudden brittle failure. Laboratory experiments in the current work documented evidence for the occurrence of thaumasite sulfate attack (TSA) in cementitious systems containing limestone filler, not only under cold but also under temperate-hot conditions, which made specimens more vulnerable to damage in the combined sulfate attack tests. The field-like combined exposure of sodium sulfate, cyclic environments and flexural loading had synergistic effects on SCC specimens and caused the coexistence of multiple-complex degradation mechanisms (sulfate attack, TSA, stress-corrosion, salt crystallization, surface scaling and corrosion of surface steel fibres) depending on the mixture design variables. The current thesis demonstrates that relying only on sulfate immersion tests to evaluate the performance of cement-based materials can be risky. It also shows that linear and deterministic modeling of the performance of concrete structures under external sulfate attack is unrealistic. Fuzzy and adaptive-neuro fuzzy inference systems developed in the current thesis accurately and rationally predicted the serviceability, deterioration in engineering properties and time to failure of the SCC mixtures under the various sulfate attack exposure regimes adopted in the integrated testing approach. A durability evaluation factor from multiple performance criteria was created for the ammonium sulfate exposure. Environmental charts were developed to determine the level of aggression associated with sodium sulfate attack from temperature, RH and degree of wetting-drying expected in service. This novel modeling approach showed promising success in handling complex durability topics such as the sulfate attack of concrete, which involves non-linearity, ambiguity and interface with operator approximation. The current thesis provides needed fundamental knowledge on the durability of a wide scope of SCC mixtures to various sulfate attack exposure scenarios. It elucidates complex deterioration mechanisms and failure modes of cement-based materials under multi-mechanistic aging processes. It also proposes carefully engineered integrated sulfate attack tests that replicate various sulfate attack exposure regimes, which could be refined and standardized in the future. In addition, the current work introduced original knowledge-based smart models capable of handling uncertainty and providing reliable predictions for the behaviour of concrete under external sulfate attack. The models do not require conducting exhaustive laboratory experiments and/or making assumptions, thus facilitating the selection of optimum concrete mixtures for a specified exposure. Overall, this research should effectively contribute to the development of performance-based standards and specifications for, and improvement of durability-based design and life-cycle analysis of concrete structures subjected to external sulfate attack. Keywords. Sulfate attack, self-consolidating concrete, integrated testing, composite cements, air-entrainment, hybrid fibres, full immersion, cations, pH, wetting-drying, partial immersion, freezing-thawing, cyclic cold-hot conditions, flexural loading, thaumasite, salt crystallization, fuzzy, neuro-fuzzy, systems.

  8. Ground-to-Flight Handling Qualities Comparisons for a High Performance Airplane

    NASA Technical Reports Server (NTRS)

    Brandon, Jay M.; Glaab, Louis J.; Brown, Philip W.; Phillips, Michael R.

    1995-01-01

    A flight test program was conducted in conjunction with a ground-based piloted simulation study to enable a comparison of handling qualities ratings for a variety of maneuvers between flight and simulation of a modern high performance airplane. Specific objectives included an evaluation of pilot-induced oscillation (PIO) tendencies and a determination of maneuver types which result in either good or poor ground-to-flight pilot handling qualities ratings. A General Dynamics F-16XL aircraft was used for the flight evaluations, and the NASA Langley Differential Maneuvering Simulator was employed for the ground based evaluations. Two NASA research pilots evaluated both the airplane and simulator characteristics using tasks developed in the simulator. Simulator and flight tests were all conducted within approximately a one month time frame. Maneuvers included numerous fine tracking evaluations at various angles of attack, load factors and speed ranges, gross acquisitions involving longitudinal and lateral maneuvering, roll angle captures, and an ILS task with a sidestep to landing. Overall results showed generally good correlation between ground and flight for PIO tendencies and general handling qualities comments. Differences in pilot technique used in simulator evaluations and effects of airplane accelerations and motions are illustrated.

  9. Agent-based simulation for human-induced hazard analysis.

    PubMed

    Bulleit, William M; Drewek, Matthew W

    2011-02-01

    Terrorism could be treated as a hazard for design purposes. For instance, the terrorist hazard could be analyzed in a manner similar to the way that seismic hazard is handled. No matter how terrorism is dealt with in the design of systems, the need for predictions of the frequency and magnitude of the hazard will be required. And, if the human-induced hazard is to be designed for in a manner analogous to natural hazards, then the predictions should be probabilistic in nature. The model described in this article is a prototype model that used agent-based modeling (ABM) to analyze terrorist attacks. The basic approach in this article of using ABM to model human-induced hazards has been preliminarily validated in the sense that the attack magnitudes seem to be power-law distributed and attacks occur mostly in regions where high levels of wealth pass through, such as transit routes and markets. The model developed in this study indicates that ABM is a viable approach to modeling socioeconomic-based infrastructure systems for engineering design to deal with human-induced hazards. © 2010 Society for Risk Analysis.

  10. Neurologists and the threat of bioterrorism.

    PubMed

    Donaghy, Michael

    2006-11-01

    Neurologists are most likely to become involved in primarily diagnosing those bioterrorist attacks utilising botulinum toxin. Oral ingestion, or possibly inhalation, are likely routes of delivery. The characteristic descending paralysis starts in the extraocular and bulbar muscles, with associated autonomic features. Repetitive nerve stimulation usually shows an incremental muscle response. Treatment is supportive. The differential diagnosis is from naturally occurring paralysing illnesses such as Guillain-Barré syndrome, myasthenic crisis or diphtheria, from paralysing seafood neurotoxins (tetrodotoxin, saxitoxin), snake envenomation, and from chemical warfare poisoning by organophosphates. Primary neurological infections are less feasible for use as bioweapons. There are theoretical possibilities of Venezuelan equine encephalitis transmission by inhalation and secondary zoonotic transmission cycles sustained by horses and mosquitoes. Severe haemorrhagic meningitis regularly occurs in anthrax, usually in the aftermath of severe systemic disease likely to have been transmitted by spore inhalation. Panic and psychologically determined 'me-too' symptomatology are likely to pose the biggest diagnostic and management burden on neurologists handling bioterrorist attack on an institution or a random civilian population. Indeed civilian panic and disablement of institutional operations are likely to be prominent intentions of any bioterrorist attack.

  11. Cellular mechanisms underlying an effect of "early handling" on pCREB and BDNF in the neonatal rat hippocampus.

    PubMed

    Garoflos, Efstathios; Stamatakis, Antonios; Mantelas, Athanasios; Philippidis, Helen; Stylianopoulou, Fotini

    2005-08-09

    Early experiences have long-term effects on brain function and behavior. However, the precise mechanisms involved still remain elusive. In an effort to address this issue, we employed the model of "early handling", which is known to affect the ability of the adult organism to respond to stressful stimuli, and determined its effects on hippocampal pCREB and BDNF 2, 4, and 8 h later. 8 h following "handling" on postnatal day 1, there was an increase in pCREB and BDNF positive cells in the hippocampus, a brain area which is a specific target of "handling". On the other hand, vehicle injection resulted in decreased pCREB and BDNF in both handled and non-handled animals 2 and 4 h later. The "handling"-induced increase of pCREB and BDNF was cancelled by inhibition of NMDA, AMPA/kainate, GABA-A, 5-HT1A or 5-HT2A/C receptors, as well as L-type voltage-gated Ca(2+) channels. It thus appears that "early handling" activates these neurotransmitter receptors, leading to increased intracellular Ca(2+), phosphorylation of the transcription factor CREB, and increased BDNF expression. BDNF can then exert its morphogenetic effects and thus "imprint" the effects of "handling" on the brain.

  12. Design and pilot evaluation of the RAH-66 Comanche Core AFCS

    NASA Technical Reports Server (NTRS)

    Fogler, Donald L., Jr.; Keller, James F.

    1993-01-01

    This paper addresses the design and pilot evaluation of the Core Automatic Flight Control System (AFCS) for the Reconnaissance/Attack Helicopter (RAH-66) Comanche. During the period from November 1991 through February 1992, the RAH-66 Comanche control laws were evaluated through a structured pilot acceptance test using a motion base simulator. Design requirements, descriptions of the control law design, and handling qualities data collected from ADS-33 maneuvers are presented.

  13. Tactical Requirements for Peacekeeping Operations.

    DTIC Science & Technology

    1985-12-02

    is the slum area of Burj - Al -Barjneh, which houses Palestinian refugees and Shia Muslims. Sniper fire from ’o.- this area became one of the greatest...isolation and low target value of most outposts, the only organization that might benefit from attacking them would be radical Arab terrorists, either...prevention and treatment (1/2 hr) Navigate in a desert environment (8 hrs) CD training (16 hrs) Handling POW’s (1 hr) Arabic familiarization course (40 hrs

  14. Investigation of High-Angle-of-Attack Maneuver-Limiting Factors. Part 1. Analysis and Simulation

    DTIC Science & Technology

    1980-12-01

    useful, are not so satisfying or in- structive as the more positive identification of causal factors offered by the methods developed in Reference 5...same methods be applied to additional high-performance fighter aircraft having widely differing high AOA handling characteristics to see if further...predictions and the nonlinear model results were resolved. The second task involved development of methods , criteria, and an associated pilot rating scale, for

  15. DURIP: Mitigating Attacks on Mobile Devices and Critical Cellular Infrastructure

    DTIC Science & Technology

    2016-03-03

    Patrick Traynor, Shobha Venkataraman . Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet, 2013 43rd Annual IEEE...Symposium (NDSS), 2013. 4. C. Amrutkar, M. Hiltunen, T. Jim, K. Joshi, O. Spatscheck, P. Traynor and S. Venkataraman , Why is My Smartphone Slow? On The

  16. Genetic anaylsis of a disease resistance gene from loblolly pine

    Treesearch

    Yinghua Huang; Nili Jin; Alex Diner; Chuck Tauer; Yan Zhang; John Damicone

    2003-01-01

    Rapid advances in molecular genetics provide great opportunities for studies of host defense mechanisms. Examination of plant responses to disease at the cellular and molecular level permits both discovery of changes in gene expression in the tissues attacked by pathogens, and identification of genetic components involved in the interaction between host and pathogens....

  17. A high-sensitivity optical device for the early monitoring of plant pathogen attack via the in vivo detection of ROS bursts

    PubMed Central

    Zeng, Lizhang; Zhou, Jun; Li, Bo; Xing, Da

    2015-01-01

    Biotic stressors, especially pathogenic microorganisms, are rather difficult to detect. In plants, one of the earliest cellular responses following pathogen infection is the production of reactive oxygen species (ROS). In this study, a novel optical device for the early monitoring of Pseudomonas attack was developed; this device measures the ROS level via oxidation-sensitive 2′, 7′-dichlorodihydrofluorescein diacetate (H2DCFDA)-mediated fluorescence, which could provide early monitoring of attacks by a range of plant pathogen; ROS bursts were detected in vivo in Arabidopsis thaliana with higher sensitivity and accuracy than those of a commercial luminescence spectrophotometer. Additionally, the DCF fluorescence truly reflected early changes in the ROS level, as indicated by an evaluation of the H2O2 content and the tight association between the ROS and Pseudomonas concentration. Moreover, compared with traditional methods for detecting plant pathogen attacks based on physiological and biochemical measurements, our proposed technique also offers significant advantages, such as low cost, simplicity, convenient operation and quick turnaround. These results therefore suggest that the proposed optical device could be useful for the rapid monitoring of attacks by plant pathogen and yield results considerably earlier than the appearance of visual changes in plant morphology or growth. PMID:25767474

  18. Optofluidic cellular immunofunctional analysis by localized surface plasmon resonance

    NASA Astrophysics Data System (ADS)

    Kurabayashi, Katsuo; Oh, Bo-Ram

    2014-08-01

    Cytokine secretion assays provide the means to quantify intercellular-signaling proteins secreted by blood immune cells. These assays allow researchers and clinicians to obtain valuable information on the immune status of the donor. Previous studies have demonstrated that localized surface plasmon resonance (LSPR) effects enable label-free, real-time biosensing on a nanostructured metallic surface with simple optics and sensing tunability. However, limited sensitivity coupled with a lack of sample handling capability makes it challenging to implement LSPR biosensing in cellular functional immunoanalysis based on cytokine secretion assay. This paper describes our recent progress towards full development of a label-free LSPR biosensing technique to detect cell-secreted tumor necrosis factor (TNF)-α cytokines in clinical blood samples. We integrate LSPR bionanosensors in an optofluidic platform capable of handling target immune cells in a microfluidic chamber while readily permitting optical access for cytokine detection.

  19. Sample handling in surface sensitive chemical and biological sensing: a practical review of basic fluidics and analyte transport.

    PubMed

    Orgovan, Norbert; Patko, Daniel; Hos, Csaba; Kurunczi, Sándor; Szabó, Bálint; Ramsden, Jeremy J; Horvath, Robert

    2014-09-01

    This paper gives an overview of the advantages and associated caveats of the most common sample handling methods in surface-sensitive chemical and biological sensing. We summarize the basic theoretical and practical considerations one faces when designing and assembling the fluidic part of the sensor devices. The influence of analyte size, the use of closed and flow-through cuvettes, the importance of flow rate, tubing length and diameter, bubble traps, pressure-driven pumping, cuvette dead volumes, and sample injection systems are all discussed. Typical application areas of particular arrangements are also highlighted, such as the monitoring of cellular adhesion, biomolecule adsorption-desorption and ligand-receptor affinity binding. Our work is a practical review in the sense that for every sample handling arrangement considered we present our own experimental data and critically review our experience with the given arrangement. In the experimental part we focus on sample handling in optical waveguide lightmode spectroscopy (OWLS) measurements, but the present study is equally applicable for other biosensing technologies in which an analyte in solution is captured at a surface and its presence is monitored. Explicit attention is given to features that are expected to play an increasingly decisive role in determining the reliability of (bio)chemical sensing measurements, such as analyte transport to the sensor surface; the distorting influence of dead volumes in the fluidic system; and the appropriate sample handling of cell suspensions (e.g. their quasi-simultaneous deposition). At the appropriate places, biological aspects closely related to fluidics (e.g. cellular mechanotransduction, competitive adsorption, blood flow in veins) are also discussed, particularly with regard to their models used in biosensing. Copyright © 2014 Elsevier B.V. All rights reserved.

  20. Death feigning by ducks in response to predation by red foxes (Vulpes fulva)

    USGS Publications Warehouse

    Sargeant, A.B.; Eberhardt, L.E.

    1975-01-01

    Predation by captive red foxes (Vulpes fulva) on approximately 50 ducks comprised of five species was observed in tests conducted at the Northern Prairie Wildlife Research Center, Jamestown, North Dakota. Most ducks were attacked from a rear or lateral position and seized in the cervical or thoracic region. All birds became immobile (death-feigned) immediately when seized and with few exceptions remained motionless during prey-handling and for varying lengths of time thereafter. Initial death feints lasted from 20 sec to 14 min. Recovery was delayed by tactile, visual and, possibly, auditory cues from the foxes. Death-feigning birds appeared alert and often took advantage of escape opportunities. Twenty-nine birds survived initial capture and handling by the foxes. Naive foxes were wary of ducks during initial confrontations, but experienced foxes showed little hesitation in attacking them. After capture, most ducks were taken alive to lay-down sites where they were mouthed and often killed. Then the ducks were usually cached or taken to dens or pups. Several birds were cached alive. Red foxes appear to have adapted to the escape of death-feigning ducks by learning to kill some birds soon after capture and by the evolution of an appendage-severing behavior. Death feigning appears to be a highly developed antipredator behavior of ducks that facilitates the escape of some birds after capture by red foxes.

  1. Iron homeostasis: a new job for macrophages in adipose tissue?

    PubMed Central

    Hubler, Merla J.; Peterson, Kristin R.; Hasty, Alyssa H.

    2015-01-01

    Elevated serum ferritin and increased cellular iron concentrations are risk factors for diabetes; however, the etiology of this association is unclear. Metabolic tissues such as pancreas, liver, and adipose tissue (AT), as well as the immune cells resident in these tissues, may be involved. Recent studies demonstrate that the polarization status of macrophages has important relevance to their iron handling capabilities. Furthermore, a subset of macrophages in AT have elevated iron concentrations and a gene expression profile indicative of iron handling, a capacity diminished in obesity. Because iron overload in adipocytes increases systemic insulin resistance, iron handling by AT macrophages may have relevance not only to adipocyte iron stores but also to local and systemic insulin sensitivity. PMID:25600948

  2. Attack on Lignified Grass Cell Walls by a Facultatively Anaerobic Bacterium

    PubMed Central

    Akin, Danny E.

    1980-01-01

    A filamentous, facultatively anaerobic microorganism that attacked lignified tissue in forage grasses was isolated from rumen fluid with a Bermuda grass-containing anaerobic medium in roll tubes. The microbe, designated 7-1, demonstrated various colony and cellular morphologies under different growth conditions. Scanning electron microscopy revealed that 7-1 attacked lignified cell walls in aerobic and anaerobic culture. 7-1 predominately degraded tissues reacting positively for lignin with the chlorine-sulfite stain (i.e., sclerenchyma in leaf blades and parenchyma in stems) rather than the more resistant acid phloroglucinol-positive tissues (i.e., lignified vascular tissue and sclerenchyma ring in stems), although the latter tissues were occasionally attacked. Turbidimetric tests showed that 7-1 in anaerobic culture grew optimally at 39°C at a pH of 7.4 to 8.0. Tests for growth on plant cell wall carbohydrates showed that 7-1 grew on xylan and pectin slowly in aerobic cultures but not with pectin and only slightly with xylan in anaerobic culture. 7-1 was noncellulolytic as shown by filter paper tests. The microbe used the phenolic acids sinapic, ferulic, and p-coumaric acids as substrates for growth; the more highly methoxylated acids were used more effectively. Images PMID:16345651

  3. The effects of carbon nanotubes on lung and dermal cellular behaviors

    PubMed Central

    Luanpitpong, Sudjit; Wang, Liying; Rojanasakul, Yon

    2016-01-01

    Carbon nanotubes (CNTs) hold great promise to create new and better products, but their adverse health effect is a major concern. Human exposure to CNTs is primarily through inhalation and dermal contact, especially during the manufacturing and handling processes. Numerous animal studies have demonstrated the potential pulmonary and dermal hazards associated with CNT exposure, while in vitro studies have assessed the effects of CNT exposure on various cellular behaviors and have been used to perform mechanistic studies. In this review, we provide an overview of the pathological effects of CNTs and examine the acute and chronic effects of CNT exposure on lung and dermal cellular behaviors, beyond the generally discussed cytotoxicity. We then examine the linkage of cellular behaviors and disease pathogenesis, and discuss the pertinent mechanisms. PMID:24981653

  4. A simplified building airflow model for agent concentration prediction.

    PubMed

    Jacques, David R; Smith, David A

    2010-11-01

    A simplified building airflow model is presented that can be used to predict the spread of a contaminant agent from a chemical or biological attack. If the dominant means of agent transport throughout the building is an air-handling system operating at steady-state, a linear time-invariant (LTI) model can be constructed to predict the concentration in any room of the building as a result of either an internal or external release. While the model does not capture weather-driven and other temperature-driven effects, it is suitable for concentration predictions under average daily conditions. The model is easily constructed using information that should be accessible to a building manager, supplemented with assumptions based on building codes and standard air-handling system design practices. The results of the model are compared with a popular multi-zone model for a simple building and are demonstrated for building examples containing one or more air-handling systems. The model can be used for rapid concentration prediction to support low-cost placement strategies for chemical and biological detection sensors.

  5. Flight Tests of a Ministick Controller in an F/A-18 Airplane

    NASA Technical Reports Server (NTRS)

    Stoliker, Patrick C.; Carter, John

    2003-01-01

    In March of 1999, five pilots performed flight tests to evaluate the handling qualities of an F/A-18 research airplane equipped with a small-displacement center stick (ministick) controller that had been developed for the JAS 39 Gripen airplane (a fighter/attack/ reconnaissance airplane used by the Swedish air force). For these tests, the ministick was installed in the aft cockpit (see figure) and production support flight control computers (PSFCCs) were used as interfaces between the controller hardware and the standard F/A-18 flight-control laws. The primary objective of the flight tests was to assess any changes in handling qualities of the F/A-18 airplane attributable to the mechanical characteristics of the ministick. The secondary objective was to demonstrate the capability of the PSFCCs to support flight-test experiments.

  6. Dropping macadamia nuts-in-shell reduces kernel roasting quality.

    PubMed

    Walton, David A; Wallace, Helen M

    2010-10-01

    Macadamia nuts ('nuts-in-shell') are subjected to many impacts from dropping during postharvest handling, resulting in damage to the raw kernel. The effect of dropping on roasted kernel quality is unknown. Macadamia nuts-in-shell were dropped in various combinations of moisture content, number of drops and receiving surface in three experiments. After dropping, samples from each treatment and undropped controls were dry oven-roasted for 20 min at 130 °C, and kernels were assessed for colour, mottled colour and surface damage. Dropping nuts-in-shell onto a bed of nuts-in-shell at 3% moisture content or 20% moisture content increased the percentage of dark roasted kernels. Kernels from nuts dropped first at 20%, then 10% moisture content, onto a metal plate had increased mottled colour. Dropping nuts-in-shell at 3% moisture content onto nuts-in-shell significantly increased surface damage. Similarly, surface damage increased for kernels dropped onto a metal plate at 20%, then at 10% moisture content. Postharvest dropping of macadamia nuts-in-shell causes concealed cellular damage to kernels, the effects not evident until roasting. This damage provides the reagents needed for non-enzymatic browning reactions. Improvements in handling, such as reducing the number of drops and improving handling equipment, will reduce cellular damage and after-roast darkening. Copyright © 2010 Society of Chemical Industry.

  7. Decontamination formulation with sorbent additive

    DOEpatents

    Tucker; Mark D. , Comstock; Robert H.

    2007-10-16

    A decontamination formulation and method of making that neutralizes the adverse health effects of both chemical and biological compounds, especially chemical warfare (CW) and biological warfare (BW) agents, and toxic industrial chemicals. The formulation provides solubilizing compounds that serve to effectively render the chemical and biological compounds, particularly CW and BW compounds, susceptible to attack, and at least one reactive compound that serves to attack (and detoxify or kill) the compound. The formulation includes at least one solubilizing agent, a reactive compound, a bleaching activator, a sorbent additive, and water. The highly adsorbent, water-soluble sorbent additive (e.g., sorbitol or mannitol) is used to "dry out" one or more liquid ingredients, such as the liquid bleaching activator (e.g., propylene glycol diacetate or glycerol diacetate) and convert the activator into a dry, free-flowing powder that has an extended shelf life, and is more convenient to handle and mix in the field.

  8. Airdata Measurement and Calibration

    NASA Technical Reports Server (NTRS)

    Haering, Edward A., Jr.

    1995-01-01

    This memorandum provides a brief introduction to airdata measurement and calibration. Readers will learn about typical test objectives, quantities to measure, and flight maneuvers and operations for calibration. The memorandum informs readers about tower-flyby, trailing cone, pacer, radar-tracking, and dynamic airdata calibration maneuvers. Readers will also begin to understand how some data analysis considerations and special airdata cases, including high-angle-of-attack flight, high-speed flight, and nonobtrusive sensors are handled. This memorandum is not intended to be all inclusive; this paper contains extensive reference and bibliography sections.

  9. Summary of vulnerability related technologies based on machine learning

    NASA Astrophysics Data System (ADS)

    Zhao, Lei; Chen, Zhihao; Jia, Qiong

    2018-04-01

    As the scale of information system increases by an order of magnitude, the complexity of system software is getting higher. The vulnerability interaction from design, development and deployment to implementation stages greatly increases the risk of the entire information system being attacked successfully. Considering the limitations and lags of the existing mainstream security vulnerability detection techniques, this paper summarizes the development and current status of related technologies based on the machine learning methods applied to deal with massive and irregular data, and handling security vulnerabilities.

  10. A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs †

    PubMed Central

    Shi, Yang; Wei, Wujing; He, Zongjian

    2015-01-01

    Wireless Sensor Networks (WSNs) are often deployed in hostile environments and, thus, nodes can be potentially captured by an adversary. This is a typical white-box attack context, i.e., the adversary may have total visibility of the implementation of the build-in cryptosystem and full control over its execution platform. Handling white-box attacks in a WSN scenario is a challenging task. Existing encryption algorithms for white-box attack contexts require large memory footprint and, hence, are not applicable for wireless sensor networks scenarios. As a countermeasure against the threat in this context, in this paper, we propose a class of lightweight secure implementations of the symmetric encryption algorithm SMS4. The basic idea of our approach is to merge several steps of the round function of SMS4 into table lookups, blended by randomly generated mixing bijections. Therefore, the size of the implementations are significantly reduced while keeping the same security efficiency. The security and efficiency of the proposed solutions are theoretically analyzed. Evaluation shows our solutions satisfy the requirement of sensor nodes in terms of limited memory size and low computational costs. PMID:26007737

  11. Houston biosecurity: building a national model.

    PubMed Central

    Casscells, Ward; Mirhaji, Parsa; Lillibridge, Scott; Madjid, Mohammad

    2004-01-01

    On September 11, 2001, Al Qaeda terrorists committed an atrocity when they used domestic jetliners to crash into buildings in New York City and Washington, DC, killing thousands of people. In October 2001, another act of savagery occurred, this time using anthrax, not airplanes, to take innocent lives. Each incident demonstrates the vulnerability of an open society, and Americans are left to wonder how such acts can be prevented. Two years later, Al Qaeda operatives are reportedly regrouping, recruiting, and changing their tactics to distribute money and messages to operatives around the world. Many experts believe that terrorist attacks are inevitable. Every city is vulnerable to an attack, and none are fully prepared to handle the residual impact of a biological or chemical attack. A survey conducted by the Cable News Network (CNN) in January 2002, studied 30 major US cities, ranking them based on 6 statistical indices of vulnerability. Thirteen cities were deemed better prepared than Houston, 10 were in a similar state of preparedness, and only 6 were less prepared than Houston. We will discuss the protective measures that have been put in place in Houston, and future steps to take. Other cities can model Houston's experience to develop similar plans nation-wide. PMID:17060983

  12. The Approach to Suicide Bombing Attacks: Changing Concepts.

    PubMed

    Almgody, Gidon; Bala, Miklosh; Rivkind, Avraham I

    2007-12-01

    Suicide bombing attacks have emerged as a lethal weapon in the hands of terrorist groups. Our aim was to review the medical experience acquired in Israel, Spain, the United Kingdom and the United States in managing terrorist attacks, and prepare medical systems for the difficult task of managing these events. EMS protocols are amended to deal with a large number of victims in an urban setting who must be rapidly evacuated to a medical center where resuscitative as well as definitive care is delivered. A combination of extensive soft tissue damage caused by penetrating injuries, blast injury to the lungs and tympanic membranes, and burns are common among survivors. Preparation must include establishment of a clear chain-of-command lead by a general surgeon who manages the event and is responsible for decisions regarding OR preferences and ICU admissions. The emergency department is re-organized to handle the influx of numerous severely injured casualties. Professional personnel and resources are recruited and re-directed away from routine tasks towards treating the victims. This is achieved by deferring non-urgent operations, procedures and imaging studies. Victims are frequently re-assessed and re-evaluated to control chaos, minimize missed injuries and ensure delivery of an adequate level of care.

  13. The Approach to Suicide Bombing Attacks: Changing Concepts.

    PubMed

    Almgody, Gidon; Bala, Miklosh; Rivkind, Avraham I

    2008-06-01

    Suicide bombing attacks have emerged as a lethal weapon in the hands of terrorist groups. Our aim was to review the medical experience acquired in Israel, Spain, the United Kingdom and the United States in managing terrorist attacks, and prepare medical systems for the difficult task of managing these events. EMS protocols are amended to deal with a large number of victims in an urban setting who must be rapidly evacuated to a medical center where resuscitative as well as definitive care is delivered. A combination of extensive soft tissue damage caused by penetrating injuries, blast injury to the lungs and tympanic membranes, and burns are common among survivors. Preparation must include establishment of a clear chain-of-command lead by a general surgeon who manages the event and is responsible for decisions regarding OR preferences and ICU admissions. The emergency department is re-organized to handle the influx of numerous severely injured casualties. Professional personnel and resources are recruited and re-directed away from routine tasks towards treating the victims. This is achieved by deferring non-urgent operations, procedures and imaging studies. Victims are frequently re-assessed and re-evaluated to control chaos, minimize missed injuries and ensure delivery of an adequate level of care.

  14. Houston biosecurity: building a national model.

    PubMed

    Casscells, Ward; Mirhaji, Parsa; Lillibridge, Scott; Madjid, Mohammad

    2004-01-01

    On September 11, 2001, Al Qaeda terrorists committed an atrocity when they used domestic jetliners to crash into buildings in New York City and Washington, DC, killing thousands of people. In October 2001, another act of savagery occurred, this time using anthrax, not airplanes, to take innocent lives. Each incident demonstrates the vulnerability of an open society, and Americans are left to wonder how such acts can be prevented. Two years later, Al Qaeda operatives are reportedly regrouping, recruiting, and changing their tactics to distribute money and messages to operatives around the world. Many experts believe that terrorist attacks are inevitable. Every city is vulnerable to an attack, and none are fully prepared to handle the residual impact of a biological or chemical attack. A survey conducted by the Cable News Network (CNN) in January 2002, studied 30 major US cities, ranking them based on 6 statistical indices of vulnerability. Thirteen cities were deemed better prepared than Houston, 10 were in a similar state of preparedness, and only 6 were less prepared than Houston. We will discuss the protective measures that have been put in place in Houston, and future steps to take. Other cities can model Houston's experience to develop similar plans nation-wide.

  15. A cellular backline: specialization of host membranes for defence.

    PubMed

    Faulkner, Christine

    2015-03-01

    In plant-pathogen interactions, the host plasma membrane serves as a defence front for pathogens that invade from the extracellular environment. As such, the lipid bilayer acts as a scaffold that targets and delivers defence responses to the site of attack. During pathogen infection, numerous changes in plasma membrane composition, organization, and structure occur. There is increasing evidence that this facilitates the execution of a variety of responses, highlighting the regulatory role membranes play in cellular responses. Membrane microdomains such as lipid rafts are hypothesized to create signalling platforms for receptor signalling in response to pathogen perception and for callose synthesis. Further, the genesis of pathogen-associated structures such as papillae and the extra-haustorial membrane necessitates polarization of membranes and membrane trafficking pathways. Unlocking the mechanisms by which this occurs will enable greater understanding of how targeted defences, some of which result in resistance, are executed. This review will survey some of the changes that occur in host membranes during pathogen attack and how these are associated with the generation of defence responses. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  16. Development of the Cellular Immune System of Drosophila Requires the Membrane Attack Complex/Perforin-Like Protein Torso-Like.

    PubMed

    Forbes-Beadle, Lauren; Crossman, Tova; Johnson, Travis K; Burke, Richard; Warr, Coral G; Whisstock, James C

    2016-10-01

    Pore-forming members of the membrane attack complex/perforin-like (MACPF) protein superfamily perform well-characterized roles as mammalian immune effectors. For example, complement component 9 and perforin function to directly form pores in the membrane of Gram-negative pathogens or virally infected/transformed cells, respectively. In contrast, the only known MACPF protein in Drosophila melanogaster, Torso-like, plays crucial roles during development in embryo patterning and larval growth. Here, we report that in addition to these functions, Torso-like plays an important role in Drosophila immunity. However, in contrast to a hypothesized effector function in, for example, elimination of Gram-negative pathogens, we find that torso-like null mutants instead show increased susceptibility to certain Gram-positive pathogens such as Staphylococcus aureus and Enterococcus faecalis We further show that this deficit is due to a severely reduced number of circulating immune cells and, as a consequence, an impaired ability to phagocytose bacterial particles. Together these data suggest that Torso-like plays an important role in controlling the development of the Drosophila cellular immune system. Copyright © 2016 by the Genetics Society of America.

  17. Multi-application controls: Robust nonlinear multivariable aerospace controls applications

    NASA Technical Reports Server (NTRS)

    Enns, Dale F.; Bugajski, Daniel J.; Carter, John; Antoniewicz, Bob

    1994-01-01

    This viewgraph presentation describes the general methodology used to apply Honywell's Multi-Application Control (MACH) and the specific application to the F-18 High Angle-of-Attack Research Vehicle (HARV) including piloted simulation handling qualities evaluation. The general steps include insertion of modeling data for geometry and mass properties, aerodynamics, propulsion data and assumptions, requirements and specifications, e.g. definition of control variables, handling qualities, stability margins and statements for bandwidth, control power, priorities, position and rate limits. The specific steps include choice of independent variables for least squares fits to aerodynamic and propulsion data, modifications to the management of the controls with regard to integrator windup and actuation limiting and priorities, e.g. pitch priority over roll, and command limiting to prevent departures and/or undesirable inertial coupling or inability to recover to a stable trim condition. The HARV control problem is characterized by significant nonlinearities and multivariable interactions in the low speed, high angle-of-attack, high angular rate flight regime. Systematic approaches to the control of vehicle motions modeled with coupled nonlinear equations of motion have been developed. This paper will discuss the dynamic inversion approach which explicity accounts for nonlinearities in the control design. Multiple control effectors (including aerodynamic control surfaces and thrust vectoring control) and sensors are used to control the motions of the vehicles in several degrees-of-freedom. Several maneuvers will be used to illustrate performance of MACH in the high angle-of-attack flight regime. Analytical methods for assessing the robust performance of the multivariable control system in the presence of math modeling uncertainty, disturbances, and commands have reached a high level of maturity. The structured singular value (mu) frequency response methodology is presented as a method for analyzing robust performance and the mu-synthesis method will be presented as a method for synthesizing a robust control system. The paper concludes with the author's expectations regarding future applications of robust nonlinear multivariable controls.

  18. Stress Response Mechanisms: From Single Cells to Multinational Organizations

    PubMed Central

    Pech, Richard J.

    2006-01-01

    Can a literal comparison be made between biological phenomena in organisms and phenomena in human organizations? The evidence provided by simplified but useful examples appears to suggest that a phenomenon simulating hormesis can and does occur in organizational contexts. Similarities between stress response behaviors of organisms and stress response behaviors in organizations are discussed. Cellular stress response mechanisms stimulate and repair, as well as defend the organism against further attacks. Organizational hormesis describes actions that stimulate the organization by increasing its focus and protecting it against future attacks. The common aim for the organism as well as the organization is to increase the probability of survival. The following describes examples of organizational survival that demonstrate a number of hormetic parallels between organisms and organisations. PMID:18648597

  19. Early environments, glucocorticoid receptors, and behavioral epigenetics.

    PubMed

    Champagne, Frances A

    2013-10-01

    In 1985, a brief report published in Behavioral Neuroscience established the link between neonatal handling and concentrations of hippocampal glucocorticoid receptors (GR) in the adult rat, suggesting a neurobiological basis for the attenuated stress reactivity observed in handled versus nonhandled offspring. To celebrate the 30th anniversary of Behavioral Neuroscience, this article explores the research that preceded and followed from this brief but significant publication. Changes in hippocampal GR induced by handling were determined to be the outcome of a cascade of cellular and molecular events involving thyroid hormones, serotonin turnover, and transcription factor binding to the Nr3c1 gene, leading to increased GR mRNA and protein. Though many hypotheses were proposed for the "handling effect," the role of handling-induced changes in maternal care, particularly pup licking/grooming (LG), generated a productive scientific framework for understanding the handling phenomenon. Indeed, LG has since been demonstrated to alter GR levels through the signaling pathways described for handling. Moreover, epigenetic mechanisms have been discovered to play a critical role in the effects of early life experience and particularly in the regulation of Nr3c1. Overall, the research avenues that have evolved from the initial finding of handling-induced changes in GR have broad applications to our understanding of plasticity, resilience, and the transmission of traits across generations. 2013 APA, all rights reserved

  20. DOE's Computer Incident Advisory Capability (CIAC)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schultz, E.

    1990-09-01

    Computer security is essential in maintaining quality in the computing environment. Computer security incidents, however, are becoming more sophisticated. The DOE Computer Incident Advisory Capability (CIAC) team was formed primarily to assist DOE sites in responding to computer security incidents. Among CIAC's other responsibilities are gathering and distributing information to DOE sites, providing training workshops, coordinating with other agencies, response teams, and vendors, creating guidelines for incident handling, and developing software tools. CIAC has already provided considerable assistance to DOE sites faced with virus infections and worm and hacker attacks, has issued over 40 information bulletins, and has developed andmore » presented a workshop on incident handling. CIAC's experience in helping sites has produced several lessons learned, including the need to follow effective procedures to avoid virus infections in small systems and the need for sound password management and system administration in networked systems. CIAC's activity and scope will expand in the future. 4 refs.« less

  1. Application of frequency domain handling qualities criteria to the longitudinal landing task

    NASA Technical Reports Server (NTRS)

    Sarrafian, S. K.; Powers, B. G.

    1985-01-01

    Under NASA sponsorship, an in-flight simulation of the longitudinal handling qualities of several configurations for the approach and landing tasks was performed on the USAF/AFWAL Total In-Flight Simulator by the Calspan Corporation. The basic configuration was a generic transport airplane with static instability. The control laws included proportional plus integral gain loops to produce pitch-rate and angle-of-attack feedback loops. The evaluation task was a conventional visual approach to a flared touchdown at a designated spot on the runway with a lateral offset. The general conclusions were that the existing criteria are based on pitch-attitude response and that these characteristics do not adequately discriminate between the good and bad configurations of this study. This paper describes the work that has been done to further develop frequency-based criteria in an effort to provide better correlation with the observed data.

  2. Turning tumor-promoting copper into an anti-cancer weapon via high-throughput chemistry.

    PubMed

    Wang, F; Jiao, P; Qi, M; Frezza, M; Dou, Q P; Yan, B

    2010-01-01

    Copper is an essential element for multiple biological processes. Its concentration is elevated to a very high level in cancer tissues for promoting cancer development through processes such as angiogenesis. Organic chelators of copper can passively reduce cellular copper and serve the role as inhibitors of angiogenesis. However, they can also actively attack cellular targets such as proteasome, which plays a critical role in cancer development and survival. The discovery of such molecules initially relied on a step by step synthesis followed by biological assays. Today high-throughput chemistry and high-throughput screening have significantly expedited the copper-binding molecules discovery to turn "cancer-promoting" copper into anti-cancer agents.

  3. A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata

    NASA Astrophysics Data System (ADS)

    Enayatifar, Rasul; Sadaei, Hossein Javedani; Abdullah, Abdul Hanan; Lee, Malrey; Isnin, Ismail Fauzi

    2015-08-01

    Currently, there are many studies have conducted on developing security of the digital image in order to protect such data while they are sending on the internet. This work aims to propose a new approach based on a hybrid model of the Tinkerbell chaotic map, deoxyribonucleic acid (DNA) and cellular automata (CA). DNA rules, DNA sequence XOR operator and CA rules are used simultaneously to encrypt the plain-image pixels. To determine rule number in DNA sequence and also CA, a 2-dimension Tinkerbell chaotic map is employed. Experimental results and computer simulations, both confirm that the proposed scheme not only demonstrates outstanding encryption, but also resists various typical attacks.

  4. Dietary unsaturated fatty acids differently affect catecholamine handling by adrenal chromaffin cells.

    PubMed

    Gomes, Andreia; Correia, Gustavo; Coelho, Marisa; Araújo, João Ricardo; Pinho, Maria João; Teixeira, Ana Luisa; Medeiros, Rui; Ribeiro, Laura

    2015-05-01

    Catecholamines (CA) play an important role in cardiovascular (CDV) disease risk. Namely, noradrenaline (NA) levels positively correlate whereas adrenaline (AD) levels negatively correlate with obesity and/or CDV disease. Western diets, which are tipically rich in Ω-6 fatty acids (FAs) and deficient in Ω-3 FAs, may contribute to the development of obesity, type 2 diabetes and/or coronary artery disease. Taking this into consideration and the fact that our group has already described that saturated FAs affect catecholamine handling by adrenal chromaffin cells, this work aimed to investigate the effect of unsaturated FAs upon catecholamine handling in the same model. Our results showed that chronic exposure to unsaturated FAs differently modulated CA cellular content and release, regardless of both FA series and number of carbon atoms. Namely, the Ω-6 arachidonic and linoleic acids, based on their effect on CA release and cellular content, seemed to impair NA and AD vesicular transport, whereas γ-linolenic acid selectively impaired AD synthesis and release. Within the Ω-9 FAs, oleic acid was devoid of effect, and elaidic acid behaved similarly to γ-linolenic acid. Eicosapentaenoic and docosahexaenoic acids (Ω-3 series) impaired the synthesis and release of both NA and AD. These results deserve attention and future development, namely, in what concerns the mechanisms involved and correlative effects in vivo. Copyright © 2015 Elsevier Inc. All rights reserved.

  5. High-throughput microscopy must re-invent the microscope rather than speed up its functions

    PubMed Central

    Oheim, M

    2007-01-01

    Knowledge gained from the revolutions in genomics and proteomics has helped to identify many of the key molecules involved in cellular signalling. Researchers, both in academia and in the pharmaceutical industry, now screen, at a sub-cellular level, where and when these proteins interact. Fluorescence imaging and molecular labelling combine to provide a powerful tool for real-time functional biochemistry with molecular resolution. However, they traditionally have been work-intensive, required trained personnel, and suffered from low through-put due to sample preparation, loading and handling. The need for speeding up microscopy is apparent from the tremendous complexity of cellular signalling pathways, the inherent biological variability, as well as the possibility that the same molecule plays different roles in different sub-cellular compartments. Research institutes and companies have teamed up to develop imaging cytometers of ever-increasing complexity. However, to truly go high-speed, sub-cellular imaging must free itself from the rigid framework of current microscopes. PMID:17603553

  6. Discrimination of Self and Non-Self Ribonucleic Acids

    PubMed Central

    Gebhardt, Anna; Laudenbach, Beatrice T.

    2017-01-01

    Most virus infections are controlled through the innate and adaptive immune system. A surprisingly limited number of so-called pattern recognition receptors (PRRs) have the ability to sense a large variety of virus infections. The reason for the broad activity of PRRs lies in the ability to recognize viral nucleic acids. These nucleic acids lack signatures that are present in cytoplasmic cellular nucleic acids and thereby marking them as pathogen-derived. Accumulating evidence suggests that these signatures, which are predominantly sensed by a class of PRRs called retinoic acid-inducible gene I (RIG-I)-like receptors and other proteins, are not unique to viruses but rather resemble immature forms of cellular ribonucleic acids generated by cellular polymerases. RIG-I-like receptors, and other cellular antiviral proteins, may therefore have mainly evolved to sense nonprocessed nucleic acids typically generated by primitive organisms and pathogens. This capability has not only implications on induction of antiviral immunity but also on the function of cellular proteins to handle self-derived RNA with stimulatory potential. PMID:28475460

  7. Study of Threat Scenario Reconstruction based on Multiple Correlation

    NASA Astrophysics Data System (ADS)

    Yuan, Xuejun; Du, Jing; Qin, Futong; Zhou, Yunyan

    2017-10-01

    The emergence of intrusion detection technology has solved many network attack problems, ensuring the safety of computer systems. However, because of the isolated output alarm information, large amount of data, and mixed events, it is difficult for the managers to understand the deep logic relationship between the alarm information, thus they cannot deduce the attacker’s true intentions. This paper presents a method of online threat scene reconstruction to handle the alarm information, which reconstructs of the threat scene. For testing, the standard data set is used.

  8. Entry flight control system downmoding evaluation

    NASA Technical Reports Server (NTRS)

    Barnes, H. A.

    1978-01-01

    A method to desensitize the entry flight control system to structural vibration feedback which might induce an oscillatory instability is described. Trends in vehicle response and handling characteristics as a function of gain combinations in the FCS forward and rate feedback loops were described as observed in a man-in-the-loop simulation. Among the flight conditions considered are the effects of downmoding with APU failures, off-nominal trajectory conditions, sensed angle of attack errors, the impact on RCS fuel consumption, performance in the presence of aero variations, recovery from large FCS upsets, and default gains.

  9. Best Practices for Management of Biocontaminated Waste ...

    EPA Pesticide Factsheets

    Report The purpose of these best practices is to provide federal, state, territorial, and local waste management entities information on techniques and methodologies that have the potential to improve the handling and management of biocontaminated waste streams after a biological agent incident. These best practices are intended to be general in nature serving as a resource to a variety of biological agents in a variety of situations; however, these best practices also present a specific homeland security scenario – a biological attack with Bacillus anthracis (B. anthracis) – to help illustrate specific waste management considerations.

  10. Effects of reactive oxygen species on cellular wall disassembly of banana fruit during ripening.

    PubMed

    Cheng, Guiping; Duan, Xuewu; Shi, John; Lu, Wangjin; Luo, Yunbo; Jiang, Weibo; Jiang, Yueming

    2008-07-15

    Fruit softening is generally attributed to cell wall disassembly. Experiments were conducted to investigate effects of various reactive oxygen species (ROS) on in vitro cellular wall disassembly of harvested banana fruit. The alcohol-extracted insoluble residue (AEIR) was obtained from the pulp tissues of banana fruit at various ripening stages and then used to examine the disassembly of cellular wall polysaccharides in the presence of superoxide anion (O2(-)), hydrogen peroxide (H2O2) or hydroxyl radical (OH) and their scavengers. The presence of OH accelerated significantly disassembly of cellular wall polysaccharides in terms of the increase in contents of total sugars released and uronic acid, and the decrease in molecular mass of soluble polysaccharides, using gel permeation chromatography. However, the treatment with H2O2 or O2(-) showed no significant effect on the disassembly of cellular wall polysaccharides. Furthermore, the degradation of the de-esterified AEIR was more susceptible to OH attack than the esterified AEIR. In addition, the effect of OH could be inhibited in the presence of OH scavenger. This study suggests that disassembly of cellular wall polysaccharides could be initiated by OH as the solublisation of the polysaccharides increased, which, in turn, accelerated fruit softening. Copyright © 2008 Elsevier Ltd. All rights reserved.

  11. Reynolds Number Effects at High Angles of Attack

    NASA Technical Reports Server (NTRS)

    Fisher, David F.; Cobleigh, Brent R.; Banks, Daniel W.; Hall, Robert M.; Wahls, Richard A.

    1998-01-01

    Lessons learned from comparisons between ground-based tests and flight measurements for the high-angle-of-attack programs on the F-18 High Alpha Research Vehicle (HARV), the X-29 forward-swept wing aircraft, and the X-31 enhanced fighter maneuverability aircraft are presented. On all three vehicles, Reynolds number effects were evident on the forebodies at high angles of attack. The correlation between flight and wind tunnel forebody pressure distributions for the F-18 HARV were improved by using twin longitudinal grit strips on the forebody of the wind-tunnel model. Pressure distributions obtained on the X-29 wind-tunnel model at flight Reynolds numbers showed excellent correlation with the flight data up to alpha = 50 deg. Above (alpha = 50 deg. the pressure distributions for both flight and wind tunnel became asymmetric and showed poorer agreement, possibly because of the different surface finish of the model and aircraft. The detrimental effect of a very sharp nose apex was demonstrated on the X-31 aircraft. Grit strips on the forebody of the X-31 reduced the randomness but increased the magnitude of the asymmetry. Nose strakes were required to reduce the forebody yawing moment asymmetries and the grit strips on the flight test noseboom improved the aircraft handling qualities.

  12. Linearized Poststall Aerodynamic and Control Law Models of the X-31A Aircraft and Comparison with Flight Data

    NASA Technical Reports Server (NTRS)

    Stoliker, Patrick C.; Bosworth, John T.; Georgie, Jennifer

    1997-01-01

    The X-31A aircraft has a unique configuration that uses thrust-vector vanes and aerodynamic control effectors to provide an operating envelope to a maximum 70 deg angle of attack, an inherently nonlinear portion of the flight envelope. This report presents linearized versions of the X-31A longitudinal and lateral-directional control systems, with aerodynamic models sufficient to evaluate characteristics in the poststall envelope at 30 deg, 45 deg, and 60 deg angle of attack. The models are presented with detail sufficient to allow the reader to reproduce the linear results or perform independent control studies. Comparisons between the responses of the linear models and flight data are presented in the time and frequency domains to demonstrate the strengths and weaknesses of the ability to predict high-angle-of-attack flight dynamics using linear models. The X-31A six-degree-of-freedom simulation contains a program that calculates linear perturbation models throughout the X-31A flight envelope. The models include aerodynamics and flight control system dynamics that are used for stability, controllability, and handling qualities analysis. The models presented in this report demonstrate the ability to provide reasonable linear representations in the poststall flight regime.

  13. Preparing Houston: lessons learned, future directions

    NASA Astrophysics Data System (ADS)

    Madjid, Mohammad; Mirhaji, Parsa; Lillibridge, Scott R.; Casscells, S. W.

    2003-09-01

    On September 11, 2001, Al Qaeda terrorists committed a savage act against humanity when they used domestic jetliners to crash into buildings in New York City and Washington, DC, killing thousands of people. In October 2001, coming on the heels of this savagery was another act of barbarity, this time using anthrax, not jetliners, to take innocent lives. Each incident demonstrates the vulnerability of an open society, and Americans are left to wonder how such acts can be prevented. Now, Al Qaeda operatives are reportedly regrouping, recruiting, and changing their tactics to distribute money and messages to operatives around the world. Many experts believe that terrorist attacks are inevitable. No city is immune from attack, and no city is fully prepared to handle the residual impact of a potentially ravaging biological or chemical attack. A survey conducted by the Cable News Network (CNN) in January 2002, studied 30 major US cities, ranking them based on 6 statistical indices of vulnerability. Thirteen cities were deemed better prepared than Houston, 10 were in a similar state of preparedness, and only 6 were less prepared than Houston. Here, we discuss the measures which have taken place in Houston to make it a safer place and which plans are needed for future. Houston experience can be used as a model to develop similar plans for other cities nation-wide.

  14. Transient inter-cellular polymeric linker.

    PubMed

    Ong, Siew-Min; He, Lijuan; Thuy Linh, Nguyen Thi; Tee, Yee-Han; Arooz, Talha; Tang, Guping; Tan, Choon-Hong; Yu, Hanry

    2007-09-01

    Three-dimensional (3D) tissue-engineered constructs with bio-mimicry cell-cell and cell-matrix interactions are useful in regenerative medicine. In cell-dense and matrix-poor tissues of the internal organs, cells support one another via cell-cell interactions, supplemented by small amount of the extra-cellular matrices (ECM) secreted by the cells. Here we connect HepG2 cells directly but transiently with inter-cellular polymeric linker to facilitate cell-cell interaction and aggregation. The linker consists of a non-toxic low molecular-weight polyethyleneimine (PEI) backbone conjugated with multiple hydrazide groups that can aggregate cells within 30 min by reacting with the aldehyde handles on the chemically modified cell-surface glycoproteins. The cells in the cellular aggregates proliferated; and maintained the cortical actin distribution of the 3D cell morphology while non-aggregated cells died over 7 days of suspension culture. The aggregates lost distinguishable cell-cell boundaries within 3 days; and the ECM fibers became visible around cells from day 3 onwards while the inter-cellular polymeric linker disappeared from the cell surfaces over time. The transient inter-cellular polymeric linker can be useful for forming 3D cellular and tissue constructs without bulk biomaterials or extensive network of engineered ECM for various applications.

  15. CCR scientists gain new understanding of cellular mechanisms during infection | Center for Cancer Research

    Cancer.gov

    A new study published August 10, 2017, in Molecular Cell reveals how changes in the architecture of the nucleus can enable B lymphocytes to spring to action during an immune system attack and help fight infection. The discovery could lead scientists to a better understanding of how some tumor cells, especially blood cancer cells, make similar transitions from a dormant to an

  16. Origin of life: LUCA and extracellular membrane vesicles (EMVs)

    NASA Astrophysics Data System (ADS)

    Gill, S.; Forterre, P.

    2016-01-01

    Cells from the three domains of life produce extracellular membrane vesicles (EMVs), suggesting that EMV production is an important aspect of cellular physiology. EMVs have been implicated in many aspects of cellular life in all domains, including stress response, toxicity against competing strains, pathogenicity, detoxification and resistance against viral attack. These EMVs represent an important mode of inter-cellular communication by serving as vehicles for transfer of DNA, RNA, proteins and lipids between cells. Here, we review recent progress in the understanding of EMV biology and their various roles. We focus on the role of membrane vesicles in early cellular evolution and how they would have helped shape the nature of the last universal common ancestor. A membrane-protected micro-environment would have been a key to the survival of spontaneous molecular systems and efficient metabolic reactions. Interestingly, the morphology of EMVs is strongly reminiscent of the morphology of some virions. It is thus tempting to make a link between the origin of the first protocell via the formation of vesicles and the origin of viruses.

  17. HLH-30/TFEB-mediated autophagy functions in a cell-autonomous manner for epithelium intrinsic cellular defense against bacterial pore-forming toxin in C. elegans.

    PubMed

    Chen, Huan-Da; Kao, Cheng-Yuan; Liu, Bang-Yu; Huang, Shin-Whei; Kuo, Cheng-Ju; Ruan, Jhen-Wei; Lin, Yen-Hung; Huang, Cheng-Rung; Chen, Yu-Hung; Wang, Horng-Dar; Aroian, Raffi V; Chen, Chang-Shi

    2017-02-01

    Autophagy is an evolutionarily conserved intracellular system that maintains cellular homeostasis by degrading and recycling damaged cellular components. The transcription factor HLH-30/TFEB-mediated autophagy has been reported to regulate tolerance to bacterial infection, but less is known about the bona fide bacterial effector that activates HLH-30 and autophagy. Here, we reveal that bacterial membrane pore-forming toxin (PFT) induces autophagy in an HLH-30-dependent manner in Caenorhabditis elegans. Moreover, autophagy controls the susceptibility of animals to PFT toxicity through xenophagic degradation of PFT and repair of membrane-pore cell-autonomously in the PFT-targeted intestinal cells in C. elegans. These results demonstrate that autophagic pathways and autophagy are induced partly at the transcriptional level through HLH-30 activation and are required to protect metazoan upon PFT intoxication. Together, our data show a new and powerful connection between HLH-30-mediated autophagy and epithelium intrinsic cellular defense against the single most common mode of bacterial attack in vivo.

  18. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

    PubMed

    Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.

  19. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    PubMed Central

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  20. 47 CFR 22.921 - 911 call processing procedures; 911-only calling mode.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... programming in the mobile unit that determines the handling of a non-911 call and permit the call to be... CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.921 911 call processing procedures; 911-only calling mode. Mobile telephones manufactured after February 13, 2000 that are capable of...

  1. Innate immune responses of temperamental and calm cattle after transportation

    USDA-ARS?s Scientific Manuscript database

    The objective was to investigate measures of cellular innate immune responses among calm and temperamental Brahman bulls in response to handling and transportation. Sixteen Brahman bulls (344 ± 37 days of age; 271.6 ± 45.5 kg BW) classified as either calm (n = 8) or temperamental (n = 8) were loaded...

  2. Controlling nuclear RNA levels.

    PubMed

    Schmid, Manfred; Jensen, Torben Heick

    2018-05-10

    RNA turnover is an integral part of cellular RNA homeostasis and gene expression regulation. Whereas the cytoplasmic control of protein-coding mRNA is often the focus of study, we discuss here the less appreciated role of nuclear RNA decay systems in controlling RNA polymerase II (RNAPII)-derived transcripts. Historically, nuclear RNA degradation was found to be essential for the functionalization of transcripts through their proper maturation. Later, it was discovered to also be an important caretaker of nuclear hygiene by removing aberrant and unwanted transcripts. Recent years have now seen a set of new protein complexes handling a variety of new substrates, revealing functions beyond RNA processing and the decay of non-functional transcripts. This includes an active contribution of nuclear RNA metabolism to the overall cellular control of RNA levels, with mechanistic implications during cellular transitions.

  3. Protective responses to sublytic complement in the retinal pigment epithelium

    PubMed Central

    Tan, Li Xuan; Toops, Kimberly A.; Lakkaraju, Aparna

    2016-01-01

    The retinal pigment epithelium (RPE) is a key site of injury in inherited and age-related macular degenerations. Abnormal activation of the complement system is a feature of these blinding diseases, yet how the RPE combats complement attack is poorly understood. The complement cascade terminates in the cell-surface assembly of membrane attack complexes (MACs), which promote inflammation by causing aberrant signal transduction. Here, we investigated mechanisms crucial for limiting MAC assembly and preserving cellular integrity in the RPE and asked how these are compromised in models of macular degeneration. Using polarized primary RPE and the pigmented Abca4−/− Stargardt disease mouse model, we provide evidence for two protective responses occurring within minutes of complement attack, which are essential for maintaining mitochondrial health in the RPE. First, accelerated recycling of the membrane-bound complement regulator CD59 to the RPE cell surface inhibits MAC formation. Second, fusion of lysosomes with the RPE plasma membrane immediately after complement attack limits sustained elevations in intracellular calcium and prevents mitochondrial injury. Cholesterol accumulation in the RPE, induced by vitamin A dimers or oxidized LDL, inhibits these defense mechanisms by activating acid sphingomyelinase (ASMase), which increases tubulin acetylation and derails organelle traffic. Defective CD59 recycling and lysosome exocytosis after complement attack lead to mitochondrial fragmentation and oxidative stress in the RPE. Drugs that stimulate cholesterol efflux or inhibit ASMase restore both these critical safeguards in the RPE and avert complement-induced mitochondrial injury in vitro and in Abca4−/− mice, indicating that they could be effective therapeutic approaches for macular degenerations. PMID:27432952

  4. Individual variation in functional response parameters is explained by body size but not by behavioural types in a poeciliid fish.

    PubMed

    Schröder, Arne; Kalinkat, Gregor; Arlinghaus, Robert

    2016-12-01

    Functional responses are per-capita feeding rate models whose parameters often scale with individual body size but the parameters may also be further influenced by behavioural traits consistently differing among individuals, i.e. behavioural types or animal personalities. Behavioural types may intrinsically lead to lower feeding rates when consistently shy, inactive and easily stressed individuals cannot identify or respond to risk-free environments or need less food due to lower metabolic rates linked to behaviour. To test how much variation in functional response parameters is explained by body size and how much by behavioural types, we estimated attack rate and handling time individually for differently sized female least killifish (Heterandria formosa) and repeatedly measured behavioural traits for each individual. We found that individual fish varied substantially in their attack rate and in their handling time. Behavioural traits were stable over time and varied consistently among individuals along two distinct personality axes. The individual variation in functional responses was explained solely by body size, and contrary to our expectations, not additionally by the existing behavioural types in exploration activity and coping style. While behavioural trait-dependent functional responses may offer a route to the understanding of the food web level consequences of behavioural types, our study is so far only the second one on this topic. Importantly, our results indicate in contrast to that previous study that behavioural types do not per se affect individual functional responses assessed in the absence of external biotic stressors.

  5. Wall functions for the kappa-epsilon turbulence model in generalized nonorthogonal curvilinear coordinates

    NASA Technical Reports Server (NTRS)

    Sondak, D. L.; Pletcher, R. H.; Vandalsem, W. R.

    1992-01-01

    A k-epsilon turbulence model suitable for compressible flow, including the new wall function formulation, has been incorporated into an existing compressible Reynolds-averaged Navier-Stokes code, F3D. The low Reynolds number k-epsilon model of Chien (1982) was added for comparison with the present method. A number of features were added to the F3D code including improved far-field boundary conditions and viscous terms in the streamwise direction. A series of computations of increasing complexity was run to test the effectiveness of the new formulation. Flow over a flat plate was computed by using both orthogonal and nonorthogonal grids, and the friction coefficients and velocity profiles compared with a semi-empirical equation. Flow over a body of revolution at zero angle of attack was then computed to test the method's ability to handle flow over a curved surface. Friction coefficients and velocity profiles were compared to test data. All models gave good results on a relatively fine grid, but only the wall function formulation was effective with coarser grids. Finally, in order to demonstrate the method's ability to handle complex flow fields, separated flow over a prolate spheroid at angle of attack was computed, and results were compared to test data. The results were also compared to a k-epsilon model by Kim and Patel (1991), in which one equation model patched in at the wall was employed. Both models gave reasonable solutions, but improvement is required for accurate prediction of friction coefficients in the separated regions.

  6. Bartonella and Brucella—Weapons and Strategies for Stealth Attack

    PubMed Central

    Ben-Tekaya, Houchaima; Gorvel, Jean-Pierre; Dehio, Christoph

    2013-01-01

    Bartonella spp. and Brucella spp. are closely related α-proteobacterial pathogens that by distinct stealth-attack strategies cause chronic infections in mammals including humans. Human infections manifest by a broad spectrum of clinical symptoms, ranging from mild to fatal disease. Both pathogens establish intracellular replication niches and subvert diverse pathways of the host’s immune system. Several virulence factors allow them to adhere to, invade, proliferate, and persist within various host-cell types. In particular, type IV secretion systems (T4SS) represent essential virulence factors that transfer effector proteins tailored to recruit host components and modulate cellular processes to the benefit of the bacterial intruders. This article puts the remarkable features of these two pathogens into perspective, highlighting the mechanisms they use to hijack signaling and trafficking pathways of the host as the basis for their stealthy infection strategies. PMID:23906880

  7. Beneficial Properties of Phytochemicals on NLRP3 Inflammasome-Mediated Gout and Complication.

    PubMed

    Jhang, Jhih-Jia; Lin, Jia-Hong; Yen, Gow-Chin

    2018-01-31

    Gouty arthritis is characterized by the precipitation of monosodium urate (MSU) crystals in the joint. Pro-inflammatory cytokine IL-1β is a critical manifestation in response to MSU crystals attack. IL-1β secretion is dependent on the nucleotide-binding oligomerization domain-like receptor pyrin domain containing 3 (NLRP3) inflammasome. Abnormal activation of the NLRP inflammasome is related to cellular oxidative stress. However, recent studies have illustrated that phytochemicals with potent antioxidant activity exert inhibitory effects on NLRP3 inflammasome-mediated diseases. This review focuses on the current findings of studies on the NLRP3 inflammasome and the proposed mechanisms that MSU crystals trigger inflammation via activation of the NLRP3 inflammasome. We also summarized the potential use of phytochemicals on NLRP3 inflammasome-mediated diseases, suggesting that phytochemicals can further prevent acute gout attack.

  8. DNA Damage by Ionizing Radiation: Tandem Double Lesions by Charged Particles

    NASA Technical Reports Server (NTRS)

    Huo, Winifred M.; Chaban, Galina M.; Wang, Dunyou; Dateo, Christopher E.

    2005-01-01

    Oxidative damages by ionizing radiation are the source of radiation-induced carcinogenesis, damage to the central nervous system, lowering of the immune response, as well as other radiation-induced damages to human health. Monte Carlo track simulations and kinetic modeling of radiation damages to the DNA employ available molecular and cellular data to simulate the biological effect of high and low LET radiation io the DNA. While the simulations predict single and double strand breaks and base damages, so far all complex lesions are the result of stochastic coincidence from independent processes. Tandem double lesions have not yet been taken into account. Unlike the standard double lesions that are produced by two separate attacks by charged particles or radicals, tandem double lesions are produced by one single attack. The standard double lesions dominate at the high dosage regime. On the other hand, tandem double lesions do not depend on stochastic coincidences and become important at the low dosage regime of particular interest to NASA. Tandem double lesions by hydroxyl radical attack of guanine in isolated DNA have been reported at a dosage of radiation as low as 10 Gy. The formation of two tandem base lesions was found to be linear with the applied doses, a characteristic of tandem lesions. However, tandem double lesions from attack by a charged particle have not been reported.

  9. CCR scientists gain new understanding of cellular mechanisms during infection | Center for Cancer Research

    Cancer.gov

    A new study published August 10, 2017, in Molecular Cell reveals how changes in the architecture of the nucleus can enable B lymphocytes to spring to action during an immune system attack and help fight infection. The discovery could lead scientists to a better understanding of how some tumor cells, especially blood cancer cells, make similar transitions from a dormant to an active state. Read more. . .

  10. A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks.

    PubMed

    Zhang, Haitao; Wu, Chenxue; Chen, Zewei; Liu, Zhao; Zhu, Yunhong

    2017-01-01

    Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a destination location prediction attack model based on privacy-sensitive sequence rules mined from large scale anonymity datasets. Then we proposed a novel on-line spatial-temporal k-anonymity method that can resist such inference attacks. Our anti-attack technique generates new anonymity datasets with awareness of privacy-sensitive sequence rules. The new datasets extend the original sequence database of anonymity datasets to hide the privacy-sensitive rules progressively. The process includes two phases: off-line analysis and on-line application. In the off-line phase, sequence rules are mined from an original sequence database of anonymity datasets, and privacy-sensitive sequence rules are developed by correlating privacy-sensitive spatial regions with spatial grid cells among the sequence rules. In the on-line phase, new anonymity datasets are generated upon LBS requests by adopting specific generalization and avoidance principles to hide the privacy-sensitive sequence rules progressively from the extended sequence anonymity datasets database. We conducted extensive experiments to test the performance of the proposed method, and to explore the influence of the parameter K value. The results demonstrated that our proposed approach is faster and more effective for hiding privacy-sensitive sequence rules in terms of hiding sensitive rules ratios to eliminate inference attacks. Our method also had fewer side effects in terms of generating new sensitive rules ratios than the traditional spatial-temporal k-anonymity method, and had basically the same side effects in terms of non-sensitive rules variation ratios with the traditional spatial-temporal k-anonymity method. Furthermore, we also found the performance variation tendency from the parameter K value, which can help achieve the goal of hiding the maximum number of original sensitive rules while generating a minimum of new sensitive rules and affecting a minimum number of non-sensitive rules.

  11. A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks

    PubMed Central

    Wu, Chenxue; Liu, Zhao; Zhu, Yunhong

    2017-01-01

    Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a destination location prediction attack model based on privacy-sensitive sequence rules mined from large scale anonymity datasets. Then we proposed a novel on-line spatial-temporal k-anonymity method that can resist such inference attacks. Our anti-attack technique generates new anonymity datasets with awareness of privacy-sensitive sequence rules. The new datasets extend the original sequence database of anonymity datasets to hide the privacy-sensitive rules progressively. The process includes two phases: off-line analysis and on-line application. In the off-line phase, sequence rules are mined from an original sequence database of anonymity datasets, and privacy-sensitive sequence rules are developed by correlating privacy-sensitive spatial regions with spatial grid cells among the sequence rules. In the on-line phase, new anonymity datasets are generated upon LBS requests by adopting specific generalization and avoidance principles to hide the privacy-sensitive sequence rules progressively from the extended sequence anonymity datasets database. We conducted extensive experiments to test the performance of the proposed method, and to explore the influence of the parameter K value. The results demonstrated that our proposed approach is faster and more effective for hiding privacy-sensitive sequence rules in terms of hiding sensitive rules ratios to eliminate inference attacks. Our method also had fewer side effects in terms of generating new sensitive rules ratios than the traditional spatial-temporal k-anonymity method, and had basically the same side effects in terms of non-sensitive rules variation ratios with the traditional spatial-temporal k-anonymity method. Furthermore, we also found the performance variation tendency from the parameter K value, which can help achieve the goal of hiding the maximum number of original sensitive rules while generating a minimum of new sensitive rules and affecting a minimum number of non-sensitive rules. PMID:28767687

  12. The BioScope Initiative: Integrating Technology into the Biology Classroom.

    ERIC Educational Resources Information Center

    Ashburn, Sarah J.; Eichinger, David C.; Witham, Shelly A.; Cross, Vanessa D.; Krockover, Gerald H.; Pae, Tae-Il; Islam, Samantha; Robinson, J. Paul

    2002-01-01

    Reports on the quantitative and qualitative assessment of the CD-ROM "Cell Structure and Function" which includes five sections: (1) Basics; (2) Simple Cell; (3) Cell Viewer; (4) Cellular Changes; and (5) Handles. Evaluates the effectiveness of the CD-ROM with the participation of (n=65) students. Applies both qualitative and statistical methods.…

  13. Navigation with Limited Prior Information Using Time Difference of Arrival Measurements from Signals of Opportunity

    DTIC Science & Technology

    2010-12-01

    radiolocation in CDMA cellular systems”. IEEE Communications Magazine, 36(4):38–45, April 1998. 5. Code of Federal Regulations. “AM Broadcast Stations... DS /ENG/05-02. [Online]. Available at http://handle.dtic.mil/100.2/ADA442340. 11. Foy, Wade H. “Position-Location Solutions by Taylor-Series Estimation

  14. A large common-source outbreak of norovirus gastroenteritis in a hotel in Singapore, 2012.

    PubMed

    Raj, P; Tay, J; Ang, L W; Tien, W S; Thu, M; Lee, P; Pang, Q Y; Tang, Y L; Lee, K Y; Maurer-Stroh, S; Gunalan, V; Cutter, J; Goh, K T

    2017-02-01

    An outbreak of gastroenteritis affected 453 attendees (attack rate 28·5%) of six separate events held at a hotel in Singapore. Active case detection, case-control studies, hygiene inspections and microbial analysis of food, environmental and stool samples were conducted to determine the aetiology of the outbreak and the modes of transmission. The only commonality was the food, crockery and cutlery provided and/or handled by the hotel's Chinese banquet kitchen. Stool specimens from 34 cases and 15 food handlers were positive for norovirus genogroup II. The putative index case was one of eight norovirus-positive food handlers who had worked while they were symptomatic. Several food samples and remnants tested positive for Escherichia coli or high faecal coliforms, aerobic plate counts and/or total coliforms, indicating poor food hygiene. This large common-source outbreak of norovirus gastroenteritis was caused by the consumption of contaminated food and/or contact with contaminated crockery or cutlery provided or handled by the hotel's Chinese banquet kitchen.

  15. Generic Airplane Model Concept and Four Specific Models Developed for Use in Piloted Simulation Studies

    NASA Technical Reports Server (NTRS)

    Hoffler, Keith D.; Fears, Scott P.; Carzoo, Susan W.

    1997-01-01

    A generic airplane model concept was developed to allow configurations with various agility, performance, handling qualities, and pilot vehicle interface to be generated rapidly for piloted simulation studies. The simple concept allows stick shaping and various stick command types or modes to drive an airplane with both linear and nonlinear components. Output from the stick shaping goes to linear models or a series of linear models that can represent an entire flight envelope. The generic model also has provisions for control power limitations, a nonlinear feature. Therefore, departures from controlled flight are possible. Note that only loss of control is modeled, the generic airplane does not accurately model post departure phenomenon. The model concept is presented herein, along with four example airplanes. Agility was varied across the four example airplanes without altering specific excess energy or significantly altering handling qualities. A new feedback scheme to provide angle-of-attack cueing to the pilot, while using a pitch rate command system, was implemented and tested.

  16. Salmonella enteritidis outbreak in a restaurant chain: the continuing challenges of prevention.

    PubMed Central

    Vugia, D. J.; Mishu, B.; Smith, M.; Tavris, D. R.; Hickman-Brenner, F. W.; Tauxe, R. V.

    1993-01-01

    In 1990, a Salmonella enteritidis (SE) outbreak occurred in a restaurant chain in Pennsylvania. To determine its cause(s), we conducted a case-control study and a cohort study at one restaurant, and a survey of restaurants. Egg dishes were associated with illness (P = 0.03). Guests from one hotel eating at the restaurant had a diarrhoeal attack rate of 14%, 4.7-fold higher than among those not eating there (P = 0.04). There were no differences in egg handling between affected and unaffected restaurants. Eggs supplied to affected restaurants were medium grade AA eggs from a single farm, and were reportedly refrigerated during distribution. Human and hen SE isolates were phage type 8 and had similar plasmid profiles and antibiograms. We estimate the prevalence of infected eggs during the outbreak to be as high as 1 in 12. Typical restaurant egg-handling practices and refrigeration during distribution appear to be insufficient by themselves to prevent similar outbreaks. PMID:8432323

  17. Color image encryption based on hybrid hyper-chaotic system and cellular automata

    NASA Astrophysics Data System (ADS)

    Yaghouti Niyat, Abolfazl; Moattar, Mohammad Hossein; Niazi Torshiz, Masood

    2017-03-01

    This paper proposes an image encryption scheme based on Cellular Automata (CA). CA is a self-organizing structure with a set of cells in which each cell is updated by certain rules that are dependent on a limited number of neighboring cells. The major disadvantages of cellular automata in cryptography include limited number of reversal rules and inability to produce long sequences of states by these rules. In this paper, a non-uniform cellular automata framework is proposed to solve this problem. This proposed scheme consists of confusion and diffusion steps. In confusion step, the positions of the original image pixels are replaced by chaos mapping. Key image is created using non-uniform cellular automata and then the hyper-chaotic mapping is used to select random numbers from the image key for encryption. The main contribution of the paper is the application of hyper chaotic functions and non-uniform CA for robust key image generation. Security analysis and experimental results show that the proposed method has a very large key space and is resistive against noise and attacks. The correlation between adjacent pixels in the encrypted image is reduced and the amount of entropy is equal to 7.9991 which is very close to 8 which is ideal.

  18. MicroRNA regulated defense responses in Triticum aestivum L. during Puccinia graminis f.sp. tritici infection.

    PubMed

    Gupta, Om Prakash; Permar, Vipin; Koundal, Vikas; Singh, Uday Dhari; Praveen, Shelly

    2012-02-01

    Plants have evolved diverse mechanism to recognize pathogen attack and triggers defense responses. These defense responses alter host cellular function regulated by endogenous, small, non-coding miRNAs. To understand the mechanism of miRNAs regulated cellular functions during stem rust infection in wheat, we investigated eight different miRNAs viz. miR159, miR164, miR167, miR171, miR444, miR408, miR1129 and miR1138, involved in three different independent cellular defense response to infection. The investigation reveals that at the initiation of disease, accumulation of miRNAs might be playing a key role in hypersensitive response (HR) from host, which diminishes at the maturation stage. This suggests a possible host-fungal synergistic relation leading to susceptibility. Differential expression of these miRNAs in presence and absence of R gene provides a probable explanation of miRNA regulated R gene mediated independent pathways.

  19. ROS signaling and stomatal movement in plant responses to drought stress and pathogen attack.

    PubMed

    Qi, Junsheng; Song, Chun-Peng; Wang, Baoshan; Zhou, Jianmin; Kangasjärvi, Jaakko; Zhu, Jian-Kang; Gong, Zhizhong

    2018-04-16

    Stomata, the pores formed by a pair of guard cells, are the main gateways for water transpiration and photosynthetic CO 2 exchange, as well as pathogen invasion in land plants. Guard cell movement is regulated by a combination of environmental factors including water status, light, CO 2 levels and pathogen attack, as well as endogenous signals such as abscisic acid and apoplastic reactive oxygen species (ROS). Under abiotic and biotic stress conditions, extracellular ROS are mainly produced by plasma membrane-localized NADPH oxidases, whereas intracellular ROS are produced in multiple organelles. These ROS form a sophisticated cellular signaling network, with the accumulation of apoplastic ROS an early hallmark of stomatal movement. Here, we review recent progress in understanding the molecular mechanisms of the ROS signaling network, primarily during drought stress and pathogen attack. We summarize the roles of apoplastic ROS in regulating stomatal movement, ABA and CO 2 signaling, and immunity responses. Finally, we discuss ROS accumulation and communication between organelles and cells. This information provides a conceptual framework for understanding how ROS signaling is integrated with various signaling pathways during plant responses to abiotic and biotic stress stimuli. This article is protected by copyright. All rights reserved.

  20. Simulation of elastic wave propagation using cellular automata and peridynamics, and comparison with experiments

    DOE PAGES

    Nishawala, Vinesh V.; Ostoja-Starzewski, Martin; Leamy, Michael J.; ...

    2015-09-10

    Peridynamics is a non-local continuum mechanics formulation that can handle spatial discontinuities as the governing equations are integro-differential equations which do not involve gradients such as strains and deformation rates. This paper employs bond-based peridynamics. Cellular Automata is a local computational method which, in its rectangular variant on interior domains, is mathematically equivalent to the central difference finite difference method. However, cellular automata does not require the derivation of the governing partial differential equations and provides for common boundary conditions based on physical reasoning. Both methodologies are used to solve a half-space subjected to a normal load, known as Lamb’smore » Problem. The results are compared with theoretical solution from classical elasticity and experimental results. Furthermore, this paper is used to validate our implementation of these methods.« less

  1. Agent-Centric Approach for Cybersecurity Decision-Support with Partial Observability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tipireddy, Ramakrishna; Chatterjee, Samrat; Paulson, Patrick R.

    Generating automated cyber resilience policies for real-world settings is a challenging research problem that must account for uncertainties in system state over time and dynamics between attackers and defenders. In addition to understanding attacker and defender motives and tools, and identifying “relevant” system and attack data, it is also critical to develop rigorous mathematical formulations representing the defender’s decision-support problem under uncertainty. Game-theoretic approaches involving cyber resource allocation optimization with Markov decision processes (MDP) have been previously proposed in the literature. Moreover, advancements in reinforcement learning approaches have motivated the development of partially observable stochastic games (POSGs) in various multi-agentmore » problem domains with partial information. Recent advances in cyber-system state space modeling have also generated interest in potential applicability of POSGs for cybersecurity. However, as is the case in strategic card games such as poker, research challenges using game-theoretic approaches for practical cyber defense applications include: 1) solving for equilibrium and designing efficient algorithms for large-scale, general problems; 2) establishing mathematical guarantees that equilibrium exists; 3) handling possible existence of multiple equilibria; and 4) exploitation of opponent weaknesses. Inspired by advances in solving strategic card games while acknowledging practical challenges associated with the use of game-theoretic approaches in cyber settings, this paper proposes an agent-centric approach for cybersecurity decision-support with partial system state observability.« less

  2. Efficacy of postexposure therapy against glanders in mice.

    PubMed

    Waag, David M

    2015-04-01

    Burkholderia mallei, the causative agent of glanders, is a CDC Tier 1 Select Agent for which there is no preventive vaccine and antibiotic therapy is difficult. In this study, we show that a combination of vaccination using killed cellular vaccine and therapy using moxifloxacin, azithromycin, or sulfamethoxazole-trimethoprim can protect BALB/c mice from lethal infection even when given 5 days after infectious challenge. Vaccination only, or antibiotic therapy only, was not efficacious. Although antibiotics evaluated experimentally can protect when given before or 1 day after challenge, this time course is not realistic in the cases of natural infection or biological attack, when the patient seeks treatment after symptoms develop or after a biological attack has been confirmed and the agent has been identified. Antibiotics can be efficacious after a prolonged interval between exposure and treatment, but only if the animals were previously vaccinated. Copyright © 2015, American Society for Microbiology. All Rights Reserved.

  3. Efficacy of Postexposure Therapy against Glanders in Mice

    PubMed Central

    2015-01-01

    Burkholderia mallei, the causative agent of glanders, is a CDC Tier 1 Select Agent for which there is no preventive vaccine and antibiotic therapy is difficult. In this study, we show that a combination of vaccination using killed cellular vaccine and therapy using moxifloxacin, azithromycin, or sulfamethoxazole-trimethoprim can protect BALB/c mice from lethal infection even when given 5 days after infectious challenge. Vaccination only, or antibiotic therapy only, was not efficacious. Although antibiotics evaluated experimentally can protect when given before or 1 day after challenge, this time course is not realistic in the cases of natural infection or biological attack, when the patient seeks treatment after symptoms develop or after a biological attack has been confirmed and the agent has been identified. Antibiotics can be efficacious after a prolonged interval between exposure and treatment, but only if the animals were previously vaccinated. PMID:25645854

  4. Preface: Chemical Forensics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fraga, Carlos G.

    This virtual special issue is devoted to chemical forensics, a developing scientific discipline that aims to provide information to support the attribution of a chemical (or mixture) of interest to its source. This process is carried out through the analysis of the chemical itself or associated material constituents to address investigative, legal or intelligence questions. “Source” refers to how, where and when a chemical was handled or produced. Source information is critical in investigations of incidents of chemicals used for illicit or nefarious purposes, especially when toxic chemicals are used as weapons. The Chemical Weapons Convention (CWC), an international disarmamentmore » treaty that entered into force in 1997, prohibits the use of chemicals as weapons. This treaty has 192 States Parties (the countries who have joined the treaty) encompassing more than 98% of the global population and landmass, yet chemical attacks have continued to increase since this treaty was opened for signature to the governments of the world in 1993. The first notorious use of a chemical weapon since 1993 was by the Aum Shinrikyo cult whose sarin attack on the Tokyo subway system in March 1995 killed 13 and drove another 6,000 to seek medical treatment. More recently, over 160 alleged chemical attacks have been reported in Syria and Iraq with both governments and terrorist groups being accused, and casualties numbering in the thousands. Additionally, recent high profile nerve agent poisoning of dissidents from North Korea and Russia illustrate a willingness to use chemical threat agents (CTAs) with impunity. Given the threat posed by those that choose to use CTAs as weapons, there is a dire need for advancements in chemical forensics that can be used in investigations and inquiries to help find and hold to account, the perpetrators of chemical attacks.« less

  5. Preface: Chemical Forensics

    DOE PAGES

    Fraga, Carlos G.

    2018-04-22

    This virtual special issue is devoted to chemical forensics, a developing scientific discipline that aims to provide information to support the attribution of a chemical (or mixture) of interest to its source. This process is carried out through the analysis of the chemical itself or associated material constituents to address investigative, legal or intelligence questions. “Source” refers to how, where and when a chemical was handled or produced. Source information is critical in investigations of incidents of chemicals used for illicit or nefarious purposes, especially when toxic chemicals are used as weapons. The Chemical Weapons Convention (CWC), an international disarmamentmore » treaty that entered into force in 1997, prohibits the use of chemicals as weapons. This treaty has 192 States Parties (the countries who have joined the treaty) encompassing more than 98% of the global population and landmass, yet chemical attacks have continued to increase since this treaty was opened for signature to the governments of the world in 1993. The first notorious use of a chemical weapon since 1993 was by the Aum Shinrikyo cult whose sarin attack on the Tokyo subway system in March 1995 killed 13 and drove another 6,000 to seek medical treatment. More recently, over 160 alleged chemical attacks have been reported in Syria and Iraq with both governments and terrorist groups being accused, and casualties numbering in the thousands. Additionally, recent high profile nerve agent poisoning of dissidents from North Korea and Russia illustrate a willingness to use chemical threat agents (CTAs) with impunity. Given the threat posed by those that choose to use CTAs as weapons, there is a dire need for advancements in chemical forensics that can be used in investigations and inquiries to help find and hold to account, the perpetrators of chemical attacks.« less

  6. Data fusion and classification using a hybrid intrinsic cellular inference network

    NASA Astrophysics Data System (ADS)

    Woodley, Robert; Walenz, Brett; Seiffertt, John; Robinette, Paul; Wunsch, Donald

    2010-04-01

    Hybrid Intrinsic Cellular Inference Network (HICIN) is designed for battlespace decision support applications. We developed an automatic method of generating hypotheses for an entity-attribute classifier. The capability and effectiveness of a domain specific ontology was used to generate automatic categories for data classification. Heterogeneous data is clustered using an Adaptive Resonance Theory (ART) inference engine on a sample (unclassified) data set. The data set is the Lahman baseball database. The actual data is immaterial to the architecture, however, parallels in the data can be easily drawn (i.e., "Team" maps to organization, "Runs scored/allowed" to Measure of organization performance (positive/negative), "Payroll" to organization resources, etc.). Results show that HICIN classifiers create known inferences from the heterogonous data. These inferences are not explicitly stated in the ontological description of the domain and are strictly data driven. HICIN uses data uncertainty handling to reduce errors in the classification. The uncertainty handling is based on subjective logic. The belief mass allows evidence from multiple sources to be mathematically combined to increase or discount an assertion. In military operations the ability to reduce uncertainty will be vital in the data fusion operation.

  7. An effective approach of lesion segmentation within the breast ultrasound image based on the cellular automata principle.

    PubMed

    Liu, Yan; Cheng, H D; Huang, Jianhua; Zhang, Yingtao; Tang, Xianglong

    2012-10-01

    In this paper, a novel lesion segmentation within breast ultrasound (BUS) image based on the cellular automata principle is proposed. Its energy transition function is formulated based on global image information difference and local image information difference using different energy transfer strategies. First, an energy decrease strategy is used for modeling the spatial relation information of pixels. For modeling global image information difference, a seed information comparison function is developed using an energy preserve strategy. Then, a texture information comparison function is proposed for considering local image difference in different regions, which is helpful for handling blurry boundaries. Moreover, two neighborhood systems (von Neumann and Moore neighborhood systems) are integrated as the evolution environment, and a similarity-based criterion is used for suppressing noise and reducing computation complexity. The proposed method was applied to 205 clinical BUS images for studying its characteristic and functionality, and several overlapping area error metrics and statistical evaluation methods are utilized for evaluating its performance. The experimental results demonstrate that the proposed method can handle BUS images with blurry boundaries and low contrast well and can segment breast lesions accurately and effectively.

  8. Protocols development for security and privacy of radio frequency identification systems

    NASA Astrophysics Data System (ADS)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  9. Obesity alters adipose tissue macrophage iron content and tissue iron distribution.

    PubMed

    Orr, Jeb S; Kennedy, Arion; Anderson-Baucum, Emily K; Webb, Corey D; Fordahl, Steve C; Erikson, Keith M; Zhang, Yaofang; Etzerodt, Anders; Moestrup, Søren K; Hasty, Alyssa H

    2014-02-01

    Adipose tissue (AT) expansion is accompanied by the infiltration and accumulation of AT macrophages (ATMs), as well as a shift in ATM polarization. Several studies have implicated recruited M1 ATMs in the metabolic consequences of obesity; however, little is known regarding the role of alternatively activated resident M2 ATMs in AT homeostasis or how their function is altered in obesity. Herein, we report the discovery of a population of alternatively activated ATMs with elevated cellular iron content and an iron-recycling gene expression profile. These iron-rich ATMs are referred to as MFe(hi), and the remaining ATMs are referred to as MFe(lo). In lean mice, ~25% of the ATMs are MFe(hi); this percentage decreases in obesity owing to the recruitment of MFe(lo) macrophages. Similar to MFe(lo) cells, MFe(hi) ATMs undergo an inflammatory shift in obesity. In vivo, obesity reduces the iron content of MFe(hi) ATMs and the gene expression of iron importers as well as the iron exporter, ferroportin, suggesting an impaired ability to handle iron. In vitro, exposure of primary peritoneal macrophages to saturated fatty acids also alters iron metabolism gene expression. Finally, the impaired MFe(hi) iron handling coincides with adipocyte iron overload in obese mice. In conclusion, in obesity, iron distribution is altered both at the cellular and tissue levels, with AT playing a predominant role in this change. An increased availability of fatty acids during obesity may contribute to the observed changes in MFe(hi) ATM phenotype and their reduced capacity to handle iron.

  10. AdaBoost-based algorithm for network intrusion detection.

    PubMed

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  11. Airline Passenger Profiling Based on Fuzzy Deep Machine Learning.

    PubMed

    Zheng, Yu-Jun; Sheng, Wei-Guo; Sun, Xing-Ming; Chen, Sheng-Yong

    2017-12-01

    Passenger profiling plays a vital part of commercial aviation security, but classical methods become very inefficient in handling the rapidly increasing amounts of electronic records. This paper proposes a deep learning approach to passenger profiling. The center of our approach is a Pythagorean fuzzy deep Boltzmann machine (PFDBM), whose parameters are expressed by Pythagorean fuzzy numbers such that each neuron can learn how a feature affects the production of the correct output from both the positive and negative sides. We propose a hybrid algorithm combining a gradient-based method and an evolutionary algorithm for training the PFDBM. Based on the novel learning model, we develop a deep neural network (DNN) for classifying normal passengers and potential attackers, and further develop an integrated DNN for identifying group attackers whose individual features are insufficient to reveal the abnormality. Experiments on data sets from Air China show that our approach provides much higher learning ability and classification accuracy than existing profilers. It is expected that the fuzzy deep learning approach can be adapted for a variety of complex pattern analysis tasks.

  12. A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks.

    PubMed

    Zhang, Laobing; Reniers, Genserik

    2016-12-01

    The New York City 9/11 terrorist attacks urged people from academia as well as from industry to pay more attention to operational security research. The required focus in this type of research is human intention. Unlike safety-related accidents, security-related accidents have a deliberate nature, and one has to face intelligent adversaries with characteristics that traditional probabilistic risk assessment techniques are not capable of dealing with. In recent years, the mathematical tool of game theory, being capable to handle intelligent players, has been used in a variety of ways in terrorism risk assessment. In this article, we analyze the general intrusion detection system in process plants, and propose a game-theoretical model for security management in such plants. Players in our model are assumed to be rational and they play the game with complete information. Both the pure strategy and the mixed strategy solutions are explored and explained. We illustrate our model by an illustrative case, and find that in our case, no pure strategy but, instead, a mixed strategy Nash equilibrium exists. © 2016 Society for Risk Analysis.

  13. Energy imbalance alters Ca2+ handling and excitability of POMC neurons

    PubMed Central

    Paeger, Lars; Pippow, Andreas; Hess, Simon; Paehler, Moritz; Klein, Andreas C; Husch, Andreas; Pouzat, Christophe; Brüning, Jens C; Kloppenburg, Peter

    2017-01-01

    Satiety-signaling, pro-opiomelanocortin (POMC)-expressing neurons in the arcuate nucleus of the hypothalamus play a pivotal role in the regulation of energy homeostasis. Recent studies reported altered mitochondrial dynamics and decreased mitochondria- endoplasmic reticulum contacts in POMC neurons during diet-induced obesity. Since mitochondria play a crucial role in Ca2+ signaling, we investigated whether obesity alters Ca2+ handling of these neurons in mice. In diet-induced obesity, cellular Ca2+ handling properties including mitochondrial Ca2+ uptake capacity are impaired, and an increased resting level of free intracellular Ca2+ is accompanied by a marked decrease in neuronal excitability. Experimentally increasing or decreasing intracellular Ca2+ concentrations reproduced electrophysiological properties observed in diet-induced obesity. Taken together, we provide the first direct evidence for a diet-dependent deterioration of Ca2+ homeostasis in POMC neurons during obesity development resulting in impaired function of these critical energy homeostasis-regulating neurons. DOI: http://dx.doi.org/10.7554/eLife.25641.001 PMID:28762947

  14. Computational modelling of cellular level metabolism

    NASA Astrophysics Data System (ADS)

    Calvetti, D.; Heino, J.; Somersalo, E.

    2008-07-01

    The steady and stationary state inverse problems consist of estimating the reaction and transport fluxes, blood concentrations and possibly the rates of change of some of the concentrations based on data which are often scarce noisy and sampled over a population. The Bayesian framework provides a natural setting for the solution of this inverse problem, because a priori knowledge about the system itself and the unknown reaction fluxes and transport rates can compensate for the insufficiency of measured data, provided that the computational costs do not become prohibitive. This article identifies the computational challenges which have to be met when analyzing the steady and stationary states of multicompartment model for cellular metabolism and suggest stable and efficient ways to handle the computations. The outline of a computational tool based on the Bayesian paradigm for the simulation and analysis of complex cellular metabolic systems is also presented.

  15. A High-Performance Cellular Automaton Model of Tumor Growth with Dynamically Growing Domains

    PubMed Central

    Poleszczuk, Jan; Enderling, Heiko

    2014-01-01

    Tumor growth from a single transformed cancer cell up to a clinically apparent mass spans many spatial and temporal orders of magnitude. Implementation of cellular automata simulations of such tumor growth can be straightforward but computing performance often counterbalances simplicity. Computationally convenient simulation times can be achieved by choosing appropriate data structures, memory and cell handling as well as domain setup. We propose a cellular automaton model of tumor growth with a domain that expands dynamically as the tumor population increases. We discuss memory access, data structures and implementation techniques that yield high-performance multi-scale Monte Carlo simulations of tumor growth. We discuss tumor properties that favor the proposed high-performance design and present simulation results of the tumor growth model. We estimate to which parameters the model is the most sensitive, and show that tumor volume depends on a number of parameters in a non-monotonic manner. PMID:25346862

  16. Calixarene-Mediated Liquid-Membrane Transport of Choline Conjugates.

    PubMed

    Adhikari, Birendra Babu; Fujii, Ayu; Schramm, Michael P

    2014-05-01

    A series of supramolecular calixarenes efficiently transport distinct molecular species through a liquid membrane when attached to a receptor-complementary choline handle. Calix-[6]arene hexacarboxylic acid was highly effective at transporting different target molecules against a pH gradient. Both carboxylic- and phosphonic-acid-functionalized calix[4]arenes effect transport without requiring a pH or ion gradient. NMR binding studies, two-phase solvent extraction, and three-phase transport experiments reveal the necessary and subtle parameters to effect the transport of molecules attached to a choline "handle". On the other hand, rescorin[4]arene cavitands, which have similar guest recognition profiles, did not transport guest molecules. These developments reveal new approaches towards attempting synthetic-receptor-mediated selective small-molecule transport in vesicular and cellular systems.

  17. Forging Ahead through Darkness: PCNA, Still the Principal Conductor at the Replication Fork.

    PubMed

    Choe, Katherine N; Moldovan, George-Lucian

    2017-02-02

    Proliferating cell nuclear antigen (PCNA) lies at the center of the faithful duplication of eukaryotic genomes. With its distinctive doughnut-shaped molecular structure, PCNA was originally studied for its role in stimulating DNA polymerases. However, we now know that PCNA does much more than promote processive DNA synthesis. Because of the complexity of the events involved, cellular DNA replication poses major threats to genomic integrity. Whatever predicament lies ahead for the replication fork, PCNA is there to orchestrate the events necessary to handle it. Through its many protein interactions and various post-translational modifications, PCNA has far-reaching impacts on a myriad of cellular functions. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Biomechanical and ultrastructural comparison of cryopreservation and a novel cellular extraction of porcine aortic valve leaflets.

    PubMed

    Courtman, D W; Pereira, C A; Omar, S; Langdon, S E; Lee, J M; Wilson, G J

    1995-12-01

    Heart valve substitutes of biological origin often fail by degenerative mechanisms. Many authors have hypothesized that mechanical fatigue and structural degradation are instrumental to in vivo failure. Since the properties of the structural matrix at implantation may predetermine failure, we have examined the ultrastructure, fracture, mechanics, and uniaxial high-strain-rate viscoelastic properties of: (1) fresh, (2) cryopreserved, and (3) cellular extracted porcine aortic valve leaflets. The cellular extraction process is being developed in order to reduce immunological attack and calcification. Cryopreservation causes cellular disruption and necrotic changes throughout the tissue, whereas extraction removes all cells and lipid membranes. Both processes leave an intact collagen and elastin structural matrix and preserve the high-strain-rate viscoelastic characteristics of the fresh leaflets. Extraction does cause a 20% reduction in the fracture tension and increases tissue extensibility, with the percent strain at fracture rising to 45.3 +/- 4 (mean +/- SEM) from 31.5 +/- 3 for fresh leaflets. However, extraction does preserve matrix structure and mechanics over the physiological loading range. Glutaraldehyde fixation produces increased extensibility, increased elastic behavior, and, when applied to extracted leaflets, it causes a marked drop in fracture tension, to 50% of that for fresh leaflets. The combination of extraction and fixation may lead to early degenerative failure. The cellular extraction technique alone may be a useful alternative to glutaraldehyde fixation in preparing bioprosthetic heart valves.

  19. Review of the physics of enhancing vortex lift by unsteady excitation

    NASA Technical Reports Server (NTRS)

    Wu, J. Z.; Vakili, A. D.; Wu, J. M.

    1991-01-01

    A review aimed at providing a physical understanding of the crucial mechanisms for obtaining super lift by means of unsteady excitations is presented. Particular attention is given to physical problems, including rolled-up vortex layer instability and receptivity, wave-vortex interaction and resonance, nonlinear streaming, instability of vortices behind bluff bodies and their shedding, and vortex breakdown. A general theoretical framework suitable for handling the unsteady vortex flows is introduced. It is suggested that wings with swept and sharp leading edges, equipped with devices for unsteady excitations, could yield the first breakthrough of the unsteady separation barrier and provide super lift at post-stall angle of attack.

  20. Women's attitudes toward forcible rape.

    PubMed

    Tolor, A

    1978-01-01

    This study assessed the attitudes of women with diverse backgrounds toward possible responses to an attempted sexual assault and also ascertained their beliefs about how society should handle a convicted rapist. Additionally, the role which the personality dimensions of assertiveness and internal-external expectamcy play in shaping attitudes toward rape was investigated. Seventy-seven women and 25 men were administered the Rathus Assertiveness Schedule, the Rotter I-E Scale, and a Rape Inventory. Women relied on a narrow range of options to deal with a rapist's attack, depending mostly on less active modes. They advocated humane approaches be taken with convicted rapists. Personality played only a minor role.

  1. Molecular pathogenesis of emphysema

    PubMed Central

    Taraseviciene-Stewart, Laimute; Voelkel, Norbert F.

    2008-01-01

    Emphysema is one manifestation of a group of chronic, obstructive, and frequently progressive destructive lung diseases. Cigarette smoking and air pollution are the main causes of emphysema in humans, and cigarette smoking causes emphysema in rodents. This review examines the concept of a homeostatically active lung structure maintenance program that, when attacked by proteases and oxidants, leads to the loss of alveolar septal cells and airspace enlargement. Inflammatory and noninflammatory mechanisms of disease pathogenesis, as well as the role of the innate and adaptive immune systems, are being explored in genetically altered animals and in exposure models of this disease. These recent scientific advances support a model whereby alveolar destruction resulting from a coalescence of mechanical forces, such as hyperinflation, and more recently recognized cellular and molecular events, including apoptosis, cellular senescence, and failed lung tissue repair, produces the clinically recognized syndrome of emphysema. PMID:18246188

  2. Preventive DNA repair by sanitizing the cellular (deoxy)nucleoside triphosphate pool.

    PubMed

    Nagy, Gergely N; Leveles, Ibolya; Vértessy, Beáta G

    2014-09-01

    The occurrence of modified bases in DNA is attributed to some major factors: incorporation of altered nucleotide building blocks and chemical reactions or radiation effects on bases within the DNA structure. Several enzyme families are involved in preventing the incorporation of noncanonical bases playing a 'sanitizing' role. The catalytic mechanism of action of these enzymes has been revealed for a number of representatives in clear structural and kinetic detail. In this review, we focus in detail on those examples where clear evidence has been produced using high-resolution structural studies. Comparing the protein fold and architecture of the enzyme active sites, two main classes of sanitizing deoxyribonucleoside triphosphate pyrophosphatases can be assigned that are distinguished by the site of nucleophilic attack. In enzymes associated with attack at the α-phosphorus, it is shown that coordination of the γ-phosphate group is also ensured by multiple interactions. By contrast, enzymes catalyzing attack at the β-phosphorus atom mainly coordinate the α- and the β-phosphate only. Characteristic differences are also observed with respect to the role of the metal ion cofactor (Mg(2+) ) and the coordination of nucleophilic water. Using different catalytic mechanisms embedded in different protein folds, these enzymes present a clear example of convergent evolution. © 2014 FEBS.

  3. Medium-term effectiveness of online behavioral training in migraine self-management: A randomized trial controlled over 10 months.

    PubMed

    Sorbi, M J; Kleiboer, A M; van Silfhout, H G; Vink, G; Passchier, J

    2015-06-01

    This randomized, controlled trial examined the medium-term effectiveness of online behavioral training in migraine self-management (oBT; N = 195) versus waitlist control (WLC; N = 173) on attack frequency, indicators of self-management (primary outcomes), headache top intensity, use of rescue medications, quality of life and disability (secondary outcomes). An online headache diary following the ICHD-II and questionnaires were completed at baseline (T0), post-training (T1) and six months later (T2). Missing data (T1: 24%; T2: 37%) were handled by multiple imputation. We established effect sizes (ES) and tested between-group differences over time with linear mixed modelling techniques based on the intention-to-treat principle. At T2, attack frequency had improved significantly in oBT (-23%, ES = 0.66) but also in WLC (-19%; ES = 0.52). Self-efficacy, internal and external control in migraine management--and triptan use--improved only in oBT, however. This indicates different processes in both groups and could signify (the start of) active self-management in oBT. Also, only oBT improved migraine-specific quality of life to a sizable extent. oBT produced self-management gains but could not account for improved attack frequency, because WLC improved as well. The perspective that BT effects develop gradually, and that online delivery will boost BT outreach, justifies further research. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  4. DAMPs, MAMPs, and NAMPs in plant innate immunity.

    PubMed

    Choi, Hyong Woo; Klessig, Daniel F

    2016-10-26

    Multicellular organisms have evolved systems/mechanisms to detect various forms of danger, including attack by microbial pathogens and a variety of pests, as well as tissue and cellular damage. Detection via cell-surface receptors activates an ancient and evolutionarily conserved innate immune system. Potentially harmful microorganisms are recognized by the presence of molecules or parts of molecules that have structures or chemical patterns unique to microbes and thus are perceived as non-self/foreign. They are referred to as Microbe-Associated Molecular Patterns (MAMPs). Recently, a class of small molecules that is made only by nematodes, and that functions as pheromones in these organisms, was shown to be recognized by a wide range of plants. In the presence of these molecules, termed Nematode-Associated Molecular Patterns (NAMPs), plants activate innate immune responses and display enhanced resistance to a broad spectrum of microbial and nematode pathogens. In addition to pathogen attack, the relocation of various endogenous molecules or parts of molecules, generally to the extracellular milieu, as a result of tissue or cellular damage is perceived as a danger signal, and it leads to the induction of innate immune responses. These relocated endogenous inducers are called Damage-Associated Molecular Patterns (DAMPs). This mini-review is focused on plant DAMPs, including the recently discovered Arabidopsis HMGB3, which is the counterpart of the prototypic animal DAMP HMGB1. The plant DAMPs will be presented in the context of plant MAMPs and NAMPs, as well as animal DAMPs.

  5. Lessons learned for pediatric disaster preparedness from September 11, 2001: New York City trauma centers.

    PubMed

    Stamell, Emily F; Foltin, George L; Nadler, Evan P

    2009-08-01

    The assault on the World Trade Center on September 11, 2001, has mandated that there be improved disaster preparedness for both children and adults in the immediate future. Fortunately, the events of September 11, 2001, spared 3,400 near miss children from substantial harm; however, NYC was not well prepared to handle significant numbers of pediatric patients had they been severely injured. Furthermore, there have been several medical sequelae of the attacks that have manifest long after the immediate postevent period. Both respiratory illness and mental health issues have been suffered by children because of the environmental toxins and the trauma of witnessing the event, respectively. The pediatric practitioners in the area did not feel well prepared to handle the increased demand for services. Also at the time, there was no pediatric-specific plan to either evacuate children in need of specialized care to centers with expertise in handling such patients or to mobilize pediatric practitioners (surgeons, critical care physicians, etc.) to the institutions where the masses of children would have initially been brought. Since then, there have been efforts to create educational materials to better prepare hospitals as well as proposals to create mobile pediatric disaster teams to deploy to hospitals in need of support. This review discusses these recognized and unrecognized issues in pediatric disaster preparedness to hopefully foster discussion for future strategies.

  6. Erythrocyte and blood antibacterial defense.

    PubMed

    Minasyan, Hayk

    2014-06-01

    It is an axiom that blood cellular immunity is provided by leukocytes. As to erythrocytes, it is generally accepted that their main function is respiration. Our research provides objective video and photo evidence regarding erythrocyte bactericidal function. Phase-contrast immersion vital microscopy of the blood of patients with bacteremia was performed, and the process of bacteria entrapping and killing by erythrocytes was shot by means of video camera. Video evidence demonstrates that human erythrocytes take active part in blood bactericidal action and can repeatedly engulf and kill bacteria of different species and size. Erythrocytes are extremely important integral part of human blood cellular immunity. a) are more numerous; b) are able to entrap and kill microorganisms repeatedly without being injured; c) are more resistant to infection and better withstand the attacks of pathogens; d) have longer life span and are produced faster; e) are inauspicious media for proliferation of microbes and do not support replication of chlamidiae, mycoplasmas, rickettsiae, viruses, etc.; and f) are more effective and uncompromised bacterial killers. Blood cellular immunity theory and traditional view regarding the function of erythrocytes in human blood should be revised.

  7. F-18 HARV yaw rate expansion flight #125 with Inverted Recovery

    NASA Technical Reports Server (NTRS)

    1991-01-01

    NASA's Dryden Flight Research Center, Edwards, CA, used an F-18 Hornet fighter aircraft as its High Angle-of-Attack (Alpha) Research Vehicle (HARV) in a three-phased flight research program lasting from April 1987 until September 1996. The aircraft completed 385 research flights and demonstrated stabilized flight at angles of attack between 65 and 70 degrees using thrust vectoring vanes, a research flight control system, and (eventually) forebody strakes (hinged structures on the forward side of the fuselage to provide control by interacting with vortices, generated at high angles of attack, to create side forces). This combination of technologies provided carefree handling of a fighter aircraft in a part of the flight regime that was otherwise very dangerous. Flight research with the HARV increased our understanding of flight at high angles of attack (angle of the wings with respect to the direction in which the aircraft was heading), enabling designers of U.S. fighter aircraft to design airplanes that will fly safely in portions of the flight envelope that pilots previously had to avoid. Flight 125 with the HARV involved yaw rate expansion up to 50 degrees per second (moving the nose to the left or right at that rate). NASA research pilot Ed Schneider was the pilot, and the purpose of the flight was to look at the spin characteristics of the HARV. The sequence in this particular video clip includes the first and second maneuvers in the flight. On the first maneuver, the pilot attempted to achieve a yaw rate of 40 degrees per second and actually went to 47 degrees. The spin was oscillatory in pitch (up and down) and roll (rotating around the longitudinal axis). Recovery was normal. On the second maneuver of the flight in which Schneider tried to achieve a yaw rate of 40 degrees per second, the aircraft overshot to 54 degrees per second during an oscillatory spin. In the course of the recovery, the aircraft rolled after a large sideslip buildup. Moderate aft stick application to attain a positive angle of attack resulted in an easy recovery.

  8. Bacteroides Fragilis OmpA: Utility as a Live Vaccine Vector for Biodefense Agents

    DTIC Science & Technology

    2008-01-01

    of handling diseases in large populations. Studies of the immune system and vaccine effectiveness have shown that the ideal way to induce a...the past 15 years, experimental bacterial vaccine vectors have been produced that elicit immune responses against bacterial, viral, protozoan and...given orally, and they can be treated with antibiotics if desired and they effectively induce both humoral and cellular responses. If the organism

  9. Cellular manganese content is developmentally regulated in human dopaminergic neurons

    NASA Astrophysics Data System (ADS)

    Kumar, Kevin K.; Lowe, Edward W., Jr.; Aboud, Asad A.; Neely, M. Diana; Redha, Rey; Bauer, Joshua A.; Odak, Mihir; Weaver, C. David; Meiler, Jens; Aschner, Michael; Bowman, Aaron B.

    2014-10-01

    Manganese (Mn) is both an essential biological cofactor and neurotoxicant. Disruption of Mn biology in the basal ganglia has been implicated in the pathogenesis of neurodegenerative disorders, such as parkinsonism and Huntington's disease. Handling of other essential metals (e.g. iron and zinc) occurs via complex intracellular signaling networks that link metal detection and transport systems. However, beyond several non-selective transporters, little is known about the intracellular processes regulating neuronal Mn homeostasis. We hypothesized that small molecules that modulate intracellular Mn could provide insight into cell-level Mn regulatory mechanisms. We performed a high throughput screen of 40,167 small molecules for modifiers of cellular Mn content in a mouse striatal neuron cell line. Following stringent validation assays and chemical informatics, we obtained a chemical `toolbox' of 41 small molecules with diverse structure-activity relationships that can alter intracellular Mn levels under biologically relevant Mn exposures. We utilized this toolbox to test for differential regulation of Mn handling in human floor-plate lineage dopaminergic neurons, a lineage especially vulnerable to environmental Mn exposure. We report differential Mn accumulation between developmental stages and stage-specific differences in the Mn-altering activity of individual small molecules. This work demonstrates cell-level regulation of Mn content across neuronal differentiation.

  10. Yeast prions: structure, biology, and prion-handling systems.

    PubMed

    Wickner, Reed B; Shewmaker, Frank P; Bateman, David A; Edskes, Herman K; Gorkovskiy, Anton; Dayani, Yaron; Bezsonov, Evgeny E

    2015-03-01

    A prion is an infectious protein horizontally transmitting a disease or trait without a required nucleic acid. Yeast and fungal prions are nonchromosomal genes composed of protein, generally an altered form of a protein that catalyzes the same alteration of the protein. Yeast prions are thus transmitted both vertically (as genes composed of protein) and horizontally (as infectious proteins, or prions). Formation of amyloids (linear ordered β-sheet-rich protein aggregates with β-strands perpendicular to the long axis of the filament) underlies most yeast and fungal prions, and a single prion protein can have any of several distinct self-propagating amyloid forms with different biological properties (prion variants). Here we review the mechanism of faithful templating of protein conformation, the biological roles of these prions, and their interactions with cellular chaperones, the Btn2 and Cur1 aggregate-handling systems, and other cellular factors governing prion generation and propagation. Human amyloidoses include the PrP-based prion conditions and many other, more common amyloid-based diseases, several of which show prion-like features. Yeast prions increasingly are serving as models for the understanding and treatment of many mammalian amyloidoses. Patients with different clinical pictures of the same amyloidosis may be the equivalent of yeasts with different prion variants. Copyright © 2015, American Society for Microbiology. All Rights Reserved.

  11. Yeast Prions: Structure, Biology, and Prion-Handling Systems

    PubMed Central

    Shewmaker, Frank P.; Bateman, David A.; Edskes, Herman K.; Gorkovskiy, Anton; Dayani, Yaron; Bezsonov, Evgeny E.

    2015-01-01

    SUMMARY A prion is an infectious protein horizontally transmitting a disease or trait without a required nucleic acid. Yeast and fungal prions are nonchromosomal genes composed of protein, generally an altered form of a protein that catalyzes the same alteration of the protein. Yeast prions are thus transmitted both vertically (as genes composed of protein) and horizontally (as infectious proteins, or prions). Formation of amyloids (linear ordered β-sheet-rich protein aggregates with β-strands perpendicular to the long axis of the filament) underlies most yeast and fungal prions, and a single prion protein can have any of several distinct self-propagating amyloid forms with different biological properties (prion variants). Here we review the mechanism of faithful templating of protein conformation, the biological roles of these prions, and their interactions with cellular chaperones, the Btn2 and Cur1 aggregate-handling systems, and other cellular factors governing prion generation and propagation. Human amyloidoses include the PrP-based prion conditions and many other, more common amyloid-based diseases, several of which show prion-like features. Yeast prions increasingly are serving as models for the understanding and treatment of many mammalian amyloidoses. Patients with different clinical pictures of the same amyloidosis may be the equivalent of yeasts with different prion variants. PMID:25631286

  12. Number of Nanoparticles per Cell through a Spectrophotometric Method - A key parameter to Assess Nanoparticle-based Cellular Assays.

    PubMed

    Unciti-Broceta, Juan D; Cano-Cortés, Victoria; Altea-Manzano, Patricia; Pernagallo, Salvatore; Díaz-Mochón, Juan J; Sánchez-Martín, Rosario M

    2015-05-15

    Engineered nanoparticles (eNPs) for biological and biomedical applications are produced from functionalised nanoparticles (NPs) after undergoing multiple handling steps, giving rise to an inevitable loss of NPs. Herein we present a practical method to quantify nanoparticles (NPs) number per volume in an aqueous suspension using standard spectrophotometers and minute amounts of the suspensions (up to 1 μL). This method allows, for the first time, to analyse cellular uptake by reporting NPs number added per cell, as opposed to current methods which are related to solid content (w/V) of NPs. In analogy to the parameter used in viral infective assays (multiplicity of infection), we propose to name this novel parameter as multiplicity of nanofection.

  13. Monitoring occupational exposure to cancer chemotherapy drugs

    NASA Technical Reports Server (NTRS)

    Baker, E. S.; Connor, T. H.

    1996-01-01

    Reports of the health effects of handling cytotoxic drugs and compliance with guidelines for handling these agents are briefly reviewed, and studies using analytical and biological methods of detecting exposure are evaluated. There is little conclusive evidence of detrimental health effects from occupational exposure to cytotoxic drugs. Work practices have improved since the issuance of guidelines for handling these drugs, but compliance with the recommended practices is still inadequate. Of 64 reports published since 1979 on studies of workers' exposure to these drugs, 53 involved studies of changes in cellular or molecular endpoints (biological markers) and 12 described chemical analyses of drugs or their metabolites in urine (2 involved both, and 2 reported the same study). The primary biological markers used were urine mutagenicity, sister chromatid exchange, and chromosomal aberrations; other studies involved formation of micronuclei and measurements of urinary thioethers. The studies had small sample sizes, and the methods were qualitative, nonspecific, subject to many confounders, and possibly not sensitive enough to detect most occupational exposures. Since none of the currently available biological and analytical methods is sufficiently reliable or reproducible for routine monitoring of exposure in the workplace, further studies using these methods are not recommended; efforts should focus instead on wide-spread implementation of improved practices for handling cytotoxic drugs.

  14. Unearthing the Antibacterial Mechanism of Medicinal Clay: A Geochemical Approach to Combating Antibiotic Resistance

    DOE PAGES

    Morrison, Keith D.; Misra, Rajeev; Williams, Lynda B.

    2016-01-08

    Natural antibacterial clays, when hydrated and applied topically, kill human pathogens including antibiotic resistant strains proliferating worldwide. Only certain clays are bactericidal; those containing soluble reduced metals and expandable clay minerals that absorb cations, providing a capacity for extended metal release and production of toxic hydroxyl radicals. Here we show the critical antibacterial components are soluble Fe 2+ and Al 3+ that synergistically attack multiple cellular systems in pathogens normally growth-limited by Fe supply. This geochemical process is more effective than metal solutions alone and provides an alternative antibacterial strategy to traditional antibiotics. Advanced bioimaging methods and genetic show thatmore » Al 3+ misfolds cell membrane proteins, while Fe 2+ evokes membrane oxidation and enters the cytoplasm inflicting hydroxyl radical attack on intracellular proteins and DNA. The lethal reaction precipitates Fe 3+-oxides as biomolecular damage proceeds. In conclusion, discovery of this bactericidal mechanism demonstrated by natural clays should guide designs of new mineral-based antibacterial agents.« less

  15. Unearthing the Antibacterial Mechanism of Medicinal Clay: A Geochemical Approach to Combating Antibiotic Resistance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Morrison, Keith D.; Misra, Rajeev; Williams, Lynda B.

    Natural antibacterial clays, when hydrated and applied topically, kill human pathogens including antibiotic resistant strains proliferating worldwide. Only certain clays are bactericidal; those containing soluble reduced metals and expandable clay minerals that absorb cations, providing a capacity for extended metal release and production of toxic hydroxyl radicals. Here we show the critical antibacterial components are soluble Fe 2+ and Al 3+ that synergistically attack multiple cellular systems in pathogens normally growth-limited by Fe supply. This geochemical process is more effective than metal solutions alone and provides an alternative antibacterial strategy to traditional antibiotics. Advanced bioimaging methods and genetic show thatmore » Al 3+ misfolds cell membrane proteins, while Fe 2+ evokes membrane oxidation and enters the cytoplasm inflicting hydroxyl radical attack on intracellular proteins and DNA. The lethal reaction precipitates Fe 3+-oxides as biomolecular damage proceeds. In conclusion, discovery of this bactericidal mechanism demonstrated by natural clays should guide designs of new mineral-based antibacterial agents.« less

  16. Unearthing the Antibacterial Mechanism of Medicinal Clay: A Geochemical Approach to Combating Antibiotic Resistance

    PubMed Central

    Morrison, Keith D.; Misra, Rajeev; Williams, Lynda B.

    2016-01-01

    Natural antibacterial clays, when hydrated and applied topically, kill human pathogens including antibiotic resistant strains proliferating worldwide. Only certain clays are bactericidal; those containing soluble reduced metals and expandable clay minerals that absorb cations, providing a capacity for extended metal release and production of toxic hydroxyl radicals. Here we show the critical antibacterial components are soluble Fe2+ and Al3+ that synergistically attack multiple cellular systems in pathogens normally growth-limited by Fe supply. This geochemical process is more effective than metal solutions alone and provides an alternative antibacterial strategy to traditional antibiotics. Advanced bioimaging methods and genetic show that Al3+ misfolds cell membrane proteins, while Fe2+ evokes membrane oxidation and enters the cytoplasm inflicting hydroxyl radical attack on intracellular proteins and DNA. The lethal reaction precipitates Fe3+-oxides as biomolecular damage proceeds. Discovery of this bactericidal mechanism demonstrated by natural clays should guide designs of new mineral-based antibacterial agents. PMID:26743034

  17. The mesencephalic GCt-ICo complex and tonic immobility in pigeons (Columba livia): a c-Fos study.

    PubMed

    Melleu, Fernando Falkenburger; Lino-de-Oliveira, C; Marino-Neto, J

    2017-04-01

    Tonic immobility (TI) is a response to a predator attack, or other inescapable danger, characterized by immobility, analgesia and unresponsiveness to external stimuli. In mammals, the periaqueductal gray (PAG) and deep tectal regions control the expression of TI as well as other defensive behaviors. In birds, little is known about the mesencephalic circuitry involved in the control of TI. Here, adult pigeons (both sex, n = 4/group), randomly assigned to non-handled, handled or TI groups, were killed 90 min after manipulations and the brains processed for detection of c-Fos immunoreactive cells (c-Fos-ir, marker for neural activity) in the mesencephalic central gray (GCt) and the adjacent nucleus intercollicularis (ICo). The NADPH-diaphorase staining delineated the boundaries of the sub nuclei in the ICo-GCt complex. Compared to non-handled, TI (but not handling) induced c-Fos-ir in NADPH-diaphorase-rich and -poor regions. After TI, the number of c-Fos-ir increased in the caudal and intermediate areas of the ICo (but not in the GCt), throughout the rostrocaudal axis of the dorsal stratum griseum periventriculare (SGPd) of the optic tectum and in the n. mesencephalicus lateralis pars dorsalis (MLd), which is part of the ascending auditory pathway. These data suggest that inescapable threatening stimuli such as TI may recruit neurons in discrete areas of ICo-GCt complex, deep tectal layer and in ascending auditory circuits that may control the expression of defensive behaviors in pigeons. Additionally, data indicate that the contiguous deep tectal SCPd (but not GCt) in birds may be functionally comparable to the mammalian dorsal PAG.

  18. Intravenous immunoglobulin and Alzheimer's disease immunotherapy.

    PubMed

    Solomon, Beka

    2007-02-01

    Amyloid-beta peptide (Abeta) contributes to the acute progression of Alzheimer's disease (AD) and has become the main target for therapeutics. Active immunization with Abeta in individuals with AD has been efficacious; however, some patients developed side effects, possibly related to an autoimmune response. Evidence that intravenous immunoglobulin (IVIg), an FDA-approved purified immunoglobulin fraction from normal human donor blood, shows promise of passive immunotherapy for AD is reviewed. Investigations into the molecular effects of IVIg on Abeta clearance, using the BV-2 cellular microglia line, demonstrate that IVIg dissolves Abeta fibrils in vitro, increases cellular tolerance to Abeta, enhances microglial migration toward Abeta deposits, and mediates phagocytosis of Abeta. Preliminary clinical results indicate that IVIg, which contains natural antibodies against the Abeta, warrants further study into its potential to deliver a controlled immune attack on the peptide, avoiding the immune toxicities that have had a negative impact on the first clinical trials of vaccine against Abeta.

  19. REGULATORY MECHANISMS OF CELLULAR RESPIRATION

    PubMed Central

    Barron, E. S. Guzman; Nelson, Leonard; Ardao, Maria Isabel

    1948-01-01

    Oxidizing agents of sulfhydryl groups such as iodosobenzoate, alkylating agents such as iodoacetamide, and mercaptide-forming agents such as cadmium chloride, mercuric chloride, p-chloromercuribenzoate, sodium arsenite, and p-carboxyphenylarsine oxide, added in small concentrations to a suspension of sea urchin sperm produced an increase in respiration. When the concentration was increased there was an inhibition. These effects are explained by postulating the presence in the cells of two kinds of sulfhydryl groups: soluble sulfhydryl groups, which regulate cellular respiration, and fixed sulfhydryl groups, present in the protein moiety of enzymes. Small concentrations of sulfhydryl reagents combine only with the first, thus producing an increase in respiration; when the concentration is increased, the fixed sulfhydryl groups are also attacked and inhibition of respiration is the consequence. Other inhibitors of cell respiration, such as cyanide and urethanes, which do not combine with —SH groups, did not stimulate respiration in small concentration. PMID:18891144

  20. Novel method to dynamically load cells in 3D-hydrogels culture for blast injury studies

    NASA Astrophysics Data System (ADS)

    Sory, David R.; Areias, Anabela C.; Overby, Darryl R.; Proud, William G.

    2017-01-01

    For at least a century explosive devices have been one of the most important causes of injuries in military conflicts as well as in terrorist attacks. Although significant experimental and modelling efforts have been focussed on blast injuries at the organ or tissue level, few studies have investigated the mechanisms of blast injuries at the cellular level. This paper introduces an in vitro method compatible with living cells to examine the effects of high stress and short-duration pulses relevant to blast loadings and blunt trauma. The experimental phase involves high strain-rate axial compression of cylindrical specimens within an hermetically sealed chamber made of biocompatible polymer. Numerical simulations were performed in order to verify the experimental loading conditions and to characterize the loading path within the sample. A proof of concept is presented so as to establish a new window to address fundamental questions regarding blast injury at the cellular level.

  1. Differential tolerance of two Gammarus pulex populations transplanted from different metallogenic regions to a polymetal gradient.

    PubMed

    Khan, Farhan R; Irving, Jennifer R; Bury, Nicolas R; Hogstrand, Christer

    2011-03-01

    The River Hayle, Cornwall, UK exhibits pronounced Cu and Zn concentration gradients which were used to compare the metal handling abilities of two populations of Gammarus pulex (Crustacea: Amphipoda). One population was native to the Hayle region (Drym) and presumably has been historically impacted by elevated Cu and Zn levels, whilst naïve gammarids were collected from the River Cray, Kent, UK. Both populations were subject to a 32 day in situ exposure at four R. Hayle sites (Drym, Godolphin, Relubbus and St. Erth). Mortality (LT50), Cu and Zn accumulation and sub-cellular distribution, and oxidative stress (malondialdehyde production) increased with the expected Cu and Zn bioavailabilities at the four sites (i.e. Godolphin>Relubbus>St. Erth>Drym). The naïve population experienced greater metal induced effects in terms of Cu and Zn accumulation, oxidative stress responses and lower LT50s. Analysis of Cu and Zn sub-cellular distribution, however, revealed no significant differences in metal handling. In both populations each metal was localised predominantly to the sub-cellular fraction containing metal bound to metallothionein-like proteins (MTLP) or that holding both metal-rich granules (MRG) and exoskeleton, MTLP and MRG binding being indicative of metal detoxification. However, a greater capacity for detoxified metal storage is not a mechanism implicated in the perceived tolerance of the historically impacted gammarids. Instead our results suggest that the historically impacted population was adapted for lower uptake of Cu and Zn leading to lower bioaccumulation, stress response and ultimately mortality. These results demonstrate not only the usefulness of the in situ methodology, but also that differences in population exposure history can cause significant differences in metal responses during exposure at higher concentrations. Copyright © 2011 Elsevier B.V. All rights reserved.

  2. Natural laminar flow airfoil design considerations for winglets on low-speed airplanes

    NASA Technical Reports Server (NTRS)

    Vandam, C. P.

    1984-01-01

    Winglet airfoil section characteristics which significantly influence cruise performance and handling qualities of an airplane are discussed. A good winglet design requires an airfoil section with a low cruise drag coefficient, a high maximum lift coefficient, and a gradual and steady movement of the boundary layer transition location with angle of attack. The first design requirement provides a low crossover lift coefficient of airplane drag polars with winglets off and on. The other requirements prevent nonlinear changes in airplane lateral/directional stability and control characteristics. These requirements are considered in the design of a natural laminar flow airfoil section for winglet applications and chord Reynolds number of 1 to 4 million.

  3. Using Transverse Optical Patterns for Ultra-Low-Light All-Optical Switching

    DTIC Science & Technology

    2008-01-01

    handling devices from cellular telephones to supercomputers. The de - velopment of the internet (world-wide-web) was enabled by personal computers and...increase in response time for de - creasing power that is qualitatively similar to experimental observations. To facilitate comparison to Fig. 5.8(a...wells and of the entire ring correspond to the preference of the system to emit light in a hexagonal pattern. To de - scribe the pattern orientation using

  4. Regulating cellular trace metal economy in algae

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blaby-Haas, Crysten E.; Merchant, Sabeeha S.

    As indispensable protein cofactors, Fe, Mn, Cu and Zn are at the center of multifaceted acclimation mechanisms that have evolved to ensure extracellular supply meets intracellular demand. In starting with selective transport at the plasma membrane and ending in protein metalation, metal homeostasis in algae involves regulated trafficking of metal ions across membranes, intracellular compartmentalization by proteins and organelles, and metal-sparing/recycling mechanisms to optimize metal-use efficiency. Overlaid on these processes are additional circuits that respond to the metabolic state as well as to the prior metal status of the cell. Here, we focus on recent progress made toward understanding themore » pathways by which the single-celled, green alga Chlamydomonas reinhardtii controls its cellular trace metal economy. We also compare these mechanisms to characterized and putative processes in other algal lineages. Photosynthetic microbes continue to provide insight into cellular regulation and handling of Cu, Fe, Zn and Mn as a function of the nutritional supply and cellular demand for metal cofactors. We found that new experimental tools such as RNA-Seq and subcellular metal imaging are bringing us closer to a molecular understanding of acclimation to supply dynamics in algae and beyond.« less

  5. Regulating cellular trace metal economy in algae

    DOE PAGES

    Blaby-Haas, Crysten E.; Merchant, Sabeeha S.

    2017-06-30

    As indispensable protein cofactors, Fe, Mn, Cu and Zn are at the center of multifaceted acclimation mechanisms that have evolved to ensure extracellular supply meets intracellular demand. In starting with selective transport at the plasma membrane and ending in protein metalation, metal homeostasis in algae involves regulated trafficking of metal ions across membranes, intracellular compartmentalization by proteins and organelles, and metal-sparing/recycling mechanisms to optimize metal-use efficiency. Overlaid on these processes are additional circuits that respond to the metabolic state as well as to the prior metal status of the cell. Here, we focus on recent progress made toward understanding themore » pathways by which the single-celled, green alga Chlamydomonas reinhardtii controls its cellular trace metal economy. We also compare these mechanisms to characterized and putative processes in other algal lineages. Photosynthetic microbes continue to provide insight into cellular regulation and handling of Cu, Fe, Zn and Mn as a function of the nutritional supply and cellular demand for metal cofactors. We found that new experimental tools such as RNA-Seq and subcellular metal imaging are bringing us closer to a molecular understanding of acclimation to supply dynamics in algae and beyond.« less

  6. Thermodynamic perspectives on genetic instructions, the laws of biology and diseased states.

    PubMed

    Trevors, Jack T; Saier, Milton H

    2011-01-01

    This article examines in a broad perspective entropy and some examples of its relationship to evolution, genetic instructions and how we view diseases. Living organisms are programmed by functional genetic instructions (FGI), through cellular communication pathways, to grow and reproduce by maintaining a variety of hemistable, ordered structures (low entropy). Living organisms are far from equilibrium with their surrounding environmental systems, which tends towards increasing disorder (increasing entropy). Organisms free themselves from high entropy (high disorder) to maintain their cellular structures for a period of time sufficient to allow reproduction and the resultant offspring to reach reproductive ages. This time interval varies for different species. Bacteria, for example need no sexual parents; dividing cells are nearly identical to the previous generation of cells, and can begin a new cell cycle without delay under appropriate conditions. By contrast, human infants require years of care before they can reproduce. Living organisms maintain order in spite of their changing surrounding environment that decreases order according to the second law of thermodynamics. These events actually work together since living organisms create ordered biological structures by increasing local entropy. From a disease perspective, viruses and other disease agents interrupt the normal functioning of cells. The pressure for survival may result in mechanisms that allow organisms to resist attacks by viruses, other pathogens, destructive chemicals and physical agents such as radiation. However, when the attack is successful, the organism can be damaged until the cell, tissue, organ or entire organism is no longer functional and entropy increases. Copyright © 2010 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  7. Cellular Automata Generalized To An Inferential System

    NASA Astrophysics Data System (ADS)

    Blower, David J.

    2007-11-01

    Stephen Wolfram popularized elementary one-dimensional cellular automata in his book, A New Kind of Science. Among many remarkable things, he proved that one of these cellular automata was a Universal Turing Machine. Such cellular automata can be interpreted in a different way by viewing them within the context of the formal manipulation rules from probability theory. Bayes's Theorem is the most famous of such formal rules. As a prelude, we recapitulate Jaynes's presentation of how probability theory generalizes classical logic using modus ponens as the canonical example. We emphasize the important conceptual standing of Boolean Algebra for the formal rules of probability manipulation and give an alternative demonstration augmenting and complementing Jaynes's derivation. We show the complementary roles played in arguments of this kind by Bayes's Theorem and joint probability tables. A good explanation for all of this is afforded by the expansion of any particular logic function via the disjunctive normal form (DNF). The DNF expansion is a useful heuristic emphasized in this exposition because such expansions point out where relevant 0s should be placed in the joint probability tables for logic functions involving any number of variables. It then becomes a straightforward exercise to rely on Boolean Algebra, Bayes's Theorem, and joint probability tables in extrapolating to Wolfram's cellular automata. Cellular automata are seen as purely deductive systems, just like classical logic, which probability theory is then able to generalize. Thus, any uncertainties which we might like to introduce into the discussion about cellular automata are handled with ease via the familiar inferential path. Most importantly, the difficult problem of predicting what cellular automata will do in the far future is treated like any inferential prediction problem.

  8. Thin film bioreactors in space

    NASA Technical Reports Server (NTRS)

    Hughes-Fulford, M.; Scheld, H. W.

    1989-01-01

    Studies from the Skylab, SL-3 and D-1 missions have demonstrated that biological organisms grown in microgravity have changes in basic cellular functions such as DNA, mRNA and protein synthesis, cytoskeleton synthesis, glucose utilization, and cellular differentiation. Since microgravity could affect prokaryotic and eukaryotic cells at a subcellular and molecular level, space offers an opportunity to learn more about basic biological systems with one inmportant variable removed. The thin film bioreactor will facilitate the handling of fluids in microgravity, under constant temperature and will allow multiple samples of cells to be grown with variable conditions. Studies on cell cultures grown in microgravity would make it possible to identify and quantify changes in basic biological function in microgravity which are needed to develop new applications of orbital research and future biotechnology.

  9. Simulation analysis of an integrated model for dynamic cellular manufacturing system

    NASA Astrophysics Data System (ADS)

    Hao, Chunfeng; Luan, Shichao; Kong, Jili

    2017-05-01

    Application of dynamic cellular manufacturing system (DCMS) is a well-known strategy to improve manufacturing efficiency in the production environment with high variety and low volume of production. Often, neither the trade-off of inter and intra-cell material movements nor the trade-off of hiring and firing of operators are examined in details. This paper presents simulation results of an integrated mixed-integer model including sensitivity analysis for several numerical examples. The comprehensive model includes cell formation, inter and intracellular materials handling, inventory and backorder holding, operator assignment (including resource adjustment) and flexible production routing. The model considers multi-production planning with flexible resources (machines and operators) where each period has different demands. The results verify the validity and sensitivity of the proposed model using a genetic algorithm.

  10. Incubation period and immune function: A comparative field study among coexisting birds

    USGS Publications Warehouse

    Palacios, M.G.; Martin, T.E.

    2006-01-01

    Developmental periods are integral components of life history strategies that can have important fitness consequences and vary enormously among organisms. However, the selection pressures and mechanisms causing variation in length of developmental periods are poorly understood. Particularly puzzling are prolonged developmental periods, because their selective advantage is unclear. Here we tested the hypotheses that immune function is stronger in species that are attacked at a higher rate by parasites and that prolonged embryonic development allows the development of this stronger immune system. Through a comparative field study among 12 coexisting passerine bird species, we show that species with higher blood parasite prevalence mounted stronger cellular immune responses than species with lower prevalence. These results provide support for the hypothesis that species facing greater selection pressure from parasites invest more in immune function. However, species with longer incubation periods mounted weaker cellular immune responses than species with shorter periods. Therefore, cellular immune responses do not support the hypothesis that longer development time enhances immunocompentence. Future studies should assess other components of the immune system and test alternative causes of variation in incubation periods among bird species. ?? Springer-Verlag 2005.

  11. Erythrocyte and blood antibacterial defense

    PubMed Central

    2014-01-01

    It is an axiom that blood cellular immunity is provided by leukocytes. As to erythrocytes, it is generally accepted that their main function is respiration. Our research provides objective video and photo evidence regarding erythrocyte bactericidal function. Phase-contrast immersion vital microscopy of the blood of patients with bacteremia was performed, and the process of bacteria entrapping and killing by erythrocytes was shot by means of video camera. Video evidence demonstrates that human erythrocytes take active part in blood bactericidal action and can repeatedly engulf and kill bacteria of different species and size. Erythrocytes are extremely important integral part of human blood cellular immunity. Compared with phagocytic leukocytes, the erythrocytes: a) are more numerous; b) are able to entrap and kill microorganisms repeatedly without being injured; c) are more resistant to infection and better withstand the attacks of pathogens; d) have longer life span and are produced faster; e) are inauspicious media for proliferation of microbes and do not support replication of chlamidiae, mycoplasmas, rickettsiae, viruses, etc.; and f) are more effective and uncompromised bacterial killers. Blood cellular immunity theory and traditional view regarding the function of erythrocytes in human blood should be revised. PMID:24883200

  12. Adhesion-mediated self-renewal abilities of Ph+ blastoma cells

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Funayama, Keiji; Saito-Kurimoto, Yumi; Ebihara, Yasuhiro

    2010-05-28

    The Philadelphia chromosome-positive blastoma, maintained by serial subcutaneous transplantation in nude mice, is a highly proliferating biological mass consisting of homogenous CD34{sup +}CD38{sup -} myeloblastoid cells. These cells newly evolved from pluripotent leukemia stem cells of chronic myeloid leukemia in the chronic phase. Therefore, this mass may provide a unique tool for better understanding cellular and molecular mechanisms of self-renewal of leukemia stem cells. In this paper, we demonstrated that intravenously injected blastoma cells can cause Ph+ blastic leukemia with multiple invasive foci in NOD/SCID mice but not in nude mice. In addition, using an in vitro culture system, wemore » clearly showed that blastoma cell adhesion to OP9 stromal cells accelerates blastoma cell proliferation that is associated with up-regulation of BMI1 gene expression; increased levels of {beta}-catenin and the Notch1 intra-cellular domain; and changed the expression pattern of variant CD44 forms, which are constitutively expressed in these blastoma cells. These findings strongly suggest that adhesion of leukemic stem cells to stromal cells via CD44 might be indispensable for their cellular defense against attack by immune cells and for maintenance of their self-renewal ability.« less

  13. Beneficial effects of leptin treatment in a setting of cardiac dysfunction induced by transverse aortic constriction in mouse.

    PubMed

    Gómez-Hurtado, Nieves; Domínguez-Rodríguez, Alejandro; Mateo, Philippe; Fernández-Velasco, María; Val-Blasco, Almudena; Aizpún, Rafael; Sabourin, Jessica; Gómez, Ana María; Benitah, Jean-Pierre; Delgado, Carmen

    2017-07-01

    Leptin, is a 16 kDa pleiotropic peptide not only primarily secreted by adipocytes, but also produced by other tissues, including the heart. Controversy exists regarding the adverse and beneficial effects of leptin on the heart We analysed the effect of a non-hypertensive dose of leptin on cardiac function, [Ca 2+ ] i handling and cellular electrophysiology, which participate in the genesis of pump failure and related arrhythmias, both in control mice and in mice subjected to chronic pressure-overload by transverse aorta constriction. We find that leptin activates mechanisms that contribute to cardiac dysfunction under physiological conditions. However, after the establishment of pressure overload, an increase in leptin levels has protective cardiac effects with respect to rescuing the cellular heart failure phenotype. These beneficial effects of leptin involve restoration of action potential duration via normalization of transient outward potassium current and sarcoplasmic reticulum Ca 2+ content via rescue of control sarcoplasmic/endoplasmic reticulum Ca 2+ ATPase levels and ryanodine receptor function modulation, leading to normalization of Ca 2+ handling parameters. Leptin, is a 16 kDa pleiotropic peptide not only primary secreted by adipocytes, but also produced by other tissues, including the heart. Evidence indicates that leptin may have either adverse or beneficial effects on the heart. To obtain further insights, in the present study, we analysed the effect of leptin treatment on cardiac function, [Ca 2+ ] i handling and cellular electrophysiology, which participate in the genesis of pump failure and related arrhythmias, both in control mice and in mice subjected to chronic pressure-overload by transverse aorta constriction (TAC). Three weeks after surgery, animals received either leptin (0.36 mg kg -1  day -1 ) or vehicle via osmotic minipumps for 3 weeks. Echocardiographic measurements showed that, although leptin treatment was deleterious on cardiac function in sham, leptin had a cardioprotective effect following TAC. [Ca 2+ ] i transient in cardiomyocytes followed similar pattern. Patch clamp experiments showed prolongation of action potential duration (APD) in TAC and leptin-treated sham animals, whereas, following TAC, leptin reduced the APD towards control values. APD variations were associated with decreased transient outward potassium current and Kv4.2 and KChIP2 protein expression. TAC myocytes showed a higher incidence of triggered activities and spontaneous Ca 2+ waves. These proarrhythmic manifestations, related to Ca 2+ /calmodulin-dependent protein kinase II and ryanodine receptor phosphorylation, were reduced by leptin. The results of the present study demonstrate that, although leptin treatment was deleterious on cardiac function in control animals, leptin had a cardioprotective effect following TAC, normalizing cardiac function and reducing arrhythmogeneity at the cellular level. © 2017 The Authors. The Journal of Physiology © 2017 The Physiological Society.

  14. Solving a mathematical model integrating unequal-area facilities layout and part scheduling in a cellular manufacturing system by a genetic algorithm.

    PubMed

    Ebrahimi, Ahmad; Kia, Reza; Komijan, Alireza Rashidi

    2016-01-01

    In this article, a novel integrated mixed-integer nonlinear programming model is presented for designing a cellular manufacturing system (CMS) considering machine layout and part scheduling problems simultaneously as interrelated decisions. The integrated CMS model is formulated to incorporate several design features including part due date, material handling time, operation sequence, processing time, an intra-cell layout of unequal-area facilities, and part scheduling. The objective function is to minimize makespan, tardiness penalties, and material handling costs of inter-cell and intra-cell movements. Two numerical examples are solved by the Lingo software to illustrate the results obtained by the incorporated features. In order to assess the effects and importance of integration of machine layout and part scheduling in designing a CMS, two approaches, sequentially and concurrent are investigated and the improvement resulted from a concurrent approach is revealed. Also, due to the NP-hardness of the integrated model, an efficient genetic algorithm is designed. As a consequence, computational results of this study indicate that the best solutions found by GA are better than the solutions found by B&B in much less time for both sequential and concurrent approaches. Moreover, the comparisons between the objective function values (OFVs) obtained by sequential and concurrent approaches demonstrate that the OFV improvement is averagely around 17 % by GA and 14 % by B&B.

  15. Endoplasmic Reticulum Ca2+ Handling in Excitable Cells in Health and Disease

    PubMed Central

    Mattson, Mark P.

    2011-01-01

    The endoplasmic reticulum (ER) is a morphologically and functionally diverse organelle capable of integrating multiple extracellular and internal signals and generating adaptive cellular responses. It plays fundamental roles in protein synthesis and folding and in cellular responses to metabolic and proteotoxic stress. In addition, the ER stores and releases Ca2+ in sophisticated scenarios that regulate a range of processes in excitable cells throughout the body, including muscle contraction and relaxation, endocrine regulation of metabolism, learning and memory, and cell death. One or more Ca2+ ATPases and two types of ER membrane Ca2+ channels (inositol trisphosphate and ryanodine receptors) are the major proteins involved in ER Ca2+ uptake and release, respectively. There are also direct and indirect interactions of ER Ca2+ stores with plasma membrane and mitochondrial Ca2+-regulating systems. Pharmacological agents that selectively modify ER Ca2+ release or uptake have enabled studies that revealed many different physiological roles for ER Ca2+ signaling. Several inherited diseases are caused by mutations in ER Ca2+-regulating proteins, and perturbed ER Ca2+ homeostasis is implicated in a range of acquired disorders. Preclinical investigations suggest a therapeutic potential for use of agents that target ER Ca2+ handling systems of excitable cells in disorders ranging from cardiac arrhythmias and skeletal muscle myopathies to Alzheimer disease. PMID:21737534

  16. Method for the prediction of the installation aerodynamics of a propfan at subsonic speeds: User manual

    NASA Technical Reports Server (NTRS)

    Chandrasekaran, B.

    1986-01-01

    This document is the user's guide for the method developed earlier for predicting the slipstream wing interaction at subsonic speeds. The analysis involves a subsonic panel code (HESS code) modified to handle the propeller onset flow. The propfan slipstream effects are superimposed on the normal flow boundary condition and are applied over the surface washed by the slipstream. The effects of the propeller slipstream are to increase the axial induced velocity, tangential velocity, and a total pressure rise in the wake of the propeller. Principles based on blade performance theory, momentum theory, and vortex theory were used to evaluate the slipstream effects. The code can be applied to any arbitrary three dimensional geometry, expressed in the form of HESS input format. The code can handle a propeller alone configuration or a propeller/nacelle/airframe configuration, operating up to high subcritical Mach numbers over a range of angles of attack. Inclusion of a viscous modelling is briefly outlined. Wind tunnel results/theory comparisons are included as examples for the application of the code to a generic supercritical wing/overwing Nacelle with a powered propfan. A sample input/output listing is provided.

  17. Autophagy as a macrophage response to bacterial infection.

    PubMed

    Gong, Lan; Devenish, Rodney J; Prescott, Mark

    2012-09-01

    The macrophage is a key component of host defense mechanisms against pathogens. In addition to the phagocytosis of bacteria and secretion of proinflammatory mediators by macrophages, autophagy, a process involved in turnover of cellular material, is a recently identified component of the immune response to bacterial infection. Despite the bactericidal effect of autophagy, some species of intracellular bacteria are able to survive by using one or more strategies to avoid host autophagic attack. Here, we review the latest findings on the interactions between bacteria and autophagy in macrophages. Copyright © 2012 International Union of Biochemistry and Molecular Biology, Inc.

  18. Group A β-hemolytic streptococcal pharyngotonsillitis outbreak.

    PubMed

    Culqui, Dante R; Manzanares-Laya, Sandra; Van Der Sluis, Sarah Lafuente; Fanlo, Albert Anton; Comas, Rosa Bartolomé; Rossi, Marcello; Caylá, Joán A

    2014-04-01

    The aim was to describe an outbreak of group A β-hemolytic streptococcal pharyngotonsillitis in health care professionals. This is a cross-sectional descriptive study of 17 clients who dined at the same table in a restaurant in Barcelona in July 2012. The frequency, timing and severity of symptoms were analyzed, as were demographic variables and others concerning the food ingested. The attack rate was 58.8%. Six of the 10 clients were positive for group A β-hemolytic streptococcal. Six of the 13 individuals who handled the food involved in the dinner had symptoms. No association was identified with the food consumed. There is epidemiological evidence of foodborne group A β-hemolytic streptococcal transmission, but respiratory transmission could not be ruled out.

  19. Group A β-hemolytic streptococcal pharyngotonsillitis outbreak

    PubMed Central

    Culqui, Dante R; Manzanares-Laya, Sandra; Van Der Sluis, Sarah Lafuente; Fanlo, Albert Anton; Comas, Rosa Bartolomé; Rossi, Marcello; Caylá, Joán A

    2014-01-01

    The aim was to describe an outbreak of group A β-hemolytic streptococcal pharyngotonsillitis in health care professionals. This is a cross-sectional descriptive study of 17 clients who dined at the same table in a restaurant in Barcelona in July 2012. The frequency, timing and severity of symptoms were analyzed, as were demographic variables and others concerning the food ingested. The attack rate was 58.8%. Six of the 10 clients were positive for group A β-hemolytic streptococcal. Six of the 13 individuals who handled the food involved in the dinner had symptoms. No association was identified with the food consumed. There is epidemiological evidence of foodborne group A β-hemolytic streptococcal transmission, but respiratory transmission could not be ruled out. PMID:24897054

  20. RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code

    NASA Astrophysics Data System (ADS)

    Gonggrijp, Rop; Hengeveld, Willem-Jan; Hotting, Eelco; Schmidt, Sebastian; Weidemann, Frederik

    The Rijnland Internet Election System (RIES) is a system designed for voting in public elections over the internet. A rather cursory scan of the source code to RIES showed a significant lack of security-awareness among the programmers which - among other things - appears to have left RIES vulnerable to near-trivial attacks. If it had not been for independent studies finding problems, RIES would have been used in the 2008 Water Board elections, possibly handling a million votes or more. While RIES was more extensively studied to find cryptographic shortcomings, our work shows that more down-to-earth secure design practices can be at least as important, and the aspects need to be examined much sooner than right before an election.

  1. Resilience of natural gas networks during conflicts, crises and disruptions.

    PubMed

    Carvalho, Rui; Buzna, Lubos; Bono, Flavio; Masera, Marcelo; Arrowsmith, David K; Helbing, Dirk

    2014-01-01

    Human conflict, geopolitical crises, terrorist attacks, and natural disasters can turn large parts of energy distribution networks offline. Europe's current gas supply network is largely dependent on deliveries from Russia and North Africa, creating vulnerabilities to social and political instabilities. During crises, less delivery may mean greater congestion, as the pipeline network is used in ways it has not been designed for. Given the importance of the security of natural gas supply, we develop a model to handle network congestion on various geographical scales. We offer a resilient response strategy to energy shortages and quantify its effectiveness for a variety of relevant scenarios. In essence, Europe's gas supply can be made robust even to major supply disruptions, if a fair distribution strategy is applied.

  2. Design Specification for a Thrust-Vectoring, Actuated-Nose-Strake Flight Control Law for the High-Alpha Research Vehicle

    NASA Technical Reports Server (NTRS)

    Bacon, Barton J.; Carzoo, Susan W.; Davidson, John B.; Hoffler, Keith D.; Lallman, Frederick J.; Messina, Michael D.; Murphy, Patrick C.; Ostroff, Aaron J.; Proffitt, Melissa S.; Yeager, Jessie C.; hide

    1996-01-01

    Specifications for a flight control law are delineated in sufficient detail to support coding the control law in flight software. This control law was designed for implementation and flight test on the High-Alpha Research Vehicle (HARV), which is an F/A-18 aircraft modified to include an experimental multi-axis thrust-vectoring system and actuated nose strakes for enhanced rolling (ANSER). The control law, known as the HARV ANSER Control Law, was designed to utilize a blend of conventional aerodynamic control effectors, thrust vectoring, and actuated nose strakes to provide increased agility and good handling qualities throughout the HARV flight envelope, including angles of attack up to 70 degrees.

  3. Global functional analyses of cellular responses to pore-forming toxins.

    PubMed

    Kao, Cheng-Yuan; Los, Ferdinand C O; Huffman, Danielle L; Wachi, Shinichiro; Kloft, Nicole; Husmann, Matthias; Karabrahimi, Valbona; Schwartz, Jean-Louis; Bellier, Audrey; Ha, Christine; Sagong, Youn; Fan, Hui; Ghosh, Partho; Hsieh, Mindy; Hsu, Chih-Shen; Chen, Li; Aroian, Raffi V

    2011-03-01

    Here we present the first global functional analysis of cellular responses to pore-forming toxins (PFTs). PFTs are uniquely important bacterial virulence factors, comprising the single largest class of bacterial protein toxins and being important for the pathogenesis in humans of many Gram positive and Gram negative bacteria. Their mode of action is deceptively simple, poking holes in the plasma membrane of cells. The scattered studies to date of PFT-host cell interactions indicate a handful of genes are involved in cellular defenses to PFTs. How many genes are involved in cellular defenses against PFTs and how cellular defenses are coordinated are unknown. To address these questions, we performed the first genome-wide RNA interference (RNAi) screen for genes that, when knocked down, result in hypersensitivity to a PFT. This screen identifies 106 genes (∼0.5% of genome) in seven functional groups that protect Caenorhabditis elegans from PFT attack. Interactome analyses of these 106 genes suggest that two previously identified mitogen-activated protein kinase (MAPK) pathways, one (p38) studied in detail and the other (JNK) not, form a core PFT defense network. Additional microarray, real-time PCR, and functional studies reveal that the JNK MAPK pathway, but not the p38 MAPK pathway, is a key central regulator of PFT-induced transcriptional and functional responses. We find C. elegans activator protein 1 (AP-1; c-jun, c-fos) is a downstream target of the JNK-mediated PFT protection pathway, protects C. elegans against both small-pore and large-pore PFTs and protects human cells against a large-pore PFT. This in vivo RNAi genomic study of PFT responses proves that cellular commitment to PFT defenses is enormous, demonstrates the JNK MAPK pathway as a key regulator of transcriptionally-induced PFT defenses, and identifies AP-1 as the first cellular component broadly important for defense against large- and small-pore PFTs.

  4. Tissue-specific induction of Hsp90 mRNA and plasma cortisol response in chinook salmon following heat shock, seawater challenge, and handling challenge

    USGS Publications Warehouse

    Palmisano, Aldo N.; Winton, J.R.; Dickhoff, Walton W.

    2000-01-01

    In studying the whole-body response of chinook salmon (Oncorhynchus tshawytscha) to various stressors, we found that 5-hour exposure to elevated temperature (mean 21.6??C; + 10.6??C over ambient) induced a marked increase in Hsp90 messenger RNA accumulation in heart, brain, gill, muscle, liver, kidney, and tail fin tissues. The most vital tissues (heart, brain, gill, and muscle) showed the greatest Hsp90-mRNA response, with heart tissue increasing approximately 35-fold, Heat shock induced no increase in plasma cortisol. In contrast, a standard handling challenge induced high plasma cortisol levels, but no elevation in Hsp90 mRNA in any tissue, clearly separating the physiological and cellular stress responses. We saw no increase either in tissue Hsp90 mRNA levels or in plasma cortisol concentrations after exposing the fish to seawater overnight.

  5. Effect of neonatal handling on serotonin 1A sub-type receptors in the rat hippocampus.

    PubMed

    Stamatakis, A; Mantelas, A; Papaioannou, A; Pondiki, S; Fameli, M; Stylianopoulou, F

    2006-06-19

    Serotonin 1A sub-type receptors play an important role in the etiopathogenesis of depression, which is known to occur more often in females than males. Early experiences can be a predisposing factor for depression; however, the underlying cellular processes remain unknown. In an effort to address such issues, we employed neonatal handling, an experimental model of early experience, which has been previously shown to render females more vulnerable to display enhanced depression-like behavior in response to chronic stress, while it increases the ability of males to cope. In rat pre-pubertal (30 days of age) and adult (90 days) hippocampus, of both males and females, the effect of neonatal handling on serotonin 1A sub-type receptor mRNA and protein levels was determined by in situ hybridization and immunohistochemistry, respectively, while the number of binding sites was determined by in vitro autoradiography using [(3)H]8-hydroxy-2(di-n-propylamino)tetralin as the ligand. Our results revealed a significant sex difference in serotonin 1A sub-type receptor mRNA, protein and binding sites, with females having higher levels than males. Handling resulted in statistically significant decreased numbers of cells positive for serotonin 1A sub-type receptor mRNA or protein, as well as [(3)H]8-hydroxy-2(di-n-propylamino)tetralin binding sites in the area 4 of Ammon's horn and dentate gyrus of both pre-pubertal males and females. In adult animals the number of serotonin 1A sub-type receptor mRNA positive cells was increased as a result of handling in the area 1 of Ammon's horn, area 4 of Ammon's horn and dentate gyrus of males, while it was decreased only in the area 4 of Ammon's horn of females. Furthermore, the number of serotonin sub-type 1A receptor immunopositive cells, as well as [(3)H]8-hydroxy-2(di-n-propylamino)tetralin binding sites was increased in the area 1 of Ammon's horn, area 4 of Ammon's horn and dentate gyrus of handled males, whereas it was decreased in these same brain areas in the handled females. We can thus infer that neonatal handling results in alterations in postsynaptic serotonergic neurotransmission, which may contribute to the sex dimorphic effects of handling as to the vulnerability toward depression-like behavior in response to chronic stressful stimuli.

  6. Multiscale simulation of molecular processes in cellular environments.

    PubMed

    Chiricotto, Mara; Sterpone, Fabio; Derreumaux, Philippe; Melchionna, Simone

    2016-11-13

    We describe the recent advances in studying biological systems via multiscale simulations. Our scheme is based on a coarse-grained representation of the macromolecules and a mesoscopic description of the solvent. The dual technique handles particles, the aqueous solvent and their mutual exchange of forces resulting in a stable and accurate methodology allowing biosystems of unprecedented size to be simulated.This article is part of the themed issue 'Multiscale modelling at the physics-chemistry-biology interface'. © 2016 The Author(s).

  7. An epidemiological modeling and data integration framework.

    PubMed

    Pfeifer, B; Wurz, M; Hanser, F; Seger, M; Netzer, M; Osl, M; Modre-Osprian, R; Schreier, G; Baumgartner, C

    2010-01-01

    In this work, a cellular automaton software package for simulating different infectious diseases, storing the simulation results in a data warehouse system and analyzing the obtained results to generate prediction models as well as contingency plans, is proposed. The Brisbane H3N2 flu virus, which has been spreading during the winter season 2009, was used for simulation in the federal state of Tyrol, Austria. The simulation-modeling framework consists of an underlying cellular automaton. The cellular automaton model is parameterized by known disease parameters and geographical as well as demographical conditions are included for simulating the spreading. The data generated by simulation are stored in the back room of the data warehouse using the Talend Open Studio software package, and subsequent statistical and data mining tasks are performed using the tool, termed Knowledge Discovery in Database Designer (KD3). The obtained simulation results were used for generating prediction models for all nine federal states of Austria. The proposed framework provides a powerful and easy to handle interface for parameterizing and simulating different infectious diseases in order to generate prediction models and improve contingency plans for future events.

  8. Simulation of Arrhythmogenic Effect of Rogue RyRs in Failing Heart by Using a Coupled Model

    PubMed Central

    Lu, Luyao; Xia, Ling; Zhu, Xiuwei

    2012-01-01

    Cardiac cells with heart failure are usually characterized by impairment of Ca2+ handling with smaller SR Ca2+ store and high risk of triggered activities. In this study, we developed a coupled model by integrating the spatiotemporal Ca2+ reaction-diffusion system into the cellular electrophysiological model. With the coupled model, the subcellular Ca2+ dynamics and global cellular electrophysiology could be simultaneously traced. The proposed coupled model was then applied to study the effects of rogue RyRs on Ca2+ cycling and membrane potential in failing heart. The simulation results suggested that, in the presence of rogue RyRs, Ca2+ dynamics is unstable and Ca2+ waves are prone to be initiated spontaneously. These release events would elevate the membrane potential substantially which might induce delayed afterdepolarizations or triggered action potentials. Moreover, the variation of membrane potential depolarization is indicated to be dependent on the distribution density of rogue RyR channels. This study provides a new possible arrhythmogenic mechanism for heart failure from subcellular to cellular level. PMID:23056145

  9. Redox and the circadian clock in plant immunity: A balancing act.

    PubMed

    Karapetyan, Sargis; Dong, Xinnian

    2018-05-01

    Plants' reliance on sunlight for energy makes their light-driven circadian clock a critical regulator in balancing the energy needs for vital activities such as growth and defense. Recent studies show that the circadian clock acts as a strategic planner to prime active defense responses towards the morning or daytime when conditions, such as the opening of stomata required for photosynthesis, are favorable for attackers. Execution of the defense response, on the other hand, is determined according to the cellular redox state and is regulated in part by the production of reactive oxygen and nitrogen species upon pathogen challenge. The interplay between redox and the circadian clock further gates the onset of defense response to a specific time of the day to avoid conflict with growth-related activities. In this review, we focus on discussing the roles of the circadian clock as a robust overseer and the cellular redox as a dynamic executor of plant defense. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  10. Life and death of proteins: a case study of glucose-starved Staphylococcus aureus.

    PubMed

    Michalik, Stephan; Bernhardt, Jörg; Otto, Andreas; Moche, Martin; Becher, Dörte; Meyer, Hanna; Lalk, Michael; Schurmann, Claudia; Schlüter, Rabea; Kock, Holger; Gerth, Ulf; Hecker, Michael

    2012-09-01

    The cellular amount of proteins not only depends on synthesis but also on degradation. Here, we expand the understanding of differential protein levels by complementing synthesis data with a proteome-wide, mass spectrometry-based stable isotope labeling with amino acids in cell culture analysis of protein degradation in the human pathogen Staphylococcus aureus during glucose starvation. Monitoring protein stability profiles in a wild type and an isogenic clpP protease mutant revealed that 1) proteolysis mainly affected proteins with vegetative functions, anabolic and selected catabolic enzymes, whereas the expression of TCA cycle and gluconeogenesis enzymes increased; 2) most proteins were prone to aggregation in the clpP mutant; 3) the absence of ClpP correlated with protein denaturation and oxidative stress responses, deregulation of virulence factors and a CodY repression. We suggest that degradation of redundant, inactive proteins disintegrated from functional complexes and thereby amenable to proteolytic attack is a fundamental cellular process in all organisms to regain nutrients and guarantee protein homeostasis.

  11. Life and Death of Proteins: A Case Study of Glucose-starved Staphylococcus aureus*

    PubMed Central

    Michalik, Stephan; Bernhardt, Jörg; Otto, Andreas; Moche, Martin; Becher, Dörte; Meyer, Hanna; Lalk, Michael; Schurmann, Claudia; Schlüter, Rabea; Kock, Holger; Gerth, Ulf; Hecker, Michael

    2012-01-01

    The cellular amount of proteins not only depends on synthesis but also on degradation. Here, we expand the understanding of differential protein levels by complementing synthesis data with a proteome-wide, mass spectrometry-based stable isotope labeling with amino acids in cell culture analysis of protein degradation in the human pathogen Staphylococcus aureus during glucose starvation. Monitoring protein stability profiles in a wild type and an isogenic clpP protease mutant revealed that 1) proteolysis mainly affected proteins with vegetative functions, anabolic and selected catabolic enzymes, whereas the expression of TCA cycle and gluconeogenesis enzymes increased; 2) most proteins were prone to aggregation in the clpP mutant; 3) the absence of ClpP correlated with protein denaturation and oxidative stress responses, deregulation of virulence factors and a CodY repression. We suggest that degradation of redundant, inactive proteins disintegrated from functional complexes and thereby amenable to proteolytic attack is a fundamental cellular process in all organisms to regain nutrients and guarantee protein homeostasis. PMID:22556279

  12. A semi-symmetric image encryption scheme based on the function projective synchronization of two hyperchaotic systems

    PubMed Central

    Li, Jinqing; Qi, Hui; Cong, Ligang; Yang, Huamin

    2017-01-01

    Both symmetric and asymmetric color image encryption have advantages and disadvantages. In order to combine their advantages and try to overcome their disadvantages, chaos synchronization is used to avoid the key transmission for the proposed semi-symmetric image encryption scheme. Our scheme is a hybrid chaotic encryption algorithm, and it consists of a scrambling stage and a diffusion stage. The control law and the update rule of function projective synchronization between the 3-cell quantum cellular neural networks (QCNN) response system and the 6th-order cellular neural network (CNN) drive system are formulated. Since the function projective synchronization is used to synchronize the response system and drive system, Alice and Bob got the key by two different chaotic systems independently and avoid the key transmission by some extra security links, which prevents security key leakage during the transmission. Both numerical simulations and security analyses such as information entropy analysis, differential attack are conducted to verify the feasibility, security, and efficiency of the proposed scheme. PMID:28910349

  13. Regulatory mechanisms of thiol-based redox sensors: lessons learned from structural studies on prokaryotic redox sensors.

    PubMed

    Lee, Sang Jae; Kim, Dong-Gyun; Lee, Kyu-Yeon; Koo, Ji Sung; Lee, Bong-Jin

    2018-05-17

    Oxidative stresses, such as reactive oxygen species, reactive electrophilic species, reactive nitrogen species, and reactive chlorine species, can damage cellular components, leading to cellular malfunction and death. In response to oxidative stress, bacteria have evolved redox-responsive sensors that enable them to simultaneously monitor and eradicate potential oxidative stress. Specifically, redox-sensing transcription regulators react to oxidative stress by means of modifying the thiol groups of cysteine residues, functioning as part of an efficient survival mechanism for many bacteria. In general, oxidative molecules can induce changes in the three-dimensional structures of redox sensors, which, in turn, affects the transcription of specific genes in detoxification pathways and defense mechanisms. Moreover, pathogenic bacteria utilize these redox sensors for adaptation and to evade subsequent oxidative attacks from host immune defense. For this reason, the redox sensors of pathogenic bacteria are potential antibiotic targets. Understanding the regulatory mechanisms of thiol-based redox sensors in bacteria will provide insight and knowledge into the discovery of new antibiotics.

  14. Gout.

    PubMed

    Pascual, Eliseo; Pedraz, Teresa

    2004-05-01

    We have reviewed the latest publications on epidemiology of gout; also there have been new insights into the regulation of the inflammation resulting from the regular interaction occurring between MSU crystals and cells in both asymptomatic and symptomatic gouty joints. Finally we review different publications of clinical interest. The incidence of gout has been found to be increasing, and the disease starts at an earlier age; this likely relates to changes in dietary habits that lead to the development of the insulin resistance syndrome to which hyperuricemia, and thus gout, relates. Dietary modifications to correct the insulin resistance syndrome and reduce uricemia by increasing renal clearance of urate have heath consequences that go far beyond their beneficial effect on gout. Monosodium urate crystals and cells interact in the asymptomatic joints of gouty patients. The mechanisms that trigger a gouty attack with this background and those responsible for the self-limitation of gouty attacks are not understood. The degree of maturation of the monocytes-macrophages present in the fluid appears to modulate the consequences of the crystal-cell interaction and gives a hint of how from the crystal-cell interaction may result in such divergent consequences as intense inflammation or the absence of symptoms. Interest in gout treatment continues, as shown by the number of papers on the subject reviewed. In most cases, gout is an easy disease to treat, but we do not have enough information about how to handle those few patients with "difficult" disease, and what we refer colloquially to as difficult gout has not been properly defined yet. Gout incidence and severity appear to be increasing likely in relation to dietary habits. Switching the pattern of secretion of inflammatory mediators with maturating macrophages which contain MSU crystals may be the key to self limitation of gouty attacks. We must define better which gout is a "difficult" one.

  15. Simulated airplane headache: a proxy towards identification of underlying mechanisms.

    PubMed

    Bui, Sebastian Bao Dinh; Petersen, Torben; Poulsen, Jeppe Nørgaard; Gazerani, Parisa

    2017-12-01

    Airplane Headache (AH) occurs during flights and often appears as an intense, short lasting headache during take-off or landing. Reports are limited on pathological mechanisms underlying the occurrence of this headache. Proper diagnosis and treatments would benefit from identification of potential pathways involved in AH pathogenesis. This study aimed at providing a simulated airplane headache condition as a proxy towards identification of its underlying mechanisms. Fourteen participants including 7 volunteers suffering from AH and 7 healthy matched controls were recruited after meeting the diagnostic and safety criteria based on an approved study protocol. Simulation of AH was achieved by entering a pressure chamber with similar characteristics of an airplane flight. Selected potential biomarkers including salivary prostaglandin E 2 (PGE 2 ), cortisol, facial thermo-images, blood pressure, pulse, and saturation pulse oxygen (SPO) were defined and values were collected before, during and after flight simulation in the pressure chamber. Salivary samples were analyzed with ELISA techniques, while data analysis and statistical tests were handled with SPSS version 22.0. All participants in the AH-group experienced a headache attack similar to AH experience during flight. The non-AH-group did not experience any headaches. Our data showed that the values for PGE 2 , cortisol and SPO were significantly different in the AH-group in comparison with the non-AH-group during the flight simulation in the pressure chamber. The pressure chamber proved useful not only to provoke AH-like attack but also to study potential biomarkers for AH in this study. PGE 2 , and cortisol levels together with SPO presented dysregulation during the simulated AH-attack in affected individuals compared with healthy controls. Based on these findings we propose to use pressure chamber as a model to induce AH, and thus assess new potential biomarkers for AH in future studies.

  16. Thermodynamic perspectives on genetic instructions, the laws of biology, diseased states and human population control

    PubMed Central

    Saier, M. H.

    2014-01-01

    This article examines in a broad perspective entropy and some examples of its relationship to evolution, genetic instructions and how we view diseases. Many knowledge gaps abound, hence our understanding is still fragmented and incomplete. Living organisms are programmed by functional genetic instructions (FGI), through cellular communication pathways, to grow and reproduce by maintaining a variety of hemistable, ordered structures (low entropy). Living organisms are far from equilibrium with their surrounding environmental systems, which tends towards increasing disorder (increasing entropy). Organisms must free themselves from high entropy (high disorder) to maintain their cellular structures for a period of time sufficient enough to allow reproduction and the resultant offspring to reach reproductive ages. This time interval varies for different species. Bacteria, for example need no sexual parents; dividing cells are nearly identical to the previous generation of cells, and can begin a new cell cycle without delay under appropriate conditions. By contrast, human infants require years of care before they can reproduce. Living organisms maintain order in spite of their changing surrounding environment, that decreases order according to the second law of thermodynamics. These events actually work together since living organisms create ordered biological structures by increasing local entropy. From a disease perspective, viruses and other disease agents interrupt the normal functioning of cells. The pressure for survival may result in mechanisms that allow organisms to resist attacks by viruses, other pathogens, destructive chemicals and physical agents such as radiation. However, when the attack is successful, the organism can be damaged until the cell, tissue, organ or entire organism is no longer functional and entropy increases. PMID:21262480

  17. Intelligence-aided multitarget tracking for urban operations - a case study: counter terrorism

    NASA Astrophysics Data System (ADS)

    Sathyan, T.; Bharadwaj, K.; Sinha, A.; Kirubarajan, T.

    2006-05-01

    In this paper, we present a framework for tracking multiple mobile targets in an urban environment based on data from multiple sources of information, and for evaluating the threat these targets pose to assets of interest (AOI). The motivating scenario is one where we have to track many targets, each with different (unknown) destinations and/or intents. The tracking algorithm is aided by information about the urban environment (e.g., road maps, buildings, hideouts), and strategic and intelligence data. The tracking algorithm needs to be dynamic in that it has to handle a time-varying number of targets and the ever-changing urban environment depending on the locations of the moving objects and AOI. Our solution uses the variable structure interacting multiple model (VS-IMM) estimator, which has been shown to be effective in tracking targets based on road map information. Intelligence information is represented as target class information and incorporated through a combined likelihood calculation within the VS-IMM estimator. In addition, we develop a model to calculate the probability that a particular target can attack a given AOI. This model for the calculation of the probability of attack is based on the target kinematic and class information. Simulation results are presented to demonstrate the operation of the proposed framework on a representative scenario.

  18. Development of ADOCS controllers and control laws. Volume 2: Literature review and preliminary analysis

    NASA Technical Reports Server (NTRS)

    Landis, Kenneth H.; Glusman, Steven I.

    1985-01-01

    The Advanced Cockpit Controls/Advanced Flight Control System (ACC/AFCS) study was conducted by the Boeing Vertol Company as part of the Army's Advanced Digital/Optical Control System (ADOCS) program. Specifically, the ACC/AFCS investigation was aimed at developing the flight control laws for the ADOCS demonstrator aircraft which will provide satisfactory handling qualities for an attack helicopter mission. The three major elements of design considered are as follows: Pilot's integrated Side-Stick Controller (SSC) -- Number of axes controlled; force/displacement characteristics; ergonomic design. Stability and Control Augmentation System (SCAS)--Digital flight control laws for the various mission phases; SCAS mode switching logic. Pilot's Displays--For night/adverse weather conditions, the dynamics of the superimposed symbology presented to the pilot in a format similar to the Advanced Attack Helicopter (AAH) Pilot Night Vision System (PNVS) for each mission phase as a function of ACAS characteristics; display mode switching logic. Findings from the literature review and the analysis and synthesis of desired control laws are reported in Volume 2. Conclusions drawn from pilot rating data and commentary were used to formulate recommendations for the ADOCS demonstrator flight control system design. The ACC/AFCS simulation data also provide an extensive data base to aid the development of advanced flight control system design for future V/STOL aircraft.

  19. Development of ADOCS controllers and control laws. Volume 1: Executive summary

    NASA Technical Reports Server (NTRS)

    Landis, Kenneth H.; Glusman, Steven I.

    1985-01-01

    The Advanced Cockpit Controls/Advanced Flight Control System (ACC/AFCS) study was conducted by the Boeing Vertol Company as part of the Army's Advanced Digital/Optical Control System (ADOCS) program. Specifically, the ACC/AFCS investigation was aimed at developing the flight control laws for the ADOCS demonstrator aircraft that will provide satisfactory handling qualities for an attack helicopter mission. The three major elements of design considered during the study are as follows: Pilot's integrated Side-Stick Controller (SSC) -- Number of axes controlled; force/displacement characteristics; ergonomic design. Stability and Control Augmentation System (SCAS)--Digital flight control laws for the various mission phases; SCAS mode switching logic. Pilot's Displays--For night/adverse weather conditions, the dynamics of the superimposed symbology presented to the pilot in a format similar to the Advanced Attack Helicopter (AAH) Pilot Night Vision System (PNVS) for each mission phase as a function of SCAS characteristics; display mode switching logic. Volume 1 is an Executive Summary of the study. Conclusions drawn from analysis of pilot rating data and commentary were used to formulate recommendations for the ADOCS demonstrator flight control system design. The ACC/AFCS simulation data also provide an extensive data base to aid the development of advanced flight control system design for future V/STOL aircraft.

  20. Cyber secure systems approach for NPP digital control systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCreary, T. J.; Hsu, A.

    2006-07-01

    Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less

  1. Guns in young hands: a survey of urban teenagers' attitudes and behaviors related to handgun violence.

    PubMed

    Bergstein, J M; Hemenway, D; Kennedy, B; Quaday, S; Ander, R

    1996-11-01

    To determine the nature and causes of gun violence among urban young people. We conducted a confidential survey of 1,219 7th and 10th graders in Boston and Milwaukee, regarding their attitudes and behaviors toward violence and handguns. Twenty-nine percent have had a member of their immediate family shot, 42% could get a gun if they wanted, 28% have handled a gun without adult knowledge or supervision, 17% have carried a concealed gun, and 3% reported bringing a gun to school in the past 30 days. Nine percent admitted smoking cigarettes in the past week, 11% admitted smoking marijuana. Twenty-five percent were attacked or threatened within the past year. Reasons for gun carrying were mostly related to perceived safety/threats/revenge (73%), followed by casual handling (17%), hunting (4%), being cool (3%), target practice (2%), and gangs (1%). The following factors were significantly correlated with gun handling by chi 2 analysis, at p < 0.001 (percentage of respondents admitting unsupervised gun handling shown in parentheses): male (39%) versus female (19%); 10th graders (35%) versus 7th graders (24%) seat-belt nonusers (35%) versus users (20%); students who state they have poor grades (39%) versus good grades (26%); cigarette smokers (61%) versus nonsmokers (25%); have a gun in the home (46%) versus no gun in the home (23%). Also strongly correlated in multivariate analysis were violence exposure, having been arrested, and beliefs that "gun carrying is a good idea," or that "only cowards back down from a fight." Handgun availability and use are high among urban youth; gun carrying is mostly related to safety concerns and easy access, rather than to hunting or sport. This may be a cause of high handgun injury rates in this group. Gun injury prevention programs must address youth safety concerns along with handgun availability.

  2. A new JPEG-based steganographic algorithm for mobile devices

    NASA Astrophysics Data System (ADS)

    Agaian, Sos S.; Cherukuri, Ravindranath C.; Schneider, Erik C.; White, Gregory B.

    2006-05-01

    Currently, cellular phones constitute a significant portion of the global telecommunications market. Modern cellular phones offer sophisticated features such as Internet access, on-board cameras, and expandable memory which provide these devices with excellent multimedia capabilities. Because of the high volume of cellular traffic, as well as the ability of these devices to transmit nearly all forms of data. The need for an increased level of security in wireless communications is becoming a growing concern. Steganography could provide a solution to this important problem. In this article, we present a new algorithm for JPEG-compressed images which is applicable to mobile platforms. This algorithm embeds sensitive information into quantized discrete cosine transform coefficients obtained from the cover JPEG. These coefficients are rearranged based on certain statistical properties and the inherent processing and memory constraints of mobile devices. Based on the energy variation and block characteristics of the cover image, the sensitive data is hidden by using a switching embedding technique proposed in this article. The proposed system offers high capacity while simultaneously withstanding visual and statistical attacks. Based on simulation results, the proposed method demonstrates an improved retention of first-order statistics when compared to existing JPEG-based steganographic algorithms, while maintaining a capacity which is comparable to F5 for certain cover images.

  3. Mitochondrial Dysregulation and Protection in Cisplatin Nephrotoxicity

    PubMed Central

    Yang, Yuan; Liu, Hong; Liu, Fuyou; Dong, Zheng

    2014-01-01

    Nephrotoxicity is a major side effect of cisplatin in chemotherapy. Pathologically, cisplatin nephrotoxicity is characterized by cell injury and death in renal tubules. The research in the past decade has gained significant understanding of the cellular and molecular mechanisms of tubular cell death, revealing a central role of mitochondrial dysregulation. The pathological changes of mitochondria in cisplatin nephrotoxicity are mainly triggered by DNA damage response, pro-apoptotic protein attack, disruption of mitochondrial dynamics, and oxidative stress. As such, inhibitory strategies targeting these cytotoxic events may provide renal protection. Nonetheless, ideal approaches for renoprotection should not only protect kidneys but also enhance the anti-cancer efficacy of cisplatin in chemotherapy. PMID:24859930

  4. Deciphering plant-pathogen communication: fresh perspectives for molecular resistance breeding.

    PubMed

    Hammond-Kosack, Kim E; Parker, Jane E

    2003-04-01

    Activation of local and systemic plant defences in response to pathogen attack involves dramatic cellular reprogramming. Over the past 10 years many novel genes, proteins and molecules have been discovered as a result of investigating plant-pathogen interactions. Most attempts to harness this knowledge to engineer improved disease resistance in crops have failed. Although gene efficacy in transgenic plants has often been good, commercial exploitation has not been possible because of the detrimental effects on plant growth, development and crop yield. Biotechnology approaches have now shifted emphasis towards marker-assisted breeding and the construction of vectors containing highly regulated transgenes that confer resistance in several distinct ways.

  5. Regenerator matrix physical property data

    NASA Technical Reports Server (NTRS)

    Fucinari, C. A.

    1980-01-01

    Among several cellular ceramic structures manufactured by various suppliers for regenerator application in a gas turbine engine, three have the best potential for achieving durability and performance objectives for use in gas turbines, Stirling engines, and waste heat recovery systems: (1) an aluminum-silicate sinusoidal flow passage made from a corrugated wate paper process; (2) an extruded isosceles triangle flow passage; and (3) a second generation matrix incorporating a square flow passage formed by an embossing process. Key physical and thermal property data for these configurations presented include: heat transfer and pressure drop characteristics, compressive strength, tensile strength and elasticity, thermal expansion characteristics, chanical attack, and thermal stability.

  6. Free-flight investigation of the stability and control characteristics of a STOL model with an externally blown jet flap

    NASA Technical Reports Server (NTRS)

    Parlett, L. P.; Emerling, S. J.; Phelps, A. E., III

    1974-01-01

    The stability and control characteristics of a four-engine turbofan STOL transport model having an externally blown jet flap have been investigated by means of the flying-model technique in the Langley full-scale tunnel. The flight characteristics of the model were investigated under conditions of symmetric and asymmetric (one engine inoperative) thrust at lift coefficients up to 9.5 and 5.5, respectively. Static characteristics were studied by conventional power-on force tests over the flight-test angle-of-attack range including the stall. In addition to these tests, dynamic longitudinal and lateral stability calculations were performed for comparison with the flight-test results and for use in correlating the model results with STOL handling-qualities criteria.

  7. Special report. The Oklahoma City bombing: mass casualties and the local hospital response.

    PubMed

    1995-09-01

    A morning blast at the Alfred P. Murrah Federal Building, Oklahoma City, OK, on April 19, 1995, killed 168 persons and injured more than 500 in the worst terrorist attack in U.S. history. Hospital workers, physicians, and volunteers at nine hospitals there mobilized, put their disaster emergency plans into operation, and treated 466 persons in emergency rooms--many of them later being admitted as patients. To complicate matters, two of the hospitals received bomb threats called in after the disaster. This report will look at the security plans put into force by each of the nine hospitals; the handling of the great influx of persons, including victims, relatives, friends, concerned persons, volunteers, and the news media; and the lessons hospital officials learned from their experiences.

  8. A review of supersonic cruise flight path control experience with the YF-12 aircraft

    NASA Technical Reports Server (NTRS)

    Berry, D. T.; Gilyard, G. B.

    1976-01-01

    Flight research with the YF-12 aircraft indicates that solutions to many handling qualities problems of supersonic cruise are at hand. Airframe/propulsion system interactions in the Dutch roll mode can be alleviated by the use of passive filters or additional feedback loops in the propulsion and flight control systems. Mach and altitude excursions due to atmospheric temperature fluctuations can be minimized by the use of a cruise autothrottle. Autopilot instabilities in the altitude hold mode have been traced to angle of attack-sensitive static ports on the compensated nose boom. For the YF-12, the feedback of high-passed pitch rate to the autopilot resolves this problem. Manual flight path control is significantly improved by the use of an inertial rate of climb display in the cockpit.

  9. Manipulation of cells with laser microbeam scissors and optical tweezers: a review

    NASA Astrophysics Data System (ADS)

    Greulich, Karl Otto

    2017-02-01

    The use of laser microbeams and optical tweezers in a wide field of biological applications from genomic to immunology is discussed. Microperforation is used to introduce a well-defined amount of molecules into cells for genetic engineering and optical imaging. The microwelding of two cells induced by a laser microbeam combines their genetic outfit. Microdissection allows specific regions of genomes to be isolated from a whole set of chromosomes. Handling the cells with optical tweezers supports investigation on the attack of immune systems against diseased or cancerous cells. With the help of laser microbeams, heart infarction can be simulated, and optical tweezers support studies on the heartbeat. Finally, laser microbeams are used to induce DNA damage in living cells for studies on cancer and ageing.

  10. Resilience of Natural Gas Networks during Conflicts, Crises and Disruptions

    PubMed Central

    Carvalho, Rui; Buzna, Lubos; Bono, Flavio; Masera, Marcelo; Arrowsmith, David K.; Helbing, Dirk

    2014-01-01

    Human conflict, geopolitical crises, terrorist attacks, and natural disasters can turn large parts of energy distribution networks offline. Europe's current gas supply network is largely dependent on deliveries from Russia and North Africa, creating vulnerabilities to social and political instabilities. During crises, less delivery may mean greater congestion, as the pipeline network is used in ways it has not been designed for. Given the importance of the security of natural gas supply, we develop a model to handle network congestion on various geographical scales. We offer a resilient response strategy to energy shortages and quantify its effectiveness for a variety of relevant scenarios. In essence, Europe's gas supply can be made robust even to major supply disruptions, if a fair distribution strategy is applied. PMID:24621655

  11. Information jet: Handling noisy big data from weakly disconnected network

    NASA Astrophysics Data System (ADS)

    Aurongzeb, Deeder

    Sudden aggregation (information jet) of large amount of data is ubiquitous around connected social networks, driven by sudden interacting and non-interacting events, network security threat attacks, online sales channel etc. Clustering of information jet based on time series analysis and graph theory is not new but little work is done to connect them with particle jet statistics. We show pre-clustering based on context can element soft network or network of information which is critical to minimize time to calculate results from noisy big data. We show difference between, stochastic gradient boosting and time series-graph clustering. For disconnected higher dimensional information jet, we use Kallenberg representation theorem (Kallenberg, 2005, arXiv:1401.1137) to identify and eliminate jet similarities from dense or sparse graph.

  12. Designing a mathematical model for integrating dynamic cellular manufacturing into supply chain system

    NASA Astrophysics Data System (ADS)

    Aalaei, Amin; Davoudpour, Hamid

    2012-11-01

    This article presents designing a new mathematical model for integrating dynamic cellular manufacturing into supply chain system with an extensive coverage of important manufacturing features consideration of multiple plants location, multi-markets allocation, multi-period planning horizons with demand and part mix variation, machine capacity, and the main constraints are demand of markets satisfaction in each period, machine availability, machine time-capacity, worker assignment, available time of worker, production volume for each plant and the amounts allocated to each market. The aim of the proposed model is to minimize holding and outsourcing costs, inter-cell material handling cost, external transportation cost, procurement & maintenance and overhead cost of machines, setup cost, reconfiguration cost of machines installation and removal, hiring, firing and salary worker costs. Aimed to prove the potential benefits of such a design, presented an example is shown using a proposed model.

  13. Cell Signaling Experiments Driven by Optical Manipulation

    PubMed Central

    Difato, Francesco; Pinato, Giulietta; Cojoc, Dan

    2013-01-01

    Cell signaling involves complex transduction mechanisms in which information released by nearby cells or extracellular cues are transmitted to the cell, regulating fundamental cellular activities. Understanding such mechanisms requires cell stimulation with precise control of low numbers of active molecules at high spatial and temporal resolution under physiological conditions. Optical manipulation techniques, such as optical tweezing, mechanical stress probing or nano-ablation, allow handling of probes and sub-cellular elements with nanometric and millisecond resolution. PicoNewton forces, such as those involved in cell motility or intracellular activity, can be measured with femtoNewton sensitivity while controlling the biochemical environment. Recent technical achievements in optical manipulation have new potentials, such as exploring the actions of individual molecules within living cells. Here, we review the progress in optical manipulation techniques for single-cell experiments, with a focus on force probing, cell mechanical stimulation and the local delivery of active molecules using optically manipulated micro-vectors and laser dissection. PMID:23698758

  14. Predatory functional response and prey choice identify predation differences between native/invasive and parasitised/unparasitised crayfish.

    PubMed

    Haddaway, Neal R; Wilcox, Ruth H; Heptonstall, Rachael E A; Griffiths, Hannah M; Mortimer, Robert J G; Christmas, Martin; Dunn, Alison M

    2012-01-01

    Invasive predators may change the structure of invaded communities through predation and competition with native species. In Europe, the invasive signal crayfish Pacifastacus leniusculus is excluding the native white clawed crayfish Austropotamobius pallipes. This study compared the predatory functional responses and prey choice of native and invasive crayfish and measured impacts of parasitism on the predatory strength of the native species. Invasive crayfish showed a higher (>10%) prey (Gammarus pulex) intake rate than (size matched) natives, reflecting a shorter (16%) prey handling time. The native crayfish also showed greater selection for crustacean prey over molluscs and bloodworm, whereas the invasive species was a more generalist predator. A. pallipes parasitised by the microsporidian parasite Thelohania contejeani showed a 30% reduction in prey intake. We suggest that this results from parasite-induced muscle damage, and this is supported by a reduced (38%) attack rate and increased (30%) prey handling time. Our results indicate that the per capita (i.e., functional response) difference between the species may contribute to success of the invader and extinction of the native species, as well as decreased biodiversity and biomass in invaded rivers. In addition, the reduced predatory strength of parasitized natives may impair their competitive abilities, facilitating exclusion by the invader.

  15. A secure cluster-based multipath routing protocol for WMSNs.

    PubMed

    Almalkawi, Islam T; Zapata, Manel Guerrero; Al-Karaki, Jamal N

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  16. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    PubMed Central

    Almalkawi, Islam T.; Zapata, Manel Guerrero; Al-Karaki, Jamal N.

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption. PMID:22163854

  17. Building a mechanistic understanding of predation with GPS-based movement data.

    PubMed

    Merrill, Evelyn; Sand, Håkan; Zimmermann, Barbara; McPhee, Heather; Webb, Nathan; Hebblewhite, Mark; Wabakken, Petter; Frair, Jacqueline L

    2010-07-27

    Quantifying kill rates and sources of variation in kill rates remains an important challenge in linking predators to their prey. We address current approaches to using global positioning system (GPS)-based movement data for quantifying key predation components of large carnivores. We review approaches to identify kill sites from GPS movement data as a means to estimate kill rates and address advantages of using GPS-based data over past approaches. Despite considerable progress, modelling the probability that a cluster of GPS points is a kill site is no substitute for field visits, but can guide our field efforts. Once kill sites are identified, time spent at a kill site (handling time) and time between kills (killing time) can be determined. We show how statistical models can be used to investigate the influence of factors such as animal characteristics (e.g. age, sex, group size) and landscape features on either handling time or killing efficiency. If we know the prey densities along paths to a kill, we can quantify the 'attack success' parameter in functional response models directly. Problems remain in incorporating the behavioural complexity derived from GPS movement paths into functional response models, particularly in multi-prey systems, but we believe that exploring the details of GPS movement data has put us on the right path.

  18. An Approximation Solution to Refinery Crude Oil Scheduling Problem with Demand Uncertainty Using Joint Constrained Programming

    PubMed Central

    Duan, Qianqian; Yang, Genke; Xu, Guanglin; Pan, Changchun

    2014-01-01

    This paper is devoted to develop an approximation method for scheduling refinery crude oil operations by taking into consideration the demand uncertainty. In the stochastic model the demand uncertainty is modeled as random variables which follow a joint multivariate distribution with a specific correlation structure. Compared to deterministic models in existing works, the stochastic model can be more practical for optimizing crude oil operations. Using joint chance constraints, the demand uncertainty is treated by specifying proximity level on the satisfaction of product demands. However, the joint chance constraints usually hold strong nonlinearity and consequently, it is still hard to handle it directly. In this paper, an approximation method combines a relax-and-tight technique to approximately transform the joint chance constraints to a serial of parameterized linear constraints so that the complicated problem can be attacked iteratively. The basic idea behind this approach is to approximate, as much as possible, nonlinear constraints by a lot of easily handled linear constraints which will lead to a well balance between the problem complexity and tractability. Case studies are conducted to demonstrate the proposed methods. Results show that the operation cost can be reduced effectively compared with the case without considering the demand correlation. PMID:24757433

  19. Stability and Control Analysis of the F-15B Quiet SpikeTM Aircraft

    NASA Technical Reports Server (NTRS)

    McWherter, Shaun C.; Moua, Cheng M.; Gera, Joseph; Cox, Timothy H.

    2009-01-01

    The primary purpose of the Quiet Spike(TradeMark) flight research program was to analyze the aerodynamic, structural, and mechanical proof-of-concept of a large multi-stage telescoping nose spike installed on the National Aeronautics and Space Administration Dryden Flight Research Center (Edwards, California) F-15B airplane. This report describes the preflight stability and control analysis performed to assess the effect of the spike on the stability, controllability, and handling qualities of the airplane; and to develop an envelope expansion approach to maintain safety of flight. The overall flight test objective was to collect flight data to validate the spike structural dynamics and loads model up to Mach 1.8. Other objectives included validating the mechanical feasibility of a morphing fuselage at operational conditions and determining the near-field shock wave characterization. The two main issues relevant to the stability and control objectives were the effects of the spike-influenced aerodynamics on the F-15B airplane flight dynamics, and the air data and angle-of-attack sensors. The analysis covered the sensitivity of the stability margins, and the handling qualities due to aerodynamic variation and the maneuvering limitations of the F-15B Quiet Spike configuration. The results of the analysis and the implications for the flight test program are also presented.

  20. An approximation solution to refinery crude oil scheduling problem with demand uncertainty using joint constrained programming.

    PubMed

    Duan, Qianqian; Yang, Genke; Xu, Guanglin; Pan, Changchun

    2014-01-01

    This paper is devoted to develop an approximation method for scheduling refinery crude oil operations by taking into consideration the demand uncertainty. In the stochastic model the demand uncertainty is modeled as random variables which follow a joint multivariate distribution with a specific correlation structure. Compared to deterministic models in existing works, the stochastic model can be more practical for optimizing crude oil operations. Using joint chance constraints, the demand uncertainty is treated by specifying proximity level on the satisfaction of product demands. However, the joint chance constraints usually hold strong nonlinearity and consequently, it is still hard to handle it directly. In this paper, an approximation method combines a relax-and-tight technique to approximately transform the joint chance constraints to a serial of parameterized linear constraints so that the complicated problem can be attacked iteratively. The basic idea behind this approach is to approximate, as much as possible, nonlinear constraints by a lot of easily handled linear constraints which will lead to a well balance between the problem complexity and tractability. Case studies are conducted to demonstrate the proposed methods. Results show that the operation cost can be reduced effectively compared with the case without considering the demand correlation.

  1. Prey size selection and cannibalistic behaviour of juvenile barramundi Lates calcarifer.

    PubMed

    Ribeiro, F F; Qin, J G

    2015-05-01

    This study assessed the cannibalistic behaviour of juvenile barramundi Lates calcarifer and examined the relationship between prey size selection and energy gain of cannibals. Prey handling time and capture success by cannibals were used to estimate the ratio of energy gain to energy cost in prey selection. Cannibals selected smaller prey despite its capability of ingesting larger prey individuals. In behavioural analysis, prey handling time significantly increased with prey size, but it was not significantly affected by cannibal size. Conversely, capture success significantly decreased with the increase of both prey and cannibal sizes. The profitability indices showed that the smaller prey provides the most energy return for cannibals of all size classes. These results indicate that L. calcarifer cannibals select smaller prey for more profitable return. The behavioural analysis, however, indicates that L. calcarifer cannibals attack prey of all size at a similar rate but ingest smaller prey more often, suggesting that prey size selection is passively orientated rather than at the predator's choice. The increase of prey escape ability and morphological constraint contribute to the reduction of intracohort cannibalism as fish grow larger. This study contributes to the understanding of intracohort cannibalism and development of strategies to reduce fish cannibalistic mortalities. © 2015 The Fisheries Society of the British Isles.

  2. Inhibitory effect of melatonin on necroptosis via repressing the Ripk3-PGAM5-CypD-mPTP pathway attenuates cardiac microvascular ischemia reperfusion injury.

    PubMed

    Zhou, Hao; Li, Dandan; Zhu, Pingjun; Ma, Qiang; Sam, Toan; Wang, Jin; Hu, Shunying; Chen, Yundai; Zhang, Yingmei

    2018-05-16

    The molecular features of necroptosis in cardiac ischemia reperfusion (IR) injury have been extensively explored. However, there have been no studies investigating the physiological regulatory mechanisms of melatonin acting on necroptosis in cardiac IR injury. This study was designed to determine the role of necroptosis in microvascular IR injury, and investigate the contribution of melatonin in repressing necroptosis and preventing IR-mediated endothelial system collapse. Our results demonstrated that Ripk3 was primarily activated by IR injury and consequently aggravated endothelial necroptosis, microvessel barrier dysfunction, capillary hyperpermeability, the inflammation response, microcirculatory vasospasms and microvascular perfusion defects. However, administration of melatonin prevented Ripk3 activation and provided a pro-survival advantage for the endothelial system in the context of cardiac IR injury, similar to the results obtained via genetic ablation of Ripk3. Functional investigations clearly illustrated that activated Ripk3 upregulated PGAM5 expression, and the latter repressed CypD phosphorylation, which obligated endothelial cells to undergo necroptosis via augmenting mPTP (mitochondrial permeability transition pore) opening. Interestingly, melatonin supplementation suppressed mPTP opening and interrupted endothelial necroptosis via blocking the Ripk3-PGAM5-CypD signal pathways. Taken together, our studies identified the Ripk3-PGAM5-CypD-mPTP axis as a new pathway responsible for reperfusion-mediated microvascular damage via initiating endothelial necroptosis. In contrast, melatonin treatment inhibited the Ripk3-PGAM5-CypD-mPTP cascade and thus reduced cellular necroptosis, conferring a protective advantage to the endothelial system in IR stress. These findings establish a new paradigm in microvascular IR injury and update the concept for cell death management handled by melatonin under the burden of reperfusion attack. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  3. Determination of the mechanical properties of solid and cellular polymeric dosage forms by diametral compression.

    PubMed

    Blaesi, Aron H; Saka, Nannaji

    2016-07-25

    At present, the immediate-release solid dosage forms, such as the oral tablets and capsules, are granular solids. They release drug rapidly and have adequate mechanical properties, but their manufacture is fraught with difficulties inherent in processing particulate matter. Such difficulties, however, could be overcome by liquid-based processing. Therefore, we have recently introduced polymeric cellular (i.e., highly porous) dosage forms prepared from a melt process. Experiments have shown that upon immersion in a dissolution medium, the cellular dosage forms with polyethylene glycol (PEG) as excipient and with predominantly open-cell topology disintegrate by exfoliation, thus enabling rapid drug release. If the volume fraction of voids of the open-cell structures is too large, however, their mechanical strength is adversely affected. At present, the common method for determining the tensile strength of brittle, solid dosage forms (such as select granular forms) is the diametral compression test. In this study, the theory of diametral compression is first refined to demonstrate that the relevant mechanical properties of ductile and cellular solids (i.e., the elastic modulus and the yield strength) can also be extracted from this test. Diametral compression experiments are then conducted on PEG-based solid and cellular dosage forms. It is found that the elastic modulus and yield strength of the open-cell structures are about an order of magnitude smaller than those of the non-porous solids, but still are substantially greater than the stiffness and strength requirements for handling the dosage forms manually. This work thus demonstrates that melt-processed polymeric cellular dosage forms that release drug rapidly can be designed and manufactured to have adequate mechanical properties. Copyright © 2016. Published by Elsevier B.V.

  4. Automated Cellient(™) cytoblocks: better, stronger, faster?

    PubMed

    Prendeville, S; Brosnan, T; Browne, T J; McCarthy, J

    2014-12-01

    Cytoblocks (CBs), or cell blocks, provide additional morphological detail and a platform for immunocytochemistry (ICC) in cytopathology. The Cellient(™) system produces CBs in 45 minutes using methanol fixation, compared with traditional CBs, which require overnight formalin fixation. This study compares Cellient and traditional CB methods in terms of cellularity, morphology and immunoreactivity, evaluates the potential to add formalin fixation to the Cellient method for ICC studies and determines the optimal sectioning depth for maximal cellularity in Cellient CBs. One hundred and sixty CBs were prepared from 40 cytology samples (32 malignant, eight benign) using four processing methods: (A) traditional; (B) Cellient (methanol fixation); (C) Cellient using additional formalin fixation for 30 minutes; (D) Cellient using additional formalin fixation for 60 minutes. Haematoxylin and eosin-stained sections were assessed for cellularity and morphology. ICC was assessed on 14 cases with a panel of antibodies. Three additional Cellient samples were serially sectioned to determine the optimal sectioning depth. Scoring was performed by two independent, blinded reviewers. For malignant cases, morphology was superior with Cellient relative to traditional CBs (P < 0.001). Cellularity was comparable across all methods. ICC was excellent in all groups and the addition of formalin at any stage during the Cellient process did not influence the staining quality. Serial sectioning through Cellient CBs showed optimum cellularity at 30-40 μm with at least 27 sections obtainable. Cellient CBs provide superior morphology to traditional CBs and, if required, formalin fixation may be added to the Cellient process for ICC. Optimal Cellient CB cellularity is achieved at 30-40 μm, which will impact on the handling of cases in daily practice. © 2014 John Wiley & Sons Ltd.

  5. Design and Fabrication of an MRI-Compatible, Autonomous Incubation System.

    PubMed

    Khalilzad-Sharghi, Vahid; Xu, Huihui

    2015-10-01

    Tissue engineers have long sought access to an autonomous, imaging-compatible tissue incubation system that, with minimum operator handling, can provide real-time visualization and quantification of cells, tissue constructs, and organs. This type of screening system, capable of operating noninvasively to validate tissue, can overcome current limitations like temperature shock, unsustainable cellular environments, sample contamination, and handling/stress. However, this type of system has been a major challenge, until now. Here, we describe the design, fabrication, and characterization of an innovative, autonomous incubation system that is compatible with a 9.4 T magnetic resonance imaging (MRI) scanner. Termed the e-incubator (patent pending; application number: 13/953,984), this microcontroller-based system is integrated into an MRI scanner and noninvasively screens cells and tissue cultures in an environment where temperature, pH, and media/gas handling are regulated. The 4-week study discussed herein details the continuous operation of the e-incubator for a tissue-engineered osteogenic construct, validated by LIVE/DEAD(®) cell assays and histology. The evolving MR quantitative parameters of the osteogenic construct were used as biomarkers for bone tissue engineering and to further validate the quality of the product noninvasively before harvesting. Importantly, the e-incubator reliably facilitates culturing cells and tissue constructs to create engineered tissues and/or investigate disease therapies.

  6. Automated Microfluidic Filtration and Immunocytochemistry Detection System for Capture and Enumeration of Circulating Tumor Cells and Other Rare Cell Populations in Blood.

    PubMed

    Pugia, Michael; Magbanua, Mark Jesus M; Park, John W

    2017-01-01

    Isolation by size using a filter membrane offers an antigen-independent method for capturing rare cells present in blood of cancer patients. Multiple cell types, including circulating tumor cells (CTCs), captured on the filter membrane can be simultaneously identified via immunocytochemistry (ICC) analysis of specific cellular biomarkers. Here, we describe an automated microfluidic filtration method combined with a liquid handling system for sequential ICC assays to detect and enumerate non-hematologic rare cells in blood.

  7. Cooperative Game-Based Energy Efficiency Management over Ultra-Dense Wireless Cellular Networks

    PubMed Central

    Li, Ming; Chen, Pengpeng; Gao, Shouwan

    2016-01-01

    Ultra-dense wireless cellular networks have been envisioned as a promising technique for handling the explosive increase of wireless traffic volume. With the extensive deployment of small cells in wireless cellular networks, the network spectral efficiency (SE) is improved with the use of limited frequency. However, the mutual inter-tier and intra-tier interference between or among small cells and macro cells becomes serious. On the other hand, more chances for potential cooperation among different cells are introduced. Energy efficiency (EE) has become one of the most important problems for future wireless networks. This paper proposes a cooperative bargaining game-based method for comprehensive EE management in an ultra-dense wireless cellular network, which highlights the complicated interference influence on energy-saving challenges and the power-coordination process among small cells and macro cells. Especially, a unified EE utility with the consideration of the interference mitigation is proposed to jointly address the SE, the deployment efficiency (DE), and the EE. In particular, closed-form power-coordination solutions for the optimal EE are derived to show the convergence property of the algorithm. Moreover, a simplified algorithm is presented to reduce the complexity of the signaling overhead, which is significant for ultra-dense small cells. Finally, numerical simulations are provided to illustrate the efficiency of the proposed cooperative bargaining game-based and simplified schemes. PMID:27649170

  8. Interference Alignment With Partial CSI Feedback in MIMO Cellular Networks

    NASA Astrophysics Data System (ADS)

    Rao, Xiongbin; Lau, Vincent K. N.

    2014-04-01

    Interference alignment (IA) is a linear precoding strategy that can achieve optimal capacity scaling at high SNR in interference networks. However, most existing IA designs require full channel state information (CSI) at the transmitters, which would lead to significant CSI signaling overhead. There are two techniques, namely CSI quantization and CSI feedback filtering, to reduce the CSI feedback overhead. In this paper, we consider IA processing with CSI feedback filtering in MIMO cellular networks. We introduce a novel metric, namely the feedback dimension, to quantify the first order CSI feedback cost associated with the CSI feedback filtering. The CSI feedback filtering poses several important challenges in IA processing. First, there is a hidden partial CSI knowledge constraint in IA precoder design which cannot be handled using conventional IA design methodology. Furthermore, existing results on the feasibility conditions of IA cannot be applied due to the partial CSI knowledge. Finally, it is very challenging to find out how much CSI feedback is actually needed to support IA processing. We shall address the above challenges and propose a new IA feasibility condition under partial CSIT knowledge in MIMO cellular networks. Based on this, we consider the CSI feedback profile design subject to the degrees of freedom requirements, and we derive closed-form trade-off results between the CSI feedback cost and IA performance in MIMO cellular networks.

  9. Cooperative Game-Based Energy Efficiency Management over Ultra-Dense Wireless Cellular Networks.

    PubMed

    Li, Ming; Chen, Pengpeng; Gao, Shouwan

    2016-09-13

    Ultra-dense wireless cellular networks have been envisioned as a promising technique for handling the explosive increase of wireless traffic volume. With the extensive deployment of small cells in wireless cellular networks, the network spectral efficiency (SE) is improved with the use of limited frequency. However, the mutual inter-tier and intra-tier interference between or among small cells and macro cells becomes serious. On the other hand, more chances for potential cooperation among different cells are introduced. Energy efficiency (EE) has become one of the most important problems for future wireless networks. This paper proposes a cooperative bargaining game-based method for comprehensive EE management in an ultra-dense wireless cellular network, which highlights the complicated interference influence on energy-saving challenges and the power-coordination process among small cells and macro cells. Especially, a unified EE utility with the consideration of the interference mitigation is proposed to jointly address the SE, the deployment efficiency (DE), and the EE. In particular, closed-form power-coordination solutions for the optimal EE are derived to show the convergence property of the algorithm. Moreover, a simplified algorithm is presented to reduce the complexity of the signaling overhead, which is significant for ultra-dense small cells. Finally, numerical simulations are provided to illustrate the efficiency of the proposed cooperative bargaining game-based and simplified schemes.

  10. Evidence That the Periaqueductal Gray Matter Mediates the Facilitation of Panic-Like Reactions in Neonatally-Isolated Adult Rats

    PubMed Central

    Quintino-dos-Santos, Jeyce Willig; Müller, Cláudia Janaína Torres; Bernabé, Cristie Setúbal; Rosa, Caroline Azevedo; Tufik, Sérgio; Schenberg, Luiz Carlos

    2014-01-01

    Plenty of evidence suggests that childhood separation anxiety (CSA) predisposes the subject to adult-onset panic disorder (PD). As well, panic is frequently comorbid with both anxiety and depression. The brain mechanisms whereby CSA predisposes to PD are but completely unknown in spite of the increasing evidence that panic attacks are mediated at midbrain's dorsal periaqueductal gray matter (DPAG). Accordingly, here we examined whether the neonatal social isolation (NSI), a model of CSA, facilitates panic-like behaviors produced by electrical stimulations of DPAG of rats as adults. Eventual changes in anxiety and depression were also assessed in the elevated plus-maze (EPM) and forced-swimming test (FST) respectively. Male pups were subjected to 3-h daily isolations from post-natal day 2 (PN2) until weaning (PN21) allotting half of litters in individual boxes inside a sound-attenuated chamber (NSI, n = 26) whilst siblings (sham-isolated rats, SHAM, n = 27) and dam were moved to another box in a separate room. Non-handled controls (CTRL, n = 18) remained undisturbed with dams until weaning. As adults, rats were implanted with electrodes into the DPAG (PN60) and subjected to sessions of intracranial stimulation (PN65), EPM (PN66) and FST (PN67-PN68). Groups were compared by Fisher's exact test (stimulation sites), likelihood ratio chi-square tests (stimulus-response threshold curves) and Bonferroni's post hoc t-tests (EPM and FST), for P<0.05. Notably, DPAG-evoked panic-like responses of immobility, exophthalmus, trotting, galloping and jumping were markedly facilitated in NSI rats relative to both SHAM and CTRL groups. Conversely, anxiety and depression scores either did not change or were even reduced in neonatally-handled groups relative to CTRL, respectively. Data are the first behavioral evidence in animals that early-life separation stress produces the selective facilitation of panic-like behaviors in adulthood. Most importantly, results implicate the DPAG not only in panic attacks but also in separation-anxious children's predispositions to the late development of PD. PMID:24594924

  11. Translational research in pediatrics III: bronchoalveolar lavage.

    PubMed

    Radhakrishnan, Dhenuka; Yamashita, Cory; Gillio-Meina, Carolina; Fraser, Douglas D

    2014-07-01

    The role of flexible bronchoscopy and bronchoalveolar lavage (BAL) for the care of children with airway and pulmonary diseases is well established, with collected BAL fluid most often used clinically for microbiologic pathogen identification and cellular analyses. More recently, powerful analytic research methods have been used to investigate BAL samples to better understand the pathophysiological basis of pediatric respiratory disease. Investigations have focused on the cellular components contained in BAL fluid, such as macrophages, lymphocytes, neutrophils, eosinophils, and mast cells, as well as the noncellular components such as serum molecules, inflammatory proteins, and surfactant. Molecular techniques are frequently used to investigate BAL fluid for the presence of infectious pathologies and for cellular gene expression. Recent advances in proteomics allow identification of multiple protein expression patterns linked to specific respiratory diseases, whereas newer analytic techniques allow for investigations on surfactant quantification and function. These translational research studies on BAL fluid have aided our understanding of pulmonary inflammation and the injury/repair responses in children. We review the ethics and practices for the execution of BAL in children for translational research purposes, with an emphasis on the optimal handling and processing of BAL samples. Copyright © 2014 by the American Academy of Pediatrics.

  12. Efficient Analysis of Systems Biology Markup Language Models of Cellular Populations Using Arrays.

    PubMed

    Watanabe, Leandro; Myers, Chris J

    2016-08-19

    The Systems Biology Markup Language (SBML) has been widely used for modeling biological systems. Although SBML has been successful in representing a wide variety of biochemical models, the core standard lacks the structure for representing large complex regular systems in a standard way, such as whole-cell and cellular population models. These models require a large number of variables to represent certain aspects of these types of models, such as the chromosome in the whole-cell model and the many identical cell models in a cellular population. While SBML core is not designed to handle these types of models efficiently, the proposed SBML arrays package can represent such regular structures more easily. However, in order to take full advantage of the package, analysis needs to be aware of the arrays structure. When expanding the array constructs within a model, some of the advantages of using arrays are lost. This paper describes a more efficient way to simulate arrayed models. To illustrate the proposed method, this paper uses a population of repressilator and genetic toggle switch circuits as examples. Results show that there are memory benefits using this approach with a modest cost in runtime.

  13. Automated reagent-dispensing system for microfluidic cell biology assays.

    PubMed

    Ly, Jimmy; Masterman-Smith, Michael; Ramakrishnan, Ravichandran; Sun, Jing; Kokubun, Brent; van Dam, R Michael

    2013-12-01

    Microscale systems that enable measurements of oncological phenomena at the single-cell level have a great capacity to improve therapeutic strategies and diagnostics. Such measurements can reveal unprecedented insights into cellular heterogeneity and its implications into the progression and treatment of complicated cellular disease processes such as those found in cancer. We describe a novel fluid-delivery platform to interface with low-cost microfluidic chips containing arrays of microchambers. Using multiple pairs of needles to aspirate and dispense reagents, the platform enables automated coating of chambers, loading of cells, and treatment with growth media or other agents (e.g., drugs, fixatives, membrane permeabilizers, washes, stains, etc.). The chips can be quantitatively assayed using standard fluorescence-based immunocytochemistry, microscopy, and image analysis tools, to determine, for example, drug response based on differences in protein expression and/or activation of cellular targets on an individual-cell level. In general, automation of fluid and cell handling increases repeatability, eliminates human error, and enables increased throughput, especially for sophisticated, multistep assays such as multiparameter quantitative immunocytochemistry. We report the design of the automated platform and compare several aspects of its performance to manually-loaded microfluidic chips.

  14. Free radicals, reactive oxygen species, oxidative stress and its classification.

    PubMed

    Lushchak, Volodymyr I

    2014-12-05

    Reactive oxygen species (ROS) initially considered as only damaging agents in living organisms further were found to play positive roles also. This paper describes ROS homeostasis, principles of their investigation and technical approaches to investigate ROS-related processes. Especial attention is paid to complications related to experimental documentation of these processes, their diversity, spatiotemporal distribution, relationships with physiological state of the organisms. Imbalance between ROS generation and elimination in favor of the first with certain consequences for cell physiology has been called "oxidative stress". Although almost 30years passed since the first definition of oxidative stress was introduced by Helmut Sies, to date we have no accepted classification of oxidative stress. In order to fill up this gape here classification of oxidative stress based on its intensity is proposed. Due to that oxidative stress may be classified as basal oxidative stress (BOS), low intensity oxidative stress (LOS), intermediate intensity oxidative stress (IOS), and high intensity oxidative stress (HOS). Another classification of potential interest may differentiate three categories such as mild oxidative stress (MOS), temperate oxidative stress (TOS), and finally severe (strong) oxidative stress (SOS). Perspective directions of investigations in the field include development of sophisticated classification of oxidative stresses, accurate identification of cellular ROS targets and their arranged responses to ROS influence, real in situ functions and operation of so-called "antioxidants", intracellular spatiotemporal distribution and effects of ROS, deciphering of molecular mechanisms responsible for cellular response to ROS attacks, and ROS involvement in realization of normal cellular functions in cellular homeostasis. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  15. Direct, Differential Effects of Tamoxifen, 4-Hydroxytamoxifen, and Raloxifene on Cardiac Myocyte Contractility and Calcium Handling

    PubMed Central

    Asp, Michelle L.; Martindale, Joshua J.; Metzger, Joseph M.

    2013-01-01

    Tamoxifen (Tam), a selective estrogen receptor modulator, is in wide clinical use for the treatment and prevention of breast cancer. High Tam doses have been used for treatment of gliomas and cancers with multiple drug resistance, but long QT Syndrome is a side effect. Tam is also used experimentally in mice for inducible gene knockout in numerous tissues, including heart; however, the potential direct effects of Tam on cardiac myocyte mechanical function are not known. The goal of this study was to determine the direct, acute effects of Tam, its active metabolite 4-hydroxytamoxifen (4OHT), and related drug raloxifene (Ral) on isolated rat cardiac myocyte mechanical function and calcium handling. Tam decreased contraction amplitude, slowed relaxation, and decreased Ca2+ transient amplitude. Effects were primarily observed at 5 and 10 μM Tam, which is relevant for high dose Tam treatment in cancer patients as well as Tam-mediated gene excision in mice. Myocytes treated with 4OHT responded similarly to Tam-treated cells with regard to both contractility and calcium handling, suggesting an estrogen-receptor independent mechanism is responsible for the effects. In contrast, Ral increased contraction and Ca2+ transient amplitudes. At 10 μM, all drugs had a time-dependent effect to abolish cellular contraction. In conclusion, Tam, 4OHT, and Ral adversely and differentially alter cardiac myocyte contractility and Ca2+ handling. These findings have important implications for understanding the Tam-induced cardiomyopathy in gene excision studies and may be important for understanding effects on cardiac performance in patients undergoing high-dose Tam therapy. PMID:24205315

  16. Female masturbation in adolescence and the development of the relationship to the body.

    PubMed

    Laufer, M E

    1982-01-01

    The significance of the role played by masturbation in the female is examined from a developmental point of view in order to question the assumption, often made, that female masturbation has the same normal significance as masturbation for the male. In order to do so, the difference between attitudes to male and female masturbation is defined as a difference in attitude to the use of the hand for masturbatory activity and is related to the observation that it is that activity that female children give up post-oedipally and again in post-puberty. The unconscious meaning of the hand, as identified with the mother's active handling of the child's body, is examined to show that masturbation is needed by the child to internalize a positive narcissistic cathexis of the body as well as a means of separating from the mother's body. The continued use of the hand during adolescence and adulthood by the girl or woman is then seen as a defensive means of maintaining a positive relationship to her own sexual body once the girl's body has become identified with that of her mother. The failure of this defence when used by the girl as a means to maintain a positive relationship to her own sexual body is seen as leading to the unconsciously determined need to attack her body, as can be observed clinically in those adolescents who physically attack their body.

  17. Trade-Off Between Fitness Gain and Cost Determines Profitability of a Peach Aphid Parasitoid.

    PubMed

    Khatri, Diwas; He, Xiong Z; Wang, Qiao

    2016-08-01

    Aphidius colemani (Viereck) (Hymenoptera: Aphidiidae) is commercially produced and utilized for biological control of peach aphid Myzus persicae (Sulzer) (Hemiptera: Aphididae) on greenhouse crops in many countries. To provide knowledge for the evaluation of parasitoid-host interactions and development of effective mass rearing programs, we investigated how and why host age or size affected fitness gain in A. colemani We show that the parasitoid was significantly more likely to encounter larger hosts and that an encounter almost always triggered an attack attempt. However, the attack attempt did not proportionally translate into oviposition because larger aphids had greater ability to defend themselves and the parasitoid spent more time in handling larger aphids. The host age at parasitization had no effect on emergence rates and sex ratio of parasitoid progeny, suggesting that pupae and larvae have similar survival rate in hosts of different ages and/or the parasitoid females do not adjust sex allocation based on host size. When parasitizing mid-aged hosts, the parasitoid gained maximum fitness for their progeny in developmental period, body size, and parasitism. Taking all findings together, we suggest that parasitizing mid-aged green peach aphid nymphs is most profitable for A. colemani. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. Flight Investigation of the Low-Speed Characteristics of a 45 deg Swept-Wing Fighter-Type Airplane with Blowing Boundary-Layer Control Applied to the Leading- and Trailing-Edge Flaps

    NASA Technical Reports Server (NTRS)

    Quigley, Hervey C.; Anderson, Seth B.; Innis, Robert C.

    1960-01-01

    A flight investigation has been conducted to study how pilots use the high lift available with blowing-type boundary-layer control applied to the leading- and trailing-edge flaps of a 45 deg. swept-wing airplane. The study includes documentation of the low-speed handling qualities as well as the pilots' evaluations of the landing-approach characteristics. All the pilots who flew the airplane considered it more comfortable to fly at low speeds than any other F-100 configuration they had flown. The major improvements noted were the reduced stall speed, the improved longitudinal stability at high lift, and the reduction in low-speed buffet. The study has shown the minimum comfortable landing-approach speeds are between 120.5 and 126.5 knots compared to 134 for the airplane with a slatted leading edge and the same trailing-edge flap. The limiting factors in the pilots' choices of landing-approach speeds were the limits of ability to control flight-path angle, lack of visibility, trim change with thrust, low static directional stability, and sluggish longitudinal control. Several of these factors were found to be associated with the high angles of attack, between 13 deg. and 15 deg., required for the low approach speeds. The angle of attack for maximum lift coefficient was 28 deg.

  19. Development of ADOCS controllers and control laws. Volume 3: Simulation results and recommendations

    NASA Technical Reports Server (NTRS)

    Landis, Kenneth H.; Glusman, Steven I.

    1985-01-01

    The Advanced Cockpit Controls/Advanced Flight Control System (ACC/AFCS) study was conducted by the Boeing Vertol Company as part of the Army's Advanced Digital/Optical Control System (ADOCS) program. Specifically, the ACC/AFCS investigation was aimed at developing the flight control laws for the ADOCS demonstator aircraft which will provide satisfactory handling qualities for an attack helicopter mission. The three major elements of design considered are as follows: Pilot's integrated Side-Stick Controller (SSC) -- Number of axes controlled; force/displacement characteristics; ergonomic design. Stability and Control Augmentation System (SCAS)--Digital flight control laws for the various mission phases; SCAS mode switching logic. Pilot's Displays--For night/adverse weather conditions, the dynamics of the superimposed symbology presented to the pilot in a format similar to the Advanced Attack Helicopter (AAH) Pilot Night Vision System (PNVS) for each mission phase is a function of SCAS characteristics; display mode switching logic. Results of the five piloted simulations conducted at the Boeing Vertol and NASA-Ames simulation facilities are presented in Volume 3. Conclusions drawn from analysis of pilot rating data and commentary were used to formulate recommendations for the ADOCS demonstrator flight control system design. The ACC/AFCS simulation data also provide an extensive data base to aid the development of advanced flight control system design for future V/STOL aircraft.

  20. Human immunodeficiency virus (HIV) type 1 Vpr induces differential regulation of T cell costimulatory molecules: Direct effect of Vpr on T cell activation and immune function

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Venkatachari, Narasimhan J.; Majumder, Biswanath; Ayyavoo, Velpandi

    2007-02-20

    Human immunodeficiency virus type 1 (HIV-1) viral proteins disrupt the normal host cellular immune pathways thus exploiting the cellular machinery for replication, survival and to escape host immune attack. Here we evaluated the direct effects of HIV-1 Vpr-mediated immune modulation of infected T cells. Vpr specifically downregulated the expression of CD28 and increased the expression of CTLA-4, whereas no significant difference in the expression of CD25 and HLA-DR was observed. Interferon gamma (IFN-{gamma}) production in T cells was evaluated as a measure of the downstream effector functions. Results indicate that Vpr significantly inhibited IFN-{gamma} production and this may, in part,more » due to Vpr's ability to inhibit the nuclear translocation of NF-{kappa}B, and its transcriptional regulation. Together these results support that HIV-1 Vpr selectively dysregulates the immune functions at multiple levels and exerts its inhibitory effects in the presence of other viral proteins.« less

  1. Effects of the putative neutrophil-generated toxin, hypochlorous acid, on membrane permeability and transport systems of Escherichia coli.

    PubMed Central

    Albrich, J M; Gilbaugh, J H; Callahan, K B; Hurst, J K

    1986-01-01

    Titrimetric addition of hypochlorous acid (HOCl) or chloramine (NH2Cl) to suspensions of Escherichia coli decreases their ability to accumulate 14C-labeled glutamine, proline, thiomethylgalactoside, and leucine in a manner that approximately coincides with loss of cell viability; quantitative differences in cellular response are observed with the two oxidants. Inhibition of beta-galactosidase activity in E. coli ML-35, a strain lacking functional lactose permease, is complex and also depends upon the identity of the oxidant. Membrane proton conductivities and glycerol permeabilities are unchanged by addition of HOCl or NH2Cl in excess of that required for inactivation. The combined results are interpreted to indicate that the locus of HOCl attack is the cell envelope, that HOCl inactivation does not occur by loss of membrane structural integrity, that loss of transport function can be identified with either selective oxidative inhibition of the transport proteins or loss of cellular metabolic energy, and that different mechanisms of inactivation may exist for HOCl and NH2Cl. PMID:3013936

  2. Homeostasis 6: nurses as external control agents in rheumatoid arthritis.

    PubMed

    Clancy, John; McVicar, Andrew; Mooney, Janice

    All disorders involve a disturbance of cellular and hence chemical function in the body. Rheumatoid arthritis (RA) is a chronic, systemic, inflammatory disease that usually attacks synovial joints and surrounding ligaments, muscles and their tendons and blood vessels. This article applies the concept of health professionals operating as external agents of homeostatic control (Clancy and McVicar, 20011a; 2011b) to RA and to the care of affected patients, using a case scenario to illustrate attempts to minimize homeostatic imbalances. After reading the article, nurses should be able to understand: how the principles of homeostatic theory apply to skeletomuscular function, in particular to synovial joint function; the skeletomuscular homeostatic role in movement; and that homeostatic failure of reduced mobility, as in RA, is a result of nature-nurture interaction; that illness arises from a cellular, hence chemical, homeostatic imbalance(s) (Clancy and McVicar, 2011a; 2011b; 2011c; 2011d; 2011e). RA is considered a cellular (B-lymphocyte) hence chemical (autoantibody) imbalance that causes the homeostatic imbalances (inflammatory pain, reduced mobility, reduced activities of daily living) associated with the condition. Health professionals are able at act as external agents of homeostatic control to only a limited extent when caring for people with RA because, as with any progressive disorder, they will only be managing signs and symptoms to improve patients' quality of life.

  3. Co-option of endocytic functions of cellular caveolae by pathogens

    PubMed Central

    Shin, J-S; Abraham, S N

    2001-01-01

    It is increasingly becoming clear that various immune cells are infected by the very pathogens that they are supposed to attack. Although many mechanisms for microbial entry exist, it appears that a common route of entry shared by certain bacteria, viruses and parasites involves cellular lipid-rich microdomains sometimes called caveolae. These cellular entities, which are characterized by their preferential accumulation of glycosylphosphatidylinositol (GPI)-anchored molecules, cholesterol and various glycolipids, and a distinct protein (caveolin), are present in many effector cells of the immune system including neutrophils, macrophages, mast cells and dendritic cells. These structures have an innate capacity to endocytoze various ligands and traffic them to different intracellular sites and sometimes, back to the extracellular cell surface. Because caveolae do not typically fuse with lysosomes, the ligands borne by caveolar vesicles are essentially intact, which is in marked contrast to ligands endocytozed via the classical endosome–lysosome pathway. A number of microbes or their exotoxins co-opt the unique features of caveolae to enter and traffic, without any apparent loss of viability and function, to different sites within immune and other host cells. In spite of their wide disparity in size and other structural attributes, we predict that a common feature among caveolae-utilizing pathogens and toxins is that their cognate receptor(s) are localized within plasmalemmal caveolae of the host cell. PMID:11168630

  4. The developing oligodendrocyte: key cellular target in brain injury in the premature infant

    PubMed Central

    Volpe, Joseph J.; Kinney, Hannah C.; Jensen, Frances, E.; Rosenberg, Paul A.

    2011-01-01

    Brain injury in the premature infant, a problem of enormous importance, is associated with a high risk of neurodevelopmental disability. The major type of injury involves cerebral white matter and the principal cellular target is the developing oligodendrocyte. The specific phase of the oligodendroglial lineage affected has been defined from study of both human brain and experimental models. This premyelinating cell (pre-OL) is vulnerable because of a series of maturation-dependent events. The pathogenesis of pre-OL injury relates to operation of two upstream mechanisms, hypoxia-ischemia and systemic infection/inflammation, both of which are common occurrences in premature infants. The focus of this review and of our research over the past 15-20 years has been the cellular and molecular bases for the maturation-dependent vulnerability of the pre-OL to the action of the two upstream mechanisms. Three downstream mechanisms have been identified, i.e., microglial activation, excitotoxicity and free radical attack. The work in both experimental models and human brain has identified a remarkable confluence of maturation-dependent factors that render the pre-OL so exquisitely vulnerable to these downstream mechanisms. Most importantly, elucidation of these factors has led to delineation of a series of potential therapeutic interventions, which in experimental models show marked protective properties. The critical next step, i.e., clinical trials in the living infant, is now on the horizon. PMID:21382469

  5. Carbon nanomaterials in biosensors: should you use nanotubes or graphene?

    PubMed

    Yang, Wenrong; Ratinac, Kyle R; Ringer, Simon P; Thordarson, Pall; Gooding, J Justin; Braet, Filip

    2010-03-15

    From diagnosis of life-threatening diseases to detection of biological agents in warfare or terrorist attacks, biosensors are becoming a critical part of modern life. Many recent biosensors have incorporated carbon nanotubes as sensing elements, while a growing body of work has begun to do the same with the emergent nanomaterial graphene, which is effectively an unrolled nanotube. With this widespread use of carbon nanomaterials in biosensors, it is timely to assess how this trend is contributing to the science and applications of biosensors. This Review explores these issues by presenting the latest advances in electrochemical, electrical, and optical biosensors that use carbon nanotubes and graphene, and critically compares the performance of the two carbon allotropes in this application. Ultimately, carbon nanomaterials, although still to meet key challenges in fabrication and handling, have a bright future as biosensors.

  6. Sibling rivalry.

    PubMed

    Leung, A K; Robson, W L

    1991-05-01

    Rivalry occurs between most, if not all, siblings to a varying degree. Rivalry may be manifested as a verbal or physical attack, frustration, persistent demands for attention, or as regressive phenomena. When handled properly, healthy competition among siblings will lead to the acquisition of social, interpersonal and cognitive skills that are important to the development of the child. Mismanagement of the competition may lead to psychological problems later in life. The appropriate spacing of children and the preparation of existing children for a new sibling help to reduce sibling rivalry. Family situations that will potentially lead to jealousy should be avoided. Parents should not make comparisons between siblings and favoritism should be avoided. When episodes of sibling rivalry develop, the cause rather than the manifestation of the rivalry should be treated. Patience, love, understanding, common sense, and humor are important parental skills necessary to minimize sibling rivalry.

  7. Development and evaluation of die and container materials. Low cost silicon solar array project

    NASA Technical Reports Server (NTRS)

    Wills, R. R.; Niesx, D. E.

    1979-01-01

    Specific compositions of high purity silicon aluminum oxynitride (Sialon) and silicon beryllium oxynitride (Sibeon) solid solutions were shown to be promising refractory materials for handling and manipulating solar grade silicon into silicon ribbon. Evaulation of the interaction of these materials in contact with molten silicon indicated that solid solutions based upon beta-Si3N4 were more stable than those based on Si2N2O. Sibeon was more resistant to molten silicon attack than Sialon. Both materials should preferably be used in an inert atmosphere rather than under vacuum conditions because removal of oxygen from the silicon melt occurs as SiO enhances the dissolution of aluminum and beryllium. The wetting angles of these materials were low enough for these materials to be considered as both die and container materials.

  8. The Attack on Psychosomatic Integrity: a Study of the Psychological Sequelae of Burn Trauma

    PubMed Central

    Cavaleri, V.; Epifanio, M.S.; Benigno, A.; Conte, F.; Di Pasquale, A.

    2009-01-01

    Summary Burns pathology is characterized not only by insidious damage to the patients' outward appearance but also by the equally painful emotional difficulties they encounter as they reorganize their identity and their personal history. This exploratory survey, combining research work with medical action, considers the cases of 41 outpatients who were hospitalized and subjected to skin grafting. The patients were recruited through the database of the Palermo Civic Hospital Plastic Surgery and Burns Therapy Operative Unit. The questionnaires were compiled 6 and 12 months post-burn (12 months' observation). The main objective of the research was to investigate the quality of life of burn patients in relation to the way they handled their condition on the emotional level, in order to cope with the stress caused by the burn. PMID:21991160

  9. Watermarking textures in video games

    NASA Astrophysics Data System (ADS)

    Liu, Huajian; Berchtold, Waldemar; Schäfer, Marcel; Lieb, Patrick; Steinebach, Martin

    2014-02-01

    Digital watermarking is a promising solution to video game piracy. In this paper, based on the analysis of special challenges and requirements in terms of watermarking textures in video games, a novel watermarking scheme for DDS textures in video games is proposed. To meet the performance requirements in video game applications, the proposed algorithm embeds the watermark message directly in the compressed stream in DDS files and can be straightforwardly applied in watermark container technique for real-time embedding. Furthermore, the embedding approach achieves high watermark payload to handle collusion secure fingerprinting codes with extreme length. Hence, the scheme is resistant to collusion attacks, which is indispensable in video game applications. The proposed scheme is evaluated in aspects of transparency, robustness, security and performance. Especially, in addition to classical objective evaluation, the visual quality and playing experience of watermarked games is assessed subjectively in game playing.

  10. Oblique Wing Research Aircraft on ramp

    NASA Technical Reports Server (NTRS)

    1976-01-01

    This 1976 photograph of the Oblique Wing Research Aircraft was taken in front of the NASA Flight Research Center hangar, located at Edwards Air Force Base, California. In the photograph the noseboom, pitot-static probe, and angles-of-attack and sideslip flow vanes(covered-up) are attached to the front of the vehicle. The clear nose dome for the television camera, and the shrouded propellor for the 90 horsepower engine are clearly seen. The Oblique Wing Research Aircraft was a small, remotely piloted, research craft designed and flight tested to look at the aerodynamic characteristics of an oblique wing and the control laws necessary to achieve acceptable handling qualities. NASA Dryden Flight Research Center and the NASA Ames Research Center conducted research with this aircraft in the mid-1970s to investigate the feasibility of flying an oblique wing aircraft.

  11. Processing of Lewisite munitions in the explosive destruction system.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shepodd, Timothy J.; Didlake, John E., Jr.; Bradshaw, Robert W., PhD

    2005-03-01

    The Explosive Destruction System (EDS) is a transportable system designed to treat chemical munitions. The EDS is transported on an open trailer that provides a mounting surface for major system components and an operator's work platform. The trailer is towed by a prime mover. An explosive containment vessel contains the shock, munition fragments, and the chemical agent during the munition opening process, and then provides a vessel for the subsequent chemical treatment of the agent. A fragmentation suppression system houses the chemical munition and protects the containment vessel from high velocity fragments. An explosive accessing system uses shaped charges tomore » cut the munition open and attack the burster. A firing system detonates the shaped charges. A chemical feed system supplies neutralizing reagents and water to the containment vessel. A waste handling system drains the treated effluent.« less

  12. Striatal cell signaling in chronically food-restricted rats under basal conditions and in response to brief handling.

    PubMed

    Pan, Yan; Siregar, Ermanda; Carr, Kenneth D

    2006-01-30

    Chronic food restriction increases exploratory behavior, cognitive function, and the rewarding effects of abused drugs. Recently, striatal neuroadaptations that may be involved in these effects were observed. Specifically, D-1 dopamine (DA) receptor agonist challenge produced stronger activation of extracellular signal-regulated kinase (ERK), calcium-calmodulin-dependent kinase II (CaMKII), and the nuclear transcription factor cAMP response element binding protein (CREB) in nucleus accumbens (NAc) of food-restricted (FR) relative to ad libitum fed (AL) rats. Further, when FR rats were injected intracerebroventricularly (i.c.v.) with vehicle (saline) they displayed stronger activation of c-Jun N-terminal protein kinase (JNK), ERK and CaMKII than did AL rats. It is not known to what extent the latter effects represent the basal state of FR rats or an amplified response to the brief handling involved in the i.c.v. injection procedure. Using Western blotting it was found that basal phospho-JNK is higher in caudate-putamen (CPu) and NAc of FR relative to AL rats. Interestingly, brief handling decreased phospho-JNK levels in FR subjects. Basal phospho-ERK1/2 also tended to be elevated in CPu and NAc of FR rats but the elevation was not significant. However, phospho-MEK--the activated kinase upstream of ERK1/2--was significantly elevated in NAc of FR rats. Neither ERK1/2 nor MEK were activated by brief handling. CaMKII was selectively activated by handling in NAc of FR rats, suggesting a state-dependent response to a salient event. Given the established involvement of mitogen-activated protein kinase (MAPK) and CaMKII in synaptic plasticity, learning and memory, the increase in basal phospho-MEK and hyperresponsiveness of CaMKII in NAc may represent adaptive cellular responses to persistent negative energy balance that facilitate associative learning in connection with food-seeking.

  13. Ionizing radiation regulates cardiac Ca handling via increased ROS and activated CaMKII.

    PubMed

    Sag, Can M; Wolff, Hendrik A; Neumann, Kay; Opiela, Marie-Kristin; Zhang, Juqian; Steuer, Felicia; Sowa, Thomas; Gupta, Shamindra; Schirmer, Markus; Hünlich, Mark; Rave-Fränk, Margret; Hess, Clemens F; Anderson, Mark E; Shah, Ajay M; Christiansen, Hans; Maier, Lars S

    2013-11-01

    Ionizing radiation (IR) is an integral part of modern multimodal anti-cancer therapies. IR involves the formation of reactive oxygen species (ROS) in targeted tissues. This is associated with subsequent cardiac dysfunction when applied during chest radiotherapy. We hypothesized that IR (i.e., ROS)-dependently impaired cardiac myocytes' Ca handling might contribute to IR-dependent cardiocellular dysfunction. Isolated ventricular mouse myocytes and the mediastinal area of anaesthetized mice (that included the heart) were exposed to graded doses of irradiation (sham 4 and 20 Gy) and investigated acutely (after ~1 h) as well as chronically (after ~1 week). IR induced a dose-dependent effect on myocytes' systolic function with acutely increased, but chronically decreased Ca transient amplitudes, which was associated with an acutely unaltered but chronically decreased sarcoplasmic reticulum (SR) Ca load. Likewise, in vivo echocardiography of anaesthetized mice revealed acutely enhanced left ventricular contractility (strain analysis) that declined after 1 week. Irradiated myocytes showed persistently increased diastolic SR Ca leakage, which was acutely compensated by an increase in SR Ca reuptake. This was reversed in the chronic setting in the face of slowed relaxation kinetics. As underlying cause, acutely increased ROS levels were identified to activate Ca/calmodulin-dependent protein kinase II (CaMKII). Accordingly, CaMKII-, but not PKA-dependent phosphorylation sites of the SR Ca release channels (RyR2, at Ser-2814) and phospholamban (at Thr-17) were found to be hyperphosphorylated following IR. Conversely, ROS-scavenging as well as CaMKII-inhibition significantly attenuated CaMKII-activation, disturbed Ca handling, and subsequent cellular dysfunction upon irradiation. Targeted cardiac irradiation induces a biphasic effect on cardiac myocytes Ca handling that is associated with chronic cardiocellular dysfunction. This appears to be mediated by increased oxidative stress and persistently activated CaMKII. Our findings suggest impaired cardiac myocytes Ca handling as a so far unknown mediator of IR-dependent cardiac damage that might be of relevance for radiation-induced cardiac dysfunction.

  14. Human cardiomyocyte calcium handling and transverse tubules in mid-stage of post-myocardial-infarction heart failure.

    PubMed

    Høydal, Morten Andre; Kirkeby-Garstad, Idar; Karevold, Asbjørn; Wiseth, Rune; Haaverstad, Rune; Wahba, Alexander; Stølen, Tomas L; Contu, Riccardo; Condorelli, Gianluigi; Ellingsen, Øyvind; Smith, Godfrey L; Kemi, Ole J; Wisløff, Ulrik

    2018-06-01

    Cellular processes in the heart rely mainly on studies from experimental animal models or explanted hearts from patients with terminal end-stage heart failure (HF). To address this limitation, we provide data on excitation contraction coupling, cardiomyocyte contraction and relaxation, and Ca 2+ handling in post-myocardial-infarction (MI) patients at mid-stage of HF. Nine MI patients and eight control patients without MI (non-MI) were included. Biopsies were taken from the left ventricular myocardium and processed for further measurements with epifluorescence and confocal microscopy. Cardiomyocyte function was progressively impaired in MI cardiomyocytes compared with non-MI cardiomyocytes when increasing electrical stimulation towards frequencies that simulate heart rates during physical activity (2 Hz); at 3 Hz, we observed almost total breakdown of function in MI. Concurrently, we observed impaired Ca 2+ handling with more spontaneous Ca 2+ release events, increased diastolic Ca 2+ , lower Ca 2+ amplitude, and prolonged time to diastolic Ca 2+ removal in MI (P < 0.01). Significantly reduced transverse-tubule density (-35%, P < 0.01) and sarcoplasmic reticulum Ca 2+ adenosine triphosphatase 2a (SERCA2a) function (-26%, P < 0.01) in MI cardiomyocytes may explain the findings. Reduced protein phosphorylation of phospholamban (PLB) serine-16 and threonine-17 in MI provides further mechanisms to the reduced function. Depressed cardiomyocyte contraction and relaxation were associated with impaired intracellular Ca 2+ handling due to impaired SERCA2a activity caused by a combination of alteration in the PLB/SERCA2a ratio and chronic dephosphorylation of PLB as well as loss of transverse tubules, which disrupts normal intracellular Ca 2+ homeostasis and handling. This is the first study that presents these mechanisms from viable and intact cardiomyocytes isolated from the left ventricle of human hearts at mid-stage of post-MI HF. © 2018 The Authors. ESC Heart Failure published by John Wiley & Sons Ltd on behalf of the European Society of Cardiology.

  15. Elliptic Curve Cryptography with Security System in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Huang, Xu; Sharma, Dharmendra

    2010-10-01

    The rapid progress of wireless communications and embedded micro-electro-system technologies has made wireless sensor networks (WSN) very popular and even become part of our daily life. WSNs design are generally application driven, namely a particular application's requirements will determine how the network behaves. However, the natures of WSN have attracted increasing attention in recent years due to its linear scalability, a small software footprint, low hardware implementation cost, low bandwidth requirement, and high device performance. It is noted that today's software applications are mainly characterized by their component-based structures which are usually heterogeneous and distributed, including the WSNs. But WSNs typically need to configure themselves automatically and support as hoc routing. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper based on our previous works [1, 2], three contributions have made, namely (a) fuzzy controller for dynamic slide window size to improve the performance of running ECC (b) first presented a hidden generation point for protection from man-in-the middle attack and (c) we first investigates multi-agent applying for key exchange together. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of high potential candidates for WSNs, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. For saving pre-computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man-in-the middle attack. A designed a hidden generator point that offer a good protection from the man-in-the middle (MinM) attack which becomes one of major worries for the sensor's networks with multiagent system is also discussed.

  16. Clustered Regularly Interspaced Short Palindromic Repeat (CRISPR) RNAs in the Porphyromonas gingivalis CRISPR-Cas I-C System.

    PubMed

    Burmistrz, Michal; Rodriguez Martinez, Jose Ignacio; Krochmal, Daniel; Staniec, Dominika; Pyrc, Krzysztof

    2017-12-01

    The CRISPR-Cas (clustered regularly interspaced short palindromic repeat-CRISPR-associated protein) system is unique to prokaryotes and provides the majority of bacteria and archaea with immunity against nucleic acids of foreign origin. CRISPR RNAs (crRNAs) are the key element of this system, since they are responsible for its selectivity and effectiveness. Typical crRNAs consist of a spacer sequence flanked with 5' and 3' handles originating from repeat sequences that are important for recognition of these small RNAs by the Cas machinery. In this investigation, we studied the type I-C CRISPR-Cas system in Porphyromonas gingivalis , a human pathogen associated with periodontitis, rheumatoid arthritis, cardiovascular disease, and aspiration pneumonia. We demonstrated the importance of the 5' handle for crRNA recognition by the effector complex and consequently activity, as well as secondary trimming of the 3' handle, which was not affected by modifications of the repeat sequence. IMPORTANCE Porphyromonas gingivalis , a clinically relevant Gram-negative, anaerobic bacterium, is one of the major etiologic agents of periodontitis and has been linked with the development of other clinical conditions, including rheumatoid arthritis, cardiovascular disease, and aspiration pneumonia. The presented results on the biogenesis and functions of crRNAs expand our understanding of CRISPR-Cas cellular defenses in P. gingivalis and of horizontal gene transfer in bacteria. Copyright © 2017 American Society for Microbiology.

  17. Clustered Regularly Interspaced Short Palindromic Repeat (CRISPR) RNAs in the Porphyromonas gingivalis CRISPR-Cas I-C System

    PubMed Central

    Burmistrz, Michal; Rodriguez Martinez, Jose Ignacio; Krochmal, Daniel; Staniec, Dominika

    2017-01-01

    ABSTRACT The CRISPR-Cas (clustered regularly interspaced short palindromic repeat–CRISPR-associated protein) system is unique to prokaryotes and provides the majority of bacteria and archaea with immunity against nucleic acids of foreign origin. CRISPR RNAs (crRNAs) are the key element of this system, since they are responsible for its selectivity and effectiveness. Typical crRNAs consist of a spacer sequence flanked with 5′ and 3′ handles originating from repeat sequences that are important for recognition of these small RNAs by the Cas machinery. In this investigation, we studied the type I-C CRISPR-Cas system in Porphyromonas gingivalis, a human pathogen associated with periodontitis, rheumatoid arthritis, cardiovascular disease, and aspiration pneumonia. We demonstrated the importance of the 5′ handle for crRNA recognition by the effector complex and consequently activity, as well as secondary trimming of the 3′ handle, which was not affected by modifications of the repeat sequence. IMPORTANCE Porphyromonas gingivalis, a clinically relevant Gram-negative, anaerobic bacterium, is one of the major etiologic agents of periodontitis and has been linked with the development of other clinical conditions, including rheumatoid arthritis, cardiovascular disease, and aspiration pneumonia. The presented results on the biogenesis and functions of crRNAs expand our understanding of CRISPR-Cas cellular defenses in P. gingivalis and of horizontal gene transfer in bacteria. PMID:28893837

  18. How cells handle cholesterol.

    PubMed

    Simons, K; Ikonen, E

    2000-12-01

    Cholesterol plays an indispensable role in regulating the properties of cell membranes in mammalian cells. Recent advances suggest that cholesterol exerts many of its actions mainly by maintaining sphingolipid rafts in a functional state. How rafts contribute to cholesterol metabolism and transport in the cell is still an open issue. It has long been known that cellular cholesterol levels are precisely controlled by biosynthesis, efflux from cells, and influx of lipoprotein cholesterol into cells. The regulation of cholesterol homeostasis is now receiving a new focus, and this changed perspective may throw light on diseases caused by cholesterol excess, the prime example being atherosclerosis.

  19. MicroRNAs meet calcium: joint venture in ER proteostasis.

    PubMed

    Finger, Fabian; Hoppe, Thorsten

    2014-11-04

    The endoplasmic reticulum (ER) is a cellular compartment that has a key function in protein translation and folding. Maintaining its integrity is of fundamental importance for organism's physiology and viability. The dynamic regulation of intraluminal ER Ca(2+) concentration directly influences the activity of ER-resident chaperones and stress response pathways that balance protein load and folding capacity. We review the emerging evidence that microRNAs play important roles in adjusting these processes to frequently changing intracellular and environmental conditions to modify ER Ca(2+) handling and storage and maintain ER homeostasis. Copyright © 2014, American Association for the Advancement of Science.

  20. Systematic Analysis of Intracellular-targeting Antimicrobial Peptides, Bactenecin 7, Hybrid of Pleurocidin and Dermaseptin, Proline–Arginine-rich Peptide, and Lactoferricin B, by Using Escherichia coli Proteome Microarrays*

    PubMed Central

    Ho, Yu-Hsuan; Shah, Pramod; Chen, Yi-Wen; Chen, Chien-Sheng

    2016-01-01

    Antimicrobial peptides (AMPs) act either through membrane lysis or by attacking intracellular targets. Intracellular targeting AMPs are a resource for antimicrobial agent development. Several AMPs have been identified as intracellular targeting peptides; however, the intracellular targets of many of these peptides remain unknown. In the present study, we used an Escherichia coli proteome microarray to systematically identify the protein targets of three intracellular targeting AMPs: bactenecin 7 (Bac7), a hybrid of pleurocidin and dermaseptin (P-Der), and proline-arginine-rich peptide (PR-39). In addition, we also included the data of lactoferricin B (LfcinB) from our previous study for a more comprehensive analysis. We analyzed the unique protein hits of each AMP in the Kyoto Encyclopedia of Genes and Genomes. The results indicated that Bac7 targets purine metabolism and histidine kinase, LfcinB attacks the transcription-related activities and several cellular carbohydrate biosynthetic processes, P-Der affects several catabolic processes of small molecules, and PR-39 preferentially recognizes proteins involved in RNA- and folate-metabolism-related cellular processes. Moreover, both Bac7 and LfcinB target purine metabolism, whereas LfcinB and PR-39 target lipopolysaccharide biosynthesis. This suggested that LfcinB and Bac7 as well as LfcinB and PR-39 have a synergistic effect on antimicrobial activity, which was validated through antimicrobial assays. Furthermore, common hits of all four AMPs indicated that all of them target arginine decarboxylase, which is a crucial enzyme for Escherichia coli survival in extremely acidic environments. Thus, these AMPs may display greater inhibition to bacterial growth in extremely acidic environments. We have also confirmed this finding in bacterial growth inhibition assays. In conclusion, this comprehensive identification and systematic analysis of intracellular targeting AMPs reveals crucial insights into the intracellular mechanisms of the action of AMPs. PMID:26902206

  1. Systematic Analysis of Intracellular-targeting Antimicrobial Peptides, Bactenecin 7, Hybrid of Pleurocidin and Dermaseptin, Proline-Arginine-rich Peptide, and Lactoferricin B, by Using Escherichia coli Proteome Microarrays.

    PubMed

    Ho, Yu-Hsuan; Shah, Pramod; Chen, Yi-Wen; Chen, Chien-Sheng

    2016-06-01

    Antimicrobial peptides (AMPs) act either through membrane lysis or by attacking intracellular targets. Intracellular targeting AMPs are a resource for antimicrobial agent development. Several AMPs have been identified as intracellular targeting peptides; however, the intracellular targets of many of these peptides remain unknown. In the present study, we used an Escherichia coli proteome microarray to systematically identify the protein targets of three intracellular targeting AMPs: bactenecin 7 (Bac7), a hybrid of pleurocidin and dermaseptin (P-Der), and proline-arginine-rich peptide (PR-39). In addition, we also included the data of lactoferricin B (LfcinB) from our previous study for a more comprehensive analysis. We analyzed the unique protein hits of each AMP in the Kyoto Encyclopedia of Genes and Genomes. The results indicated that Bac7 targets purine metabolism and histidine kinase, LfcinB attacks the transcription-related activities and several cellular carbohydrate biosynthetic processes, P-Der affects several catabolic processes of small molecules, and PR-39 preferentially recognizes proteins involved in RNA- and folate-metabolism-related cellular processes. Moreover, both Bac7 and LfcinB target purine metabolism, whereas LfcinB and PR-39 target lipopolysaccharide biosynthesis. This suggested that LfcinB and Bac7 as well as LfcinB and PR-39 have a synergistic effect on antimicrobial activity, which was validated through antimicrobial assays. Furthermore, common hits of all four AMPs indicated that all of them target arginine decarboxylase, which is a crucial enzyme for Escherichia coli survival in extremely acidic environments. Thus, these AMPs may display greater inhibition to bacterial growth in extremely acidic environments. We have also confirmed this finding in bacterial growth inhibition assays. In conclusion, this comprehensive identification and systematic analysis of intracellular targeting AMPs reveals crucial insights into the intracellular mechanisms of the action of AMPs. © 2016 by The American Society for Biochemistry and Molecular Biology, Inc.

  2. dLocAuth: a dynamic multifactor authentication scheme for mCommerce applications using independent location-based obfuscation

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.

    2012-06-01

    This paper proposes a new technique to obfuscate an authentication-challenge program (named LocProg) using randomly generated data together with a client's current location in real-time. LocProg can be used to enable any handsetapplication on mobile-devices (e.g. mCommerce on Smartphones) that requires authentication with a remote authenticator (e.g. bank). The motivation of this novel technique is to a) enhance the security against replay attacks, which is currently based on using real-time nonce(s), and b) add a new security factor, which is location verified by two independent sources, to challenge / response methods for authentication. To assure a secure-live transaction, thus reducing the possibility of replay and other remote attacks, the authors have devised a novel technique to obtain the client's location from two independent sources of GPS on the client's side and the cellular network on authenticator's side. The algorithm of LocProg is based on obfuscating "random elements plus a client's data" with a location-based key, generated on the bank side. LocProg is then sent to the client and is designed so it will automatically integrate into the target application on the client's handset. The client can then de-obfuscate LocProg if s/he is within a certain range around the location calculated by the bank and if the correct personal data is supplied. LocProg also has features to protect against trial/error attacks. Analysis of LocAuth's security (trust, threat and system models) and trials based on a prototype implementation (on Android platform) prove the viability and novelty of LocAuth.

  3. Complete cardiac regeneration in a mouse model of myocardial infarction.

    PubMed

    Haubner, Bernhard Johannes; Adamowicz-Brice, Martyna; Khadayate, Sanjay; Tiefenthaler, Viktoria; Metzler, Bernhard; Aitman, Tim; Penninger, Josef M

    2012-12-01

    Cardiac remodeling and subsequent heart failure remain critical issues after myocardial infarction despite improved treatment and reperfusion strategies. Recently, complete cardiac regeneration has been demonstrated in fish and newborn mice following resection of the cardiac apex. However, it remained entirely unclear whether the mammalian heart can also completely regenerate following a complex cardiac ischemic injury. We established a protocol to induce a severe heart attack in one-day-old mice using left anterior descending artery (LAD) ligation. LAD ligation triggered substantial cardiac injury in the left ventricle defined by Caspase 3 activation and massive cell death. Ischemia-induced cardiomyocyte death was also visible on day 4 after LAD ligation. Remarkably, 7 days after the initial ischemic insult, we observed complete cardiac regeneration without any signs of tissue damage or scarring. This tissue regeneration translated into long-term normal heart functions as assessed by echocardiography. In contrast, LAD ligations in 7-day-old mice resulted in extensive scarring comparable to adult mice, indicating that the regenerative capacity for complete cardiac healing after heart attacks can be traced to the first week after birth. RNAseq analyses of hearts on day 1, day 3, and day 10 and comparing LAD-ligated and sham-operated mice surprisingly revealed a transcriptional programme of major changes in genes mediating mitosis and cell division between days 1, 3 and 10 postnatally and a very limited set of genes, including genes regulating cell cycle and extracellular matrix synthesis, being differentially regulated in the regenerating hearts. We present for the first time a mammalian model of complete cardiac regeneration following a severe ischemic cardiac injury. This novel model system provides the unique opportunity to uncover molecular and cellular pathways that can induce cardiac regeneration after ischemic injury, findings that one day could be translated to human heart attack patients.

  4. Providing teachers with education on epilepsy increased their willingness to handle acute seizures in children from one to 10 years of age.

    PubMed

    Dumeier, Henriette Karoline; Neininger, Martina Patrizia; Bernhard, Matthias Karl; Merkenschlager, Andreas; Kiess, Wieland; Bertsche, Thilo; Bertsche, Astrid

    2017-11-01

    In Germany, preschool teachers supervise children up to six years of age and are also responsible for supervising older pupils after school. This study explored the impact of a teaching session on epilepsy for teachers in charge of children from 1 to 10 years of age. We evaluated the benefit of a teaching session offered to all preschool teachers in Leipzig, Germany, in 2014-2015, by asking them to complete the same questionnaire 12-24 months pre-intervention, and 12 months postintervention. Both questionnaires were completed by 123 teachers. The number of teachers who felt they were prepared to handle an acute seizure rose from 36 (29%) pre-intervention to 65 (53%) post-intervention (p < 0.001) and their willingness to administer a prescribed rescue medication rose from 66 (54%) to 93 (76%, p < 0.001). The session also increased the number of teachers who were prepared to take children with epilepsy on excursions under any circumstance from 38 (31%) to 52 (42%, p < 0.05). In addition, the number of teachers who would place a solid object in the child's mouth during an attack fell from 16 (13%) to seven (6%) (p < 0.05). Providing a teaching session on epilepsy increased the teachers' knowledge and willingness to act and reduced obsolete, counterproductive measures. ©2017 Foundation Acta Paediatrica. Published by John Wiley & Sons Ltd.

  5. Convergent molecular defects underpin diverse neurodegenerative diseases.

    PubMed

    Tofaris, George K; Buckley, Noel J

    2018-02-19

    In our ageing population, neurodegenerative disorders carry an enormous personal, societal and economic burden. Although neurodegenerative diseases are often thought of as clinicopathological entities, increasing evidence suggests a considerable overlap in the molecular underpinnings of their pathogenesis. Such overlapping biological processes include the handling of misfolded proteins, defective organelle trafficking, RNA processing, synaptic health and neuroinflammation. Collectively but in different proportions, these biological processes in neurons or non-neuronal cells lead to regionally distinct patterns of neuronal vulnerability and progression of pathology that could explain the disease symptomology. With the advent of patient-derived cellular models and novel genetic manipulation tools, we are now able to interrogate this commonality despite the cellular complexity of the brain in order to develop novel therapeutic strategies to prevent or arrest neurodegeneration. Here, we describe broadly these concepts and their relevance across neurodegenerative diseases. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  6. A Graphical User Interface for Software-assisted Tracking of Protein Concentration in Dynamic Cellular Protrusions.

    PubMed

    Saha, Tanumoy; Rathmann, Isabel; Galic, Milos

    2017-07-11

    Filopodia are dynamic, finger-like cellular protrusions associated with migration and cell-cell communication. In order to better understand the complex signaling mechanisms underlying filopodial initiation, elongation and subsequent stabilization or retraction, it is crucial to determine the spatio-temporal protein activity in these dynamic structures. To analyze protein function in filopodia, we recently developed a semi-automated tracking algorithm that adapts to filopodial shape-changes, thus allowing parallel analysis of protrusion dynamics and relative protein concentration along the whole filopodial length. Here, we present a detailed step-by-step protocol for optimized cell handling, image acquisition and software analysis. We further provide instructions for the use of optional features during image analysis and data representation, as well as troubleshooting guidelines for all critical steps along the way. Finally, we also include a comparison of the described image analysis software with other programs available for filopodia quantification. Together, the presented protocol provides a framework for accurate analysis of protein dynamics in filopodial protrusions using image analysis software.

  7. SBML-SAT: a systems biology markup language (SBML) based sensitivity analysis tool

    PubMed Central

    Zi, Zhike; Zheng, Yanan; Rundell, Ann E; Klipp, Edda

    2008-01-01

    Background It has long been recognized that sensitivity analysis plays a key role in modeling and analyzing cellular and biochemical processes. Systems biology markup language (SBML) has become a well-known platform for coding and sharing mathematical models of such processes. However, current SBML compatible software tools are limited in their ability to perform global sensitivity analyses of these models. Results This work introduces a freely downloadable, software package, SBML-SAT, which implements algorithms for simulation, steady state analysis, robustness analysis and local and global sensitivity analysis for SBML models. This software tool extends current capabilities through its execution of global sensitivity analyses using multi-parametric sensitivity analysis, partial rank correlation coefficient, SOBOL's method, and weighted average of local sensitivity analyses in addition to its ability to handle systems with discontinuous events and intuitive graphical user interface. Conclusion SBML-SAT provides the community of systems biologists a new tool for the analysis of their SBML models of biochemical and cellular processes. PMID:18706080

  8. SBML-SAT: a systems biology markup language (SBML) based sensitivity analysis tool.

    PubMed

    Zi, Zhike; Zheng, Yanan; Rundell, Ann E; Klipp, Edda

    2008-08-15

    It has long been recognized that sensitivity analysis plays a key role in modeling and analyzing cellular and biochemical processes. Systems biology markup language (SBML) has become a well-known platform for coding and sharing mathematical models of such processes. However, current SBML compatible software tools are limited in their ability to perform global sensitivity analyses of these models. This work introduces a freely downloadable, software package, SBML-SAT, which implements algorithms for simulation, steady state analysis, robustness analysis and local and global sensitivity analysis for SBML models. This software tool extends current capabilities through its execution of global sensitivity analyses using multi-parametric sensitivity analysis, partial rank correlation coefficient, SOBOL's method, and weighted average of local sensitivity analyses in addition to its ability to handle systems with discontinuous events and intuitive graphical user interface. SBML-SAT provides the community of systems biologists a new tool for the analysis of their SBML models of biochemical and cellular processes.

  9. Revealing the vectors of cellular identity with single-cell genomics

    PubMed Central

    Wagner, Allon; Regev, Aviv; Yosef, Nir

    2017-01-01

    Single-cell genomics has now made it possible to create a comprehensive atlas of human cells. At the same time, it has reopened definitions of a cell’s identity and type and of the ways in which they are regulated by the cell’s molecular circuitry. Emerging computational analysis methods, especially in single-cell RNA sequencing (scRNA-seq), have already begun to reveal, in a data-driven way, the diverse simultaneous facets of a cell’s identity, from a taxonomy of discrete cell types to continuous dynamic transitions and spatial locations. These developments will eventually allow a cell to be represented as a superposition of ‘basis vectors’, each determining a different (but possibly dependent) aspect of cellular organization and function. However, computational methods must also overcome considerable challenges—from handling technical noise and data scale to forming new abstractions of biology. As the scale of single-cell experiments continues to increase, new computational approaches will be essential for constructing and characterizing a reference map of cell identities. PMID:27824854

  10. Oxidative metabolism and Ca2+ handling in isolated brain mitochondria and striatal neurons from R6/2 mice, a model of Huntington's disease.

    PubMed

    Hamilton, James; Pellman, Jessica J; Brustovetsky, Tatiana; Harris, Robert A; Brustovetsky, Nickolay

    2016-07-01

    Alterations in oxidative metabolism and defects in mitochondrial Ca 2+ handling have been implicated in the pathology of Huntington's disease (HD), but existing data are contradictory. We investigated the effect of human mHtt fragments on oxidative metabolism and Ca 2+ handling in isolated brain mitochondria and cultured striatal neurons from the R6/2 mouse model of HD. Non-synaptic and synaptic mitochondria isolated from the brains of R6/2 mice had similar respiratory rates and Ca 2+ uptake capacity compared with mitochondria from wild-type (WT) mice. Respiratory activity of cultured striatal neurons measured with Seahorse XF24 flux analyzer revealed unaltered cellular respiration in neurons derived from R6/2 mice compared with neurons from WT animals. Consistent with the lack of respiratory dysfunction, ATP content of cultured striatal neurons from R6/2 and WT mice was similar. Mitochondrial Ca 2+ accumulation was also evaluated in cultured striatal neurons from R6/2 and WT animals. Our data obtained with striatal neurons derived from R6/2 and WT mice show that both glutamate-induced increases in cytosolic Ca 2+ and subsequent carbonilcyanide p-triflouromethoxyphenylhydrazone-induced increases in cytosolic Ca 2+ were similar between WT and R6/2, suggesting that mitochondria in neurons derived from both types of animals accumulated comparable amounts of Ca 2+ Overall, our data argue against respiratory deficiency and impaired Ca 2+ handling induced by human mHtt fragments in both isolated brain mitochondria and cultured striatal neurons from transgenic R6/2 mice. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  11. An Observation-Driven Agent-Based Modeling and Analysis Framework for C. elegans Embryogenesis.

    PubMed

    Wang, Zi; Ramsey, Benjamin J; Wang, Dali; Wong, Kwai; Li, Husheng; Wang, Eric; Bao, Zhirong

    2016-01-01

    With cutting-edge live microscopy and image analysis, biologists can now systematically track individual cells in complex tissues and quantify cellular behavior over extended time windows. Computational approaches that utilize the systematic and quantitative data are needed to understand how cells interact in vivo to give rise to the different cell types and 3D morphology of tissues. An agent-based, minimum descriptive modeling and analysis framework is presented in this paper to study C. elegans embryogenesis. The framework is designed to incorporate the large amounts of experimental observations on cellular behavior and reserve data structures/interfaces that allow regulatory mechanisms to be added as more insights are gained. Observed cellular behaviors are organized into lineage identity, timing and direction of cell division, and path of cell movement. The framework also includes global parameters such as the eggshell and a clock. Division and movement behaviors are driven by statistical models of the observations. Data structures/interfaces are reserved for gene list, cell-cell interaction, cell fate and landscape, and other global parameters until the descriptive model is replaced by a regulatory mechanism. This approach provides a framework to handle the ongoing experiments of single-cell analysis of complex tissues where mechanistic insights lag data collection and need to be validated on complex observations.

  12. Mitochondrial fatty acid synthesis, fatty acids and mitochondrial physiology.

    PubMed

    Kastaniotis, Alexander J; Autio, Kaija J; Kerätär, Juha M; Monteuuis, Geoffray; Mäkelä, Anne M; Nair, Remya R; Pietikäinen, Laura P; Shvetsova, Antonina; Chen, Zhijun; Hiltunen, J Kalervo

    2017-01-01

    Mitochondria and fatty acids are tightly connected to a multiplicity of cellular processes that go far beyond mitochondrial fatty acid metabolism. In line with this view, there is hardly any common metabolic disorder that is not associated with disturbed mitochondrial lipid handling. Among other aspects of mitochondrial lipid metabolism, apparently all eukaryotes are capable of carrying out de novo fatty acid synthesis (FAS) in this cellular compartment in an acyl carrier protein (ACP)-dependent manner. The dual localization of FAS in eukaryotic cells raises the questions why eukaryotes have maintained the FAS in mitochondria in addition to the "classic" cytoplasmic FAS and what the products are that cannot be substituted by delivery of fatty acids of extramitochondrial origin. The current evidence indicates that mitochondrial FAS is essential for cellular respiration and mitochondrial biogenesis. Although both β-oxidation and FAS utilize thioester chemistry, CoA acts as acyl-group carrier in the breakdown pathway whereas ACP assumes this role in the synthetic direction. This arrangement metabolically separates these two pathways running towards opposite directions and prevents futile cycling. A role of this pathway in mitochondrial metabolic sensing has recently been proposed. This article is part of a Special Issue entitled: Lipids of Mitochondria edited by Guenther Daum. Copyright © 2016 Elsevier B.V. All rights reserved.

  13. Studies on the effects of microgravity on the ultrastructure and functions of cultured mammalian cells (L-6)

    NASA Technical Reports Server (NTRS)

    Sato, Atsushige

    1993-01-01

    The human body consists of 10(exp 13) cells. Understanding the mechanisms by which the cells sense and respond to microgravity is very important as the basis for space biology. The cells were originally isolated aseptically from mammalian bodies and cultured in vitro. A set of cell culture vessels was developed to be applied to three kinds of space flight experiments. Experiment 1 is to practice the cell culture technique in a space laboratory and obtain favorable growth of the cells. Aseptic handling in tryspin treatment and medium renewal will be tested. The cells, following space flight, will be returned to the ground and cultured continuously to investigate the effects of space flight on the cellular characteristics. Experiment 2 is to examine the cytoskeletal structure of the cells under microgravity conditions. The cytoskeletal structure plays essential roles in the morphological construction, movements, axonal transport, and differentiation of the cells. The cells fixed during space flight will be returned and the cytoskeleton and ultrastructure observed using electron microscopy and fluorescence microscopy. Experiment 3 is to study the cellular productivity of valuable substances. The waste medium harvested during space flight are returned and quantitated for the cellular products. The effects of microgravity on mammalian cells will be clarified from the various aspects.

  14. Activity-based proteome profiling of potential cellular targets of Orlistat--an FDA-approved drug with anti-tumor activities.

    PubMed

    Yang, Peng-Yu; Liu, Kai; Ngai, Mun Hong; Lear, Martin J; Wenk, Markus R; Yao, Shao Q

    2010-01-20

    Orlistat, or tetrahydrolipstatin (THL), is an FDA-approved antiobesity drug with potential antitumor activities. Cellular off-targets and potential side effects of Orlistat in cancer therapies, however, have not been extensively explored thus far. In this study, we report the total of synthesis of THL-like protein-reactive probes, in which extremely conservative modifications (i.e., an alkyne handle) were introduced in the parental THL structure to maintain the native biological properties of Orlistat, while providing the necessary functionality for target identification via the bio-orthogonal click chemistry. With these natural productlike, cell-permeable probes, we were able to demonstrate, for the first time, this chemical proteomic approach is suitable for the identification of previously unknown cellular targets of Orlistat. In addition to the expected fatty acid synthase (FAS), we identified a total of eight new targets, some of which were further validated by experiments including Western blotting, recombinant protein expression, and site-directed mutagenesis. Our findings have important implications in the consideration of Orlistat as a potential anticancer drug at its early stages of development for cancer therapy. Our strategy should be broadly useful for off-target identification against quite a number of existing drugs and/or candidates, which are also covalent modifiers of their biological targets.

  15. Modeling Humans as Reinforcement Learners: How to Predict Human Behavior in Multi-Stage Games

    NASA Technical Reports Server (NTRS)

    Lee, Ritchie; Wolpert, David H.; Backhaus, Scott; Bent, Russell; Bono, James; Tracey, Brendan

    2011-01-01

    This paper introduces a novel framework for modeling interacting humans in a multi-stage game environment by combining concepts from game theory and reinforcement learning. The proposed model has the following desirable characteristics: (1) Bounded rational players, (2) strategic (i.e., players account for one anothers reward functions), and (3) is computationally feasible even on moderately large real-world systems. To do this we extend level-K reasoning to policy space to, for the first time, be able to handle multiple time steps. This allows us to decompose the problem into a series of smaller ones where we can apply standard reinforcement learning algorithms. We investigate these ideas in a cyber-battle scenario over a smart power grid and discuss the relationship between the behavior predicted by our model and what one might expect of real human defenders and attackers.

  16. A Reconfiguration Scheme for Accommodating Actuator Failures in Multi-Input, Multi-Output Flight Control Systems

    NASA Technical Reports Server (NTRS)

    Siwakosit, W.; Hess, R. A.; Bacon, Bart (Technical Monitor); Burken, John (Technical Monitor)

    2000-01-01

    A multi-input, multi-output reconfigurable flight control system design utilizing a robust controller and an adaptive filter is presented. The robust control design consists of a reduced-order, linear dynamic inversion controller with an outer-loop compensation matrix derived from Quantitative Feedback Theory (QFT). A principle feature of the scheme is placement of the adaptive filter in series with the QFT compensator thus exploiting the inherent robustness of the nominal flight control system in the presence of plant uncertainties. An example of the scheme is presented in a pilot-in-the-loop computer simulation using a simplified model of the lateral-directional dynamics of the NASA F18 High Angle of Attack Research Vehicle (HARV) that included nonlinear anti-wind up logic and actuator limitations. Prediction of handling qualities and pilot-induced oscillation tendencies in the presence of these nonlinearities is included in the example.

  17. Performances of Machine Learning Algorithms for Binary Classification of Network Anomaly Detection System

    NASA Astrophysics Data System (ADS)

    Nawir, Mukrimah; Amir, Amiza; Lynn, Ong Bi; Yaakob, Naimah; Badlishah Ahmad, R.

    2018-05-01

    The rapid growth of technologies might endanger them to various network attacks due to the nature of data which are frequently exchange their data through Internet and large-scale data that need to be handle. Moreover, network anomaly detection using machine learning faced difficulty when dealing the involvement of dataset where the number of labelled network dataset is very few in public and this caused many researchers keep used the most commonly network dataset (KDDCup99) which is not relevant to employ the machine learning (ML) algorithms for a classification. Several issues regarding these available labelled network datasets are discussed in this paper. The aim of this paper to build a network anomaly detection system using machine learning algorithms that are efficient, effective and fast processing. The finding showed that AODE algorithm is performed well in term of accuracy and processing time for binary classification towards UNSW-NB15 dataset.

  18. Security analysis for biometric data in ID documents

    NASA Astrophysics Data System (ADS)

    Schimke, Sascha; Kiltz, Stefan; Vielhauer, Claus; Kalker, Ton

    2005-03-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents like passports. Starting from classical techniques for manual authentication of ID card holders, we expand our view towards automatic methods based on biometrics. We do so by reviewing different human biometric attributes by modality, as well as by discussing possible techniques for storing and handling the particular biometric data on the document. Further, we explore possible vulnerabilities of potential biometric passport systems. Based on the findings of that discussion we will expand upon two exemplary approaches for including digital biometric data in the context of ID documents and present potential risks attack scenarios along with technical aspects such as capacity and robustness.

  19. The challenge of improvised explosives

    DOE PAGES

    Maienschein, Jon L.

    2012-06-14

    Energetic materials have been developed for decades, and indeed centuries, with a common set of goals in mind. Performance (as a detonating explosive, a propellant, or a pyrotechnic) has always been key, equally important have been the attributes of safety, stability, and reproducibility. Research and development with those goals has led to the set of energetic materials commonly used today. In the past few decades, the adoption and use of improvised explosives in attacks by terrorists or third-world parties has led to many questions about these materials, e.g., how they may be made, what threat they pose to the intendedmore » target, how to handle them safely, and how to detect them. The unfortunate advent of improvised explosives has opened the door for research into these materials, and there are active programs in many countries. I will discuss issues and opportunities facing research into improvised explosives.« less

  20. Leveraging Social Links for Trust and Privacy in Networks

    NASA Astrophysics Data System (ADS)

    Cutillo, Leucio Antonio; Molva, Refik; Strufe, Thorsten

    Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in distributed systems and networks. We suggest a solution that both aims at avoiding any centralized control and leverages on the real life trust between users, that is part of the social network application itself. An anonymization technique based on multi-hop routing among trusted nodes guarantees privacy in data access and, generally speaking, in all the OSN operations.

  1. Overcoming Geometry-Induced Stiffness with IMplicit-Explicit (IMEX) Runge-Kutta Algorithms on Unstructured Grids with Applications to CEM, CFD, and CAA

    NASA Technical Reports Server (NTRS)

    Kanevsky, Alex

    2004-01-01

    My goal is to develop and implement efficient, accurate, and robust Implicit-Explicit Runge-Kutta (IMEX RK) methods [9] for overcoming geometry-induced stiffness with applications to computational electromagnetics (CEM), computational fluid dynamics (CFD) and computational aeroacoustics (CAA). IMEX algorithms solve the non-stiff portions of the domain using explicit methods, and isolate and solve the more expensive stiff portions using implicit methods. Current algorithms in CEM can only simulate purely harmonic (up to lOGHz plane wave) EM scattering by fighter aircraft, which are assumed to be pure metallic shells, and cannot handle the inclusion of coatings, penetration into and radiation out of the aircraft. Efficient MEX RK methods could potentially increase current CEM capabilities by 1-2 orders of magnitude, allowing scientists and engineers to attack more challenging and realistic problems.

  2. Long-Term Effects of Soldering By-Products on Nickel-Coated Copper Wire

    NASA Technical Reports Server (NTRS)

    Rolin, T. D.; Hodge, R. E.

    2008-01-01

    An analysis of thirty-year-old, down graded flight cables was conducted to determine the makeup of a green material on the surface of the shielded wire near soldered areas and to ascertain if the green material had corroded the nickel-coated copper wire. Two likely candidates were possible due to the handling and environments to which these cables were exposed. The flux used to solder the cables is known to contain abietic acid, a carboxylic acid found in many pine rosins used for the soldering process. The resulting material copper abietate is green in color and is formed during the application of heat during soldering operations. Copper (II) chloride, which is also green in color is known to contaminate flight parts and is corrosive. Data is presented that shows the material is copper abietate, not copper (II) chloride, and more importantly that the abietate does not aggressively attack nickel-plated copper wire.

  3. Flight evaluation of the transonic stability and control characteristics of an airplane incorporating a supercritical wing

    NASA Technical Reports Server (NTRS)

    Matheny, N. W.; Gatlin, D. H.

    1978-01-01

    A TF-8A airplane was equipped with a transport type supercritical wing and fuselage fairings to evaluate predicted performance improvements for cruise at transonic speeds. A comparison of aerodynamic derivatives extracted from flight and wind tunnel data showed that static longitudinal stability, effective dihedral, and aileron effectiveness, were higher than predicted. The static directional stability derivative was slower than predicted. The airplane's handling qualities were acceptable with the stability augmentation system on. The unaugmented airplane exhibited some adverse lateral directional characteristics that involved low Dutch roll damping and low roll control power at high angles of attack and roll control power that was greater than satisfactory for transport aircraft at cruise conditions. Longitudinally, the aircraft exhibited a mild pitchup tendency. Leading edge vortex generators delayed the onset of flow separation, moving the pitchup point to a higher lift coefficient and reducing its severity.

  4. Community-Based Academic Level I Trauma Center Prepares for the 2016 Republican National Convention.

    PubMed

    Keefe, Judy; Cern, Kathy; Wiita, Sharon; Raubenolt, Amy; Atkins, Elizabeth

    Disaster preparedness has come to the forefront for hospitals since the 9/11 attacks in 2001. Many improvements have been made in emergency management and planning for catastrophic events. Both urban and community hospitals have the same responsibilities and commitments to their patients and communities. When the announcement was made that the 2016 Republican National Convention was going to be held in Cleveland, OH, Cleveland Clinic Akron General (CCAG) had to be confident in its abilities to handle any situation that might arise not just as a community hospital but also as a Level I trauma center. Organizing and preparing for more than a year, CCAG developed a detailed and well-thought-out preparedness program, with senior leadership implementing a clear chain of command. Developing and maintaining a strong and steady defense through detailed preparation, communication, teamwork, and organization are the keys to success.

  5. Developing a novel comprehensive framework for the investigation of cellular and whole heart electrophysiology in the in situ human heart: historical perspectives, current progress and future prospects.

    PubMed

    Taggart, Peter; Orini, Michele; Hanson, Ben; Hayward, Martin; Clayton, Richard; Dobrzynski, Halina; Yanni, Joseph; Boyett, Mark; Lambiase, Pier D

    2014-08-01

    Understanding the mechanisms of fatal ventricular arrhythmias is of great importance. In view of the many electrophysiological differences that exist between animal species and humans, the acquisition of basic electrophysiological data in the intact human heart is essential to drive and complement experimental work in animal and in-silico models. Over the years techniques have been developed to obtain basic electrophysiological signals directly from the patients by incorporating these measurements into routine clinical procedures which access the heart such as cardiac catheterisation and cardiac surgery. Early recordings with monophasic action potentials provided valuable information including normal values for the in vivo human heart, cycle length dependent properties, the effect of ischaemia, autonomic nervous system activity, and mechano-electric interaction. Transmural recordings addressed the controversial issue of the mid myocardial "M" cell. More recently, the technique of multielectrode mapping (256 electrodes) developed in animal models has been extended to humans, enabling mapping of activation and repolarisation on the entire left and right ventricular epicardium in patients during cardiac surgery. Studies have examined the issue of whether ventricular fibrillation was driven by a "mother" rotor with inhomogeneous and fragmented conduction as in some animal models, or by multiple wavelets as in other animal studies; results showed that both mechanisms are operative in humans. The simpler spatial organisation of human VF has important implications for treatment and prevention. To link in-vivo human electrophysiological mapping with cellular biophysics, multielectrode mapping is now being combined with myocardial biopsies. This technique enables region-specific electrophysiology changes to be related to underlying cellular biology, for example: APD alternans, which is a precursor of VF and sudden death. The mechanism is incompletely understood but related to calcium cycling and APD restitution. Multielectrode sock mapping during incremental pacing enables epicardial sites to be identified which exhibit marked APD alternans and sites where APD alternans is absent. Whole heart electrophysiology is assessed by activation repolarisation mapping and analysis is performed immediately on-site in order to guide biopsies to specific myocardial sites. Samples are analysed for ion channel expression, Ca(2+)-handling proteins, gap junctions and extracellular matrix. This new comprehensive approach to bridge cellular and whole heart electrophysiology allowed to identify 20 significant changes in mRNA for ion channels Ca(2+)-handling proteins, a gap junction channel, a Na(+)-K(+) pump subunit and receptors (particularly Kir 2.1) between the positive and negative alternans sites. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. A new twist on an old idea part 2: cyclosporine preserves normal mitochondrial but not cardiomyocyte function in mini‐swine with compensated heart failure

    PubMed Central

    Hiemstra, Jessica A.; Gutiérrez‐Aguilar, Manuel; Marshall, Kurt D.; McCommis, Kyle S.; Zgoda, Pamela J.; Cruz‐Rivera, Noelany; Jenkins, Nathan T.; Krenz, Maike; Domeier, Timothy L.; Baines, Christopher P.; Emter, Craig A.

    2014-01-01

    Abstract We recently developed a clinically relevant mini‐swine model of heart failure with preserved ejection fraction (HFpEF), in which diastolic dysfunction was associated with increased mitochondrial permeability transition (MPT). Early diastolic function is ATP and Ca2+‐dependent, thus, we hypothesized chronic low doses of cyclosporine (CsA) would preserve mitochondrial function via inhibition of MPT and subsequently maintain normal cardiomyocyte Ca2+ handling and contractile characteristics. Left ventricular cardiomyocytes were isolated from aortic‐banded Yucatan mini‐swine divided into three groups; control nonbanded (CON), HFpEF nontreated (HF), and HFpEF treated with CsA (HF‐CsA). CsA mitigated the deterioration of mitochondrial function observed in HF animals, including functional uncoupling of Complex I‐dependent mitochondrial respiration and increased susceptibility to MPT. Attenuation of mitochondrial dysfunction in the HF‐CsA group was not associated with commensurate improvement in cardiomyocyte Ca2+ handling or contractility. Ca2+ transient amplitude was reduced and transient time to peak and recovery (tau) prolonged in HF and HF‐CsA groups compared to CON. Alterations in Ca2+ transient parameters observed in the HF and HF‐CsA groups were associated with decreased cardiomyocyte shortening and shortening rate. Cellular function was consistent with impaired in vivo systolic and diastolic whole heart function. A significant systemic hypertensive response to CsA was observed in HF‐CsA animals, and may have played a role in the accelerated the development of heart failure at both the whole heart and cellular levels. Given the significant detriment to cardiac function observed in response to CsA, our findings suggest chronic CsA treatment is not a viable therapeutic option for HFpEF. PMID:24963034

  7. Novel Hg2+-Induced Nephropathy in Rats and Mice Lacking Mrp2: Evidence of Axial Heterogeneity in the Handling of Hg2+ Along the Proximal Tubule

    PubMed Central

    Zalups, Rudolfs K.; Joshee, Lucy; Bridges, Christy C.

    2014-01-01

    The role of the multi-resistance protein 2 (Mrp2) in the nephropathy induced by inorganic mercuric mercury (Hg2+) was studied in rats (TR−) and mice (Mrp2−/−), which lack functional Mrp2, and control animals. Animals were exposed to nephrotoxic doses of HgCl2. Forty-eight or 24 hours after exposure, tissues were harvested and analyzed for Hg content and markers of injury. Histological analyses revealed that the proximal tubular segments affected pathologically by Hg2+ were significantly different between Mrp2-deficient animals and controls. In the absence of Mrp2, cellular injury localized almost exclusively in proximal tubular segments in the subcapsular (S1) to midcortical regions (early S2) of the kidney. In control animals, cellular death occurred mainly in the proximal tubular segments in the inner cortex (late S2) and outer stripe of the outer medulla (S3). These differences in renal pathology indicate that axial heterogeneity exists along the proximal tubule with respect to how mercuric ions are handled. Total renal and hepatic accumulation of mercury was also greater in animals lacking Mrp2 than in controls, indicating that Mrp2 normally plays a significant role in eliminating mercuric ions from within proximal tubular cells and hepatocytes. Analyses of plasma creatinine, BUN, and renal expression of Kim-1 and Ngal tend to support the severity of the nephropathies detected histologically. Collectively, our findings indicate that a fraction of mercuric ions is normally secreted by Mrp2 in early portions of proximal tubules into the lumen and then is absorbed downstream in straight portions, where mercuric species typically induce toxic effects. PMID:25145654

  8. Responses of skeletal muscle lipid metabolism in rat gastrocnemius to hypothyroidism and iodothyronine administration: a putative role for FAT/CD36.

    PubMed

    Lombardi, Assunta; De Matteis, Rita; Moreno, Maria; Napolitano, Laura; Busiello, Rosa Anna; Senese, Rosalba; de Lange, Pieter; Lanni, Antonia; Goglia, Fernando

    2012-11-15

    Iodothyronines such as triiodothyronine (T(3)) and 3,5-diiodothyronine (T(2)) influence energy expenditure and lipid metabolism. Skeletal muscle contributes significantly to energy homeostasis, and the above iodothyronines are known to act on this tissue. However, little is known about the cellular/molecular events underlying the effects of T(3) and T(2) on skeletal muscle lipid handling. Since FAT/CD36 is involved in the utilization of free fatty acids by skeletal muscle, specifically in their import into that tissue and presumably their oxidation at the mitochondrial level, we hypothesized that related changes in lipid handling and in FAT/CD36 expression and subcellular redistribution would occur due to hypothyroidism and to T(3) or T(2) administration to hypothyroid rats. In gastrocnemius muscles isolated from hypothyroid rats, FAT/CD36 was upregulated (mRNA levels and total tissue, sarcolemmal, and mitochondrial protein levels). Administration of either T(3) or T(2) to hypothyroid rats resulted in 1) little or no change in FAT/CD36 mRNA level, 2) a decreased total FAT/CD36 protein level, and 3) further increases in FAT/CD36 protein level in sarcolemma and mitochondria. Thus, the main effect of each iodothyronine seemed to be exerted at the level of FAT/CD36 cellular distribution. The effect of further increases in FAT/CD36 protein level in sarcolemma and mitochondria was already evident at 1 h after iodothyronine administration. Each iodothyronine increased the mitochondrial fatty acid oxidation rate. However, the mechanisms underlying their rapid effects seem to differ; T(2) and T(3) each induce FAT/CD36 translocation to mitochondria, but only T(2) induces increases in carnitine palmitoyl transferase system activity and in the mitochondrial substrate oxidation rate.

  9. Renal Proteome in Mice with Different Susceptibilities to Fluorosis

    PubMed Central

    Peres-Buzalaf, Camila; Salvato, Fernanda; Labate, Carlos Alberto; Everett, Eric T.; Whitford, Gary Milton; Buzalaf, Marília Afonso Rabelo

    2013-01-01

    A/J and 129P3/J mouse strains have different susceptibilities to dental fluorosis due to their genetic backgrounds. They also differ with respect to several features of fluoride (F) metabolism and metabolic handling of water. This study was done to determine whether differences in F metabolism could be explained by diversities in the profile of protein expression in kidneys. Weanling, male A/J mice (susceptible to dental fluorosis, n = 18) and 129P3/J mice (resistant, n = 18) were housed in pairs and assigned to three groups given low-F food and drinking water containing 0, 10 or 50 ppm [F] for 7 weeks. Renal proteome profiles were examined using 2D-PAGE and LC-MS/MS. Quantitative intensity analysis detected between A/J and 129P3/J strains 122, 126 and 134 spots differentially expressed in the groups receiving 0, 10 and 50 ppmF, respectively. From these, 25, 30 and 32, respectively, were successfully identified. Most of the proteins were related to metabolic and cellular processes, followed by response to stimuli, development and regulation of cellular processes. In F-treated groups, PDZK-1, a protein involved in the regulation of renal tubular reabsorption capacity was down-modulated in the kidney of 129P3/J mice. A/J and 129P3/J mice exhibited 11 and 3 exclusive proteins, respectively, regardless of F exposure. In conclusion, proteomic analysis was able to identify proteins potentially involved in metabolic handling of F and water that are differentially expressed or even not expressed in the strains evaluated. This can contribute to understanding the molecular mechanisms underlying genetic susceptibility to dental fluorosis, by indicating key-proteins that should be better addressed in future studies. PMID:23308176

  10. Negative impact of laws regarding biosecurity and bioterrorism on real diseases.

    PubMed

    Wurtz, N; Grobusch, M P; Raoult, D

    2014-06-01

    Research on highly pathogenic microorganisms in biosafety level 3 and 4 laboratories is very important for human public health, as it provides opportunities for the development of vaccines and novel therapeutics as well as diagnostic methods to prevent epidemics. However, in recent years, after the anthrax and World Trade Center attacks in 2001 in the USA, the threat of bioterrorism has grown for both the public and the authorities. As a result, technical and physical containment measures and biosafety and biosecurity practices have been implemented in laboratories handling these dangerous pathogens. Working with selected biological agents and toxins is now highly regulated, owing to their potential to pose a threat to public health and safety, despite the fact that the anthrax attack was found to be the result of a lack of security at a US Army laboratory. Thus, these added regulations have been associated with a large amount of fruitless investment. Herein, we describe the limitations of research in these facilities, and the multiple consequences of the increased regulations. These limitations have seriously negatively impacted on the number of collaborations, the size of research projects, and, more generally, scientific research on microbial pathogens. Clearly, the actual number of known victims and fatalities caused by the intentional use of microorganisms has been negligible as compared with those caused by naturally acquired human infections. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  11. The prevalence of parasites in ornamental fish from fish market in Medan

    NASA Astrophysics Data System (ADS)

    Dewi, R. R.; Desrita; Fadhilla, A.

    2018-02-01

    Parasites still become the major problem in ornamental fish as the fast grown of its trading in Indonesia. Parasites causes diseases in ornamental fish hence followed by death and reducing its appearence. In this study, the prevalence of parasites in 100 apparently healthy ornamental fishes namely Guppy (Poecilia reticulate) and Goldfish (Carrasius auratus) were determined. The method of this research used was survey in local fish market in Medan from March to May 2017 The aim of this study was to determine the parasite that infects aquarium fishes and find out its prevalence. For this purpose, ornamental fishes were examined for parasites from their skin, fin, gill and intestine using wet mount method under a light microscope. The survey result showed that parasites that infect Guppy and Goldfish were Monogenea (Dactylogyrus sp and Gyrodactylus sp) in their skin and gill, Protozoa (piscinodinium sp) in their gill and Nematoda (Capillaria sp) in abdominal cavity. Prevalence rate of parasites that attack Guppy in Medan is Dactylogyrus sp (8%), Gyrodactylus sp (14 %), Piscinodinium sp (6%) and Capillaria sp (8%). Then, prevalence rate of Capilaria sp that attack Goldfish is 4%. The conclusion of this work revealed that the prevalence rate of ectoparasite and endoparasites in ornamental fishes in Medan had the low rate as well as there was no pathological findings is observed. However, these parasites could be a harmful parasitic diseases in case there is the changes in aquarium environment and improper fish handling.

  12. A hospital cafeteria-related food-borne outbreak due to Bacillus cereus: unique features.

    PubMed

    Baddour, L M; Gaia, S M; Griffin, R; Hudson, R

    1986-09-01

    Although Bacillus cereus is a well-known cause of food-borne illness, hospital-related outbreaks of food-borne disease due to B. cereus have rarely been documented. We report a hospital employee cafeteria outbreak due to foods contaminated with B. cereus in which an outside caterer was employed to prepare the suspect meals. Data were collected from 249 of 291 employees who had eaten either of the two meals. With a mean incubation period of 12.5 hours, 64% (160 of 249) of employees manifested illness. Symptoms, which averaged 24.3 hours in duration, included diarrhea (96.3%), abdominal cramps (90%), nausea (50.6%), weakness (24.7%), and vomiting (13.8%). Eighty-seven employees sought medical attention, 84 of whom were seen in an emergency room. Although a significant difference was not demonstrated in food-specific attack rates, B. cereus was cultured from both rice and chicken items that were served at both meals. Sixty-three employees submitted stools for culture that grew no enteric pathogens, but none were examined for B. cereus. This food-borne outbreak demonstrates: the need for hospital kitchen supervisors to ensure proper handling of food when outside caterers are employed; that significant differences in food-specific attack rates may not be demonstrated in outbreaks, which may be related to several factors; and the importance of notifying microbiology laboratory personnel when B. cereus is a suspect enteric pathogen, since many laboratories do not routinely attempt to identify this organism in stool specimens.

  13. Moonlight avoidance in gerbils reveals a sophisticated interplay among time allocation, vigilance and state-dependent foraging

    PubMed Central

    Kotler, Burt P.; Brown, Joel; Mukherjee, Shomen; Berger-Tal, Oded; Bouskila, Amos

    2010-01-01

    Foraging animals have several tools for managing the risk of predation, and the foraging games between them and their predators. Among these, time allocation is foremost, followed by vigilance and apprehension. Together, their use influences a forager's time allocation and giving-up density (GUD) in depletable resource patches. We examined Allenby's gerbils (Gerbilus andersoni allenbyi) exploiting seed resource patches in a large vivarium under varying moon phases in the presence of a red fox (Vulpes vulpes). We measured time allocated to foraging patches electronically and GUDs from seeds left behind in resource patches. From these, we estimated handling times, attack rates and quitting harvest rates (QHRs). Gerbils displayed greater vigilance (lower attack rates) at brighter moon phases (full < wane < wax < new). Similarly, they displayed higher GUDs at brighter moon phases (wax > full > new > wane). Finally, gerbils displayed higher QHRs at new and waxing moon phases. Differences across moon phases not only reflect changing time allocation and vigilance, but changes in the state of the foragers and their marginal value of energy. Early in the lunar cycle, gerbils rely on vigilance and sacrifice state to avoid risk; later they defend state at the cost of increased time allocation; finally their state can recover as safe opportunities expand. In the predator–prey foraging game, foxes may contribute to these patterns of behaviours by modulating their own activity in response to the opportunities presented in each moon phase. PMID:20053649

  14. Moonlight avoidance in gerbils reveals a sophisticated interplay among time allocation, vigilance and state-dependent foraging.

    PubMed

    Kotler, Burt P; Brown, Joel; Mukherjee, Shomen; Berger-Tal, Oded; Bouskila, Amos

    2010-05-22

    Foraging animals have several tools for managing the risk of predation, and the foraging games between them and their predators. Among these, time allocation is foremost, followed by vigilance and apprehension. Together, their use influences a forager's time allocation and giving-up density (GUD) in depletable resource patches. We examined Allenby's gerbils (Gerbilus andersoni allenbyi) exploiting seed resource patches in a large vivarium under varying moon phases in the presence of a red fox (Vulpes vulpes). We measured time allocated to foraging patches electronically and GUDs from seeds left behind in resource patches. From these, we estimated handling times, attack rates and quitting harvest rates (QHRs). Gerbils displayed greater vigilance (lower attack rates) at brighter moon phases (full < wane < wax < new). Similarly, they displayed higher GUDs at brighter moon phases (wax > full > new > wane). Finally, gerbils displayed higher QHRs at new and waxing moon phases. Differences across moon phases not only reflect changing time allocation and vigilance, but changes in the state of the foragers and their marginal value of energy. Early in the lunar cycle, gerbils rely on vigilance and sacrifice state to avoid risk; later they defend state at the cost of increased time allocation; finally their state can recover as safe opportunities expand. In the predator-prey foraging game, foxes may contribute to these patterns of behaviours by modulating their own activity in response to the opportunities presented in each moon phase.

  15. Stochastic speckle noise compensation in optical coherence tomography using non-stationary spline-based speckle noise modelling.

    PubMed

    Cameron, Andrew; Lui, Dorothy; Boroomand, Ameneh; Glaister, Jeffrey; Wong, Alexander; Bizheva, Kostadinka

    2013-01-01

    Optical coherence tomography (OCT) allows for non-invasive 3D visualization of biological tissue at cellular level resolution. Often hindered by speckle noise, the visualization of important biological tissue details in OCT that can aid disease diagnosis can be improved by speckle noise compensation. A challenge with handling speckle noise is its inherent non-stationary nature, where the underlying noise characteristics vary with the spatial location. In this study, an innovative speckle noise compensation method is presented for handling the non-stationary traits of speckle noise in OCT imagery. The proposed approach centers on a non-stationary spline-based speckle noise modeling strategy to characterize the speckle noise. The novel method was applied to ultra high-resolution OCT (UHROCT) images of the human retina and corneo-scleral limbus acquired in-vivo that vary in tissue structure and optical properties. Test results showed improved performance of the proposed novel algorithm compared to a number of previously published speckle noise compensation approaches in terms of higher signal-to-noise ratio (SNR), contrast-to-noise ratio (CNR) and better overall visual assessment.

  16. Stochastic speckle noise compensation in optical coherence tomography using non-stationary spline-based speckle noise modelling

    PubMed Central

    Cameron, Andrew; Lui, Dorothy; Boroomand, Ameneh; Glaister, Jeffrey; Wong, Alexander; Bizheva, Kostadinka

    2013-01-01

    Optical coherence tomography (OCT) allows for non-invasive 3D visualization of biological tissue at cellular level resolution. Often hindered by speckle noise, the visualization of important biological tissue details in OCT that can aid disease diagnosis can be improved by speckle noise compensation. A challenge with handling speckle noise is its inherent non-stationary nature, where the underlying noise characteristics vary with the spatial location. In this study, an innovative speckle noise compensation method is presented for handling the non-stationary traits of speckle noise in OCT imagery. The proposed approach centers on a non-stationary spline-based speckle noise modeling strategy to characterize the speckle noise. The novel method was applied to ultra high-resolution OCT (UHROCT) images of the human retina and corneo-scleral limbus acquired in-vivo that vary in tissue structure and optical properties. Test results showed improved performance of the proposed novel algorithm compared to a number of previously published speckle noise compensation approaches in terms of higher signal-to-noise ratio (SNR), contrast-to-noise ratio (CNR) and better overall visual assessment. PMID:24049697

  17. Robust Cell Detection of Histopathological Brain Tumor Images Using Sparse Reconstruction and Adaptive Dictionary Selection

    PubMed Central

    Su, Hai; Xing, Fuyong; Yang, Lin

    2016-01-01

    Successful diagnostic and prognostic stratification, treatment outcome prediction, and therapy planning depend on reproducible and accurate pathology analysis. Computer aided diagnosis (CAD) is a useful tool to help doctors make better decisions in cancer diagnosis and treatment. Accurate cell detection is often an essential prerequisite for subsequent cellular analysis. The major challenge of robust brain tumor nuclei/cell detection is to handle significant variations in cell appearance and to split touching cells. In this paper, we present an automatic cell detection framework using sparse reconstruction and adaptive dictionary learning. The main contributions of our method are: 1) A sparse reconstruction based approach to split touching cells; 2) An adaptive dictionary learning method used to handle cell appearance variations. The proposed method has been extensively tested on a data set with more than 2000 cells extracted from 32 whole slide scanned images. The automatic cell detection results are compared with the manually annotated ground truth and other state-of-the-art cell detection algorithms. The proposed method achieves the best cell detection accuracy with a F1 score = 0.96. PMID:26812706

  18. Dual-pH Sensitive Charge-reversal Nanocomplex for Tumor-targeted Drug Delivery with Enhanced Anticancer Activity.

    PubMed

    Zhou, Qing; Hou, Yilin; Zhang, Li; Wang, Jianlin; Qiao, Youbei; Guo, Songyan; Fan, Li; Yang, Tiehong; Zhu, Lin; Wu, Hong

    2017-01-01

    Poly(β-L-malic acid) (PMLA), a natural aliphatic polyester, has been proven to be a promising carrier for anti-cancer drugs. In spite of excellent bio-compatibility, the application of PMLA as the drug carrier for cancer therapy is limited by its low cellular uptake efficiency. The strong negative charge of PMLA impedes its uptake by cancer cells because of the electrostatic repulsion. In this study, a dual pH-sensitive charge-reversal PMLA-based nanocomplex (PMLA-PEI-DOX-TAT@PEG-DMMA) was developed for effective tumor-targeted drug delivery, enhanced cellular uptake, and intracellular drug release. The prepared nanocomplex showed a negative surface charge at the physiological pH, which could protect the nanocomplex from the attack of plasma proteins and recognition by the reticuloendothelial system, so as to prolong its circulation time. While at the tumor extracellular pH 6.8, the DMMA was hydrolyzed, leading to the charge reversal and exposure of the TAT on the polymeric micelles, thus enhancing the cellular internalization. Then, the polymeric micelles underwent dissociation and drug release in response to the acidic pH in the lyso/endosomal compartments of the tumor cell. Both in vitro and in vivo efficacy studies indicated that the nanocomplex significantly inhibited the tumor growth while the treatment showed negligible systemic toxicity, suggesting that the developed dual pH-sensitive PMLA-based nanocomplex would be a promising drug delivery system for tumor-targeted drug delivery with enhanced anticancer activity.

  19. Dual-pH Sensitive Charge-reversal Nanocomplex for Tumor-targeted Drug Delivery with Enhanced Anticancer Activity

    PubMed Central

    Zhou, Qing; Hou, Yilin; Zhang, Li; Wang, Jianlin; Qiao, Youbei; Guo, Songyan; Fan, Li; Yang, Tiehong; Zhu, Lin; Wu, Hong

    2017-01-01

    Poly(β-L-malic acid) (PMLA), a natural aliphatic polyester, has been proven to be a promising carrier for anti-cancer drugs. In spite of excellent bio-compatibility, the application of PMLA as the drug carrier for cancer therapy is limited by its low cellular uptake efficiency. The strong negative charge of PMLA impedes its uptake by cancer cells because of the electrostatic repulsion. In this study, a dual pH-sensitive charge-reversal PMLA-based nanocomplex (PMLA-PEI-DOX-TAT@PEG-DMMA) was developed for effective tumor-targeted drug delivery, enhanced cellular uptake, and intracellular drug release. The prepared nanocomplex showed a negative surface charge at the physiological pH, which could protect the nanocomplex from the attack of plasma proteins and recognition by the reticuloendothelial system, so as to prolong its circulation time. While at the tumor extracellular pH 6.8, the DMMA was hydrolyzed, leading to the charge reversal and exposure of the TAT on the polymeric micelles, thus enhancing the cellular internalization. Then, the polymeric micelles underwent dissociation and drug release in response to the acidic pH in the lyso/endosomal compartments of the tumor cell. Both in vitro and in vivo efficacy studies indicated that the nanocomplex significantly inhibited the tumor growth while the treatment showed negligible systemic toxicity, suggesting that the developed dual pH-sensitive PMLA-based nanocomplex would be a promising drug delivery system for tumor-targeted drug delivery with enhanced anticancer activity. PMID:28638469

  20. Factor H: A Complement Regulator in Health and Disease, and a Mediator of Cellular Interactions

    PubMed Central

    Kopp, Anne; Hebecker, Mario; Svobodová, Eliška; Józsi, Mihály

    2012-01-01

    Complement is an essential part of innate immunity as it participates in host defense against infections, disposal of cellular debris and apoptotic cells, inflammatory processes and modulation of adaptive immune responses. Several soluble and membrane-bound regulators protect the host from the potentially deleterious effects of uncontrolled and misdirected complement activation. Factor H is a major soluble regulator of the alternative complement pathway, but it can also bind to host cells and tissues, protecting them from complement attack. Interactions of factor H with various endogenous ligands, such as pentraxins, extracellular matrix proteins and DNA are important in limiting local complement-mediated inflammation. Impaired regulatory as well as ligand and cell recognition functions of factor H, caused by mutations or autoantibodies, are associated with the kidney diseases: atypical hemolytic uremic syndrome and dense deposit disease and the eye disorder: age-related macular degeneration. In addition, factor H binds to receptors on host cells and is involved in adhesion, phagocytosis and modulation of cell activation. In this review we discuss current concepts on the physiological and pathophysiological roles of factor H in light of new data and recent developments in our understanding of the versatile roles of factor H as an inhibitor of complement activation and inflammation, as well as a mediator of cellular interactions. A detailed knowledge of the functions of factor H in health and disease is expected to unravel novel therapeutic intervention possibilities and to facilitate the development or improvement of therapies. PMID:24970127

  1. Molecular interactions between tomato and the leaf mold pathogen Cladosporium fulvum.

    PubMed

    Rivas, Susana; Thomas, Colwyn M

    2005-01-01

    The interaction between tomato and the leaf mold pathogen Cladosporium fulvum is controlled in a gene-for-gene manner. This interaction has provided useful insights to the molecular basis of recognition specificity in plant disease resistance (R) proteins, disease resistance (R) gene evolution, R-protein mediated signaling, and cellular responses to pathogen attack. Tomato Cf genes encode type I membrane-associated receptor-like proteins (RLPs) comprised predominantly of extracellular leucine-rich repeats (eLRRs) and which are anchored in the plasma membrane. Cf proteins recognize fungal avirulence (Avr) peptides secreted into the leaf apoplast during infection. A direct interaction of Cf proteins with their cognate Avr proteins has not been demonstrated and the molecular mechanism of Avr protein perception is not known. Following ligand perception Cf proteins trigger a hypersensitive response (HR) and the arrest of pathogen development. Cf proteins lack an obvious signaling domain, suggesting that defense response activation is mediated through interactions with other partners. Avr protein perception results in the rapid accumulation of active oxygen species (AOS), changes in cellular ion fluxes, activation of protein kinase cascades, changes in gene expression and, possibly, targeted protein degradation. Here we review our current understanding of Cf-mediated responses in resistance to C. fulvum.

  2. Role of Cyclic Nucleotide Gated Channels in Stress Management in Plants

    PubMed Central

    Jha, Saroj K.; Sharma, Manisha; Pandey, Girdhar K.

    2016-01-01

    Tolerance of plants to a number of biotic and abiotic stresses such as pathogen and herbivore attack, drought, salinity, cold and nutritional limitations is ensued by complex multimodule signaling pathways. The outcome of this complex signaling pathways results in adaptive responses by restoring the cellular homeostasis and thus promoting survival. Functions of many plant cation transporter and channel protein families such as glutamate receptor homologs (GLRs), cyclic nucleotide-gated ion channel (CNGC) have been implicated in providing biotic and abiotic stress tolerance. Ion homeostasis regulated by several transporters and channels is one of the crucial parameters for the optimal growth, development and survival of all living organisms. The CNGC family members are known to be involved in the uptake of cations such as Na+, K+ and Ca2+ and regulate plant growth and development. Detail functional genomics approaches have given an emerging picture of CNGCs wherein these protein are believed to play crucial role in pathways related to cellular ion homeostasis, development and as a ‘guard’ in defense against biotic and abiotic challenges. Here, we discuss the current knowledge of role of CNGCs in mediating stress management and how they aid plants in survival under adverse conditions. PMID:27499681

  3. Modelling Spread of Oncolytic Viruses in Heterogeneous Cell Populations

    NASA Astrophysics Data System (ADS)

    Ellis, Michael; Dobrovolny, Hana

    2014-03-01

    One of the most promising areas in current cancer research and treatment is the use of viruses to attack cancer cells. A number of oncolytic viruses have been identified to date that possess the ability to destroy or neutralize cancer cells while inflicting minimal damage upon healthy cells. Formulation of predictive models that correctly describe the evolution of infected tumor systems is critical to the successful application of oncolytic virus therapy. A number of different models have been proposed for analysis of the oncolytic virus-infected tumor system, with approaches ranging from traditional coupled differential equations such as the Lotka-Volterra predator-prey models, to contemporary modeling frameworks based on neural networks and cellular automata. Existing models are focused on tumor cells and the effects of virus infection, and offer the potential for improvement by including effects upon normal cells. We have recently extended the traditional framework to a 2-cell model addressing the full cellular system including tumor cells, normal cells, and the impacts of viral infection upon both populations. Analysis of the new framework reveals complex interaction between the populations and potential inability to simultaneously eliminate the virus and tumor populations.

  4. Direct in vivo inflammatory cell-induced corrosion of CoCrMo alloy orthopedic implant surfaces.

    PubMed

    Gilbert, Jeremy L; Sivan, Shiril; Liu, Yangping; Kocagöz, Sevi B; Arnholt, Christina M; Kurtz, Steven M

    2015-01-01

    Cobalt-chromium-molybdenum (CoCrMo) alloy, used for over five decades in orthopedic implants, may corrode and release wear debris into the body during use. These degradation products may stimulate immune and inflammatory responses in vivo. We report here on evidence of direct inflammatory cell-induced corrosion of human implanted and retrieved CoCrMo implant surfaces. Corrosion morphology on CoCrMo implant surfaces, in unique and characteristic patterns, and the presence of cellular remnants and biological materials intimately entwined with the corrosion indicates direct cellular attack under the cell membrane region of adhered and/or migrating inflammatory cells. Evidence supports a Fenton-like reaction mechanism driving corrosion in which reactive oxygen species are the major driver of corrosion. Using in vitro tests, large increases in corrosion susceptibility of CoCrMo were seen (40-100 fold) when immersed in phosphate buffered saline solutions modified with hydrogen peroxide and hydrochloric acid to represent the chemistry under inflammatory cells. This discovery raises significant new questions about the clinical consequences of such corrosion interactions, the role of patient inflammatory reactions, and the detailed mechanisms at play. © 2014 Wiley Periodicals, Inc.

  5. Direct In Vivo Inflammatory Cell-Induced Corrosion of CoCrMo Alloy Orthopedic Implant Surfaces

    PubMed Central

    Gilbert, Jeremy L.; Sivan, Shiril; Liu, Yangping; Kocagöz, Sevi; Arnholt, Christina; Kurtz, Steven M.

    2014-01-01

    Cobalt-chromium-molybdenum alloy, used for over four decades in orthopedic implants, may corrode and release wear debris into the body during use. These degradation products may stimulate immune and inflammatory responses in vivo. We report here on evidence of direct inflammatory cell-induced corrosion of human implanted and retrieved CoCrMo implant surfaces. Corrosion morphology on CoCrMo implant surfaces, in unique and characteristic patterns, and the presence of cellular remnants and biological materials intimately entwined with the corrosion indicates direct cellular attack under the cell membrane region of adhered and/or migrating inflammatory cells. Evidence supports a Fenton-like reaction mechanism driving corrosion in which reactive oxygen species are the major driver of corrosion. Using in vitro tests, large increases in corrosion susceptibility of CoCrMo were seen (40 to 100 fold) when immersed in phosphate buffered saline solutions modified with hydrogen peroxide and HCl to represent the chemistry under inflammatory cells. This discovery raises significant new questions about the clinical consequences of such corrosion interactions, the role of patient inflammatory reactions, and the detailed mechanisms at play. PMID:24619511

  6. Tensegrity I. Cell structure and hierarchical systems biology

    NASA Technical Reports Server (NTRS)

    Ingber, Donald E.

    2003-01-01

    In 1993, a Commentary in this journal described how a simple mechanical model of cell structure based on tensegrity architecture can help to explain how cell shape, movement and cytoskeletal mechanics are controlled, as well as how cells sense and respond to mechanical forces (J. Cell Sci. 104, 613-627). The cellular tensegrity model can now be revisited and placed in context of new advances in our understanding of cell structure, biological networks and mechanoregulation that have been made over the past decade. Recent work provides strong evidence to support the use of tensegrity by cells, and mathematical formulations of the model predict many aspects of cell behavior. In addition, development of the tensegrity theory and its translation into mathematical terms are beginning to allow us to define the relationship between mechanics and biochemistry at the molecular level and to attack the larger problem of biological complexity. Part I of this two-part article covers the evidence for cellular tensegrity at the molecular level and describes how this building system may provide a structural basis for the hierarchical organization of living systems--from molecule to organism. Part II, which focuses on how these structural networks influence information processing networks, appears in the next issue.

  7. Multifunctional Pt(II) Reagents: Covalent Modifications of Pt Complexes Enable Diverse Structural Variation and In-Cell Detection.

    PubMed

    White, Jonathan D; Haley, Michael M; DeRose, Victoria J

    2016-01-19

    To enhance the functionality of Pt-based reagents, several strategies have been developed that utilize Pt compounds modified with small, reactive handles. This Account encapsulates work done by us and other groups regarding the use of Pt(II) compounds with reactive handles for subsequent elaboration with fluorophores or other functional moieties. Described strategies include the incorporation of substituents for well-known condensation or nucleophilic displacement-type reactions and their use, for example, to tether spectroscopic handles to Pt reagents for in vivo investigation. Other chief uses of displacement-type reactions have included tethering various small molecules exhibiting pharmacological activity directly to Pt, thus adding synergistic effects. Click chemistry-based ligation techniques have also been applied, primarily with azide- and alkyne-appended Pt complexes. Orthogonally reactive click chemistry reactions have proven invaluable when more traditional nucleophilic displacement reactions induce side-reactivity with the Pt center or when systematic functionalization of a larger number of Pt complexes is desired. Additionally, a diverse assortment of Pt-fluorophore conjugates have been tethered via click chemistry conjugation. In addition to providing a convenient synthetic path for diversifying Pt compounds, the use of click-capable Pt complexes has proved a powerful strategy for postbinding covalent modification and detection with fluorescent probes. This strategy bypasses undesirable influences of the fluorophore camouflaged as reactivity due to Pt that may be present when detecting preattached Pt-fluorophore conjugates. Using postbinding strategies, Pt reagent distributions in HeLa and lung carcinoma (NCI-H460) cell cultures were observed with two different azide-modified Pt compounds, a monofunctional Pt(II)-acridine type and a difunctional Pt(II)-neutral complex. In addition, cellular distribution was observed with an alkyne-appended difunctional Pt(II)-neutral complex analogous in structure to the aforementioned difunctional azide-Pt(II) reagent. In all cases, significant accumulation of Pt in the nucleolus of cells was observed, in addition to broader localization in the nucleus and cytoplasm of the cell. Using the same strategy of postbinding click modification with fluorescent probes, Pt adducts were detected and roughly quantified on rRNA and tRNA from Pt-treated Saccharomyces cerevisiae; rRNA adducts were found to be relatively long-lived and not targeted for immediate degradation. Finally, the utility and feasibility of the alkyne-appended Pt(II) compound has been further demonstrated with a turn-on fluorophore, dansyl azide, in fluorescent detection of DNA in vitro. In all, these modifications utilizing reactive handles have allowed for the diversification of new Pt reagents, as well as providing cellular localization information on the modified Pt compounds.

  8. A biopolymer transistor: electrical amplification by microtubules.

    PubMed

    Priel, Avner; Ramos, Arnolt J; Tuszynski, Jack A; Cantiello, Horacio F

    2006-06-15

    Microtubules (MTs) are important cytoskeletal structures engaged in a number of specific cellular activities, including vesicular traffic, cell cyto-architecture and motility, cell division, and information processing within neuronal processes. MTs have also been implicated in higher neuronal functions, including memory and the emergence of "consciousness". How MTs handle and process electrical information, however, is heretofore unknown. Here we show new electrodynamic properties of MTs. Isolated, taxol-stabilized MTs behave as biomolecular transistors capable of amplifying electrical information. Electrical amplification by MTs can lead to the enhancement of dynamic information, and processivity in neurons can be conceptualized as an "ionic-based" transistor, which may affect, among other known functions, neuronal computational capabilities.

  9. Transglutaminase induction by various cell death and apoptosis pathways.

    PubMed

    Fesus, L; Madi, A; Balajthy, Z; Nemes, Z; Szondy, Z

    1996-10-31

    Clarification of the molecular details of forms of natural cell death, including apoptosis, has become one of the most challenging issues of contemporary biomedical sciences. One of the effector elements of various cell death pathways is the covalent cross-linking of cellular proteins by transglutaminases. This review will discuss the accumulating data related to the induction and regulation of these enzymes, particularly of tissue type transglutaminase, in the molecular program of cell death. A wide range of signalling pathways can lead to the parallel induction of apoptosis and transglutaminase, providing a handle for better understanding the exact molecular interactions responsible for the mechanism of regulated cell death.

  10. Lead Speciation in Microorganisms.

    PubMed

    Stewart, Theodora J

    2017-04-10

    The biogeochemical cycles of lead (Pb) have been largely affected by anthropogenic activities as a result of its high natural abundance and use over the centuries [1]. At sites more strongly impacted by urbanization [2] and mining [3], Pb is found at high nano to low micromolar concentrations in surface waters, and can be significantly higher in soil and sediment [4]. Microorganisms are found everywhere and their responses to Pb exposure can range from resistant to highly sensitive [5, 6]. These varying levels of toxicity can be attributed to the cellular handling of Pb, making it important to understand the role of intracellular Pb speciation for more accurate toxicity predictions.

  11. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    NASA Astrophysics Data System (ADS)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  12. Intolerance and Violence Against Doctors.

    PubMed

    Singh, Meharban

    2017-10-01

    Intolerance and grouse against doctors is a global phenomenon but India seems to lead the world in violence against doctors. According to World Health Organization, about 8-38% healthcare workers suffer physical violence at some point in their careers. Many more are verbally abused or threatened. Public is almost behaving like health sector terrorists. The spate of increasing attacks on doctors by damaging their property and causing physical injury is not acceptable by any civilized society. The public is becoming increasingly intolerant to a large number of social issues because of poor governance and vote bank politics. There is a need to arrest the development of further distrust between doctors and their patients/relatives, otherwise it will compromise all achievements of medical science and adversely affect healing capabilities of doctors. Rude and aggressive behavior of the patients or their family members, and arrogant and lackadaisical approach of the doctor, adversely affects the doctor-patient relationship and the outcome of the patient. The doctors, hospital administration and government must exercise "zero tolerance" with respect to acts of violence against healthcare professionals. It is possible to reduce the incidence of intolerance against doctors but difficult to eliminate it completely. The healthcare providers should demonstrate greater compassion and empathy with improved communication skills. The hospitals must have adequate infrastructure, facilities and staff to handle emergencies without delay and with due confidence and skills. The security of healthcare providers, especially in sensitive areas, should be improved by having adequate number of security guards, frisking facilities, extensive CCTV network and availability of "Quick response team" to handle unruly mob. In case of any grievances for alleged mismanagement, the public should handle the situation in a civilized manner and seek redressal through Medical Protection Act and legal avenues. Laws to prevent violence against doctors do exist but they need to be made more stringent and implemented properly.

  13. The contribution of collective attack tactics in differentiating handball score efficiency.

    PubMed

    Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka

    2004-12-01

    The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.

  14. Body size and predatory performance in wolves: is bigger better?

    PubMed

    MacNulty, Daniel R; Smith, Douglas W; Mech, L David; Eberly, Lynn E

    2009-05-01

    1. Large body size hinders locomotor performance in ways that may lead to trade-offs in predator foraging ability that limit the net predatory benefit of larger size. For example, size-related improvements in handling prey may come at the expense of pursuing prey and thus negate any enhancement in overall predatory performance due to increasing size. 2. This hypothesis was tested with longitudinal data from repeated observations of 94 individually known wolves (Canis lupus) hunting elk (Cervus elaphus) in Yellowstone National Park, USA. Wolf size was estimated from an individually based sex-specific growth model derived from body mass measurements of 304 wolves. 3. Larger size granted individual wolves a net predatory advantage despite substantial variation in its effect on the performance of different predatory tasks; larger size improved performance of a strength-related task (grappling and subduing elk) but failed to improve performance of a locomotor-related task (selecting an elk from a group) for wolves > 39 kg. 4. Sexual dimorphism in wolf size also explained why males outperformed females in each of the three tasks considered (attacking, selecting, and killing). 5. These findings support the generalization that bigger predators are overall better hunters, but they also indicate that increasing size ultimately limits elements of predatory behaviour that require superior locomotor performance. We argue that this could potentially narrow the dietary niche of larger carnivores as well as limit the evolution of larger size if prey are substantially more difficult to pursue than to handle.

  15. Body size and predatory performance in wolves: Is bigger better?

    USGS Publications Warehouse

    MacNulty, D.R.; Smith, D.W.; Mech, L.D.; Eberly, L.E.

    2009-01-01

    Large body size hinders locomotor performance in ways that may lead to trade-offs in predator foraging ability that limit the net predatory benefit of larger size. For example, size-related improvements in handling prey may come at the expense of pursuing prey and thus negate any enhancement in overall predatory performance due to increasing size. 2. This hypothesis was tested with longitudinal data from repeated observations of 94 individually known wolves (Canis lupus) hunting elk (Cervus elaphus) in Yellowstone National Park, USA. Wolf size was estimated from an individually based sex-specific growth model derived from body mass measurements of 304 wolves. 3. Larger size granted individual wolves a net predatory advantage despite substantial variation in its effect on the performance of different predatory tasks; larger size improved performance of a strength-related task (grappling and subduing elk) but failed to improve performance of a locomotor-related task (selecting an elk from a group) for wolves > 39 kg. 4. Sexual dimorphism in wolf size also explained why males outperformed females in each of the three tasks considered (attacking, selecting, and killing). 5. These findings support the generalization that bigger predators are overall better hunters, but they also indicate that increasing size ultimately limits elements of predatory behaviour that require superior locomotor performance. We argue that this could potentially narrow the dietary niche of larger carnivores as well as limit the evolution of larger size if prey are substantially more difficult to pursue than to handle. ?? 2009 British Ecological Society.

  16. A short history of nitroglycerine and nitric oxide in pharmacology and physiology.

    PubMed

    Marsh, N; Marsh, A

    2000-04-01

    1. Nitroglycerine (NG) was discovered in 1847 by Ascanio Sobrero in Turin, following work with Theophile-Jules Pelouze. Sobrero first noted the 'violent headache' produced by minute quantities of NG on the tongue. 2. Constantin Hering, in 1849, tested NG in healthy volunteers, observing that headache was caused with 'such precision'. Hering pursued NG ('glonoine') as a homeopathic remedy for headache, believing that its use fell within the doctrine of 'like cures like'. 3. Alfred Nobel joined Pelouze in 1851 and recognized the potential of NG. He began manufacturing NG in Sweden, overcoming handling problems with his patent detonator. Nobel suffered acutely from angina and was later to refuse NG as a treatment. 4. During the mid-19th century, scientists in Britain took an interest in the newly discovered amyl nitrite, recognized as a powerful vasodilator. Lauder Brunton, the father of modern pharmacology, used the compound to relieve angina in 1867, noting the pharmacological resistance to repeated doses. 5. William Murrell first used NG for angina in 1876, although NG entered the British Pharmacopoeia as a remedy for hypertension. William Martindale, the pharmaceutical chemist, prepared '...a more stable and portable preparation': 1/100th of a grain in chocolate. 6. In the early 20th century, scientists worked on in vitro actions of nitrate-containing compounds although little progress was made towards understanding the cellular mode of action. 7. The NG industry flourished from 1900, exposing workers to high levels of organic nitrites; the phenomena of nitrate tolerance was recognized by the onset of 'Monday disease' and of nitrate-withdrawal/overcompensation by 'Sunday Heart Attacks'. 8. Ferid Murad discovered the release of nitric oxide (NO) from NG and its action on vascular smooth muscle (in 1977). Robert Furchgott and John Zawadski recognized the importance of the endothelium in acetylcholine-induced vasorelaxation (in 1980) and Louis Ignarro and Salvador Moncada identified endothelial-derived relaxing factor (EDRF) as NO (in 1987). 9. Glycerol trinitrate remains the treatment of choice for relieving angina; other organic esters and inorganic nitrates are also used, but the rapid action of NG and its established efficacy make it the mainstay of angina pectoris relief.

  17. Predicting Factors of Zone 4 Attack in Volleyball.

    PubMed

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  18. Conversations between kingdoms: small RNAs.

    PubMed

    Weiberg, Arne; Bellinger, Marschal; Jin, Hailing

    2015-04-01

    Humans, animals, and plants are constantly under attack from pathogens and pests, resulting in severe consequences on global human health and crop production. Small RNA (sRNA)-mediated RNA interference (RNAi) is a conserved regulatory mechanism that is involved in almost all eukaryotic cellular processes, including host immunity and pathogen virulence. Recent evidence supports the significant contribution of sRNAs and RNAi to the communication between hosts and some eukaryotic pathogens, pests, parasites, or symbiotic microorganisms. Mobile silencing signals—most likely sRNAs—are capable of translocating from the host to its interacting organism, and vice versa. In this review, we will provide an overview of sRNA communications between different kingdoms, with a primary focus on the advances in plant-pathogen interaction systems. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Automation of the ELISpot assay for high-throughput detection of antigen-specific T-cell responses.

    PubMed

    Almeida, Coral-Ann M; Roberts, Steven G; Laird, Rebecca; McKinnon, Elizabeth; Ahmed, Imran; Pfafferott, Katja; Turley, Joanne; Keane, Niamh M; Lucas, Andrew; Rushton, Ben; Chopra, Abha; Mallal, Simon; John, Mina

    2009-05-15

    The enzyme linked immunospot (ELISpot) assay is a fundamental tool in cellular immunology, providing both quantitative and qualitative information on cellular cytokine responses to defined antigens. It enables the comprehensive screening of patient derived peripheral blood mononuclear cells to reveal the antigenic restriction of T-cell responses and is an emerging technique in clinical laboratory investigation of certain infectious diseases. As with all cellular-based assays, the final results of the assay are dependent on a number of technical variables that may impact precision if not highly standardised between operators. When studies that are large scale or using multiple antigens are set up manually, these assays may be labour intensive, have many manual handling steps, are subject to data and sample integrity failure and may show large inter-operator variability. Here we describe the successful automated performance of the interferon (IFN)-gamma ELISpot assay from cell counting through to electronic capture of cytokine quantitation and present the results of a comparison between automated and manual performance of the ELISpot assay. The mean number of spot forming units enumerated by both methods for limiting dilutions of CMV, EBV and influenza (CEF)-derived peptides in six healthy individuals were highly correlated (r>0.83, p<0.05). The precision results from the automated system compared favourably with the manual ELISpot and further ensured electronic tracking, increased through-put and reduced turnaround time.

  20. Adaptive Antenna System for Both 4G LTE and 5G Cellular Systems

    NASA Astrophysics Data System (ADS)

    Henderson, Kendrick Q. T.

    Given the steep increase in the use of mobile communication systems, the current 4G/LTE (Long Term Evolution), cellular system will not be able to handle the increase in data. It is estimated that by 2020 the bandwidth requirements will be 10 times greater than what LTE can sustain. A new 5th generation (5G) communication system has been proposed to meet this demand. The physical layer or the antenna is the most critical part of any wireless communication systems as it is the interface between the free space medium and an electrical circuit. It sets the margin for almost all design parameters in the system such as the system noise and bandwidth. Several interactions of antennas have been proposed over the years for cellular services. These antennas are of various geometries, bandwidths, and radiation patterns with almost all having linear polarization. This thesis attempts to solve the multiple LTE antenna problem by creating a simple antenna that covers most of the LTE bands (850-2700 MHz) as well as introducing an antenna system at the 28 GHz 5G band. This allows for a greater educated hypothesis into what 5G can offer at the physical layer. The proposed concept will provide a solution to the co-existence problem of upcoming 5G wireless systems to be interoperable with existing 4G/LTE system.

  1. A non-covalent peptide-based strategy for ex vivo and in vivo oligonucleotide delivery.

    PubMed

    Crombez, Laurence; Morris, May C; Heitz, Frederic; Divita, Gilles

    2011-01-01

    The dramatic acceleration in identification of new nucleic acid-based therapeutic molecules such as short interfering RNA (siRNA) and peptide-nucleic acid (PNA) analogues has provided new perspectives for therapeutic targeting of specific genes responsible for pathological disorders. However, the poor cellular uptake of nucleic acids together with the low permeability of the cell membrane to negatively charged molecules remain major obstacles to their clinical development. Several non-viral strategies have been proposed to improve the delivery of synthetic short oligonucleotides both in cultured cells and in vivo. Cell-penetrating peptides constitute very promising tools for non-invasive cellular import of oligonucleotides and analogs. We recently described a non-covalent strategy based on short amphiphatic peptides (MPG8/PEP3) that have been successfully applied ex vivo and in vivo for the delivery of therapeutic siRNA and PNA molecules. PEP3 and MPG8 form stable nanoparticles with PNA analogues and siRNA, respectively, and promote their efficient cellular uptake, independently of the endosomal pathway, into a wide variety of cell lines, including primary and suspension lines, without any associated cytotoxicity. This chapter describes easy-to-handle protocols for the use of MPG-8 or PEP-3-nanoparticle technologies for PNA and siRNA delivery into adherent and suspension cell lines as well as in vivo into cancer mouse models.

  2. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant: findings from the Icatibant Outcome Survey.

    PubMed

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard

    2017-01-01

    Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.

  3. THE INTRARENAL DISTRIBUTION OF TRITIATED PARA-AMINOHIPPURIC ACID DETERMINED BY A MODIFIED TECHNIQUE OF SECTION FREEZE-DRY RADIOAUTOGRAPHY

    PubMed Central

    Bordier, Betrand; Ornstein, Leonard; Wedeen, Richard P.

    1970-01-01

    Section freeze-dry radioautography has been used to examine the intrarenal distribution of a water-soluble organic acid (para-aminohippuric acid (PAH-3H)) under constant-infusion, steady-state conditions in mouse and rat kidney in vivo. The technique described here has the following advantages: (a) Sectioning and freeze-drying are accomplished in a closed cryostat at temperatures below -40°C; (b) Handling of the section is facilitated by mounting of the section-to-be on adhesive-coated Saran Wrap prior to cutting; (c) Unembedded freeze-dried sections are attached to photographic film at ambient temperature in the dark room; (d) Fixation follows completion of radioautographic exposure and precedes photographic development; (e) Permanent close contact is maintained between tissue and film. Morphologic preservation compared favorably with that obtained by optimal fixation techniques, which, however, permit diffusion. Cellular accumulation of PAH-3H during secretion was demonstrated in the proximal tubule under steady-state conditions in vivo. The cellular concentration of PAH-3H was uniform throughout the length of the proximal tubule in mouse and rat kidney. PMID:4349130

  4. Peripheral blood lymphocytes: a model for monitoring physiological adaptation to high altitude.

    PubMed

    Mariggiò, Maria A; Falone, Stefano; Morabito, Caterina; Guarnieri, Simone; Mirabilio, Alessandro; Pilla, Raffaele; Bucciarelli, Tonino; Verratti, Vittore; Amicarelli, Fernanda

    2010-01-01

    Depending on the absolute altitude and the duration of exposure, a high altitude environment induces various cellular effects that are strictly related to changes in oxidative balance. In this study, we used in vitro isolated peripheral blood lymphocytes as biosensors to test the effect of hypobaric hypoxia on seven climbers by measuring the functional activity of these cells. Our data revealed that a 21-day exposure to high altitude (5000 m) (1) increased intracellular Ca(2+) concentration, (2) caused a significant decrease in mitochondrial membrane potential, and (3) despite possible transient increases in intracellular levels of reactive oxygen species, did not significantly change the antioxidant and/or oxidative damage-related status in lymphocytes and serum, assessed by measuring Trolox-equivalent antioxidant capacity, glutathione peroxidase activity, vitamin levels, and oxidatively modified proteins and lipids. Overall, these results suggest that high altitude might cause an impairment in adaptive antioxidant responses. This, in turn, could increase the risk of oxidative-stress-induced cellular damage. In addition, this study corroborates the use of peripheral blood lymphocytes as an easily handled model for monitoring adaptive response to environmental challenge.

  5. Focused Metabolite Profiling for Dissecting Cellular and Molecular Processes of Living Organisms in Space Environments

    NASA Technical Reports Server (NTRS)

    2008-01-01

    Regulatory control in biological systems is exerted at all levels within the central dogma of biology. Metabolites are the end products of all cellular regulatory processes and reflect the ultimate outcome of potential changes suggested by genomics and proteomics caused by an environmental stimulus or genetic modification. Following on the heels of genomics, transcriptomics, and proteomics, metabolomics has become an inevitable part of complete-system biology because none of the lower "-omics" alone provide direct information about how changes in mRNA or protein are coupled to changes in biological function. The challenges are much greater than those encountered in genomics because of the greater number of metabolites and the greater diversity of their chemical structures and properties. To meet these challenges, much developmental work is needed, including (1) methodologies for unbiased extraction of metabolites and subsequent quantification, (2) algorithms for systematic identification of metabolites, (3) expertise and competency in handling a large amount of information (data set), and (4) integration of metabolomics with other "omics" and data mining (implication of the information). This article reviews the project accomplishments.

  6. 2012 Gordon Research Conference on Mutagenesis - Formal Schedule and Speaker/Poster Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Demple, Bruce

    2012-08-24

    The delicate balance among cellular pathways that control mutagenic changes in DNA will be the focus of the 2012 Mutagenesis Gordon Research Conference. Mutagenesis is essential for evolution, while genetic stability maintains cellular functions in all organisms from microbes to metazoans. Different systems handle DNA lesions at various times of the cell cycle and in different places within the nucleus, and inappropriate actions can lead to mutations. While mutation in humans is closely linked to disease, notably cancers, mutational systems can also be beneficial. The conference will highlight topics of beneficial mutagenesis, including full establishment of the immune system, cellmore » survival mechanisms, and evolution and adaptation in microbial systems. Equal prominence will be given to detrimental mutation processes, especially those involved in driving cancer, neurological diseases, premature aging, and other threats to human health. Provisional session titles include Branching Pathways in Mutagenesis; Oxidative Stress and Endogenous DNA Damage; DNA Maintenance Pathways; Recombination, Good and Bad; Problematic DNA Structures; Localized Mutagenesis; Hypermutation in the Microbial World; and Mutation and Disease.« less

  7. Ablation of the Kell/Xk complex alters erythrocyte divalent cation homeostasis.

    PubMed

    Rivera, Alicia; Kam, Siok Yuen; Ho, Mengfatt; Romero, Jose R; Lee, Soohee

    2013-02-01

    XK is a putative transporter of unknown function that is ubiquitously expressed and linked through disulfide bonds to Kell protein, an endothelin-3 (ET-3)-converting enzyme. We generated three knockout (KO) mice that lacked either Xk, Kell or both proteins and characterized erythrocyte cation levels, transport and hematological parameters. Absence of Xk or Kell was accompanied by changes in erythrocyte K(+), Mg(2+), Na(+) and Ca(2+) transport that were associated with changes in mean cellular volume and corpuscular hemoglobin concentration mean. Baseline Ca(2+)-ATPase activity was undetected in erythrocytes from all three mouse types but was restored upon pre-incubation with ET-3. Consistent with these alterations in Ca(2+) handling, we observed increased Gardos channel activity in Kel and Xk KO mice. In addition Kel deletion was associated with increased Mg(2+) permeability while Xk deletion blocked Na/Mg exchanger activity. Our results provide evidence that cellular divalent cation regulation is functionally coupled to the Kell/XK system in erythrocytes and loss of this complex may contribute to acanthocytosis formation in McLeod syndrome. Copyright © 2012 Elsevier Inc. All rights reserved.

  8. Ablation of the Kell/Xk complex alters erythrocyte divalent cation homeostasis

    PubMed Central

    Rivera, Alicia; Kam, Siok Yuen; Ho, Mengfatt; Romero, Jose R.; Lee, Soohee

    2012-01-01

    XK is a putative transporter of unknown function that is ubiquitously expressed and linked through disulfide bonds to Kell protein, an endothelin-3 (ET-3)-converting enzyme. We generated three knockout (KO) mice that lacked either Xk, Kell or both proteins and characterized erythrocyte cation levels, transport and hematological parameters. Absence of Xk or Kell was accompanied by changes in erythrocyte K+, Mg2+, Na+ and Ca2+ transport that were associated with changes in mean cellular volume and corpuscular hemoglobin concentration mean. Baseline Ca2+-ATPase activity was undetected in erythrocytes from all three mouse types but was restored upon pre-incubation with ET-3. Consistent with these alterations in Ca2+ handling, we observed increased Gardos channel activity in Kel and Xk KO mice. In addition Kel deletion was associated with increased Mg2+ permeability while Xk deletion blocked Na/Mg exchanger activity. Our results provide evidence that cellular divalent cation regulation is functionally coupled to the Kell/XK system in erythrocytes and loss of this complex may contribute to acanthocytosis formation in McLeod syndrome. PMID:23122227

  9. The proteome of the wool cuticle.

    PubMed

    Koehn, Henning; Clerens, Stefan; Deb-Choudhury, Santanu; Morton, James D; Dyer, Jolon M; Plowman, Jeffrey E

    2010-06-04

    The cuticle is responsible for important wool fiber characteristics such as handle and abrasion resistance, which impact on the fiber's performance in both interior and apparel textiles. The cuticle proteome, however, is not well understood due to the difficulty in isolating pure wool cuticle and its significant resistance to protein extraction, which is attributed to the presence of extensive disulfide and isopeptide cross-linking. We investigated the proteome of highly pure Merino wool cuticle using a combined strategy of chemical and enzymatic digestion and identified 108 proteins, including proteins responsible for a variety of cellular processes. The majority of identified proteins belonged to keratin and nonkeratin protein families known to play an important role in molecular assembly and cellular structure. Keratin-associated, intermediate filament and cytoskeletal keratin proteins were identified as the most prominent keratinous cuticular constituents, while histones, tubulins, and desmosomes were the key nonkeratin structural proteins. We conclude that a variety of proteins contribute to cuticle structure and fiber characteristics, and that the keratinous protein families of IFPs and KAPs represent the most important cuticular constituents.

  10. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less

  11. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-01-01

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  12. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  13. A 3-D Computational Study of a Variable Camber Continuous Trailing Edge Flap (VCCTEF) Spanwise Segment

    NASA Technical Reports Server (NTRS)

    Kaul, Upender K.; Nguyen, Nhan T.

    2015-01-01

    Results of a computational study carried out to explore the effects of various elastomer configurations joining spanwise contiguous Variable Camber Continuous Trailing Edge Flap (VCCTEF) segments are reported here. This research is carried out as a proof-of-concept study that will seek to push the flight envelope in cruise with drag optimization as the objective. The cruise conditions can be well off design such as caused by environmental conditions, maneuvering, etc. To handle these off-design conditions, flap deflection is used so when the flap is deflected in a given direction, the aircraft angle of attack changes accordingly to maintain a given lift. The angle of attack is also a design parameter along with the flap deflection. In a previous 2D study,1 the effect of camber was investigated and the results revealed some insight into the relative merit of various camber settings of the VCCTEF. The present state of the art has not advanced sufficiently to do a full 3-D viscous analysis of the whole NASA Generic Transport Model (GTM) wing with VCCTEF deployed with elastomers. Therefore, this study seeks to explore the local effects of three contiguous flap segments on lift and drag of a model devised here to determine possible trades among various flap deflections to achieve desired lift and drag results. Although this approach is an approximation, it provides new insights into the "local" effects of the relative deflections of the contiguous spanwise flap systems and various elastomer segment configurations. The present study is a natural extension of the 2-D study to assess these local 3-D effects. Design cruise condition at 36,000 feet at free stream Mach number of 0.797 and a mean aerodynamic chord (MAC) based Reynolds number of 30.734x10(exp 6) is simulated for an angle of attack (AoA) range of 0 to 6 deg. In the previous 2-D study, the calculations revealed that the parabolic arc camber (1x2x3) and circular arc camber (VCCTEF222) offered the best L/D characteristics and minimum drag in cruise. In the present 3-D study, calculations show that for the same C(sub t), the 3-D circular arc camber wing segment produces the largest drag for a given lift, larger than either of the two 2-D configurations, as was also conjectured in the previous study. This study indicates a wing stall around 4.5 deg angle of attack.

  14. Mitochondrial VDAC1-based peptides: Attacking oncogenic properties in glioblastoma

    PubMed Central

    Shteinfer-Kuzmine, Anna; Arif, Tasleem; Krelin, Yakov; Tripathi, Shambhoo Sharan; Paul, Avijit; Shoshan-Barmatz, Varda

    2017-01-01

    Glioblastoma multiforme (GBM), a primary brain malignancy characterized by high morbidity, invasiveness, proliferation, relapse and mortality, is resistant to chemo- and radiotherapies and lacks effective treatment. GBM tumors undergo metabolic reprograming and develop anti-apoptotic defenses. We targeted GBM with a peptide derived from the mitochondrial protein voltage-dependent anion channel 1 (VDAC1), a key component of cell energy, metabolism and apoptosis regulation. VDAC1-based cell-penetrating peptides perturbed cell energy and metabolic homeostasis and induced apoptosis in several GBM and GBM-derived stem cell lines. We found that the peptides simultaneously attacked several oncogenic properties of human U-87MG cells introduced into sub-cutaneous xenograft mouse model, inhibiting tumor growth, invasion, and cellular metabolism, stemness and inducing apoptosis. Peptide-treated tumors showed decreased expression of all tested metabolism-related enzymes and transporters, and elevated levels of apoptotic proteins, such as p53, cytochrome c and caspases. Retro-Tf-D-LP4, containing the human transferrin receptor (TfR)-recognition sequence, crossed the blood-brain barrier (BBB) via the TfR that is highly expressed in the BBB to strongly inhibit tumor growth in an intracranial xenograft mouse model. In summary, the VDAC1-based peptides tested here offer a potentially affordable and innovative new conceptual therapeutic paradigm that might overcome GBM stemness and invasiveness and reduce relapse rates. PMID:28412744

  15. The Mouse Heart Attack Research Tool (mHART) 1.0 Database.

    PubMed

    DeLeon-Pennell, Kristine Y; Iyer, Rugmani Padmanabhan; Ma, Yonggang; Yabluchanskiy, Andriy; Zamilpa, Rogelio; Chiao, Ying Ann; Cannon, Presley; Cates, Courtney; Flynn, Elizabeth R; Halade, Ganesh V; de Castro Bras, Lisandra E; Lindsey, Merry L

    2018-05-18

    The generation of Big Data has enabled systems-level dissections into the mechanisms of cardiovascular pathology. Integration of genetic, proteomic, and pathophysiological variables across platforms and laboratories fosters discoveries through multidisciplinary investigations and minimizes unnecessary redundancy in research efforts. The Mouse Heart Attack Research Tool (mHART) consolidates a large dataset of over 10 years of experiments from a single laboratory for cardiovascular investigators to generate novel hypotheses and identify new predictive markers of progressive left ventricular remodeling following myocardial infarction (MI) in mice. We designed the mHART REDCap database using our own data to integrate cardiovascular community participation. We generated physiological, biochemical, cellular, and proteomic outputs from plasma and left ventricles obtained from post-MI and no MI (naïve) control groups. We included both male and female mice ranging in age from 3 to 36 months old. After variable collection, data underwent quality assessment for data curation (e.g. eliminate technical errors, check for completeness, remove duplicates, and define terms). Currently, mHART 1.0 contains >888,000 data points and includes results from >2,100 unique mice. Database performance was tested and an example provided to illustrate database utility. This report explains how the first version of the mHART database was established and provides researchers with a standard framework to aid in the integration of their data into our database or in the development of a similar database.

  16. Attack of the nervous system by Clostridium perfringens Epsilon toxin: from disease to mode of action on neural cells.

    PubMed

    Wioland, Laetitia; Dupont, Jean-Luc; Bossu, Jean-Louis; Popoff, Michel R; Poulain, Bernard

    2013-12-01

    Epsilon toxin (ET), produced by Clostridium perfringens types B and D, ranks among the four most potent poisonous substances known so far. ET-intoxication is responsible for enterotoxaemia in animals, mainly sheep and goats. This disease comprises several manifestations indicating the attack of the nervous system. This review aims to summarize the effects of ET on central nervous system. ET binds to endothelial cells of brain capillary vessels before passing through the blood-brain barrier. Therefore, it induces perivascular oedema and accumulates into brain. ET binding to different brain structures and to different component in the brain indicates regional susceptibility to the toxin. Histological examination has revealed nerve tissue and cellular lesions, which may be directly or indirectly caused by ET. The naturally occurring disease caused by ET-intoxication can be reproduced experimentally in rodents. In mice and rats, ET recognizes receptor at the surface of different neural cell types, including certain neurons (e.g. the granule cells in cerebellum) as well as oligodendrocytes, which are the glial cells responsible for the axons myelination. Moreover, ET induces release of glutamate and other transmitters, leading to firing of neural network. The precise mode of action of ET on neural cells remains to be determined. Copyright © 2013 The Authors. Published by Elsevier Ltd.. All rights reserved.

  17. About Heart Attacks

    MedlinePlus

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  18. A graph-based system for network-vulnerability analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.

    1998-06-01

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  19. Lessons learned from cross-border medical response to the terrorist bombings in Tabba and Ras-el-Satan, Egypt, on 07 October 2004.

    PubMed

    Leiba, Adi; Blumenfeld, Amir; Hourvitz, Ariel; Weiss, Gali; Peres, Michal; Laor, Dani; Schwartz, Dagan; Arad, Jacob; Goldberg, Avishay; Levi, Yeheskel; Bar-Dayan, Yaron

    2005-01-01

    Large-scale, terrorist attacks can happen in peripheral areas, which are located close to a country's borders and far from its main medical facilities and involve multi-national casualties and responders. The objective of this study was to analyze the terrorist suicide bombings that occurred on 07 October 2004, near the Israeli-Egyptian border, as representative of such a complex scenario. Data from formal debriefings after the event were processed in order to learn about victim outcomes, resource utilization, critical events, and time course of the emergency response. A total of 185 injured survivors were repatriated: four were severely wounded, 13 were moderately injured, and 168 were mildly injured. Thirty-eight people died. A forward medical team landed at the border town's airport, which provided reinforcement in the field and in the local hospital. Israeli and Egyptian search and rescue teams collaborated at the destruction site. One-hundred sixty-eight injured patients arrived at the small border hospital that rapidly organized itself for the mass-casualty incident, operating as an evacuation "staging hospital". Twenty-three casualties secondarily were distributed to two major trauma centers in the south and the center of Israel, respectively, either by ambulance or by helicopter. Large-scale, terrorist attacks at a peripheral border zone can be handled by international collaboration, reinforcement of medical teams at the site itself and at the peripheral neighboring hospital, rapid rearrangement of an "evacuation hospital", and efficient transport to trauma centers by ambulances, helicopters, and other aircraft.

  20. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  1. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  2. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  3. Resveratrol and polydatin as modulators of Ca2+ mobilization in the cardiovascular system.

    PubMed

    Liu, Wenjuan; Chen, Peiya; Deng, Jianxin; Lv, Jingzhang; Liu, Jie

    2017-09-01

    In the cardiovascular system, Ca 2+ controls cardiac excitation-contraction coupling and vascular contraction and dilation. Disturbances in intracellular Ca 2+ homeostasis induce malfunctions of the cardiovascular system, including cardiac pump dysfunction, arrhythmia, remodeling, and apoptosis, as well as hypertension and impairment of vascular reactivity. Therefore, developing drugs and strategies manipulating Ca 2+ handling are highly valued in the treatment of cardiovascular disease. Resveratrol (Res) and polydatin (PD), a Res glucoside, have been well established to have beneficial effects on improving cardiovascular function. Studies from our laboratory and others have demonstrated that they exhibit inotropic effects on normal heart and therapeutic effects on hypertension, cardiac ischemia/reperfusion injury, hypertrophy, and heart failure by manipulating Ca 2+ mobilization. The actions of Res and PD on Ca 2+ signals delicately manipulated by multiple Ca 2+ -handling proteins are pleiotropic and somewhat controversial, depending on cellular species and intracellular oxidative status. Here, we focus on the effects of Res and PD on controlling Ca 2+ homeostasis in the heart and vasculature under normal and diseased conditions and highlight the key direct and indirect molecules mediating these effects. © 2017 New York Academy of Sciences.

  4. The impact of hydration changes in fresh bio-tissue on THz spectroscopic measurements.

    PubMed

    Png, G M; Choi, J W; Ng, B W-H; Mickan, S P; Abbott, D; Zhang, X-C

    2008-07-07

    We present a study of how residual hydration in fresh rat tissue samples can vastly alter their extracted terahertz (THz) optical properties and influence their health assessment. Fresh (as opposed to preserved) tissue most closely mimics in vivo conditions, but high water content creates many challenges for tissue handling and THz measurement. Our THz measurements of fresh tissue over time highlight the effect of tissue hydration on tissue texture and dimension, the latter directly influencing the accuracy of calculated optical properties. We then introduce lyophilization (freeze drying) as a viable solution for overcoming hydration and freshness problems. Lyophilization removes large amounts of water while retaining sample freshness. In addition, lyophilized tissue samples are easy to handle and their textures and dimensions do not vary over time, allowing for consistent and stable THz measurements. A comparison of lyophilized and fresh tissue shows for the first time that freeze drying may be one way of overcoming tissue hydration issues while preserving tissue cellular structure. Finally, we compare THz measurements from fresh tissue against necrotic tissue to verify freshness over time. Indeed, THz measurements from fresh and necrotic tissues show marked differences.

  5. Cardiomyocyte dysfunction during the chronic phase of Chagas disease.

    PubMed

    Roman-Campos, Danilo; Sales-Júnior, Policarpo; Duarte, Hugo Leonardo; Gomes, Eneas Ricardo; Guatimosim, Silvia; Ropert, Catherine; Gazzinelli, Ricardo Tostes; Cruz, Jader Santos

    2013-04-01

    Chagas disease, which is caused by the parasite Trypanosoma cruzi, is an important cause of heart failure. We investigated modifications in the cellular electrophysiological and calcium-handling characteristics of an infected mouse heart during the chronic phase of the disease. The patch-clamp technique was used to record action potentials (APs) and L-type Ca2+ and transient outward K+ currents. [Ca2+]i changes were determined using confocal microscopy. Infected ventricular cells showed prolonged APs, reduced transient outward K+ and L-type Ca2+ currents and reduced Ca2+ release from the sarcoplasmic reticulum. Thus, the chronic phase of Chagas disease is characterised by cardiomyocyte dysfunction, which could lead to heart failure.

  6. Cardiomyocyte dysfunction during the chronic phase of Chagas disease

    PubMed Central

    Roman-Campos, Danilo; Sales-Júnior, Policarpo; Duarte, Hugo Leonardo; Gomes, Eneas Ricardo; Guatimosim, Silvia; Ropert, Catherine; Gazzinelli, Ricardo Tostes; Cruz, Jader Santos

    2013-01-01

    Chagas disease, which is caused by the parasite Trypanosoma cruzi, is an important cause of heart failure. We investigated modifications in the cellular electrophysiological and calcium-handling characteristics of an infected mouse heart during the chronic phase of the disease. The patch-clamp technique was used to record action potentials (APs) and L-type Ca2+ and transient outward K+ currents. [Ca2+]i changes were determined using confocal microscopy. Infected ventricular cells showed prolonged APs, reduced transient outward K+ and L-type Ca2+ currents and reduced Ca2+ release from the sarcoplasmic reticulum. Thus, the chronic phase of Chagas disease is characterised by cardiomyocyte dysfunction, which could lead to heart failure. PMID:23579807

  7. Automation in high-content flow cytometry screening.

    PubMed

    Naumann, U; Wand, M P

    2009-09-01

    High-content flow cytometric screening (FC-HCS) is a 21st Century technology that combines robotic fluid handling, flow cytometric instrumentation, and bioinformatics software, so that relatively large numbers of flow cytometric samples can be processed and analysed in a short period of time. We revisit a recent application of FC-HCS to the problem of cellular signature definition for acute graft-versus-host-disease. Our focus is on automation of the data processing steps using recent advances in statistical methodology. We demonstrate that effective results, on par with those obtained via manual processing, can be achieved using our automatic techniques. Such automation of FC-HCS has the potential to drastically improve diagnosis and biomarker identification.

  8. Homogenization of Mammalian Cells.

    PubMed

    de Araújo, Mariana E G; Lamberti, Giorgia; Huber, Lukas A

    2015-11-02

    Homogenization is the name given to the methodological steps necessary for releasing organelles and other cellular constituents as a free suspension of intact individual components. Most homogenization procedures used for mammalian cells (e.g., cavitation pump and Dounce homogenizer) rely on mechanical force to break the plasma membrane and may be supplemented with osmotic or temperature alterations to facilitate membrane disruption. In this protocol, we describe a syringe-based homogenization method that does not require specialized equipment, is easy to handle, and gives reproducible results. The method may be adapted for cells that require hypotonic shock before homogenization. We routinely use it as part of our workflow to isolate endocytic organelles from mammalian cells. © 2015 Cold Spring Harbor Laboratory Press.

  9. On Patarin's Attack against the lIC Scheme

    NASA Astrophysics Data System (ADS)

    Ogura, Naoki; Uchiyama, Shigenori

    In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.

  10. Foliar Nutrient Distribution Patterns in Sympatric Maple Species Reflect Contrasting Sensitivity to Excess Manganese.

    PubMed

    Fernando, Denise R; Marshall, Alan T; Lynch, Jonathan P

    2016-01-01

    Sugar maple and red maple are closely-related co-occurring tree species significant to the North American forest biome. Plant abiotic stress effects including nutritional imbalance and manganese (Mn) toxicity are well documented within this system, and are implicated in enhanced susceptibility to biotic stresses such as insect attack. Both tree species are known to overaccumulate foliar manganese (Mn) when growing on unbuffered acidified soils, however, sugar maple is Mn-sensitive, while red maple is not. Currently there is no knowledge about the cellular sequestration of Mn and other nutrients in these two species. Here, electron-probe x-ray microanalysis was employed to examine cellular and sub-cellular deposition of excessively accumulated foliar Mn and other mineral nutrients in vivo. For both species, excess foliar Mn was deposited in symplastic cellular compartments. There were striking between-species differences in Mn, magnesium (Mg), sulphur (S) and calcium (Ca) distribution patterns. Unusually, Mn was highly co-localised with Mg in mesophyll cells of red maple only. The known sensitivity of sugar maple to excess Mn is likely linked to Mg deficiency in the leaf mesophyll. There was strong evidence that Mn toxicity in sugar maple is primarily a symplastic process. For each species, leaf-surface damage due to biotic stress including insect herbivory was compared between sites with acidified and non-acidified soils. Although it was greatest overall in red maple, there was no difference in biotic stress damage to red maple leaves between acidified and non-acidified soils. Sugar maple trees on buffered non-acidified soil were less damaged by biotic stress compared to those on unbuffered acidified soil, where they are also affected by Mn toxicity abiotic stress. This study concluded that foliar nutrient distribution in symplastic compartments is a determinant of Mn sensitivity, and that Mn stress hinders plant resistance to biotic stress.

  11. Foliar Nutrient Distribution Patterns in Sympatric Maple Species Reflect Contrasting Sensitivity to Excess Manganese

    PubMed Central

    Fernando, Denise R.; Marshall, Alan T.; Lynch, Jonathan P.

    2016-01-01

    Sugar maple and red maple are closely-related co-occurring tree species significant to the North American forest biome. Plant abiotic stress effects including nutritional imbalance and manganese (Mn) toxicity are well documented within this system, and are implicated in enhanced susceptibility to biotic stresses such as insect attack. Both tree species are known to overaccumulate foliar manganese (Mn) when growing on unbuffered acidified soils, however, sugar maple is Mn-sensitive, while red maple is not. Currently there is no knowledge about the cellular sequestration of Mn and other nutrients in these two species. Here, electron-probe x-ray microanalysis was employed to examine cellular and sub-cellular deposition of excessively accumulated foliar Mn and other mineral nutrients in vivo. For both species, excess foliar Mn was deposited in symplastic cellular compartments. There were striking between-species differences in Mn, magnesium (Mg), sulphur (S) and calcium (Ca) distribution patterns. Unusually, Mn was highly co-localised with Mg in mesophyll cells of red maple only. The known sensitivity of sugar maple to excess Mn is likely linked to Mg deficiency in the leaf mesophyll. There was strong evidence that Mn toxicity in sugar maple is primarily a symplastic process. For each species, leaf-surface damage due to biotic stress including insect herbivory was compared between sites with acidified and non-acidified soils. Although it was greatest overall in red maple, there was no difference in biotic stress damage to red maple leaves between acidified and non-acidified soils. Sugar maple trees on buffered non-acidified soil were less damaged by biotic stress compared to those on unbuffered acidified soil, where they are also affected by Mn toxicity abiotic stress. This study concluded that foliar nutrient distribution in symplastic compartments is a determinant of Mn sensitivity, and that Mn stress hinders plant resistance to biotic stress. PMID:27391424

  12. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  13. Split-second escape decisions in blue tits (Parus caeruleus)

    NASA Astrophysics Data System (ADS)

    Lind, Johan; Kaby, Ulrika; Jakobsson, Sven

    2002-07-01

    Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and even minor mistakes in initial escape response can have devastating consequences. Birds may respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus) from two different attack angles in two different speeds. When attacked from a low attack angle they took off more steeply than when attacked from a high angle. This is the first study to show that escape behaviour also depends on predator attack speed. The blue tits responded to a high-speed attack by dodging sideways more often than when attacked at a low speed. Escape speed was not significantly affected by the different treatments. Although they have only a split-second before escaping an attack, blue tits do adjust their escape strategy to the prevailing attack conditions.

  14. Hybrid attacks on model-based social recommender systems

    NASA Astrophysics Data System (ADS)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  15. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    NASA Astrophysics Data System (ADS)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  16. A proteomics survey on wheat susceptibility to Fusarium head blight during grain development

    PubMed Central

    Chetouhi, Cherif; Lecomte, Philippe; Cambon, Florence; Merlino, Marielle; Biron, David Georges

    2014-01-01

    The mycotoxigenic fungal species Fusarium graminearum is able to attack several important cereal crops, such as wheat and barley. By causing Fusarium Head Blight (FHB) disease, F. graminearum induces yield and quality losses and poses a public health concern due to in planta mycotoxin production. The molecular and physiological plant responses to FHB, and the cellular biochemical pathways used by F. graminearum to complete its infectious process remain still unknown. In this study, a proteomics approach, combining 2D-gel approach and mass spectrometry, has been used to determine the specific protein patterns associated with the development of the fungal infection during grain growth on susceptible wheat. Our results reveal that F. graminearum infection does not deeply alter the grain proteome and does not significantly disturb the first steps of grain ontogeny but impacts molecular changes during the grain filling stage (impact on starch synthesis and storage proteins). The differentially regulated proteins identified were mainly involved in stress and defence mechanisms, primary metabolism, and main cellular processes such as signalling and transport. Our survey suggests that F. graminearum could take advantage of putative susceptibility factors closely related to grain development processes and thus provide new insights into key molecular events controlling the susceptible response to FHB in wheat grains. PMID:25663750

  17. Improving efficacy of cancer immunotherapy by genetic modification of natural killer cells.

    PubMed

    Burga, Rachel A; Nguyen, Tuongvan; Zulovich, Jane; Madonna, Sarah; Ylisastigui, Loyda; Fernandes, Rohan; Yvon, Eric

    2016-11-01

    Natural killer (NK) cells are members of the innate immune system that recognize target cells via activating and inhibitory signals received through cell receptors. Derived from the lymphoid lineage, NK cells are able to produce cytokines and exert a cytotoxic effect on viral infected and malignant cells. It is their unique ability to lyse target cells rapidly and without prior education that renders NK cells a promising effector cell for adoptive cell therapy. However, both viruses and tumors employ evasion strategies to avoid attack by NK cells, which represent biological challenges that need to be harnessed to fully exploit the cytolytic potential of NK cells. Using genetic modification, the function of NK cells can be enhanced to improve their homing, cytolytic activity, in vivo persistence and safety. Examples include gene modification to express chemokine, high-affinity Fc receptor and chimeric antigen receptors, suicide genes and the forced expression of cytokines such as interleukin (IL)-2 and IL-15. Preclinical studies have clearly demonstrated that such approaches are effective in improving NK-cell function, homing and safety. In this review, we summarize the recent advances in the genetic manipulations of NK cells and their application for cellular immunotherapeutic strategies. Copyright © 2016 International Society for Cellular Therapy. Published by Elsevier Inc. All rights reserved.

  18. Antibody Therapeutics in Oncology.

    PubMed

    Wold, Erik D; Smider, Vaughn V; Felding, Brunhilde H

    2016-03-01

    One of the newer classes of targeted cancer therapeutics is monoclonal antibodies. Monoclonal antibody therapeutics are a successful and rapidly expanding drug class due to their high specificity, activity, favourable pharmacokinetics, and standardized manufacturing processes. Antibodies are capable of recruiting the immune system to attack cancer cells through complement-dependent cytotoxicity or antibody dependent cellular cytotoxicity. In an ideal scenario the initial tumor cell destruction induced by administration of a therapeutic antibody can result in uptake of tumor associated antigens by antigen-presenting cells, establishing a prolonged memory effect. Mechanisms of direct tumor cell killing by antibodies include antibody recognition of cell surface bound enzymes to neutralize enzyme activity and signaling, or induction of receptor agonist or antagonist activity. Both approaches result in cellular apoptosis. In another and very direct approach, antibodies are used to deliver drugs to target cells and cause cell death. Such antibody drug conjugates (ADCs) direct cytotoxic compounds to tumor cells, after selective binding to cell surface antigens, internalization, and intracellular drug release. Efficacy and safety of ADCs for cancer therapy has recently been greatly advanced based on innovative approaches for site-specific drug conjugation to the antibody structure. This technology enabled rational optimization of function and pharmacokinetics of the resulting conjugates, and is now beginning to yield therapeutics with defined, uniform molecular characteristics, and unprecedented promise to advance cancer treatment.

  19. Cyber-Physical Attacks With Control Objectives

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-08-18

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  20. Cyber-Physical Attacks With Control Objectives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  1. Detection of MAVs (Micro Aerial Vehicles) based on millimeter wave radar

    NASA Astrophysics Data System (ADS)

    Noetel, Denis; Johannes, Winfried; Caris, Michael; Hommes, Alexander; Stanko, Stephan

    2016-10-01

    In this paper we present two system approaches for perimeter surveillance with radar techniques focused on the detection of Micro Aerial Vehicles (MAVs). The main task of such radars is to detect movements of targets such as an individual or a vehicle approaching a facility. The systems typically cover a range of several hundred meters up to several kilometers. In particular, the capability of identifying Remotely Piloted Aircraft Systems (RPAS), which pose a growing threat on critical infrastructure areas, is of great importance nowadays. The low costs, the ease of handling and a considerable payload make them an excellent tool for unwanted surveillance or attacks. Most platforms can be equipped with all kind of sensors or, in the worst case, with destructive devices. A typical MAV is able to take off and land vertically, to hover, and in many cases to fly forward at high speed. Thus, it can reach all kinds of places in short time while the concealed operator of the MAV resides at a remote and riskless place.

  2. Evolving societal risks and necessary precautions in the age of nuclear power and therapeutic radiation: an American perspective.

    PubMed

    Pham, Martin H; Yu, Cheng; Rusch, Mairead; Holloway, Charles; Chang, Eric; Apuzzo, Michael L J

    2014-12-01

    Terrorism involving nuclear or radiologic weapons can devastate populations, city infrastructures, and entire sociopolitical systems. In our age of nuclear medicine and therapeutic radiation delivery, the unauthorized and illegal acquisition of radioactive materials needed for such an attack is always a possibility and risk. Physicians handling high-energy isotopes for medical radiotherapy must be aware of the basic security requirements as outlined by the Nuclear Regulation Commission, which include background checks and authorized access, physical protection during radionuclide use, and physical protection during its transit. The Leksell Gamma Knife and its Category 1 cobalt-60 radioactive source are discussed because of their significant potential for deployment in a weaponized device. Although this article presents a perspective relating to American rules and regulations, these precautions are applicable anywhere that similar situations exist. Understanding these materials and the security they require is essential to preventing the disastrous outcomes should these isotopes fall into terrorists' hands. Published by Elsevier Inc.

  3. A multidisciplinary decision support system for forest fire crisis management.

    PubMed

    Keramitsoglou, Iphigenia; Kiranoudis, Chris T; Sarimveis, Haralambos; Sifakis, Nicolaos

    2004-02-01

    A wildland fire is a serious threat for forest ecosystems in Southern Europe affecting severely and irreversibly regions of significant ecological value as well as human communities. To support decision makers during large-scale forest fire incidents, a multidisciplinary system has been developed that provides rational and quantitative information based on the site-specific circumstances and the possible consequences. The system's architecture consists of several distinct supplementary modules of near real-time satellite monitoring and fire forecast using an integrated framework of satellite Remote Sensing, GIS, and RDBMS technologies equipped with interactive communication capabilities. The system may handle multiple fire ignitions and support decisions regarding dispatching of utilities, equipment, and personnel that would appropriately attack the fire front. The operational system was developed for the region of Penteli Mountain in Attika, Greece, one of the mountain areas in the country most hit by fires. Starting from a real fire incident in August 2000, a scenario is presented to illustrate the effectiveness of the proposed approach.

  4. Extracting forensic evidence from biometric devices

    NASA Astrophysics Data System (ADS)

    Geradts, Zeno J.; Ruifrok, Arnout C.

    2003-08-01

    Over the past few years, both large multinationals and governments have begun to contribute to even larger projects on biometric devices. Terrorist attacks in America and in other countries have highlighted the need for better identification systems for people as well as improved systems for controlling access to buildings. Another reason for investment in Research and Development in Biometric Devices, is the massive growth in internet-based systems -- whether for e-commerce, e-government or internal processes within organizations. The interface between the system and the user is routinely abused, as people have to remember many complex passwords and handle tokens of various types. In this paper an overview is given of the information that is important to know before an examination of such is systems can be done in a forensic proper way. In forensic evidence with biometric devices the forensic examiner should consider the possibilities of tampering with the biometric systems or the possibilities of unauthorized access before drawing conclusions.

  5. Electronic patient registration and tracking at mass vaccination clinics: a clinical study.

    PubMed

    Billittier, Anthony J; Lupiani, Patrick; Masterson, Gary; Masterson, Tim; Zak, Christopher

    2003-01-01

    To protect the citizens of the United States from the use of dangerous biological agents, the Center for Disease Control and Prevention (CDC) has been actively preparing to deal with the consequences of such an attack. Their plans include the deployment of mass immunization clinics to handle postevent vaccinations. As part of the planning efforts by the Western New York Public Health Alliance, a Web-based electronic patient registration and tracking system was developed and tested at a recent trial smallpox vaccination clinic. Initial goals were to determine what the pitfalls and benefits of using such a system might be in comparison to other methods of data collection. This exercise proved that use of an electronic system capable of scanning two-dimensional bar codes was superior to both paper-based and optical character recognition (OCR) methods of data collection and management. Major improvements in speed and/or accuracy were evident in all areas of the clinic, especially in patient registration, vaccine tracking and postclinic data analysis.

  6. Feedback control laws for highly maneuverable aircraft

    NASA Technical Reports Server (NTRS)

    Garrard, William L.; Balas, Gary J.

    1992-01-01

    The results of a study of the application of H infinity and mu synthesis techniques to the design of feedback control laws for the longitudinal dynamics of the High Angle of Attack Research Vehicle (HARV) are presented. The objective of this study is to develop methods for the design of feedback control laws which cause the closed loop longitudinal dynamics of the HARV to meet handling quality specifications over the entire flight envelope. Control law designs are based on models of the HARV linearized at various flight conditions. The control laws are evaluated by both linear and nonlinear simulations of typical maneuvers. The fixed gain control laws resulting from both the H infinity and mu synthesis techniques result in excellent performance even when the aircraft performs maneuvers in which the system states vary significantly from their equilibrium design values. Both the H infinity and mu synthesis control laws result in performance which compares favorably with an existing baseline longitudinal control law.

  7. Use of selection indices to model the functional response of predators

    USGS Publications Warehouse

    Joly, D.O.; Patterson, B.R.

    2003-01-01

    The functional response of a predator to changing prey density is an important determinant of stability of predatora??prey systems. We show how Manly's selection indices can be used to distinguish between hyperbolic and sigmoidal models of a predator functional response to primary prey density in the presence of alternative prey. Specifically, an inverse relationship between prey density and preference for that prey results in a hyperbolic functional response while a positive relationship can yield either a hyperbolic or sigmoidal functional response, depending on the form and relative magnitudes of the density-dependent preference model, attack rate, and handling time. As an example, we examine wolf (Canis lupus) functional response to moose (Alces alces) density in the presence of caribou (Rangifer tarandus). The use of selection indices to evaluate the form of the functional response has significant advantages over previous attempts to fit Holling's functional response curves to killing-rate data directly, including increased sensitivity, use of relatively easily collected data, and consideration of other explanatory factors (e.g., weather, seasons, productivity).

  8. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    NASA Astrophysics Data System (ADS)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  9. Attacks on public telephone networks: technologies and challenges

    NASA Astrophysics Data System (ADS)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  10. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  11. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  12. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    NASA Astrophysics Data System (ADS)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  13. Cellular and molecular modifier pathways in tauopathies: the big picture from screening invertebrate models.

    PubMed

    Hannan, Shabab B; Dräger, Nina M; Rasse, Tobias M; Voigt, Aaron; Jahn, Thomas R

    2016-04-01

    Abnormal tau accumulations were observed and documented in post-mortem brains of patients affected by Alzheimer's disease (AD) long before the identification of mutations in the Microtubule-associated protein tau (MAPT) gene, encoding the tau protein, in a different neurodegenerative disease called Frontotemporal dementia and Parkinsonism linked to chromosome 17 (FTDP-17). The discovery of mutations in the MAPT gene associated with FTDP-17 highlighted that dysfunctions in tau alone are sufficient to cause neurodegeneration. Invertebrate models have been diligently utilized in investigating tauopathies, contributing to the understanding of cellular and molecular pathways involved in disease etiology. An important discovery came with the demonstration that over-expression of human tau in Drosophila leads to premature mortality and neuronal dysfunction including neurodegeneration, recapitulating some key neuropathological features of the human disease. The simplicity of handling invertebrate models combined with the availability of a diverse range of experimental resources make these models, in particular Drosophila a powerful invertebrate screening tool. Consequently, several large-scale screens have been performed using Drosophila, to identify modifiers of tau toxicity. The screens have revealed not only common cellular and molecular pathways, but in some instances the same modifier has been independently identified in two or more screens suggesting a possible role for these modifiers in regulating tau toxicity. The purpose of this review is to discuss the genetic modifier screens on tauopathies performed in Drosophila and C. elegans models, and to highlight the common cellular and molecular pathways that have emerged from these studies. Here, we summarize results of tau toxicity screens providing mechanistic insights into pathological alterations in tauopathies. Key pathways or modifiers that have been identified are associated with a broad range of processes including, but not limited to, phosphorylation, cytoskeleton organization, axonal transport, regulation of cellular proteostasis, transcription, RNA metabolism, cell cycle regulation, and apoptosis. We discuss the utility and application of invertebrate models in elucidating the cellular and molecular functions of novel and uncharacterized disease modifiers identified in large-scale screens as well as for investigating the function of genes identified as risk factors in genome-wide association studies from human patients in the post-genomic era. In this review, we combined and summarized several large-scale modifier screens performed in invertebrate models to identify modifiers of tau toxicity. A summary of the screens show that diverse cellular processes are implicated in the modification of tau toxicity. Kinases and phosphatases are the most predominant class of modifiers followed by components required for cellular proteostasis and axonal transport and cytoskeleton elements. © 2016 International Society for Neurochemistry.

  14. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    PubMed Central

    Moisan, Frédéric; Gonzalez, Cleotilde

    2017-01-01

    Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557

  15. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    NASA Astrophysics Data System (ADS)

    Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong

    2017-02-01

    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.

  16. Cellular distribution of calcium current is unaltered during compensated hypertrophy in the spontaneously hypertensive rat.

    PubMed

    Fowler, Mark R; Orchard, Clive H; Harrison, Simon M

    2007-01-01

    Changes in cellular calcium (Ca(2+)) handling are thought to underlie the altered contraction that occurs during cardiac hypertrophy and failure. Recent work has highlighted the importance of t-tubules in the control of intracellular Ca(2+). The present study was performed to investigate whether changes in the distribution of I (Ca) between the surface and t-tubule membranes might contribute to the altered Ca(2+) handling observed during compensated hypertrophy in the spontaneously hypertensive rat (SHR). Experiments were performed on ventricular myocytes isolated from 5-month-old SHR and normotensive Wistar-Kyoto (WKY) control rats. Osmotic shock using formamide was used to disrupt the t-tubular system and the whole-cell patch clamp technique used to monitor I (Ca) in the presence and absence of t-tubules. Membrane capacitance and I (Ca) were greater in control SHR than WKY myocytes; following detubulation, cell capacitance and I (Ca) both decreased and were no longer significantly different in the two cell types. The density of I (Ca) was not significantly different in control SHR and WKY cells or in detubulated myocytes from the two species. These data suggest that the distribution of I (Ca) is unchanged in SHR myocytes compared to WKY controls; I (Ca) density in the t-tubules was 1.2-fold greater than in the sarcolemma in both strains. These data also imply that the increase in surface area in SHR myocytes is due principally to an increase in t-tubular area, which is accompanied by an approximately equivalent increase in I (Ca), so that the density of I (Ca) at the cell surface and in the t-tubules remains the same. These changes would be expected to retain cell function and synchronicity of Ca(2+) release in the SHR at this stage of compensated hypertrophy.

  17. Blind Data Attack on BGP Routers

    DTIC Science & Technology

    2017-03-01

    implement blind attack protection, leaving long -standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This...protection measures should a discovered vulnerability reduce attack complexity. 14. SUBJECT TERMS BGP, TCP, blind attack, blind data attack 15. NUMBER OF...implementations may not properly implement blind attack protection, leaving long -standing connections, such as BorderGateway Protocol (BGP) sessions

  18. X-ray fluorescence microscopy reveals the role of selenium in spermatogenesis

    PubMed Central

    Kehr, Sebastian; Malinouski, Mikalai; Finney, Lydia; Vogt, Stefan; Labunskyy, Vyacheslav M.; Kasaikina, Marina V.; Carlson, Bradley A.; Zhou, You; Hatfield, Dolph L.; Gladyshev, Vadim N.

    2009-01-01

    Selenium (Se) is a trace element with important roles in human health. Several selenoproteins have essential functions in development. However, the cellular and tissue distribution of Se remains largely unknown because of the lack of analytical techniques that image this element with sufficient sensitivity and resolution. Herein, we report that X-ray fluorescence microscopy (XFM) can be used to visualize and quantify the tissue, cellular and subcellular topography of Se. We applied this technique to characterize the role of Se in spermatogenesis and identified a dramatic Se enrichment specifically in late spermatids, a pattern that was not seen in any other elemental maps. This enrichment was due to elevated levels of the mitochondrial form of glutathione peroxidase 4 and was fully dependent on the supplies of Se by Selenoprotein P. High-resolution scans revealed that Se concentrated near the lumen side of elongating spermatids, where structural components of sperm are formed. During spermatogenesis, maximal Se associated with decreased phosphorus, whereas Zn did not change. In sperm, Se was primarily in the midpiece and co-localized with Cu and Fe. XFM allowed quantification of Se in the midpiece (0.8 fg) and head (0.14 fg) of individual sperm cells, revealing the ability of sperm cells to handle the amounts of this element well above its toxic levels. Overall, the use of XFM allowed visualization of tissue and cellular Se and provided important insights in the role of this and other trace elements in spermatogenesis. PMID:19379757

  19. Probing Human Telomeric DNA and RNA Topology and Ligand Binding in a Cellular Model by Using Responsive Fluorescent Nucleoside Probes.

    PubMed

    Manna, Sudeshna; Panse, Cornelia H; Sontakke, Vyankat A; Sangamesh, Sarangamath; Srivatsan, Seergazhi G

    2017-08-17

    The development of biophysical systems that enable an understanding of the structure and ligand-binding properties of G-quadruplex (GQ)-forming nucleic acid sequences in cells or models that mimic the cellular environment would be highly beneficial in advancing GQ-directed therapeutic strategies. Herein, the establishment of a biophysical platform to investigate the structure and recognition properties of human telomeric (H-Telo) DNA and RNA repeats in a cell-like confined environment by using conformation-sensitive fluorescent nucleoside probes and a widely used cellular model, bis(2-ethylhexyl) sodium sulfosuccinate reverse micelles (RMs), is described. The 2'-deoxy and ribonucleoside probes, composed of a 5-benzofuran uracil base analogue, faithfully report the aqueous micellar core through changes in their fluorescence properties. The nucleoside probes incorporated into different loops of H-Telo DNA and RNA oligonucleotide repeats are minimally perturbing and photophysically signal the formation of respective GQ structures in both aqueous buffer and RMs. Furthermore, these sensors enable a direct comparison of the binding affinity of a ligand to H-Telo DNA and RNA GQ structures in the bulk and confined environment of RMs. These results demonstrate that this combination of a GQ nucleoside probe and easy-to-handle RMs could provide new opportunities to study and devise screening-compatible assays in a cell-like environment to discover GQ binders of clinical potential. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. Cellular Mechanisms of Myocardial Depression in Porcine Septic Shock.

    PubMed

    Jarkovska, Dagmar; Markova, Michaela; Horak, Jan; Nalos, Lukas; Benes, Jan; Al-Obeidallah, Mahmoud; Tuma, Zdenek; Sviglerova, Jitka; Kuncova, Jitka; Matejovic, Martin; Stengl, Milan

    2018-01-01

    The complex pathogenesis of sepsis and septic shock involves myocardial depression, the pathophysiology of which, however, remains unclear. In this study, cellular mechanisms of myocardial depression were addressed in a clinically relevant, large animal (porcine) model of sepsis and septic shock. Sepsis was induced by fecal peritonitis in eight anesthetized, mechanically ventilated, and instrumented pigs of both sexes and continued for 24 h. In eight control pigs, an identical experiment but without sepsis induction was performed. In vitro analysis of cardiac function included measurements of action potentials and contractions in the right ventricle trabeculae, measurements of sarcomeric contractions, calcium transients and calcium current in isolated cardiac myocytes, and analysis of mitochondrial respiration by ultrasensitive oxygraphy. Increased values of modified sequential organ failure assessment score and serum lactate levels documented the development of sepsis/septic shock, accompanied by hyperdynamic circulation with high heart rate, increased cardiac output, peripheral vasodilation, and decreased stroke volume. In septic trabeculae, action potential duration was shortened and contraction force reduced. In septic cardiac myocytes, sarcomeric contractions, calcium transients, and L-type calcium current were all suppressed. Similar relaxation trajectory of the intracellular calcium-cell length phase-plane diagram indicated unchanged calcium responsiveness of myofilaments. Mitochondrial respiration was diminished through inhibition of Complex II and Complex IV. Defective calcium handling with reduced calcium current and transients, together with inhibition of mitochondrial respiration, appears to represent the dominant cellular mechanisms of myocardial depression in porcine septic shock.

  1. Research on high power intra-channel crosstalk attack in optical networks

    NASA Astrophysics Data System (ADS)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  2. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    MedlinePlus

    ... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...

  3. The role of mental disorder in attacks on European politicians 1990-2004.

    PubMed

    James, D V; Mullen, P E; Meloy, J R; Pathé, M T; Farnham, F R; Preston, L; Darnley, B

    2007-11-01

    The only systematic studies of attacks on public figures come from the USA. These studies de-emphasize the role of mental illness and suggest threats are of no predictive value. This study re-examines these questions through a study of attacks on European politicians. All non-terrorist attacks on elected politicians in Western Europe between 1990 and 2004 were analysed. Twenty-four attacks were identified, including five involving fatalities, and eight serious injuries. Ten attackers were psychotic, four drunk, nine politically motivated and one unclassifiable. Eleven attackers evidenced warning behaviours. The mentally disordered, most of whom gave warnings, were responsible for most of the fatal and seriously injurious attacks. A greater awareness of the link between delusional fixations on public figures and subsequent attacks could aid prevention. Equally importantly, recognition would encourage earlier intervention in people who, irrespective of whether they eventually attack, have delusional preoccupations which ruin their lives.

  4. An Exploration of Hypotheses that Explain Herbivore and Pathogen Attack in Restored Plant Communities

    PubMed Central

    Blaisdell, G. Kai; Roy, Bitty A.; Pfeifer-Meister, Laurel; Bridgham, Scott D.

    2015-01-01

    Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to increased attack on one host species due to transmission from another host species, or enemy dilution may lead to reduced attack on a host that would otherwise have more attack, (iv) physical characteristics of the plant community may influence attack, and (v) plant vigor may affect attack. Restoration experiments with replicated plant communities provide an exceptional opportunity to explore these hypotheses. To explore the relative predictive strengths of these related hypotheses and to investigate the potential effect of several restoration site preparation techniques, we surveyed arthropod herbivore and fungal pathogen attack on the six most common native plant species in a restoration experiment. Multi-model inference revealed a weak but consistent negative correlation with pathogen attack and host diversity across the plant community, and no correlation between herbivory and host diversity. Our analyses also revealed host species-specific relationships between attack and abundance of the target host species, other native plant species, introduced plant species, and physical community characteristics. We found no relationship between enemy attack and plant vigor. We found minimal differences in plant community composition among several diverse site preparation techniques, and limited effects of site preparation techniques on attack. The strongest associations of community characteristics with attack varied among plant species with no community-wide patterns, suggesting that no single hypothesis successfully predicts the dominant community-wide trends in enemy attack. PMID:25699672

  5. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.

  6. Method for Integrated Simulation (MINTSIM)

    DTIC Science & Technology

    1976-01-01

    sorties allocated to attack SAMs. FAPA = fraction of striking aircraft attacking air bases which attack parked aircraft in the open. TAAB...each striking aircraft. FAS = fraction of striking aircraft attacking air bases which attack sheltered aircraft. (NOTE: FAPA + FAS = 1.0

  7. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less

  8. Web Forms and Untraceable DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  9. [Tail Plane Icing

    NASA Technical Reports Server (NTRS)

    1997-01-01

    The Aviation Safety Program initiated by NASA in 1997 has put greater emphasis in safety related research activities. Ice-contaminated-tailplane stall (ICTS) has been identified by the NASA Lewis Icing Technology Branch as an important activity for aircraft safety related research. The ICTS phenomenon is characterized as a sudden, often uncontrollable aircraft nose- down pitching moment, which occurs due to increased angle-of-attack of the horizontal tailplane resulting in tailplane stall. Typically, this phenomenon occurs when lowering the flaps during final approach while operating in or recently departing from icing conditions. Ice formation on the tailplane leading edge can reduce tailplane angle-of-attack range and cause flow separation resulting in a significant reduction or complete loss of aircraft pitch control. In 1993, the Federal Aviation Authority (FAA) and NASA embarked upon a four-year research program to address the problem of tailplane stall and to quantify the effect of tailplane ice accretion on aircraft performance and handling characteristics. The goals of this program, which was completed in March 1998, were to collect aerodynamic data for an aircraft tail with and without ice contamination and to develop analytical methods for predicting the effects of tailplane ice contamination. Extensive dry air and icing tunnel tests which resulted in a database of the aerodynamic effects associated with tailplane ice contamination. Although the FAA/NASA tailplane icing program generated some answers regarding ice-contaminated-tailplane stall (ICTS) phenomena, NASA researchers have found many open questions that warrant further investigation into ICTS. In addition, several aircraft manufacturers have expressed interest in a second research program to expand the database to other tail configurations and to develop experimental and computational methodologies for evaluating the ICTS phenomenon. In 1998, the icing branch at NASA Lewis initiated a second multi-phase research program for tailplane icing (TIP II) to develop test methodologies and tailplane performance and handling qualities evaluation tools. The main objectives of this new NASA/Industry/Academia collaborative research programs were: (1) define and evaluate a sub-scale wind tunnel test methodology for determining tailplane performance degradation due to icing. (2) develop an experimental database of tailplane aerodynamic performance with and without ice contamination for a range of tailplane configurations. Wind tunnel tests were planned with representative general aviation aircraft, i.e., the Learjet 45, and a twin engine low speed aircraft. This report summarizes the research performed during the first year of the study, and outlines the work tasks for the second year.

  10. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  11. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  12. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  13. Heartburn or Chest Pain: When Is It Heart Attack?

    MedlinePlus

    Heartburn or heart attack: When to worry Severe heartburn and heart attack can be hard to tell apart. Understand how they typically ... flow to your heart (angina) or an actual heart attack. Heartburn, angina and heart attack may feel very ...

  14. Know the Warning Signs of a Heart Attack

    MedlinePlus

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  15. Percolation of localized attack on isolated and interdependent random networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2014-03-01

    Percolation properties of isolated and interdependent random networks have been investigated extensively. The focus of these studies has been on random attacks where each node in network is attacked with the same probability or targeted attack where each node is attacked with a probability being a function of its centrality, such as degree. Here we discuss a new type of realistic attacks which we call a localized attack where a group of neighboring nodes in the networks are attacked. We attack a randomly chosen node, its neighbors, and its neighbor of neighbors and so on, until removing a fraction (1 - p) of the network. This type of attack reflects damages due to localized disasters, such as earthquakes, floods and war zones in real-world networks. We study, both analytically and by simulations the impact of localized attack on percolation properties of random networks with arbitrary degree distributions and discuss in detail random regular (RR) networks, Erdős-Rényi (ER) networks and scale-free (SF) networks. We extend and generalize our theoretical and simulation results of single isolated networks to networks formed of interdependent networks.

  16. Stealthy false data injection attacks using matrix recovery and independent component analysis in smart grid

    NASA Astrophysics Data System (ADS)

    JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu

    2017-05-01

    Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.

  17. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  18. TANDI: threat assessment of network data and information

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  19. The challenges of using fluorescent probes to detect and quantify specific reactive oxygen species in living cells.

    PubMed

    Winterbourn, Christine C

    2014-02-01

    Small molecule fluorescent probes are vital tools for monitoring reactive oxygen species in cells. The types of probe available, the extent to which they are specific or quantitative and complications in interpreting results are discussed. Most commonly used probes (e.g. dihydrodichlorofluorescein, dihydrorhodamine) have some value in providing information on changes to the redox environment of the cell, but they are not specific for any one oxidant and the response is affected by numerous chemical interactions and not just increased oxidant generation. These probes generate the fluorescent end product by a free radical mechanism, and to react with hydrogen peroxide they require a metal catalyst. Probe radicals can react with oxygen, superoxide, and various antioxidant molecules, all of which influence the signal. Newer generation probes such as boronates act by a different mechanism in which nucleophilic attack by the oxidant on a blocking group releases masked fluorescence. Boronates react with hydrogen peroxide, peroxynitrite, hypochlorous acid and in some cases superoxide, so are selective but not specific. They react with hydrogen peroxide very slowly, and kinetic considerations raise questions about how the reaction could occur in cells. Data from oxidant-sensitive fluorescent probes can provide some information on cellular redox activity but is widely misinterpreted. Recently developed non-redox probes show promise but are not generally available and more information on specificity and cellular reactions is needed. We do not yet have probes that can quantify cellular production of specific oxidants. This article is part of a Special Issue entitled Current methods to study reactive oxygen species - pros and cons and biophysics of membrane proteins. Guest Editor: Christine Winterbourn. Copyright © 2013 Elsevier B.V. All rights reserved.

  20. Pyridostigmine bromide (PYR) alters immune function in B6C3F1 mice.

    PubMed

    Peden-Adams, M M; Dudley, A C; EuDaly, J G; Allen, C T; Gilkeson, G S; Keil, D E

    2004-02-01

    Pyridostigmine bromide (PYR) is an anticholinesterase drug indicated for the treatment of myasthenia gravis and neuromuscular blockade reversal. It acts as a reversible cholinesterase inhibitor and was used as a pretreatment for soldiers during Operation Desert Storm to protect against possible nerve gas attacks. Since that time, PYR has been implicated as a possible causative agent contributing to Gulf War Illness. PYR's mechanism of action has been well-delineated with regards to its effects on the nervous system, yet little is known regarding potential effects on immunological function. To evaluate the effects of PYR on immunological function, adult female B6C3F1 mice were gavaged daily for 14 days with PYR (0, 1, 5, 10, or 20 mg/kg/day). Immune parameters assessed were lymphoproliferation, natural killer cell activity, the SRBC-specific antibody plaque-forming cell (PFC) response, thymus and spleen weight and cellularity, and thymic and splenic CD4/CD8 lymphocyte subpopulations. Exposure to PYR did not alter splenic and thymus weight or splenic cellularity. However, 20 mg PYR/kg/day decreased thymic cellularity with decreases in both CD4+/CD8+ (20 mg/kg/day) and CD4-/CD8- (10 and 20 mg/kg/day) cell types. Functional immune assays indicated that lymphocyte proliferative responses and natural killer cell activity were normal; whereas exposure to PYR significantly decreased primary IgM antibody responses to a T-cell dependent antigen at the 1, 5, 10 and 20 mg/kg treatment levels for 14 days. This is the first study to examine the immunotoxicological effects of PYR and demonstrate that this compound selectively suppresses humoral antibody responses.

  1. Comparative proteomic analysis of Xanthomonas citri ssp. citri periplasmic proteins reveals changes in cellular envelope metabolism during in vitro pathogenicity induction.

    PubMed

    Artier, Juliana; da Silva Zandonadi, Flávia; de Souza Carvalho, Flávia Maria; Pauletti, Bianca Alves; Leme, Adriana Franco Paes; Carnielli, Carolina Moretto; Selistre-de-Araujo, Heloisa Sobreiro; Bertolini, Maria Célia; Ferro, Jesus Aparecido; Belasque Júnior, José; de Oliveira, Julio Cezar Franco; Novo-Mansur, Maria Teresa Marques

    2018-01-01

    Citrus canker is a plant disease caused by Gram-negative bacteria from the genus Xanthomonas. The most virulent species is Xanthomonas citri ssp. citri (XAC), which attacks a wide range of citrus hosts. Differential proteomic analysis of the periplasm-enriched fraction was performed for XAC cells grown in pathogenicity-inducing (XAM-M) and pathogenicity-non-inducing (nutrient broth) media using two-dimensional electrophoresis combined with liquid chromatography-tandem mass spectrometry. Amongst the 40 proteins identified, transglycosylase was detected in a highly abundant spot in XAC cells grown under inducing condition. Additional up-regulated proteins related to cellular envelope metabolism included glucose-1-phosphate thymidylyltransferase, dTDP-4-dehydrorhamnose-3,5-epimerase and peptidyl-prolyl cis-trans-isomerase. Phosphoglucomutase and superoxide dismutase proteins, known to be involved in pathogenicity in other Xanthomonas species or organisms, were also detected. Western blot and quantitative real-time polymerase chain reaction analyses for transglycosylase and superoxide dismutase confirmed that these proteins were up-regulated under inducing condition, consistent with the proteomic results. Multiple spots for the 60-kDa chaperonin and glyceraldehyde-3-phosphate dehydrogenase were identified, suggesting the presence of post-translational modifications. We propose that substantial alterations in cellular envelope metabolism occur during the XAC infectious process, which are related to several aspects, from defence against reactive oxygen species to exopolysaccharide synthesis. Our results provide new candidates for virulence-related proteins, whose abundance correlates with the induction of pathogenicity and virulence genes, such as hrpD6, hrpG, hrpB7, hpa1 and hrpX. The results present new potential targets against XAC to be investigated in further functional studies. © 2016 BSPP AND JOHN WILEY & SONS LTD.

  2. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  3. Jasmonate-triggered plant immunity.

    PubMed

    Campos, Marcelo L; Kang, Jin-Ho; Howe, Gregg A

    2014-07-01

    The plant hormone jasmonate (JA) exerts direct control over the production of chemical defense compounds that confer resistance to a remarkable spectrum of plant-associated organisms, ranging from microbial pathogens to vertebrate herbivores. The underlying mechanism of JA-triggered immunity (JATI) can be conceptualized as a multi-stage signal transduction cascade involving: i) pattern recognition receptors (PRRs) that couple the perception of danger signals to rapid synthesis of bioactive JA; ii) an evolutionarily conserved JA signaling module that links fluctuating JA levels to changes in the abundance of transcriptional repressor proteins; and iii) activation (de-repression) of transcription factors that orchestrate the expression of myriad chemical and morphological defense traits. Multiple negative feedback loops act in concert to restrain the duration and amplitude of defense responses, presumably to mitigate potential fitness costs of JATI. The convergence of diverse plant- and non-plant-derived signals on the core JA module indicates that JATI is a general response to perceived danger. However, the modular structure of JATI may accommodate attacker-specific defense responses through evolutionary innovation of PRRs (inputs) and defense traits (outputs). The efficacy of JATI as a defense strategy is highlighted by its capacity to shape natural populations of plant attackers, as well as the propensity of plant-associated organisms to subvert or otherwise manipulate JA signaling. As both a cellular hub for integrating informational cues from the environment and a common target of pathogen effectors, the core JA module provides a focal point for understanding immune system networks and the evolution of chemical diversity in the plant kingdom.

  4. Occupational formalin asthma.

    PubMed Central

    Hendrick, D J; Lane, D J

    1977-01-01

    Hypersensitivity to formalin used to sterilise artificial kidney machines was shown by inhalation provocation tests to be responsible for attacks of wheezing accompanied by productive cough in two members of the nursing staff of a haemodialysis unit. Three further members of the staff of 28 who were continually exposed to this substance occupationally had developed similar recurrent but less frequent episodes since joining the unit. Two underwent inhalation provocation tests with formalin which did not reproduce these symptoms.Single episodes of these symptoms had been noted by three additional staff members so that altogether eight (29%) had experienced attacks described as bronchitic since becoming exposed to formalin. We suggest that, while exposure to formalin did not seem to be directly responsible in all cases, it might have increased susceptibility to other provoking agents or induced a hyper-reactive responsiveness of the airways. The responses observed in the two nurses after inhalation provocation tests with fromalin were predominantly of airways obstruction. Wheezing began between two and three hours after exposure, and peak expiratory flow rates fell maximally by approximately 50%. Reactions persisted for 10 hours to 10 days depending on the exposure dose. A productive cough was a prominent feature. The sputum appeared to be mucopurulent, but culture produced a scanty growth of Haemophilus influenzae only, together with upper respiratory tract commensals. The cellular content was not homogeneous, neutrophil leucocytes and eosinophil leucocoytes variably dominating. Variable responses of neutrophil and eosinophil leucocytes were also seen in the peripheral blood. PMID:557329

  5. CASE-REPORT Dysregulation of gene expression in a patient with depressive disorder after transient ischemic attack confirmed by a neurophysiological neuromarker.

    PubMed

    Trystuła, M; Żychowska, M; Wilk-Frańczuk, M; Kropotov, J D; Pąchalska, M

    2017-02-16

    The aim of this study was to evaluate dysregulation of gene expression associated with the cellular stress response in a patient with a post-"warning stroke" depressive disorder confirmed by the presence of a neurophysiological neuromarker through the use of quantitative EEG and event-related potentials. The patient was tested for seven genes associated with the stress reaction: HSPA1A, HSPB1, IL6, IL10, CRP, and HSF-1 along with NF-κB, compared to gene expression in health controls. A 54-year-old patient with a past history of schizophrenia (at the age of 20), and of transient ischemic attack (at the age of 53) and depressive disorder confirmed by functional, cognitive, emotional, and affectional diagnostics underwent additional testing for expression of the genes associated with stress response. The expression of genes coding for heat shock protein (HSPA1A, HSPB1), interleukins (IL6, IL10), and C-reactive protein was tested along with factors that regulate their expression. The results of the tests conducted on this patient were compared with 42 healthy control subjects. Diagnostic testing revealed upregulation in expression of these genes, presenting as increased expression of the target genes and of the regulatory genes. A post-"warning stroke" depressive disorder appears to be associated with overexpression of the genes coding for HSP and interleukins. Further research on larger groups of people may provide grounds for treatment modification.

  6. Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.

    PubMed

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads

    2018-05-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p < 0.05) more frequent among men and episodic patients, compared with women and chronic patients respectively, no other differences in the prevalence of pre-attack symptoms were identified between groups. Conclusion Pre-attack symptoms are frequent in cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.

  7. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  8. Hereditary Angioedema Attacks Resolve Faster and Are Shorter after Early Icatibant Treatment

    PubMed Central

    Maurer, Marcus; Kaplan, Allen; Investigators, on behalf of I. O. S.

    2013-01-01

    Background Attacks of hereditary angioedema (HAE) are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. Objective To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. Methods The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009–February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. Results Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥1 hour (6.1 hours versus 16.8 hours [p<0.001]). Similar significant effects were observed for <2 hours versus ≥2 hours (7.2 hours versus 20.2 hours [p<0.001]) and <5 hours versus ≥5 hours (8.0 hours versus 23.5 hours [p<0.001]). Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]). Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. Conclusion Early blockade of the bradykinin B2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution. PMID:23390491

  9. Adaptive optimisation-offline cyber attack on remote state estimator

    NASA Astrophysics Data System (ADS)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  10. Analysis of single mammalian cells on-chip.

    PubMed

    Sims, Christopher E; Allbritton, Nancy L

    2007-04-01

    A goal of modern biology is to understand the molecular mechanisms underlying cellular function. The ability to manipulate and analyze single cells is crucial for this task. The advent of microengineering is providing biologists with unprecedented opportunities for cell handling and investigation on a cell-by-cell basis. For this reason, lab-on-a-chip (LOC) technologies are emerging as the next revolution in tools for biological discovery. In the current discussion, we seek to summarize the state of the art for conventional technologies in use by biologists for the analysis of single, mammalian cells, and then compare LOC devices engineered for these same single-cell studies. While a review of the technical progress is included, a major goal is to present the view point of the practicing biologist and the advances that might increase adoption by these individuals. The LOC field is expanding rapidly, and we have focused on areas of broad interest to the biology community where the technology is sufficiently far advanced to contemplate near-term application in biological experimentation. Focus areas to be covered include flow cytometry, electrophoretic analysis of cell contents, fluorescent-indicator-based analyses, cells as small volume reactors, control of the cellular microenvironment, and single-cell PCR.

  11. TMEM203 Is a Novel Regulator of Intracellular Calcium Homeostasis and Is Required for Spermatogenesis

    PubMed Central

    Shambharkar, Prashant B.; Bittinger, Mark; Latario, Brian; Xiong, ZhaoHui; Bandyopadhyay, Somnath; Davis, Vanessa; Lin, Victor; Yang, Yi; Valdez, Reginald; Labow, Mark A.

    2015-01-01

    Intracellular calcium signaling is critical for initiating and sustaining diverse cellular functions including transcription, synaptic signaling, muscle contraction, apoptosis and fertilization. Trans-membrane 203 (TMEM203) was identified here in cDNA overexpression screens for proteins capable of modulating intracellular calcium levels using activation of a calcium/calcineurin regulated transcription factor as an indicator. Overexpression of TMEM203 resulted in a reduction of Endoplasmic Reticulum (ER) calcium stores and elevation in basal cytoplasmic calcium levels. TMEM203 protein was localized to the ER and found associated with a number of ER proteins which regulate ER calcium entry and efflux. Mouse Embryonic Fibroblasts (MEFs) derived from Tmem203 deficient mice had reduced ER calcium stores and altered calcium homeostasis. Tmem203 deficient mice were viable though male knockout mice were infertile and exhibited a severe block in spermiogenesis and spermiation. Expression profiling studies showed significant alternations in expression of calcium channels and pumps in testes and concurrently Tmem203 deficient spermatocytes demonstrated significantly altered calcium handling. Thus Tmem203 is an evolutionarily conserved regulator of cellular calcium homeostasis, is required for spermatogenesis and provides a causal link between intracellular calcium regulation and spermiogenesis. PMID:25996873

  12. A similarity score-based two-phase heuristic approach to solve the dynamic cellular facility layout for manufacturing systems

    NASA Astrophysics Data System (ADS)

    Kumar, Ravi; Singh, Surya Prakash

    2017-11-01

    The dynamic cellular facility layout problem (DCFLP) is a well-known NP-hard problem. It has been estimated that the efficient design of DCFLP reduces the manufacturing cost of products by maintaining the minimum material flow among all machines in all cells, as the material flow contributes around 10-30% of the total product cost. However, being NP hard, solving the DCFLP optimally is very difficult in reasonable time. Therefore, this article proposes a novel similarity score-based two-phase heuristic approach to solve the DCFLP optimally considering multiple products in multiple times to be manufactured in the manufacturing layout. In the first phase of the proposed heuristic, a machine-cell cluster is created based on similarity scores between machines. This is provided as an input to the second phase to minimize inter/intracell material handling costs and rearrangement costs over the entire planning period. The solution methodology of the proposed approach is demonstrated. To show the efficiency of the two-phase heuristic approach, 21 instances are generated and solved using the optimization software package LINGO. The results show that the proposed approach can optimally solve the DCFLP in reasonable time.

  13. Modification of Kolmogorov-Smirnov test for DNA content data analysis through distribution alignment.

    PubMed

    Huang, Shuguang; Yeo, Adeline A; Li, Shuyu Dan

    2007-10-01

    The Kolmogorov-Smirnov (K-S) test is a statistical method often used for comparing two distributions. In high-throughput screening (HTS) studies, such distributions usually arise from the phenotype of independent cell populations. However, the K-S test has been criticized for being overly sensitive in applications, and it often detects a statistically significant difference that is not biologically meaningful. One major reason is that there is a common phenomenon in HTS studies that systematic drifting exists among the distributions due to reasons such as instrument variation, plate edge effect, accidental difference in sample handling, etc. In particular, in high-content cellular imaging experiments, the location shift could be dramatic since some compounds themselves are fluorescent. This oversensitivity of the K-S test is particularly overpowered in cellular assays where the sample sizes are very big (usually several thousands). In this paper, a modified K-S test is proposed to deal with the nonspecific location-shift problem in HTS studies. Specifically, we propose that the distributions are "normalized" by density curve alignment before the K-S test is conducted. In applications to simulation data and real experimental data, the results show that the proposed method has improved specificity.

  14. Magnetic thin-film insulator with ultra-low spin wave damping for coherent nanomagnonics

    NASA Astrophysics Data System (ADS)

    Yu, Haiming; Kelly, O. D'allivy; Cros, V.; Bernard, R.; Bortolotti, P.; Anane, A.; Brandl, F.; Huber, R.; Stasinopoulos, I.; Grundler, D.

    2014-10-01

    Wave control in the solid state has opened new avenues in modern information technology. Surface-acoustic-wave-based devices are found as mass market products in 100 millions of cellular phones. Spin waves (magnons) would offer a boost in today's data handling and security implementations, i.e., image processing and speech recognition. However, nanomagnonic devices realized so far suffer from the relatively short damping length in the metallic ferromagnets amounting to a few 10 micrometers typically. Here we demonstrate that nm-thick YIG films overcome the damping chasm. Using a conventional coplanar waveguide we excite a large series of short-wavelength spin waves (SWs). From the data we estimate a macroscopic of damping length of about 600 micrometers. The intrinsic damping parameter suggests even a record value about 1 mm allowing for magnonics-based nanotechnology with ultra-low damping. In addition, SWs at large wave vector are found to exhibit the non-reciprocal properties relevant for new concepts in nanoscale SW-based logics. We expect our results to provide the basis for coherent data processing with SWs at GHz rates and in large arrays of cellular magnetic arrays, thereby boosting the envisioned image processing and speech recognition.

  15. Magnetic thin-film insulator with ultra-low spin wave damping for coherent nanomagnonics

    PubMed Central

    Yu, Haiming; Kelly, O. d'Allivy; Cros, V.; Bernard, R.; Bortolotti, P.; Anane, A.; Brandl, F.; Huber, R.; Stasinopoulos, I.; Grundler, D.

    2014-01-01

    Wave control in the solid state has opened new avenues in modern information technology. Surface-acoustic-wave-based devices are found as mass market products in 100 millions of cellular phones. Spin waves (magnons) would offer a boost in today's data handling and security implementations, i.e., image processing and speech recognition. However, nanomagnonic devices realized so far suffer from the relatively short damping length in the metallic ferromagnets amounting to a few 10 micrometers typically. Here we demonstrate that nm-thick YIG films overcome the damping chasm. Using a conventional coplanar waveguide we excite a large series of short-wavelength spin waves (SWs). From the data we estimate a macroscopic of damping length of about 600 micrometers. The intrinsic damping parameter suggests even a record value about 1 mm allowing for magnonics-based nanotechnology with ultra-low damping. In addition, SWs at large wave vector are found to exhibit the non-reciprocal properties relevant for new concepts in nanoscale SW-based logics. We expect our results to provide the basis for coherent data processing with SWs at GHz rates and in large arrays of cellular magnetic arrays, thereby boosting the envisioned image processing and speech recognition. PMID:25355200

  16. Public knowledge of heart attack symptoms in Beijing residents.

    PubMed

    Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan

    2007-09-20

    Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart attack symptoms is deficient in Beijing residents. But their knowledge of calling emergency medical services when someone is having a heart attack is relatively adequate. Public health efforts are needed to increase the recognition of the major heart attack symptoms in both the general public and groups at high risk for an acute cardiac event, especially in socioeconomically disadvantaged subgroups, including persons with low education level, low household income, and no health insurance coverage.

  17. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  18. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Tsong L.

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance,more » in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.« less

  19. Improving the Rainbow Attack by Reusing Colours

    NASA Astrophysics Data System (ADS)

    Ågren, Martin; Johansson, Thomas; Hell, Martin

    Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.

  20. Microbial forensics: the next forensic challenge.

    PubMed

    Budowle, Bruce; Murch, Randall; Chakraborty, Ranajit

    2005-11-01

    Pathogens and toxins can be converted to bioweapons and used to commit bioterrorism and biocrime. Because of the potential and relative ease of an attack using a bioweapon, forensic science needs to be prepared to assist in the investigation to bring perpetrators to justice and to deter future attacks. A new subfield of forensics--microbial forensics--has been created, which is focused on characterization of evidence from a bioterrorism act, biocrime, hoax, or an inadvertent release. Forensic microbiological investigations are essentially the same as any other forensic investigation regarding processing. They involve crime scene(s) investigation, chain of custody practices, evidence collection, handling and preservation, evidence shipping, analysis of evidence, interpretation of results, and court presentation. In addition to collecting and analyzing traditional forensic evidence, the forensic investigation will attempt to determine the etiology and identity of the causal agent, often in a similar fashion as in an epidemiologic investigation. However, for attribution, higher-resolution characterization is needed. The tools for attribution include genetic- and nongenetic-based assays and informatics to attempt to determine the unique source of a sample or at least eliminate some sources. In addition, chemical and physical assays may help determine the process used to prepare, store, or disseminate the bioweapon. An effective microbial forensics program will require development and/or validation of all aspects of the forensic investigative process, from sample collection to interpretation of results. Quality assurance (QA) and QC practices, comparable to those used by the forensic DNA science community, are being implemented. Lastly, partnerships with other laboratories will be requisite, because many of the necessary capabilities for analysis will not reside in the traditional forensic laboratory.

  1. Wind tunnel investigation of vortex flows on F/A-18 configuration at subsonic through transonic speed

    NASA Technical Reports Server (NTRS)

    Erickson, Gary E.

    1991-01-01

    A wind tunnel experiment was conducted in the David Taylor Research Center 7- by 10-Foot Transonic Tunnel of the wing leading-edge extension (LEX) and forebody vortex flows at subsonic and transonic speeds about a 0.06-scale model of the F/A-18. The primary goal was to improve the understanding and control of the vortical flows, including the phenomena of vortex breakdown and vortex interactions with the vertical tails. Laser vapor screen flow visualizations, LEX, and forebody surface static pressures, and six-component forces and moments were obtained at angles of attack of 10 to 50 degrees, free-stream Mach numbers of 0.20 to 0.90, and Reynolds numbers based on the wing mean aerodynamic chord of 0.96 x 10(exp 6) to 1.75 x 10(exp 6). The wind tunnel results were correlated with in-flight flow visualizations and handling qualities trends obtained by NASA using an F-18 High-Alpha Research Vehicle (HARV) and by the Navy and McDonnell Douglas on F-18 aircraft with LEX fences added to improve the vertical tail buffet environment. Key issues that were addressed include the sensitivity of the vortical flows to the Reynolds number and Mach number; the reduced vertical tail excitation, and the corresponding flow mechanism, in the presence of the LEX fence; the repeatability of data obtained during high angle-of-attack wind tunnel testing of F-18 models; the effects of particle seeding for flow visualization on the quantitative model measurements; and the interpretation of off-body flow visualizations obtained using different illumination and particle seeding techniques.

  2. Metabolic engineering of yeast for production of fuels and chemicals.

    PubMed

    Nielsen, Jens; Larsson, Christer; van Maris, Antonius; Pronk, Jack

    2013-06-01

    Microbial production of fuels and chemicals from renewable carbohydrate feedstocks offers sustainable and economically attractive alternatives to their petroleum-based production. The yeast Saccharomyces cerevisiae offers many advantages as a platform cell factory for such applications. Already applied on a huge scale for bioethanol production, this yeast is easy to genetically engineer, its physiology, metabolism and genetics have been intensively studied and its robustness enables it to handle harsh industrial conditions. Introduction of novel pathways and optimization of its native cellular processes by metabolic engineering are rapidly expanding its range of cell-factory applications. Here we review recent scientific progress in metabolic engineering of S. cerevisiae for the production of bioethanol, advanced biofuels, and chemicals. Copyright © 2013 Elsevier Ltd. All rights reserved.

  3. Microimaging FT-IR of oral cavity tumours. Part III: Cells, inoculated tissues and human tissues

    NASA Astrophysics Data System (ADS)

    Conti, C.; Ferraris, P.; Giorgini, E.; Pieramici, T.; Possati, L.; Rocchetti, R.; Rubini, C.; Sabbatini, S.; Tosi, G.; Mariggiò, M. A.; Lo Muzio, L.

    2007-05-01

    The biochemistry of healthy and tumour cell cultures, inoculated tissues and oral cavity tissues have been studied by FT-IR Microscopy with the aim to relate spectral patterns with microbiological and histopathological findings. 'Supervised' and 'unsupervised' procedures of data handling afforded a satisfactory degree of accordance between spectroscopic and the other two techniques. In particular, changes in frequency and intensity of proteins, connective and nucleic acids vibrational modes as well as the visualization of biochemical single wave number or band ratio images, allowed an evaluation of the pathological changes. The spectroscopic patterns of inoculated tissues resulted quite similar to human tissues; differences of both types of sections with cellular lines could be explained by the influence of the environment.

  4. Stem cells and cellular therapy: potential treatment for cardiovascular diseases.

    PubMed

    Zavos, Panayiotis M

    2006-02-08

    This paper reviews the current status of cloning and stem cell research and its application to treating various diseases, particularly cardiovascular disease. Recently new techniques have been developed to isolate embryonic stem cells from preimplantation embryos. These cells are undifferentiated and are therefore able to develop into the cells of whichever organ it is in contact with. These cells would be especially beneficial for the treatment of ischemia and various other cardiovascular diseases. There are a variety of various issues that need to be discussed before this technology can be applied safely, including government regulations to ensure the clinical safety and effectiveness of the procedures, as well as the prevention of improper handling or the use of contaminated tissues.

  5. Seeing about soil — management lessons from a simple model for renewable resources

    NASA Astrophysics Data System (ADS)

    Lichtenegger, Klaus; Schappacher, Wilhelm

    2014-02-01

    Employing an effective cellular automata model, we investigate and analyze the build-up and erosion of soil. Depending on the strategy employed for handling agricultural production, in many cases we find a critical dependence on the prescribed production target, with a sharp transition between stable production and complete breakdown of the system. Strategies which are particularly well-suited for mimicking real-world management approaches can produce almost cyclic behavior, which can also either lead to sustainable production or to breakdown. While designed to describe the dynamics of soil evolution, this model is quite general and may also be useful as a model for other renewable resources and may even be employed in other disciplines like psychology.

  6. Renal Control of Calcium, Phosphate, and Magnesium Homeostasis

    PubMed Central

    Chonchol, Michel; Levi, Moshe

    2015-01-01

    Calcium, phosphate, and magnesium are multivalent cations that are important for many biologic and cellular functions. The kidneys play a central role in the homeostasis of these ions. Gastrointestinal absorption is balanced by renal excretion. When body stores of these ions decline significantly, gastrointestinal absorption, bone resorption, and renal tubular reabsorption increase to normalize their levels. Renal regulation of these ions occurs through glomerular filtration and tubular reabsorption and/or secretion and is therefore an important determinant of plasma ion concentration. Under physiologic conditions, the whole body balance of calcium, phosphate, and magnesium is maintained by fine adjustments of urinary excretion to equal the net intake. This review discusses how calcium, phosphate, and magnesium are handled by the kidneys. PMID:25287933

  7. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  8. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  9. The anatomy of a shark attack: a case report and review of the literature.

    PubMed

    Caldicott, D G; Mahajani, R; Kuhn, M

    2001-07-01

    Shark attacks are rare but are associated with a high morbidity and significant mortality. We report the case of a patient's survival from a shark attack and their subsequent emergency medical and surgical management. Using data from the International Shark Attack File, we review the worldwide distribution and incidence of shark attack. A review of the world literature examines the features which make shark attacks unique pathological processes. We offer suggestions for strategies of management of shark attack, and techniques for avoiding adverse outcomes in human encounters with these endangered creatures.

  10. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  11. Novel Method For Low-Rate Ddos Attack Detection

    NASA Astrophysics Data System (ADS)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  12. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    NASA Astrophysics Data System (ADS)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  13. An entangling-probe attack on Shor's algorithm for factorization

    NASA Astrophysics Data System (ADS)

    Azuma, Hiroo

    2018-02-01

    We investigate how to attack Shor's quantum algorithm for factorization with an entangling probe. We show that an attacker can steal an exact solution of Shor's algorithm outside an institute where the quantum computer is installed if he replaces its initialized quantum register with entangled qubits, namely the entangling probe. He can apply arbitrary local operations to his own probe. Moreover, we assume that there is an unauthorized person who helps the attacker to commit a crime inside the institute. He tells garbage data obtained from measurements of the quantum register to the attacker secretly behind a legitimate user's back. If the attacker succeeds in cracking Shor's algorithm, the legitimate user obtains a random answer and does not notice the attacker's illegal acts. We discuss how to detect the attacker. Finally, we estimate a probability that the quantum algorithm inevitably makes an error, of which the attacker can take advantage.

  14. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    PubMed

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented.

  15. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    PubMed Central

    Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-01-01

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. PMID:29065461

  16. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    PubMed

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  17. Lethality of sea lamprey attacks on lake trout in relation to location on the body surface

    USGS Publications Warehouse

    Bergstedt, Roger A.; Schneider, Clifford P.; O'Gorman, Robert

    2001-01-01

    We compared the locations of healed attack marks of the sea lamprey Petromyzon marinus on live lake trout Salvelinus namaycush with those of unhealed attack marks on dead lake trout to determine if the lethality of a sea lamprey attack was related to attack location. Lake trout were collected from Lake Ontario, live fish with gill nets in September 1985 and dead fish with trawls in October 1983−1986. Attack location was characterized by the percent distances from snout to tail and from the ventral to the dorsal midline. Kolmogorov−Smirnov two-sample tests did not detect significant differences in the distribution of attack location along either the anteroposterior axis or the dorsoventral axis. When attack locations were grouped into six anatomical regions historically used to record sea lamprey attacks, dead fish did not exhibit a significantly higher proportion of attacks in the more anterior regions. Even if the differences in attack location on live and dead fish were significant, they were too small to imply substantial spatial differences in attack lethality that should be accounted for when modeling the effects of sea lampreys feeding on lake trout. We suggest that the tendency for sea lamprey attacks to occur on the anterior half of the fish is related to the lower amplitude of lateral body movement there during swimming and thus the lower likelihood of being dislodged.

  18. Serial agonistic attacks by greylag goose families, Anser anser, against the same opponent

    PubMed Central

    Scheiber, Isabella B.R.; Kotrschal, Kurt; Weiß, Brigitte M.

    2011-01-01

    It is known from primates that alliance partners may support each other’s interests in competition with others, for example, through repeated agonistic attacks against a particular individual. We examined serial aggressive interactions between greylag goose families and other flock members. We found that repeated attacks towards the same individual were common and that up to five serial attacks by family members followed an initial attack. Family size did not affect the frequency of such serial attacks. Juvenile geese evidently benefited most from active social support through serial attacks. About 60% of the juveniles’ lost primary interactions were subsequently reversed by another family member. This may be one of the reasons why juveniles rank higher in the social hierarchy than would be expected from their age and size alone. Losses in serial attacks predominantly occurred against other, presumably higher-ranking, family geese and ganders. We propose three major functions/consequences of serial attacks. Analogous to primates, serial attacks in greylag geese may serve to reinforce a losing experience of an opponent defeated in a preceding attack. On the side of the winning family, serial attacks may reinforce the experience of winning. Both winning and losing experiences are linked with physiological consequences in higher vertebrates, affecting the future social performance of winners or losers. Finally, serial attacks may signal the agonistic potential of a family to other flock members. This is supported by heart rate data, which indicate that greylags are competent to interpret third-party relationships. PMID:21984838

  19. Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.

    PubMed

    Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H

    2010-06-01

    Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.

  20. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.

  1. Public knowledge of heart attack in a Nepalese population survey.

    PubMed

    Limbu, Yuba R; Malla, Rabi; Regmi, Shyam R; Dahal, Ramesh; Nakarmi, Hari L; Yonzan, Ganesh; Gartaula, Ritu P

    2006-01-01

    Limited knowledge of heart attack symptoms may prevent patients from seeking time-dependent thrombolytic therapy, an intervention that offers impressive survival benefit. Previous studies carried out in developed countries demonstrated a deficit of knowledge about a wide range of heart attack symptoms. The aim of this study was to describe knowledge of heart attack, knowledge of heart attack symptoms, and anticipated first response to symptoms among the lay public in Nepal. A total of 1192 participants (657 men and 535 women age 16 to 88 years old) were interviewed in a cross-sectional manner. Those <16 years of age, all health professionals, and individuals with a history of heart attack were excluded. A total of 862 (72.3%) participants had heard of heart attack. Significantly more male than female participants had heard of heart attack (P <.001). Of the respondents, 91.7% with >or=10 years of education (ED-2) had heard of heart of attack, whereas only 54% respondents with <10 years of education or who were illiterate (unable to read and write) (ED-1) had heard of heart attack, and in both the male and female populations, a higher percentage of the ED-2 group had heard of heart attack than the ED-1 group (92.6% vs. 60% and 85.6% vs. 49.6%, respectively). A significantly higher number of respondents from 31 to 50 years of age (AGE-2) had heard of heart attack than those 16 to 30 years of age (AGE-1) and those >50 years of age (AGE-3) (P <.001). Among 862 respondents who had heard of heart attack, 21.3% could not name any heart attack symptoms. A total of 16 different heart attack symptoms were named. Fainting or collapsing (48%), chest pain (22.4%), shortness of breath (9%), dizziness (8.4%), palpitations (7.4%), and sweating (7.4%) were the leading symptoms named by respondents. Fainting or collapsing and chest pain and shortness of breath were named more frequently among the ED-2 group respondents and the AGE-3 group men. Only 3.7% could name >or=2 typical heart attack symptoms. A significantly larger number of the ED-2 group named >or=2 typical symptoms than their counterparts (P <0.001). A large number (77.6%) of respondents preferred immediate hospital referral and/or doctor consultation after a heart attack. In Nepal, better-educated men are more aware of heart attack. Fainting or collapsing and chest pain and shortness of breath were leading heart attack symptoms named by the general population. Public heart attack awareness is not adequate and knowledge of wide range of heart attack symptoms is deficient in the Nepalese general population.

  2. mRNA-seq reveals skeletal muscle atrophy in response to handling stress in a marine teleost, the red cusk-eel (Genypterus chilensis).

    PubMed

    Aedo, Jorge E; Maldonado, Jonathan; Aballai, Víctor; Estrada, Juan M; Bastias-Molina, Macarena; Meneses, Claudio; Gallardo-Escarate, Cristian; Silva, Herman; Molina, Alfredo; Valdés, Juan A

    2015-12-01

    Fish reared under intensive conditions are repeatedly exposed to stress, which negatively impacts growth. Although most fish follow a conserved pattern of stress response, with increased concentrations of cortisol, each species presents specificities in the cell response and stress tolerance. Therefore, culturing new species requires a detailed knowledge of these specific responses. The red cusk-eel (Genypterus chilensis) is a new economically important marine species for the Chilean aquaculture industry. However, there is no information on the stress- and cortisol-induced mechanisms that decrease skeletal muscle growth in this teleost. Using Illumina RNA-seq technology, skeletal muscle sequence reads for G. chilensis were generated under control and handling stress conditions. Reads were mapped onto a reference transcriptome, resulting in the in silico identification of 785 up-regulated and 167 down-regulated transcripts. Gene ontology enrichment analysis revealed a significant up-regulation of catabolic genes associated with skeletal muscle atrophy. These results were validated by RT-qPCR analysis for ten candidates genes involved in ubiquitin-mediated proteolysis, autophagy and skeletal muscle growth. Additionally, using a primary culture of fish skeletal muscle cells, the effect of cortisol was evaluated in relation to red cusk-eel skeletal muscle atrophy. The present data demonstrated that handling stress promotes skeletal muscle atrophy in the marine teleost G. chilensis through the expression of components of the ubiquitin-proteasome and autophagy-lysosome systems. Furthermore, cortisol was a powerful inductor of skeletal muscle atrophy in fish myotubes. This study is an important step towards understanding the atrophy system in non-model teleost species and provides novel insights on the cellular and molecular mechanisms that control skeletal muscle growth in early vertebrates.

  3. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  4. Non-invasive evaluation of physiological stress in an iconic Australian marsupial: the Koala (Phascolarctos cinereus).

    PubMed

    Narayan, Edward J; Webster, Koa; Nicolson, Vere; Mucci, Al; Hero, Jean-Marc

    2013-06-15

    Koalas (Phascolarctos cinereus) are the only extant representatives of Australia's unique marsupial family Phascolarctidae and were listed as nationally Vulnerable in 2012. Causes of mortality are diverse, although the disease chlamydiosis, dog attacks, collisions with cars, and loss of habitat represent the principal reasons for the continued species decline. Koala breeding facilities in Queensland and New South Wales, Australia have been established for conservation and tourism. Non-invasive monitoring of physiological stress is important for determining the sub-lethal effects of environmental stressors on the well-being, reproduction and survival of Koalas in Zoos and also in the wild. In this study, we developed a faecal cortisol metabolite (FCM) enzyme-immunoassay (EIA) for monitoring physiological stress in Koalas from two established Zoos in Australia and also within a free-living sub-population from Queensland. Biological validation of the FCM EIA was done using an adrenocorticotropic hormone (ACTH) challenge. We discovered excretory lag-times of FCM of 24 h in females (n=2) and 48 h in male (n=2) Koalas in response to the ACTH challenge. FCM levels showed an episodic and delayed peak response lasting up to 9 days post ACTH challenge. This finding should be taken into consideration when designing future experiments to study the impacts of short-term (acute) and chronic stressors on the Koalas. Laboratory validations were done using parallelism and recovery checks (extraction efficiency) of the cortisol standard against pooled Koala faecal extracts. Greater than 99% recovery of the cortisol standard was obtained as well as a parallel displacement curve against Koala faecal extracts. FCM levels of the captive Koalas (n=10 males and 13 females) significantly differed by sex, reproductive condition (lactating versus non-lactating Koalas) and the handling groups. Handled male Koalas had 200% higher FCM levels than their non-handled counterparts, while females were not affected by handling as long they were not undergoing lactation. There was no significant difference in FCM levels between the captive and wild Koalas (n=9 males and 7 females). Overall, these results provide foundation knowledge on non-invasive FCM analysis in this iconic Australian marsupial. Non-invasive stress endocrinology opens up opportunities for evaluating the sub-lethal physiological effects of management activities (including caging, translocation) on the nutritional status, reproductive behaviors and disease status of captive and managed in situ Koala populations. Copyright © 2013 Elsevier Inc. All rights reserved.

  5. The effect of climate variability on urinary stone attacks: increased incidence associated with temperature over 18 °C: a population-based study.

    PubMed

    Park, Hyoung Keun; Bae, Sang Rak; Kim, Satbyul E; Choi, Woo Suk; Paick, Sung Hyun; Ho, Kim; Kim, Hyeong Gon; Lho, Yong Soo

    2015-02-01

    The aim of this study was to evaluate the effect of seasonal variation and climate parameters on urinary tract stone attack and investigate whether stone attack is increased sharply at a specific point. Nationwide data of total urinary tract stone attack numbers per month between January 2006 and December 2010 were obtained from the Korean Health Insurance Review and Assessment Service. The effects of climatic factors on monthly urinary stone attack were assessed using auto-regressive integrated moving average (ARIMA) regression method. A total of 1,702,913 stone attack cases were identified. Mean monthly and monthly average daily urinary stone attack cases were 28,382 ± 2,760 and 933 ± 85, respectively. The stone attack showed seasonal trends of sharp incline in June, a peak plateau from July to September, and a sharp decline after September. The correlation analysis showed that ambient temperature (r = 0.557, p < 0.001) and relative humidity (r = 0.513, p < 0.001) were significantly associated with urinary stone attack cases. However, after adjustment for trends and seasonality, ambient temperature was the only climate factor associated with the stone attack cases in ARIMA regression test (p = 0.04). Threshold temperature was estimated as 18.4 °C. Risk of urinary stone attack significantly increases 1.71% (1.02-2.41 %, 95% confidence intervals) with a 1 °C increase of ambient temperature above the threshold point. In conclusion, monthly urinary stone attack cases were changed according to seasonal variation. Among the climates variables, only temperature had consistent association with stone attack and when the temperature is over 18.4 °C, urinary stone attack would be increased sharply.

  6. Reexperiencing symptoms, dissociation, and avoidance behaviors in daily life of patients with PTSD and patients with panic disorder with agoraphobia.

    PubMed

    Pfaltz, Monique C; Michael, Tanja; Meyer, Andrea H; Wilhelm, Frank H

    2013-08-01

    Panic attacks are frequently perceived as life threatening. Panic disorder (PD) patients may therefore experience symptoms of posttraumatic stress disorder (PTSD). The authors explored this in 28 healthy controls, 17 PTSD patients, and 24 PD patients with agoraphobia who completed electronic diaries 36 times during 1 week. Patient groups frequently reported dissociation as well as thoughts, memories, and reliving of their trauma or panic attacks. PTSD patients reported more trauma/panic attack thoughts (incidence rate ratio [IRR] = 2.9) and memories (IRR = 2.8) than PD patients. Patient groups relived their trauma or panic attacks equally frequently, and reported comparable bodily reactions and distress associated with trauma or panic attack memories. Clinical groups avoided trauma or panic attack reminders more often than healthy controls (avoidance of trauma- or panic attack-related thoughts (IRR = 8.0); avoidance of things associated with the trauma or panic attack (IRR = 40.7). PD patients avoided trauma or panic attack reminders less often than PTSD patients (avoidance of trauma- or panic attack-related thoughts [IRR = 2.5]; avoidance of things associated with the trauma or panic attack [IRR = 4.1]), yet these differences were nonsignificant when controlling for functional impairment. In conclusion, trauma-like symptoms are common in PD with agoraphobia and panic attacks may be processed similarly as trauma in PTSD. Copyright © 2013 International Society for Traumatic Stress Studies.

  7. False Positive and False Negative Effects on Network Attacks

    NASA Astrophysics Data System (ADS)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  8. The non-trusty clown attack on model-based speaker recognition systems

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2015-03-01

    Biometric detectors for speaker identification commonly employ a statistical model for a subject's voice, such as a Gaussian Mixture Model, that combines multiple means to improve detector performance. This allows a malicious insider to amend or append a component of a subject's statistical model so that a detector behaves normally except under a carefully engineered circumstance. This allows an attacker to force a misclassification of his or her voice only when desired, by smuggling data into a database far in advance of an attack. Note that the attack is possible if attacker has access to database even for a limited time to modify victim's model. We exhibit such an attack on a speaker identification, in which an attacker can force a misclassification by speaking in an unusual voice, and replacing the least weighted component of victim's model by the most weighted competent of the unusual voice of the attacker's model. The reason attacker make his or her voice unusual during the attack is because his or her normal voice model can be in database, and by attacking with unusual voice, the attacker has the option to be recognized as himself or herself when talking normally or as the victim when talking in the unusual manner. By attaching an appropriately weighted vector to a victim's model, we can impersonate all users in our simulations, while avoiding unwanted false rejections.

  9. [Cellular mechanism of the generation of spontaneous activity in gastric muscle].

    PubMed

    Nakamura, Eri; Kito, Yoshihiko; Fukuta, Hiroyasu; Yanai, Yoshimasa; Hashitani, Hikaru; Yamamoto, Yoshimichi; Suzuki, Hikaru

    2004-03-01

    In gastric smooth muscles, interstitial cells of Cajal (ICC) might be the pacemaker cells of spontaneous activities since ICC are rich in mitochondria and are connected with smooth muscle cells via gap junctions. Several types of ICC are distributed widely in the stomach wall. A group of ICC distributed in the myenteric layer (ICC-MY) were the pacemaker cells of gastrointestinal smooth muscles. Pacemaker potentials were generated in ICC-MY, and the potentials were conducted to circular smooth muscles to trigger slow waves and also conducted to longitudinal muscles to form follower potentials. In circular muscle preparations, interstitial cells distributed within muscle bundles (ICC-IM) produced unitary potentials, which were conducted to circular muscles to form slow potentials by summation. In mutant mice lacking inositol trisphosphate (IP(3)) receptor, slow waves were absent in gastric smooth muscles. The generation of spontaneous activity was impaired by the inhibition of Ca(2+)-release from internal stores through IP(3) receptors, inhibition of mitochondrial Ca(2+)-handling with proton pump inhibitors, and inhibition of ATP-sensitive K(+)-channels at the mitochondrial inner membrane. These results suggested that mitochondrial Ca(2+)-handling causes the generation of spontaneous activity in pacemaker cells. Possible involvement of protein kinase C (PKC) in the Ca(2+) signaling system was also suggested.

  10. Ligand-free palladium-mediated site-specific protein labeling inside gram-negative bacterial pathogens.

    PubMed

    Li, Jie; Lin, Shixian; Wang, Jie; Jia, Shang; Yang, Maiyun; Hao, Ziyang; Zhang, Xiaoyu; Chen, Peng R

    2013-05-15

    Palladium, a key transition metal in advancing modern organic synthesis, mediates diverse chemical conversions including many carbon-carbon bond formation reactions between organic compounds. However, expanding palladium chemistry for conjugation of biomolecules such as proteins, particularly within their native cellular context, is still in its infancy. Here we report the site-specific protein labeling inside pathogenic Gram-negative bacterial cells via a ligand-free palladium-mediated cross-coupling reaction. Two rationally designed pyrrolysine analogues bearing an aliphatic alkyne or an iodophenyl handle were first encoded in different enteric bacteria, which offered two facial handles for palladium-mediated Sonogashira coupling reaction on proteins within these pathogens. A GFP-based bioorthogonal reaction screening system was then developed, allowing evaluation of both the efficiency and the biocompatibilty of various palladium reagents in promoting protein-small molecule conjugation. The identified simple compound-Pd(NO3)2 exhibited high efficiency and biocompatibility for site-specific labeling of proteins in vitro and inside living E. coli cells. This Pd-mediated protein coupling method was further utilized to label and visualize a Type-III Secretion (T3S) toxin-OspF in Shigella cells. Our strategy may be generally applicable for imaging and tracking various virulence proteins within Gram-negative bacterial pathogens.

  11. Nuclear Receptors, Mitochondria, and Lipid Metabolism

    PubMed Central

    Alaynick, William A.

    2009-01-01

    Lipid metabolism is a continuum from emulsification and uptake of lipids in the intestine to cellular uptake and transport to compartments such as mitochondria. Whether fats are shuttled into lipid droplets in adipose tissue or oxidized in mitochondria and peroxisomes depends on metabolic substrate availability, energy balance and endocrine signaling of the organism. Several members of the nuclear hormone receptor superfamily are lipid-sensing factors that affect all aspects of lipid metabolism. The physiologic actions of glandular hormones (e.g. thyroid, mineralocorticoid and glucocorticoid), vitamins (e.g. vitamins A and D) and reproductive hormones (e.g. progesterone, estrogen and testosterone) and their cognate receptors are well established. The peroxisome proliferator activated receptors (PPARs) and Liver X receptors (LXRs), acting in concert with PPARγ Coactivator 1α (PGC-1α), have been shown to regulate insulin sensitivity and lipid handling. These receptors are the focus of intense pharmacologic studies to expand the armamentarium of small molecule ligands to treat diabetes and the metabolic syndrome (hypertension, insulin resistance, hyperglycemia, dyslipidemia, and obesity). Recently, additional partners of PGC-1α have moved to the forefront of metabolic research, the Estrogen-related Receptors (ERRs). Although no endogenous ligands for these receptors have been identified, phenotypic analyses of knockout mouse models demonstrate an important role for these molecules in substrate sensing and handling as well as mitochondrial function. PMID:18375192

  12. L-beta-ODAP alters mitochondrial Ca2+ handling as an early event in excitotoxicity.

    PubMed

    Van Moorhem, Marijke; Decrock, Elke; Coussee, Evelyne; Faes, Liesbeth; De Vuyst, Elke; Vranckx, Katleen; De Bock, Marijke; Wang, Nan; D'Herde, Katharina; Lambein, Fernand; Callewaert, Geert; Leybaert, Luc

    2010-03-01

    The neurotoxin beta-N-oxalyl-L-alpha,beta-diaminopropionic acid (L-beta-ODAP) is an L-glutamate analogue at alpha-amino-3-hydroxy-5-methyl-4-isoxazole propionic acid (AMPA)/kainate receptors in neurons and therefore acts as an excitotoxic substance. Chronic exposure to L-beta-ODAP present in Lathyrus sativus L. (L. sativus) seeds is proposed as the cause of the neurodegenerative disease neurolathyrism, but the mechanism of its action has not been conclusively identified. A key factor in excitotoxic neuronal cell death is a disturbance of the intracellular Ca2+ homeostasis, including changes in the capacity of intracellular Ca2+ stores like the endoplasmic reticulum (ER) or mitochondria. In this study, aequorin and other Ca2+ indicators were used in N2a neuroblastoma cells to investigate alterations of cellular Ca2+ handling after 24 h exposure to L-beta-ODAP. Our data demonstrate increased mitochondrial Ca2+ loading and hyperpolarization of the mitochondrial membrane potential (Psi(m)), which was specific for L-beta-ODAP and not observed with L-glutamate. We conclude that L-beta-ODAP disturbs the ER-mitochondrial Ca2+ signaling axis and thereby renders the cells more vulnerable to its excitotoxic effects that ultimately will lead to cell death. 2010 Elsevier Ltd. All rights reserved.

  13. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  14. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  15. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... meaning of the listed terms are as follows: (a) The term attack means any attack or series of attacks by... population caused, or which would be caused, by an attack upon the United States, or by natural disaster, (2) to deal with the immediate emergency conditions which would be created by any such attack, or natural...

  16. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    PubMed

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  17. Security Assessment of Cyberphysical Digital Microfluidic Biochips.

    PubMed

    Ali, Sk Subidh; Ibrahim, Mohamed; Sinanoglu, Ozgur; Chakrabarty, Krishnendu; Karri, Ramesh

    2016-01-01

    A digital microfluidic biochip (DMFB) is an emerging technology that enables miniaturized analysis systems for point-of-care clinical diagnostics, DNA sequencing, and environmental monitoring. A DMFB reduces the rate of sample and reagent consumption, and automates the analysis of assays. In this paper, we provide the first assessment of the security vulnerabilities of DMFBs. We identify result-manipulation attacks on a DMFB that maliciously alter the assay outcomes. Two practical result-manipulation attacks are shown on a DMFB platform performing enzymatic glucose assay on serum. In the first attack, the attacker adjusts the concentration of the glucose sample and thereby modifies the final result. In the second attack, the attacker tampers with the calibration curve of the assay operation. We then identify denial-of-service attacks, where the attacker can disrupt the assay operation by tampering either with the droplet-routing algorithm or with the actuation sequence. We demonstrate these attacks using a digital microfluidic synthesis simulator. The results show that the attacks are easy to implement and hard to detect. Therefore, this work highlights the need for effective protections against malicious modifications in DMFBs.

  18. Recent progress in the use of ‘omics technologies in brassicaceous vegetables

    PubMed Central

    Witzel, Katja; Neugart, Susanne; Ruppel, Silke; Schreiner, Monika; Wiesner, Melanie; Baldermann, Susanne

    2015-01-01

    Continuing advances in ‘omics methodologies and instrumentation is enhancing the understanding of how plants cope with the dynamic nature of their growing environment. ‘Omics platforms have been only recently extended to cover horticultural crop species. Many of the most widely cultivated vegetable crops belong to the genus Brassica: these include plants grown for their root (turnip, rutabaga/swede), their swollen stem base (kohlrabi), their leaves (cabbage, kale, pak choi) and their inflorescence (cauliflower, broccoli). Characterization at the genome, transcript, protein and metabolite levels has illustrated the complexity of the cellular response to a whole series of environmental stresses, including nutrient deficiency, pathogen attack, heavy metal toxicity, cold acclimation, and excessive and sub-optimal irradiation. This review covers recent applications of ‘omics technologies to the brassicaceous vegetables, and discusses future scenarios in achieving improvements in crop end-use quality. PMID:25926843

  19. We be jammin’: an update on pectin biosynthesis, trafficking and dynamics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, Charles T.

    2015-11-20

    Pectins are complex polysaccharides that contain acidic sugars and are major determinants of the cohesion, adhesion, extensibility, porosity and electrostatic potential of plant cell walls. Recent evidence has solidified their positions as key regulators of cellular growth and tissue morphogenesis, although important details of how they achieve this regulation are still missing. Pectins are also hypothesized to function as ligands for wall integrity sensors that enable plant cells to respond to intrinsic defects in wall biomechanics and to wall degradation by attacking pathogens. This update highlights recent advances in our understanding of the biosynthesis of pectins, how they are deliveredmore » to the cell surface and become incorporated into the cell wall matrix and how pectins are modified over time in the apoplast. It also poses unanswered questions for further research into this enigmatic but essential class of carbohydrate polymers.« less

  20. Approaches for Defining the Hsp90-dependent Proteome

    PubMed Central

    Hartson, Steven D.; Matts, Robert L.

    2011-01-01

    Hsp90 is the target of ongoing drug discovery studies seeking new compounds to treat cancer, neurodegenerative diseases, and protein folding disorders. To better understand Hsp90’s roles in cellular pathologies and in normal cells, numerous studies have utilized proteomics assays and related high-throughput tools to characterize its physical and functional protein partnerships. This review surveys these studies, and summarizes the strengths and limitations of the individual attacks. We also include downloadable spreadsheets compiling all of the Hsp90-interacting proteins identified in more than 23 studies. These tools include cross-references among gene aliases, human homologues of yeast Hsp90-interacting proteins, hyperlinks to database entries, summaries of canonical pathways that are enriched in the Hsp90 interactome, and additional bioinformatic annotations. In addition to summarizing Hsp90 proteomics studies performed to date and the insights they have provided, we identify gaps in our current understanding of Hsp90-mediated proteostasis. PMID:21906632

  1. Fatty acids trigger mitochondrion-dependent necrosis.

    PubMed

    Rockenfeller, Patrick; Ring, Julia; Muschett, Vera; Beranek, Andreas; Buettner, Sabrina; Carmona-Gutierrez, Didac; Eisenberg, Tobias; Khoury, Chamel; Rechberger, Gerald; Kohlwein, Sepp D; Kroemer, Guido; Madeo, Frank

    2010-07-15

    Obesity is characterised by lipid accumulation in non-adipose tissues, leading to organ degeneration and a wide range of diseases, including diabetes, heart attack and liver cirrhosis. Free fatty acids (FFA) are believed to be the principal toxic triggers mediating the adverse cellular effects of lipids. Here, we show that various cooking oils used in human nutrition cause cell death in yeast in the presence of a triacylglycerol lipase, mimicking the physiological microenvironment of the small intestine. Combining genetic and cell death assays, we demonstrate that elevated FFA concentrations lead to necrotic cell death, as evidenced by loss of membrane integrity and release of nuclear HMGB1. FFA-mediated necrosis depends on functional mitochondria and leads to the accumulation of reactive oxygen species. We conclude that lipotoxicity is executed via a mitochondrial necrotic pathway, challenging the dogma that the adverse effects of lipid stress are exclusively apoptotic.

  2. Epigenetic Mechanisms: An Emerging Player in Plant-Microbe Interactions.

    PubMed

    Zhu, Qian-Hao; Shan, Wei-Xing; Ayliffe, Michael A; Wang, Ming-Bo

    2016-03-01

    Plants have developed diverse molecular and cellular mechanisms to cope with a lifetime of exposure to a variety of pathogens. Host transcriptional reprogramming is a central part of plant defense upon pathogen recognition. Recent studies link DNA methylation and demethylation as well as chromatin remodeling by posttranslational histone modifications, including acetylation, methylation, and ubiquitination, to changes in the expression levels of defense genes upon pathogen challenge. Remarkably these inducible defense mechanisms can be primed prior to pathogen attack by epigenetic modifications and this heightened resistance state can be transmitted to subsequent generations by inheritance of these modification patterns. Beside the plant host, epigenetic mechanisms have also been implicated in virulence development of pathogens. This review highlights recent findings and insights into epigenetic mechanisms associated with interactions between plants and pathogens, in particular bacterial and fungal pathogens, and demonstrates the positive role they can have in promoting plant defense.

  3. METHAMPHETAMINE TOXICITY AND MESSENGERS OF DEATH

    PubMed Central

    Krasnova, Irina N.; Cadet, Jean Lud

    2009-01-01

    Methamphetamine (METH) is an illicit psychostimulant that is widely abused in the world. Several lines of evidence suggest that chronic METH abuse leads to neurodegenerative changes in the human brain. These include damage to dopamine and serotonin axons, loss of gray matter accompanied by hypertrophy of the white matter and microgliosis in different brain areas. In the present review, we summarize data on the animal models of METH neurotoxicity which include degeneration of monoaminergic terminals and neuronal apoptosis. In addition, we discuss molecular and cellular bases of METH-induced neuropathologies. The accumulated evidence indicates that multiple events, including oxidative stress, excitotoxicity, hyperthermia, neuroinflammatory responses, mitochondrial dysfunction, endoplasmic reticulum stress converge to mediate METH-induced terminal degeneration and neuronal apoptosis. When taken together, these findings suggest that pharmacological strategies geared towards the prevention and treatment of the deleterious effects of this drug will need to attack the various pathways that form the substrates of METH toxicity. PMID:19328213

  4. Mechanisms of acetylcholine- and bradykinin-induced preconditioning.

    PubMed

    Critz, Stuart D; Cohen, Michael V; Downey, James M

    2005-01-01

    Acetylcholine (ACh) and bradykinin (BK) are potent pharmacological agents which mimic ischemic preconditioning (IPC) enabling hearts to resist infarction during a subsequent period of ischemia. The cardioprotective pathways activated by BK but not ACh may also protect when activated at reperfusion. ACh and BK stimulate Gi/o-linked receptors and ultimately mediate protection by opening mitochondrial ATP-sensitive potassium channels with the generation of reactive oxygen species that act as second messengers to activate protein kinase C (PKC). There appear to be key differences, however, in the pathways prior to potassium channel opening for these two receptors. This review aims to summarize what is currently known about pharmacological preconditioning by ACh and BK with an emphasis on differences that are seen in the signal transduction cascades. Understanding the cellular basis of protection by ACh and BK is a critical step towards developing pharmacological agents that will prevent infarction during ischemia resulting from coronary occlusion or heart attack.

  5. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    PubMed

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  6. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  7. Robustness analysis of interdependent networks under multiple-attacking strategies

    NASA Astrophysics Data System (ADS)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  8. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.

    PubMed

    Grosshans, Frédéric; Cerf, Nicolas J

    2004-01-30

    A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.

  9. A comparison of the nature and correlates of panic attacks in the context of Panic Disorder and Social Anxiety Disorder.

    PubMed

    Brown, Lily A; LeBeau, Richard; Liao, Betty; Niles, Andrea N; Glenn, Daniel; Craske, Michelle G

    2016-01-30

    Panic attacks occurring outside of Panic Disorder are not well-understood despite their inclusion as a diagnostic specifier in the Diagnostic and Statistical Manual for Mental Disorders (DSM-5). This study compares panic attacks in the context of Panic Disorder compared to social anxiety in terms of their symptom frequency, severity, and clinical correlates. Participants (n=404) were interviewed using the Anxiety Disorders Interview Schedule (ADIS-IV-L; Brown et al., 1994), from which we analyzed interviewer ratings of panic attacks and panic attack symptoms, as well as other demographic and clinical characteristics. Panic attacks in the context of Panic Disorder were characterized by a greater number and severity of symptoms compared to panic attacks in the context of Social Anxiety Disorder, and were associated with a history of traumatization, inpatient psychiatric treatment, and benzodiazepine use. Social anxiety panic attacks were associated with reduced physical health concerns. Cognitive panic attack symptoms were more prevalent in Panic Disorder and were associated with a variety of poor clinical correlates. Panic attacks in the context of Panic Disorder are more severe than those in social anxiety, and this may be driven by cognitive disturbances during those attacks. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  10. Heart Attack Recovery FAQs

    MedlinePlus

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  11. Hepatitis B surface antigen (HBsAg) and core antigen (HBcAg) combine CpG oligodeoxynucletides as a novel therapeutic vaccine for chronic hepatitis B infection.

    PubMed

    Li, Jianqiang; Ge, Jun; Ren, Sulin; Zhou, Tong; Sun, Ying; Sun, Honglin; Gu, Yue; Huang, Hongying; Xu, Zhenxing; Chen, Xiaoxiao; Xu, Xiaowei; Zhuang, Xiaoqian; Song, Cuiling; Jia, Fangmiao; Xu, Aiguo; Yin, Xiaojin; Du, Sean X

    2015-08-20

    Hepatitis B virus infection is a non-cytopathic hepatotropic virus which can lead to chronic liver disease and hepatocellular carcinoma. Traditional therapies fail to provide sustained control of viral replication and liver damage in most patients. As an alternative strategy, immunotherapeutic approaches have shown promising efficacy in the treatment of chronic hepatitis B patients. Here, we investigated the efficacy of a novel therapeutic vaccine formulation consisting of two HBV antigens, HBsAg and HBcAg, and CpG adjuvant. This vaccine formulation elicits forceful humoral responses directed against HBsAg/HBcAg, and promotes a Th1/Th2 balance response against HBsAg and a Th1-biased response against HBcAg in both C57BL/6 and HBV transgenic mice. Vigorous cellular immune response was also detected in HBV transgenic mice, for a significantly higher number of HBs/HBc-specific IFN-γ secreting CD4+ and CD8+ T cells was generated. Moreover, vaccinated mice elicited significantly intense in vivo CTL attack, reduced serum HBsAg level without causing liver damage in HBV transgenic mice. In summary, this study demonstrates a novel therapeutic vaccine with the potential to elicit vigorous humoral and cellular response, overcoming tolerance in HBV transgenic mice. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Exocyst and autophagy-related membrane trafficking in plants.

    PubMed

    Pecenková, Tamara; Markovic, Vedrana; Sabol, Peter; Kulich, Ivan; Žárský, Viktor

    2017-12-18

    Endomembrane traffic in eukaryotic cells functions partially as a means of communication; delivery of membrane in one direction has to be balanced with a reduction at the other end. This effect is typically the case during the defence against pathogens. To combat pathogens, cellular growth and differentiation are suppressed, while endomembrane traffic is poised towards limiting the pathogen attack. The octameric exocyst vesicle-tethering complex was originally discovered as a factor facilitating vesicle-targeting and vesicle-plasma membrane (PM) fusion during exocytosis prior to and possibly during SNARE complex formation. Interestingly, it was recently implicated both in animals and plants in autophagy membrane traffic. In animal cells, the exocyst is integrated into the mTOR-regulated energy metabolism stress/starvation pathway, participating in the formation and especially initiation of an autophagosome. In plants, the first functional link was to autophagy-related anthocyanin import to the vacuole and to starvation. In this concise review, we summarize the current knowledge of exocyst functions in autophagy and defence in plants that might involve unconventional secretion and compare it with animal conditions. Formation of different exocyst complexes during undisturbed cell growth, as opposed to periods of cellular stress reactions involving autophagy, might contribute to the coordination of endomembrane trafficking pathways. © The Author(s) 2017. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  13. Coupled elasticity–diffusion model for the effects of cytoskeleton deformation on cellular uptake of cylindrical nanoparticles

    PubMed Central

    Wang, Jizeng; Li, Long

    2015-01-01

    Molecular dynamic simulations and experiments have recently demonstrated how cylindrical nanoparticles (CNPs) with large aspect ratios penetrate animal cells and inevitably deform cytoskeletons. Thus, a coupled elasticity–diffusion model was adopted to elucidate this interesting biological phenomenon by considering the effects of elastic deformations of cytoskeleton and membrane, ligand–receptor binding and receptor diffusion. The mechanism by which the binding energy drives the CNPs with different orientations to enter host cells was explored. This mechanism involved overcoming the resistance caused by cytoskeleton and membrane deformations and the change in configurational entropy of the ligand–receptor bonds and free receptors. Results showed that deformation of the cytoskeleton significantly influenced the engulfing process by effectively slowing down and even hindering the entry of the CNPs. Additionally, the engulfing depth was determined quantitatively. CNPs preferred or tended to vertically attack target cells until they were stuck in the cytoskeleton as implied by the speed of vertically oriented CNPs that showed much faster initial engulfing speeds than horizontally oriented CNPs. These results elucidated the most recent molecular dynamics simulations and experimental observations on the cellular uptake of carbon nanotubes and phagocytosis of filamentous Escherichia coli bacteria. The most efficient engulfment showed the stiffness-dependent optimal radius of the CNPs. Cytoskeleton stiffness exhibited more significant influence on the optimal sizes of the vertical uptake than the horizontal uptake. PMID:25411410

  14. Complement activation by carbon nanotubes and its influence on the phagocytosis and cytokine response by macrophages.

    PubMed

    Pondman, Kirsten M; Sobik, Martin; Nayak, Annapurna; Tsolaki, Anthony G; Jäkel, Anne; Flahaut, Emmanuel; Hampel, Silke; Ten Haken, Bennie; Sim, Robert B; Kishore, Uday

    2014-08-01

    Carbon nanotubes (CNTs) have promised a range of applications in biomedicine. Although influenced by the dispersants used, CNTs are recognized by the innate immune system, predominantly by the classical pathway of the complement system. Here, we confirm that complement activation by the CNT used continues up to C3 and C5, indicating that the entire complement system is activated including the formation of membrane-attack complexes. Using recombinant forms of the globular regions of human C1q (gC1q) as inhibitors of CNT-mediated classical pathway activation, we show that C1q, the first recognition subcomponent of the classical pathway, binds CNTs via the gC1q domain. Complement opsonisation of CNTs significantly enhances their uptake by U937 cells, with concomitant downregulation of pro-inflammatory cytokines and up-regulation of anti-inflammatory cytokines in both U937 cells and human monocytes. We propose that CNT-mediated complement activation may cause recruitment of cellular infiltration, followed by phagocytosis without inducing a pro-inflammatory immune response. This study highlights the importance of the complement system in response to carbon nanontube administration, suggesting that the ensuing complement activation may cause recruitment of cellular infiltration, followed by phagocytosis without inducing a pro-inflammatory immune response. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. Relative Contribution of Cellular Complement Inhibitors CD59, CD46, and CD55 to Parainfluenza Virus 5 Inhibition of Complement-Mediated Neutralization

    PubMed Central

    Li, Yujia; Parks, Griffith D.

    2018-01-01

    The complement system is a part of the innate immune system that viruses need to face during infections. Many viruses incorporate cellular regulators of complement activation (RCA) to block complement pathways and our prior work has shown that Parainfluenza virus 5 (PIV5) incorporates CD55 and CD46 to delay complement-mediated neutralization. In this paper, we tested the role of a third individual RCA inhibitor CD59 in PIV5 interactions with complement pathways. Using a cell line engineered to express CD59, we show that small levels of functional CD59 are associated with progeny PIV5, which is capable of blocking assembly of the C5b-C9 membrane attack complex (MAC). PIV5 containing CD59 (PIV5-CD59) showed increased resistance to complement-mediated neutralization in vitro comparing to PIV5 lacking regulators. Infection of A549 cells with PIV5 and RSV upregulated CD59 expression. TGF-beta treatment of PIV5-infected cells also increased cell surface CD59 expression and progeny virions were more resistant to complement-mediated neutralization. A comparison of individual viruses containing only CD55, CD46, or CD59 showed a potency of inhibiting complement-mediated neutralization, which followed a pattern of CD55 > CD46 > CD59. PMID:29693588

  16. Viral and cellular SOS-regulated motor proteins: dsDNA translocation mechanisms with divergent functions.

    PubMed

    Wolfe, Annie; Phipps, Kara; Weitao, Tao

    2014-01-01

    DNA damage attacks on bacterial cells have been known to activate the SOS response, a transcriptional response affecting chromosome replication, DNA recombination and repair, cell division and prophage induction. All these functions require double-stranded (ds) DNA translocation by ASCE hexameric motors. This review seeks to delineate the structural and functional characteristics of the SOS response and the SOS-regulated DNA translocases FtsK and RuvB with the phi29 bacteriophage packaging motor gp16 ATPase as a prototype to study bacterial motors. While gp16 ATPase, cellular FtsK and RuvB are similarly comprised of hexameric rings encircling dsDNA and functioning as ATP-driven DNA translocases, they utilize different mechanisms to accomplish separate functions, suggesting a convergent evolution of these motors. The gp16 ATPase and FtsK use a novel revolution mechanism, generating a power stroke between subunits through an entropy-DNA affinity switch and pushing dsDNA inward without rotation of DNA and the motor, whereas RuvB seems to employ a rotation mechanism that remains to be further characterized. While FtsK and RuvB perform essential tasks during the SOS response, their roles may be far more significant as SOS response is involved in antibiotic-inducible bacterial vesiculation and biofilm formation as well as the perspective of the bacteria-cancer evolutionary interaction.

  17. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  18. Sensitivity to carbon dioxide in subjects with a single lifetime panic attack: possible clinical "bedside" predictive test for panic disorder after a first attack.

    PubMed

    Berzak, Elina; Reznik, Mila; Narsia, Oxana; Benjamin, Jonathan

    2004-01-01

    There is currently no way of knowing whether a patient who has recently had a single panic attack has incipient panic disorder. Sensitivity to carbon dioxide (CO2) is lower in healthy volunteers than in panic disorder patients. If this is also true of people who experience a single lifetime panic attack, it could be used as a prognostic test. Subjects with a single lifetime panic attack and subjects with panic disorder received an inhalation of 35% CO2. Subjects completed the panic symptoms scale (PSS), and also stated whether they considered that they had experienced an attack. None of 14 subjects with a single lifetime panic attack, compared to 7 of 17 subjects with panic disorder (P=.009), had an attack. The PSS also distinguished between the groups. The 35% CO2 challenge warrants further investigation as a predictive test after a first panic attack.

  19. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

  20. The effect of nursing professional pay structures and pay levels on hospitals' heart attack outcomes.

    PubMed

    Brown, Mark P

    2006-01-01

    The effect of nursing professionals (i.e., nurse aid/orderly, licensed practical nurse, registered nurse) pay structures and pay levels on hospitals risk-adjusted heart attack outcomes was determined. Operationalizing hospitals' heart attack outcomes as their thirty-day risk-adjusted mortality rates, a positive curvilinear relation is hypothesized between pay dispersion and hospitals' heart attack outcomes, whereas a direct relation is hypothesized between pay level and hospitals' heart attack outcomes. Pay level is also hypothesized as a moderator of the relation between pay dispersion and hospitals' heart attack outcomes. Using a sample of 138 California hospitals, support is not found for either the curvilinear relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes, or the direct relation between nursing professionals' pay level and hospitals' heart attack outcomes. Support is found for the moderation hypothesis in which nursing professionals' pay level moderates the relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes. Implications for practice are discussed in light of the study's results.

Top