Sample records for attack rate increased

  1. Novel Method For Low-Rate Ddos Attack Detection

    NASA Astrophysics Data System (ADS)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  2. Ventilatory control of heart rate during inhalation of 5% CO2 and types of panic attacks.

    PubMed

    Ley, R

    1991-09-01

    Differences in the magnitude of increases in heart rate during prolonged inhalation of 5% CO2 range from a mean of 25 b/min for a group of eight panic-disorder patients who panicked (Woods, Charney, Goodman, & Heninger, 1988. Archives of General Psychiatry, 45, 43-52) to zero b/min for 16 patients, eight of whom panicked (Craske & Barlow, 1990. Journal of Abnormal Psychology, 99, 302-307). What accounts for this disparity? The present paper describes how heart rate can be increased by means of voluntary overbreathing during prolonged inhalation of 5% CO2 in air. This suggests that differences in the degree of overbreathing may explain differences in the magnitude of increases in heart rate during inhalation of 5% CO2. An explanation is also offered for the curious finding that some patients experience "panic attacks" with zero increase in heart rate. Evidence suggests that this is likely to happen in cognitively based panic attacks, in contrast to hyperventilatory attacks or anticipatory attacks.

  3. Increased Incidence Rate of Trauma- and Stressor-related Disorders in Denmark After the Breivik Attacks in Norway.

    PubMed

    Hansen, Bertel T; Dinesen, Peter T; Østergaard, Søren D

    2017-11-01

    On 22 July 2011, Anders Breivik killed 77 adults and children in Norway. Having recently documented increases in the incidence of trauma- and stressor-related disorders in Denmark after the 9/11 attacks, we hypothesized that the Breivik attacks-due to their geographic proximity-would be followed by even larger increases in Denmark. Using population-based data from the Danish Psychiatric Central Research Register (1995-2012), we conducted an intervention analysis of the change in the incidence of trauma- and stressor-related disorders after the Breivik attacks. The incidence rate increased by 16% over the following 1½ years after the Breivik attacks, corresponding to 2736 additional cases. In comparison, 9/11 was followed by a 4% increase. We also present evidence of a subsequent surge in incidence stimulated by media attention. This study bolsters previous findings on extra-national consequences of terrorism and indicates that geographic proximity and media coverage may exacerbate effects.

  4. Attack rates of Sirex noctilio and patterns of pine tree defenses and mortality in northern Patagonia.

    PubMed

    Martinson, S J; Fernádez Ajó, A A; Martínez, A S; Krivak-Tetley, F E; Villacide, J M; Ayres, M P; Corley, J C

    2018-04-18

    Accidental and intentional global movement of species has increased the frequency of novel plant-insect interactions. In Patagonia, the European woodwasp, Sirex noctilio, has invaded commercial plantations of North American pines. We compared the patterns of resin defenses and S. noctilio-caused mortality at two mixed-species forests near San Carlos de Bariloche, Argentina. We observed lower levels of resin flow and higher levels of mortality in Pinus contorta compared with Pinus ponderosa. In general, S. noctilio attacked trees with lower resin compared with neighboring trees. Resin production in P. ponderosa was not related to growth rates, but for P. contorta, slower growing trees produced less resin than faster growing conspecifics. For all infested trees, attack density and number of drills (ovipositor probes) per attack did not vary with resin production. Most attacks resulted in one or two drills. Attack rates and drills/attack were basically uniform across the bole of the tree except for a decrease in both drills/attack and attack density in the upper portion of the crown, and an increase in the attack density for the bottom 10% of the tree. Planted pines in Patagonia grow faster than their counterparts in North America, and produce less resin, consistent with the growth-differentiation balance hypothesis. Limited resin defenses may help to explain the high susceptibility of P. contorta to woodwasps in Patagonia.

  5. Jasmonate-induced responses are costly but benefit plants under attack in native populations

    PubMed Central

    Baldwin, Ian T.

    1998-01-01

    Herbivore attack is widely known to reduce food quality and to increase chemical defenses and other traits responsible for herbivore resistance. Inducible defenses are commonly thought to allow plants to forgo the costs of defense when not needed; however, neither their defensive function (increasing a plant’s fitness) nor their cost-savings function have been demonstrated in nature. The root-produced toxin nicotine increases after herbivore attack in the native, postfire annual Nicotiana attenuata and is internally activated by the wound hormone, jasmonic acid. I treated the roots of plants with the methyl ester of this hormone (MeJA) to elicit a response in one member of each of 745 matched pairs of plants growing in native populations with different probabilities of attack from herbivores, and measured the lifetime production of viable seed. In populations with intermediate rates of attack, induced plants were attacked less often by herbivores and survived to produce more seed than did their uninduced counterparts. Previous induction did not significantly increase the fitness of plants suffering high rates of attack. However, if plants had not been attacked, induced plants produced less seed than did their uninduced counterparts. Jasmonate-induced responses function as defenses but are costly, and inducibility allows this species to forgo these costs when the defenses are unnecessary. PMID:9653149

  6. The Effect of the September 11 Terrorist Attacks on Suicide and Deliberate Self-Harm: A Time Trend Study

    ERIC Educational Resources Information Center

    Lange, Aart W.; Neeleman, Jan

    2004-01-01

    Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following the attacks. These findings contrast with…

  7. [The association between emergency clinic visits for asthmatic attacks and fluctuating environmental factors].

    PubMed

    Shimizu, S; Kagawa, J; Ishiguro, M

    2001-07-01

    The number of nocturnal visits of asthmatic attack patients to the emergency room of Yokohama Medical Association's Clinic from January 1990 to December 1991 was compared to daily levels of air pollution (NO, NO2, SO2 and SPM) and weather (temperature and relative humidity) variables measured in Yokohama City. Trend-cycle components (Trend) that control for the weekly effects, other irregular variance for asthmatic attack incidence and environmental parameter measurements were estimated from the original data series using the method of Akaike and Ishiguro (1980). The rate of increase for each environmental parameter was then calculated from its trend-cycle components. We classified the data into four stages on the basis of rising and falling temperature and humidity. For each stage of temperature and humidity, fluctuation we estimated correlations between the number of asthmatic attack visits and original data series measurements, estimated trend-cycle components, and calculated rates of increase for each of the air pollutants. The daily number of asthmatic attack visits was negatively correlated to the daily mean values of all air pollutants, but positively correlated to the daily mean temperature and relative humidity. The trend-cycle components of the air pollutants were also negatively correlated to the frequencies of asthmatic attacks (p < 0.01 for all pollutants except NO2). In contrast, the number of asthmatic attack visits were in general positively correlated with increasing levels of pollutants. Furthermore, when both temperature and relative humidity decreased, significant correlations (r > 0.31, p < 0.001) between the number of asthmatic attacks and increased rates of all air pollutants were observed (r: NO2 > NO > SO2 > SPM).

  8. Evaluation of High-Angle-of-Attack Handling Qualities for the X-31A Using Standard Evaluation Maneuvers

    NASA Technical Reports Server (NTRS)

    Stoliker, Patrick C.; Bosworth, John T.

    1996-01-01

    The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright-Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level 1/Level 2 performance. Lateral gross-acquisition testing results in Level 1/Level 2 ratings below 45 deg angle of attack, degrading into Level 3 as angle of attack increases. The fine-tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal-Smith, bandwidth, Smith-Geddes, and military specifications.

  9. Evaluation of High-Angle-of-Attack Handling Qualities for the X-31A Using Standard Evaluation Maneuvers

    NASA Technical Reports Server (NTRS)

    Stoliker, Patrick C.; Bosworth, John T.

    1997-01-01

    The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg. and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level l/Level 2 performance. Lateral gross-acquisition testing results in Level l/Level 2 ratings below 45 deg. angle of attack, degrading into Level 3 as angle of attack increases. The fine tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg. angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal Smith, bandwidth, Smith-Geddes, and military specifications.

  10. [Mortality from heart attack in Belgrade population during the period 1990-2004].

    PubMed

    Ratkov, Isidora; Sipetić, Sandra; Vlajinac, Hristina; Sekeres, Bojan

    2008-01-01

    In most countries, cardiovascular diseases are the leading disorders, with ischemic heart diseases being the leading cause of death. According to WHO data, every year about 17 million people die of cardiovascular diseases, which is 30% of all deaths. Ischemic heart diseases contribute from one-third to one-half of all deaths due to cardiovascular diseases. Three point eight million men and 3.4 million women in the world die every year from ischemic heart diseases, and in Europe about 2 million. The highest mortality rate from ischemic heart diseases occurs in India, China and Russia. The aim of this descriptive epidemiological study was to determine heart attack mortality in Belgrade population during the period 1990-2004. In the study, we conducted investigation of Belgrade population during the period 1990-2004. Mortality data were obtained from the city institution for statistics. The mortality rates were calculated based on the total Belgrade population obtained from the mean values for the last two register years (1991 and 2002). The mortality rates were standardized using the direct method of standardization according to the world (Segi) standard population. In the Belgrade population during the period 1990-2004, the participation of mortality rate due to heart attack among deaths from cardiovascular diseases was 17% in males and 10% in females. In Belgrade male population, mean standardized mortality rates (per 100,000 habitants) were 50.5 for heart attack, 8.3 for chronic ischemic heart diseases and 4.6 for angina pectoris, while in females the rates were 30.8, 6.7 and 4.2, respectively. Mortality from ischemic heart diseases and from heart attack was higher in males than in females. During the studied 15-year period, on average 755 males and 483 females died due to heart attack every year. Mean standardized mortality rates per 100,000 habitants were 50.0 in male and 31.1 in female population. Males died 1.6 times more frequently from heart attack than females. During the studied period, mean standardized mortality rates from heart attack, in the population aged over 30 increased with age both in male and female population. However, males tended to die from heart attack at an earlier age than females, with death rates for males approximately the same as those for women who were 10 years older. In Belgrade during the period from 1990-2004, we found that there was an increasing trend in mortality rate due to cardiovascular diseases, while the trend of mortality rate from heart attack was constant with insignificant oscillations.

  11. Trends in ethnic disparities in stroke incidence in Auckland, New Zealand, during 1981 to 2003.

    PubMed

    Carter, Kristie; Anderson, Craig; Hacket, Maree; Feigin, Valery; Barber, P Alan; Broad, Joanna B; Bonita, Ruth

    2006-01-01

    Although geographical variations in stroke rates are well documented, limited data exist on temporal trends in ethnic-specific stroke incidence. We assessed trends in ethnic-specific stroke rates using standard diagnostic criteria and community-wide surveillance procedures in Auckland, New Zealand (NZ) in 1981 to 1982, 1991 to 1992, and 2002 to 2003. Indirect and direct methods were used to adjust first-ever (incident) and total (attack) rates for changes in the structure of the population and reported with 95% CIs. Ethnicity was self-defined and categorized as "NZ/European," "Maori," "Pacific peoples," and "Asian and other." Stroke attack (19%; 95% CI, 11% to 26%) and incidence rates (19%; 95% CI, 12% to 24%) declined significantly in NZ/Europeans from 1981 to 1982 to 2002 to 2003. These rates remained high or increased in other ethnic groups, particularly for Pacific peoples in whom stroke attack rates increased by 66% (95% CI; 11% to 225%) over the periods. Some favorable downward trends in vascular risk factors, such as cigarette smoking, were counterbalanced by increasing age, body mass index, and diabetes in certain ethnic groups. Divergent trends in ethnic-specific stroke incidence and attack rates, and of associated risk factors, have occurred in Auckland over recent decades. The findings provide mixed views as to the future burden of stroke in populations undergoing similar lifestyle and structural changes.

  12. Does uninsurance affect the health outcomes of the insured? Evidence from heart attack patients in California.

    PubMed

    Daysal, N Meltem

    2012-07-01

    In this paper, I examine the impact of uninsured patients on the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California (1999-2006). My results indicate that uninsured patients have an economically significant effect that increases the mortality rate of insured heart attack patients. I show that these results are not driven by alternative explanations, including reverse causality, patient composition effects, sample selection or unobserved trends and that they are robust to a host of specification checks. The primary channel for the observed spillover effects is increased hospital uncompensated care costs. Although data limitations constrain my capacity to check how hospitals change their provision of care to insured heart attack patients in response to reduced revenues, the evidence I have suggests a modest increase in the quantity of cardiac services without a corresponding increase in hospital staff. Copyright © 2012 Elsevier B.V. All rights reserved.

  13. Increased Incidence Rate of Trauma- and Stressor-Related Disorders in Denmark After the September 11, 2001, Terrorist Attacks in the United States.

    PubMed

    Hansen, Bertel T; Østergaard, Søren D; Sønderskov, Kim M; Dinesen, Peter T

    2016-10-01

    The terrorist attacks that occurred on September 11, 2001 (hereafter referred to as 9/11) in the United States had a profound impact on the physical and mental health of Americans, but the effects beyond the United States are largely unknown. To understand the wider aftermath, we examined the consequences of the 9/11 attacks on mental disorders in the Kingdom of Denmark. Utilizing population data from the Danish Psychiatric Central Research Register from 1995 to 2012, we used a time-series intervention approach to estimate the change in the incidence rate of mental disorders after the 9/11 attacks. Based on analyses of 1,448,250 contacts with psychiatric services, we found that the attacks were followed by an immediate 16% increase in the incidence rate of trauma- and stressor-related disorders. This surge dissipated approximately a year after 9/11. In contrast, no similar increases were found for other disorders. This is consistent with the prominent role of external stressors in the etiology of trauma- and stressor-related disorders. The results indicate that the effects of 9/11 on mental disorders extended across the Atlantic Ocean to Denmark. Thus, the impact of terrorist attacks on mental health is likely not limited to inhabitants of the country under attack; it also extends to people far away and without immediate relation to it. © The Author 2016. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  14. Attack rates of dengue fever in Swedish travellers.

    PubMed

    Rocklöv, Joacim; Lohr, Wolfgang; Hjertqvist, Marika; Wilder-Smith, Annelies

    2014-06-01

    Dengue is endemic in many countries visited by Swedish travellers. We aimed to determine the attack rate of dengue in Swedish travellers and analyse the trends over time and the geographical variation. We obtained the following data from the Swedish Institute for Communicable Disease Control for the y 1995-2010: number of Swedish residents with confirmed dengue, the country and year of infection. We also obtained registers on the Swedish annual air traveller arrivals to dengue endemic areas from the United Nations World Tourist Organization for the time period. We estimated attack rates with 95% confidence intervals (CI). In total, 925 Swedish travellers with confirmed dengue were reported. We found an increasing trend over time for most destinations. The majority of the dengue cases were acquired in Thailand (492 out of 925 travellers; 53%), with an attack rate of 13.6 (95% CI 12.7, 14.4) per 100,000 travellers. However, the 2 highest attack rates per 100,000 travellers were found for Sri Lanka (45.3, 95% CI 34.3, 56.4) and Bangladesh (42.6, 95% CI 23.8, 61.5). Information on attack rates in travellers is more helpful in guiding travel medicine practitioners than reports of absolute numbers, as the latter reflect travel preferences rather than the true risk. Although the majority of dengue infections in Swedish travellers were acquired in Thailand, the attack rates for dengue in travellers to Sri Lanka and Bangladesh were much higher. These data aid in refining information on the risk of dengue in travellers.

  15. Defensive responses by a social caterpillar are tailored to different predators and change with larval instar and group size

    NASA Astrophysics Data System (ADS)

    McClure, Melanie; Despland, Emma

    2011-05-01

    Gregariousness in animals is widely accepted as a behavioral adaptation for protection from predation. However, predation risk and the effectiveness of a prey's defense can be a function of several other factors, including predator species and prey size or age. The objective of this study was to determine if the gregarious habit of Malacosoma disstria caterpillars is advantageous against invertebrate natural enemies, and whether it is through dilution or cooperative defenses. We also examined the effects of larval growth and group size on the rate and success of attacks. Caterpillars of M. disstria responded with predator-specific behaviors, which led to increased survival. Evasive behaviors were used against stinkbugs, while thrashing by fourth instar caterpillars and holding on to the silk mat by second instar caterpillars was most efficient against spider attacks. Collective head flicking and biting by groups of both second and fourth instar caterpillars were observed when attacked by parasitoids. Increased larval size decreased the average number of attacks by spiders but increased the number of attacks by both stinkbugs and parasitoids. However, increased body size decreased the success rate of attacks by all three natural enemies and increased handling time for both predators. Larger group sizes did not influence the number of attacks from predators but increased the number of attacks and the number of successful attacks from parasitoids. In all cases, individual risk was lower in larger groups. Caterpillars showed collective defenses against parasitoids but not against the walking predators. These results show that caterpillars use different tactics against different natural enemies. Overall, these tactics are both more diverse and more effective in fourth instar than in second instar caterpillars, confirming that growth reduces predation risk. We also show that grouping benefits caterpillars through dilution of risk, and, in the case of parasitoids, through group defenses. The decreased tendency to aggregate in the last larval instar may therefore be linked to decreasing predation risk.

  16. Effects of spanwise blowing on the pressure field and vortex-lift characteristics of a 44 deg swept trapezoidal wing. [wind tunnel stability tests - aircraft models

    NASA Technical Reports Server (NTRS)

    Campbell, J. F.

    1975-01-01

    Wind-tunnel data were obtained at a free-stream Mach number of 0.26 for a range of model angle of attack, jet thrust coefficient, and jet location. Results of this study show that the sectional effects to spanwise blowing are strongly dependent on angle of attack, jet thrust coefficient, and span location; the largest effects occur at the highest angles of attack and thrust coefficients and on the inboard portion of the wing. Full vortex lift was achieved at the inboard span station with a small blowing rate, but successively higher blowing rates were necessary to achieve full vortex lift at increased span distances. It is shown that spanwise blowing increases lift throughout the angle-of-attack range, delays wing stall to higher angles of attack, and improves the induced-drag polars. The leading-edge suction analogy can be used to estimate the section and total lifts resulting from spanwise blowing.

  17. Do Unexpected Panic Attacks Occur Spontaneously?

    PubMed Central

    Meuret, Alicia E.; Rosenfield, David; Wilhelm, Frank H.; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T.

    2012-01-01

    Background Spontaneous or unexpected panic attacks, per definition, occur out-of-the blue, in absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of or during the attack, but not preceding it. To test this hypothesisweexaminedif points of significant autonomic changes preceded the onset of spontaneous panic attacks. Methods Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen naturally panic attacks were recorded during 1,960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before, and continuing to 10 minutes after, the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization, and compared to time matched control periods within the same person. Results Significant patterns of instability across a numberof autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes prior to onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt PCO2 increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in PCO2. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before and duringthe attacks. Changes in the matched control periods were largely absent. Conclusions Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction betweenuncuedand cued panic attacks. PMID:21783179

  18. Could missile attacks trigger acute myocardial infarction?

    PubMed

    Zubaid, Mohammad; Suresh, Cheiyil G; Thalib, Lukman; Rashed, Wafa

    2006-08-01

    During the Gulf war in 2003, Kuwait was targeted with missile attacks for 10 consecutive days. Our objective is to evaluate the influence of missile attacks on the incidence of acute myocardial infarction (AMI). We retrospectively compared the number of admissions for AMI presenting to a major general hospital during missile attacks period (MAP) in 2003 with four control periods. MAP and each control period consisted of the same number of days (10 days). The four control periods were the 10 days immediately before and after MAP; and the same time period as MAP for the years 2001 and 2002. The number of admissions for AMI was highest during MAP, 21 cases compared to 14-16 cases in the four control periods, with a trend towards increase during MAP (incidence rate ratio = 1.59; 95% CI 0.95 to 2.66, p < 0.07). The number of admissions for AMI during the first 5 days of MAP was significantly higher compared to the first 5 days of the four control periods (incidence rate ratio = 2.43; 95% CI 1.23 to 4.26, p < 0.01). The observed AMI admission rate during the first 5 days of MAP was significantly higher than expected for a 5-day period in the years 2001, 2002 and 2003. This increase was specific to AMI and did not affect other acute cardiac conditions. Missile attacks were associated with an increase in the incidence of AMI. This increase was specific to AMI and did not influence acute cardiac conditions.

  19. Increase in the maximum lift of an airplane wing due to a sudden increase in its effective angle of attack resulting from a gust

    NASA Technical Reports Server (NTRS)

    Kramer, Max

    1932-01-01

    Wind-tunnel tests are described, in which the angle of attack of a wing model was suddenly increased (producing the effect of a vertical gust) and the resulting forces were measured. It was found that the maximum lift coefficient increases in proportion to the rate of increase in the angle of attack. This fact is important for the determination of the gust stresses of airplanes with low wing loading. The results of the calculation of the corrective factor are given for a high-performance glider and a light sport plane of conventional type.

  20. Buffet induced structural/flight-control system interaction of the X-29A aircraft

    NASA Technical Reports Server (NTRS)

    Voracek, David F.; Clarke, Robert

    1991-01-01

    High angle-of-attack flight regime research is currently being conducted for modern fighter aircraft at the NASA Ames Research Center's Dryden Flight Research Facility. This flight regime provides enhanced maneuverability to fighter pilots in combat situations. Flight research data are being acquired to compare and validate advanced computational fluid dynamic solutions and wind-tunnel models. High angle-of-attack flight creates unique aerodynamic phenomena including wing rock and buffet on the airframe. These phenomena increase the level of excitation of the structural modes, especially on the vertical and horizontal stabilizers. With high gain digital flight-control systems, this structural response may result in an aeroservoelastic interaction. A structural interaction on the X-29A aircraft was observed during high angle-of-attack flight testing. The roll and yaw rate gyros sensed the aircraft's structural modes at 11, 13, and 16 Hz. The rate gyro output signals were then amplified through the flight-control laws and sent as commands to the flaperons and rudder. The flight data indicated that as the angle of attack increased, the amplitude of the buffet on the vertical stabilizer increased, which resulted in more excitation to the structural modes. The flight-control system sensors and command signals showed this increase in modal power at the structural frequencies up to a 30 degree angle-of-attack. Beyond a 30 degree angle-of-attack, the vertical stabilizer response, the feedback sensor amplitude, and control surface command signal amplitude remained relatively constant. Data are presented that show the increased modal power in the aircraft structural accelerometers, the feedback sensors, and the command signals as a function of angle of attack. This structural interaction is traced from the aerodynamic buffet to the flight-control surfaces.

  1. Correlations Among Ice Measurements, Impingement Rates Icing Conditions, and Drag Coefficients for Unswept NACA 65A004 Airfoil

    NASA Technical Reports Server (NTRS)

    Gray, Vernon H.

    1958-01-01

    An empirical relation has been obtained by which the change in drag coefficient caused by ice formations on an unswept NACA 65AO04 airfoil section can be determined from the following icing and operating conditions: icing time, airspeed, air total temperature, liquid-water content, cloud droplet impingement efficiencies, airfoil chord length, and angles of attack. The correlation was obtained by use of measured ice heights and ice angles. These measurements were obtained from a variety of ice formations, which were carefully photographed, cross-sectioned, and weighed. Ice weights increased at a constant rate with icing time in a rime icing condition and at progressively increasing rates in glaze icing conditions. Initial rates of ice collection agreed reasonably well with values predicted from droplet impingement data. Experimental droplet impingement rates obtained on this airfoil section agreed with previous theoretical calculations for angles of attack of 40 or less. Disagreement at higher angles of attack was attributed to flow separation from the upper surface of the experimental airfoil model.

  2. Mountain Pine Beetle Dynamics and Reproductive Success in Post-Fire Lodgepole and Ponderosa Pine Forests in Northeastern Utah

    PubMed Central

    Lerch, Andrew P.; Pfammatter, Jesse A.

    2016-01-01

    Fire injury can increase tree susceptibility to some bark beetles (Curculionidae, Scolytinae), but whether wildfires can trigger outbreaks of species such as mountain pine beetle (Dendroctonus ponderosae Hopkins) is not well understood. We monitored 1173 lodgepole (Pinus contorta var. latifolia Doug.) and 599 ponderosa (Pinus ponderosa Doug. ex Law) pines for three years post-wildfire in the Uinta Mountains of northeastern Utah in an area with locally endemic mountain pine beetle. We examined how the degree and type of fire injury influenced beetle attacks, brood production, and subsequent tree mortality, and related these to beetle population changes over time. Mountain pine beetle population levels were high the first two post-fire years in lodgepole pine, and then declined. In ponderosa pine, populations declined each year after initial post-fire sampling. Compared to trees with strip or failed attacks, mass attacks occurred on trees with greater fire injury, in both species. Overall, a higher degree of damage to crowns and boles was associated with higher attack rates in ponderosa pines, but additional injury was more likely to decrease attack rates in lodgepole pines. In lodgepole pine, attacks were initially concentrated on fire-injured trees, but during subsequent years beetles attacked substantial numbers of uninjured trees. In ponderosa pine, attacks were primarily on injured trees each year, although these stands were more heavily burned and had few uninjured trees. In total, 46% of all lodgepole and 56% of ponderosa pines underwent some degree of attack. Adult brood emergence within caged bole sections decreased with increasing bole char in lodgepole pine but increased in ponderosa pine, however these relationships did not scale to whole trees. Mountain pine beetle populations in both tree species four years post-fire were substantially lower than the year after fire, and wildfire did not result in population outbreaks. PMID:27783632

  3. Mountain Pine Beetle Dynamics and Reproductive Success in Post-Fire Lodgepole and Ponderosa Pine Forests in Northeastern Utah.

    PubMed

    Lerch, Andrew P; Pfammatter, Jesse A; Bentz, Barbara J; Raffa, Kenneth F

    2016-01-01

    Fire injury can increase tree susceptibility to some bark beetles (Curculionidae, Scolytinae), but whether wildfires can trigger outbreaks of species such as mountain pine beetle (Dendroctonus ponderosae Hopkins) is not well understood. We monitored 1173 lodgepole (Pinus contorta var. latifolia Doug.) and 599 ponderosa (Pinus ponderosa Doug. ex Law) pines for three years post-wildfire in the Uinta Mountains of northeastern Utah in an area with locally endemic mountain pine beetle. We examined how the degree and type of fire injury influenced beetle attacks, brood production, and subsequent tree mortality, and related these to beetle population changes over time. Mountain pine beetle population levels were high the first two post-fire years in lodgepole pine, and then declined. In ponderosa pine, populations declined each year after initial post-fire sampling. Compared to trees with strip or failed attacks, mass attacks occurred on trees with greater fire injury, in both species. Overall, a higher degree of damage to crowns and boles was associated with higher attack rates in ponderosa pines, but additional injury was more likely to decrease attack rates in lodgepole pines. In lodgepole pine, attacks were initially concentrated on fire-injured trees, but during subsequent years beetles attacked substantial numbers of uninjured trees. In ponderosa pine, attacks were primarily on injured trees each year, although these stands were more heavily burned and had few uninjured trees. In total, 46% of all lodgepole and 56% of ponderosa pines underwent some degree of attack. Adult brood emergence within caged bole sections decreased with increasing bole char in lodgepole pine but increased in ponderosa pine, however these relationships did not scale to whole trees. Mountain pine beetle populations in both tree species four years post-fire were substantially lower than the year after fire, and wildfire did not result in population outbreaks.

  4. Hormones and heart disease.

    PubMed

    Kent, S

    1979-06-01

    Because the advantage that women have over men in a lower heart attack rate is gradually lost after menopause, it has been suggested that estrogen may exert a protective effect against heart disease. The situation is complex, and the available data are open to various interpretations. Available data show a gradual, predictable increase in the death rate from heart disease among women with advancing age, despite the apparent increase in cardiovascular events around the time of menopause. This suggests that men may be particularly susceptible to heart disease, rather than that women have an immunity to the disease. The theory that estrogen exerts a protective effect against heart disease was examined when men who had had heart attacks were treated with estrogen in the Coronary Drug Project. The practice was discontinued when it was found that men receiving estrogen had an elevated incidence of myocardial infarction, a finding that suggests that estrogen may promote heart disease. Additional evidence that estrogen may have a harmful effect on the cardiovascular system comes from a recent study by Gerald B. Phillips who found that men who had suffered heart attacks before age 43 had higher levels of estradiol in their blood than men who had not had heart attacks. A noteworthy finding from th e Framingham study was the fact that the relative risk of cardiovascular events in postmenopausal compared with premenopausal women seemed to decrease with age. Hans Selye identifies stress as "the final, decisive eliciting factor" in precipitating heart attack. Broda O. Barnes also maintains that stress is a major cause of heart attack, but adds that most stress-prone individuals suffer from thyroid deficiency, which is the underlying cause of their increased susceptibility to heart attacks.

  5. Trajectory Control for Vehicles Entering the Earth's Atmosphere at Small Flight Path Angles

    NASA Technical Reports Server (NTRS)

    Eggleston, John M.

    1959-01-01

    Methods of controlling the trajectories of high-drag-low-lift vehicles entering the earth's atmosphere at angles of attack near 90 deg and at initial entry angles up to 3 deg are studied. The trajectories are calculated for vehicles whose angle of attack can be held constant at some specified value or can be perfectly controlled as a function of some measured quantity along the trajectory. The results might be applied in the design of automatic control systems or in the design of instruments which will give the human pilot sufficient information to control his trajectory properly during an atmospheric entry. Trajectory data are compared on the basis of the deceleration, range, angle of attack, and, in some cases, the rate of descent. The aerodynamic heat-transfer rate and skin temperature of a vehicle with a simple heat-sink type of structure are calculated for trajectories made with several types of control functions. For the range of entry angles considered, it is found that the angle of attack can be controlled to restrict the deceleration down to an arbitrarily chosen level of 3g. All the control functions tried are successful in reducing the maximum deceleration to the desired level. However, in order to avoid a tendency for the deceleration to reach an initial peak decrease, and then reach a second peak, some anticipation is required in the control function so that the change in angle of attack will lead the change in deceleration. When the angle of attack is controlled in the aforementioned manner, the maximum rate of aerodynamic heat transfer to the skin is reduced, the maximum skin temperature of the vehicle is virtually unaffected, and the total heat absorbed is slightly increased. The increase in total heat can be minimized, however, by maintaining the maximum desired deceleration for as much of the trajectory as possible. From an initial angle of attack of 90 deg, the angle-of-attack requirements necessary to maintain constant values of deceleration (1g to 4g) and constant values of rate of descent (450 to 1,130 ft/sec) as long as it is aerodynamically practical are calculated and are found to be moderate in both magnitude and rate. Entry trajectories made with these types of control are presented and discussed.

  6. Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment

    NASA Astrophysics Data System (ADS)

    Montminy, David P.

    Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information.

  7. Hybrid attacks on model-based social recommender systems

    NASA Astrophysics Data System (ADS)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  8. Effectiveness of the call in beach volleyball attacking play.

    PubMed

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-09

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  9. Carrying weapons and intent to harm among Victorian secondary school students in 1999 and 2009.

    PubMed

    Hemphill, Sheryl A; Tollit, Michelle A; Romaniuk, Helena; Williams, Joanne; Toumbourou, John W; Bond, Lyndal; Patton, George C

    2013-12-16

    To examine comparable survey data across 10 years to assess whether rates of self-reported weapon carrying and intent to harm others have increased as suggested in reported trends in violent offences. Population-based surveys administered to Victorian secondary school students in 1999 (8984 students) and 2009 (10 273 students) attending government, Catholic and independent schools. Student self-reports of carrying a weapon and attacking someone with the intent to harm in the past 12 months. In both surveys, about 15.0% of students reported carrying a weapon and about 7.0% reported attacking someone with intent to harm in the past 12 months, with higher rates among boys than girls. There was no change over time in the rates of students carrying weapons or attacking someone with the intent to harm, after controlling for demographic variables. In contrast to media portrayals and reported trends in violent offences, rates of students carrying weapons and attacking others with intent to harm have not changed between 1999 and 2009. These findings underline the importance of having national population-based data to regularly monitor the rates of these and related behaviours among young Australians.

  10. Estimating the attack rate of pregnancy-associated listeriosis during a large outbreak.

    PubMed

    Imanishi, Maho; Routh, Janell A; Klaber, Marigny; Gu, Weidong; Vanselow, Michelle S; Jackson, Kelly A; Sullivan-Chang, Loretta; Heinrichs, Gretchen; Jain, Neena; Albanese, Bernadette; Callaghan, William M; Mahon, Barbara E; Silk, Benjamin J

    2015-01-01

    In 2011, a multistate outbreak of listeriosis linked to contaminated cantaloupes raised concerns that many pregnant women might have been exposed to Listeria monocytogenes. Listeriosis during pregnancy can cause fetal death, premature delivery, and neonatal sepsis and meningitis. Little information is available to guide healthcare providers who care for asymptomatic pregnant women with suspected L. monocytogenes exposure. We tracked pregnancy-associated listeriosis cases using reportable diseases surveillance and enhanced surveillance for fetal death using vital records and inpatient fetal deaths data in Colorado. We surveyed 1,060 pregnant women about symptoms and exposures. We developed three methods to estimate how many pregnant women in Colorado ate the implicated cantaloupes, and we calculated attack rates. One laboratory-confirmed case of listeriosis was associated with pregnancy. The fetal death rate did not increase significantly compared to preoutbreak periods. Approximately 6,500-12,000 pregnant women in Colorado might have eaten the contaminated cantaloupes, an attack rate of ~1 per 10,000 exposed pregnant women. Despite many exposures, the risk of pregnancy-associated listeriosis was low. Our methods for estimating attack rates may help during future outbreaks and product recalls. Our findings offer relevant considerations for management of asymptomatic pregnant women with possible L. monocytogenes exposure.

  11. Do burns increase the severity of terror injuries?

    PubMed

    Peleg, Kobi; Liran, Alon; Tessone, Ariel; Givon, Adi; Orenstein, Arie; Haik, Josef

    2008-01-01

    The use of explosives and suicide bombings has become more frequent since October 2000. This change in the nature of terror attacks has marked a new era in the Israeli-Palestinian conflict. We previously reported that the incidence of thermal injuries has since risen. However, the rise in the incidence of burns among victims of terror was proportionate to the rise in the incidence of burns among all trauma victims. This paper presents data from the Israeli National Trauma Registry during the years 1997--2003, to compare the severity of injuries and outcome (mortality rates) in terror victims with and without burn injuries. We also compare the severity of injuries and outcome (mortality rates) for patients with terror-attack related burns to non terror-attack related burns during the same period. Data was obtained from the Israeli National Trauma Registry for all patients admitted to 8 to 10 hospitals in Israel between 1997 and 2003. We analyzed and compared demographic and clinical characteristics of 219 terror-related burn patients (terror/burn), 2228 terror patients with no associated burns (Terror/no-burn) and 6546 non terror related burn patients (burn/no-terror). Severity of injuries was measured using the injury severity score, and burn severity by total body surface percentage indices. Admission rates to Intensive Care Units (ICU) and total length of hospitalization were also used to measure severity of injuries. In-hospital mortality rates were used to indicate outcome. Of burn/terror patients, 87.2% suffered other accompanying injuries, compared with 10.4% of burn/no-terror patients. Of burn/terror patients, 49.8% were admitted to ICU compared with only 11.9% of burn/no-terror patients and 23.8% of no-burn/terror patients. Mean length of hospital stay was 18.5 days for the terror/burn group compared with 11.1 days for the burn/no-terror group and 9.5 days for the terror/no-burn group. Burn/terror patients had a significantly higher injury severity score compared with the other groups. In-hospital mortality rate for the burn/no-terror group was 3.4%. The burn/terror group had a mortality rate of 6.4% which was similar to the no-burn/terror group (6.6%). Terror-attack injuries with accompanying burns have a more complex presentation, are of higher severity, and are associated with increased length of hospital stay and a higher ICU admissions rate, compared with terror-attack injuries without burns and non terror-attack related burns. However, mortality rates in terror-attack injuries are not affected by burns.

  12. Effect of bark beetle (Ips typographus L.) attack on bark VOC emissions of Norway spruce (Picea abies Karst.) trees

    NASA Astrophysics Data System (ADS)

    Ghimire, Rajendra P.; Kivimäenpää, Minna; Blomqvist, Minna; Holopainen, Toini; Lyytikäinen-Saarenmaa, Päivi; Holopainen, Jarmo K.

    2016-02-01

    Climate warming driven storms are evident causes for an outbreak of the European spruce bark beetle (Ips typographus L.) resulting in the serious destruction of mature Norway spruce (Picea abies Karst.) forests in northern Europe. Conifer species are major sources of biogenic volatile organic compounds (BVOCs) in the boreal zone. Climate relevant BVOC emissions are expected to increase when conifer trees defend against bark beetle attack by monoterpene (MT)-rich resin flow. In this study, BVOC emission rates from the bark surface of beetle-attacked and non-attacked spruce trees were measured from two outbreak areas, Iitti and Lahti in southern Finland, and from one control site at Kuopio in central Finland. Beetle attack increased emissions of total MTs 20-fold at Iitti compared to Kuopio, but decreased the emissions of several sesquiterpenes (SQTs) at Iitti. At the Lahti site, the emission rate of α-pinene was positively correlated with mean trap catch of bark beetles. The responsive individual MTs were tricyclene, α-pinene, camphene, myrcene, limonene, 1,8-cineole and bornyl acetate in both of the outbreak areas. Our results suggest that bark beetle outbreaks affect local BVOC emissions from conifer forests dominated by Norway spruce. Therefore, the impacts of insect outbreaks are worth of consideration to global BVOC emission models.

  13. Quantum key distribution using continuous-variable non-Gaussian states

    NASA Astrophysics Data System (ADS)

    Borelli, L. F. M.; Aguiar, L. S.; Roversi, J. A.; Vidiella-Barranco, A.

    2016-02-01

    In this work, we present a quantum key distribution protocol using continuous-variable non-Gaussian states, homodyne detection and post-selection. The employed signal states are the photon added then subtracted coherent states (PASCS) in which one photon is added and subsequently one photon is subtracted from the field. We analyze the performance of our protocol, compared with a coherent state-based protocol, for two different attacks that could be carried out by the eavesdropper (Eve). We calculate the secret key rate transmission in a lossy line for a superior channel (beam-splitter) attack, and we show that we may increase the secret key generation rate by using the non-Gaussian PASCS rather than coherent states. We also consider the simultaneous quadrature measurement (intercept-resend) attack, and we show that the efficiency of Eve's attack is substantially reduced if PASCS are used as signal states.

  14. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  15. Blood B-type natriuretic peptide level increases in patients who complain shortness of breath and chest pain in the course of panic attack.

    PubMed

    Vural, Mutlu; Akbas, Befru; Acer, Mehmet; Karabay, Ocal

    2007-04-25

    Blood pro-B-type natriuretic peptide (pro-BNP) level increases in case of myocardial ischemia and myocardial volume or pressure overload. The aim of this study is to measure changes in blood pro-BNP level during the course of panic attack with symptoms of chest pain and/or dyspnea. Patients who were admitted to the emergency room with panic attack have been regarded as the study group. Blood pro-BNP level has been measured during follow-up of the patients upon admission and 2h later. Systolic and diastolic blood pressure and pulse rate were significantly decreased (p<0.0001) during follow-up of the patients (ages between 18 and 43 years; mean 26+/-6.13 years). Paradoxically, blood pro-BNP level of patients was significantly increased during the same period (52.86+/-59.73 versus 50.97+/-57.42 U/L; p<0.0001). Blood pro-BNP level has increased among patients who have complained chest pain and/or dyspnea as symptoms of panic attack. It is thought that chest pain and dyspnea in the course of panic attack may not be purely psychological.

  16. Flowing water affects fish fast-starts: escape performance of the Hawaiian stream goby, Sicyopterus stimpsoni.

    PubMed

    Diamond, Kelly M; Schoenfuss, Heiko L; Walker, Jeffrey A; Blob, Richard W

    2016-10-01

    Experimental measurements of escape performance in fishes have typically been conducted in still water; however, many fishes inhabit environments with flow that could impact escape behavior. We examined the influences of flow and predator attack direction on the escape behavior of fish, using juveniles of the amphidromous Hawaiian goby Sicyopterus stimpsoni In nature, these fish must escape ambush predation while moving through streams with high-velocity flow. We measured the escape performance of juvenile gobies while exposing them to a range of water velocities encountered in natural streams and stimulating fish from three different directions. Frequency of response across treatments indicated strong effects of flow conditions and attack direction. Juvenile S. stimpsoni had uniformly high response rates for attacks from a caudal direction (opposite flow); however, response rates for attacks from a cranial direction (matching flow) decreased dramatically as flow speed increased. Mechanical stimuli produced by predators attacking in the same direction as flow might be masked by the flow environment, impairing the ability of prey to detect attacks. Thus, the likelihood of successful escape performance in fishes can depend critically on environmental context. © 2016. Published by The Company of Biologists Ltd.

  17. Stall induced instability of a teetered rotor

    NASA Astrophysics Data System (ADS)

    Glasgow, J. C.; Corrigan, R. D.

    Recent tests on the 38m Mod-0 horizontal experimental wind turbine yielded quantitative information on stall induced instability of a teetered rotor. Tests were conducted on rotor blades with NACA 230 series and NACA 643-618 airfoils at low rotor speeds to produce high angles of attack at relatively low wind speeds and power levels. The behavior of the rotor shows good agreement with predicted rotor response based on blade angle of attack calculations and airfoil section properties. The untwisted blades with the 64 series airfoil sections had a slower rate of onset of rotor instability when compared with the twisted 230 series blades, but high teeter angles and teeter stop impacts were experienced with both rotors as wind speeds increased to produce high angles of attack on the outboard portion of the blade. The relative importance of blade twist and airfoil section stall characteristics on the rate of onset of rotor unstability with increasing wind speed was not established however. Blade pitch was shown to be effective in eliminating rotor instability at the expense of some loss in rotor performance near rated wind speed.

  18. Estimating the Attack Rate of Pregnancy-Associated Listeriosis during a Large Outbreak

    PubMed Central

    Imanishi, Maho; Routh, Janell A.; Klaber, Marigny; Gu, Weidong; Vanselow, Michelle S.; Jackson, Kelly A.; Sullivan-Chang, Loretta; Heinrichs, Gretchen; Jain, Neena; Albanese, Bernadette; Callaghan, William M.; Mahon, Barbara E.; Silk, Benjamin J.

    2015-01-01

    Background. In 2011, a multistate outbreak of listeriosis linked to contaminated cantaloupes raised concerns that many pregnant women might have been exposed to Listeria monocytogenes. Listeriosis during pregnancy can cause fetal death, premature delivery, and neonatal sepsis and meningitis. Little information is available to guide healthcare providers who care for asymptomatic pregnant women with suspected L. monocytogenes exposure. Methods. We tracked pregnancy-associated listeriosis cases using reportable diseases surveillance and enhanced surveillance for fetal death using vital records and inpatient fetal deaths data in Colorado. We surveyed 1,060 pregnant women about symptoms and exposures. We developed three methods to estimate how many pregnant women in Colorado ate the implicated cantaloupes, and we calculated attack rates. Results. One laboratory-confirmed case of listeriosis was associated with pregnancy. The fetal death rate did not increase significantly compared to preoutbreak periods. Approximately 6,500–12,000 pregnant women in Colorado might have eaten the contaminated cantaloupes, an attack rate of ~1 per 10,000 exposed pregnant women. Conclusions. Despite many exposures, the risk of pregnancy-associated listeriosis was low. Our methods for estimating attack rates may help during future outbreaks and product recalls. Our findings offer relevant considerations for management of asymptomatic pregnant women with possible L. monocytogenes exposure. PMID:25784782

  19. Influence of the Angle of Attack on the Aerothermodynamics of the Mars Science Laboratory

    NASA Technical Reports Server (NTRS)

    Dyakonov, Artem A.; Edquist, Karl T.; Schoenenberger, Mark

    2006-01-01

    An investigation of the effects of the incidence angle on the aerothermodynamic environments of the Mars Science Laboratory has been conducted. Flight conditions of peak heating, peak deceleration and chute deploy are selected and the effects of the angle of attack on the aerodynamics and aerothermodynamics are analyzed. The investigation found that static aerodynamics are well behaved within the considered range of incidence angles. Leeside laminar and turbulent computed heating rates decrease with incidence, despite the increase in the leeside running length. Stagnation point was found to stay on the conical flank at all angles of attack, and this is linked to the rapid flow expansion around the shoulder. Hypersonic lift to drag ratio is limited by the heating rates in the region of the windside shoulder. The effects of the high angle of incidence on the dynamic aero at low Mach remains to be determined. Influence of the angle of attack on the smooth-wall transition parameter indicates, that higher angle of attack flight may result in delayed turbulence onset, however, a coupled analysis, involving flight trajectory simulation is necessary.

  20. High angle of attack flying qualities criteria for longitudinal rate command systems

    NASA Technical Reports Server (NTRS)

    Wilson, David J.; Citurs, Kevin D.; Davidson, John B.

    1994-01-01

    This study was designed to investigate flying qualities requirements of alternate pitch command systems for fighter aircraft at high angle of attack. Flying qualities design guidelines have already been developed for angle of attack command systems at 30, 45, and 60 degrees angle of attack, so this research fills a similar need for rate command systems. Flying qualities tasks that require post-stall maneuvering were tested during piloted simulations in the McDonnell Douglas Aerospace Manned Air Combat Simulation facility. A generic fighter aircraft model was used to test angle of attack rate and pitch rate command systems for longitudinal gross acquisition and tracking tasks at high angle of attack. A wide range of longitudinal dynamic variations were tested at 30, 45, and 60 degrees angle of attack. Pilot comments, Cooper-Harper ratings, and pilot induced oscillation ratings were taken from five pilots from NASA, USN, CAF, and McDonnell Douglas Aerospace. This data was used to form longitudinal design guidelines for rate command systems at high angle of attack. These criteria provide control law design guidance for fighter aircraft at high angle of attack, low speed flight conditions. Additional time history analyses were conducted using the longitudinal gross acquisition data to look at potential agility measures of merit and correlate agility usage to flying qualities boundaries. This paper presents an overview of this research.

  1. Flight Test Techniques for Quantifying Pitch Rate and Angle of Attack Rate Dependencies

    NASA Technical Reports Server (NTRS)

    Grauer, Jared A.; Morelli, Eugene A.; Murri, Daniel G.

    2017-01-01

    Three different types of maneuvers were designed to separately quantify pitch rate and angle of attack rate contributions to the nondimensional aerodynamic pitching moment coefficient. These maneuvers combined pilot inputs and automatic multisine excitations, and were own with the subscale T-2 and Bat-4 airplanes using the NASA AirSTAR flight test facility. Stability and control derivatives, in particular C(sub mq) and C(sub m alpha(.)) were accurately estimated from the flight test data. These maneuvers can be performed with many types of aircraft, and the results can be used to increase simulation prediction fidelity and facilitate more accurate comparisons with wind tunnel experiments or numerical investigations.

  2. Mountain pine beetle attack in ponderosa pine: Comparing methods for rating susceptibility

    Treesearch

    David C. Chojnacky; Barbara J. Bentz; Jesse A. Logan

    2000-01-01

    Two empirical methods for rating susceptibility of mountain pine beetle attack in ponderosa pine were evaluated. The methods were compared to stand data modeled to objectively rate each sampled stand for susceptibly to bark-beetle attack. Data on bark-beetle attacks, from a survey of 45 sites throughout the Colorado Plateau, were modeled using logistic regression to...

  3. Effect of 11 September 2001 terrorist attacks in the USA on suicide in areas surrounding the crash sites.

    PubMed

    Claassen, Cynthia A; Carmody, Thomas; Stewart, Sunita M; Bossarte, Robert M; Larkin, Gregory L; Woodward, Wayne A; Trivedi, Madhukar H

    2010-05-01

    The terrorist attacks in the USA on 11 September 2001 affected suicide rates in two European countries, whereas overall US rates remained stable. The effect on attack site rates, however, has not been studied. To examine post-attack suicide rates in areas surrounding the three airline crash sites. Daily mortality rates were modelled using time series techniques. Where rate change was significant, both duration and geographic scope were analysed. Around the World Trade Center, post-attack 180-day rates dropped significantly (t = 2.4, P = 0.0046), whereas comparison condition rates remained stable. No change was observed for Pentagon or Flight 93 crash sites. The differential effect by site suggests that proximity may be less important that other event characteristics. Both temporal and geographic aspects of rate fluctuation after sentinel events appear measurable and further analyses may contribute valuable knowledge about how sociological forces affect these rates.

  4. Stage-structured infection transmission and a spatial epidemic: a model for Lyme disease.

    PubMed

    Caraco, Thomas; Glavanakov, Stephan; Chen, Gang; Flaherty, Joseph E; Ohsumi, Toshiro K; Szymanski, Boleslaw K

    2002-09-01

    A greater understanding of the rate at which emerging disease advances spatially has both ecological and applied significance. Analyzing the spread of vector-borne disease can be relatively complex when the vector's acquisition of a pathogen and subsequent transmission to a host occur in different life stages. A contemporary example is Lyme disease. A long-lived tick vector acquires infection during the larval blood meal and transmits it as a nymph. We present a reaction-diffusion model for the ecological dynamics governing the velocity of the current epidemic's spread. We find that the equilibrium density of infectious tick nymphs (hence the risk of human disease) can depend on density-independent survival interacting with biotic effects on the tick's stage structure. The local risk of infection reaches a maximum at an intermediate level of adult tick mortality and at an intermediate rate of juvenile tick attacks on mammalian hosts. If the juvenile tick attack rate is low, an increase generates both a greater density of infectious nymphs and an increased spatial velocity. However, if the juvenile attack rate is relatively high, nymph density may decline while the epidemic's velocity still increases. Velocities of simulated two-dimensional epidemics correlate with the model pathogen's basic reproductive number (R0), but calculating R0 involves parameters of both host infection dynamics and the vector's stage-structured dynamics.

  5. How clarinettists articulate: The effect of blowing pressure and tonguing on initial and final transients.

    PubMed

    Li, Weicong; Almeida, André; Smith, John; Wolfe, Joe

    2016-02-01

    Articulation, including initial and final note transients, is important to tasteful music performance. Clarinettists' tongue-reed contact, the time variation of the blowing pressure P¯mouth, the mouthpiece pressure, the pressure in the instrument bore, and the radiated sound were measured for normal articulation, accents, sforzando, staccato, and for minimal attack, i.e., notes started very softly. All attacks include a phase when the amplitude of the fundamental increases exponentially, with rates r ∼1000 dB s(-1) controlled by varying both the rate of increase in P¯mouth and the timing of tongue release during this increase. Accented and sforzando notes have shorter attacks (r∼1300 dB s(-1)) than normal notes. P¯mouth reaches a higher peak value for accented and sforzando notes, followed by a steady decrease for accented notes or a rapid fall to a lower, nearly steady value for sforzando notes. Staccato notes are usually terminated by tongue contact, producing an exponential decrease in sound pressure with rates similar to those calculated from the bandwidths of the bore resonances: ∼400 dB s(-1). In all other cases, notes are stopped by decreasing P¯mouth. Notes played with different dynamics are qualitatively similar, but louder notes have larger P¯mouth and larger r.

  6. Pandemic influenza-implications for critical care resources in Australia and New Zealand.

    PubMed

    Anderson, Therese A; Hart, Graeme K; Kainer, Marion A

    2003-09-01

    To quantify resource requirements (additional beds and ventilator capacity), for critical care services in the event of pandemic influenza. Cross-sectional survey about existing and potential critical care resources. Participants comprised 156 of the 176 Australasian (Australia and New Zealand) critical care units on the database of the Australian and New Zealand Intensive Care Society (ANZICS) Research Centre for Critical Care Resources. The Meltzer, Cox and Fukuda model was adapted to map a range of influenza attack rate estimates for hospitalisation and episodes likely to require intensive care and to predict critical care admission rates and bed day requirements. Estimations of ventilation rates were based on those for community-acquired pneumonia. The estimated extra number of persons requiring hospitalisation ranged from 8,455 (10% attack rate) to 150,087 (45% attack rate). The estimated number of additional admissions to critical care units ranged from 423 (5% admission rate, 10% attack rate) to 37,522 (25% admission rate, 45% attack rate). The potential number of required intensive care bed days ranged from 846 bed days (2 day length of stay, 10% attack rate) to 375,220 bed days (10 day length of stay, 45% attack rate). The number of persons likely to require mechanical ventilation ranged from 106 (25% of projected critical care admissions, 10% attack rate) to 28,142 (75% of projected critical care admissions, 45% attack rate). An additional 1,195 emergency ventilator beds were identified in public sector and 248 in private sector hospitals. Cancellation of elective surgery could release a potential 76,402 intensive care bed days (per annum), but in the event of pandemic influenza, 31,150 bed days could be required over an 8- to 12-week period. Australasian critical care services would be overwhelmed in the event of pandemic influenza. More work is required in relation to modelling, contingency plans, and resource allocation.

  7. Air pollution sources and childhood asthma attacks in Catano, Puerto Rico.

    PubMed

    Loyo-Berríos, Nilsa I; Irizarry, Rafael; Hennessey, Joseph G; Tao, Xuguang Grant; Matanoski, Genevieve

    2007-04-15

    Asthma prevalence in the Cataño Air Basin of Puerto Rico is 27% for children aged 13-14 years and 45% for children aged 5-6 years. There is concern that these rates are related to air pollution. The authors conducted a nested case-control study to evaluate whether proximity to air pollution point sources was associated with increased risk of asthma attacks. For 1997-2001, 1,382 asthma-related medical visits (International Classification of Diseases, Ninth Revision, codes 493 and 493.9) in children under 17 were identified through health insurance claims. Controls were children with no asthma attacks who were randomly selected from enrollees in two health insurance companies by incidence density sampling (1:5) and matched to cases on gender, age, insurance company, and event date. The distance from a point source to the subject's residence area represented a surrogate exposure measurement. Odds ratios for a 1-km decrease in distance were obtained by conditional logistic regression. Risk of asthma attack was associated with residing near a grain mill (odds ratio (OR) = 1.35), petroleum refinery (OR = 1.44), asphalt plant (OR = 1.23), or power plant (OR = 1.28) (all p's < 0.05). Residence near major air emissions sources (>100 tons/year) increased asthma attack risk by 108% (p < 0.05). These results showed that proximity to some air pollution sources is associated with increased risks of asthma attacks.

  8. Improved statistical analysis of moclobemide dose effects on panic disorder treatment.

    PubMed

    Ross, Donald C; Klein, Donald F; Uhlenhuth, E H

    2010-04-01

    Clinical trials with several measurement occasions are frequently analyzed using only the last available observation as the dependent variable [last observation carried forward (LOCF)]. This ignores intermediate observations. We reanalyze, with complete data methods, a clinical trial previously reported using LOCF, comparing placebo and five dosage levels of moclobemide in the treatment of outpatients with panic disorder to illustrate the superiority of methods using repeated observations. We initially analyzed unprovoked and situational, major and minor attacks as the four dependent variables, by repeated measures maximum likelihood methods. The model included parameters for linear and curvilinear time trends and regression of measures during treatment on baseline measures. Significance tests using this method take into account the structure of the error covariance matrix. This makes the sphericity assumption irrelevant. Missingness is assumed to be unrelated to eventual outcome and the residuals are assumed to have a multivariate normal distribution. No differential treatment effects for limited attacks were found. Since similar results were obtained for both types of major attack, data for the two types of major attack were combined. Overall downward linear and negatively accelerated downward curvilinear time trends were found. There were highly significant treatment differences in the regression slopes of scores during treatment on baseline observations. For major attacks, all treatment groups improved over time. The flatter regression slopes, obtained with higher doses, indicated that higher doses result in uniformly lower attack rates regardless of initial severity. Lower doses do not lower the attack rate of severely ill patients to those achieved in the less severely ill. The clinical implication is that more severe patients require higher doses to attain best benefit. Further, the significance levels obtained by LOCF analyses were only in the 0.05-0.01 range, while significance levels of <0.00001 were obtained by these repeated measures analyses indicating increased power. The greater sensitivity to treatment effect of this complete data method is illustrated. To increase power, it is often recommended to increase sample size. However, this is often impractical since a major proportion of the cost per subject is due to the initial evaluation. Increasing the number of repeated observations increases power economically and also allows detailed longitudinal trajectory analyses.

  9. 3-Methylcyclohex-2-en-1-one for area and individual tree protection against spruce beetle (Coleoptera: Curculionidae: Scolytinae) attack in the southern Rocky Mountains.

    PubMed

    Hansen, E Matthew; Munson, A Steven; Blackford, Darren C; Graves, Andrew D; Coleman, Tom W; Baggett, L Scott

    2017-10-01

    We tested 3-methylcyclohex-2-en-1-one (MCH) and an Acer kairomone blend (AKB) as repellent semiochemicals for area and single tree protection to prevent spruce beetle (Dendroctonus rufipennis Kirby) attacks at locations in Utah and New Mexico. In the area protection study, we compared host infestation rates of MCH applications at three densities (20, 40, and 80 g MCH ha-1) against a control treatment over 0.64 ha plots centered within ~1.25 ha treatment blocks. All treatments included two baited funnel traps within the plot to assure spruce beetle pressure. Following beetle attack, plots were surveyed for new spruce beetle attacks and to quantify stand characteristics. The probability of more severe spruce beetle attacks was significantly reduced, by ~50%, in each of the MCH area treatments compared with the control treatment but there was no significant treatment difference among the MCH deployment densities. For the single tree protection study, we compared attack rates of MCH, Acer kairomone blend (AKB), and MCH plus AKB on spruce beetle-baited trees against bait-only trees. Each treatment was applied over a range of host diameters to test for host size effects. Seventy-five percent of control trees were mass-attacked, about one-third of MCH- and AKB-alone spruce was mass-attacked, and no MCH plus AKB spruce were mass-attacked. These results suggest that MCH alone is a marginal area and single tree protectant against spruce beetle but that deployment with other repellents can significantly increase treatment efficacy. Published by Oxford University Press on behalf of Entomological Society of America 2017. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  10. Two of a kind? Differences and similarities of attacks in schools and in institutes of higher education.

    PubMed

    Bondü, Rebecca; Beier, Sophia

    2015-01-01

    School attacks are attracting increasing attention in aggression research. Recent systematic analyses provided new insights into offense and offender characteristics. Less is known about attacks in institutes of higher education (e.g., universities). It is therefore questionable whether the term "school attack" should be limited to institutions of general education or could be extended to institutions of higher education. Scientific literature is divided in distinguishing or unifying these two groups and reports similarities as well as differences. We researched 232 school attacks and 45 attacks in institutes of higher education throughout the world and conducted systematic comparisons between the two groups. The analyses yielded differences in offender (e.g., age, migration background) and offense characteristics (e.g., weapons, suicide rates), and some similarities (e.g., gender). Most differences can apparently be accounted for by offenders' age and situational influences. We discuss the implications of our findings for future research and the development of preventative measures. © The Author(s) 2014.

  11. Temporal variation in black-caiman-nest predation in varzea of central Brazilian amazonia

    PubMed Central

    2017-01-01

    On the Amazon floodplain, the main predators of black caiman (Melanosuchus niger) eggs are jaguars (Panthera onca), tegu lizards (Tupinambis teguixim), capuchin monkeys (Sapajus macrocephalus) and humans (Homo sapiens). In this study, we investigated the relationship between predator attacks on nests and incubation period, and evaluated the influence of initial predation on subsequent predation in the Mamirauá Sustainable Development Reserve. We also evaluated the influence of presence of females near the nests and manipulation of nests on the occurrence of attacks. We compared results from data obtained with camera traps and vestiges left by predators on estimates of rates of predation by different predators. Egg predation was recorded in 32% of the 658 black caiman nests monitored during two years. Our results suggest that the probability of predation on black caiman eggs is relatively constant throughout the incubation period and that predation on eggs was lower when adults, presumably females, were present. Careful opening of nests and handling of eggs did not increase the number of attacks on black caiman nests. Nest opening by a predator appeared to increase the chances of a subsequent attack because most of the attacks on nests occurred soon after a predator first opened the nest. However, attacks by another species of predator do not appear to be necessary to initiate attacks by any other species of predator. Results based on camera traps and vestiges differed, but use of vestiges was adequate for identifying the principal predators on eggs in black caiman nests and, in many circumstances, the vestiges may be better for estimating predation by humans. In this study, opening nests and handling eggs did not increase the number of attacks on black caiman nests. PMID:28854258

  12. Temporal variation in black-caiman-nest predation in varzea of central Brazilian amazonia.

    PubMed

    Torralvo, Kelly; Botero-Arias, Robinson; Magnusson, William E

    2017-01-01

    On the Amazon floodplain, the main predators of black caiman (Melanosuchus niger) eggs are jaguars (Panthera onca), tegu lizards (Tupinambis teguixim), capuchin monkeys (Sapajus macrocephalus) and humans (Homo sapiens). In this study, we investigated the relationship between predator attacks on nests and incubation period, and evaluated the influence of initial predation on subsequent predation in the Mamirauá Sustainable Development Reserve. We also evaluated the influence of presence of females near the nests and manipulation of nests on the occurrence of attacks. We compared results from data obtained with camera traps and vestiges left by predators on estimates of rates of predation by different predators. Egg predation was recorded in 32% of the 658 black caiman nests monitored during two years. Our results suggest that the probability of predation on black caiman eggs is relatively constant throughout the incubation period and that predation on eggs was lower when adults, presumably females, were present. Careful opening of nests and handling of eggs did not increase the number of attacks on black caiman nests. Nest opening by a predator appeared to increase the chances of a subsequent attack because most of the attacks on nests occurred soon after a predator first opened the nest. However, attacks by another species of predator do not appear to be necessary to initiate attacks by any other species of predator. Results based on camera traps and vestiges differed, but use of vestiges was adequate for identifying the principal predators on eggs in black caiman nests and, in many circumstances, the vestiges may be better for estimating predation by humans. In this study, opening nests and handling eggs did not increase the number of attacks on black caiman nests.

  13. Investigation of the Low-Subsonic Stability and Control Characteristics of a Free-Flying Model of a Thick 70 deg Delta Reentry Configuration

    NASA Technical Reports Server (NTRS)

    Paulson, John W.; Shanks, Robert E.

    1961-01-01

    An investigation of the low-subsonic flight characteristics of a thick 70 deg delta reentry configuration having a diamond cross section has been made in the Langley full-scale tunnel over an angle-of-attack range from 20 to 45 deg. Flight tests were also made at angles of attack near maximum lift (alpha = 40 deg) with a radio-controlled model dropped from a helicopter. Static and dynamic force tests were made over an angle-of-attack range from 0 to 90 deg. The longitudinal stability and control characteristics were considered satisfactory when the model had positive static longitudinal stability. It was possible to fly the model with a small amount of static instability, but the longitudinal characteristics were considered unsatisfactory in this condition. At angles of attack above the stall the model developed a large, constant-amplitude pitching oscillation. The lateral stability characteristics were considered to be only fair at angles of attack from about 20 to 35 deg because of a lightly damped Dutch roll oscillation. At higher angles of attack the oscillation was well damped and the lateral stability was generally satisfactory. The Dutch roll damping at the lower angles of attack was increased to satisfactory values by means of a simple rate-type roll damper. The lateral control characteristics were generally satisfactory throughout the angle- of-attack range, but there was some deterioration in aileron effectiveness in the high angle-of-attack range due mainly to a large increase in damping in roll.

  14. Wind-Tunnel Investigation of the Low-Speed Static Stability and Control Characteristics of a Model of the Bell MX-776 (RASCAL) in Combined Angle of Attack and Sideslip

    NASA Technical Reports Server (NTRS)

    Letko, William

    1949-01-01

    An investigation has been made in the Langley stability tunnel to determine the low-speed static stability and control characteristics of a model of the Bell MX-776. The results show the model to be longitudinally unstable in the angle-of-attack range around zero angle of attack and to become stable at moderate angles of attack. The results of the present investigation agree reasonably well with results obtained in other facilities at low speed. The present pitching-moment results at low Mach numbers also agree reasonably well with unpublished results of tests of the model at supersonic Mach numbers (up to Mach number 1.86). Unpublished results at moderate and high subsonic speeds, however, indicate considerably greater instability at low angles of attack than is indicated by low-speed results. The results of the present tests also showed that the pitching-moment coefficients for angles of attack up to 12deg remained fairly constant with sideslip angle up to 12deg. The elevators tested produced relatively large pitching moments at zero angle of attack but, as the angle of attack was increased, the elevator effectiveness decreased. The rate of decrease of elevator effectiveness with angle of attack was less for 8deg than for 20deg elevator deflection. Therefore although 8deg deflection caused an appreciable change in longitudinal trim angle and trim lift coefficient a deflection of 20deg caused only a small additional increase in trim angle and trim lift coefficient.

  15. Bioterriorism: from threat to reality.

    PubMed

    Atlas, Ronald M

    2002-01-01

    The fears and predictions of attacks with biological weapons, which were increasing at the close of the twentieth century, were transformed into reality not long after September 11, 2001, when several anthrax-laden letters were sent through the U.S. postal system. The attack challenged our medical preparedness and scientific understanding of the epidemiology of biothreat agents. It is fortunate that this was not a massive aerosol release that could have exposed hundreds of thousands. Rapid diagnoses and medical treatments limited casualties and increased survival rates, but tragically some individuals died of inhalational anthrax. Even as physicians tested new treatment regimes and scientists employed new ways of detecting anthrax and decontaminating the mail, new predictions were made for potentially even more devastating attacks with anthrax, smallpox, plague, tularemia, botulism, or hemorrhagic fever viruses. Fear gripped the nation. Law enforcement sought to find the villain(s) who sent the anthrax letters and to deter future bioterrorist attacks. The biomedical community began to seek new ways of protecting against such future threats of bioterrorism.

  16. Attack Rates of Norovirus and Campylobacter Food Poisonings that Cannot Be Represented by Numeric Constant but by Plotting the Attack Rate against the Number of Patients per Incident in Cartesian Coordinates.

    PubMed

    Yoshikura, Hiroshi; Takeuchi, Fumihiko

    2017-11-22

    In norovirus and Campylobacter food poisonings, the frequencies of the number of patients per incident and that of the number of eaters per incident followed a lognormal distribution, with medians of 12-27 and 23-48 for norovirus and 5-8 and 9-21 for Campylobacter food poisonings, respectively. The lognormal frequency distribution of eaters could be simulated by assuming that people find a dish more appealing if that dish has already been found to be appealing to others. The numbers of patients and eaters per incident were not necessarily inter-correlated; the frequencies of the attack rates (number of patients/number of eaters) were distributed evenly from 0.01 to 1; that is, the attack rates of these food poisonings could not be represented by means and standard deviations. The frequency distributions of the attack rates were nevertheless not entirely disordered; plotting the attack rate against the number of patients in individual incidents produced fingerprint-like patterns that were repeatedly produced at the prefectural and national levels.

  17. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Hong-Wei; Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004; Wang, Shuang

    2011-12-15

    It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost ofmore » only increasing the quantum bit error rate from 1.3 to 1.4%.« less

  18. Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System.

    PubMed

    Ghanti, Shaila; Naik, G M

    2016-01-01

    Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack.

  19. Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System

    PubMed Central

    Ghanti, Shaila

    2016-01-01

    Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack. PMID:28116350

  20. Fecal-orally transmitted diseases among travelers are decreasing due to better hygienic standards at travel destination.

    PubMed

    Baaten, Gijs G; Sonder, Gerard J B; Van Der Loeff, Maarten F Schim; Coutinho, Roel A; Van Den Hoek, Anneke

    2010-01-01

    To evaluate whether changes in attack rates of fecal-orally transmitted diseases among travelers are related to changes in pretravel vaccination practices or better hygienic standards at travel destination. National surveillance data on all laboratory-confirmed cases of travel-related hepatitis A, shigellosis, and typhoid fever diagnosed in the Netherlands from 1995 to 2006 were matched with the number of Dutch travelers to developing countries to calculate region-specific annual attack rates. Trends in attack rates of non-vaccine-preventable shigellosis were compared with those of vaccine-preventable hepatitis A and typhoid fever. Trends were also compared with three markers for hygienic standards of the local population at travel destinations, drawn from the United Nations Development Programme database: the human development index, the sanitation index, and the water source index. Attack rates among Dutch travelers to developing regions declined for hepatitis A, shigellosis, and typhoid fever. Region-specific trends in attack rates of shigellosis resembled trends of hepatitis A and typhoid fever. Declining attack rates of the three fecal-orally transmitted diseases correlated with improvements in socioeconomic, sanitary, and water supply conditions of the local population at travel destination. These findings suggest that improved hygienic standards at travel destination strongly contributed to the overall decline in attack rates of fecal-orally transmitted diseases among visiting travelers. © 2010 International Society of Travel Medicine.

  1. Retrospective evaluation of coyote attacks in dogs: 154 cases (1997-2012).

    PubMed

    Frauenthal, Virginia M; Bergman, Philip; Murtaugh, Robert J

    2017-05-01

    To describe the clinical presentation and outcome of known attacks in client-owned dogs caused by the common coyote, Canis latrans. Retrospective observational study. Private referral hospital. One hundred fifty-four client-owned dogs known to be attacked by coyotes. None. Records from a private referral hospital from May 1997 through December 2012 were reviewed. Time of day and month/season of year, signalment, body temperature, heart rate, respiratory rate, body weight, location and severity of wounds inflicted, common injuries, length of hospitalization, necessity of surgical wound repair under anesthesia, antimicrobial use and mortality were recorded. Eighty-six percent of dogs presenting following coyote attack weighed <10 kg. Overall mortality rate was 15.6%. Dogs with bite wounds to the thorax had the highest mortality at 21.3%. Criteria for systemic inflammatory response syndrome (SIRS) based on admission vital signs were met in 58.8% of dogs and the presence of SIRS was significantly associated with mortality (P < 0.001). Common coyote-induced injuries included rib fracture (38/154; 24.6%), pulmonary contusion (30/154; 19.4%), tracheal tear (18/154; 11.6%), pneumothorax (16/154; 10.3%), abdominal wall hernia (9/154; 5.8%), and abdominal penetrating wounds (8/146; 5.5%). Dogs <10 kg were significantly more likely to incur wounds to multiple body parts or sustain abdominal penetrating wounds. The presence of rib fracture was significantly associated with mortality. Frequency of coyote attacks over the time of this study increased by 330%. Coyote attacks on dogs are a problem in Southern California and are associated with substantial morbidity and mortality, especially in dogs with wounds to the thorax. Aggressive management involving surgical wound repair was associated with survival to discharge. © Veterinary Emergency and Critical Care Society 2017.

  2. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    NASA Astrophysics Data System (ADS)

    Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong

    2017-02-01

    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.

  3. Computational Investigation of Tangential Slot Blowing on a Generic Chined Forebody

    NASA Technical Reports Server (NTRS)

    Agosta-Greenman, Roxana M.; Gee, Ken; Cummings, Russell M.; Schiff, Lewis B.

    1995-01-01

    The effect of tangential slot blowing on the flowfield about a generic chined forebody at high angles of attack is investigated numerically using solutions of the thin-layer, Reynolds-averaged, Navier-Stokes equations. The effects of jet mass now ratios, angle of attack, and blowing slot location in the axial and circumferential directions are studied. The computed results compare well with available wind-tunnel experimental data. Computational results show that for a given mass now rate, the yawing moments generated by slot blowing increase as the body angle of attack increases. It is observed that greater changes in the yawing moments are produced by a slot located closest to the lip of the nose. Also, computational solutions show that inboard blowing across the top surface is more effective at generating yawing moments than blowing outboard from the bottom surface.

  4. Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems

    PubMed Central

    Gao, Min; Tian, Renli; Wen, Junhao; Xiong, Qingyu; Ling, Bin; Yang, Linda

    2015-01-01

    In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes. PMID:26267477

  5. Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems.

    PubMed

    Gao, Min; Tian, Renli; Wen, Junhao; Xiong, Qingyu; Ling, Bin; Yang, Linda

    2015-01-01

    In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes.

  6. Mitigation of corrosion attack on carbon steel coated cermet alloy in different anion contents

    NASA Astrophysics Data System (ADS)

    Khalid, Muhamad Azrin Mohd; Ismail, Azzura

    2017-12-01

    This research study evaluated the corrosion mechanism attack on carbon steel coated with cermet alloys (WC-9% Ni) in seawater at different sulphate-to-chloride ratios. The four different sulphate-to-chloride ratios were synthesised with the same seawater salinity of 3.5 % and same pH of real seawater. The corrosion tests involved immersion and electrochemical tests. The immersion test is used to determine the cermet coating ability to withstand the corrosion attack based on different ratios of anions present in the seawater at different periods of immersion. The corrosion attack was characterized by optical and Scanning Electron Microscopy (SEM). The aggressive anions present in the seawater influenced the corrosion attack on the cermet coating. For immersion test, results revealed that increasing sulphate more than chloride, increased the weight loss of cermets. The electrochemistry analysis showed that the passive layer forms on cermet coating prevented the material from further corrosion attack. However, due to its porosity, the passive layer collapsed and exposed the material for other corrosion reaction. For electrochemical test, the result shows that the solution with sulphate-to-chloride ratio of 0.14 (real seawater) has the highest corrosion current and Open Circuit Potential (OCP) compared to other solutions (different sulphate-to-chloride ratio). In conclusion, sulfate and chloride show their competition to attack the cermet coating on carbon steel and the higher the amount of chloride present in seawater, the higher the corrosion rate and pits formed on the cermet coating.

  7. Press touch code: A finger press based screen size independent authentication scheme for smart devices.

    PubMed

    Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z

    2017-01-01

    Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.

  8. Press touch code: A finger press based screen size independent authentication scheme for smart devices

    PubMed Central

    Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.

    2017-01-01

    Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262

  9. Calculation of heat transfer on shuttle type configurations including the effects of variable entropy at boundary layer edge

    NASA Technical Reports Server (NTRS)

    Dejarnette, F. R.

    1972-01-01

    A relatively simple method is presented for including the effect of variable entropy at the boundary-layer edge in a heat transfer method developed previously. For each inviscid surface streamline an approximate shockwave shape is calculated using a modified form of Maslen's method for inviscid axisymmetric flows. The entropy for the streamline at the edge of the boundary layer is determined by equating the mass flux through the shock wave to that inside the boundary layer. Approximations used in this technique allow the heating rates along each inviscid surface streamline to be calculated independent of the other streamlines. The shock standoff distances computed by the present method are found to compare well with those computed by Maslen's asymmetric method. Heating rates are presented for blunted circular and elliptical cones and a typical space shuttle orbiter at angles of attack. Variable entropy effects are found to increase heating rates downstream of the nose significantly higher than those computed using normal-shock entropy, and turbulent heating rates increased more than laminar rates. Effects of Reynolds number and angles of attack are also shown.

  10. Impact of a comprehensive smoke-free law following a partial smoke-free law on incidence of heart attacks at a rural community hospital.

    PubMed

    Johnson, Eric L; Beal, James R

    2013-03-01

    Secondhand smoking (passive smoking) is associated with many negative health effects, primarily respiratory and cardiovascular diseases. Approximately, 46,000 deaths from cardiovascular disease are associated with secondhand smoke exposure annually in the United States, which is roughly 150 deaths in North Dakota. Studies show that passage of smoke-free laws at the community level can reduce the incidence of heart attack. We conducted a retrospective review of electronic medical records of patients admitted for heart attacks 4 months prior (April 15, 2010 through August 14, 2010) to implementation of the smoke-free ordinance and 4 months following (August 15, 2010 through December 14, 2010) implementation of the comprehensive smoke-free ordinance in Grand Forks, ND, United States. We found an association between the heart attack rate and implementation of the comprehensive smoke-free law. The heart attack rate prior to the ban was 0.5% (83/16,702) compared with 0.3% (63/18,513) after the ban (p = .023). Thus, the rate of heart attacks decreased 30.6% and number of heart attack admissions decreased 24.1%, from 83 to 63, after implementation of a comprehensive smoke-free law. We found an implementation of the comprehensive smoke-free law was associated with a decrease in the heart attack rate. The heart attack rate decreased 30.6%. Our finding was similar to previous community level smoke-free law implementation studies and notable for the change going from a partial smoke-free law to a comprehensive smoke-free law.

  11. Action mechanism of tyrosinase on meta- and para-hydroxylated monophenols.

    PubMed

    Fenoll, L G; Rodríguez-López, J N; Varón, R; García-Ruiz, P A; García-Cánovas, F; Tudela, J

    2000-04-01

    The relationship between the structure and activity of meta- and para-hydroxylated monophenols was studied during their tyrosinase-catalysed hydroxylation and the rate-limiting steps of the reaction mechanism were identified. The para-hydroxylated substrates permit us to study the effect of a substituent (R) in the carbon-1 position (C-1) of the benzene ring on the nucleophilic attack step, while the meta group permits a similar study of the effect on the electrophilic attack step. Substrates with a -OCH3 group on C-1, as p-hydroxyanisol (4HA) and m-hydroxyanisol (3HA), or with a -CH2OH group, as p-hydroxybenzylalcohol (4HBA) and m-hydroxybenzylalcohol (3HBA), were used because the effect of the substituent (R) size was assumed to be similar. However, the electron-donating effect of the -OCH3 group means that the carbon-4 position (C-4) is favoured for nucleophilic attack (para-hydroxylated substrates) or for electrophilic attack (meta-hydroxylated substrates). The electron-attracting effect of the -CH2OH group has the opposite effect, hindering nucleophilic (para) or electrophilic (meta) attack of C-4. The experimental data point to differences between the maximum steady-state rate (V(M)Max) of the different substrates, the value of this parameter depends on the nucleophilic and electrophilic attack. However, differences are greatest in the Michaelis constants (K(M)m), with the meta-hydroxylated substrates having very large values. The catalytic efficiency k(M)cat/K(M)m is much greater for thepara-hydroxylated substrates although it varies greatly between one substrate and the other. However, it varies much less in the meta-hydroxylated substrates since this parameter describes the power of the nucleophilic attack, which is weaker in the meta OH. The large increase in the K(M)m of the meta-hydroxylated substrates might suggest that the phenolic OH takes part in substrate binding. Since this is a weaker nucleophil than the para-hydroxylated substrates, the binding constant decreases, leading to an increase in K(M)m. The catalytic efficiency of tyrosinase on a monophenol (para or meta) is directly related to the nucleophilic power of the oxygen of the phenolic OH. The oxidation step is not limiting since if this were the case, the para and meta substrates would have the same V(M)max. The small difference between the absolute values of V(M)max suggests that the rate constants of the nucleophilic and electrophilic attacks are on the same order of magnitude.

  12. Aircraft and related factors in crashes involving spatial disorientation: 15 years of U.S. Air Force data.

    PubMed

    Lyons, Terence J; Ercoline, William; O'Toole, Kevin; Grayson, Kevin

    2006-07-01

    Previous studies have determined that spatial disorientation (SD) causes 0.5-23% of aircraft crashes, but SD-related crash and fatality rates in different aircraft types have not been systematically studied. SD crashes for the fiscal years 1990 to 2004 and aircraft sortie numbers for all U.S. Air Force (USAF) aircraft were obtained from the USAF Safety Center. Contingency table analysis and Chi-squared tests were used to evaluate differences in SD rates. SD accounted for 11% of USAF crashes with an overall rate of 2.9 per million sorties and a crash fatality rate of 69%. The SD rate was higher in fighter/attack aircraft and helicopters than in training and transport aircraft. The risk of SD was increased at night with 23% of night crashes being caused by SD. But the SD rate and crash fatality rate were not higher in single-crewmember aircraft. SD risk is significantly increased in helicopters and fighter/attack aircraft and at night. The data suggest that a second crewmember does not protect against SD. Further study of specific SD scenarios could lead to focused interventions for SD prevention.

  13. Dimensional structure of bodily panic attack symptoms and their specific connections to panic cognitions, anxiety sensitivity and claustrophobic fears.

    PubMed

    Drenckhan, I; Glöckner-Rist, A; Rist, F; Richter, J; Gloster, A T; Fehm, L; Lang, T; Alpers, G W; Hamm, A O; Fydrich, T; Kircher, T; Arolt, V; Deckert, J; Ströhle, A; Wittchen, H-U; Gerlach, A L

    2015-06-01

    Previous studies of the dimensional structure of panic attack symptoms have mostly identified a respiratory and a vestibular/mixed somatic dimension. Evidence for additional dimensions such as a cardiac dimension and the allocation of several of the panic attack symptom criteria is less consistent. Clarifying the dimensional structure of the panic attack symptoms should help to specify the relationship of potential risk factors like anxiety sensitivity and fear of suffocation to the experience of panic attacks and the development of panic disorder. In an outpatient multicentre study 350 panic patients with agoraphobia rated the intensity of each of the ten DSM-IV bodily symptoms during a typical panic attack. The factor structure of these data was investigated with nonlinear confirmatory factor analysis (CFA). The identified bodily symptom dimensions were related to panic cognitions, anxiety sensitivity and fear of suffocation by means of nonlinear structural equation modelling (SEM). CFA indicated a respiratory, a vestibular/mixed somatic and a cardiac dimension of the bodily symptom criteria. These three factors were differentially associated with specific panic cognitions, different anxiety sensitivity facets and suffocation fear. Taking into account the dimensional structure of panic attack symptoms may help to increase the specificity of the associations between the experience of panic attack symptoms and various panic related constructs.

  14. [A survey of perioperative asthmatic attack among patients with bronchial asthma underwent general anesthesia].

    PubMed

    Ie, Kenya; Yoshizawa, Atsuto; Hirano, Satoru; Izumi, Sinyuu; Hojo, Masaaki; Sugiyama, Haruhito; Kobayasi, Nobuyuki; Kudou, Kouichirou; Maehara, Yasuhiro; Kawachi, Masaharu; Miyakoshi, Kouichi

    2010-07-01

    We investigated the risk factor of perioperative asthmatic attack and effectiveness of preventing treatment for asthmatic attack before operation. We performed retrospective chart review of one hundred eleven patients with asthma underwent general anesthesia and surgical intervention from January 2006 to October 2007 in our hospital. The rate of perioperative asthmatic attack were as follows; 10.2% (5 in 49 cases) in no pretreatment group, 7.5% (3 in 40 cases) in any pretreatments except for systemic steroid, and 4.5% (1 in 22 cases) in systemic steroid pretreatment group. Neither preoperative asthma severity nor duration from the last attack had significant relevancy to perioperative attack rate. The otolaryngological surgery, especially those have nasal polyp and oral surgery had high perioperative asthma attack rate, although there was no significant difference. We recommend the systemic steroid pretreatment for asthmatic patients, especially when they have known risk factor such as administration of the systemic steroid within 6 months, or possibly new risk factor such as nasal polyp, otolaryngological and oral surgery.

  15. A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks.

    PubMed

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2016-06-13

    In many countries around the world, smart cities are becoming a reality. These cities contribute to improving citizens' quality of life by providing services that are normally based on data extracted from wireless sensor networks (WSN) and other elements of the Internet of Things. Additionally, public administration uses these smart city data to increase its efficiency, to reduce costs and to provide additional services. However, the information received at smart city data centers is not always accurate, because WSNs are sometimes prone to error and are exposed to physical and computer attacks. In this article, we use real data from the smart city of Barcelona to simulate WSNs and implement typical attacks. Then, we compare frequently used anomaly detection techniques to disclose these attacks. We evaluate the algorithms under different requirements on the available network status information. As a result of this study, we conclude that one-class Support Vector Machines is the most appropriate technique. We achieve a true positive rate at least 56% higher than the rates achieved with the other compared techniques in a scenario with a maximum false positive rate of 5% and a 26% higher in a scenario with a false positive rate of 15%.

  16. A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks

    PubMed Central

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2016-01-01

    In many countries around the world, smart cities are becoming a reality. These cities contribute to improving citizens’ quality of life by providing services that are normally based on data extracted from wireless sensor networks (WSN) and other elements of the Internet of Things. Additionally, public administration uses these smart city data to increase its efficiency, to reduce costs and to provide additional services. However, the information received at smart city data centers is not always accurate, because WSNs are sometimes prone to error and are exposed to physical and computer attacks. In this article, we use real data from the smart city of Barcelona to simulate WSNs and implement typical attacks. Then, we compare frequently used anomaly detection techniques to disclose these attacks. We evaluate the algorithms under different requirements on the available network status information. As a result of this study, we conclude that one-class Support Vector Machines is the most appropriate technique. We achieve a true positive rate at least 56% higher than the rates achieved with the other compared techniques in a scenario with a maximum false positive rate of 5% and a 26% higher in a scenario with a false positive rate of 15%. PMID:27304957

  17. A STUDY OF THE EFFECT OF SUBSTITUENTS AND OF SOLVENT ON THE REACTIVITY OF THE NORMAL AND ABNORMAL POSITIONS OF UNSYMMETRICAL ORGANIC EPOXIDES

    DTIC Science & Technology

    determined by a kinetic study of the reactions of m-chloro- and 3,4-dimethylbenzylamine with styrene oxide in ethanol at 3 temperatures. The results...and o-methyl-styrene oxide with benzylamine in ethanol showed that the beta-methyl group reduces the rate of attack at both positions very...considerably, while the alpha-methyl group reduces the rate of normal attack slightly and that of abnormal attack considerably, and the o-methyl group has surprisingly little effect of the rate of attack at either position. (Author)

  18. Aerothermal tests of a 12.5 percent cone at Mach 6.7 for various Reynolds numbers, angles of attack and nose shapes. [conducted in Langley 8-foot high temperature tunnel

    NASA Technical Reports Server (NTRS)

    Nowak, R. J.; Albertson, C. W.; Hunt, L. R.

    1984-01-01

    The effects of free-stream unit Reynolds number, angle of attack, and nose shape on the aerothermal environment of a 3-ft basediameter, 12.5 deg half-angle cone were investigated in the Langley 8-foot high temperature tunnel at Mach 6.7. The average total temperature was 3300 R, the freestream unit Reynolds number ranged from 400,000 to 1,400,000 per foot, and the angle of attack ranged from 0 deg to 10 deg. Three nose configurations were tested on the cone: a 3-in-radius tip, a 1-in-radius tip on an ogive frustum, and a sharp tip on an ogive frustum. Surface-pressure and cold-wall heating-rate distributions were obtained for laminar, transitional temperature in the shock layer were obtained. The location of the start of transition moved forward both on windward and leeward sides with increasing free-stream Reynolds numbers, increasing angle of attack, and decreasing nose bluntness.

  19. Application of graph-based semi-supervised learning for development of cyber COP and network intrusion detection

    NASA Astrophysics Data System (ADS)

    Levchuk, Georgiy; Colonna-Romano, John; Eslami, Mohammed

    2017-05-01

    The United States increasingly relies on cyber-physical systems to conduct military and commercial operations. Attacks on these systems have increased dramatically around the globe. The attackers constantly change their methods, making state-of-the-art commercial and military intrusion detection systems ineffective. In this paper, we present a model to identify functional behavior of network devices from netflow traces. Our model includes two innovations. First, we define novel features for a host IP using detection of application graph patterns in IP's host graph constructed from 5-min aggregated packet flows. Second, we present the first application, to the best of our knowledge, of Graph Semi-Supervised Learning (GSSL) to the space of IP behavior classification. Using a cyber-attack dataset collected from NetFlow packet traces, we show that GSSL trained with only 20% of the data achieves higher attack detection rates than Support Vector Machines (SVM) and Naïve Bayes (NB) classifiers trained with 80% of data points. We also show how to improve detection quality by filtering out web browsing data, and conclude with discussion of future research directions.

  20. Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM

    NASA Astrophysics Data System (ADS)

    Song, Jungsuk; Takakura, Hiroki; Okabe, Yasuo; Kwon, Yongjin

    Intrusion detection system (IDS) has played an important role as a device to defend our networks from cyber attacks. However, since it is unable to detect unknown attacks, i.e., 0-day attacks, the ultimate challenge in intrusion detection field is how we can exactly identify such an attack by an automated manner. Over the past few years, several studies on solving these problems have been made on anomaly detection using unsupervised learning techniques such as clustering, one-class support vector machine (SVM), etc. Although they enable one to construct intrusion detection models at low cost and effort, and have capability to detect unforeseen attacks, they still have mainly two problems in intrusion detection: a low detection rate and a high false positive rate. In this paper, we propose a new anomaly detection method based on clustering and multiple one-class SVM in order to improve the detection rate while maintaining a low false positive rate. We evaluated our method using KDD Cup 1999 data set. Evaluation results show that our approach outperforms the existing algorithms reported in the literature; especially in detection of unknown attacks.

  1. Effect of single doses of pindolol and d-fenfluramine on flumazenil-induced anxiety in panic disorder patients.

    PubMed

    Bernik, M; Ramos, R T; Hetem, L A B; Graeff, F

    2017-11-04

    The effects of the 5-HT 1A receptor blocker pindolol and the 5-HT releasing and uptake blocking agent d-fenfluramine, both used as indirect serotonin agonists, on flumazenil-induced acute anxiety reactions were studied in panic disorder patients to test the hypothesis that serotonin (5-HT) inhibits neural systems mediating panic attacks. Thirty never treated or drug free PD patients (16 females) aged 22-49 y (mean±SD, 32.9±8) received single doses of d-fenfluramine (n=10; 30mg, p.o.), pindolol (n=10; 5mg, p.o.), or placebo (n=10) 90 and 45min before a challenge test with flumazenil (1.5mg, i.v., in 10min), under double-blind conditions. Panic attacks occurred in 5 control subjects (placebo-flumazenil group), 5 subjects in the pindolol group and in 7 in the d-fenluramine pre-treated patients. Patients experiencing anxiety attacks following flumazenil reported higher increases in anxiety scores. Respiratory rate increases were not different between patients experiencing or not a panic attack. Despite sample size limitation, this study suggests that flumazenil induced anxiety reaction is not a good pharmacological model of panic attacks, considering the absence of serotonergic modulation of its effects. Copyright © 2017. Published by Elsevier B.V.

  2. Hospital mergers and acquisitions: does market consolidation harm patients?

    PubMed

    Ho, V; Hamilton, B H

    2000-09-01

    Debate continues on whether consolidation in health care markets enhances efficiency or instead facilitates market power, possibly damaging quality. We compare the quality of hospital care before and after mergers and acquisitions in California between 1992 and 1995. We analyze inpatient mortality for heart attack and stroke patients, 90-day readmission for heart attack patients, and discharge within 48 h for normal newborn babies. Recent mergers and acquisitions have not had a measurable impact on inpatient mortality, although the associated standard errors are large. Readmission rates and early discharge increased in some cases. The adverse consequences of increased market power on the quality of care require further substantiation.

  3. Laboratory determination of the carbon kinetic isotope effects (KIEs) for reactions of methyl halides with various nucleophiles in solution

    USGS Publications Warehouse

    Baesman, S.M.; Miller, L.G.

    2005-01-01

    Large carbon kinetic isotope effects (KIEs) were measured for reactions of methyl bromide (MeBr), methyl chloride (MeCl), and methyl iodide (MeI) with various nucleophiles at 287 and 306 K in aqueous solutions. Rates of reaction of MeBr and MeI with H2O (neutral hydrolysis) or Cl- (halide substitution) were consistent with previous measurements. Hydrolysis rates increased with increasing temperature or pH (base hydrolysis). KIEs for hydrolysis were 51 ?? 6??? for MeBr and 38 ?? 8??? for MeI. Rates of halide substitution increased with increasing temperature and greater reactivity of the attacking nucleophile, with the fastest reaction being that of MeI with Br-. KIEs for halide substitution were independent of temperature but varied with the reactant methyl halide and the attacking nucleophile. KIEs were similar for MeBr substitution with Cl- and MeCl substitution with Br- (57 ?? 5 and 60 ?? 9??? respectively). The KIE for halide exchange of MeI was lower overall (33 ?? 8??? and was greater for substitution with Br- (46 ?? 6???) than with Cl- (29 ?? 6???). ?? Springer Science + Business Media, Inc. 2005.

  4. Effects of long-term shock and associated stimuli on aggressive and manual responses1

    PubMed Central

    Hutchinson, R. R.; Renfrew, J. W.; Young, G. A.

    1971-01-01

    Squirrel monkeys were exposed to response-independent, fixed-frequency shock that produced biting attack upon a pneumatic hose. Attacks decreased within and across sessions at low intensities and high frequencies of shock, but increased within and across sessions at higher intensities and lower shock frequencies. Stimuli paired with shock, when presented alone, came to produce biting, and stimuli correlated with shock parameters that produced increases in responding within sessions produced similar increases when presented alone. Further experiments showed that continuing exposure to shock also produced lever pressing or chain pulling, with longer shock exposure again producing higher response rates. Whereas biting generally decreased throughout the intershock interval, manual responding generally increased as shock time approached, but immediately before shock was often suppressed. Following shock, biting attack predominated over manual behavior. The results suggest a possible explanation for the extreme resistance of avoidance behavior to extinction, and may also partially explain the persistence of responding during schedules of response-produced shock. Relationships of the present findings to naturalistic observations of relations between fleeing, freezing, and fighting performances are discussed. PMID:16811496

  5. Panic disorder, panic attacks and panic attack symptoms across race-ethnic groups: results of the collaborative psychiatric epidemiology studies.

    PubMed

    Asnaani, Anu; Gutner, Cassidy A; Hinton, Devon E; Hofmann, Stefan G

    2009-01-01

    The current study investigates race-ethnic differences in rates of panic disorder, panic attacks and certain panic attack symptoms by jointly combining three major national epidemiological databases. The compared groups were White, African American, Latino and Asian. The White group had significantly higher rates of panic disorder, and of many panic symptoms, including palpitations, as compared to the African American, Asian and Latino groups. Several expected race-ethnic differences were not found. An explanation for these findings are adduced, and suggestions are given for future studies so that possible ethnic-racial differences in panic disorder, panic attacks and panic attack symptoms can be investigated in a more rigorous manner.

  6. Analysis of Wind Tunnel Lateral Oscillatory Data of the F-16XL Aircraft

    NASA Technical Reports Server (NTRS)

    Klein, Vladislav; Murphy, Patrick C.; Szyba, Nathan M.

    2004-01-01

    Static and dynamic wind tunnel tests were performed on an 18% scale model of the F-16XL aircraft. These tests were performed over a wide range of angles of attack and sideslip with oscillation amplitudes from 5 deg. to 30 deg. and reduced frequencies from 0.073 to 0.269. Harmonic analysis was used to estimate Fourier coefficients and in-phase and out-of-phase components. For frequency dependent data from rolling oscillations, a two-step regression method was used to obtain unsteady models (indicial functions), and derivatives due to sideslip angle, roll rate and yaw rate from in-phase and out-of-phase components. Frequency dependence was found for angles of attack between 20 deg. and 50 deg. Reduced values of coefficient of determination and increased values of fit error were found for angles of attack between 35 deg. and 45 deg. An attempt to estimate model parameters from yaw oscillations failed, probably due to the low number of test cases at different frequencies.

  7. Understanding the interacted mechanism between carbonation and chloride aerosol attack in ordinary Portland cement concrete

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, Jun; Qiu, Qiwen; Chen, Xiaochi

    An experimental study is carried out with the aim to understand the interacted mechanism between carbonation and chloride aerosol attack in ordinary Portland cement (OPC) concrete. Effects of carbonation on the chloride profile, the chloride binding capacity and the chloride diffusion coefficient are evaluated. Besides, effect of chloride aerosol attack on the carbonation rate is investigated. Concrete specimens with three water-to-cement ratios (0.38, 0.47 and 0.53) are fabricated in this work. Tested results demonstrate that carbonation remarkably affects the chloride profile, reduces the chloride binding capacity, and also accelerates the rate of chloride ion diffusion of concrete. Besides, the presencemore » of chloride aerosol can lead to lower the carbonation depth and increase the pH value of carbonated concrete. Microscopic properties such as morphology, porosity, and pore size distribution for the contaminated concretes are explored by scanning electron microscope and mercury intrusion porosimetry, which provide strong evidence to these research findings.« less

  8. Erosion of aluminum 6061-T6 under cavitation attack in mineral oil and water

    NASA Technical Reports Server (NTRS)

    Rao, B. C. S.; Buckley, D. H.

    1985-01-01

    Studies of the erosion of aluminum 6061-T6 under cavitation attack in distilled water, ordinary tap water and a viscous mineral oil are presented. The mean depth of penetration for the mineral oil was about 40 percent of that for water at the end of a 40 min test. The mean depth of penetration and its rate did not differ significantly for distilled and tap water. The mean depth of penetration rate for both distilled and tap water increased to a maximum and then decreased with test duration, while that for mineral oil had a maximum during the initial period. The ratio h/2a of the pit depth h to the pit diameter 2a varied from 0.04 to 0.13 in water and from 0.06 to 0.20 in mineral oil. Scanning electron microscopy indicates that the pits are initially formed over the grain boundaries and precipitates while the surface grains are deformed under cavitation attack.

  9. Quantum key distribution with hacking countermeasures and long term field trial.

    PubMed

    Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J

    2017-05-16

    Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.

  10. The potential economic burden of Zika in the continental United States.

    PubMed

    Lee, Bruce Y; Alfaro-Murillo, Jorge A; Parpia, Alyssa S; Asti, Lindsey; Wedlock, Patrick T; Hotez, Peter J; Galvani, Alison P

    2017-04-01

    As the Zika virus epidemic continues to spread internationally, countries such as the United States must determine how much to invest in prevention, control, and response. Fundamental to these decisions is quantifying the potential economic burden of Zika under different scenarios. To inform such decision making, our team developed a computational model to forecast the potential economic burden of Zika across six states in the US (Alabama, Florida, Georgia, Louisiana, Mississippi, and Texas) which are at greatest risk of Zika emergence, under a wide range of attack rates, scenarios and circumstances. In order to accommodate a wide range of possibilities, different scenarios explored the effects of varying the attack rate from 0.01% to 10%. Across the six states, an attack rate of 0.01% is estimated to cost $183.4 million to society ($117.1 million in direct medical costs and $66.3 million in productivity losses), 0.025% would result in $198.6 million ($119.4 million and $79.2 million), 0.10% would result in $274.6 million ($130.8 million and $143.8 million) and 1% would result in $1.2 billion ($268.0 million and $919.2 million). Our model and study show how direct medical costs, Medicaid costs, productivity losses, and total costs to society may vary with different attack rates across the six states and the circumstances at which they may exceed certain thresholds (e.g., Zika prevention and control funding allocations that are being debated by the US government). A Zika attack rate of 0.3% across the six states at greatest risk of Zika infection, would result in total costs that exceed $0.5 billion, an attack rate of 1% would exceed $1 billion, and an attack rate of 2% would exceed $2 billion.

  11. Long-term posttraumatic stress symptoms among 3,271 civilian survivors of the September 11, 2001, terrorist attacks on the World Trade Center.

    PubMed

    DiGrande, Laura; Neria, Yuval; Brackbill, Robert M; Pulliam, Paul; Galea, Sandro

    2011-02-01

    Although the September 11, 2001, terrorist attacks were the largest human-made disaster in US history, there is little extant research documenting the attacks' consequences among those most directly affected, that is, persons who were in the World Trade Center towers. Data from a cross-sectional survey conducted 2-3 years after the attacks ascertained the prevalence of long-term, disaster-related posttraumatic stress symptoms and probable posttraumatic stress disorder (PTSD) in 3,271 civilians who evacuated World Trade Center towers 1 and 2. Overall, 95.6% of survivors reported at least 1 current posttraumatic stress symptom. The authors estimated the probable rate of PTSD at 15.0% by using the PTSD Checklist. Women and minorities were at an increased risk of PTSD. A strong inverse relation with annual income was observed. Five characteristics of direct exposure to the terrorist attacks independently predicted PTSD: being on a high floor in the towers, initiating evacuation late, being caught in the dust cloud that resulted from the tower collapses, personally witnessing horror, and sustaining an injury. Working for an employer that sustained fatalities also increased risk. Each addition of an experience of direct exposure resulted in a 2-fold increase in the risk of PTSD (odds ratio = 2.09, 95% confidence interval: 1.84, 2.36). Identification of these risk factors may be useful when screening survivors of large-scale terrorist events for long-term psychological sequelae.

  12. Panic attack history and anxiety sensitivity in relation to cognitive-based smoking processes among treatment-seeking daily smokers.

    PubMed

    Johnson, Kirsten A; Farris, Samantha G; Schmidt, Norman B; Smits, Jasper A J; Zvolensky, Michael J

    2013-01-01

    Empirical research has found that panic attacks are related to increased risk of more severe nicotine withdrawal and poor cessation outcome. Anxiety sensitivity (AS; fear of anxiety and related sensations) has similarly been found to be related to an increased risk of acute nicotine withdrawal and poorer cessation outcome. However, research has yet to examine the relative contributions of panic attacks and AS in terms of cognitive-based smoking processes (e.g., negative reinforcement smoking expectancies, addictive and negative affect-based reduction smoking motives, barriers to cessation, problem symptoms experienced while quitting). Participants (n = 242; 57.4% male; M (age) = 38.1) were daily smokers recruited as a part of a larger randomized control trial for smoking cessation. It was hypothesized that both panic attacks and AS would uniquely and independently predict the studied cognitive-based smoking processes. As hypothesized, AS was uniquely and positively associated with all smoking processes after controlling for average number of cigarettes smoked per day, current Axis I diagnosis, and participant sex. However, panic attack history was only significantly related to problem symptoms experienced while quitting smoking. Although past research has demonstrated significant associations between panic attacks and certain aspects of cigarette smoking (e.g., severity of nicotine withdrawal; lower abstinence rates, and negative affect reduction motives), the present findings suggest that AS may be more relevant to understanding beliefs about and motives for smoking behavior as well as perceptions of cessation-related difficulties.

  13. Shilling attack detection for recommender systems based on credibility of group users and rating time series.

    PubMed

    Zhou, Wei; Wen, Junhao; Qu, Qiang; Zeng, Jun; Cheng, Tian

    2018-01-01

    Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as user ratings and reviews, are used by attackers to manipulate recommendation rankings. Shilling attack detection in recommender systems is of great significance to maintain the fairness and sustainability of recommender systems. The current studies have problems in terms of the poor universality of algorithms, difficulty in selection of user profile attributes, and lack of an optimization mechanism. In this paper, a shilling behaviour detection structure based on abnormal group user findings and rating time series analysis is proposed. This paper adds to the current understanding in the field by studying the credibility evaluation model in-depth based on the rating prediction model to derive proximity-based predictions. A method for detecting suspicious ratings based on suspicious time windows and target item analysis is proposed. Suspicious rating time segments are determined by constructing a time series, and data streams of the rating items are examined and suspicious rating segments are checked. To analyse features of shilling attacks by a group user's credibility, an abnormal group user discovery method based on time series and time window is proposed. Standard testing datasets are used to verify the effect of the proposed method.

  14. Shilling attack detection for recommender systems based on credibility of group users and rating time series

    PubMed Central

    Wen, Junhao; Qu, Qiang; Zeng, Jun; Cheng, Tian

    2018-01-01

    Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as user ratings and reviews, are used by attackers to manipulate recommendation rankings. Shilling attack detection in recommender systems is of great significance to maintain the fairness and sustainability of recommender systems. The current studies have problems in terms of the poor universality of algorithms, difficulty in selection of user profile attributes, and lack of an optimization mechanism. In this paper, a shilling behaviour detection structure based on abnormal group user findings and rating time series analysis is proposed. This paper adds to the current understanding in the field by studying the credibility evaluation model in-depth based on the rating prediction model to derive proximity-based predictions. A method for detecting suspicious ratings based on suspicious time windows and target item analysis is proposed. Suspicious rating time segments are determined by constructing a time series, and data streams of the rating items are examined and suspicious rating segments are checked. To analyse features of shilling attacks by a group user’s credibility, an abnormal group user discovery method based on time series and time window is proposed. Standard testing datasets are used to verify the effect of the proposed method. PMID:29742134

  15. A retrospective analysis of the protective efficacy of tafenoquine and mefloquine as prophylactic anti-malarials in non-immune individuals during deployment to a malaria-endemic area.

    PubMed

    Dow, Geoffrey S; McCarthy, William F; Reid, Mark; Smith, Bryan; Tang, Douglas; Shanks, G Dennis

    2014-02-06

    In 2000/2001, the Australian Defense Forces (ADF), in collaboration with SmithKline Beecham and the United States Army, conducted a field trial to evaluate the safety, tolerability and efficacy of tafenoquine and mefloquine/primaquine for the prophylaxis of malaria amongst non-immune Australian soldiers deployed to East Timor (now called Timor Leste) for peacekeeping operations. The lack of a concurrent placebo control arm prevented an internal estimate of the malaria attack rate and so the protective efficacy of the study regimens was not determined at the time. In a retrospective analysis of the trial results, the all species malaria attack rate was estimated for the prophylactic phase of the study which was defined as the period between administration of the first prophylactic dose and the first dose of post-deployment medication. First, the Plasmodium vivax attack rate was estimated during the prophylactic phase of the deployment by adjusting the observed P. vivax relapse rate during post-deployment to account for the known anti-relapse efficacies (or effectiveness) of the study medications (determined from prior studies). The all species malaria attack rate (P. vivax and Plasmodium falciparum) was then determined by adjusting the P. vivax attack rate based on the ratio of P. falciparum to P. vivax observed during prior ADF deployments to Timor Leste. This estimated all species malaria attack rate was then used as the 'constant estimated attack rate' in the calculation of the protective efficacy of tafenoquine and mefloquine during the prophylactic phase of the deployment. The estimated attack rate during the prophylactic phase of the study was determined to be 7.88%. The protective efficacies of tafenoquine and mefloquine, with corresponding 95% confidence intervals (95% CI), were determined to be 100% (93%-100%) and 100% (79%-100%) respectively. The protective efficacy of tafenoquine (200 mg per day for three days, followed by weekly 200 mg maintenance doses) is similar to that of the weekly standard of care (mefloquine, 250 mg).

  16. [Outbreak of whooping cough with a high attack rate in well-vaccinated children and adolescents].

    PubMed

    Torres, Joan; Godoy, Pere; Artigues, Antoni; Codina, Gemma; Bach, Pilar; Mòdol, Irma; Duró, Maria Àngels; Trilla, Carme

    2011-10-01

    Whooping cough is a re-emerging disease. We describe the investigation of an outbreak of whooping cough and the measures of control adopted. The event was reconstructed through a longitudinal study of incidence. In addition to the notified cases, an active search from the list of those who attended summer camps was made through telephone calls. An epidemiological survey was applied to all cases; vaccination history was confirmed with computerised clinical history and the obtaining of samples for analytical confirmation was proposed. The description of the outbreak was made through the epidemic curve, the attack rates, the relative risk and the linear trend by ages and the vaccination coverage. Of the 30 cases that appeared, 22 (73.3%) were among the members of the summer camps. In these, the attack rate was 21.8%, 26.7% among the children and adolescents increasing linearly with the age. The large majority (86.4%) of this last group were correctly vaccinated, including the fifth dose at the age of 4-6 years. Through the meticulous study of the first cases and the telephone calls to those who attended the summer camp, 90% of the cases of the outbreak were detected. The active search of cases allowed an outbreak of whooping cough with a high attack rate to be studied in children and adolescents with a high vaccination coverage, and the application of control measures that contributed to stop the outbreak. Copyright © 2010 Elsevier España, S.L. All rights reserved.

  17. Aversive imagery in panic disorder: agoraphobia severity, comorbidity, and defensive physiology.

    PubMed

    McTeague, Lisa M; Lang, Peter J; Laplante, Marie-Claude; Bradley, Margaret M

    2011-09-01

    Panic is characterized as a disorder of interoceptive physiologic hyperarousal, secondary to persistent anticipation of panic attacks. The novel aim of this research was to investigate whether severity of agoraphobia within panic disorder covaries with the intensity of physiological reactions to imagery of panic attacks and other aversive scenarios. A community sample of principal panic disorder (n = 112; 41 without agoraphobia, 71 with agoraphobia) and control (n = 76) participants imagined threatening and neutral events while acoustic startle probes were presented and the eye-blink response (orbicularis oculi) recorded. Changes in heart rate, skin conductance level, and facial expressivity were also measured. Overall, panic disorder patients exceeded control participants in startle reflex and heart rate during imagery of standard panic attack scenarios, concordant with more extreme ratings of aversion and emotional arousal. Accounting for the presence of agoraphobia revealed that both panic disorder with and without situational apprehension showed the pronounced heart rate increases during standard panic attack imagery observed for the sample as a whole. In contrast, startle potentiation to aversive imagery was more robust in those without versus with agoraphobia. Reflex diminution was most dramatic in those with the most pervasive agoraphobia, coincident with the most extreme levels of comorbid broad negative affectivity, disorder chronicity, and functional impairment. Principal panic disorder may represent initial, heightened interoceptive fearfulness and concomitant defensive hyperactivity, which through progressive generalization of anticipatory anxiety ultimately transitions to a disorder of pervasive agoraphobic apprehension and avoidance, broad dysphoria, and compromised mobilization for defensive action. Copyright © 2011 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  18. Aversive imagery in panic disorder: Agoraphobia severity, comorbidity and defensive physiology

    PubMed Central

    McTeague, Lisa M.; Lang, Peter J.; Laplante, Marie-Claude; Bradley, Margaret M.

    2011-01-01

    Background Panic is characterized as a disorder of interoceptive physiological hyperarousal, secondary to persistent anticipation of panic attacks. The novel aim of the present research was to investigate whether severity of agoraphobia within panic disorder covaries with the intensity of physiological reactions to imagery of panic attacks and other aversive scenarios. Methods A community sample of principal panic disorder (n=112; 41 without agoraphobia, 71 with agoraphobia) and control (n=76) participants imagined threatening and neutral events while acoustic startle probes were presented and the eye-blink response (orbicularis oculi) recorded. Changes in heart rate, skin conductance level, and facial expressivity were also measured. Results Overall panic disorder patients exceeded controls in startle reflex and heart rate during imagery of standard panic attack scenarios, concordant with more extreme ratings of aversion and emotional arousal. Accounting for the presence of agoraphobia revealed that both panic disorder with and without situational apprehension showed the pronounced heart rate increases during standard panic attack imagery observed for the sample as a whole. In contrast, startle potentiation to aversive imagery was more robust in those without versus with agoraphobia. Reflex diminution was most dramatic in those with the most pervasive agoraphobia, coincident with the most extreme levels of comorbid broad negative affectivity, disorder chronicity, and functional impairment. Conclusions Principal panic disorder may represent initial, heightened interoceptive fearfulness and concomitant defensive hyperactivity, which through progressive generalization of anticipatory anxiety, ultimately transitions to a disorder of pervasive agoraphobic apprehension and avoidance, broad dysphoria and compromised mobilization for defensive action. PMID:21550590

  19. Somatic panic-attack equivalents in a community sample of Rwandan widows who survived the 1994 genocide

    PubMed Central

    Hagengimana, Athanase; Hinton, Devon; Bird, Bruce; Pollack, Mark; Pitman, Roger K.

    2009-01-01

    The present study is the first to attempt to determine rates of panic attacks, especially ‘somatically focused’ panic attacks, panic disorder, symptoms of post-traumatic stress disorder (PTSD), and depression levels in a population of Rwandans traumatized by the 1994 genocide. The following measures were utilized: the Rwandan Panic-Disorder Survey (RPDS); the Beck Depression Inventory (BDI); the Harvard Trauma Questionnaire (HTQ); and the PTSD Checklist (PCL). Forty of 100 Rwandan widows suffered somatically focused panic attacks during the previous 4 weeks. Thirty-five (87%) of those having panic attacks suffered panic disorder, making the rate of panic disorder for the entire sample 35%. Rwandan widows with panic attacks had greater psychopathology on all measures. Somatically focused panic-attack subtypes seem to constitute a key response to trauma in the Rwandan population. Future studies of traumatized non-Western populations should carefully assess not only somatoform disorder but also somatically focused panic attacks. PMID:12581815

  20. 100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni; Takesue, Hiroki; Langrock, Carsten; Fejer, M. M.; Yamamoto, Yoshihisa

    2006-12-01

    We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 µm single-photon detectors based on frequency up-conversion in periodically poled lithium niobate waveguides and silicon avalanche photodiodes. Based on the security analysis of the protocol against general individual attacks, we generated secure keys at a practical rate of 166 bit/s over 100 km of fiber. The use of the low jitter detectors also increased the sifted key generation rate to 2 Mbit/s over 10 km of fiber.

  1. A retrospective analysis of the protective efficacy of tafenoquine and mefloquine as prophylactic anti-malarials in non-immune individuals during deployment to a malaria-endemic area

    PubMed Central

    2014-01-01

    Background In 2000/2001, the Australian Defense Forces (ADF), in collaboration with SmithKline Beecham and the United States Army, conducted a field trial to evaluate the safety, tolerability and efficacy of tafenoquine and mefloquine/primaquine for the prophylaxis of malaria amongst non-immune Australian soldiers deployed to East Timor (now called Timor Leste) for peacekeeping operations. The lack of a concurrent placebo control arm prevented an internal estimate of the malaria attack rate and so the protective efficacy of the study regimens was not determined at the time. Methods In a retrospective analysis of the trial results, the all species malaria attack rate was estimated for the prophylactic phase of the study which was defined as the period between administration of the first prophylactic dose and the first dose of post-deployment medication. First, the Plasmodium vivax attack rate was estimated during the prophylactic phase of the deployment by adjusting the observed P. vivax relapse rate during post-deployment to account for the known anti-relapse efficacies (or effectiveness) of the study medications (determined from prior studies). The all species malaria attack rate (P. vivax and Plasmodium falciparum) was then determined by adjusting the P. vivax attack rate based on the ratio of P. falciparum to P. vivax observed during prior ADF deployments to Timor Leste. This estimated all species malaria attack rate was then used as the ‘constant estimated attack rate’ in the calculation of the protective efficacy of tafenoquine and mefloquine during the prophylactic phase of the deployment. Results The estimated attack rate during the prophylactic phase of the study was determined to be 7.88%. The protective efficacies of tafenoquine and mefloquine, with corresponding 95% confidence intervals (95% CI), were determined to be 100% (93%-100%) and 100% (79%-100%) respectively. Conclusions The protective efficacy of tafenoquine (200 mg per day for three days, followed by weekly 200 mg maintenance doses) is similar to that of the weekly standard of care (mefloquine, 250 mg). PMID:24502679

  2. [Mortality rate of acute heart attack in Zalaegerszeg micro-region. Results of the first Hungarian 24-hour acute ST-elevation myocardial infarction intervention care unit].

    PubMed

    Lupkovics, Géza; Motyovszki, Akos; Németh, Zoltán; Takács, István; Kenéz, András; Burkali, Bernadett; Menyhárt, Ildikó

    2010-04-04

    Morbidity and mortality rates of acute heart attack emphasize the significance of this patient group worldwide. The prompt and exact diagnosis and the timing of adequate therapy is crucial for this patients. Modern supply of acute heart attack includes invasive cardiology intervention, primer percutaneous coronary intervention. In year 1999, American and European recommendations suggested primer percutaneous coronary intervention only as an alternative possibility instead of thrombolysis, or in case of cardiogenic shock. 24 hour intervention unit for patients with acute heart attack was first organized in Hungary in Zala County Hospital's Cardiology Department, in year 1998. Our present study confirms, that since the intervention treatment has been introduced, average mortality rate has been reduced considerably in our area comparing to the national average. Mortality rates in West Transdanubian region and in Zalaegerszeg's micro-region were studied and compared for the period between 1997-2004, according to the data of National Public Health and Medical Officer Service. These data were then compared with the national average mortality data of Hungarian Central Statistical Office. With the help of our own computerized database we examined this period and compared the number of the completed invasive interventions to the mortality statistics. In the first full year, in 1998, we completed 82 primer and 283 elective PCIs; these number increased to 318 and 1265 by year 2005. At the same time, significant decrease of acute infarction related mortality was detectable among men of the Zalaegerszeg micro-region, comparing to the national average (p<0.001). The first Hungarian 24 hour acute heart attack intervention care improved the area's mortality statistics significantly, comparing to the national average. The skilled work of the experienced team means an important advantage to the patients in Zalaegerszeg micro-region.

  3. The Italian Register of Cardiovascular Diseases: Attack Rates and Case Fatality for Cerebrovascular Events

    PubMed Central

    Palmieri, L.; Barchielli, A.; Cesana, G.; de Campora, E.; Goldoni, C.A.; Spolaore, P.; Uguccioni, M.; Vancheri, F.; Vanuzzo, D.; Ciccarelli, P.; Giampaoli, S.

    2007-01-01

    Background The Italian register of cardiovascular diseases is a surveillance system of fatal and nonfatal cardiovascular events in the general population aged 35–74 years. It was launched in Italy at the end of the 1990s with the aim of estimating periodically the occurrence and case fatality rate of coronary and cerebrovascular events in the different geographical areas of the country. This paper presents data for cerebrovascular events. Methods Currentevents were assessed through record linkage between two sources of information: death certificates and hospital discharge diagnosis records. Events were identified through the ICD codes and duration. To calculate the number of estimated events, current events were multiplied by the positive predictive value of each specific mortality or discharge code derived from the validation of a sample of suspected events. Attack rates were calculated by dividing estimatedevents by resident population, and case fatality rate at 28 days was determined from the ratio of estimated fatal to total events. Results Attack rates were found to be higher in men than in women: mean age-standardized attack rate was 21.9/10,000 in men and 12.5/10,000 in women; age-standardized 28-day case fatality rate was higher in women (17.1%) than in men (14.5%). Significant geographical differences were found in attack rates of both men and women. Case fatality was significantly heterogeneous in both men and women. Conclusions Differences still exist in the geographical distribution of attack and case fatality rates of cerebrovascular events, regardless of the north-south gradient. These data show the feasibility of implementing a population-based register using a validated routine database, necessary for monitoring cardiovascular diseases. PMID:17971632

  4. Numerical investigation on the performance of fin and tube heat exchangers using rectangular vortex generators

    NASA Astrophysics Data System (ADS)

    Zeeshan, Mohd; Hazarika, Saheera Azmi; Nath, Sujit; Bhanja, Dipankar

    2017-07-01

    In the present work, a 3-D numerical investigation has been performed to explore the effect of attack angles on the thermal-hydraulic performance of fin and tube heat exchanger (FTHE) using rectangular winglet pairs (RWPs). RWPs are placed adjacent to the tubes and three attack angels are considered for the study i.e. 5°, 15° and 25°. The effect of attack angles are examined on the heat transfer characteristics as well as in pressure drop penalty with airside Reynolds number Rea ranges from 500 to 900. Two performance evaluation criteria namely PEC1 i.e. area goodness factor (j/f) and PEC2 i.e. heat transfer rate per unit fan power consumption (Q/Pf) are considered for the performance evaluation. Furthermore, MOORA method is applied to obtain the performance order of FTHE configurations by taking PEC1 and PEC2 as beneficial attributes and fan power Pf as a non-beneficial attribute, keeping equal importance to each attribute. The results show that 5° attack angle provides the better performance in terms of PEC1 as heat transfer coefficient is increased by 27.70% at Rea=500 and 32.73% at Rea=900 respectively with 13.01% increased pressure drop penalty at Rea=500 and 14.26% at Rea=900 respectively. In terms of PEC2, though the 5° attack angle provides the high values of Q/Pf factor among the 15° and 25° attack angles, but it is found insignificant to replace the baseline configuration i.e. plain fin and tube heat exchanger configuration without vortex generators. Moreover, in MOORA optimization analysis also, it is found that 5° attack angle provides the better thermal-hydraulic performance.

  5. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    PubMed Central

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate. PMID:26295058

  6. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection.

    PubMed

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  7. The Alberta Stroke Prevention in TIAs and mild strokes (ASPIRE) intervention: rationale and design for evaluating the implementation of a province-wide TIA triaging system.

    PubMed

    Jeerakathil, Thomas; Shuaib, Ashfaq; Majumdar, Sumit R; Demchuk, Andrew M; Butcher, Kenneth S; Watson, Tim J; Dean, Naeem; Gordon, Deb; Edmond, Cathy; Coutts, Shelagh B

    2014-10-01

    Stroke risk after transient ischaemic attack is high and, it is a challenge worldwide to provide urgent assessment and preventive services to entire populations. To determine whether a province-wide transient ischaemic attack Triaging algorithm and transient ischaemic attack hotline (the Alberta Stroke Prevention in transient ischaemic attacks and mild strokes intervention) can reduce the rate of stroke recurrence following transient ischaemic attack across the population of Alberta, Canada (population 3·7 million, 90-day rate of post-stroke transient ischaemic attack currently 9·5%). It also seeks to improve upon current transient ischaemic attack triaging rules by incorporating time from symptom onset as a predictive variable. The transient ischaemic attack algorithm and hotline were developed with a broad consensus of clinicians, patients, policy-makers, and researchers and based on local adaptation of the work of others and research and insights developed within the province. Because neither patient-level nor region-level randomization was possible, we conducted a quasi-experimental design examining changes in the post-transient ischaemic attack rate of stroke recurrence before and after the 15-month implementation period using an interrupted time-series regression analysis. The design controls for changes in case-mix, co-interventions, and secular trends. A prospective transient ischaemic attack cohort will also be concurrently created with telephone follow-up at seven-days and 90 days as well as passive follow-up over the longer term using linkages to provincial healthcare administrative databases. The primary outcome measure is the change in recurrence rate of stroke following transient ischaemic attack at seven-days and 90 days, comparing a period of two-years before vs. two-years after the intervention is implemented. All cases of recurrent stroke will be validated. Secondary outcomes include functional status, hospitalizations, morbidity, and mortality. We are undertaking a rigorous evaluation of a population-based approach to improving quality of transient ischaemic attack care. Whether positive or negative, our work should provide important insights for all potential stakeholders. © 2012 The Authors. International Journal of Stroke © 2012 World Stroke Organization.

  8. HIDEC adaptive engine control system flight evaluation results

    NASA Technical Reports Server (NTRS)

    Yonke, W. A.; Landy, R. J.; Stewart, J. F.

    1987-01-01

    An integrated flight propulsion control mode, the Adaptive Engine Control System (ADECS), has been developed and flight tested on an F-15 aircraft as part of the NASA Highly Integrated Digital Electronic Control program. The ADECS system realizes additional engine thrust by increasing the engine pressure ratio (EPR) at intermediate and afterburning power, with the amount of EPR uptrim modulated using a predictor scheme for angle-of-attack and sideslip angle. Substantial improvement in aircraft and engine performance was demonstrated, with a 16 percent rate of climb increase, a 14 percent reduction in time to climb, and a 15 percent reduction in time to accelerate. Significant EPR uptrim capability was found with angles-of-attack up to 20 degrees.

  9. Application of stochastic discrete event system framework for detection of induced low rate TCP attack.

    PubMed

    Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar

    2015-09-01

    TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  10. Mass casualty response in the 2008 Mumbai terrorist attacks.

    PubMed

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  11. Is stress a trigger factor for migraine?

    PubMed

    Schoonman, G G; Evers, D J; Ballieux, B E; de Geus, E J; de Kloet, E R; Terwindt, G M; van Dijk, J G; Ferrari, M D

    2007-06-01

    Although mental stress is commonly considered to be an important trigger factor for migraine, experimental evidence for this belief is yet lacking. To study the temporal relationship between changes in stress-related parameters (both subjective and objective) and the onset of a migraine attack. This was a prospective, ambulatory study in 17 migraine patients. We assessed changes in perceived stress and objective biological measures for stress (saliva cortisol, heart rate average [HRA], and heart rate variability [low-frequency power and high-frequency power]) over 4 days prior to the onset of spontaneous migraine attacks. Analyses were repeated for subgroups of patients according to whether or not they felt their migraine to be triggered by stress. There were no significant temporal changes over time for the whole group in perceived stress (p=0.50), morning cortisol (p=0.73), evening cortisol (p=0.55), HRA (p=0.83), low-frequency power (p=0.99) and high-frequency power (p=0.97) prior to or during an attack. Post hoc analysis of the subgroup of nine stress-sensitive patients who felt that >2/3 of their migraine attacks were triggered by psychosocial stress, revealed an increase for perceived stress (p=0.04) but no changes in objective stress response measures. At baseline, this group also showed higher scores on the Penn State Worry Questionnaire (p=0.003) and the Cohen Perceived Stress Scale (p=0.001) compared to non-stress-sensitive patients. Although stress-sensitive patients, in contrast to non-stress-sensitive patients, may perceive more stress in the days before an impending migraine attack, we failed to detect any objective evidence for a biological stress response before or during migraine attacks.

  12. Short-term effects of airborne pollens on asthma attacks as seen by general practitioners in the Greater Paris area, 2003-2007.

    PubMed

    Huynh, Bich Tram; Tual, Séverine; Turbelin, Clément; Pelat, Camille; Cecchi, Lorenzo; D'Amato, Gennaro; Blanchon, Thierry; Annesi-Maesano, Isabella

    2010-09-01

    To investigate for the first time the short-term effects of airborne pollen counts on general practitioner (GP) consultations for asthma attacks in the Greater Paris area between 2003-2007. Counts were available for common pollens (Betula, Cupressa, Fraxinus and Poaceae). Weekly data on GP visits for asthma attacks were obtained from the French GP Sentinel Network. A quasi-Poisson regression with generalised additive models was implemented. Short-term effects of pollen counts were assessed using single and multi-pollen models after adjustment for air pollution and influenza. A mean weekly incidence rate of 25.4 cases of asthma attacks per 100,000 inhabitants was estimated during the study period. The strongest significant association between asthma attacks and pollen counts was registered for grass (Poaceae) in the same week of asthma attacks, with a slight reduction of the effect observed in the multi-pollen model. Adjusted relative risk for Poaceae was 1.54 (95% CI: 1.33-1.79) with an inter-quartile range increase of 17.6 grains/m3 during the pollen season. For the first time, a significant short-term association was observed between Poaceae pollen counts and consultations for asthma attacks as seen by GPs. These findings need to be confirmed by more consistent time-series and investigations on a daily basis.

  13. Panic attacks and panic disorder in a population-based sample of active Canadian military personnel.

    PubMed

    Kinley, D Jolene; Walker, John R; Mackenzie, Corey S; Sareen, Jitender

    2011-01-01

    The factors contributing to psychiatric problems among military personnel, particularly for panic, are unclear. The objective of this study was to examine the prevalence and correlates of panic disorder and panic attacks in the Canadian military. Statistics Canada and the Department of National Defense conducted the Canadian Community Health Survey-Canadian Forces Supplement in 2002 (May to December) with a representative sample of active Canadian military personnel (aged 16-54 years; N = 8,441; response rate, 81.5%). Comparisons were made between respondents with no past-year panic attacks, panic attacks without panic disorder, and panic disorder on measures of DSM-IV mental disorders, as well as validated measures of disability, distress, suicidal ideation, perceived need for mental health treatment, and mental health service use. Lifetime exposure to combat operations, witnessing of atrocities, and deployments were also assessed. Panic disorder and panic attacks were common in the military population, with past-year prevalence estimates of 1.8% and 7.0%, respectively. Both panic disorder and panic attacks were associated with increased odds of all mental disorders assessed, suicidal ideation, 2-week disability, and distress. Perceived need for mental health treatment and service use were common in individuals with panic attacks and panic disorder (perceived need: 46.3% for panic attacks, 89.6% for panic disorder; service use: 32.5% for panic attacks, 74.5% for panic disorder). Panic attacks and panic disorder in the military are associated with outcomes that could be detrimental to well-being and work performance, and early detection of panic in this population could help reduce these negative outcomes. © Copyright 2011 Physicians Postgraduate Press, Inc.

  14. Nutritional regulation of hepatic heme biosynthesis and porphyria through PGC-1alpha.

    PubMed

    Handschin, Christoph; Lin, Jiandie; Rhee, James; Peyer, Anne-Kathrin; Chin, Sherry; Wu, Pei-Hsuan; Meyer, Urs A; Spiegelman, Bruce M

    2005-08-26

    Inducible hepatic porphyrias are inherited genetic disorders of enzymes of heme biosynthesis. The main clinical manifestations are acute attacks of neuropsychiatric symptoms frequently precipitated by drugs, hormones, or fasting, associated with increased urinary excretion of delta-aminolevulinic acid (ALA). Acute attacks are treated by heme infusion and glucose administration, but the mechanisms underlying the precipitating effects of fasting and the beneficial effects of glucose are unknown. We show that the rate-limiting enzyme in hepatic heme biosynthesis, 5-aminolevulinate synthase (ALAS-1), is regulated by the peroxisome proliferator-activated receptor gamma coactivator 1alpha (PGC-1alpha). Elevation of PGC-1alpha in mice via adenoviral vectors increases the levels of heme precursors in vivo as observed in acute attacks. The induction of ALAS-1 by fasting is lost in liver-specific PGC-1alpha knockout animals, as is the ability of porphyrogenic drugs to dysregulate heme biosynthesis. These data show that PGC-1alpha links nutritional status to heme biosynthesis and acute hepatic porphyria.

  15. Hemodynamic, ventilatory, and biochemical responses of panic patients and normal controls with sodium lactate infusion and spontaneous panic attacks.

    PubMed

    Gaffney, F A; Fenton, B J; Lane, L D; Lake, C R

    1988-01-01

    Hemodynamic, ventilatory, and biochemical variables were measured in ten healthy adults and ten panic patients during infusion of 0.5 mol/L of sodium lactate. Physical activity, fitness level, and ambulatory electrocardiograms were also recorded. Lactate infusion doubled cardiac output, increased blood lactate levels by sixfold, and produced hypernatremia, hypocalcemia, and decreased serum bicarbonate levels in both groups but raised arterial pressure only in the patients. The patients hyperventilated before and during the infusion. Physiological responses and somatic complaints with the infusion differed little between the groups, but emotional complaints were six times more frequent among the panic patients. Eight patients but no control subjects interpreted their symptoms as a panic attack. Heart rate increased with only 14 of 31 recorded spontaneous outpatient panic attacks. Sodium lactate infusions appear to produce panic by mimicking the physiology of spontaneous panic. Treatment with cardioactive agents is not indicated in the absence of cardiopulmonary or autonomic nervous system abnormalities.

  16. Efficacy of ketanserin in the therapy of Raynaud's phenomenon: thermometric data.

    PubMed

    Arosio, E; Montesi, G; Zannoni, M; Perbellini, L; Paluani, F; Lechi, A

    1991-05-01

    After a two-week washout (WO) period with placebo 1 capsule/bid, 12 patients suffering from stable Raynaud's phenomenon were treated with ketanserin (K) 40 mg/bid for fifteen days. Blood pressure, heart rate, and laboratory parameters were evaluated at the end of each period. Patients used diary cards to record the number, duration, and intensity of attacks. Computerized thermometry of the fingers was evaluated at basal temperature after acclimatization, 23 degrees C for thirty minutes; after cold test, 10 degrees C for five minutes; and after thermal recovery, 23 degrees C for eighteen minutes. Results were analyzed statistically by use of Student's t-test for paired data (p less than 0.05). No marked changes were observed in the symptoms of the attacks, but K proved effective in significantly reducing the number and duration of daily attacks and in promoting their spontaneous regression. Thermometry revealed a parallel increase in temperatures, particularly basal and recovery values. The data suggest increased flow and decreased vasospasm following 5-HT2 receptor blockade.

  17. Control for small-speed lateral flight in a model insect.

    PubMed

    Zhang, Yan Lai; Sun, Mao

    2011-09-01

    Controls required for small-speed lateral flight of a model insect were studied using techniques based on the linear theories of stability and control (the stability and control derivatives were computed by the method of computational fluid dynamics). The main results are as follows. (1) Two steady-state lateral motions can exist: one is a horizontal side translation with the body rolling to the same side of the translation by a small angle, and the other is a constant-rate yaw rotation (rotation about the vertical axis). (2) The side translation requires an anti-symmetrical change in the stroke amplitudes of the contralateral wings, and/or an anti-symmetrical change in the angles of attack of the contralateral wings, with the down- and upstroke angles of attack of a wing having equal change. The constant-rate yaw rotation requires an anti-symmetrical change in the angles of attack of the contralateral wings, with the down- and upstroke angles of attack of a wing having differential change. (3) For the control of the horizontal side translation, control input required for the steady-state motion has an opposite sign to that needed for initiating the motion. For example, to have a steady-state left side-translation, the insect needs to increase the stroke amplitude of the left wing and decrease that of the right wing to maintain the steady-state flight, but it needs an opposite change in stroke amplitude (decreasing the stroke amplitude of the left wing and increasing that of the right wing) to enter the flight.

  18. F-18 HARV yaw rate expansion flight #125 with Inverted Recovery

    NASA Technical Reports Server (NTRS)

    1991-01-01

    NASA's Dryden Flight Research Center, Edwards, CA, used an F-18 Hornet fighter aircraft as its High Angle-of-Attack (Alpha) Research Vehicle (HARV) in a three-phased flight research program lasting from April 1987 until September 1996. The aircraft completed 385 research flights and demonstrated stabilized flight at angles of attack between 65 and 70 degrees using thrust vectoring vanes, a research flight control system, and (eventually) forebody strakes (hinged structures on the forward side of the fuselage to provide control by interacting with vortices, generated at high angles of attack, to create side forces). This combination of technologies provided carefree handling of a fighter aircraft in a part of the flight regime that was otherwise very dangerous. Flight research with the HARV increased our understanding of flight at high angles of attack (angle of the wings with respect to the direction in which the aircraft was heading), enabling designers of U.S. fighter aircraft to design airplanes that will fly safely in portions of the flight envelope that pilots previously had to avoid. Flight 125 with the HARV involved yaw rate expansion up to 50 degrees per second (moving the nose to the left or right at that rate). NASA research pilot Ed Schneider was the pilot, and the purpose of the flight was to look at the spin characteristics of the HARV. The sequence in this particular video clip includes the first and second maneuvers in the flight. On the first maneuver, the pilot attempted to achieve a yaw rate of 40 degrees per second and actually went to 47 degrees. The spin was oscillatory in pitch (up and down) and roll (rotating around the longitudinal axis). Recovery was normal. On the second maneuver of the flight in which Schneider tried to achieve a yaw rate of 40 degrees per second, the aircraft overshot to 54 degrees per second during an oscillatory spin. In the course of the recovery, the aircraft rolled after a large sideslip buildup. Moderate aft stick application to attain a positive angle of attack resulted in an easy recovery.

  19. Flow separation on flapping and rotating profiles with spanwise gradients.

    PubMed

    Wong, J G; laBastide, B P; Rival, D E

    2017-02-15

    The growth of leading-edge vortices (LEV) on analogous flapping and rotating profiles has been investigated experimentally. Three time-varying cases were considered: a two-dimensional reference case with a spanwise-uniform angle-of-attack variation α; a case with increasing α towards the profile tip (similar to flapping flyers); and a case with increasing α towards the profile root (similar to rotor blades experiencing an axial gust). It has been shown that the time-varying spanwise angle-of-attack gradient produces a vorticity gradient, which, in combination with spanwise flow, results in a redistribution of circulation along the profile. Specifically, when replicating the angle-of-attack gradient characteristic of a rotor experiencing an axial gust, the spanwise-vorticity gradient is aligned such that circulation increases within the measurement domain. This in turn increases the local LEV growth rate, which is suggestive of force augmentation on the blade. Reversing the relative alignment of the spanwise-vorticity gradient and spanwise flow, thereby replicating that arrangement found in a flapping flyer, was found to reduce local circulation. From this, we can conclude that spanwise flow can be arranged to vary LEV growth to prolong lift augmentation and reduce the unsteadiness of cyclic loads.

  20. Effect of 7 July 2005 terrorist attacks in London on suicide in England and Wales.

    PubMed

    Salib, Emad; Cortina-Borja, Mario

    2009-01-01

    A reduction in suicide in England and Wales has been reported after the attacks of 11 September 2001 in the USA. It may be plausible therefore to expect a much greater impact on suicide in the UK in response to the events of 7 July 2005, caused by the first suicide terrorist attack by Islamic extremists on British soil. To examine the effect of the 7 July 2005 terrorist attacks in London on suicide rates in England and Wales. Analysis of number of suicide (ICD-10 codes X60-X84) and undetermined injury deaths (ICD-10 codes Y10-Y34) reported in England and Wales in the 12 weeks before and after 7 July 2005. We used Shewhart Control Charts based on Poisson rates to explore adjusted daily and weekly suicide rates and rate differences with respect to 7 July 2005. A brief but significant reduction in daily suicide rate was observed a few days after the terrorist attack in London on 7 July 2005. Further reduction was also observed on the 21 July 2005, coinciding with the second wave of attacks. No similar reduction in suicide was seen during the same period in the previous 4 years. Poisson regression models with indicator variables for each day in July 2005 revealed a reduction of 40% of the expected daily rate for these 2 days only. We found no evidence of any longer-term effect on suicide. The study findings are contrary to our expectation and only weakly support Durkheim's theory that periods of national threat lower the suicide rate through the impact on social cohesion. It is possible that previous experience of IRA terrorism in the UK may have limited the effect of the 7 July 2005 attacks on suicide in England and Wales. The shock value of suicide terrorism and its psychological potency appear to diminish over time as the tactic becomes overused.

  1. Heavy-Ion Microbeam Fault Injection into SRAM-Based FPGA Implementations of Cryptographic Circuits

    NASA Astrophysics Data System (ADS)

    Li, Huiyun; Du, Guanghua; Shao, Cuiping; Dai, Liang; Xu, Guoqing; Guo, Jinlong

    2015-06-01

    Transistors hit by heavy ions may conduct transiently, thereby introducing transient logic errors. Attackers can exploit these abnormal behaviors and extract sensitive information from the electronic devices. This paper demonstrates an ion irradiation fault injection attack experiment into a cryptographic field-programmable gate-array (FPGA) circuit. The experiment proved that the commercial FPGA chip is vulnerable to low-linear energy transfer carbon irradiation, and the attack can cause the leakage of secret key bits. A statistical model is established to estimate the possibility of an effective fault injection attack on cryptographic integrated circuits. The model incorporates the effects from temporal, spatial, and logical probability of an effective attack on the cryptographic circuits. The rate of successful attack calculated from the model conforms well to the experimental results. This quantitative success rate model can help evaluate security risk for designers as well as for the third-party assessment organizations.

  2. Effect of a rotating propeller on the separation angle of attack

    NASA Technical Reports Server (NTRS)

    Boldman, D. R.; Iek, C.; Hwang, D. P.; Larkin, M.; Schweiger, P.

    1993-01-01

    The present study represents an extension of an earlier wind tunnel experiment performed with the P&W 17-in. Advanced Ducted Propeller (ADP) Simulator operating at Mach 0.2. In order to study the effects of a rotating propeller on the inlet flow, data were obtained in the UTRC 10- by 15-Foot Large Subsonic Wind Tunnel with the same hardware and instrumentation, but with the propellar removed. These new tests were performed over a range of flow rates which duplicated flow rates in the powered simulator program. The flow through the inlet was provided by a remotely located vacuum source. A comparison of the results of this flow-through study with the previous data from the powered simulator indicated that in the conventional inlet the propeller produced an increase in the separation angle of attack between 4.0 deg at a specific flow of 22.4 lb/sec-sq ft to 2.7 deg at a higher specific flow of 33.8 lb/sec-sq ft. A similar effect on separation angle of attack was obtained by using stationary blockage rather than a propeller.

  3. Patch Time Allocation and Oviposition Behavior in Response to Patch Quality and the Presence of a Generalist Predator in Meteorus pulchricornis (Hymenoptera: Braconidae)

    PubMed Central

    Sheng, Sheng; Ling, Meng; Fu-an, Wu; Baoping, Li

    2015-01-01

    Foraging parasitoids often must estimate local risk of predation just as they must estimate local patch value. Here, we investigate the effects a generalist predator Chlaenius bioculatus (Coleoptera: Carabidae), has on the oviposition behavior and the patch residence decisions of a solitary parasitoid Meteorus pulchricornis (Hymenoptera: Braconidae) in response to the varying host quality of Spodoptera litura (Lepidoptera: Noctuidae) larvae (L2 and L4). M. pulchricornis attacked more L4 than on L2 hosts, with the difference in attack rate varying depending on predation treatments, greater in the presence (either actively feeding or not) of the predator than in the absence of it. The parasitoid attacked fewer L2 and L4 hosts when the predator was actively feeding than when it was not feeding or not present in the patch. M. pulchricornis decreased the patch leaving tendency with increasing rejections of hosts, but increased the tendency in response to the presence of the predator as compared with the absence of it, and furthermore, increased the patch leaving tendency when the predator was actively feeding as compared with when it was not. Our study suggests that M. pulchricornis can exploit high quality patches while minimizing predation risk, by attacking more hosts in high quality patches while reducing total patch time in response to risk of predation. PMID:25943317

  4. Heart attacks triggered by huge mud slides in mountain regions and severe flooding in inhabited areas.

    PubMed

    Nagayoshi, Yasuhiro; Yumoto, Shinya; Sakaguchi, Kazuhisa; Shudo, Chiharu; Takino, Shiro; Hashiyama, Motohiro; Kai, Yutaka; Kuroda, Yutaka; Kawano, Hiroaki; Ogawa, Hisao

    2015-02-01

    On July 12, 2012, heavy rains struck southwest Japan, particularly in the Mount Aso area. Huge mud slides in the mountains destroyed houses, and heavy rains caused severe flooding in the inhabited areas. We investigated the incidence of cardiovascular events after the disaster. We investigated patients who were admitted to the emergency department (ED) from July 12 to August 31 in 2012. We reviewed all patients with cardiovascular events, including acute myocardial infarction (AMI), angina attack, worsening of congestive heart failure (CHF), cardiopulmonary arrest (CPA), arrhythmias, tako-tsubo cardiomyopathy (TC), and symptomatic venous thromboembolism (VTE). The total number of cardiovascular events was 28 (14 supraventricular arrhythmias, 3 angina attacks, 1 AMI, 1 VTE, 4 CHF, 1 TC and 4 CPA). There was a significant increase in cardiovascular events during the follow-up period in 2012 in comparison with the average number of these events over the same time period during the prior 2 years (16.8 vs. 5.1/month, p<0.01). There was a sharp increase in cardiovascular events in the first week after the disaster. A second peak was observed 7 weeks after the disaster. Two patients with angina attack were previously diagnosed as having vasospastic angina. The incidence rate of AMI did not increase. An increase in cardiovascular events was observed after severe rainfalls and mud slides. Prevention of disaster-induced cardiovascular events should be a priority regardless of the magnitude of the disaster. Copyright © 2014. Published by Elsevier Ltd.

  5. Climate change effects on macrofaunal litter decomposition: the interplay of temperature, body masses and stoichiometry.

    PubMed

    Ott, David; Rall, Björn C; Brose, Ulrich

    2012-11-05

    Macrofauna invertebrates of forest floors provide important functions in the decomposition process of soil organic matter, which is affected by the nutrient stoichiometry of the leaf litter. Climate change effects on forest ecosystems include warming and decreasing litter quality (e.g. higher C : nutrient ratios) induced by higher atmospheric CO(2) concentrations. While litter-bag experiments unravelled separate effects, a mechanistic understanding of how interactions between temperature and litter stoichiometry are driving decomposition rates is lacking. In a laboratory experiment, we filled this void by quantifying decomposer consumption rates analogous to predator-prey functional responses that include the mechanistic parameters handling time and attack rate. Systematically, we varied the body masses of isopods, the environmental temperature and the resource between poor (hornbeam) and good quality (ash). We found that attack rates increased and handling times decreased (i) with body masses and (ii) temperature. Interestingly, these relationships interacted with litter quality: small isopods possibly avoided the poorer resource, whereas large isopods exhibited increased, compensatory feeding of the poorer resource, which may be explained by their higher metabolic demands. The combination of metabolic theory and ecological stoichiometry provided critically important mechanistic insights into how warming and varying litter quality may modify macrofaunal decomposition rates.

  6. The effect of climate variability on urinary stone attacks: increased incidence associated with temperature over 18 °C: a population-based study.

    PubMed

    Park, Hyoung Keun; Bae, Sang Rak; Kim, Satbyul E; Choi, Woo Suk; Paick, Sung Hyun; Ho, Kim; Kim, Hyeong Gon; Lho, Yong Soo

    2015-02-01

    The aim of this study was to evaluate the effect of seasonal variation and climate parameters on urinary tract stone attack and investigate whether stone attack is increased sharply at a specific point. Nationwide data of total urinary tract stone attack numbers per month between January 2006 and December 2010 were obtained from the Korean Health Insurance Review and Assessment Service. The effects of climatic factors on monthly urinary stone attack were assessed using auto-regressive integrated moving average (ARIMA) regression method. A total of 1,702,913 stone attack cases were identified. Mean monthly and monthly average daily urinary stone attack cases were 28,382 ± 2,760 and 933 ± 85, respectively. The stone attack showed seasonal trends of sharp incline in June, a peak plateau from July to September, and a sharp decline after September. The correlation analysis showed that ambient temperature (r = 0.557, p < 0.001) and relative humidity (r = 0.513, p < 0.001) were significantly associated with urinary stone attack cases. However, after adjustment for trends and seasonality, ambient temperature was the only climate factor associated with the stone attack cases in ARIMA regression test (p = 0.04). Threshold temperature was estimated as 18.4 °C. Risk of urinary stone attack significantly increases 1.71% (1.02-2.41 %, 95% confidence intervals) with a 1 °C increase of ambient temperature above the threshold point. In conclusion, monthly urinary stone attack cases were changed according to seasonal variation. Among the climates variables, only temperature had consistent association with stone attack and when the temperature is over 18.4 °C, urinary stone attack would be increased sharply.

  7. The Effect of Varying Oxygen Concentration on Corixid Survival.

    ERIC Educational Resources Information Center

    Malcolm, Paul

    1980-01-01

    Describes a study using two genera of aquatic insects that demonstrates how nonlethal falls in oxygen concentration affect the rate of surfacing of bottom-feeding Coroxidae and how this affects their survival by increasing their proneness to attacks by surface-feeding Notonectidae. (CS)

  8. Emergence of norovirus GI.2 outbreaks in military camps in Singapore.

    PubMed

    Ho, Zheng Jie Marc; Vithia, Gunalan; Ng, Ching Ging; Maurer-Stroh, Sebastian; Tan, Clive M; Loh, Jimmy; Lin, Tzer Pin Raymond; Lee, Jian Ming Vernon

    2015-02-01

    Simultaneous acute gastroenteritis (AGE) outbreaks occurred at two military camps. This study details the epidemiological findings, explores possible origins, and discusses preventive measures. Investigations included attack rate surveys, symptom surveys, hygiene inspections, and the testing of water, food, and stool samples. DNA/RNA was extracted from stool samples and amplified via real-time reverse transcription PCR (RT-PCR). Partial and full-length capsid nucleotide sequences were obtained, phylogenetic relationships inferred, and homology modelling of antigenic sites performed. The military outbreaks involved 775 persons and were preceded by two AGE outbreaks at restaurants in the local community. The outbreak was longer and larger in the bigger camp (21 days, attack rate 15.0%) than the smaller camp (6 days, attack rate 8.3%). Of 198 stool samples, norovirus GI.2 was detected in 32.5% (larger camp) and 28.6% (smaller camp). These were essentially identical to preceding community outbreaks. Antigenic site homology modelling also showed differences between identified and more common AGE outbreak strains (norovirus GII.4). Differences observed highlight difficulties in controlling person-to-person outbreaks among large groups in close proximity (e.g., military trainees). Distinct differences in antigenic sites may have contributed to increased immunological susceptibility of the soldiers to infection. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  9. Is population structure sufficient to generate area-level inequalities in influenza rates? An examination using agent-based models.

    PubMed

    Kumar, Supriya; Piper, Kaitlin; Galloway, David D; Hadler, James L; Grefenstette, John J

    2015-09-23

    In New Haven County, CT (NHC), influenza hospitalization rates have been shown to increase with census tract poverty in multiple influenza seasons. Though multiple factors have been hypothesized to cause these inequalities, including population structure, differential vaccine uptake, and differential access to healthcare, the impact of each in generating observed inequalities remains unknown. We can design interventions targeting factors with the greatest explanatory power if we quantify the proportion of observed inequalities that hypothesized factors are able to generate. Here, we ask if population structure is sufficient to generate the observed area-level inequalities in NHC. To our knowledge, this is the first use of simulation models to examine the causes of differential poverty-related influenza rates. Using agent-based models with a census-informed, realistic representation of household size, age-structure, population density in NHC census tracts, and contact rates in workplaces, schools, households, and neighborhoods, we measured poverty-related differential influenza attack rates over the course of an epidemic with a 23 % overall clinical attack rate. We examined the role of asthma prevalence rates as well as individual contact rates and infection susceptibility in generating observed area-level influenza inequalities. Simulated attack rates (AR) among adults increased with census tract poverty level (F = 30.5; P < 0.001) in an epidemic caused by a virus similar to A (H1N1) pdm09. We detected a steeper, earlier influenza rate increase in high-poverty census tracts-a finding that we corroborate with a temporal analysis of NHC surveillance data during the 2009 H1N1 pandemic. The ratio of the simulated adult AR in the highest- to lowest-poverty tracts was 33 % of the ratio observed in surveillance data. Increasing individual contact rates in the neighborhood did not increase simulated area-level inequalities. When we modified individual susceptibility such that it was inversely proportional to household income, inequalities in AR between high- and low-poverty census tracts were comparable to those observed in reality. To our knowledge, this is the first study to use simulations to probe the causes of observed inequalities in influenza disease patterns. Knowledge of the causes and their relative explanatory power will allow us to design interventions that have the greatest impact on reducing inequalities. Differential exposure due to population structure in our realistic simulation model explains a third of the observed inequality. Differential susceptibility to disease due to prevailing chronic conditions, vaccine uptake, and smoking should be considered in future models in order to quantify the role of additional factors in generating influenza inequalities.

  10. A Brief Interview to Detect Panic Attacks and Panic Disorder in Emergency Department Patients with Cardiopulmonary Complaints.

    PubMed

    Sung, Sharon C; Rush, A John; Earnest, Arul; Lim, Leslie E C; Pek, Maeve P P; Choi, Joen M F; Ng, Magdalene P K; Ong, Marcus E H

    2018-01-01

    Patients with panic-related anxiety often initially present to the emergency department (ED) complaining of respiratory or cardiac symptoms, but rates of detection of panic symptoms by ED physicians remain low. This study was undertaken to evaluate the relevance of panic attacks and panic disorder in ED patients who present with cardiopulmonary symptoms and to determine whether a brief symptom-based tool could be constructed to assist in rapid recognition of panic-related anxiety in the ED setting. English-speaking adult ED patients with a chief complaint of palpitations, chest pain, dizziness, or difficulty breathing were evaluated for the presence of panic attacks and panic disorder with the Structured Clinical Interview for DSM-IV Axis I Disorders. Participants completed self-report measures to assess panic-related symptoms, comorbid psychiatric conditions, health-related disability, and health service use. In this sample (N=200), 23.5% had panic attacks and 23.0% had panic disorder. Both groups reported higher rates of panic attack symptoms, greater psychiatric comorbidity, greater health-related disability, and higher rates of ED and mental health service use compared with those without either condition. A brief 7-item tool consisting of panic symptoms identified patients with panic attacks or panic disorder with 85% accuracy (area under the curve=0.90, sensitivity=82%, specificity=88%). Patients with panic attacks or panic disorder commonly present to the ED, but often go unrecognized. A brief 7-item clinician rating scale accurately identifies these patients among those ED patients presenting with cardiopulmonary complaints.

  11. Sea lamprey mark type, wounding rate, and parasite-host preference and abundance relationships for lake trout and other species in Lake Ontario

    USGS Publications Warehouse

    Lantry, Brian F.; Adams, Jean; Christie, Gavin; Schaner, Teodore; Bowlby, James; Keir, Michael; Lantry, Jana; Sullivan, Paul; Bishop, Daniel; Treska, Ted; Morrison, Bruce

    2015-01-01

    We examined how attack frequency by sea lampreys on fishes in Lake Ontario varied in response to sea lamprey abundance and preferred host abundance (lake trout > 433 mm). For this analysis we used two gill net assessment surveys, one angler creel survey, three salmonid spawning run datasets, one adult sea lamprey assessment, and a bottom trawl assessment of dead lake trout. The frequency of fresh sea lamprey marks observed on lake trout from assessment surveys was strongly related to the frequency of sea lamprey attacks observed on salmon and trout from the creel survey and spawning migrations. Attack frequencies on all salmonids examined were related to the ratio between the abundances of adult sea lampreys and lake trout. Reanalysis of the susceptibility to sea lamprey attack for lake trout strains stocked into Lake Ontario reaffirmed that Lake Superior strain lake trout were among the most and Seneca Lake strain among the least susceptible and that Lewis Lake strain lake trout were even more susceptible than the Superior strain. Seasonal attack frequencies indicated that as the number of observed sea lamprey attacks decreased during June–September, the ratio of healing to fresh marks also decreased. Simulation of the ratios of healing to fresh marks indicated that increased lethality of attacks by growing sea lampreys contributed to the decline in the ratios and supported laboratory studies about wound healing duration.

  12. Sea lamprey mark type, marking rate, and parasite-host relationships for lake trout and other species in Lake Ontario

    USGS Publications Warehouse

    Lantry, Brian F.; Adams, Jean V.; Christie, Gavin; Schaner, Teodore; Bowlby, James; Keir, Michael; Lantry, Jana; Sullivan, Paul; Bishop, Daniel; Treska, Ted; Morrison, Bruce

    2015-01-01

    We examined how attack frequency by sea lampreys on fishes in Lake Ontario varied in response to sea lamprey abundance and preferred host abundance (lake trout > 433 mm). For this analysis we used two gill net assessment surveys, one angler creel survey, three salmonid spawning run datasets, one adult sea lamprey assessment, and a bottom trawl assessment of dead lake trout. The frequency of fresh sea lamprey marks observed on lake trout from assessment surveys was strongly related to the frequency of sea lamprey attacks observed on salmon and trout from the creel survey and spawning migrations. Attack frequencies on all salmonids examined were related to the ratio between the abundances of adult sea lampreys and lake trout. Reanalysis of the susceptibility to sea lamprey attack for lake trout strains stocked into Lake Ontario reaffirmed that Lake Superior strain lake trout were among the most and Seneca Lake strain among the least susceptible and that Lewis Lake strain lake trout were even more susceptible than the Superior strain. Seasonal attack frequencies indicated that as the number of observed sea lamprey attacks decreased during June–September, the ratio of healing to fresh marks also decreased. Simulation of the ratios of healing to fresh marks indicated that increased lethality of attacks by growing sea lampreys contributed to the decline in the ratios and supported laboratory studies about wound healing duration.

  13. The 2015 and 2016 terrorist attacks in France: was there a short-term impact on hospitalizations for cardiovascular disease?

    PubMed

    Chatignoux, Edouard; Gabet, Amélie; Moutengou, Elodie; Pirard, Philippe; Motreff, Yvon; Bonaldi, Christophe; Olié, Valérie

    2018-01-01

    The terrorist attacks in Paris and Nice in 2015 and 2016 generated widespread emotional stress in France. Given that acute emotional stress is a well-known trigger for cardiovascular disease, we investigated whether these attacks had any short-term impact on hospitalizations for acute cardiovascular disease in France. Annual hospital discharge data from 2009 to 2016 were extracted from the French Hospital Discharge Database. All hospitalizations with a primary diagnosis of acute coronary syndrome, heart failure, or stroke were selected. Generalized additive Poisson models were used to differentiate "unusual" variations in daily hospitalization numbers in the 15 days following the attacks from the expected background hospitalization rate. The average daily number of hospitalizations was 396.4 for acute coronary syndrome, 598.6 for heart failure, and 334.6 for stroke. The daily mean number of hospitalizations for heart failure and stroke was higher in the 15 days following each attack compared with the reference periods. However, multivariate analysis showed no significant variation in the risk of hospitalization in the days following the attacks. Watching events unfold on television, no matter how dramatic, was not a sufficiently potent trigger for cardiovascular disease, although it may have led to an increase in hospitalizations for stress or anxiety. The 2015 and 2016 terrorist attacks do not seem to have had any measurable short-term impact on hospitalizations for cardiovascular disease either in the Paris and Nice regions or in the rest of France.

  14. Coronary heart disease risk in patients with stroke or transient ischemic attack and no known coronary heart disease: findings from the Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial.

    PubMed

    Amarenco, Pierre; Goldstein, Larry B; Sillesen, Henrik; Benavente, Oscar; Zweifler, Richard M; Callahan, Alfred; Hennerici, Michael G; Zivin, Justin A; Welch, K Michael A

    2010-03-01

    Noncoronary forms of atherosclerosis (including transient ischemic attacks or stroke of carotid origin or >50% stenosis of the carotid artery) are associated with a 10-year vascular risk of >20% and are considered as a coronary heart disease (CHD) -risk equivalent from the standpoint of lipid management. The Stroke Prevention by Aggressive Reduction in Cholesterol Levels (SPARCL) trial included patients with stroke or transient ischemic attack and no known CHD regardless of the presence of carotid atherosclerosis. We evaluated the risk of developing clinically recognized CHD in SPARCL patients. A total of 4731 patients (mean age, 63 years) was randomized to 80 mg/day atorvastatin placebo. The rates of major coronary event, any CHD event, and any revascularization procedure were evaluated. After 4.9 years of follow-up, the risks of a major coronary event and of any CHD end point in the placebo group were 5.1% and 8.6%, respectively. The rate of outcome of stroke decreased over time, whereas the major coronary event rate was stable. Relative to those having a large vessel-related stroke at baseline, those having a transient ischemic attack, hemorrhagic stroke, small vessel stroke, or a stroke of unknown cause had similar absolute rates for a first major coronary event and for any CHD event; transient ischemic attack, small vessel, and unknown cause groups had lower absolute revascularization procedure rates. Major coronary event, any CHD event, and any revascularization procedure rates were similarly reduced in all baseline stroke subtypes in the atorvastatin arm compared with placebo with no heterogeneity between groups. CHD risk can be substantially reduced by atorvastatin therapy in patients with recent stroke or transient ischemic attack regardless of stroke subtype.

  15. Teacher Victimization in Authoritative School Environments

    ERIC Educational Resources Information Center

    Kapa, Ryan R.; Luke, Jeremy; Moulthrop, Dorothy; Gimbert, Belinda

    2018-01-01

    Background: Victimization in schools is not limited to students. Teachers increasingly face threats and attacks from their students. An authoritative school environment, characterized by high structure and support, has been associated with lower rates of victimization. The purpose of this study was to explore the relationship between authoritative…

  16. Rare male aggression directed toward females in a female-dominated society: Baiting behavior in the spotted hyena

    USGS Publications Warehouse

    Szykman, Micaela; Engh, Anne L.; Van Horn, Russell C.; Boydston, Erin E.; Scribner, Kim T.; Holekamp, Kay E.

    2003-01-01

    Spotted hyenas (Crocuta crocuta) are gregarious carnivores. The females are socially dominant to males, and adult males rarely direct aggression toward adult females. This study analyzed all cases in which adult immigrant males behaved aggressively toward adult females in a large population of free-living hyenas in Kenya, observed for 11 years. Our goals were to describe the conditions under which male attacks on females occur, and address possible adaptive functions. Most aggression directed by adult immigrant males against females occurred when coalitions of two or more males attacked a single adult female, who typically responded by defending herself and fighting back. Male aggression against females frequently occurred at sites of ungulate kills, but males never behaved aggressively toward females over food, and all male attacks on females were unprovoked. Although no mounting or other copulatory behaviors ever occurred during or immediately after an attack, the number of male attacks on females peaked around the time of conception. Daily rates at which males attacked females did not vary with female social rank. However, daily attack rates did vary significantly with female reproductive state, and the highest rates of male attack on females were observed during the two stages of the reproductive cycle during which females were most likely to conceive litters. The adaptive significance of male aggression against females in this species remains unknown, but a tight association between male attacks on females and a female's time of conception provides strong evidence of some role for male aggression in hyena sexual behavior. In particular, our data are consistent with hypotheses suggesting that male aggression toward females in this species either serves to inform females about male fitness or represents sexual harassment.

  17. Theoretical Analysis of the Longitudinal Behavior of an Automatically Controlled Supersonic Interceptor During the Attack Phase

    NASA Technical Reports Server (NTRS)

    Gates, Ordway B., Jr.; Woodling, C. H.

    1959-01-01

    Theoretical analysis of the longitudinal behavior of an automatically controlled supersonic interceptor during the attack phase against a nonmaneuvering target is presented. Control of the interceptor's flight path is obtained by use of a pitch rate command system. Topics lift, and pitching moment, effects of initial tracking errors, discussion of normal acceleration limited, limitations of control surface rate and deflection, and effects of neglecting forward velocity changes of interceptor during attack phase.

  18. Risk of Wheezing Attacks in Infants With Transient Tachypnea Newborns.

    PubMed

    Golshantafti, Mohammad; Yavari, Tahereh; Afrand, Mohammadhosain

    2016-02-01

    The most common reason of respiratory distress in the newborn is transient tachypnea of the newborn (TTN). There are some reports saying that TTN is associated with increased frequencies of wheezing attacks. The aims of this study were to determine the risk factors associated with TTN and to determine the association between TTN and the development of wheezing syndromes in early life. In a historical cohort study, we recorded the characteristics of 70 infants born at the Shohadaye Kargar Hospital in Yazd between March 2005 and March 2009 and who were hospitalized because of TTN in the neonatal intensive-care unit. We called their parents at least four years after the infants were discharged from the hospital and asked about any wheezing attacks. Seventy other infants with no health problems during the newborn period were included in the study as the control group. The rate of wheezing attacks in newborns with TTN was more than patients with no TTN diagnosis (P = 0.014). TTN was found to be an independent risk factor for later wheezing attacks (relative risk [RR] = 2.8). The most obvious finding of this study was that TTN was an independent risk factor for wheezing attacks. So long-term medical care is suggested for these patients who may be at risk, because TTN may not be as transient as has been previously thought.

  19. Human Papillomavirus Status and the Risk of Cerebrovascular Events Following Radiation Therapy for Head and Neck Cancer.

    PubMed

    Addison, Daniel; Seidelmann, Sara B; Janjua, Sumbal A; Emami, Hamed; Staziaki, Pedro V; Hallett, Travis R; Szilveszter, Bálint; Lu, Michael T; Cambria, Richard P; Hoffmann, Udo; Chan, Annie W; Wirth, Lori J; Neilan, Tomas G

    2017-08-30

    Radiation therapy (RT) is a standard treatment for head and neck cancer; however, it is associated with inflammation, accelerated atherosclerosis, and cerebrovascular events (CVEs; stroke or transient ischemic attack). Human papillomavirus (HPV) is found in nearly half of head and neck cancers and is associated with inflammation and atherosclerosis. Whether HPV confers an increased risk of CVEs after RT is unknown. Using an institutional database, we identified all consecutive patients treated with RT from 2002 to 2012 for head and neck cancer who were tested for HPV. The outcome of interest was the composite of ischemic stroke and transient ischemic attack, and the association between HPV and CVEs was assessed using Cox proportional hazard models, competing risk analysis, and inverse probability weighting. Overall, 326 participants who underwent RT for head and neck cancer were tested for HPV (age 59±12 years, 75% were male, 9% had diabetes mellitus, 45% had hypertension, and 61% were smokers), of which 191 (59%) were tumor HPV positive. Traditional risk factors for CVEs were similar between HPV-positive and -negative patients. Over a median follow-up of 3.4 years, there were 18 ischemic strokes and 5 transient ischemic attacks (event rate of 1.8% per year). The annual event rate was higher in the HPV-positive patients compared with the HPV-negative patients (2.6% versus 0.9%, P =0.002). In a multivariable model, HPV-positive status was associated with a >4 times increased risk of CVEs (hazard ratio: 4.4; 95% confidence interval, 1.5-13.2; P =0.008). In this study, HPV-positive status is associated with an increased risk of stroke or transient ischemic attack following RT for head and neck cancer. © 2017 The Authors. Published on behalf of the American Heart Association, Inc., by Wiley.

  20. Experimental implementation of non-Gaussian attacks on a continuous-variable quantum-key-distribution system.

    PubMed

    Lodewyck, Jérôme; Debuisschert, Thierry; García-Patrón, Raúl; Tualle-Brouri, Rosa; Cerf, Nicolas J; Grangier, Philippe

    2007-01-19

    An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigated experimentally. By varying the interception fraction, one can implement a family of attacks where the eavesdropper totally controls the channel parameters. In general, such attacks add excess noise in the channel, and may also result in non-Gaussian output distributions. We implement and characterize the measurements needed to detect these attacks, and evaluate experimentally the information rates available to the legitimate users and the eavesdropper. The results are consistent with the optimality of Gaussian attacks resulting from the security proofs.

  1. Patch time allocation and oviposition behavior in response to patch quality and the presence of a generalist predator in Meteorus pulchricornis (Hymenoptera: Braconidae).

    PubMed

    Sheng, Sheng; Ling, Meng; Fu-An, Wu; Baoping, Li

    2015-01-01

    Foraging parasitoids often must estimate local risk of predation just as they must estimate local patch value. Here, we investigate the effects a generalist predator Chlaenius bioculatus (Coleoptera: Carabidae), has on the oviposition behavior and the patch residence decisions of a solitary parasitoid Meteorus pulchricornis (Hymenoptera: Braconidae) in response to the varying host quality of Spodoptera litura (Lepidoptera: Noctuidae) larvae (L2 and L4). M. pulchricornis attacked more L4 than on L2 hosts, with the difference in attack rate varying depending on predation treatments, greater in the presence (either actively feeding or not) of the predator than in the absence of it. The parasitoid attacked fewer L2 and L4 hosts when the predator was actively feeding than when it was not feeding or not present in the patch. M. pulchricornis decreased the patch leaving tendency with increasing rejections of hosts, but increased the tendency in response to the presence of the predator as compared with the absence of it, and furthermore, increased the patch leaving tendency when the predator was actively feeding as compared with when it was not. Our study suggests that M. pulchricornis can exploit high quality patches while minimizing predation risk, by attacking more hosts in high quality patches while reducing total patch time in response to risk of predation. © The Author 2015. Published by Oxford University Press on behalf of the Entomological Society of America.

  2. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.

    PubMed

    Yu, Si; Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.

  3. A Security-Awareness Virtual Machine Management Scheme Based on Chinese Wall Policy in Cloud Computing

    PubMed Central

    Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much. PMID:24688434

  4. Increasing trends of acute myocardial infarction in Spain: the MONICA-Catalonia Study.

    PubMed

    Sans, Susana; Puigdefábregas, Ana; Paluzie, Guillermo; Monterde, David; Balaguer-Vintró, Ignacio

    2005-03-01

    To assess coronary mortality and morbidity secular trends in Spain. Acute coronary events occurring in both sexes at ages 35-74 years between 1985 and 1997, were monitored in a geographical area of Catalonia, through a population-based registry. Information was collected from annual discharge lists of 78 hospitals and from death certificates, and validated following the methods and quality control of the World Health Organization MONItoring Trends and Determinants in CArdiovascular Disease Project (MONICA). Registration included 19 119 valid events (14 221 in men, 4898 in women) of which 30% were fatal and 41% were definite acute myocardial infarctions. Average attack rates were 315 per 100 000 (95% CI 300-329) and 80 (75-86) in men and women, respectively. Incidence (first-ever event) rates were 209 (194-224) and 56 (52-60) per 100 000. Attack rates increased annually by 2.1% (0.3-4.1) and 1.8% (-0.9 to +4.6). Average 28-day case fatality was 46% (44-47) in men decreasing significantly by 1.4 and 53% (51-55) in women with no change. Fatal trends remained stable. Nationwide morbidity statistics showed similar trends. Acute coronary syndromes are rising in Spanish men.

  5. Increasing employee awareness of the signs and symptoms of heart attack and the need to use 911 in a State Health Department.

    PubMed

    Fogle, Crystelle C; Oser, Carrie S; Blades, Lynda L; Harwell, Todd S; Helgerson, Steven D; Gohdes, Dorothy; Spence, Michael R; Dawson, Drew E

    2004-07-01

    Early recognition of the signs and symptoms of a heart attack can lead to reduced morbidity and mortality. A workplace intervention was conducted among 523 Montana state health department employees in 2003 to increase awareness of the signs and symptoms of heart attack and the need to use 911. All employees received an Act in Time to Heart Attack Signs brochure and wallet card with their paychecks. Act in Time posters were placed in key workplace areas. A weekly e-mail message, including a contest entry opportunity addressing the signs and symptoms of heart attack, was sent to all employees. Baseline and follow-up telephone surveys were conducted to evaluate intervention effectiveness. Awareness of heart attack signs and symptoms and the need to call 911 increased significantly among employees from baseline to follow-up: pain or discomfort in the jaw, neck, or back (awareness increased from 69% to 91%); feeling weak, light-headed, or faint (awareness increased from 79% to 89%); call 911 if someone is having a heart attack or stroke (awareness increased from 84% to 90%). Awareness of chest pain, pain or discomfort in the arms or shoulders, and shortness of breath were more than 90% at baseline and did not increase significantly at follow-up. At baseline, 69% of respondents correctly reported five or more of the signs and symptoms of heart attack; 89% reported correctly at follow-up. This low-cost workplace intervention increased awareness of the signs and symptoms of heart attack and the need to call 911.

  6. Cyclic vomiting associated with excessive dopamine in Riley-day syndrome.

    PubMed

    Norcliffe-Kaufmann, Lucy J; Axelrod, Felicia B; Kaufmann, Horacio

    2013-02-01

    To analyze the neurochemical profile during the recurrent attacks of nausea and vomiting in patients with Riley-day syndrome. One of the most disabling features of patients with Riley-day syndrome are recurrent attacks of severe nausea/retching/vomiting accompanied by hypertension, tachycardia, and skin flushing, usually triggered by emotional or other stresses. We monitored blood pressure and heart rate and measured plasma catecholamines during typical dysautonomic crises triggered by emotionally charged situations. For comparison, measurements were repeated at follow-up after the symptoms had resolved and the patients were feeling calm and well. During a typical attack, patients were hypertensive and tachycardic. In all patients, circulating levels of norepinephrine (P < 0.002) and dopamine (P < 0.007) increased significantly. Activation of dopamine receptors in the chemoreceptor trigger zone may explain the cyclic nausea/retching/vomiting of patients with Riley-day syndrome.

  7. Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano

    2018-05-01

    We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 107-109 quantum signal transmissions, depending on loss and noise, and on the required level of security.

  8. Emotional and cognitive changes during and post a near fatal heart attack and one-year after: a case study.

    PubMed

    Lane, Andrew M; Godfrey, Richard

    2010-01-01

    This case study reports on changes in emotions before and during an unexpected heart rate in a young, apparently healthy male with a life-long history of exercise in the absence of family history of heart problems. He completed the Brunel Mood Scale (Terry et al. , 2003) to assess emotions before, during, and after the heart attack, and also describing his thoughts during these periods. Results indicate he experienced unpleasant emotions in the build up to the heart attack, feelings he attributed at the time to frustration to achieve fitness goals. He maintained an exercise regime prior to having a heart attack, a finding consistent with previous research suggesting that early diagnosis, although vital for survival, is not likely to be identified among seemingly healthy individuals. During the heart attack, he experienced a rapid emotional change characterised by a rapid increase in anger coupled with thoughts of needing to survive. The intensity of emotions and regulation strategies employed before and during the heart attack provide insight this experience, and we suggest future research should investigate emotional change during adverse conditions. Key pointsThe present case study details emotions experienced and attempts to regulate these emotions before, during and post a heart attack. Unpleasant emotions experienced before the heart were attributed to lack of progress toward fitness goals, a perception that is plausible as he was a regular exerciser.Early identification of heart attack is critical as "Time is Muscle" (Whyte et al., 2009) and therefore even people perceived to be at low risk should consider the possibility of such an eventuality, and seek medical treatment early in the process.

  9. Effects of the Sports Level, Format of the Game and Task Condition on Heart Rate Responses, Technical and Tactical Performance of Youth Basketball Players

    PubMed Central

    Clemente, Filipe Manuel; González-Víllora, Sixto; Delextrat, Anne; Martins, Fernando Manuel Lourenço; Vicedo, Juan Carlos Pastor

    2017-01-01

    Abstract The aim of this study was to analyze the effect of different small-sided and conditioning games (SSCG) with different tactical contents on heart rate responses, technical performance and collective organization of youth basketball players of different performance levels. Twenty male basketball players from U14 (13.7 ± 0.8 years old; 4.2 ± 1.4 years of practice) and U16 (15.3 ± 1.1 years old; 6.4 ± 2.1 years of practice) participated in this research study. The two-way MANOVA revealed that the sports level (p = 0.009; ηp2 = 0.151), format (p = 0.001; ηp2 = 0.246) and task condition (p = 0.023; ηp2 = 0.104; small effect size) had significant main effects on heart rate responses. It was also found that the format (p = 0.001; ηp2 = 0.182) had significant main effects on technical performance. A smaller format significantly increased the heart rate, volume of play, efficiency index and collective density during attacking plays. The SSCG with attacking content statistically increased the heart rate, efficiency index and performance score. Therefore, this study revealed that different SSCGs with tactical content influenced the physiological responses of youth players. PMID:28828085

  10. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.

    PubMed

    Pirandola, Stefano; Braunstein, Samuel L; Lloyd, Seth

    2008-11-14

    We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.

  11. Timing of prophylactic surgery in prevention of diverticulitis recurrence: a cost-effectiveness analysis.

    PubMed

    Richards, Robert J; Hammitt, James K

    2002-09-01

    Although surgery is recommended after two or more attacks of uncomplicated diverticulitis, the optimal timing for surgery in terms of cost-effectiveness is unknown. A Markov model was used to compare the costs and outcomes of performing surgery after one, two, or three uncomplicated attacks in 60-year-old hypothetical cohorts. Transition state probabilities were assigned values using published data and expert opinion. Costs were estimated from Medicare reimbursement rates. Surgery after the third attack is cost saving, yielding more years of life and quality adjusted life years at a lower cost than the other two strategies. The results were not sensitive to many of the variables tested in the model or to changes made in the discount rate (0-5%). In conclusion, performing prophylactic resection after the third attack of diverticulitis is cost saving in comparison to resection performed after the first or second attacks and remains cost-effective during sensitivity analysis.

  12. Predator versus Prey: Locust Looming-Detector Neuron and Behavioural Responses to Stimuli Representing Attacking Bird Predators

    PubMed Central

    Santer, Roger D.; Rind, F. Claire; Simmons, Peter J.

    2012-01-01

    Many arthropods possess escape-triggering neural mechanisms that help them evade predators. These mechanisms are important neuroethological models, but they are rarely investigated using predator-like stimuli because there is often insufficient information on real predator attacks. Locusts possess uniquely identifiable visual neurons (the descending contralateral movement detectors, DCMDs) that are well-studied looming motion detectors. The DCMDs trigger ‘glides’ in flying locusts, which are hypothesised to be appropriate last-ditch responses to the looms of avian predators. To date it has not been possible to study glides in response to stimuli simulating bird attacks because such attacks have not been characterised. We analyse video of wild black kites attacking flying locusts, and estimate kite attack speeds of 10.8±1.4 m/s. We estimate that the loom of a kite’s thorax towards a locust at these speeds should be characterised by a relatively low ratio of half size to speed (l/|v|) in the range 4–17 ms. Peak DCMD spike rate and gliding response occurrence are known to increase as l/|v| decreases for simple looming shapes. Using simulated looming discs, we investigate these trends and show that both DCMD and behavioural responses are strong to stimuli with kite-like l/|v| ratios. Adding wings to looming discs to produce a more realistic stimulus shape did not disrupt the overall relationships of DCMD and gliding occurrence to stimulus l/|v|. However, adding wings to looming discs did slightly reduce high frequency DCMD spike rates in the final stages of object approach, and slightly delay glide initiation. Looming discs with or without wings triggered glides closer to the time of collision as l/|v| declined, and relatively infrequently before collision at very low l/|v|. However, the performance of this system is in line with expectations for a last-ditch escape response. PMID:23209660

  13. Effect of a rotating propeller on the separation angle of attack and distortion in ducted propeller inlets

    NASA Technical Reports Server (NTRS)

    Boldman, D. R.; Iek, C.; Hwang, D. P.; Larkin, M.; Schweiger, P.

    1993-01-01

    The present study represents an extension of an earlier wind tunnel experiment performed with the P&W 17-in. Advanced Ducted Propeller (ADP) Simulator operating at Mach 0.2. In order to study the effects of a rotating propeller on the inlet flow, data were obtained in the UTRC 10- by 15-Foot Large Subsonic Wind Tunnel with the same hardware and instrumentation, but with the propeller removed. These new tests were performed over a range of flow rates which duplicated flow rates in the powered simulator program. The flow through the inlet was provided by a remotely located vacuum source. A comparison of the results of this flow-through study with the previous data from the powered simulator indicated that in the conventional inlet the propeller produced an increase in the separation angle of attack between 4.0 deg at a specific flow of 22.4 lb/sec-sq ft to 2.7 deg at a higher specific flow of 33.8 lb/sec-sq ft. A similar effect on separation angle of attack was obtained by using stationary blockage rather than a propeller.

  14. Higher risk of venous thrombosis associated with drospirenone-containing oral contraceptives: a population-based cohort study

    PubMed Central

    Gronich, Naomi; Lavi, Idit; Rennert, Gad

    2011-01-01

    Background: Combined oral contraceptives are a common method of contraception, but they carry a risk of venous and arterial thrombosis. We assessed whether use of drospirenone was associated with an increase in thrombotic risk relative to third-generation combined oral contraceptives. Methods: Using computerized records of the largest health care provider in Israel, we identified all women aged 12 to 50 years for whom combined oral contraceptives had been dispensed between Jan. 1, 2002, and Dec. 31, 2008. We followed the cohort until 2009. We used Poisson regression models to estimate the crude and adjusted rate ratios for risk factors for venous thrombotic events (specifically deep vein thrombosis and pulmonary embolism) and arterial thromboic events (specifically transient ischemic attack and cerebrovascular accident). We performed multivariable analyses to compare types of contraceptives, with adjustment for the various risk factors. Results: We identified a total of 1017 (0.24%) venous and arterial thrombotic events among 431 223 use episodes during 819 749 woman-years of follow-up (6.33 venous events and 6.10 arterial events per 10 000 woman-years). In a multivariable model, use of drospirenone carried an increased risk of venous thrombotic events, relative to both third-generation combined oral contraceptives (rate ratio [RR] 1.43, 95% confidence interval [CI] 1.15–1.78) and second-generation combined oral contraceptives (RR 1.65, 95% CI 1.02–2.65). There was no increase in the risk of arterial thrombosis with drospirenone. Interpretation: Use of drospirenone-containing oral contraceptives was associated with an increased risk of deep vein thrombosis and pulmonary embolism, but not transient ischemic attack or cerebrovascular attack, relative to second- and third-generation combined oral contraceptives. PMID:22065352

  15. An Exploration of Hypotheses that Explain Herbivore and Pathogen Attack in Restored Plant Communities

    PubMed Central

    Blaisdell, G. Kai; Roy, Bitty A.; Pfeifer-Meister, Laurel; Bridgham, Scott D.

    2015-01-01

    Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to increased attack on one host species due to transmission from another host species, or enemy dilution may lead to reduced attack on a host that would otherwise have more attack, (iv) physical characteristics of the plant community may influence attack, and (v) plant vigor may affect attack. Restoration experiments with replicated plant communities provide an exceptional opportunity to explore these hypotheses. To explore the relative predictive strengths of these related hypotheses and to investigate the potential effect of several restoration site preparation techniques, we surveyed arthropod herbivore and fungal pathogen attack on the six most common native plant species in a restoration experiment. Multi-model inference revealed a weak but consistent negative correlation with pathogen attack and host diversity across the plant community, and no correlation between herbivory and host diversity. Our analyses also revealed host species-specific relationships between attack and abundance of the target host species, other native plant species, introduced plant species, and physical community characteristics. We found no relationship between enemy attack and plant vigor. We found minimal differences in plant community composition among several diverse site preparation techniques, and limited effects of site preparation techniques on attack. The strongest associations of community characteristics with attack varied among plant species with no community-wide patterns, suggesting that no single hypothesis successfully predicts the dominant community-wide trends in enemy attack. PMID:25699672

  16. Five-Year Mortality After Transient Ischemic Attack: Focus on Cardiometabolic Comorbidity and Hospital Readmission.

    PubMed

    Yousufuddin, Mohammed; Young, Nathan; Keenan, Lawrence; Olson, Tammy; Shultz, Jessica; Doyle, Taylor; Ahmmad, Eimad M; Arumaithurai, Kogulavadanan; Takahashi, Paul; Murad, Mohammad Hassan

    2018-03-01

    We aimed at providing estimates of mortality associated with cardiometabolic comorbidity and incident readmission from cardiometabolic as compared with noncardiometabolic conditions after a first transient ischemic attack. Between 2000 and 2015, patients hospitalized for a first transient ischemic attack were examined for cardiometabolic comorbidities (diabetes mellitus, coronary artery disease, heart failure, and atrial fibrillation), 5-year incident hospitalization, and time to death. Of 251 patients with transient ischemic attack, 134 (53%) had at least 1 and 55 (22%) had at least 2 cardiometabolic conditions. By 5 years, 491 readmissions (134 [27%] cardiometabolic and 357 [73%] noncardiometabolic) and 75 deaths (27 [36%] cardiometabolic and 47 [64%] noncardiometabolic) were observed. Mortality was increased with any concurrent cardiometabolic comorbidity (hazard ratio, 1.89; 95% confidence interval, 1.17-3.03; P =0.0089) with multiplicative mortality risk from a combination of coronary artery disease and heart failure. Each hospitalization was associated with a 1.5-fold risk of death (95% confidence interval, 1.37-1.64; P <0.0001). Risk of cardiometabolic and noncardiometabolic mortality was correlated with the corresponding category-specific readmission. Among patients hospitalized for first transient ischemic attack, 5-year mortality is associated with concurrent cardiometabolic comorbidity and rates of subsequent hospitalization. © 2018 American Heart Association, Inc.

  17. Hyperventilation

    MedlinePlus

    ... breathing; Respiratory rate - rapid and deep; Hyperventilation syndrome; Panic attack - hyperventilation; Anxiety - hyperventilation ... from an emotional cause such as during a panic attack. Or, it can be due to a medical ...

  18. Human behaviour can trigger large carnivore attacks in developed countries

    PubMed Central

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E.; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-01-01

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores. PMID:26838467

  19. Human behaviour can trigger large carnivore attacks in developed countries.

    PubMed

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-02-03

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores.

  20. Sub-threshold panic attacks and agoraphobic avoidance increase comorbidity of mental disorders: results from an adult general population sample.

    PubMed

    Pané-Farré, Christiane A; Fenske, Kristin; Stender, Jan P; Meyer, Christian; John, Ulrich; Rumpf, Hans-Jürgen; Hapke, Ulfert; Hamm, Alfons O

    2013-06-01

    Full-blown panic attacks are frequently associated with other mental disorders. Most comorbidity analyses did not discriminate between isolated panic attacks vs. panic attacks that occurred in the context of a panic disorder and rarely evaluated the impact of comorbid agoraphobia. Moreover, there are no larger scale epidemiological studies regarding the influence of sub-threshold panic attacks. 4075 German-speaking respondents aged 18-64 were interviewed using the fully structured Munich Composite International Diagnostic Interview. Limited symptom attacks, isolated panic attacks, and panic disorder were associated with other lifetime DSM-IV disorders with monotonically increasing odds and increasing tendency for multiple comorbidities across the three groups. The presence of agoraphobia was associated with more frequent comorbidity in all panic subgroups and also in persons who never experienced panic attacks. The present study suggests that populations with isolated or limited symptom should be carefully attended to in clinical practice, especially if agoraphobia is present. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Computational/Experimental Aeroheating Predictions for X-33. Phase 2; Vehicle

    NASA Technical Reports Server (NTRS)

    Hamilton, H. Harris, II; Weilmuenster, K. James; Horvath, Thomas J.; Berry, Scott A.

    1998-01-01

    Laminar and turbulent heating-rate calculations from an "engineering" code and laminar calculations from a "benchmark" Navier-Stokes code are compared with experimental wind-tunnel data obtained on several candidate configurations for the X-33 Phase 2 flight vehicle. The experimental data were obtained at a Mach number of 6 and a freestream Reynolds number ranging from 1 to 8 x 10(exp 6)/ft. Comparisons are presented along the windward symmetry plane and in a circumferential direction around the body at several axial stations at angles of attack from 20 to 40 deg. The experimental results include both laminar and turbulent flow. For the highest angle of attack some of the measured heating data exhibited a "non-laminar" behavior which caused the heating to increase above the laminar level long before "classical" transition to turbulent flow was observed. This trend was not observed at the lower angles of attack. When the flow was laminar, both codes predicted the heating along the windward symmetry plane reasonably well but under-predicted the heating in the chine region. When the flow was turbulent the LATCH code accurately predicted the measured heating rates. Both codes were used to calculate heating rates over the X-33 vehicle at the peak heating point on the design trajectory and they were found to be in very good agreement over most of the vehicle windward surface.

  2. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  3. [Status of acute upper respiratory infection, influenza-like illness, and influenza vaccination coverage among community residents in Jinan].

    PubMed

    Liu, Ying; Song, Shaoxia; Wang, Wei; Geng, Xingyi; Liu, Wen; Han, Debiao; Liu, Ti; Wu, Julong; Li, Zhong; Wang, Xianjun; Bi, Zhenqiang

    2015-12-01

    To analyze the status of acute upper respiratory infection and influenza-like illness (ILI) among community residents in Jinan in 2015, and to make a understand of the patient's medical treatment behavior and influenza vaccination coverage status in 2014. Balloting method and convenient sampling method were used to launch a household survey. The residents who had been in Jinan for more than 3 months were selected, to investigate the residents' attack ratio of acute upper respiratory and influenza-like from Jan. 8 to Feb. 7, 2015. Totally, 1 300 persons from 410 families were involved in this survey which recovered 1 241 valid questionnaires with the efficiency of 95.5%. Based on the national age-urban demographic statistics in 2010, the attack rates of acute respiratory infections, influenza-like illness were estimated by the direct standardization method, and the influenza vaccination rates were also calculated in this study. χ(2)-test method was used to compare the different status of incidence and vaccination among residents with different features. The attack rate of acute upper respiratory infection and influenza-like illness in Jinan from January 8, 2015 to February 7, 2015 were 30.2% (375 cases), and 6.1% (76 cases), respectively, with a standardized rate of 29.1% and 5.4%. 5.3% (66 cases) of the residents have vaccinated with the influenza vaccine inoculation, with an adjusted rate of 3.8%. The attack rate difference of acute upper respiratory tract infections was statistically significant between each age group (χ(2)=17.121, P= 0.002). The 0-4 age group had a highest attack rate (45.4%) of acute respiratory infection, while the 15-24 age group got the lowest (26.5%). 38.9% (146 cases) of patients went for a treatment in hospital. Among them, 37.7% (55 cases) of them selected the county level hospitals for treatment, 37.7% (55 cases) selected the community level hospitals, and 24.6% (36 cases) selected the individual clinic. Significant differences of influenza-like illness attack rate between each age group were also found in this study (χ(2)=76.79, P<0.001). 0-4 age group had the highest attack rate (22.7%). 81.6% (62 cases) of the ILI sought treatment in the hospital, of which 53.2% (33 cases) selected county level hospital or above, and 33.9% (21 cases) selected community hospital, and 12.9% (8 cases) selected the individual clinic. The attack rate of acute upper respiratory infections among the residents of Jinan was high, whereas that of influenza-like illness was relatively low. 0-4 age group had a higher risk of ILI than other age groups. Most of the cases were likely to take the treatment in large hospitals. In general, the coverage rate of influenza vaccination was relatively low.

  4. Functional Response of Aphidoletes aphidimyza Rondani (Diptera: Cecidomyiidae) to Aphis gossypii Glover (Hemiptera: Aphididae): Effects of Vermicompost and Host Plant Cultivar.

    PubMed

    Mottaghinia, L; Hassanpour, M; Razmjou, J; Hosseini, M; Chamani, E

    2016-02-01

    Interactions between natural enemies and herbivores may be affected by application of fertilizers and different cultivars. We investigated the functional response of the predatory gall midge, Aphidoletes aphidimyza Rondani (Diptera: Cecidomyiidae) larvae to the nymphs of the melon aphid, Aphis gossypii Glover (Hemiptera: Aphididae), reared on two commonly grown cucumber cultivars in Iran (Khasib and Karim) treated with different vermicompost/soil ratios (0:100, 10:90, 20:80, and 30:70%). Based on logistic regression analysis, A. aphidimyza revealed a type II functional response to the aphid in all treatments. Attack rates and handling times of A. aphidimyza larvae on different vermicompost/soil ratios ranged from 0.076 to 0.140 h(-1) and 0.969 to 1.164 h on Khasib and from 0.092 to 0.123 h(-1) and 0.905 to 1.229 h on Karim, respectively. Furthermore, increasing the density of the melon aphid on both cultivars amended with vermicompost/soil ratios resulted in increased prey consumption by the predator. Density of trichomes increased when plants received higher concentrations of vermicompost. So, trichomes may be responsible for different attack rates and handling times of A. aphidimyza on both cultivars.

  5. The epidemiology of physical attack and rape among crack-using women.

    PubMed

    Falck, R S; Wang, J; Carlson, R G; Siegal, H A

    2001-02-01

    This prospective study examines the epidemiology of physical attack and rape among a sample of 171 not-in-treatment, crack-cocaine using women. Since initiating crack use, 62% of the women reported suffering a physical attack. The annual rate of victimization by physical attack was 45%. Overall, more than half of the victims sought medical care subsequent to an attack. The prevalence of rape since crack use was initiated was 32%, and the annual rate was 11%. Among those women having been raped since they initiated crack use, 83% reported they were high on crack when the crime occurred as were an estimated 57% of the perpetrators. Logistic regression analyses showed that duration of crack use, arrest for prostitution, and some college education were predictors of having experienced a physical attack. Duration of crack use and a history of prostitution were predictors of suffering a rape. Drug abuse treatment programs must be sensitive to high levels of violence victimization experienced by crack-cocaine using women. Screening women for victimization, and treating the problems that emanate from it, may help make drug abuse treatment more effective.

  6. Predator personality structures prey communities and trophic cascades.

    PubMed

    Start, Denon; Gilbert, Benjamin

    2017-03-01

    Intraspecific variation is central to our understanding of evolution and population ecology, yet its consequences for community ecology are poorly understood. Animal personality - consistent individual differences in suites of behaviours - may be particularly important for trophic dynamics, where predator personality can determine activity rates and patterns of attack. We used mesocosms with aquatic food webs in which the top predator (dragonfly nymphs) varied in activity and subsequent attack rates on zooplankton, and tested the effects of predator personality. We found support for four hypotheses: (1) active predators disproportionately reduce the abundance of prey, (2) active predators select for predator-resistant prey species, (3) active predators strengthen trophic cascades (increase phytoplankton abundance) and (4) active predators are more likely to cannibalise one another, weakening all other trends when at high densities. These results suggest that intraspecific variation in predator personality is an important determinant of prey abundance, community composition and trophic cascades. © 2017 John Wiley & Sons Ltd/CNRS.

  7. Attacked ravens flexibly adjust signalling behaviour according to audience composition.

    PubMed

    Szipl, Georgine; Ringler, Eva; Bugnyar, Thomas

    2018-06-13

    A fundamental attribute of social intelligence is the ability to monitor third-party relationships, which has been repeatedly demonstrated in primates, and recently also in captive ravens. It is yet unknown how ravens make use of this ability when dealing with different types of social relationships simultaneously during complex real-life situations. Free-ranging non-breeder ravens live in societies characterized by high fission-fusion dynamics and structured by age, pair-bond status and kinship. Here, we show that free-ranging ravens modify communication during conflicts according to audience composition. When being attacked by dominant conspecifics, victims of aggression signal their distress via defensive calls. Victims increased call rates when their kin were in the bystander audience, but reduced call rates when the bystanders were bonding partners of their aggressors. Hence, ravens use social knowledge flexibly and probably based on their own need (i.e. alert nearby allies and avoid alerting nearby rivals). © 2018 The Authors.

  8. Policies to Reduce Influenza in the Workplace: Impact Assessments Using an Agent-Based Model

    PubMed Central

    Grefenstette, John J.; Galloway, David; Albert, Steven M.; Burke, Donald S.

    2013-01-01

    Objectives. We examined the impact of access to paid sick days (PSDs) and stay-at-home behavior on the influenza attack rate in workplaces. Methods. We used an agent-based model of Allegheny County, Pennsylvania, with PSD data from the US Bureau of Labor Statistics, standard influenza epidemic parameters, and the probability of staying home when ill. We compared the influenza attack rate among employees resulting from workplace transmission, focusing on the effects of presenteeism (going to work when ill). Results. In a simulated influenza epidemic (R0 = 1.4), the attack rate among employees owing to workplace transmission was 11.54%. A large proportion (72.00%) of this attack rate resulted from exposure to employees engaging in presenteeism. Universal PSDs reduced workplace infections by 5.86%. Providing 1 or 2 “flu days”—allowing employees with influenza to stay home—reduced workplace infections by 25.33% and 39.22%, respectively. Conclusions. PSDs reduce influenza transmission owing to presenteeism and, hence, the burden of influenza illness in workplaces. PMID:23763426

  9. Attacking Bullying; an Examination of Anti-Bullying Legislation and Policies

    ERIC Educational Resources Information Center

    Toso, Tamara Marrella

    2012-01-01

    Bullying is a major threat to school safety and appears to be increasing at alarming rates. Leaders throughout the entire school community need to understand the implications and ramifications of bullying on both the student who bullies and students who are bullied. This imperative mission calls for transformational leaders, armed with strong…

  10. A waterborne outbreak of Escherichia coli O157:H7 infections and hemolytic uremic syndrome: implications for rural water systems.

    PubMed

    Olsen, Sonja J; Miller, Gayle; Breuer, Thomas; Kennedy, Malinda; Higgins, Charles; Walford, Jim; McKee, Gary; Fox, Kim; Bibb, William; Mead, Paul

    2002-04-01

    In the summer of 1998, a large outbreak of Escherichia coli O157:H7 infections occurred in Alpine, Wyoming. We identified 157 ill persons; stool from 71 (45%) yielded E. coli O157:H7. In two cohort studies, illness was significantly associated with drinking municipal water (town residents: adjusted odds ratio=10.1, 95% confidence intervals [CI]=1.8-56.4; visitors attending family reunion: relative risk=9.0, 95% CI=1.3-63.3). The unchlorinated water supply had microbiologic evidence of fecal organisms and the potential for chronic contamination with surface water. Among persons exposed to water, the attack rate was significantly lower in town residents than in visitors (23% vs. 50%, p<0.01) and decreased with increasing age. The lower attack rate among exposed residents, especially adults, is consistent with the acquisition of partial immunity following long-term exposure. Serologic data, although limited, may support this finding. Contamination of small, unprotected water systems may be an increasing public health risk.

  11. A Waterborne Outbreak of Escherichia coli O157:H7 Infections and Hemolytic Uremic Syndrome: Implications for Rural Water Systems1

    PubMed Central

    Miller, Gayle; Breuer, Thomas; Kennedy, Malinda; Higgins, Charles; Walford, Jim; McKee, Gary; Fox, Kim; Bibb, William; Mead, Paul

    2002-01-01

    In the summer of 1998, a large outbreak of Escherichia coli O157:H7 infections occurred in Alpine, Wyoming. We identified 157 ill persons; stool from 71 (45%) yielded E. coli O157:H7. In two cohort studies, illness was significantly associated with drinking municipal water (town residents: adjusted odds ratio=10.1, 95% confidence intervals [CI]=1.8-56.4; visitors attending family reunion: relative risk=9.0, 95% CI=1.3-63.3). The unchlorinated water supply had microbiologic evidence of fecal organisms and the potential for chronic contamination with surface water. Among persons exposed to water, the attack rate was significantly lower in town residents than in visitors (23% vs. 50%, p<0.01) and decreased with increasing age. The lower attack rate among exposed residents, especially adults, is consistent with the acquisition of partial immunity following long-term exposure. Serologic data, although limited, may support this finding. Contamination of small, unprotected water systems may be an increasing public health risk. PMID:11971769

  12. Kinetic study of the oxidation of 3-hydroxyanisole catalysed by tyrosinase.

    PubMed

    Fenoll, L G; Rodríguez-López, J N; Varón, R; García-Ruiz, P A; García-Cánovas, F; Tudela, J

    2000-02-14

    Tyrosinase hydroxylates 3-hydroxyanisole in the 4-position. The reaction product accumulates in the reaction medium with a lag time (tau) which diminishes with increasing concentrations of enzyme and lengthens with increasing concentrations of substrate, thus fulfilling all the predictions of the mechanism proposed by us for 4-hydroxyphenols. The kinetic constants obtained, kcatM = (46.87 +/- 2.06) s-1 and KmM = (5.40 +/- 0.60) mM, are different from those obtained with 4-hydroxyanisole, kcatM = (184.20 +/- 6.1) s-1 and KmM = (0.08 +/- 0.004) mM. The catalytic efficiency, kcatM/KmM is, therefore, 265.3 times greater with 4-hydroxyanisole. The possible rate-determining steps for the reaction mechanism of tyrosinase on 3- and 4-hydroxyanisole, based on the NMR spectra of both monophenols, are discussed. These possible rate-determining steps are the nucleophilic attack of hydroxyl's oxygen on the copper and the electrophilic attack of the peroxide on the aromatic ring. Both steps may be of similar magnitude, i.e. take place in the same time scale.

  13. Primary transmission of chronic wasting disease versus scrapie prions from small ruminants to transgenic mice expressing ovine or cervid prion protein.

    PubMed

    Madsen-Bouterse, Sally A; Schneider, David A; Zhuang, Dongyue; Dassanayake, Rohana P; Balachandran, Aru; Mitchell, Gordon B; O'Rourke, Katherine I

    2016-09-01

    Development of mice expressing either ovine (Tg338) or cervid (TgElk) prion protein (PrP) have aided in characterization of scrapie and chronic wasting disease (CWD), respectively. Experimental inoculation of sheep with CWD prions has demonstrated the potential for interspecies transmission but, infection with CWD versus classical scrapie prions may be difficult to differentiate using validated diagnostic platforms. In this study, mouse bioassay in Tg338 and TgElk was utilized to evaluate transmission of CWD versus scrapie prions from small ruminants. Mice (≥5 per homogenate) were inoculated with brain homogenates from clinically affected sheep or goats with naturally acquired classical scrapie, white-tailed deer with naturally acquired CWD (WTD-CWD) or sheep with experimentally acquired CWD derived from elk (sheep-passaged-CWD). Survival time (time to clinical disease) and attack rates (brain accumulation of protease resistant PrP, PrPres) were determined. Inoculation with classical scrapie prions resulted in clinical disease and 100 % attack rates in Tg338, but no clinical disease at endpoint (>300 days post-inoculation, p.i.) and low attack rates (6.8 %) in TgElk. Inoculation with WTD-CWD prions yielded no clinical disease or brain PrPres accumulation in Tg338 at endpoint (>500 days p.i.), but rapid onset of clinical disease (~121 days p.i.) and 100 % attack rate in TgElk. Sheep-passaged-CWD resulted in transmission to both mouse lines with 100 % attack rates at endpoint in Tg338 and an attack rate of ~73 % in TgElk with some culled due to clinical disease. These primary transmission observations demonstrate the potential of bioassay in Tg338 and TgElk to help differentiate possible infection with CWD versus classical scrapie prions in sheep and goats.

  14. Infectious diarrheal disease caused by contaminated well water in Chinese schools: A systematic review and meta-analysis.

    PubMed

    Ding, Zheyuan; Zhai, Yujia; Wu, Chen; Wu, Haocheng; Lu, Qinbao; Lin, Junfen; He, Fan

    2017-06-01

    In China, waterborne outbreaks of infectious diarrheal disease mainly occur in schools, and contaminated well water is a common source of pathogens. The objective of this review was to present the attack rates, durations of outbreak, pathogens of infectious diarrheal disease, and sanitary conditions of wells in primary and secondary schools in China, and to analyze risk factors and susceptibility of school children. Relevant articles and reports were identified by searching PubMed, Web of Science, China National Knowledge Infrastructure, China Information System for Disease Control and Prevention, and the Chinese Field Epidemiology Training Program. Essential information, including urban/rural areas, school types, attack rates, pathogens, durations of outbreak, report intervals, and interventions were extracted from the eligible articles. Wilcoxon signed-rank test, Kruskal-Wallis H test, and Spearman correlation test were conducted in statistical analyses. Sex- and age-specific attack rate ratios were calculated as pooled effect sizes. We screened 2188 articles and retrieved data of 85 outbreaks from 1987 to 2014. Attack rates of outbreaks in rural areas (median, 12.63 cases/100 persons) and in primary schools (median, 14.54 cases/100 persons) were higher than those in urban areas (median, 5.62 cases/100 persons) and in secondary schools (median, 8.74 cases/100 persons) (P = 0.004 and P = 0.013, respectively). Shigella, pathogenic Escherichia coli, and norovirus were the most common pathogens. Boys tended toward higher attack rates than girls (sex-specific attack rate ratio, 1.13; 95% CI, 1.00-1.29, P = 0.05). Unsanitary conditions of water wells were reported frequently, and unhealthy behavior habits were common in students. School children were susceptible to waterborne disease in China. Chinese government should make efforts to improve access to safe water in schools. Health education promotion and conscientiousness of school leaders and teachers should be enhanced. Copyright © 2017. Production and hosting by Elsevier B.V.

  15. [Rheumatic cardiopathy in children younger than 6 years of age].

    PubMed

    Vázquez-Antona, C; Calderón-Colmenero, J; Attié, F; Zabal, C; Buendía-Hernández, A; Díaz-Medina, L H; Bialkowski, J; García Arenal, F

    1991-01-01

    Most of the published papers on Rheumatic Fever (RF) have not included the younger population. We selected 211 cases of children with RF younger than 6 years of age from 9,471 clinical files from 1944 to 1982. These were followed retrospectively to identify the presence of rheumatic activity, subsequent attacks and penicillin profilaxis. From de 211 cases, 209 had carditis; 57% of them were girls and 43% boys. There were no previous infections of the upper respiratory tract in 36% of the patients. The number of cases with RF increased abruptly after 3 years of age and continued increasing until 5 years of age when 70.5% of the population had there first clinically recognized attack. Lesions were present in the mitral valve in 80% of the cases, in the aortic valve in 12%, in the tricuspid in 5% and in the pulmonary valve in 3%. The death rate during the first attack was 20% being refractory heart failure the main cause of death. Thirteen cases suffered rheumatic pneumonia, 9 of whom died (69.2%). 1) The incidence of acute rheumatic fever in children under 6 years of age has decreased with time. 2) The death rate as well as the valvular damage decreased with the parents cooperation with the treatment. 3) The changes in the clinical picture and the severity of valve sequelea may be due to penicillin profilaxis and the better understanding of the disease.

  16. A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Gunasekaran, Mahalakshmi; Periakaruppan, Subathra

    2017-06-01

    Wireless sensor network (WSN) contains the distributed autonomous devices with the sensing capability of physical and environmental conditions. During the clustering operation, the consumption of more energy causes the draining in battery power that leads to minimum network lifetime. Hence, the WSN devices are initially operated on low-power sleep mode to maximise the lifetime. But, the attacks arrival cause the disruption in low-power operating called denial of service (DoS) attacks. The conventional intrusion detection (ID) approaches such as rule-based and anomaly-based methods effectively detect the DoS attacks. But, the energy consumption and false detection rate are more. The absence of attack information and broadcast of its impact to the other cluster head (CH) leads to easy DoS attacks arrival. This article combines the isolation and routing tables to detect the attack in the specific cluster and broadcasts the information to other CH. The intercommunication between the CHs prevents the DoS attacks effectively. In addition, the swarm-based defence approach is proposed to migrate the fault channel to normal operating channel through frequency hop approaches. The comparative analysis between the proposed table-based intrusion detection systems (IDSs) and swarm-based defence approaches with the traditional IDS regarding the parameters of transmission overhead/efficiency, energy consumption, and false positive/negative rates proves the capability of DoS prediction/prevention in WSN.

  17. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  18. Sediment-induced turbidity impairs foraging performance and prey choice of planktivorous coral reef fishes.

    PubMed

    Johansen, J L; Jones, G P

    2013-09-01

    Sedimentation is a substantial threat to aquatic ecosystems and a primary cause of habitat degradation on near-shore coral reefs. Although numerous studies have demonstrated major impacts of sedimentation and turbidity on corals, virtually nothing is known of the sensitivity of reef fishes. Planktivorous fishes are an important trophic group that funnels pelagic energy sources into reef ecosystems. These fishes are visual predators whose foraging is likely to be impaired by turbidity, but the threshold for such effects and their magnitude are unknown. This study examined the effect of sediment-induced turbidity on foraging in four species of planktivorous damselfishes (Pomacentridae) of the Great Barrier Reef, including inshore and offshore species that potentially differ in tolerance for turbidity. An experimental flow tunnel was used to quantify their ability to catch mobile and immobile planktonic prey under different levels of turbidity and velocity in the range encountered on natural and disturbed reefs. Turbidity of just 4 NTU (nephelometric turbidity units) reduced average attack success by up to 56%, with higher effect sizes for species with offshore distributions. Only the inshore species (Neopomacentrus bankieri), which frequently encounters this turbidity on coastal reefs, could maintain high prey capture success. At elevated turbidity similar to that found on disturbed reefs (8 NTU), attack success was reduced in all species examined by up to 69%. These reductions in attack success led to a 21-24% decrease in foraging rates for all mid to outer-shelf species, in spite of increasing attack rates at high turbidity. Although effects of turbidity varied among species, it always depended heavily on prey mobility and ambient velocity. Attack success was up to 14 times lower on mobile prey, leaving species relatively incapable of foraging on anything but immobile prey at high turbidity. Effects of turbidity were particularly prominent at higher velocities, as attack success was overall 20-fold lower and foraging rates 3.3-fold lower at flow velocities > 30 cm/s relative to < or = 10 cm/s. Given that many planktivorous reef fishes predominantly occupy exposed, high-flow habitats, these results provide a reasonable explanation for the lack of planktivores on inshore coral reefs and warn that the performance of visual predators could be impaired at turbidity levels of only 4 NTU.

  19. Analyzing Who, When, and Where: Data for Better Targeting of Resources for School-Based Asthma Interventions

    ERIC Educational Resources Information Center

    Raun, Loren H.; Campos, Laura A.; Stevenson, Elizabeth; Ensor, Katherine B.; Johnson, Gwen; Persse, David

    2017-01-01

    Background: Rates of uncontrolled asthma vary by demographics, space, and time. This article uses data on ambulance-treated asthma attacks in children to analyze these variations so that school districts can improve their asthma management interventions. Methods: Incidence rates of 1826 ambulance-treated asthma attacks for children aged 5-18 years…

  20. Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding

    NASA Astrophysics Data System (ADS)

    Lee, Kwangsoo; Westfeld, Andreas; Lee, Sangjin

    We present a generalised and improved version of the category attack on LSB steganography in JPEG images with straddled embedding path. It detects more reliably low embedding rates and is also less disturbed by double compressed images. The proposed methods are evaluated on several thousand images. The results are compared to both recent blind and specific attacks for JPEG embedding. The proposed attack permits a more reliable detection, although it is based on first order statistics only. Its simple structure makes it very fast.

  1. Coherent attacking continuous-variable quantum key distribution with entanglement in the middle

    NASA Astrophysics Data System (ADS)

    Zhang, Zhaoyuan; Shi, Ronghua; Zeng, Guihua; Guo, Ying

    2018-06-01

    We suggest an approach on the coherent attack of continuous-variable quantum key distribution (CVQKD) with an untrusted entangled source in the middle. The coherent attack strategy can be performed on the double links of quantum system, enabling the eavesdropper to steal more information from the proposed scheme using the entanglement correlation. Numeric simulation results show the improved performance of the attacked CVQKD system in terms of the derived secret key rate with the controllable parameters maximizing the stolen information.

  2. Noise of the SR-3 propeller model at 2 deg and 4 deg angle of attack

    NASA Technical Reports Server (NTRS)

    Dittmar, J. H.; Jeracki, R. J.

    1981-01-01

    The noise effect of operating supersonic tip speed propellers at angle of attack with respect to the incoming flow was determined. Increases in the maximum blade passage noise were observed for the propeller operating at angle of attack. The noise increase was not symmetrical with one wall of the wind tunnel having significantly more noise increase than the other wall. This was apparently the result of the rotational direction of the propeller. The lack of symmetry of the noise at angle of attack to the use of oppositely rotating propellers on opposite sides of an airplane fuselage as a way of minimizing the noise due to operation at angle of attack.

  3. Efficacy of "Verbenone Plus" for protecting ponderosa pine trees and stands from Dendroctonus brevicomis (Coleoptera: Curculionidae) attack in British Columbia and California.

    PubMed

    Fettig, Christopher J; McKelvey, Stephen R; Dabney, Christopher P; Huber, Dezene P W; Lait, Cameron G; Fowler, Donald L; Borden, John H

    2012-10-01

    The western pine beetle, Dendroctonus brevicomis LeConte (Coleoptera: Curculionidae, Scolytinae), is a major cause of ponderosa pine, Pinus ponderosa Douglas ex Lawson, mortality in much of western North America. We review several years of research that led to the identification of Verbenone Plus, a novel four-component semiochemcial blend [acetophenone, (E)-2-hexen-1-ol + (Z)-2-hexen-1-ol, and (-)-verbenone] that inhibits the response of D. brevicomis to attractant-baited traps, and examine the efficacy of Verbenone Plus for protecting individual trees and forest stands from D. brevicomis infestations in British Columbia and California. In all experiments, semiochemicals were stapled around the bole of treated trees at approximately equal to 2 m in height. (-)-Verbenone alone had no effect on the density of total attacks and successful attacks by D. brevicomis on attractant-baited P. ponderosa, but significantly increased the percentage of pitchouts (unsuccessful D. brevicomis attacks). Verbenone Plus significantly reduced the density of D. brevicomis total attacks and D. brevicomis successful attacks on individual trees. A significantly higher percentage of pitchouts occurred on Verbenone Plus-treated trees. The application of Verbenone Plus to attractant-baited P. ponderosa significantly reduced levels of tree mortality. In stand protection studies, Verbenone Plus significantly reduced the percentage of trees mass attacked by D. brevicomis in one study, but in a second study no significant treatment effect was observed. Future research should concentrate on determining optimal release rates and spacings of release devices in stand protection studies, and expansion of Verbenone Plus into other systems where verbenone alone has not provided adequate levels of tree protection.

  4. Lethal Trap Trees and Semiochemical Repellents as Area Host Protection Strategies for Spruce Beetle (Coleoptera: Curculionidae, Scolytinae) in Utah.

    PubMed

    Matthew Hansen, E; Steven Munson, A; Blackford, Darren C; Wakarchuk, David; Scott Baggett, L

    2016-10-01

    We tested lethal trap trees and repellent semiochemicals as area treatments to protect host trees from spruce beetle (Dendroctonus rufipennis Kirby) attacks. Lethal trap tree treatments ("spray treatment") combined a spruce beetle bait with carbaryl treatment of the baited spruce. Repellent treatments ("spray-repellent") combined a baited lethal trap tree within a 16-m grid of MCH (3-methylcyclohex-2-en-1-one) and two novel spruce beetle repellents. After beetle flight, we surveyed all trees within 50 m of plot center, stratified by 10-m radius subplots, and compared attack rates to those from baited and unbaited control plots. Compared to the baited controls, spruce in the spray treatment had significantly reduced likelihood of a more severe attack classification (e.g., mass-attacked over strip-attacked or unsuccessful-attacked over unattacked). Because spruce in the spray treatment also had significantly heightened probability of more severe attack classification than those in the unbaited controls, however, we do not recommend lethal trap trees as a stand-alone beetle suppression strategy for epidemic beetle populations. Spruce in the spray-repellent treatment were slightly more likely to be classified as more severely attacked within 30 m of plot center compared to unbaited controls but, overall, had reduced probabilities of beetle attack over the entire 50-m radius plots. The semiochemical repellents deployed in this study were effective at reducing attacks on spruce within treated plots despite the presence of a centrally located spruce beetle bait. Further testing will be required to clarify operational protocols such as dose, elution rate, and release device spacing. Published by Oxford University Press on behalf of Entomological Society of America 2016. This work is written by US Government employees and is in the public domain in the US.

  5. Stability of a non-orthogonal stagnation flow to three dimensional disturbances

    NASA Technical Reports Server (NTRS)

    Lasseigne, D. G.; Jackson, T. L.

    1991-01-01

    A similarity solution for a low Mach number nonorthogonal flow impinging on a hot or cold plate is presented. For the constant density case, it is known that the stagnation point shifts in the direction of the incoming flow and that this shift increases as the angle of attack decreases. When the effects of density variations are included, a critical plate temperature exists; above this temperature the stagnation point shifts away from the incoming stream as the angle is decreased. This flow field is believed to have application to the reattachment zone of certain separated flows or to a lifting body at a high angle of attack. Finally, the stability of this nonorthogonal flow to self similar, 3-D disturbances is examined. Stability properties of the flow are given as a function of the parameters of this study; ratio of the plate temperature to that of the outer potential flow and angle of attack. In particular, it is shown that the angle of attack can be scaled out by a suitable definition of an equivalent wavenumber and temporal growth rate, and the stability problem for the nonorthogonal case is identical to the stability problem for the orthogonal case.

  6. Public health consequences of terrorism on maternal-child health in New York City and Madrid.

    PubMed

    Sherrieb, Kathleen; Norris, Fran H

    2013-06-01

    Past research provides evidence for trajectories of health and wellness among individuals following disasters that follow specific pathways of resilience, resistance, recovery, or continued dysfunction. These individual responses are influenced by event type and pre-event capacities. This study was designed to utilize the trajectories of health model to determine if it translates to population health. We identified terrorist attacks that could potentially impact population health rather than only selected individuals within the areas of the attacks. We chose to examine a time series of population birth outcomes before and after the terrorist events of the New York City (NYC) World Trade Center (WTC) attacks of 2001 and the Madrid, Spain train bombings of 2004 to determine if the events affected maternal-child health of those cities and, if so, for how long. For percentages of low birth weight (LBW) and preterm births, we found no significant effects from the WTC attacks in NYC and transient but significant effects on rates of LBW and preterm births following the bombings in Madrid. We did find a significant positive and sustained effect on infant mortality rate in NYC following the WTC attacks but no similar effect in Madrid. There were no effects on any of the indicator variables in the comparison regions of New York state and the remainder of Spain. Thus, population maternal-health in New York and Madrid showed unique adverse effects after the terrorist attacks in those cities. Short-term effects on LBW and preterm birth rates in Madrid and long-term effects on infant mortality rates in NYC were found when quarterly data were analyzed from 1990 through 2008/2009. These findings raise questions about chronic changes in the population's quality of life following catastrophic terrorist attacks. Public health should be monitored and interventions designed to address chronic stress, environmental, and socioeconomic threats beyond the acute aftermath of events.

  7. War or Peace? How the Subjective Perception of Great Power Interdependence Shapes Preemptive Defensive Aggression

    PubMed Central

    Jing, Yiming; Gries, Peter H.; Li, Yang; Stivers, Adam W.; Mifune, Nobuhiro; Kuhlman, D. M.; Bai, Liying

    2017-01-01

    Why do great powers with benign intentions end up fighting each other in wars they do not seek? We utilize an incentivized, two-person “Preemptive Strike Game” (PSG) to explore how the subjective perception of great power interdependence shapes defensive aggression against persons from rival great powers. In Study 1, college students from the United States (N = 115), China (N = 106), and Japan (N = 99) made PSG decisions facing each other. This natural experiment revealed that Chinese and Japanese participants (a) made more preemptive attacks against each other and Americans than against their compatriots, and that (b) greater preexisting perceptions of bilateral competition increased intergroup attack rates. In Study 2, adult Americans (N = 127) watched real CNN expert interviews portraying United States–China economic interdependence as more positive or negative. This randomized experiment revealed that the more positive portrayal reduced preemptive American strikes against Chinese (but not Japanese), while the more negative portrayal amplified American anger about China’s rise, increasing preemptive attacks against Chinese. We also found, however, that preemptive strikes were primarily defensive and not offensive. Interventions to reduce defensive aggression and promote great power peace are discussed. PMID:28626433

  8. War or Peace? How the Subjective Perception of Great Power Interdependence Shapes Preemptive Defensive Aggression.

    PubMed

    Jing, Yiming; Gries, Peter H; Li, Yang; Stivers, Adam W; Mifune, Nobuhiro; Kuhlman, D M; Bai, Liying

    2017-01-01

    Why do great powers with benign intentions end up fighting each other in wars they do not seek? We utilize an incentivized, two-person "Preemptive Strike Game" (PSG) to explore how the subjective perception of great power interdependence shapes defensive aggression against persons from rival great powers. In Study 1, college students from the United States ( N = 115), China ( N = 106), and Japan ( N = 99) made PSG decisions facing each other. This natural experiment revealed that Chinese and Japanese participants (a) made more preemptive attacks against each other and Americans than against their compatriots, and that (b) greater preexisting perceptions of bilateral competition increased intergroup attack rates. In Study 2, adult Americans ( N = 127) watched real CNN expert interviews portraying United States-China economic interdependence as more positive or negative. This randomized experiment revealed that the more positive portrayal reduced preemptive American strikes against Chinese (but not Japanese), while the more negative portrayal amplified American anger about China's rise, increasing preemptive attacks against Chinese. We also found, however, that preemptive strikes were primarily defensive and not offensive. Interventions to reduce defensive aggression and promote great power peace are discussed.

  9. Effects of non-invasive vagus nerve stimulation on attack frequency over time and expanded response rates in patients with chronic cluster headache: a post hoc analysis of the randomised, controlled PREVA study.

    PubMed

    Gaul, Charly; Magis, Delphine; Liebler, Eric; Straube, Andreas

    2017-12-01

    In the PREVention and Acute treatment of chronic cluster headache (PREVA) study, attack frequency reductions from baseline were significantly more pronounced with non-invasive vagus nerve stimulation plus standard of care (nVNS + SoC) than with SoC alone. Given the intensely painful and frequent nature of chronic cluster headache attacks, additional patient-centric outcomes, including the time to and level of therapeutic response, were evaluated in a post hoc analysis of the PREVA study. After a 2-week baseline phase, 97 patients with chronic cluster headache entered a 4-week randomised phase to receive nVNS + SoC (n = 48) or SoC alone (n = 49). All 92 patients who continued into a 4-week extension phase received nVNS + SoC. Compared with SoC alone, nVNS + SoC led to a significantly lower mean weekly attack frequency by week 2 of the randomised phase; the attack frequency remained significantly lower in the nVNS + SoC group through week 3 of the extension phase (P < 0.02). Attack frequencies in the nVNS + SoC group were significantly lower at all study time points than they were at baseline (P < 0.05). Response rates were significantly greater with nVNS + SoC than with SoC alone when response was defined as attack frequency reductions of ≥25%, ≥50%, and ≥75% from baseline (≥25% and ≥50%, P < 0.001; ≥75%, P = 0.009). The 100% response rate was 8% with nVNS + SoC and 0% with SoC alone. Prophylactic nVNS led to rapid, significant, and sustained reductions in chronic cluster headache attack frequency within 2 weeks after its addition to SoC and was associated with significantly higher ≥25%, ≥50%, and ≥75% response rates than SoC alone. The rapid decrease in weekly attack frequency justifies a 4-week trial period to identify responders to nVNS, with a high degree of confidence, among patients with chronic cluster headache.

  10. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

  11. The effect of nursing professional pay structures and pay levels on hospitals' heart attack outcomes.

    PubMed

    Brown, Mark P

    2006-01-01

    The effect of nursing professionals (i.e., nurse aid/orderly, licensed practical nurse, registered nurse) pay structures and pay levels on hospitals risk-adjusted heart attack outcomes was determined. Operationalizing hospitals' heart attack outcomes as their thirty-day risk-adjusted mortality rates, a positive curvilinear relation is hypothesized between pay dispersion and hospitals' heart attack outcomes, whereas a direct relation is hypothesized between pay level and hospitals' heart attack outcomes. Pay level is also hypothesized as a moderator of the relation between pay dispersion and hospitals' heart attack outcomes. Using a sample of 138 California hospitals, support is not found for either the curvilinear relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes, or the direct relation between nursing professionals' pay level and hospitals' heart attack outcomes. Support is found for the moderation hypothesis in which nursing professionals' pay level moderates the relation between hospitals' nursing professionals pay dispersion and hospitals' heart attack outcomes. Implications for practice are discussed in light of the study's results.

  12. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  13. Gastroenteritis outbreaks on cruise ships: contributing factors and thresholds for early outbreak detection.

    PubMed

    Mouchtouri, Varvara A; Verykouki, Eleni; Zamfir, Dumitru; Hadjipetris, Christos; Lewis, Hannah C; Hadjichristodoulou, Christos

    2017-11-01

    When an increased number of acute gastroenteritis (AG) cases is detected among tourists staying at the same accommodation, outbreak management plans must be activated in a timely manner to prevent large outbreaks. Syndromic surveillance data collected between 1 January 2010 and 31 December 2013 by five seagoing cruise ships were analysed to identify attack rate thresholds for early outbreak detection. The overall incidence rate of AG was 2.81 cases per 10,000 traveller-days (95% confidence interval (CI): 0.00-17.60), while the attack rate was 19.37 cases per 10,000 travellers (95% CI: 0.00-127.69). The probability of an outbreak occurring was 11% if 4 per 1,000 passengers reported symptoms within the first 2 days of the voyage, and this increased to 23 % if 5 per 1,000 passengers reported such within the first 3 days. The risk ratio (RR) for outbreak occurrence was 2.35, 5.66 and 8.63 for 1, 2 and 3 days' delay of symptoms reporting respectively, suggesting a dose-response relationship. Shipping companies' policies and health authorities' efforts may consider these thresholds for initiating outbreak response measures based on the number of cases according to day of cruise. Efforts should focus on ensuring travellers report symptoms immediately and comply with isolation measures.

  14. Sympathetic activity in patients with panic disorder at rest, under laboratory mental stress, and during panic attacks.

    PubMed

    Wilkinson, D J; Thompson, J M; Lambert, G W; Jennings, G L; Schwarz, R G; Jefferys, D; Turner, A G; Esler, M D

    1998-06-01

    The sympathetic nervous system has long been believed to be involved in the pathogenesis of panic disorder, but studies to date, most using peripheral venous catecholamine measurements, have yielded conflicting and equivocal results. We tested sympathetic nervous function in patients with panic disorder by using more sensitive methods. Sympathetic nervous and adrenal medullary function was measured by using direct nerve recording (clinical microneurography) and whole-body and cardiac catecholamine kinetics in 13 patients with panic disorder as defined by the DSM-IV, and 14 healthy control subjects. Measurements were made at rest, during laboratory stress (forced mental arithmetic), and, for 4 patients, during panic attacks occurring spontaneously in the laboratory setting. Muscle sympathetic activity, arterial plasma concentration of norepinephrine, and the total and cardiac norepinephrine spillover rates to plasma were similar in patients and control subjects at rest, as was whole-body epinephrine secretion. Epinephrine spillover from the heart was elevated in patients with panic disorder (P=.01). Responses to laboratory mental stress were almost identical in patient and control groups. During panic attacks, there were marked increases in epinephrine secretion and large increases in the sympathetic activity in muscle in 2 patients but smaller changes in the total norepinephrine spillover to plasma. Whole-body and regional sympathetic nervous activity are not elevated at rest in patients with panic disorder. Epinephrine is released from the heart at rest in patients with panic disorder, possibly due to loading of cardiac neuronal stores by uptake from plasma during surges of epinephrine secretion in panic attacks. Contrary to popular belief, the sympathetic nervous system is not globally activated during panic attacks.

  15. Plasmodium falciparum incidence relative to entomologic inoculation rates at a site proposed for testing malaria vaccines in western Kenya.

    PubMed

    Beier, J C; Oster, C N; Onyango, F K; Bales, J D; Sherwood, J A; Perkins, P V; Chumo, D K; Koech, D V; Whitmire, R E; Roberts, C R

    1994-05-01

    Relationships between Plasmodium falciparum incidence and entomologic inoculation rates (EIRs) were determined for a 21-month period in Saradidi, western Kenya, in preparation for malaria vaccine field trials. Children, ranging in age from six months to six years and treated to clear malaria parasites, were monitored daily for up to 12 weeks to detect new malaria infections. Overall, new P. falciparum infections were detected in 77% of 809 children. The percentage of children that developed infections per two-week period averaged 34.7%, ranging from 7.3% to 90.9%. Transmission by vector populations was detected in 86.4% (38 of 44) of the two-week periods, with daily EIRs averaging 0.75 infective bites per person. Periods of intense transmission during April to August, and from November to January, coincided with seasonal rains. Relationships between daily malaria attack rates and EIRs indicated that an average of only 7.5% (1 in 13) of the sporozoite inoculations produced new infections in children. Regression analysis demonstrated that EIRs accounted for 74% of the variation in attack rates. One of the components of the EIR, the human-biting rate, alone accounted for 68% of the variation in attack rates. Thus, measurements of either the EIR or the human-biting rate can be used to predict corresponding attack rates in children. These baseline epidemiologic studies indicate that the intense transmission patterns of P. falciparum in Saradidi will provide excellent conditions for evaluating malaria vaccine efficacy.

  16. Factors determining case fatality in myocardial infarction "who dies in a heart attack"?

    PubMed

    Wannamethee, G; Whincup, P H; Shaper, A G; Walker, M; MacFarlane, P W

    1995-09-01

    To examine the determinants of case fatality in the first major ischaemic heart disease event (heart attack) after screening. Prospective study of 7735 middle aged men drawn from general practices in 24 British towns. During 11.5 years follow up there were 743 major ischaemic heart disease events of which 302 (40.6%) were fatal within 28 days of onset. Previous definite myocardial infarction or stroke and age at time of event were most strongly associated with case fatality. In men with no previous myocardial infarction or stroke, after adjustment for a range of risk factors, antihypertensive treatment (odds ratio (OR) = 1.97, P < 0.05), arrhythmia (OR = 1.93, P = 0.06), increased heart rate (OR = 2.03, P = 0.06), and diabetes (OR = 2.61, P = 0.07) were associated with increased case fatality. High levels of physical activity (OR = 0.53, P < 0.05) and moderate drinking (16-42 units/week) (OR = 0.61, P < 0.05) were associated with lower case fatality, although moderate drinking was not associated with a lower incidence of major ischaemic heart disease events. Current smoking, serum total cholesterol, and systolic blood pressure were not significantly associated with case fatality. In men with previous myocardial infarction or stroke, arrhythmia and to a lesser degree antihypertensive treatment, moderate or heavy drinking, and diabetes were associated with higher case fatality. These findings suggest that physical activity may be an important modifiable factor influencing the incidence of ischaemic heart disease and the chance of survival in men without a previous heart attack or stroke. Arrhythmia, increased heart rate, diabetes, and treatment for hypertension are also areas of concern.

  17. Rate of improvement during and across three treatments for panic disorder with or without agoraphobia: cognitive behavioral therapy, selective serotonin reuptake inhibitor or both combined.

    PubMed

    Van Apeldoorn, Franske J; Van Hout, Wiljo J P J; Timmerman, Marieke E; Mersch, Peter Paul A; den Boer, Johan A

    2013-09-05

    Existing literature on panic disorder (PD) yields no data regarding the differential rates of improvement during Cognitive Behavioral Therapy (CBT), Selective Serotonin Reuptake Inhibitor (SSRI) or both combined (CBT+SSRI). Patients were randomized to CBT, SSRI or CBT+SSRI which each lasted one year including three months of medication taper. Participating patients kept record of the frequency of panic attacks throughout the full year of treatment. Rate of improvement on panic frequency and the relationship between rate of improvement and baseline agoraphobia (AG) were examined. A significant decline in frequency of panic attacks was observed for each treatment modality. SSRI and CBT+SSRI were associated with a significant faster rate of improvement as compared to CBT. Gains were maintained after tapering medication. For patients with moderate or severe AG, CBT+SSRI was associated with a more rapid improvement on panic frequency as compared to patients receiving either mono-treatment. Frequency of panic attacks was not assessed beyond the full year of treatment. Second, only one process variable was used. Patients with PD respond well to each treatment as indicated by a significant decline in panic attacks. CBT is associated with a slower rate of improvement as compared to SSRI and CBT+SSRI. Discontinuation of SSRI treatment does not result in a revival of frequency of panic attacks. Our data suggest that for patients without or with only mild AG, SSRI-only will suffice. For patients with moderate or severe AG, the combined CBT+SSRI treatment is recommended. Copyright © 2013 Elsevier B.V. All rights reserved.

  18. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.

  19. Noise of the SR-6 propeller model at 2 deg and 4 deg angles of attack

    NASA Technical Reports Server (NTRS)

    Dittmar, J. H.; Stefko, G. L.

    1983-01-01

    The noise generated by supersonic-tip-speed propellers creates a cabin noise problem for future airplanes powered by these propellers. Noise of a number of propeller models were measured in the NASA Lewis 8- by 6-Foot Wind Tunnel with flow parallel to the propeller axis. In flight, as a result of the induced upwash from the airplane wing, the propeller is at an angle of attack with respect to the incoming flow. Therefore, the 10-blade SR-6 propeller was operated at angle of attack to determine its noise behavior. Higher blade passage tones were observed for the propeller operating at angle of attack in a 0.6 axial Mach number flow. The noise increase was not symmetrical, with one wall of the wind tunnel showing a larger noise increase than the other wall. No noise increase was observed at angle of attack in a 0.8 axial Mach number flow. For this propeller the dominance of thickness noise, which does not increase with angle of attack, explains the lack of noise increase at the higher 0.8 Mach number.

  20. Impact of Maternal Posttraumatic Stress Disorder and Depression Following Exposure to the September 11 Attacks on Preschool Children's Behavior

    ERIC Educational Resources Information Center

    Chemtob, Claude M.; Nomura, Yoko; Rajendran, Khushmand; Yehuda, Rachel; Schwartz, Deena; Abramovitz, Robert

    2010-01-01

    To evaluate whether conjoined maternal posttraumatic stress disorder (PTSD) and depression are associated with increased behavioral problems among terrorism-exposed preschool children (N = 116; 18-54 months), this study compared clinically significant child behavioral problem rates among the preschool children of mothers with PTSD and depression,…

  1. The role of biocontrol of emerald ash borer in protecting ash regeneration after invasion

    Treesearch

    Jian J. Duan; Roy G. Van Driesche; Leah S. Bauer; Richard Reardon; Juli Gould; Joseph S. Elkinton

    2017-01-01

    Long-term monitoring in Michigan and several northeastern states has documented increasing parasitism and reduced EAB attack rates. Ash regeneration is currently benefiting from releases of introduced parasitoids, which now cause 20-80% parasitism of EAB larvae in ash saplings (1-2 inch dia.) and young trees (5-8 inch dia.).

  2. Detection of abnormal item based on time intervals for recommender systems.

    PubMed

    Gao, Min; Yuan, Quan; Ling, Bin; Xiong, Qingyu

    2014-01-01

    With the rapid development of e-business, personalized recommendation has become core competence for enterprises to gain profits and improve customer satisfaction. Although collaborative filtering is the most successful approach for building a recommender system, it suffers from "shilling" attacks. In recent years, the research on shilling attacks has been greatly improved. However, the approaches suffer from serious problem in attack model dependency and high computational cost. To solve the problem, an approach for the detection of abnormal item is proposed in this paper. In the paper, two common features of all attack models are analyzed at first. A revised bottom-up discretized approach is then proposed based on time intervals and the features for the detection. The distributions of ratings in different time intervals are compared to detect anomaly based on the calculation of chi square distribution (χ(2)). We evaluated our approach on four types of items which are defined according to the life cycles of these items. The experimental results show that the proposed approach achieves a high detection rate with low computational cost when the number of attack profiles is more than 15. It improves the efficiency in shilling attacks detection by narrowing down the suspicious users.

  3. Harvest-related edge effects on prey availability and foraging of hooded warblers in a bottomland hardwood forest.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    John Kilgo

    2005-04-20

    The effects of harvest-created canopy gaps in bottomland hardwood forests on arthropod abundance and, hence, the foraging ecology of birds are poorly understood. I predicted that arthropod abundance would be high near edges of group-selection harvest gaps and lower in the surrounding forest, and that male Hooded Warblers (Wilsonia citrina) foraging near gaps would find more prey per unit time than those foraging in the surrounding forest. In fact, arthropod abundance was greater >100 m from a gap edge than at 0-30 m or 30-100 m from an edge, due to their abundance on switchcane (Arundinaria gigantea); arthropods did notmore » differ in abundance among distances from gaps on oaks (Quercus spp.) or red maple (Acer rubrum). Similarly, Hooded Warbler foraging attack rates were not higher near gap edges: when foraging for fledglings, attack rate did not differ among distances from gaps, but when foraging for themselves, attack rates actually were lower 0-30 m from gap edges than 30-100 m or >100 m from a gap edge. Foraging attack rate was positively associated with arthropod abundance. Hooded Warblers apparently encountered fewer prey and presumably foraged less efficiently where arthropods were least abundant, i.e., near gaps. That attack rates among birds foraging for fledglings were not affected by distance from gap (and hence arthropod abundance) suggests that prey availability may not be limiting at any location across the forest, despite the depressing effects of gaps on arthropod abundance.« less

  4. Rolling Moments Due to Rolling and Yaw for Four Wing Models in Rotation

    NASA Technical Reports Server (NTRS)

    Knight, Montgomery; Wenzinger, Carl J

    1932-01-01

    This report presents the results of a series of autorotation and torque tests on four different rotating wing systems at various rates of roll and at several angles of yaw. The investigation covered an angle of attack range up to 90 degrees and angles of yaw of 0 degree, 5 degrees, 10 degrees, and 20 degrees. The tests were made in a 5-foot, closed-throat atmospheric wind tunnel. The object of the tests was primarily to determine the effects of various angles of yaw on the rolling moments of the rotating wings up to large angles of attack. It was found that at angles of attack above that of maximum lift the rolling moments on the wings due to yaw (or side slip) from 5 degrees to 20 degrees were roughly of the same magnitude as those due to rolling. There was a wide variation in magnitude of the rolling moment due to yaw angle. The rates and ranges of stable autorotation for the monoplane models were considerably increased by yaw, whereas for an unstaggered biplane they were little affected. The immediate cause of the rolling moment due to yaw is apparently the building up of large loads on the forward wing tip and the reduction of loads on the rearward wing tip.

  5. Security Assessment of Cyberphysical Digital Microfluidic Biochips.

    PubMed

    Ali, Sk Subidh; Ibrahim, Mohamed; Sinanoglu, Ozgur; Chakrabarty, Krishnendu; Karri, Ramesh

    2016-01-01

    A digital microfluidic biochip (DMFB) is an emerging technology that enables miniaturized analysis systems for point-of-care clinical diagnostics, DNA sequencing, and environmental monitoring. A DMFB reduces the rate of sample and reagent consumption, and automates the analysis of assays. In this paper, we provide the first assessment of the security vulnerabilities of DMFBs. We identify result-manipulation attacks on a DMFB that maliciously alter the assay outcomes. Two practical result-manipulation attacks are shown on a DMFB platform performing enzymatic glucose assay on serum. In the first attack, the attacker adjusts the concentration of the glucose sample and thereby modifies the final result. In the second attack, the attacker tampers with the calibration curve of the assay operation. We then identify denial-of-service attacks, where the attacker can disrupt the assay operation by tampering either with the droplet-routing algorithm or with the actuation sequence. We demonstrate these attacks using a digital microfluidic synthesis simulator. The results show that the attacks are easy to implement and hard to detect. Therefore, this work highlights the need for effective protections against malicious modifications in DMFBs.

  6. Approximate heating analysis for the windward-symmetry plane of Shuttle-like bodies at large angle of attack

    NASA Technical Reports Server (NTRS)

    Zoby, E. V.

    1981-01-01

    An engineering method has been developed for computing the windward-symmetry plane convective heat-transfer rates on Shuttle-like vehicles at large angles of attack. The engineering code includes an approximate inviscid flowfield technique, laminar and turbulent heating-rate expressions, an approximation to account for the variable-entropy effects on the surface heating and the concept of an equivalent axisymmetric body to model the windward-ray flowfields of Shuttle-like vehicles at angles of attack from 25 to 45 degrees. The engineering method is validated by comparing computed heating results with corresponding experimental data measured on Shuttle and advanced transportation models over a wide range of flow conditions and angles of attack from 25 to 40 degrees and also with results of existing prediction techniques. The comparisons are in good agreement.

  7. The mechanism of erosion of metallic materials under cavitation attack

    NASA Technical Reports Server (NTRS)

    Rao, B. C. S.; Buckley, D. H.

    1985-01-01

    The mean depth of penetration rates (MDPRs) of eight polycrystalline metallic materials, Al 6061-T6, Cu, brass, phosphor bronze, Ni, Fe, Mo, and Ti-5Al-2.5Sn exposed to cavitation attack in a viscous mineral oil with a 20 kHz ultrasonic oscillator vibrating at 50 micron amplitude are reported. The titanium alloy followed by molybdenum have large incubation periods and small MDPRs. The incubation periods correlate linearly with the inverse of hardness and the average MDPRs correlate linearly with the inverse of tensile strength of materials. The linear relationships yield better statistical parameters than geometric and exponential relationships. The surface roughness and the ratio of pit depth to pit width (h/a) increase with the duration of cavitation attack. The ratio h/a varies from 0.1 to 0.8 for different materials. Recent investigations (20) using scanning electron microscopy to study deformation and pit formation features are briefly reviewed. Investigations with single crystals indicate that the geometry of pits and erosion are dependent on their orientation.

  8. Choroidal Thickness Changes in the Acute Attack Period in Patients with Familial Mediterranean Fever.

    PubMed

    Gundogan, Fatih C; Akay, Fahrettin; Uzun, Salih; Ozge, Gokhan; Toyran, Sami; Genç, Halil

    2016-01-01

    The aim of this study was to evaluate choroidal thickness changes during acute attacks of familial Mediterranean fever (FMF). Fifty patients with FMF and 50 healthy controls were included. Choroidal thickness of each participant was measured at the foveola and horizontal nasal and temporal quadrants at 500-µm intervals to 1,500 µm from the foveola using spectral-domain optical coherence tomography. White blood cell count, erythrocyte sedimentation rate (ESR) and serum levels of fibrinogen and C-reactive protein (CRP) were evaluated. The clinical findings (peritonitis, arthritis and pleuritis) were noted. Choroidal thickness was significantly thicker at all measurement points in FMF patients compared to healthy controls during an acute attack (p < 0.05). There were positive correlations between the choroidal thickness and ESR, fibrinogen and, particularly, CRP levels. Clinical findings did not change the choroidal thickness significantly (p > 0.05). Increased choroidal thickness in the acute phase of FMF is possibly related to the inflammatory edematous changes in the choroid. © 2015 S. Karger AG, Basel.

  9. An Investigation of Anaerobic Processes in Fuel/Natural Seawater Environments

    DTIC Science & Technology

    2012-02-08

    Corrosion rates were estimated from polarization resistance measurements and corrosion was measured by weight loss. Corrosion attack morphology and...rates were estimated from polarization resistance measurements and corrosion was measured by weight loss. Corrosion attack morphology and corrosion...the backside of the coupons with conductive epoxy and carbon tape to achieve electrical connection. Coupons were individually mounted in epoxy to

  10. Destabilization of yttria-stabilized zirconia induced by molten sodium vanadate-sodium sulfate melts

    NASA Technical Reports Server (NTRS)

    Nagelberg, A. S.; Hamilton, J. C.

    1985-01-01

    The extent of surface destabilization of ZrO2 - 8 wt percent Y2O3 ceramic disks was determined after exposure to molten salt mixtures of sodium sulfate containing up to 15 mole percent sodium metavanadate (NaVO3) at 1173 K. The ceramic surface was observed to transform from the cubic/tetragonal to monoclinic phase, concurrent with chemical changes in the molten salt layer in contact with the ceramic. Significant attack rates were observed in both pure sulfate and metavanadate sulfate melts. The rate of attack was found to be quite sensitive to the mole fraction of vanadate in the molten salt solution and the partial pressure of sulfur trioxide in equilibrium with the salt melt. The observed parabolic rate of attack is interpreted to be caused by a reaction controlled by diffusion in the salt that penetrates into the porous layer formed by the destabilization. The parabolic rate constant in mixed sodium metavanadate - sodium sulfate melts was found to be proportional to the SO3 partial pressure and the square of the metavanadate concentration. In-situ Raman spectroscopic measurements allowed simultaneous observations of the ceramic phases and salt chemistry during the attack process.

  11. Reactive strategies for containing developing outbreaks of pandemic influenza

    PubMed Central

    2011-01-01

    Background In 2009 and the early part of 2010, the northern hemisphere had to cope with the first waves of the new influenza A (H1N1) pandemic. Despite high-profile vaccination campaigns in many countries, delays in administration of vaccination programs were common, and high vaccination coverage levels were not achieved. This experience suggests the need to explore the epidemiological and economic effectiveness of additional, reactive strategies for combating pandemic influenza. Methods We use a stochastic model of pandemic influenza to investigate realistic strategies that can be used in reaction to developing outbreaks. The model is calibrated to documented illness attack rates and basic reproductive number (R0) estimates, and constructed to represent a typical mid-sized North American city. Results Our model predicts an average illness attack rate of 34.1% in the absence of intervention, with total costs associated with morbidity and mortality of US$81 million for such a city. Attack rates and economic costs can be reduced to 5.4% and US$37 million, respectively, when low-coverage reactive vaccination and limited antiviral use are combined with practical, minimally disruptive social distancing strategies, including short-term, as-needed closure of individual schools, even when vaccine supply-chain-related delays occur. Results improve with increasing vaccination coverage and higher vaccine efficacy. Conclusions Such combination strategies can be substantially more effective than vaccination alone from epidemiological and economic standpoints, and warrant strong consideration by public health authorities when reacting to future outbreaks of pandemic influenza. PMID:21356128

  12. The effects of school closures on influenza outbreaks and pandemics: systematic review of simulation studies.

    PubMed

    Jackson, Charlotte; Mangtani, Punam; Hawker, Jeremy; Olowokure, Babatunde; Vynnycky, Emilia

    2014-01-01

    School closure is a potential intervention during an influenza pandemic and has been investigated in many modelling studies. To systematically review the effects of school closure on influenza outbreaks as predicted by simulation studies. We searched Medline and Embase for relevant modelling studies published by the end of October 2012, and handsearched key journals. We summarised the predicted effects of school closure on the peak and cumulative attack rates and the duration of the epidemic. We investigated how these predictions depended on the basic reproduction number, the timing and duration of closure and the assumed effects of school closures on contact patterns. School closures were usually predicted to be most effective if they caused large reductions in contact, if transmissibility was low (e.g. a basic reproduction number <2), and if attack rates were higher in children than in adults. The cumulative attack rate was expected to change less than the peak, but quantitative predictions varied (e.g. reductions in the peak were frequently 20-60% but some studies predicted >90% reductions or even increases under certain assumptions). This partly reflected differences in model assumptions, such as those regarding population contact patterns. Simulation studies suggest that school closure can be a useful control measure during an influenza pandemic, particularly for reducing peak demand on health services. However, it is difficult to accurately quantify the likely benefits. Further studies of the effects of reactive school closures on contact patterns are needed to improve the accuracy of model predictions.

  13. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant: findings from the Icatibant Outcome Survey.

    PubMed

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard

    2017-01-01

    Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.

  14. Multiple operating system rotation environment moving target defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Evans, Nathaniel; Thompson, Michael

    Systems and methods for providing a multiple operating system rotation environment ("MORE") moving target defense ("MTD") computing system are described. The MORE-MTD system provides enhanced computer system security through a rotation of multiple operating systems. The MORE-MTD system increases attacker uncertainty, increases the cost of attacking the system, reduces the likelihood of an attacker locating a vulnerability, and reduces the exposure time of any located vulnerability. The MORE-MTD environment is effectuated by rotation of the operating systems at a given interval. The rotating operating systems create a consistently changing attack surface for remote attackers.

  15. Three-Dimensional Effects in Multi-Element High Lift Computations

    NASA Technical Reports Server (NTRS)

    Rumsey, Christopher L.; LeeReusch, Elizabeth M.; Watson, Ralph D.

    2003-01-01

    In an effort to discover the causes for disagreement between previous two-dimensional (2-D) computations and nominally 2-D experiment for flow over the three-element McDonnell Douglas 30P-30N airfoil configuration at high lift, a combined experimental/CFD investigation is described. The experiment explores several different side-wall boundary layer control venting patterns, documents venting mass flow rates, and looks at corner surface flow patterns. The experimental angle of attack at maximum lift is found to be sensitive to the side-wall venting pattern: a particular pattern increases the angle of attack at maximum lift by at least 2 deg. A significant amount of spanwise pressure variation is present at angles of attack near maximum lift. A CFD study using three-dimensional (3-D) structured-grid computations, which includes the modeling of side-wall venting, is employed to investigate 3-D effects on the flow. Side-wall suction strength is found to affect the angle at which maximum lift is predicted. Maximum lift in the CFD is shown to be limited by the growth of an off-body corner flow vortex and consequent increase in spanwise pressure variation and decrease in circulation. The 3-D computations with and without wall venting predict similar trends to experiment at low angles of attack, but either stall too early or else overpredict lift levels near maximum lift by as much as 5%. Unstructured-grid computations demonstrate that mounting brackets lower the lift levels near maximum lift conditions.

  16. Three-Dimensional Effects on Multi-Element High Lift Computations

    NASA Technical Reports Server (NTRS)

    Rumsey, Christopher L.; Lee-Rausch, Elizabeth M.; Watson, Ralph D.

    2002-01-01

    In an effort to discover the causes for disagreement between previous 2-D computations and nominally 2-D experiment for flow over the 3-clement McDonnell Douglas 30P-30N airfoil configuration at high lift, a combined experimental/CFD investigation is described. The experiment explores several different side-wall boundary layer control venting patterns, document's venting mass flow rates, and looks at corner surface flow patterns. The experimental angle of attack at maximum lift is found to be sensitive to the side wall venting pattern: a particular pattern increases the angle of attack at maximum lift by at least 2 deg. A significant amount of spanwise pressure variation is present at angles of attack near maximum lift. A CFD study using 3-D structured-grid computations, which includes the modeling of side-wall venting, is employed to investigate 3-D effects of the flow. Side-wall suction strength is found to affect the angle at which maximum lift is predicted. Maximum lift in the CFD is shown to be limited by the growth of all off-body corner flow vortex and consequent increase in spanwise pressure variation and decrease in circulation. The 3-D computations with and without wall venting predict similar trends to experiment at low angles of attack, but either stall too earl or else overpredict lift levels near maximum lift by as much as 5%. Unstructured-grid computations demonstrate that mounting brackets lower die the levels near maximum lift conditions.

  17. Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.

    PubMed

    Maqbool, Zahid; Makhijani, Nidhi; Pammi, V S Chandrasekhar; Dutt, Varun

    2017-05-01

    The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. In an experiment, participants were randomly assigned to three between-subjects conditions ( n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker's successful attack was 10 times the reward for analyst's successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst's successful defense was 10 times the reward for hacker's successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.

  18. Growth of the Antarctic octocoral Primnoella scotiae and predation by the anemone Dactylanthus antarcticus

    NASA Astrophysics Data System (ADS)

    Peck, Lloyd S.; Brockington, Simon

    2013-08-01

    Growth rates in Antarctic marine ectotherms have been demonstrated to be slowed by two to five times compared to shallow-water temperate species, with no previous reports for octocorals. Here growth rates were estimated in the single axis, non-branching Antarctic octocoral Primnoella scotiae using repeated in situ length measures covering both summer and winter periods, for tagged colonies from three sites at Signy Island over a two year period. Mean rates of length increase at the different sites ranged from 0.96 mm yr-1 to 55.3 mm yr-1. The fastest individual colony growth rate at any site ranged from 2.55 mm yr-1 to 175.6 mm yr-1. The mean of the fastest growth rates across all sites was 33.0 mm yr-1±14.7 (s.e.). Growth was significantly different between sites, and also between seasons and years. The mean overall increase in diameter of the average sized colony in the study (222.5 mm in axis length) was 0.053 mm yr-1. This is the slowest reported growth rate of any octocoral to date, and is five times slower than growth in most cold water octocorals. During the study it was noted that colonies were being attacked and consumed by the anemone Dactylanthus antarcticus. At one of the sites studied, between 5% and 8% of colonies surveyed were attacked each month. Anemone dispersal was via whole body inflation and drifting to new prey colonies that were attached to using tentacle-like column protuberances.

  19. [Features of oxygen utilization by the body of patients with arterial hypertension in the days of magnetic storms depending on the psychosomatic status and treatment options].

    PubMed

    Usenko, G A; Usenko, A G; Vasendin, D V

    2015-01-01

    During magnetic storms the observed increase in γ-background environment and the reduction of the rate of oxygen utilization by the tissues, but the increase in the number of angina attacks per day to magnetic storms the choleric, in the days of magnetic storms in sanguine, for 3-4 days at a phlegmatic, and 4-5 days in the melancholic especially in groups high anxiety phlegmatic and melancholic. Last-risk group severe arterial hypertension and ischemic heart disease. Antihypertensive therapy based on the blockade of the features of the psychosomatic status, significantly reduced the number of attacks and brought the values of the utilization of oxygen and coefficient of oxygen utilization bu the tissues of all the days to those in healthy individual relevant anxiety and temperament.

  20. Off-Design Performance of a Streamline-Traced, External-Compression Supersonic Inlet

    NASA Technical Reports Server (NTRS)

    Slater, John W.

    2017-01-01

    A computational study was performed to explore the aerodynamic performance of a streamline-traced, external-compression inlet designed for Mach 1.664 at off-design conditions of freestream Mach number, angle-of-attack, and angle-of-sideslip. Serious degradation of the inlet performance occurred for negative angles-of-attack and angles-of-sideslip greater than 3 degrees. At low subsonic speeds, the swept leading edges of the inlet created a pair of vortices that propagated to the engine face. Increasing the bluntness of the cowl lip showed no real improvement in the inlet performance at the low speeds, but did improve the inlet performance at the design conditions. Reducing the inlet flow rate improved the inlet performance, but at the likely expense of reduced thrust of the propulsion system. Deforming the cowl lip for low-speed operation of the inlet increased the inlet capture area and improved the inlet performance.

  1. Collective attacks and unconditional security in continuous variable quantum key distribution.

    PubMed

    Grosshans, Frédéric

    2005-01-21

    We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et al. to obtain unconditionally secure rates for these protocols.

  2. Hepatitis A Virus Genotype Distribution during a Decade of Universal Vaccination of Preadolescents

    PubMed Central

    D’Andrea, Lucía; Pérez-Rodríguez, Francisco J.; de Castellarnau, Montserrat; Manzanares, Sandra; Lite, Josep; Guix, Susana; Bosch, Albert; Pintó, Rosa M.

    2015-01-01

    A universal vaccination program among preadolescents was implemented in Catalonia, Spain, during the period of 1999–2013 and its effectiveness has been clearly demonstrated by an overall significant attack rate reduction. However, reductions were not constant over time, and increases were again observed in 2002–2009 due to the occurrence of huge outbreaks. In the following years, in the absence of large outbreaks, the attack rate decreased again to very low levels. However, an increase of symptomatic cases in the <5 age group has recently been observed. This is an unexpected observation since children younger than 6 are mostly asymptomatic. Such a long vaccination campaign offers the opportunity to analyze not only the effectiveness of vaccination, but also the influence of the circulating genotypes on the incidence of hepatitis A among the different age groups. This study has revealed the emergence of genotype IC during a foodborne outbreak, the short-lived circulation of vaccine-escape variants isolated during an outbreak among the men-having-sex-with-men group, and the association of genotype IIIA with the increase of symptomatic cases among the very young. From a public health perspective, two conclusions may be drawn: vaccination is better at an early age, and the vaccination schedule must be complete and include all recommended vaccine doses. PMID:25815599

  3. Legionnaires' disease case-finding algorithm, attack rates, and risk factors during a residential outbreak among older adults: an environmental and cohort study.

    PubMed

    Silk, Benjamin J; Foltz, Jennifer L; Ngamsnga, Kompan; Brown, Ellen; Muñoz, Mary Grace; Hampton, Lee M; Jacobs-Slifka, Kara; Kozak, Natalia A; Underwood, J Michael; Krick, John; Travis, Tatiana; Farrow, Olivia; Fields, Barry S; Blythe, David; Hicks, Lauri A

    2013-06-27

    During a Legionnaires' disease (LD) outbreak, combined epidemiological and environmental investigations were conducted to identify prevention recommendations for facilities where elderly residents live independently but have an increased risk of legionellosis. Survey responses (n = 143) were used to calculate attack rates and describe transmission routes by estimating relative risk (RR) and 95% confidence intervals (95% CI). Potable water collected from five apartments of LD patients and three randomly-selected apartments of residents without LD (n = 103 samples) was cultured for Legionella. Eight confirmed LD cases occurred among 171 residents (attack rate = 4.7%); two visitors also developed LD. One case was fatal. The average age of patients was 70 years (range: 62-77). LD risk was lower among residents who reported tub bathing instead of showering (RR = 0.13, 95% CI: 0.02-1.09, P = 0.03). Two respiratory cultures were characterized as L. pneumophila serogroup 1, monoclonal antibody type Knoxville (1,2,3), sequence type 222. An indistinguishable strain was detected in 31 (74%) of 42 potable water samples. Managers of elderly-housing facilities and local public health officials should consider developing a Legionella prevention plan. When Legionella colonization of potable water is detected in these facilities, remediation is indicated to protect residents at higher risk. If LD occurs among residents, exposure reduction, heightened awareness, and clinical surveillance activities should be coordinated among stakeholders. For prompt diagnosis and effective treatment, clinicians should recognize the increased risk and atypical presentation of LD in older adults.

  4. Prediction of the Maximum Temperature for Life Based on the Stability of Metabolites to Decomposition in Water

    PubMed Central

    Bains, William; Xiao, Yao; Yu, Changyong

    2015-01-01

    The components of life must survive in a cell long enough to perform their function in that cell. Because the rate of attack by water increases with temperature, we can, in principle, predict a maximum temperature above which an active terrestrial metabolism cannot function by analysis of the decomposition rates of the components of life, and comparison of those rates with the metabolites’ minimum metabolic half-lives. The present study is a first step in this direction, providing an analytical framework and method, and analyzing the stability of 63 small molecule metabolites based on literature data. Assuming that attack by water follows a first order rate equation, we extracted decomposition rate constants from literature data and estimated their statistical reliability. The resulting rate equations were then used to give a measure of confidence in the half-life of the metabolite concerned at different temperatures. There is little reliable data on metabolite decomposition or hydrolysis rates in the literature, the data is mostly confined to a small number of classes of chemicals, and the data available are sometimes mutually contradictory because of varying reaction conditions. However, a preliminary analysis suggests that terrestrial biochemistry is limited to environments below ~150–180 °C. We comment briefly on why pressure is likely to have a small effect on this. PMID:25821932

  5. Mumps in the US Army 1980-86: should recruits be immunized?

    PubMed Central

    Arday, D R; Kanjarpane, D D; Kelley, P W

    1989-01-01

    The US Army's experience with mumps hospitalizations was examined for the years 1980 through 1986. One hundred fifty-two cases among active duty Army soldiers were identified. Mumps rates declined from 3.85 per 100,000 active duty soldiers per year in 1980 to 1.28 in 1985, but an outbreak during 1986 caused rates to jump to 6.65. Attack rates were found to decline dramatically with increasing age or length of military service, with 74 per cent of cases occurring in soldiers with three years or less of service. Rates for Blacks and Whites were similar, but were higher for other minorities. Complications reported were mild. A cost-benefit analysis, assuming all recruits were to be vaccinated, estimated average annual vaccination program costs of $286,789; this figure exceeds average annual reported hospitalized mumps disease costs of $61,525 by a factor of 4.7. Mumps attack rates would have to reach at least 15.0 per 100,000 per year before savings would equal recruit vaccination costs. Failure to show that a vaccine program would be cost-saving may be due to limitations in identifying cases or to the requirement that all recruits be immunized regardless of prior immune status. It is likely that a program to immunize susceptible individuals alone would show benefit. PMID:2494895

  6. Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents

    NASA Astrophysics Data System (ADS)

    Kim, Kyung-Su; Lee, Hae-Yeoun; Im, Dong-Hyuck; Lee, Heung-Kyu

    Commercial markets employ digital right management (DRM) systems to protect valuable high-definition (HD) quality videos. DRM system uses watermarking to provide copyright protection and ownership authentication of multimedia contents. We propose a real-time video watermarking scheme for HD video in the uncompressed domain. Especially, our approach is in aspect of practical perspectives to satisfy perceptual quality, real-time processing, and robustness requirements. We simplify and optimize human visual system mask for real-time performance and also apply dithering technique for invisibility. Extensive experiments are performed to prove that the proposed scheme satisfies the invisibility, real-time processing, and robustness requirements against video processing attacks. We concentrate upon video processing attacks that commonly occur in HD quality videos to display on portable devices. These attacks include not only scaling and low bit-rate encoding, but also malicious attacks such as format conversion and frame rate change.

  7. Long-term memory for the terrorist attack of September 11: Flashbulb memories, event memories, and the factors that influence their retention

    PubMed Central

    Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lyle, Keith B.; Lustig, Cindy; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.

    2010-01-01

    More than 3,000 individuals from seven US cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, one week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas others demonstrate accelerated forgetting. The present paper indicates that (1) the rate of forgetting for flashbulb memories and event memory (memory for details about the event itself) slows after a year, (2) the strong emotional reactions elicited by flashbulb events are remembered poorly, worse than non-emotional features such as where and from whom one learned of the attack, and (3) the content of flashbulb and event memories stabilizes after a year. The results are discussed in terms of community memory practices. PMID:19397377

  8. Improved Fake-State Attack to the Quantum Key Distribution Systems

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wang, Jian; Tang, Chao-jing

    2012-09-01

    It has been showed that most commercial quantum cryptosystems are vulnerable to the fake-state attacks, which employ the loophole that the avalanche photodiodes as single photon detectors still produce detection events in the linear mode. However, previous fake-state attacks may be easily prevented by either installing a watch dog or reconfiguring the dead-time assigning component. In this paper, we present a new technique to counteract the after-pulse effect ever enhanced by the fake-state attacks, in order to lower the quantum bit error rate. Obviously, it is more difficult to detect the presented attack scheme. Indeed, it contributes to promoting of implementing a secure quantum cryptosystem in real life.

  9. The mechanism and thermodynamics of transesterification of acetate-ester enolates in the gas phase

    NASA Astrophysics Data System (ADS)

    Haas, George W.; Giblin, Daryl E.; Gross, Michael L.

    1998-01-01

    In solution, base-catalyzed hydrolysis and transesterification of esters are initiated by hydroxide- or alkoxide-ion attack at the carbonyl carbon. At low pressures in the gas phase, however, transesterification proceeds by an attack of the enolate anion of an acetate ester on an alcohol. Fourier transform mass spectrometry (FTMS) indicates that the reaction is the second-order process: -CH2-CO2-R + R'-OH --> - CH2-CO2-R' + R-OH and there is little to no detectable production of either alkoxide anion. Labeling studies show that the product and reactant enolate anion esters undergo exchange of hydrogens located [alpha] to the carbonyl carbon with the deuterium of R'-OD. The extent of the H/D exchange increases with reaction time, pointing to a short-lived intermediate. The alcoholysis reaction rate constants increase with increasing acidity of the primary, straight-chained alkyl alcohols, whereas steric effects associated with branched alcohols cause the rate constants to decrease. Equilibrium constants, which were determined directly from measurements at equilibrium and which were calculated from the forward and reverse rate constants, are near unity and show internal consistency. In the absence of steric effects, the larger enolate is always the favored product at equilibrium. The intermediate for the transesterification reaction, which can be generated at a few tenths of a torr in a tandem mass spectrometer, is tetrahedral, but other adducts that are collisionally stabilized under these conditions are principally loosely bound complexes.

  10. Exposure to the World Trade Center Attack and the Use of Cigarettes and Alcohol Among New York City Public High-School Students

    PubMed Central

    Wu, Ping; Duarte, Cristiane S.; Mandell, Donald J.; Fan, Bin; Liu, Xinhua; Fuller, Cordelia J.; Musa, George; Cohen, Michael; Cohen, Patricia; Hoven, Christina W.

    2006-01-01

    We examined exposure to the World Trade Center attack and changes in cigarette smoking and drinking among 2731 New York City public high-school students evaluated 6 months after the attack. Increased drinking was associated with direct exposure to the World Trade Center attack (P < .05). Increased smoking was not directly associated with exposure to the World Trade Center attack but was marginally significantly associated with posttraumatic stress disorder (P= .06). Our findings suggest that targeted substance-use interventions for youths may be warranted after large-scale disasters. PMID:16571705

  11. Risk factors for measles mortality and the importance of decentralized case management during an unusually large measles epidemic in eastern Democratic Republic of Congo in 2013

    PubMed Central

    Polonsky, Jonathan; Ciglenecki, Iza; Bichet, Mathieu; Coldiron, Matthew; Thuambe Lwiyo, Enoch; Akonda, Innocent; Serafini, Micaela; Porten, Klaudia

    2018-01-01

    In 2013, a large measles epidemic occurred in the Aketi Health Zone of the Democratic Republic of Congo. We conducted a two-stage, retrospective cluster survey to estimate the attack rate, the case fatality rate, and the measles-specific mortality rate during the epidemic. 1424 households containing 7880 individuals were included. The estimated attack rate was 14.0%, (35.0% among children aged <5 years). The estimated case fatality rate was 4.2% (6.1% among children aged <5 years). Spatial analysis and linear regression showed that younger children, those who did not receive care, and those living farther away from Aketi Hospital early in the epidemic had a higher risk of measles related death. Vaccination coverage prior to the outbreak was low (76%), and a delayed reactive vaccination campaign contributed to the high attack rate. We provide evidences suggesting that a comprehensive case management approach reduced measles fatality during this epidemic in rural, inaccessible resource-poor setting. PMID:29538437

  12. Risk factors for measles mortality and the importance of decentralized case management during an unusually large measles epidemic in eastern Democratic Republic of Congo in 2013.

    PubMed

    Gignoux, Etienne; Polonsky, Jonathan; Ciglenecki, Iza; Bichet, Mathieu; Coldiron, Matthew; Thuambe Lwiyo, Enoch; Akonda, Innocent; Serafini, Micaela; Porten, Klaudia

    2018-01-01

    In 2013, a large measles epidemic occurred in the Aketi Health Zone of the Democratic Republic of Congo. We conducted a two-stage, retrospective cluster survey to estimate the attack rate, the case fatality rate, and the measles-specific mortality rate during the epidemic. 1424 households containing 7880 individuals were included. The estimated attack rate was 14.0%, (35.0% among children aged <5 years). The estimated case fatality rate was 4.2% (6.1% among children aged <5 years). Spatial analysis and linear regression showed that younger children, those who did not receive care, and those living farther away from Aketi Hospital early in the epidemic had a higher risk of measles related death. Vaccination coverage prior to the outbreak was low (76%), and a delayed reactive vaccination campaign contributed to the high attack rate. We provide evidences suggesting that a comprehensive case management approach reduced measles fatality during this epidemic in rural, inaccessible resource-poor setting.

  13. Quantum-chaotic cryptography

    NASA Astrophysics Data System (ADS)

    de Oliveira, G. L.; Ramos, R. V.

    2018-03-01

    In this work, it is presented an optical scheme for quantum key distribution employing two synchronized optoelectronic oscillators (OEO) working in the chaotic regime. The produced key depends on the chaotic dynamic, and the synchronization between Alice's and Bob's OEOs uses quantum states. An attack on the synchronization signals will disturb the synchronization of the chaotic systems increasing the error rate in the final key.

  14. Efficient Hybrid Watermarking Scheme for Security and Transmission Bit Rate Enhancement of 3D Color-Plus-Depth Video Communication

    NASA Astrophysics Data System (ADS)

    El-Shafai, W.; El-Rabaie, S.; El-Halawany, M.; Abd El-Samie, F. E.

    2018-03-01

    Three-Dimensional Video-plus-Depth (3DV + D) comprises diverse video streams captured by different cameras around an object. Therefore, there is a great need to fulfill efficient compression to transmit and store the 3DV + D content in compressed form to attain future resource bounds whilst preserving a decisive reception quality. Also, the security of the transmitted 3DV + D is a critical issue for protecting its copyright content. This paper proposes an efficient hybrid watermarking scheme for securing the 3DV + D transmission, which is the homomorphic transform based Singular Value Decomposition (SVD) in Discrete Wavelet Transform (DWT) domain. The objective of the proposed watermarking scheme is to increase the immunity of the watermarked 3DV + D to attacks and achieve adequate perceptual quality. Moreover, the proposed watermarking scheme reduces the transmission-bandwidth requirements for transmitting the color-plus-depth 3DV over limited-bandwidth wireless networks through embedding the depth frames into the color frames of the transmitted 3DV + D. Thus, it saves the transmission bit rate and subsequently it enhances the channel bandwidth-efficiency. The performance of the proposed watermarking scheme is compared with those of the state-of-the-art hybrid watermarking schemes. The comparisons depend on both the subjective visual results and the objective results; the Peak Signal-to-Noise Ratio (PSNR) of the watermarked frames and the Normalized Correlation (NC) of the extracted watermark frames. Extensive simulation results on standard 3DV + D sequences have been conducted in the presence of attacks. The obtained results confirm that the proposed hybrid watermarking scheme is robust in the presence of attacks. It achieves not only very good perceptual quality with appreciated PSNR values and saving in the transmission bit rate, but also high correlation coefficient values in the presence of attacks compared to the existing hybrid watermarking schemes.

  15. Cougar attacks on children: injury patterns and treatment.

    PubMed

    Kadesky, K M; Manarey, C; Blair, G K; Murphy, J J; Verchere, C; Atkinson, K

    1998-06-01

    Cougar attacks on humans appear to be on the rise. A review of all attacks on children was performed to determine the method of attack and injury patterns so that a treatment regimen as well as possible preventative measures could be determined. A review of all attacks, including attacks on children, was performed, including three recent attacks treated at our institution. Situation, adult supervision, patient age, injuries recorded, survival, and mode of attack, if known, were reviewed. There were 50 documented attacks on children with a 25% fatality rate. Most children were not alone at the time of the attack (92%), and in many instances adult supervision was present or nearby. Severe head and neck lacerations along with puncture wounds were the most common injury. Examples of typical cervical injuries include a nonfatal vertebral artery injury, phrenic nerve injury, a fatal internal carotid artery injury, and a fatal cervical spine injury. The cougar was rabid in two cases. Pasteurella resulted in late infections in two patients. Based on the pattern of injuries, the authors recommend aggressive evaluation for occult cervical injuries as well as surgical debridement. Antibiotics should cover oropharyngeal flora including Pasteurella multocida. Rabies prophylaxis is indicated. Adult supervision in wilderness areas is not necessarily protective.

  16. Selectively Encrypted Pull-Up Based Watermarking of Biometric data

    NASA Astrophysics Data System (ADS)

    Shinde, S. A.; Patel, Kushal S.

    2012-10-01

    Biometric authentication systems are becoming increasingly popular due to their potential usage in information security. However, digital biometric data (e.g. thumb impression) are themselves vulnerable to security attacks. There are various methods are available to secure biometric data. In biometric watermarking the data are embedded in an image container and are only retrieved if the secrete key is available. This container image is encrypted to have more security against the attack. As wireless devices are equipped with battery as their power supply, they have limited computational capabilities; therefore to reduce energy consumption we use the method of selective encryption of container image. The bit pull-up-based biometric watermarking scheme is based on amplitude modulation and bit priority which reduces the retrieval error rate to great extent. By using selective Encryption mechanism we expect more efficiency in time at the time of encryption as well as decryption. Significant reduction in error rate is expected to be achieved by the bit pull-up method.

  17. Kinetics of enzymatic high-solid hydrolysis of lignocellulosic biomass studied by calorimetry.

    PubMed

    Olsen, Søren N; Lumby, Erik; McFarland, Kc; Borch, Kim; Westh, Peter

    2011-03-01

    Enzymatic hydrolysis of high-solid biomass (>10% w/w dry mass) has become increasingly important as a key step in the production of second-generation bioethanol. To this end, development of quantitative real-time assays is desirable both for empirical optimization and for detailed kinetic analysis. In the current work, we have investigated the application of isothermal calorimetry to study the kinetics of enzymatic hydrolysis of two substrates (pretreated corn stover and Avicel) at high-solid contents (up to 29% w/w). It was found that the calorimetric heat flow provided a true measure of the hydrolysis rate with a detection limit of about 500 pmol glucose s(-1). Hence, calorimetry is shown to be a highly sensitive real-time method, applicable for high solids, and independent on the complexity of the substrate. Dose-response experiments with a typical cellulase cocktail enabled a multidimensional analysis of the interrelationships of enzyme load and the rate, time, and extent of the reaction. The results suggest that the hydrolysis rate of pretreated corn stover is limited initially by available attack points on the substrate surface (<10% conversion) but becomes proportional to enzyme dosage (excess of attack points) at later stages (>10% conversion). This kinetic profile is interpreted as an increase in polymer end concentration (substrate for CBH) as the hydrolysis progresses, probably due to EG activity in the enzyme cocktail. Finally, irreversible enzyme inactivation did not appear to be the source of reduced hydrolysis rate over time.

  18. A comparison of the nature and correlates of panic attacks in the context of Panic Disorder and Social Anxiety Disorder.

    PubMed

    Brown, Lily A; LeBeau, Richard; Liao, Betty; Niles, Andrea N; Glenn, Daniel; Craske, Michelle G

    2016-01-30

    Panic attacks occurring outside of Panic Disorder are not well-understood despite their inclusion as a diagnostic specifier in the Diagnostic and Statistical Manual for Mental Disorders (DSM-5). This study compares panic attacks in the context of Panic Disorder compared to social anxiety in terms of their symptom frequency, severity, and clinical correlates. Participants (n=404) were interviewed using the Anxiety Disorders Interview Schedule (ADIS-IV-L; Brown et al., 1994), from which we analyzed interviewer ratings of panic attacks and panic attack symptoms, as well as other demographic and clinical characteristics. Panic attacks in the context of Panic Disorder were characterized by a greater number and severity of symptoms compared to panic attacks in the context of Social Anxiety Disorder, and were associated with a history of traumatization, inpatient psychiatric treatment, and benzodiazepine use. Social anxiety panic attacks were associated with reduced physical health concerns. Cognitive panic attack symptoms were more prevalent in Panic Disorder and were associated with a variety of poor clinical correlates. Panic attacks in the context of Panic Disorder are more severe than those in social anxiety, and this may be driven by cognitive disturbances during those attacks. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  19. Dopaminergic regulation of sleep and cataplexy in a murine model of narcolepsy.

    PubMed

    Burgess, Christian R; Tse, Gavin; Gillis, Lauren; Peever, John H

    2010-10-01

    To determine if the dopaminergic system modulates cataplexy, sleep attacks and sleep-wake behavior in narcoleptic mice. Hypocretin/orexin knockout (i.e., narcoleptic) and wild-type mice were administered amphetamine and specific dopamine receptor modulators to determine their effects on sleep, cataplexy and sleep attacks. Hypocretin knockout (n = 17) and wild-type mice (n = 21). Cataplexy, sleep attacks and sleep-wake behavior were identified using electroencephalogram, electromyogram and videography. These behaviors were monitored for 4 hours after an i.p. injection of saline, amphetamine and specific dopamine receptor modulators (D1- and D2-like receptor modulators). Amphetamine (2 mg/kg), which increases brain dopamine levels, decreased sleep attacks and cataplexy by 61% and 67%, suggesting that dopamine transmission modulates such behaviors. Dopamine receptor modulation also had powerful effects on sleep attacks and cataplexy. Activation (SKF 38393; 20 mg/kg) and blockade (SCH 23390; 1 mg/kg) of D1-like receptors decreased and increased sleep attacks by 77% and 88%, without affecting cataplexy. Pharmacological activation of D2-like receptors (quinpirole; 0.5 mg/kg) increased cataplectic attacks by 172% and blockade of these receptors (eticlopride; 1 mg/kg) potently suppressed them by 97%. Manipulation of D2-like receptors did not affect sleep attacks. We show that the dopaminergic system plays a role in regulating both cataplexy and sleep attacks in narcoleptic mice. We found that cataplexy is modulated by a D2-like receptor mechanism, whereas dopamine modulates sleep attacks by a D1-like receptor mechanism. These results support a role for the dopamine system in regulating sleep attacks and cataplexy in a murine model of narcolepsy.

  20. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  1. Evidence for maintenance of sex by pathogens in plants.

    PubMed

    Busch, Jeremiah W; Neiman, Maurine; Koslow, Jennifer M

    2004-11-01

    The predominance of outcrossing despite the substantial transmission advantage of self-fertilization remains a paradox. Theory suggests that selection can favor outcrossing if it enables the production of offspring that are less susceptible to pathogen attack than offspring produced via self-fertilization. Thus, if pathogen pressure is contributing to the maintenance of outcrossing in plants, there may be a positive correlation between the number of pathogen species attacking plant species and the outcrossing rate of the plant species. We tested this hypothesis by examining the association between outcrossing rate and the number of fungal pathogen species that attack a large, taxonomically diverse set of seed plants. We show that plant species attacked by more fungal pathogen species have higher outcrossing rates than plants with fewer enemies. This relationship persists after correcting for study bias among natural and agricultural species of plants. We also accounted for the nested hierarchy of relationships among plant lineages by conducting phylogenetically independent contrasts (PICs) within genera and families that were adequately represented in our dataset. A meta-analysis of the correlation between pathogen and outcrossing PICs shows that there is a positive correlation between pathogen species number and outcrossing rates. This pattern is consistent with the hypothesis that pathogen-mediated selection may contribute to the maintenance of outcrossing in species of seed plants.

  2. Responses to false physiological feedback in individuals with panic attacks and elevated anxiety sensitivity.

    PubMed

    Story, Tyler J; Craske, Michelle G

    2008-09-01

    Participants with elevated anxiety sensitivity and a history of panic attacks were compared to a low anxiety comparison group with respect to physiological and subjective reactivity to false heart-rate feedback and reactivity to a priming procedure. Whereas accurate heart-rate feedback elicited minimal responses, participants across groups showed significant physiological and subjective responses to false feedback. High risk and low risk participants did not differ in heart-rate responses to false feedback, though panic attack frequency did predict physiological and subjective reactions to false feedback in the high risk group. Self-reported nonspecific anxiety was significantly higher in high risk female participants than in low risk female participants, while males did not different in general subjective anxiety. However, high risk participants reported more panic-specific symptoms during the false feedback task than low risk participants, regardless of the sex of the participant. Therefore, although the experimental paradigm appeared to trigger nonspecific anxiety in high risk female participants, panic attack symptoms in reaction to the task were specific to risk group, not sex, and consistent with hypotheses. Surprisingly, the priming procedure did not influence physiological or subjective responses to false feedback in either group. These results raise additional questions regarding the process and impact of interception in individuals with panic attacks, and suggest that false perception of internal changes may contribute to risk for panic disorder when exposed to believable cues.

  3. A rare case of recurrent vasodepressive attacks of 2-hours duration: analysis of the mechanism by muscle sympathetic nerve activity recording.

    PubMed

    Yatomi, A; Iguchi, A; Uemura, K; Sakamoto, N; Iwase, S; Mano, T

    1989-03-01

    Muscle sympathetic nerve activity was recorded in a 57-year-old male patient suffering from severe hypotensive attacks with bradycardia for 10 years. Continuous blood pressure recording demonstrated frequent drastic falls in pressure. Disappearance and reappearance of muscle sympathetic nerve activity coincided with the onset and termination of attacks. Awakening from sleep or emotional and/or cardiovascular stress seems to trigger hypotension. Cardiac pacemaker was not useful in limiting the attack, because right ventricular pacing caused abrupt falls in both blood pressure and heart rate.

  4. Reexperiencing symptoms, dissociation, and avoidance behaviors in daily life of patients with PTSD and patients with panic disorder with agoraphobia.

    PubMed

    Pfaltz, Monique C; Michael, Tanja; Meyer, Andrea H; Wilhelm, Frank H

    2013-08-01

    Panic attacks are frequently perceived as life threatening. Panic disorder (PD) patients may therefore experience symptoms of posttraumatic stress disorder (PTSD). The authors explored this in 28 healthy controls, 17 PTSD patients, and 24 PD patients with agoraphobia who completed electronic diaries 36 times during 1 week. Patient groups frequently reported dissociation as well as thoughts, memories, and reliving of their trauma or panic attacks. PTSD patients reported more trauma/panic attack thoughts (incidence rate ratio [IRR] = 2.9) and memories (IRR = 2.8) than PD patients. Patient groups relived their trauma or panic attacks equally frequently, and reported comparable bodily reactions and distress associated with trauma or panic attack memories. Clinical groups avoided trauma or panic attack reminders more often than healthy controls (avoidance of trauma- or panic attack-related thoughts (IRR = 8.0); avoidance of things associated with the trauma or panic attack (IRR = 40.7). PD patients avoided trauma or panic attack reminders less often than PTSD patients (avoidance of trauma- or panic attack-related thoughts [IRR = 2.5]; avoidance of things associated with the trauma or panic attack [IRR = 4.1]), yet these differences were nonsignificant when controlling for functional impairment. In conclusion, trauma-like symptoms are common in PD with agoraphobia and panic attacks may be processed similarly as trauma in PTSD. Copyright © 2013 International Society for Traumatic Stress Studies.

  5. False Positive and False Negative Effects on Network Attacks

    NASA Astrophysics Data System (ADS)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  6. Carbon balance of a partially-harvested mixed conifer forest following mountain pine beetle attack and its comparison to a clearcut

    NASA Astrophysics Data System (ADS)

    Mathys, A.; Black, T. A.; Nesic, Z.; Nishio, G.; Brown, M.; Spittlehouse, D. L.; Fredeen, A. L.; Bowler, R.; Jassal, R. S.; Grant, N. J.; Burton, P. J.; Trofymow, J. A.

    2013-03-01

    The recent mountain pine beetle (MPB) outbreak has had an impact on the carbon (C) cycling of lodgepole pine forests in British Columbia. This study examines how partial harvesting as a forest management response to MPB infestation affects the net ecosystem production (NEP) of a mixed conifer forest (MPB-09) in Interior BC. MPB-09 is a 70-yr old stand that was partially harvested in 2009 after it had been attacked by MPB. Using the eddy-covariance technique, the C dynamics of the stand were studied over two years and compared to an adjacent clearcut (MPB-09C) over the growing season. The annual NEP at MPB-09 increased from -108 g C m-2 in 2010 to -57 g C m-2 in 2011. The increase of NEP was due to the associated increase in annual gross ecosystem photosynthesis (GEP) from 812 g C m-2 in 2010 to 954 g C m-2 in 2011 exceeding the increase in annual respiration (Re) from 920 g C m-2 to 1011 g C m-2 during the two years. During the growing season of 2010, NEP at MPB-09C was -132 g C m-2 indicating high C losses in the clearcut. MPB-09 was a C sink during the growing season of both years, increasing from 9 g C m-2 in 2010 to 47 g C m-2 in 2011. The increase of NEP in the partially-harvested stand amounted to a recovery corresponding to a 25% increase in the maximum assimilation rate in the second year. This study shows that retaining the healthy residual forest can result in higher C sequestration of MPB-attacked stands compared to clearcut harvesting.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    John Homer; Ashok Varikuti; Xinming Ou

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability ofmore » the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.« less

  8. Shifting blame? Impact of reports of violence and mental illness in the context of terrorism on population attitudes towards persons with mental illness in Germany.

    PubMed

    Schomerus, Georg; Stolzenburg, Susanne; Bauch, Alexandra; Speerforck, Sven; Janowitz, Deborah; Angermeyer, Matthias C

    2017-06-01

    We examine whether reporting on violent and terrorist acts committed in July 2016 by persons who, among other characteristics, were suspected to have mental health issues did impact on mental illness stigma, and whether any changes added to changes observed after the Germanwings plane crash in 2015. Three identical online surveys (in 2014, 2015 and 2016) were conducted among persons >15 years old from an established market research panel in Germany (N=2195). Participants answered questions about a woman ("Anne") with either depression or schizophrenia as described in an unlabeled vignette. In the 2016 survey (<4 weeks after the attacks), we also elicited perceived causes of the violent incidents. Compared to 2014, the predicted probability to rate Anne as dangerous increased from 7% to 11%. Perceived unpredictability increased from 17% to 23%. Other stigma measures did not change significantly. No significant changes were visible between 2015 and 2016. Mental illness ranked third among the most important perceived causes for the attacks in 2016, after 'religious beliefs' and 'being manipulated by others'. Overall, the observed attitude changes were small. We discuss how the context of the attacks may have prevented further attitude change regarding persons with mental illness. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  9. Gastroenteritis outbreaks on cruise ships: contributing factors and thresholds for early outbreak detection

    PubMed Central

    Mouchtouri, Varvara A; Verykouki, Eleni; Zamfir, Dumitru; Hadjipetris, Christos; Lewis, Hannah C; Hadjichristodoulou, Christos

    2017-01-01

    When an increased number of acute gastroenteritis (AG) cases is detected among tourists staying at the same accommodation, outbreak management plans must be activated in a timely manner to prevent large outbreaks. Syndromic surveillance data collected between 1 January 2010 and 31 December 2013 by five seagoing cruise ships were analysed to identify attack rate thresholds for early outbreak detection. The overall incidence rate of AG was 2.81 cases per 10,000 traveller-days (95% confidence interval (CI): 0.00–17.60), while the attack rate was 19.37 cases per 10,000 travellers (95% CI: 0.00–127.69). The probability of an outbreak occurring was 11% if 4 per 1,000 passengers reported symptoms within the first 2 days of the voyage, and this increased to 23 % if 5 per 1,000 passengers reported such within the first 3 days. The risk ratio (RR) for outbreak occurrence was 2.35, 5.66 and 8.63 for 1, 2 and 3 days’ delay of symptoms reporting respectively, suggesting a dose–response relationship. Shipping companies’ policies and health authorities’ efforts may consider these thresholds for initiating outbreak response measures based on the number of cases according to day of cruise. Efforts should focus on ensuring travellers report symptoms immediately and comply with isolation measures. PMID:29162205

  10. Deletion of the membrane complement inhibitor CD59a drives age and gender-dependent alterations to bone phenotype in mice.

    PubMed

    Bloom, Anja C; Collins, Fraser L; Van't Hof, Rob J; Ryan, Elizabeth S; Jones, Emma; Hughes, Timothy R; Morgan, B Paul; Erlandsson, Malin; Bokarewa, Maria; Aeschlimann, Daniel; Evans, Bronwen A J; Williams, Anwen S

    2016-03-01

    Degenerative joint diseases such as osteoarthritis are characterised by aberrant region-specific bone formation and abnormal bone mineral content. A recent study suggested a role for the complement membrane attack complex in experimental models of osteoarthritis. Since CD59a is the principal regulator of the membrane attack complex in mice, we evaluated the impact of CD59a gene deletion upon maintenance of bone architecture. In vivo bone morphology analysis revealed that male CD59a-deficient mice have increased femur length and cortical bone volume, albeit with reduced bone mineral density. However, this phenomenon was not observed in female mice. Histomorphometric analysis of the trabecular bone showed increased rates of bone homeostasis, with both increased bone resorption and mineral apposition rate in CD59a-deficient male mice. When bone cells were studied in isolation, in vitro osteoclastogenesis was significantly increased in male CD59a-deficient mice, although osteoblast formation was not altered. Our data reveal, for the first time, that CD59a is a regulator of bone growth and homeostasis. CD59a ablation in male mice results in longer and wider bones, but with less density, which is likely a major contributing factor for their susceptibility to osteoarthritis. These findings increase our understanding of the role of complement regulation in degenerative arthritis. Copyright © 2016 Amgen Inc. Published by Elsevier Inc. All rights reserved.

  11. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    PubMed

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2017-05-01

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  12. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  13. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  14. Cognitive and affective matching effects in persuasion: an amplification perspective.

    PubMed

    Clarkson, Joshua J; Tormala, Zakary L; Rucker, Derek D

    2011-11-01

    Past research suggests that cognitive and affective attitudes are more open to change toward cognitive and affective (i.e., matched) persuasive attacks, respectively. The present research investigates how attitude certainty influences this openness. Although an extensive literature suggests that certainty generally reduces an attitude's openness to change, the authors explore the possibility that certainty might increase an attitude's openness to change in the context of affective or cognitive appeals. Based on the recently proposed amplification hypothesis, the authors posit that high (vs. low) attitude certainty will boost the resistance of attitudes to mismatched attacks (e.g., affective attitudes attacked by cognitive messages) but boost the openness of attitudes to matched attacks (e.g., affective attitudes attacked by affective messages). Two experiments provide support for this hypothesis. Implications for increasing the openness of attitudes to both matched and mismatched attacks are discussed.

  15. Long-Term Memory for the Terrorist Attack of September 11: Flashbulb Memories, Event Memories, and the Factors that Influence Their Retention

    ERIC Educational Resources Information Center

    Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lustig, Cindy; Lyle, Keith B.; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.

    2009-01-01

    More than 3,000 individuals from 7 U.S. cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, 1 week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas…

  16. Serial agonistic attacks by greylag goose families, Anser anser, against the same opponent

    PubMed Central

    Scheiber, Isabella B.R.; Kotrschal, Kurt; Weiß, Brigitte M.

    2011-01-01

    It is known from primates that alliance partners may support each other’s interests in competition with others, for example, through repeated agonistic attacks against a particular individual. We examined serial aggressive interactions between greylag goose families and other flock members. We found that repeated attacks towards the same individual were common and that up to five serial attacks by family members followed an initial attack. Family size did not affect the frequency of such serial attacks. Juvenile geese evidently benefited most from active social support through serial attacks. About 60% of the juveniles’ lost primary interactions were subsequently reversed by another family member. This may be one of the reasons why juveniles rank higher in the social hierarchy than would be expected from their age and size alone. Losses in serial attacks predominantly occurred against other, presumably higher-ranking, family geese and ganders. We propose three major functions/consequences of serial attacks. Analogous to primates, serial attacks in greylag geese may serve to reinforce a losing experience of an opponent defeated in a preceding attack. On the side of the winning family, serial attacks may reinforce the experience of winning. Both winning and losing experiences are linked with physiological consequences in higher vertebrates, affecting the future social performance of winners or losers. Finally, serial attacks may signal the agonistic potential of a family to other flock members. This is supported by heart rate data, which indicate that greylags are competent to interpret third-party relationships. PMID:21984838

  17. Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.

    PubMed

    Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H

    2010-06-01

    Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.

  18. Effectiveness of workplace social distancing measures in reducing influenza transmission: a systematic review.

    PubMed

    Ahmed, Faruque; Zviedrite, Nicole; Uzicanin, Amra

    2018-04-18

    Social distancing is one of the community mitigation measures that may be recommended during influenza pandemics. Social distancing can reduce virus transmission by increasing physical distance or reducing frequency of congregation in socially dense community settings, such as schools or workplaces. We conducted a systematic review to assess the evidence that social distancing in non-healthcare workplaces reduces or slows influenza transmission. Electronic searches were conducted using MEDLINE, Embase, Scopus, Cochrane Library, PsycINFO, CINAHL, NIOSHTIC-2, and EconLit to identify studies published in English from January 1, 2000, through May 3, 2017. Data extraction was done by two reviewers independently. A narrative synthesis was performed. Fifteen studies, representing 12 modeling and three epidemiological, met the eligibility criteria. The epidemiological studies showed that social distancing was associated with a reduction in influenza-like illness and seroconversion to 2009 influenza A (H1N1). However, the overall risk of bias in the epidemiological studies was serious. The modeling studies estimated that workplace social distancing measures alone produced a median reduction of 23% in the cumulative influenza attack rate in the general population. It also delayed and reduced the peak influenza attack rate. The reduction in the cumulative attack rate was more pronounced when workplace social distancing was combined with other nonpharmaceutical or pharmaceutical interventions. However, the effectiveness was estimated to decline with higher basic reproduction number values, delayed triggering of workplace social distancing, or lower compliance. Modeling studies support social distancing in non-healthcare workplaces, but there is a paucity of well-designed epidemiological studies. PROSPERO registration # CRD42017065310.

  19. Robustness and structure of complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai

    This dissertation covers the two major parts of my PhD research on statistical physics and complex networks: i) modeling a new type of attack -- localized attack, and investigating robustness of complex networks under this type of attack; ii) discovering the clustering structure in complex networks and its influence on the robustness of coupled networks. Complex networks appear in every aspect of our daily life and are widely studied in Physics, Mathematics, Biology, and Computer Science. One important property of complex networks is their robustness under attacks, which depends crucially on the nature of attacks and the structure of the networks themselves. Previous studies have focused on two types of attack: random attack and targeted attack, which, however, are insufficient to describe many real-world damages. Here we propose a new type of attack -- localized attack, and study the robustness of complex networks under this type of attack, both analytically and via simulation. On the other hand, we also study the clustering structure in the network, and its influence on the robustness of a complex network system. In the first part, we propose a theoretical framework to study the robustness of complex networks under localized attack based on percolation theory and generating function method. We investigate the percolation properties, including the critical threshold of the phase transition pc and the size of the giant component Pinfinity. We compare localized attack with random attack and find that while random regular (RR) networks are more robust against localized attack, Erdoḧs-Renyi (ER) networks are equally robust under both types of attacks. As for scale-free (SF) networks, their robustness depends crucially on the degree exponent lambda. The simulation results show perfect agreement with theoretical predictions. We also test our model on two real-world networks: a peer-to-peer computer network and an airline network, and find that the real-world networks are much more vulnerable to localized attack compared with random attack. In the second part, we extend the tree-like generating function method to incorporating clustering structure in complex networks. We study the robustness of a complex network system, especially a network of networks (NON) with clustering structure in each network. We find that the system becomes less robust as we increase the clustering coefficient of each network. For a partially dependent network system, we also find that the influence of the clustering coefficient on network robustness decreases as we decrease the coupling strength, and the critical coupling strength qc, at which the first-order phase transition changes to second-order, increases as we increase the clustering coefficient.

  20. Adaptive optimisation-offline cyber attack on remote state estimator

    NASA Astrophysics Data System (ADS)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  1. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less

  2. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-03-31

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less

  3. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-10-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  4. Correlates of nest-defense behavior of common terns

    USGS Publications Warehouse

    Erwin, R.M.

    1988-01-01

    Nest-defense behavior was studied at seven Common Tern (Sterna hirundo) colonies in southern coastal New Jersey during June and July 1981. Data were collected weekly on numbers of adults, nests, eggs, and young in relation to the frequency and intensity of dive attacks on a human intruder by nesting terns. I explored the relationships between attack behavior and colony size/density, seasonality, and brood survival. The results provide little support for social facilitation since neither colony size (range 30-250 nests) nor density was related to mean attack frequency; however, in larger colonies, fewer birds participated in dive attacks. Although the intensity of attacks was strongly seasonal, patterns were very different among colonies and peak attack rates did not always coincide with peak hatching periods. Defense levels declined late in the season in most colonies regardless of whether brood survival was high or low. Colonies with individuals that attacked early in the season had higher overall nesting success than in colonies where individuals showed little early season aggression.

  5. The effects of stress, anxiety, and outdoor temperature on the frequency and severity of Raynaud's attacks: the Raynaud's Treatment Study.

    PubMed

    Brown, K M; Middaugh, S J; Haythornthwaite, J A; Bielory, L

    2001-04-01

    It was expected that stress and anxiety would be related to Raynaud's phenomenon (RP) attack characteristics when mild outdoor temperatures produced partial or no digital vasoconstriction. Hypotheses were that in warmer temperature categories, compared to those below 40 degrees F, higher stress or anxiety would be associated with more frequent, severe, and painful attacks. The Raynaud's Treatment Study recruited 313 participants with primary RP. Outcomes were attack rate, severity, and pain. Predictors were average daily outdoor temperature, stress, anxiety, age, gender, and a stress-by-temperature or an anxiety-by-temperature interaction. Outcomes were tested separately in multiple linear regression models. Stress and anxiety were tested in separate models. Stress was not a significant predictor of RP attack characteristics. Higher anxiety was related to more frequent attacks above 60 degrees F. It was also related to greater attack severity at all temperatures, and to greater pain above 60 degrees F and between 40 degrees and 49.9 degrees F.

  6. Rotation Rate Sensing via Magnetostatic Surface Wave Propagation on a Thick Yig Ring.

    DTIC Science & Technology

    1979-12-03

    Introduction . . . . . . . . . . . 1 Background . . . . . . . . I Statement of the Problem. o o . 4 Plan of Attack. o. . o o o • 4 Sequence of...crystal growth process. It was subsequently suggested that the thin film disfiguration problem could be avoided by ma- chining the desired ring...sensor provide any practical advantages that would make it a better choice over current rate sensing schemes? Plan of Attack This thesis concerns itself

  7. Meningococcal disease. Secondary attack rate and chemoprophylaxis in the United States, 1974.

    PubMed

    1976-01-19

    Three hundred twenty-six reported cases of meningococcal disease in the United States from November 1973 through March 1974 were investigated. Three household members became ill with meningococcal disease following onset of the initial case in their household. The secondary attack rate was approximately 3/1,000 household members. In 60% of the households, members were given an antimicrobial drug as chemoprophylaxis for meningococcal disease, but only 35% received minocycline hydrochloride or rifampin, the two drugs now available for the eradication of sulfonamide-resistant meningococci from the nasopharynx. Only 26% given chemoprophylaxis received the drug within 24 hours after the patient's hospital admission. Survey results indicate that the secondary attack rate of meningococcal disease may justify the use of chemoprophylaxis, but that frequently in the United States, the drugs given are likely to be ineffective, give too late, or administered to persons who are not at high risk to meningococcal disease.

  8. Assessing post-fire Douglas-fir mortality and Douglas-fir beetle attacks in the northern Rocky Mountains

    Treesearch

    Sharon Hood; Barbara Bentz; Ken Gibson; Kevin Ryan; Gregg DeNitto

    2007-01-01

    Douglas-fir has life history traits that greatly enhance resistance to injury from fire, thereby increasing post-fire survival rates. Tools for predicting the probability of tree mortality following fire are important components of both pre-fire planning and post-fire management efforts. Using data from mixed-severity wildfire in Montana and Wyoming, Hood and Bentz (...

  9. Hospitalizations for asthma among adults exposed to the September 11, 2001 World Trade Center terrorist attack.

    PubMed

    Miller-Archie, Sara A; Jordan, Hannah T; Alper, Howard; Wisnivesky, Juan P; Cone, James E; Friedman, Stephen M; Brackbill, Robert M

    2018-04-01

    We described the patterns of asthma hospitalization among persons exposed to the 2001 World Trade Center (WTC) attacks, and assessed whether 9/11-related exposures or comorbidities, including posttraumatic stress disorder (PTSD) and gastroesophageal reflux symptoms (GERS), were associated with an increased rate of hospitalization. Data for adult enrollees in the WTC Health Registry, a prospective cohort study, with self-reported physician-diagnosed asthma who resided in New York State on 9/11 were linked to administrative hospitalization data to identify asthma hospitalizations during September 11, 2001-December 31, 2010. Multivariable zero-inflated Poisson regression was used to examine associations among 9/11 exposures, comorbid conditions, and asthma hospitalizations. Of 11 471 enrollees with asthma, 406 (3.5%) had ≥1 asthma hospitalization during the study period (721 total hospitalizations). Among enrollees diagnosed before 9/11 (n = 6319), those with PTSD or GERS had over twice the rate of hospitalization (adjusted rate ratio (ARR) = 2.5, 95% CI = 1.4-4.1; ARR = 2.1, 95% CI = 1.3-3.2, respectively) compared to those without. This association was not statistically significant in enrollees diagnosed after 9/11. Compared to higher educational attainment, completing less than college was associated with an increased hospitalization rate among participants with both pre-9/11- and post-9/11-onset asthma (ARR = 1.9, 95% CI = 1.2-2.9; ARR = 2.6, 95% CI = 1.6-4.1, respectively). Sinus symptoms, exposure to the dust cloud, and having been a WTC responder were not associated with asthma hospitalization. Among enrollees with pre-9/11 asthma, comorbid PTSD and GERS were associated with an increase in asthma hospitalizations. Management of these comorbidities may be an important factor in preventing hospitalization.

  10. Vaccine effectiveness of tetanus toxoid, reduced diphtheria toxoid, and acellular pertussis vaccine during a pertussis outbreak in Maine.

    PubMed

    Terranella, Andrew; Rea, Vicki; Griffith, Matthew; Manning, Susan; Sears, Steven; Farmer, Ann; Martin, Stacey; Patel, Manisha

    2016-05-11

    Multiple school-associated pertussis outbreaks were reported in Maine from 2010 to 2011. These outbreaks were associated with an overall increase in pertussis cases statewide. Waning of protection in students recently vaccinated with tetanus, diphtheria, and acellular pertussis (Tdap) has been implicated in the increase in reported rates of pertussis nationally. We conducted a retrospective cohort study to evaluate Tdap vaccine effectiveness (VE) among students aged 11-19 years in two schools reporting outbreaks in 2011. All pertussis cases reported from August through November, 2011 at the two schools were included. Vaccination history was verified using provider information, state vaccine registry data, and parental verification. Attack rates (AR) were calculated. VE and duration of protection was calculated as VE=1-(ARvaccinated/ARunvaccinated)×100% using a log binomial regression model. Of 416 students enrolled, 314 were included in the analyses. Twenty-nine cases collectively in Schools A and B. Tdap coverage was 65% at School A and 42% at School B before the start of the outbreak. Among students enrolled in the study, attack rates were 11.9% and 7.7% at Schools A and B, respectively. Overall VE was 68.5% (95% confidence interval (CI) 37.7-86.2). VE was 70.4% (95% CI 17.5-89.4) for School A and 65.2% (95% CI -19.2 to 89.9) for School B. VE <2 years versus ≥2 years from outbreak onset was not significantly different. Tdap was moderately effective in preventing disease among vaccinated students. Vaccine coverage of 65% or less was suboptimal and might contribute to outbreaks. Waning VE was not demonstrated. Increased vaccination coverage rates as well as further evaluation of the role of acellular vaccine on VE is needed. Published by Elsevier Ltd.

  11. Leaf miner-induced morphological, physiological and molecular changes in mangrove plant Avicennia marina (Forsk.) Vierh.

    PubMed

    Chen, Juan; Shen, Zhi-Jun; Lu, Wei-Zhi; Liu, Xiang; Wu, Fei-Hua; Gao, Gui-Feng; Liu, Yi-Ling; Wu, Chun-Sheng; Yan, Chong-Ling; Fan, Hang-Qing; Zhang, Yi-Hui; Zheng, Hai-Lei; Tsai, Chung-Jui

    2017-01-31

    Avicennia marina (Forsk.) Vierh is a widespread mangrove species along the southeast coasts of China. Recently, the outbreak of herbivorous insect, Phyllocnistis citrella Stainton, a leaf miner, have impacted on the growth of A. marina. Little is reported about the responses of A. marina to leaf miner infection at the biochemical, physiological and molecular levels. Here, we reported the responses of A. marina to leaf miner infection from the aspects of leaf structure, photosynthesis, and antioxidant system and miner responsive genes expression. A. marina leaves attacked by the leaf miner exhibited significant decreases in chlorophyll, carbon and nitrogen contents, as well as a decreased photosynthetic rate. Scanning and transmission electron microscopic observations revealed that the leaf miner only invaded the upper epidermis and destroyed the epidermal cell, which lead to the exposure of salt glands. In addition, the chloroplasts of mined leaves (ML) were swollen and the thylakoids degraded. The maximal net photosynthetic rate, stomatal conductance (Gs), carboxylation efficiency (CE), dark respiration (Rd), light respiration (Rp) and quantum yields (AQE) significantly decreased in the ML, whereas the light saturation point (Lsp), light compensation point (Lcp), water loss and CO2 compensation point (Г) increased in the ML. Moreover, chlorophyll fluorescence features also had been changed by leaf miner attacks. Interestingly, higher generation rate of O2ˉ· and lower antioxidant enzyme expression in the mined portion (MP) were found; on the contrary, higher H2O2 level and higher antioxidant enzyme expression in the non-mined portion (NMP) were revealed, implying that the NMP may be able to sense that the leaf miner attacks had happened in the MP of the A. marina leaf via H2O2 signaling. Besides, the protein expression of glutathione S-transferase (GST) and the glutathione (GSH) content were increased in the ML. In addition, insect resistance-related gene expression such as chitinase 3, RAR1, topless and PIF3 had significantly increased in the ML. Taken together, our data suggest that leaf miners could significantly affect leaf structure, photosynthesis, the antioxidant system and miner responsive gene expression in A. marina leaves.

  12. The Functional Significance of Aposematic Signals: Geographic Variation in the Responses of Widespread Lizard Predators to Colourful Invertebrate Prey

    PubMed Central

    Tseng, Hui-Yun; Lin, Chung-Ping; Hsu, Jung-Ya; Pike, David A.; Huang, Wen-San

    2014-01-01

    Conspicuous colouration can evolve as a primary defence mechanism that advertises unprofitability and discourages predatory attacks. Geographic overlap is a primary determinant of whether individual predators encounter, and thus learn to avoid, such aposematic prey. We experimentally tested whether the conspicuous colouration displayed by Old World pachyrhynchid weevils (Pachyrhynchus tobafolius and Kashotonus multipunctatus) deters predation by visual predators (Swinhoe’s tree lizard; Agamidae, Japalura swinhonis). During staged encounters, sympatric lizards attacked weevils without conspicuous patterns at higher rates than weevils with intact conspicuous patterns, whereas allopatric lizards attacked weevils with intact patterns at higher rates than sympatric lizards. Sympatric lizards also attacked masked weevils at lower rates, suggesting that other attributes of the weevils (size/shape/smell) also facilitate recognition. Allopatric lizards rapidly learned to avoid weevils after only a single encounter, and maintained aversive behaviours for more than three weeks. The imperfect ability of visual predators to recognize potential prey as unpalatable, both in the presence and absence of the aposematic signal, may help explain how diverse forms of mimicry exploit the predator’s visual system to deter predation. PMID:24614681

  13. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  14. A robust H.264/AVC video watermarking scheme with drift compensation.

    PubMed

    Jiang, Xinghao; Sun, Tanfeng; Zhou, Yue; Wang, Wan; Shi, Yun-Qing

    2014-01-01

    A robust H.264/AVC video watermarking scheme for copyright protection with self-adaptive drift compensation is proposed. In our scheme, motion vector residuals of macroblocks with the smallest partition size are selected to hide copyright information in order to hold visual impact and distortion drift to a minimum. Drift compensation is also implemented to reduce the influence of watermark to the most extent. Besides, discrete cosine transform (DCT) with energy compact property is applied to the motion vector residual group, which can ensure robustness against intentional attacks. According to the experimental results, this scheme gains excellent imperceptibility and low bit-rate increase. Malicious attacks with different quantization parameters (QPs) or motion estimation algorithms can be resisted efficiently, with 80% accuracy on average after lossy compression.

  15. A Robust H.264/AVC Video Watermarking Scheme with Drift Compensation

    PubMed Central

    Sun, Tanfeng; Zhou, Yue; Shi, Yun-Qing

    2014-01-01

    A robust H.264/AVC video watermarking scheme for copyright protection with self-adaptive drift compensation is proposed. In our scheme, motion vector residuals of macroblocks with the smallest partition size are selected to hide copyright information in order to hold visual impact and distortion drift to a minimum. Drift compensation is also implemented to reduce the influence of watermark to the most extent. Besides, discrete cosine transform (DCT) with energy compact property is applied to the motion vector residual group, which can ensure robustness against intentional attacks. According to the experimental results, this scheme gains excellent imperceptibility and low bit-rate increase. Malicious attacks with different quantization parameters (QPs) or motion estimation algorithms can be resisted efficiently, with 80% accuracy on average after lossy compression. PMID:24672376

  16. Impingement of Water Droplets on NACA 65A004 Airfoil and Effect of Change in Airfoil Thickness from 12 to 4 Percent at 4 deg Angle of Attack

    NASA Technical Reports Server (NTRS)

    Brun, Rinaldo J.; Gallagher, Helen M.; Vogt, Dorothea E.

    1953-01-01

    The trajectories of droplets in the air flowing past an NACA 65A004 a irfoil at an angle of attack of 4 deg were determined. The amount of water in droplet form impinging on the airfoil, the area of droplet impingement, and the rate of droplet impingement per unit area on the airfoil surface were calculated from the trajectories and presented to cover a large range of flight and atmospheric conditions. The effect of a change in airfoil thickness from 12 to 4 percent at 4 deg angle of attack is presented by comparing the impingement calculations for the NACA 65A004 airfoil with those for the NACA 65(sub 1)-208 and 65(sub 1)-212 airfoils. The rearward limit of impingement on the upper surface decreases as the airfoil thickness decreases. The rearward limit of impingement on the lower surface increases with a decrease in airfoil t hickness. The total water intercepted decreases as the airfoil thickness is decreased.

  17. Lethal aggression in Pan is better explained by adaptive strategies than human impacts.

    PubMed

    Wilson, Michael L; Boesch, Christophe; Fruth, Barbara; Furuichi, Takeshi; Gilby, Ian C; Hashimoto, Chie; Hobaiter, Catherine L; Hohmann, Gottfried; Itoh, Noriko; Koops, Kathelijne; Lloyd, Julia N; Matsuzawa, Tetsuro; Mitani, John C; Mjungu, Deus C; Morgan, David; Muller, Martin N; Mundry, Roger; Nakamura, Michio; Pruetz, Jill; Pusey, Anne E; Riedel, Julia; Sanz, Crickette; Schel, Anne M; Simmons, Nicole; Waller, Michel; Watts, David P; White, Frances; Wittig, Roman M; Zuberbühler, Klaus; Wrangham, Richard W

    2014-09-18

    Observations of chimpanzees (Pan troglodytes) and bonobos (Pan paniscus) provide valuable comparative data for understanding the significance of conspecific killing. Two kinds of hypothesis have been proposed. Lethal violence is sometimes concluded to be the result of adaptive strategies, such that killers ultimately gain fitness benefits by increasing their access to resources such as food or mates. Alternatively, it could be a non-adaptive result of human impacts, such as habitat change or food provisioning. To discriminate between these hypotheses we compiled information from 18 chimpanzee communities and 4 bonobo communities studied over five decades. Our data include 152 killings (n = 58 observed, 41 inferred, and 53 suspected killings) by chimpanzees in 15 communities and one suspected killing by bonobos. We found that males were the most frequent attackers (92% of participants) and victims (73%); most killings (66%) involved intercommunity attacks; and attackers greatly outnumbered their victims (median 8:1 ratio). Variation in killing rates was unrelated to measures of human impacts. Our results are compatible with previously proposed adaptive explanations for killing by chimpanzees, whereas the human impact hypothesis is not supported.

  18. Preemptive Striking in Individual and Group Conflict.

    PubMed

    Mifune, Nobuhiro; Hizen, Yoichi; Kamijo, Yoshio; Okano, Yoshitaka

    2016-01-01

    In this study, we conducted a laboratory experiment to assess preemptive striking by and towards individuals or groups. In the framework of a preemptive strike game, we set the following four conditions: one person faced another person, one person faced a three-person group, a three-person group faced an individual, and a three-person group faced another three-person group. Previous studies have revealed that greed is activated when participants belong to a group, while fear is activated when participants interact with a group, and further, that attacking behaviors in the preemptive strike game are driven by fear. These observations led to a hypothesis that high attack rates would be realized when participants interact with a group, regardless of whether the participants make decisions as individuals or a group. The results of our experiment, however, rejected this hypothesis. Among the four conditions, the attack rate was highest when a three-person group faced an individual. As possible reasons for our observation, we discuss the potential threat stemming from the imbalance in the effectiveness of attack between individuals and groups, and the (incorrect) belief by groups that single individuals would be more likely to attack out of fear.

  19. Preemptive Striking in Individual and Group Conflict

    PubMed Central

    Mifune, Nobuhiro; Hizen, Yoichi; Kamijo, Yoshio; Okano, Yoshitaka

    2016-01-01

    In this study, we conducted a laboratory experiment to assess preemptive striking by and towards individuals or groups. In the framework of a preemptive strike game, we set the following four conditions: one person faced another person, one person faced a three-person group, a three-person group faced an individual, and a three-person group faced another three-person group. Previous studies have revealed that greed is activated when participants belong to a group, while fear is activated when participants interact with a group, and further, that attacking behaviors in the preemptive strike game are driven by fear. These observations led to a hypothesis that high attack rates would be realized when participants interact with a group, regardless of whether the participants make decisions as individuals or a group. The results of our experiment, however, rejected this hypothesis. Among the four conditions, the attack rate was highest when a three-person group faced an individual. As possible reasons for our observation, we discuss the potential threat stemming from the imbalance in the effectiveness of attack between individuals and groups, and the (incorrect) belief by groups that single individuals would be more likely to attack out of fear. PMID:27148871

  20. Spatial variability in oviposition damage by periodical cicadas in a fragmented landscape.

    PubMed

    Cook, William M; Holt, Robert D; Yao, Jin

    2001-03-01

    Effects of the periodical cicada (Magicicada spp.) on forest dynamics are poorly documented. A 1998 emergence of M. cassini in eastern Kansas led to colonization of a fragmented experimental landscape undergoing secondary succession. We hypothesized that per-tree rates of oviposition damage by cicadas would reflect: (1) distance from the source of the emergence, (2) patch size, and (3) local tree density. Ovipositing females displayed clear preferences for host species and damage incidence showed predictable spatial patterns. Two species (smooth sumac, Rhus glabra, and eastern red cedar, Juniperus virginiana) were rarely attacked, whereas others (rough-leaved dogwood, Cornus drummondii; slippery elm, Ulmus rubra; box elder, Acer negundo, and honey locust, Gleditsia triacanthos) were strongly attacked. The dominant early successional tree, dogwood, received on average the most attacks. As predicted, attacks per stem declined strongly with distance from the emergence source, and with local stem density (a "dilution" effect). Contrary to expectations, there were more attacks per stem on larger patches. Because ovipositing cicadas cut damaging slits in host tree branches, potentially affecting tree growth rate, competitive ability, and capacity to reproduce, cicada damage could potentially influence spatial variation in secondary succession.

  1. Panic and fear induced by deep brain stimulation.

    PubMed

    Shapira, N A; Okun, M S; Wint, D; Foote, K D; Byars, J A; Bowers, D; Springer, U S; Lang, P J; Greenberg, B D; Haber, S N; Goodman, W K

    2006-03-01

    Mood, cognitive, and behavioural changes have been reported with deep brain stimulation (DBS) in the thalamus, globus pallidus interna, and anterior limb of the internal capsule/nucleus accumbens region. To investigate panic and fear resulting from DBS. Intraoperative DBS in the region of the right and then left anterior limb of the internal capsule and nucleus accumbens region was undertaken to treat a 52 year old man with treatment refractory obsessive-compulsive disorder (OCD). Mood, anxiety, OCD, alertness, heart rate, and subjective feelings were recorded during intraoperative test stimulation and at follow up programming sessions. DBS at the distal (0) contact (cathode 0-, anode 2+, pulse width 210 ms, rate 135 Hz, at 6 volts) elicited a panic attack (only seen at the (0) contact). The patient felt flushed, hot, fearful, and described himself as having a "panic attack." His heart rate increased from 53 to 111. The effect (present with either device) was witnessed immediately after turning the device on, and abruptly ceased in the off condition DBS of the anterior limb of the internal capsule and nucleus accumbens region caused severe "panic." This response may result from activation of limbic and autonomic networks.

  2. Cerebral correlates of heart rate variations during a spontaneous panic attack in the fMRI scanner.

    PubMed

    Spiegelhalder, Kai; Hornyak, Magdolna; Kyle, Simon David; Paul, Dominik; Blechert, Jens; Seifritz, Erich; Hennig, Jürgen; Tebartz van Elst, Ludger; Riemann, Dieter; Feige, Bernd

    2009-12-01

    We report the first published case study of a suddenly occurring panic attack in a patient with no prior history of panic disorder during combined functional magnetic resonance imaging (fMRI, 1.5 Tesla) and electrocardiogram (ECG) recording. The single case was a 46-year-old woman who developed a panic attack near the planned end of the fMRI acquisition session, which therefore had to be aborted. Correlational analysis of heart rate fluctuations and fMRI data revealed a significant negative association in the left middle temporal gyrus. Additionally, regions-of-interest (ROI) analyses indicated significant positive associations in the left amygdala, and trends towards significance in the right amygdala and left insula.

  3. Effectiveness of an electronic patient-centred self-management tool for gout sufferers: a cluster randomised controlled trial protocol.

    PubMed

    Day, Richard O; Frensham, Lauren J; Nguyen, Amy D; Baysari, Melissa T; Aung, Eindra; Lau, Annie Y S; Zwar, Nicholas; Reath, Jennifer; Laba, Tracey; Li, Ling; McLachlan, Andrew; Runciman, William B; Buchbinder, Rachelle; Clay-Williams, Robyn; Coiera, Enrico; Braithwaite, Jeffrey; McNeil, H Patrick; Hunter, David J; Pile, Kevin D; Portek, Ian; WIlliams, Kenneth Mapson; Westbrook, Johanna I

    2017-10-16

    Gout is increasing despite effective therapies to lower serum urate concentrations to 0.36 mmol/L or less, which, if sustained, significantly reduces acute attacks of gout. Adherence to urate-lowering therapy (ULT) is poor, with rates of less than 50% 1 year after initiation of ULT. Attempts to increase adherence in gout patients have been disappointing. We aim to evaluate the effectiveness of use of a personal, self-management, 'smartphone' application (app) to achieve target serum urate concentrations in people with gout. We hypothesise that personalised feedback of serum urate concentrations will improve adherence to ULT. Setting and designPrimary care. A prospective, cluster randomised (by general practitioner (GP) practices), controlled trial. GP practices will be randomised to either intervention or control clusters with their patients allocated to the same cluster. The intervention group will have access to the Healthy.me app tailored for the self-management of gout. The control group patients will have access to the same app modified to remove all functions except the Gout Attack Diary. The proportion of patients whose serum urate concentrations are less than or equal to 0.36 mmol/L after 6 months. Secondary outcomes will be proportions of patients achieving target urate concentrations at 12 months, ULT adherence rates, serum urate concentrations at 6 and 12 months, rates of attacks of gout, quality of life estimations and process and economic evaluations. The study is designed to detect a ≥30% improvement in the intervention group above the expected 50% achievement of target serum urate at 6 months in the control group: power 0.80, significance level 0.05, assumed 'dropout' rate 20%. This study has been approved by the University of New South Wales Human Research Ethics Committee. Study findings will be disseminated in international conferences and peer-reviewed journal. ACTRN12616000455460. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  4. Effectiveness of an electronic patient-centred self-management tool for gout sufferers: a cluster randomised controlled trial protocol

    PubMed Central

    Frensham, Lauren J; Nguyen, Amy D; Baysari, Melissa T; Aung, Eindra; Lau, Annie Y S; Zwar, Nicholas; Reath, Jennifer; Li, Ling; McLachlan, Andrew; Runciman, William B; Buchbinder, Rachelle; Clay-Williams, Robyn; Braithwaite, Jeffrey; McNeil, H Patrick; Pile, Kevin D; Portek, Ian; WIlliams, Kenneth Mapson; Westbrook, Johanna I

    2017-01-01

    Introduction Gout is increasing despite effective therapies to lower serum urate concentrations to 0.36 mmol/L or less, which, if sustained, significantly reduces acute attacks of gout. Adherence to urate-lowering therapy (ULT) is poor, with rates of less than 50% 1 year after initiation of ULT. Attempts to increase adherence in gout patients have been disappointing. We aim to evaluate the effectiveness of use of a personal, self-management, ‘smartphone’ application (app) to achieve target serum urate concentrations in people with gout. We hypothesise that personalised feedback of serum urate concentrations will improve adherence to ULT. Methods and analysis Setting and design Primary care. A prospective, cluster randomised (by general practitioner (GP) practices), controlled trial. Participants GP practices will be randomised to either intervention or control clusters with their patients allocated to the same cluster. Intervention The intervention group will have access to the Healthy.me app tailored for the self-management of gout. The control group patients will have access to the same app modified to remove all functions except the Gout Attack Diary. Primary and secondary outcomes The proportion of patients whose serum urate concentrations are less than or equal to 0.36 mmol/L after 6 months. Secondary outcomes will be proportions of patients achieving target urate concentrations at 12 months, ULT adherence rates, serum urate concentrations at 6 and 12 months, rates of attacks of gout, quality of life estimations and process and economic evaluations. The study is designed to detect a ≥30% improvement in the intervention group above the expected 50% achievement of target serum urate at 6 months in the control group: power 0.80, significance level 0.05, assumed ‘dropout’ rate 20%. Ethics and dissemination This study has been approved by the University of New South Wales Human Research Ethics Committee. Study findings will be disseminated in international conferences and peer-reviewed journal. Trial registration number ACTRN12616000455460. PMID:29042386

  5. Super-Hydrophobic Green Corrosion Inhibitor On Carbon Steel

    NASA Astrophysics Data System (ADS)

    Hassan, H.; Ismail, A.; Ahmad, S.; Soon, C. F.

    2017-06-01

    There are many examples of organic coatings used for corrosion protection. In particular, hydrophobic and super-hydrophobic coatings are shown to give good protection because of their enhanced ability to slow down transport of water and ions through the coating. The purpose of this research is to develop water repellent coating to avoid direct contact between metal and environment corrosive and mitigate corrosion attack at pipeline system. This water repellent characteristic on super-hydrophobic coating was coated by electrodeposition method. Wettability of carbon steel with super-hydrophobic coating (cerium chloride and myristic acid) and oxidized surface was investigated through contact angle and inhibitor performance test. The inhibitor performance was studied in 25% tannin acid corrosion test at 30°C and 3.5% sodium chloride (NaCl). The water contact angle test was determined by placing a 4-μL water droplet of distilled water. It shows that the wettability of contact angle super-hydrophobic with an angle of 151.60° at zero minute can be classified as super-hydrophobic characteristic. By added tannin acid as inhibitor the corrosion protection on carbon steel becomes more consistent. This reveals that the ability of the coating to withstand with the corrosion attack in the seawater at different period of immersions. The results elucidate that the weight loss increased as the time of exposure increased. However, the corrosion rates for uncoated carbon steel is high compared to coated carbon steel. As a conclusion, from both samples it can be seen that the coated carbon steel has less corrosion rated compared to uncoated carbon steel and addition of inhibitor to the seawater provides more protection to resist corrosion attack on carbon steel.

  6. Changes in central sodium and not osmolarity or lactate induce panic-like responses in a model of panic disorder.

    PubMed

    Molosh, Andre I; Johnson, Philip L; Fitz, Stephanie D; Dimicco, Joseph A; Herman, James P; Shekhar, Anantha

    2010-05-01

    Panic disorder is a severe anxiety disorder characterized by recurrent panic attacks that can be consistently provoked with intravenous (i.v.) infusions of hypertonic (0.5 M) sodium lactate (NaLac), yet the mechanism/CNS site by which this stimulus triggers panic attacks is unclear. Chronic inhibition of GABAergic synthesis in the dorsomedial hypothalamus/perifornical region (DMH/PeF) of rats induces a vulnerability to panic-like responses after i.v. infusion of 0.5 M NaLac, providing an animal model of panic disorder. Using this panic model, we previously showed that inhibiting the anterior third ventricle region (A3Vr; containing the organum vasculosum lamina terminalis, the median preoptic nucleus, and anteroventral periventricular nucleus) attenuates cardiorespiratory and behavioral responses elicited by i.v. infusions of NaLac. In this study, we show that i.v. infusions of 0.5 M NaLac or sodium chloride, but not iso-osmolar D-mannitol, increased 'anxiety' (decreased social interaction) behaviors, heart rate, and blood pressure responses. Using whole-cell patch-clamp preparations, we also show that bath applications of NaLac (positive control), but not lactic acid (lactate stimulus) or D-mannitol (osmolar stimulus), increases the firing rates of neurons in the A3Vr, which are retrogradely labeled from the DMH/PeF and which are most likely glutamatergic based on a separate study using retrograde tracing from the DMH/PeF in combination with in situ hybridization for vesicular glutamate transporter 2. These data show that hypertonic sodium, but not hyper-osmolarity or changes in lactate, is the key stimulus that provokes panic attacks in panic disorder, and is consistent with human studies.

  7. Legionnaires’ disease case-finding algorithm, attack rates, and risk factors during a residential outbreak among older adults: an environmental and cohort study

    PubMed Central

    2013-01-01

    Background During a Legionnaires’ disease (LD) outbreak, combined epidemiological and environmental investigations were conducted to identify prevention recommendations for facilities where elderly residents live independently but have an increased risk of legionellosis. Methods Survey responses (n = 143) were used to calculate attack rates and describe transmission routes by estimating relative risk (RR) and 95% confidence intervals (95% CI). Potable water collected from five apartments of LD patients and three randomly-selected apartments of residents without LD (n = 103 samples) was cultured for Legionella. Results Eight confirmed LD cases occurred among 171 residents (attack rate = 4.7%); two visitors also developed LD. One case was fatal. The average age of patients was 70 years (range: 62–77). LD risk was lower among residents who reported tub bathing instead of showering (RR = 0.13, 95% CI: 0.02–1.09, P = 0.03). Two respiratory cultures were characterized as L. pneumophila serogroup 1, monoclonal antibody type Knoxville (1,2,3), sequence type 222. An indistinguishable strain was detected in 31 (74%) of 42 potable water samples. Conclusions Managers of elderly-housing facilities and local public health officials should consider developing a Legionella prevention plan. When Legionella colonization of potable water is detected in these facilities, remediation is indicated to protect residents at higher risk. If LD occurs among residents, exposure reduction, heightened awareness, and clinical surveillance activities should be coordinated among stakeholders. For prompt diagnosis and effective treatment, clinicians should recognize the increased risk and atypical presentation of LD in older adults. PMID:23806063

  8. A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Grana, Justin; Wolpert, David; Neil, Joshua

    The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. But, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. Our paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihoodmore » ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. Finally, we demonstrate the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks.« less

  9. Effect of noninvasive vagus nerve stimulation on acute migraine: an open-label pilot study.

    PubMed

    Goadsby, P J; Grosberg, B M; Mauskop, A; Cady, R; Simmons, K A

    2014-10-01

    We sought to assess a novel, noninvasive, portable vagal nerve stimulator (nVNS) for acute treatment of migraine. Participants with migraine with or without aura were eligible for an open-label, single-arm, multiple-attack study. Up to four migraine attacks were treated with two 90-second doses, at 15-minute intervals delivered to the right cervical branch of the vagus nerve within a six-week time period. Subjects were asked to self-treat at moderate or severe pain, or after 20 minutes of mild pain. Of 30 enrolled patients (25 females, five males, median age 39), two treated no attacks, and one treated aura only, leaving a Full Analysis Set of 27 treating 80 attacks with pain. An adverse event was reported in 13 patients, notably: neck twitching (n = 1), raspy voice (n = 1) and redness at the device site (n = 1). No unanticipated, serious or severe adverse events were reported. The pain-free rate at two hours was four of 19 (21%) for the first treated attack with a moderate or severe headache at baseline. For all moderate or severe attacks at baseline, the pain-free rate was 12/54 (22%). nVNS may be an effective and well-tolerated acute treatment for migraine in certain patients. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  10. A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks

    DOE PAGES

    Grana, Justin; Wolpert, David; Neil, Joshua; ...

    2016-03-11

    The rapid detection of attackers within firewalls of enterprise computer networks is of paramount importance. Anomaly detectors address this problem by quantifying deviations from baseline statistical models of normal network behavior and signaling an intrusion when the observed data deviates significantly from the baseline model. But, many anomaly detectors do not take into account plausible attacker behavior. As a result, anomaly detectors are prone to a large number of false positives due to unusual but benign activity. Our paper first introduces a stochastic model of attacker behavior which is motivated by real world attacker traversal. Then, we develop a likelihoodmore » ratio detector that compares the probability of observed network behavior under normal conditions against the case when an attacker has possibly compromised a subset of hosts within the network. Since the likelihood ratio detector requires integrating over the time each host becomes compromised, we illustrate how to use Monte Carlo methods to compute the requisite integral. We then present Receiver Operating Characteristic (ROC) curves for various network parameterizations that show for any rate of true positives, the rate of false positives for the likelihood ratio detector is no higher than that of a simple anomaly detector and is often lower. Finally, we demonstrate the superiority of the proposed likelihood ratio detector when the network topologies and parameterizations are extracted from real-world networks.« less

  11. Facelock: familiarity-based graphical authentication.

    PubMed

    Jenkins, Rob; McLachlan, Jane L; Renaud, Karen

    2014-01-01

    Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  12. Effectiveness of previous mumps vaccination during a summer camp outbreak.

    PubMed

    Schaffzin, Joshua K; Pollock, Lynn; Schulte, Cynthia; Henry, Kyle; Dayan, Gustavo; Blog, Debra; Smith, Perry

    2007-10-01

    Mumps is a vaccine-preventable disease that may cause outbreaks. In July 2005, an outbreak of mumps occurred during a children's summer camp in upstate New York. An investigation was initiated to describe the cases and evaluate vaccine effectiveness. A retrospective cohort study was conducted among 541 children from the United States and abroad who attended a 1- or 2-month overnight summer camp. Patients with mumps were interviewed; serologic analysis was conducted for 6 case patients. Vaccine effectiveness was calculated by retrospective review of immunization records for 507 attendees who were eligible for vaccination and had verified immunization history. Thirty-one camp attendees were identified as having mumps (attack rate: 5.7%); 5 (83%) of 6 patients tested had positivity for mumps immunoglobulin M. Of the 507 participants (including 29 patients) with available immunization history, 440 (including 16 [87%] patients) were 2-dose recipients of mumps vaccine (attack rate: 3.6%); 46 participants (including 4 [9%] patients) were 1-dose recipients (attack rate: 8.7%); and 21 (including 9 [4%] patients) were unvaccinated (attack rate: 42.9%). Vaccine effectiveness was 92% for 2 doses and 80% for 1 dose. Outbreaks of mumps in settings such as summer camps can occur despite high vaccination rates. Vaccine effectiveness for 2 mumps vaccinations was greater than vaccine effectiveness for 1 mumps vaccination. Therefore, recommendation of 2 mumps vaccinations for summer camp participants continues to be appropriate. Control of mumps disease relies on broad vaccination coupled with correct clinical diagnosis and strict control measures.

  13. Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moore, Michael Roy; Bridges, Robert A; Combs, Frank L

    Modern vehicles rely on hundreds of on-board electronic control units (ECUs) communicating over in-vehicle networks. As external interfaces to the car control networks (such as the on-board diagnostic (OBD) port, auxiliary media ports, etc.) become common, and vehicle-to-vehicle / vehicle-to-infrastructure technology is in the near future, the attack surface for vehicles grows, exposing control networks to potentially life-critical attacks. This paper addresses the need for securing the CAN bus by detecting anomalous traffic patterns via unusual refresh rates of certain commands. While previous works have identified signal frequency as an important feature for CAN bus intrusion detection, this paper providesmore » the first such algorithm with experiments on five attack scenarios. Our data-driven anomaly detection algorithm requires only five seconds of training time (on normal data) and achieves true positive / false discovery rates of 0.9998/0.00298, respectively (micro-averaged across the five experimental tests).« less

  14. Using the Domain Name System to Thwart Automated Client-Based Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less

  15. Enhancing Brain Lesions during Acute Optic Neuritis and/or Longitudinally Extensive Transverse Myelitis May Portend a Higher Relapse Rate in Neuromyelitis Optica Spectrum Disorders.

    PubMed

    Orman, G; Wang, K Y; Pekcevik, Y; Thompson, C B; Mealy, M; Levy, M; Izbudak, I

    2017-05-01

    Neuromyelitis optica spectrum disorders are inflammatory demyelinating disorders with optic neuritis and/or longitudinally extensive transverse myelitis episodes. We now know that neuromyelitis optica spectrum disorders are associated with antibodies to aquaporin-4, which are highly concentrated on astrocytic end-feet at the blood-brain barrier. Immune-mediated disruption of the blood-brain barrier may manifest as contrast enhancement on brain MR imaging. We aimed to delineate the extent and frequency of contrast enhancement on brain MR imaging within 1 month of optic neuritis and/or longitudinally extensive transverse myelitis attacks and to correlate contrast enhancement with outcome measures. Brain MRIs of patients with neuromyelitis optica spectrum disorders were evaluated for patterns of contrast enhancement (periependymal, cloudlike, leptomeningeal, and so forth). The Fisher exact test was used to evaluate differences between the proportion of contrast enhancement in patients who were seropositive and seronegative for aquaporin-4 antibodies. The Mann-Whitney test was used to compare the annualized relapse rate and disease duration between patients with and without contrast enhancement and with and without seropositivity. Brain MRIs of 77 patients were evaluated; 59 patients (10 males, 49 females) were scanned within 1 month of optic neuritis and/or longitudinally extensive transverse myelitis attacks and were included in the analysis. Forty-eight patients were seropositive, 9 were seronegative, and 2 were not tested for aquaporin-4 antibodies. Having brain contrast enhancement of any type during an acute attack was significantly associated with higher annualized relapse rates ( P = .03) and marginally associated with shorter disease duration ( P = .05). Having periependymal contrast enhancement was significantly associated with higher annualized relapse rates ( P = .03). Brain MRIs of patients with neuromyelitis optica spectrum disorders with contrast enhancement during an acute relapse of optic neuritis and/or longitudinally extensive transverse myelitis are associated with increased annual relapse rates. © 2017 by American Journal of Neuroradiology.

  16. Estimating the annual number of strokes and the issue of imperfect data: an example from Australia.

    PubMed

    Cadilhac, Dominique A; Vos, Theo; Thrift, Amanda G

    2014-01-01

    Estimates of strokes in Australia are typically obtained using 1996-1997 age-specific attack rates from the pilot North East Melbourne Stroke Incidence (NEMESIS) Study (eight postcode regions). Declining hospitalizations for stroke indicate the potential to overestimate cases. To illustrate how current methods may potentially overestimate the number of strokes in Australia. Hospital separations data (primary discharge ICD10 codes I60 to I64) and three stroke projection models were compared. Each model had age- and gender-specific attack rates from the NEMESIS study applied to the 2003 population. One model used the 2003 Burden of Disease approach where the ratio of the 1996-1997 NEMESIS study incidence to hospital separation rate in the same year was adjusted by the 2002/2003 hospital separation rate within the same geographic region using relevant ICD-primary diagnosis codes. Hospital separations data were inflated by 12·1% to account for nonhospitalized stroke, while the Burden of Disease model was inflated by 27·6% to account for recurrent stroke events in that year. The third model used 1997-1999 attack rates from the larger 22-postcode NEMESIS study region. In 2003, Australian hospitalizations for stroke (I60 to I64) were 33,022, and extrapolation to all stroke (hospitalized and nonhospitalized) was 37,568. Applying NEMESIS study attack rates to the 2003 Australian population, 50,731 strokes were projected. Fewer cases for 2003 were estimated with the Burden of Disease model (28,364) and 22-postcode NEMESIS study rates (41,332). Estimating the number of strokes in a country can be highly variable depending on the recency of data, the type of data available, and the methods used. © 2013 The Authors. International Journal of Stroke © 2013 World Stroke Organization.

  17. Magnus effects on spinning transonic missiles

    NASA Technical Reports Server (NTRS)

    Seginer, A.; Rosenwasser, I.

    1983-01-01

    Magnus forces and moments were measured on a basic-finner model spinning in transonic flow. Spin was induced by canted fins or by full-span or semi-span, outboard and inboard roll controls. Magnus force and moment reversals were caused by Mach number, reduced spin rate, and angle of attack variations. Magnus center of pressure was found to be independent of the angle of attack but varied with the Mach number and model configuration or reduced spin rate.

  18. Erratum to "The mechanism and thermodynamics of transesterification of acetate-ester enolates in the gas phase" : [Int. J. Mass Spectrom. Ion Process. 172 (1998) 25

    NASA Astrophysics Data System (ADS)

    Haas, George W.; Giblin, Daryl E.; Gross, Michael L.

    1998-02-01

    In solution, base-catalyzed hydrolysis and transesterification of esters are initiated by hydroxide- or alkoxide-ion attack at the carbonyl carbon. At low pressures in the gas phase, however, transesterification proceeds by an attack of the enolate anion of an acetate ester on an alcohol. Fourier transform mass spectrometry (FTMS) indicates that the reaction is the second-order process: -CH2-CO2-R+R'-OH-->-CH2-CO2-R'+R-OH and there is little to no detectable production of either alkoxide anion. Labeling studies show that the product and reactant enolate anion esters undergo exchange of hydrogens located [alpha] to the carbonyl carbon with the deuterium of R'--OD. The extent of the H/D exchange increases with reaction time, pointing to a short-lived intermediate. The alcoholysis reaction rate constants increase with increasing acidity of the primary, straight-chained alkyl alcohols, whereas steric effects associated with branched alcohols cause the rate constants to decrease. Equilibrium constants, which were determined directly from measurements at equilibrium and which were calculated from the forward and reverse rate constants, are near unity and show internal consistency. In the absence of steric effects, the larger enolate is always the favored product at equilibrium. The intermediate for the transesterification reaction, which can be generated at a few tenths of a torr in a tandem mass spectrometer, is tetrahedral, but other adducts that are collisionally stabilized under these conditions are principally loosely bound complexes.

  19. Daily Stress as a Trigger of Migraine Attacks: Results of Thirteen Single-Subject Studies.

    ERIC Educational Resources Information Center

    Kohler, Thomas; Haimerl, Christianne

    1990-01-01

    Six-month longitudinal study examined whether migraine attacks were preceded by or occurred on stressful days. Every evening, 13 patients completed questionnaires assessing daily stress. Analyses on single-subject level tested when attacks occurred. Increased stress was generally not found for Days 2 and 3 before an attack, but often for Day 1 and…

  20. Interest Rate Demands and Television Viewing-Is a Single Exposure More Influential Than Routine Viewing?

    PubMed

    Hetsroni, Amir; Reizer, Abira; Ben Zion, Uri

    2017-04-01

    This study examined the impact of media consumption, and particularly exposure to television, on decisions regarding interest rate demands. One hundred and fifty-four participants were randomly divided into two groups: in the manipulation group, participants were exposed to a news clip about an Iranian nuclear attack on Israel, whereas in the control group, the participants were not exposed to the film. Both groups filled a questionnaires regarding their interest rate requirements in different situations, their media conception behaviors, and demographic questionnaires. Frequent routine viewing increased the interest rate demands only among participants in the manipulation group, but the manipulation itself did not have a significant effect on interest rate demands. The results are explained in terms of cultivation theory.

  1. Treatment response and tolerability of frovatriptan in patients reporting short- or long-duration migraines at baseline.

    PubMed

    Kelman, Leslie; Harper, Samira Q; Hu, Xiaojun; Campbell, John C

    2010-09-01

    Compare migraine duration with frovatriptan (versus baseline) in migraineurs reporting long- (24-72 h) or short-duration (<24 h) migraines at baseline. Post hoc analysis of two postmarketing surveillance studies of migraineurs in German primary care clinics using frovatriptan (2.5 mg) to treat a single migraine attack. Using case-report forms, physicians recorded migraine characteristics at baseline (aura, duration, frequency, severity) and with frovatriptan (duration, severity, and recurrence). Patients and physicians rated frovatriptan effectiveness and tolerability versus previous therapy; physicians recorded adverse reactions. The primary analysis was change in migraine duration with frovatriptan versus baseline. At baseline, 44.2% (7178/16 253) and 55.8% (9075/16 253) of patients reported short- and long-duration migraines, respectively; long-duration migraines were more often frequent (> or =3/months; 55.5% [4893/8811] vs. 30.6% [2132/6973]; p < 0.001; 95% CI, 23.5-26.5%), severe (61.7% [5584/9047] vs. 33.9% [2427/7156]; p < 0.001; 95% CI, 26.3-29.3%), and accompanied by aura (46.8% [4199/8977] vs. 31.3% [2215/7088]; p < 0.001; 95% CI, 14.0-17.0%). Mean (SD) onset of frovatriptan effect was <1 h; 72.3% (11 592/16 040) of patients required only one frovatriptan tablet. With frovatriptan, patients were 26.8-fold more likely to experience decreased versus increased headache duration (p < 0.001; 95% CI, 23.5-30.2) and 76.5% of patients reporting long-duration migraines at baseline experienced short-duration migraines. Most patients (87-90%) and physicians (70-75%) rated frovatriptan more effective and tolerable than previous therapies. Patients with more severe migraine characteristics at baseline were more likely to have attacks lasting > or =24 h. When using frovatriptan, patients were 26.8-fold more likely to experience decreased versus increased headache duration. Frovatriptan might be a good option for patients with long-duration or recurrent migraine attacks. The post hoc design and analysis of a single migraine attack are possible study limitations.

  2. Cougar attacks on humans: a case report.

    PubMed

    McKee, Denise

    2003-01-01

    Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.

  3. Comparative efficacy of plant-derived essential oils for managing ambrosia beetles (Coleoptera: Curculionidae: Scolytinae) and their corresponding mass spectral characterization.

    PubMed

    Ranger, Christopher M; Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Moyseenko, James J; Youssef, Nadeer

    2011-10-01

    Ambrosia beetles (Coleoptera: Curculionidae: Scolytinae) pose a significant challenge to producers of ornamental nursery stock. Conventional insecticides are commonly used for management purposes, but plant-derived essential oils also may discourage ambrosia beetles from initiating attacks. To identify promising commercially available products, field-based efficacy trials were conducted in Ohio in 2009 and 2010 with the following products: Armorex (Soil Technologies), Cinnacure (Proguard, Inc.), EcoTrol (EcoSMART Technologies, Inc.), and Veggie Pharm (Pharm Solutions, Inc.). Potted Magnolia virginiana L. were first injected with 75 ml of 5% ethanol to ensure ambrosia beetle pressure on experimental trees. Mixtures of each product (10% in water) and a water control were applied until runoff and attacks occurring under field conditions were quantified at 1, 4, 7, and 14 d after treatment (DAT). Ambrosia beetle attacks generally increased over time but at differing rates depending on the particular treatment. In 2009, Armorex and Veggie Pharm were associated with the lowest cumulative attacks 14 DAT. In 2010, Armorex and Cinnacure were associated with the fewest attacks 14 DAT. Solid phase microextraction-gas chromatography-mass spectrometry was used to characterize the volatile compounds associated with each product. Allyl isothiocyanate, a compound with known repellent and insecticidal properties, was unique and predominant in Armorex. These experiments identified commercially available botanicals containing plant essential oils with activity against ambrosia beetles, along with demonstrating the usefulness of ethanol-injection to ensure ambrosia beetle pressure under field conditions. Characterizing the constituents of efficacious botanically based products could also lead to the development of improved botanical insecticides.

  4. Reduction in perceived stress as a migraine trigger

    PubMed Central

    Lipton, Richard B.; Hall, Charles B.; Tennen, Howard; DeFreitas, Tiffani A.; Borkowski, Thomas M.; Grosberg, Brian M.; Haut, Sheryl R.

    2014-01-01

    Objective: To test whether level of perceived stress and reductions in levels of perceived stress (i.e., “let-down”) are associated with the onset of migraine attacks in persons with migraine. Methods: Patients with migraine from a tertiary headache center were invited to participate in a 3-month electronic diary study. Participants entered data daily regarding migraine attack experience, subjective stress ratings, and other data. Stress was assessed using 2 measures: the Perceived Stress Scale and the Self-Reported Stress Scale. Logit-normal, random-effects models were used to estimate the odds ratio for migraine occurrence as a function of level of stress over several time frames. Results: Of 22 enrolled participants, 17 (median age 43.8 years) completed >30 days of diaries, yielding 2,011 diary entries including 110 eligible migraine attacks (median 5 attacks per person). Level of stress was not generally associated with migraine occurrence. However, decline in stress from one evening diary to the next was associated with increased migraine onset over the subsequent 6, 12, and 18 hours, with odds ratios ranging from 1.5 to 1.9 (all p values < 0.05) for the Perceived Stress Scale. Decline in stress was associated with migraine onset after controlling for level of stress for all time points. Findings were similar using the Self-Reported Stress Scale. Conclusions: Reduction in stress from one day to the next is associated with migraine onset the next day. Decline in stress may be a marker for an impending migraine attack and may create opportunities for preemptive pharmacologic or behavioral interventions. PMID:24670889

  5. The Natural History of Nonobstructive Hypertrophic Cardiomyopathy.

    PubMed

    Hebl, Virginia B; Miranda, William R; Ong, Kevin C; Hodge, David O; Bos, J Martijn; Gentile, Federico; Klarich, Kyle W; Nishimura, Rick A; Ackerman, Michael J; Gersh, Bernard J; Ommen, Steve R; Geske, Jeffrey B

    2016-03-01

    To describe the survival of a large nonobstructive hypertrophic cardiomyopathy (NO-HCM) cohort and to identify risk factors for increased mortality in this population. Patients were identified from the Mayo Clinic HCM database from January 1, 1975, through November 30, 2006, for this retrospective observational study. Patients with resting or provocable left ventricular outflow tract gradients were excluded. Echocardiographic, clinical, and genetic data were compared between subgroups, and survival data were compared with expected population rates. A total of 706 patients with NO-HCM were identified. During median follow-up of 5 years (mean, 7 years), there were 208 deaths. Overall survival was no different than expected compared with age- and sex-matched white US population mortality rates (P=.77). Independent predictors of death were age at diagnosis, "burned out" HCM, and history of transient ischemic attack or stroke; use of an implantable cardioverter defibrillator (ICD) was inversely related to death. After exclusion of patients with an ICD, there was no difference in survival compared with age- and sex- matched individuals (P=.39); age, previous transient ischemic attack/stroke, and burned out HCM were predictors of death. In this cohort, patients with NO-HCM had similar survival rates as age- and sex-matched white US population mortality rates. Although use of an ICD was inversely related to death, no differences in overall survival were seen after those patients were excluded. Burned out HCM was independently associated with an increased risk of death, identifying a subset of patients who may benefit from more aggressive therapies. Copyright © 2016 Mayo Foundation for Medical Education and Research. Published by Elsevier Inc. All rights reserved.

  6. Effects of ambient temperature on stroke hospital admissions: Results from a time-series analysis of 104,432 strokes in Guangzhou, China.

    PubMed

    Guo, Pi; Zheng, Murui; Feng, Wenru; Wu, Jiagang; Deng, Changyu; Luo, Ganfeng; Wang, Li; Pan, Bingying; Liu, Huazhang

    2017-02-15

    Stroke is a main cause of death and public health burden in China. The evidence on the burden of different strokes attack attribute to ambient temperature in China is limited. This study aimed to show the characteristics of stroke attack and the attributable risk due to temperature based on hospital admission data in Guangzhou, one of the most developed cities in China. From January 1, 2013 to December 31, 2015, 104,432 stroke hospitalizations in Guangzhou residents from 67 hospitals for stroke sentinel surveillance were registered. Characteristics of hospital admissions by gender, age group, calendar year and stroke subtype were analyzed, and distributed lag non-linear models were applied to evaluate the effects of temperature on stroke attack admissions. Stroke attack admissions increased from 31,851 to 36,755 through 2013 to 2015, increasing by 15.4%. An increasing trend in the risk of stroke attack with age was observed, irrespectively of stroke subtype and calendar year. People with hypertension were more likely to have an associated stroke than people without that. The effects of cold temperature on attack admissions for CBI and ICH strokes were significant. Overall, the percentages of CBI and ICH attack admissions attribute to cold temperature were 9.06% (95% CI: 1.84, 15.00) and 15.09% (95% CI: 5.86, 21.96), respectively. Besides, elderly people were more vulnerable to cold temperature than the young. Measures should be taken to increase public awareness about the ill effects of cold temperature on stroke attack, and educate the public about self-protection. Copyright © 2016 Elsevier B.V. All rights reserved.

  7. Methodological factors in determining rates of dementia in transient ischemic attack and stroke: (I) impact of baseline selection bias.

    PubMed

    Pendlebury, Sarah T; Chen, Ping-Jen; Bull, Linda; Silver, Louise; Mehta, Ziyah; Rothwell, Peter M

    2015-03-01

    Many previous studies on dementia in stroke have restrictive inclusion criteria, which may result in underestimation of dementia rates. We undertook a large prospective population-based study of all transient ischemic attack and stroke to determine the impact of study entry criteria on measured rates of pre- and postevent dementia. All patients with acute transient ischemic attack or stroke from a defined population of 92 728 are referred from primary care or at hospital admission to the Oxford Vascular Study (2002-2007) and have baseline clinical and cognitive assessment and follow-up. We examined the impact of early death, other nonavailability, and commonly used selection criteria, on measured rates of dementia. Among 1236 patients (mean age/SD 75.2/12.1 years, 582 men, 403 transient ischemic attack), 139 died or were otherwise unavailable for baseline assessment, 319 had prior dependency, 425 had comorbidity, 512 were aged ≥80 years, 85 were dysphasic, and 502 were hospitalized. Pre-event dementia was 3-fold higher in patients dying preascertainment (10/47, 21%) and twice as high in other nonassessed (14/92, 15%) versus assessed patients (69/1097, 6%; P=0.0006 and P=0.002) and was several-fold higher in those with prior functional impairment (24% versus 3%; P<0.0001), age >80 years (13% versus 3%; P<0.0001), dysphasia (11% versus 7%; P<0.0001), and comorbidity (10% versus 6%; P=0.04). Findings for postevent dementia were similar: prior functional impairment (40% versus 13%; P<0.0001), age >80 years (28% versus 10%; P<0.0001), dysphasia (39% versus 15%; P<0.0001), and comorbidity (20% versus 15%; P=0.04). Exclusion of patients unavailable for assessment, and other widely used selection criteria, results in underestimation of the measured rate of dementia associated with transient ischemic attack and stroke. © 2015 American Heart Association, Inc.

  8. A Taxonomy for Software Defined Networking, Man In The Middle Attacks

    DTIC Science & Technology

    2016-09-01

    that separates it from the networks of today’s world . As Stallings (2013) describes, “current networks are vertically integrated, meaning that the data...cause overpopulation of flow tables increasing processing rate on the switch (Zarek, 2012). More specifically, premature evictions result 16 in...Mininet demonstrated our proof of concept but was not sufficient for real world implementation. Our overall goal was to grab an HTTP response packet

  9. A Keystone Ant Species Provides Robust Biological Control of the Coffee Berry Borer Under Varying Pest Densities.

    PubMed

    Morris, Jonathan R; Vandermeer, John; Perfecto, Ivette

    2015-01-01

    Species' functional traits are an important part of the ecological complexity that determines the provisioning of ecosystem services. In biological pest control, predator response to pest density variation is a dynamic trait that impacts the provision of this service in agroecosystems. When pest populations fluctuate, farmers relying on biocontrol services need to know how natural enemies respond to these changes. Here we test the effect of variation in coffee berry borer (CBB) density on the biocontrol efficiency of a keystone ant species (Azteca sericeasur) in a coffee agroecosystem. We performed exclosure experiments to measure the infestation rate of CBB released on coffee branches in the presence and absence of ants at four different CBB density levels. We measured infestation rate as the number of CBB bored into fruits after 24 hours, quantified biocontrol efficiency (BCE) as the proportion of infesting CBB removed by ants, and estimated functional response from ant attack rates, measured as the difference in CBB infestation between branches. Infestation rates of CBB on branches with ants were significantly lower (71%-82%) than on those without ants across all density levels. Additionally, biocontrol efficiency was generally high and did not significantly vary across pest density treatments. Furthermore, ant attack rates increased linearly with increasing CBB density, suggesting a Type I functional response. These results demonstrate that ants can provide robust biological control of CBB, despite variation in pest density, and that the response of predators to pest density variation is an important factor in the provision of biocontrol services. Considering how natural enemies respond to changes in pest densities will allow for more accurate biocontrol predictions and better-informed management of this ecosystem service in agroecosystems.

  10. A Keystone Ant Species Provides Robust Biological Control of the Coffee Berry Borer Under Varying Pest Densities

    PubMed Central

    Morris, Jonathan R.; Vandermeer, John; Perfecto, Ivette

    2015-01-01

    Species’ functional traits are an important part of the ecological complexity that determines the provisioning of ecosystem services. In biological pest control, predator response to pest density variation is a dynamic trait that impacts the provision of this service in agroecosystems. When pest populations fluctuate, farmers relying on biocontrol services need to know how natural enemies respond to these changes. Here we test the effect of variation in coffee berry borer (CBB) density on the biocontrol efficiency of a keystone ant species (Azteca sericeasur) in a coffee agroecosystem. We performed exclosure experiments to measure the infestation rate of CBB released on coffee branches in the presence and absence of ants at four different CBB density levels. We measured infestation rate as the number of CBB bored into fruits after 24 hours, quantified biocontrol efficiency (BCE) as the proportion of infesting CBB removed by ants, and estimated functional response from ant attack rates, measured as the difference in CBB infestation between branches. Infestation rates of CBB on branches with ants were significantly lower (71%-82%) than on those without ants across all density levels. Additionally, biocontrol efficiency was generally high and did not significantly vary across pest density treatments. Furthermore, ant attack rates increased linearly with increasing CBB density, suggesting a Type I functional response. These results demonstrate that ants can provide robust biological control of CBB, despite variation in pest density, and that the response of predators to pest density variation is an important factor in the provision of biocontrol services. Considering how natural enemies respond to changes in pest densities will allow for more accurate biocontrol predictions and better-informed management of this ecosystem service in agroecosystems. PMID:26562676

  11. Pulse radiolytic study of the oxidation reactions of uric acid in presence of bovine serum albumin. Evidence of possible complex formation in the transient state

    NASA Astrophysics Data System (ADS)

    Adhikari, S.; Joshi, R.; Gopinathan, C.

    1997-01-01

    The pulse radiolytic and spectrophotometric study of uric acid in presence of bovine serum albumin (BSA) has been carried out. In the spectrophotometric study there is no evidence for ground state interaction between BSA and uric acid. The oxidation reactions of uric acid in presence and absence of BSA employing CCl 3OO and Br radicals have been carried out. In a composition of equal concentration of uric acid and BSA, the CCl 3OO and Br radicals produce a transient absorption spectrum which show two peaks at 330 and 360 nm. The peak at 360 nm is ascribed due to weak complex formation between semioxidised BSA and uric acid radicals. The rate constant of CCl 3OO . radical with uric acid increases with the increase in BSA concentration which is explained as protection of BSA by uric acid from radical attack. The Br radical attacks uric acid and BSA in a manner similar to CCl 3OO radical. The bimolecular rate constants for the reaction of Br radical with BSA and uric acid have been found as 2.9 × 10 10 dm 3 mol -1 s -1 and 6.33 × 10 9 dm 3 mol -1 s -, respectively.

  12. Flight test of the X-29A at high angle of attack: Flight dynamics and controls

    NASA Technical Reports Server (NTRS)

    Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.

    1995-01-01

    The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.

  13. Public knowledge of heart attack symptoms in Beijing residents.

    PubMed

    Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan

    2007-09-20

    Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart attack symptoms is deficient in Beijing residents. But their knowledge of calling emergency medical services when someone is having a heart attack is relatively adequate. Public health efforts are needed to increase the recognition of the major heart attack symptoms in both the general public and groups at high risk for an acute cardiac event, especially in socioeconomically disadvantaged subgroups, including persons with low education level, low household income, and no health insurance coverage.

  14. Impact of Tumarkin attacks on complaints and work ability in Ménière's disease.

    PubMed

    Pyykkö, Ilmari; Manchaiah, Vinaya; Zou, Jing; Levo, Hilla; Kentala, Erna

    2018-05-22

    The purpose of the present study was to characterize the occurrence of Tumarkin attacks in patients with Ménière'sdisease (MD), and to study its association with reported complaints, severity of consequences, and also self-reported work ability. The study used a cross-sectional design. Data obtained from the Finnish Ménière Federation using an electronic survey was analyzed. 602 people with MD responded to the survey (62% response rate) with a mean age of 56.7 years and a mean duration of the disease 12.4 years. 49% of the respondents experienced Tumarkin attacks, which lasted for a few seconds to a few minutes. There were significant differences in complaints reported by MD patients with and without Tumarkin attacks. Respondents with Tumarkin attacks experienced various consequences, including tripping, falls, fear, anxiety, problems in dyadic life, and even transient loss of consciousness. Respondents with Tumarkin attacks had more frequently applied for pension than those not having Tumarkin attacks. On an average, respondents with Tumarkin attacks had less self-reported working ability when compared to those without Tumarkin attacks. The current study results suggest various differences in terms of complaints reported, severity of consequences, and the self-reported working ability in MD patients with and without Tumarkin attacks. Hearing healthcare professionals must examine Tumarkin attacks and their consequences in patients with MD during clinical examinations. In addition, the therapy should focus on alleviating the consequences and improving work ability.

  15. Children's Mental Health in the Context of Terrorist Attacks, Ongoing Threats, and Possibilities of Future Terrorism.

    PubMed

    Comer, Jonathan S; Bry, Laura J; Poznanski, Bridget; Golik, Alejandra M

    2016-09-01

    Over the past two decades, the field has witnessed tremendous advances in our understanding of terrorism and its impacts on affected youth. It is now well established that a significant proportion of exposed youth show elevated PTSD symptoms in the months following a terrorist attack. In more recent years, research has expanded beyond confirming our understanding of the association between direct terrorism exposure and child PTSD symptoms by elucidating (a) links between terrorism exposure and non-PTSD clinical outcomes (e.g., externalizing problems, substance use), (b) individual differences associated with divergent patterns of risk and resilience, (c) the clinical correlates of media-based contact with terrorism, (d) clinical outcomes associated with exposure to recurrent terrorist attacks, and (e) exposure to extended contexts of uncertainty and the possibilities of future terrorism. Researchers studying the effects of terrorism and political violence on youth have increasingly examined a much broader range of regions in the world, affording needed opportunities to consider the generalizability of prior findings to youth living in different political contexts, in less developed regions of the world, and/or in regions with different rates of recurrent terrorism. In order to understand and, in turn, best meet the clinical needs of the majority of terrorism-affected youth across the globe, more targeted research on exposed youth is needed in developing regions of the world and regions enduring more recurrent terrorist attacks.

  16. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flach, G. P.

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  17. Pitch control margin at high angle of attack - Quantitative requirements (flight test correlation with simulation predictions)

    NASA Technical Reports Server (NTRS)

    Lackey, J.; Hadfield, C.

    1992-01-01

    Recent mishaps and incidents on Class IV aircraft have shown a need for establishing quantitative longitudinal high angle of attack (AOA) pitch control margin design guidelines for future aircraft. NASA Langley Research Center has conducted a series of simulation tests to define these design guidelines. Flight test results have confirmed the simulation studies in that pilot rating of high AOA nose-down recoveries were based on the short-term response interval in the forms of pitch acceleration and rate.

  18. Ponderosa pine resin defenses and growth: metrics matter.

    PubMed

    Hood, Sharon; Sala, Anna

    2015-11-01

    Bark beetles (Coleoptera: Curculionidae, Scolytinae) cause widespread tree mortality in coniferous forests worldwide. Constitutive and induced host defenses are important factors in an individual tree's ability to survive an attack and in bottom-up regulation of bark beetle population dynamics, yet quantifying defense levels is often difficult. For example, in Pinus spp., resin flow is important for resistance to bark beetles but is extremely variable among individuals and within a season. While resin is produced and stored in resin ducts, the specific resin duct metrics that best correlate with resin flow remain unclear. The ability and timing of some pine species to produce induced resin is also not well understood. We investigated (i) the relationships between ponderosa pine (Pinus ponderosa Lawson & C. Lawson) resin flow and axial resin duct characteristics, tree growth and physiological variables, and (ii) if mechanical wounding induces ponderosa pine resin flow and resin ducts in the absence of bark beetles. Resin flow increased later in the growing season under moderate water stress and was highest in faster growing trees. The best predictors of resin flow were nonstandardized measures of resin ducts, resin duct size and total resin duct area, both of which increased with tree growth. However, while faster growing trees tended to produce more resin, models of resin flow using only tree growth were not statistically significant. Further, the standardized measures of resin ducts, density and duct area relative to xylem area, decreased with tree growth rate, indicating that slower growing trees invested more in resin duct defenses per unit area of radial growth, despite a tendency to produce less resin overall. We also found that mechanical wounding induced ponderosa pine defenses, but this response was slow. Resin flow increased after 28 days, and resin duct production did not increase until the following year. These slow induced responses may allow unsuccessfully attacked or wounded trees to resist future bark beetle attacks. Forest management that encourages healthy, vigorously growing trees will also favor larger resin ducts, thereby conferring increased constitutive resistance to bark beetle attacks. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Technology and operational considerations for low-heat-rate trajectories. [of future winged earth reentry vehicles

    NASA Technical Reports Server (NTRS)

    Wurster, K. E.; Eldred, C. H.

    1979-01-01

    A broad parametric study which examines several critical aspects of low-heat-rate entry trajectories is performed. Low planform loadings associated with future winged earth-entry vehicles coupled with the potential application of metallic thermal protection systems (TPS) suggest that such trajectories are of particular interest. Studied are three heating conditions - reference, stagnation, and windward centerline, for both laminar and turbulent flow; configuration-related factors including planform loading and hypersonic angle of attack; and mission-related factors such as cross-range and orbit inclination. Results indicate benefits in the design of TPS to be gained by utilizing moderate angles of attack as opposed to high-lift coefficient, high angles of attack, during entry. An assessment of design and technology implications is made.

  20. Kinematic properties of the helicopter in coordinated turns

    NASA Technical Reports Server (NTRS)

    Chen, R. T. N.; Jeske, J. A.

    1981-01-01

    A study on the kinematic relationship of the variables of helicopter motion in steady, coordinated turns involving inherent sideslip is described. A set of exact kinematic equations which govern a steady coordinated helical turn about an Earth referenced vertical axis is developed. A precise definition for the load factor parameter that best characterizes a coordinated turn is proposed. Formulas are developed which relate the aircraft angular rates and pitch and roll attitudes to the turn parameters, angle of attack, and inherent sideslip. A steep, coordinated helical turn at extreme angles of attack with inherent sideslip is of primary interest. The bank angle of the aircraft can differ markedly from the tilt angle of the normal load factor. The normal load factor can also differ substantially from the accelerometer reading along the vertical body axis of the aircraft. Sideslip has a strong influence on the pitch attitude and roll rate of the helicopter. Pitch rate is independent of angle of attack in a coordinated turn and in the absence of sideslip, angular rates about the stability axes are independent of the aerodynamic characteristics of the aircraft.

  1. Southeast Asia: Isiss Next Front

    DTIC Science & Technology

    2017-12-01

    profile attacks to include the Bali Bombings in 2002. Shortly after the September 11 attacks and the Bali bombings , Southeast Asia was labeled “the second...58 In a January 2016 attack, ISIS-linked fighters bombed a police post in Jakarta that resulted in four dead and 23 injured.59 In June 2016, ISIS...implications for this threat include, an increase in jihadist numbers in the area, an increase of terrorist training camps and bomb - making facilities

  2. On the eve of war: authoritarianism, social dominance, and American students' attitudes toward attacking Iraq.

    PubMed

    McFarland, Sam G

    2005-03-01

    In the week before the 2003 American attack on Iraq, the effects of authoritarianism and the social dominance orientation on support for the attack were examined. Based on prior research on the nature of these constructs, a structural model was developed and tested. As predicted, authoritarianism strengthened support for the attack by intensifying the perception that Iraq threatened America. Social dominance increased support by reducing concern for the likely human costs of the war. Both also increased blind patriotism, which in turn reduced concern for the war's human costs and was reciprocally related to the belief that Iraq threatened America.

  3. Ultra high bypass Nacelle aerodynamics inlet flow-through high angle of attack distortion test

    NASA Technical Reports Server (NTRS)

    Larkin, Michael J.; Schweiger, Paul S.

    1992-01-01

    A flow-through inlet test program was conducted to evaluate inlet test methods and determine the impact of the fan on inlet separation when operating at large angles of attack. A total of 16 model configurations of approximately 1/6 scale were tested. A comparison of these flow-through results with powered data indicates the presence of the fan increased separation operation 3 degrees to 4 degrees over the flow through inlet. Rods and screens located at the fan face station, that redistribute the flow, achieved simulation of the powered-fan results for separation angle of attack. Concepts to reduce inlet distortion and increase angle of attack capability were also evaluated. Vortex generators located on the inlet surface increased inlet angle of attack capability up to 2 degrees and reduced inlet distortion in the separated region. Finally, a method of simulating the fan/inlet aerodynamic interaction using blockage sizing method has been defined. With this method, a static blockage device used with a flow-through model will approximate the same inlet onset of separation angle of attack and distortion pattern that would be obtained with an inlet model containing a powered fan.

  4. [An outbreak of Heliotrope food poisoning, Tadjikistan, November 1992-March 1993].

    PubMed

    Chauvin, P; Dillon, J C; Moren, A

    1994-01-01

    The seeds and roots of Heliotropium lasocarpium, contain a pyrrolizidine alkaloid which causes toxic liver injury and veno-occlusive disease (VOD), characterised by an occlusive lesion of the centrolobular veins of the liver, when consumed by humans. The Farkhar region of Southern Tadjikistan, was blockaded from May to November 1992. This led to a famine and a delay of two months in the wheat harvest. Heliotropium lasocarpium had time to grow in the fields and their seeds were therefore collected with the wheat. The contaminated wheat was distributed to the population, who milled it and made bread. The first case of liver toxicity was six weeks after the first consumption of the contaminated bread. By March 1993, 3,906 cases had been recorded (attack rate = 4%). The attack rate were 0.4%, 5.4%, 4.0%, 2.8% and 1.5% for the less than 1 year, 1-14 years, 15-30 years, 31-50 years and over 50 years age groups respectively. The overall case fatality ratio (CFR) was 1.3% and increased with age from 0 to 5.9% in the same age groups. Two of the ten collective farms represented 83.3% of the cases attack rate of 16.9% and 23.6%. Four stages of illness were defined. Stage I corresponds to abdominal pain, nausea or vomiting, and asthenia. All stage I patients (55.5%) recovered rapidly. Stage II is an association of Stage I and hepatomegalia (29.9%). Stage III includes ascites in addition to these symptoms (13.7%) and stage IV alteration of consciousness (0.9%). The last case was reported on March 4th 1993.(ABSTRACT TRUNCATED AT 250 WORDS)

  5. Olfactory-triggered panic attacks among Khmer refugees: a contextual approach.

    PubMed

    Hinton, Devon; Pich, Vuth; Chhean, Dara; Pollack, Mark

    2004-06-01

    One hundred Khmer refugees attending a psychiatric clinic were surveyed to determine the prevalence of olfactory-triggered panic attacks as well as certain characteristics of the episodes, including trigger (i.e. type of odor), frequency, length, somatic symptoms, and the rate of associated flashbacks and catastrophic cognitions. Forty-five of the 100 patients had experienced an olfactory-triggered panic attack in the last month. Trauma associations and catastrophic cognitions (e.g. fears of a 'wind attack', 'weakness', and 'weak heart') were common during events of olfactory panic. Several case examples are presented. A multifactorial model of the generation of olfactory panic is adduced. The therapeutic implications of this model for the treatment of olfactory panic are discussed.

  6. Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wang, Jian; Tang, Chao-Jing

    2012-06-01

    Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal particles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept-resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency.

  7. Node Survival in Networks under Correlated Attacks

    PubMed Central

    Hao, Yan; Armbruster, Dieter; Hütt, Marc-Thorsten

    2015-01-01

    We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated) and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles. PMID:25932635

  8. Countermeasures for unintentional and intentional video watermarking attacks

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  9. Effects of autogenic training on nitroglycerin-induced headaches.

    PubMed

    Juhasz, Gabriella; Zsombok, Terezia; Gonda, Xenia; Nagyne, Nora; Modosne, Edit; Bagdy, Gyorgy

    2007-03-01

    To investigate the prophylactic and acute effects of autogenic training (AT) during a nitroglycerin-induced migraine attack. Thirty female migraineurs (without aura) and 11 controls participated in the study. Of these, 11 migraineurs and 5 controls practiced AT regularly for at least 6 months prior to and during the sublingual nitroglycerin test. Headache intensity and characteristics were recorded with a standardized method. During the nitroglycerin challenge, blood was collected for plasma cortisol determination and blood pressure and pulse rate were recorded. As a long-term preventive treatment, AT significantly decreased the mean headache frequency and intensity (P = .001) compared to the pretreatment period in the migraineurs who regularly practiced AT (n = 11). During the nitroglycerin challenge, AT successfully attenuated the nitroglycerin-induced acute decrease in blood pressure and pulse rate (P = .013; n = 16 AT subjects vs n = 25 non-AT subjects). However, it was not effective in preventing immediate headache (P = .71), did not decrease the frequency of acute migraine attacks (P = .79), and could not alleviate acute migraine pain (P = .78; n = 16 AT subjects vs n = 25 non-AT subjects). Plasma cortisol concentration significantly increased (P = .003) during the acute migraine attack (n = 22), and migraine intensity correlated with plasma cortisol elevations (P < .001; n = 41) and showed a tendency of negative correlation with morning plasma cortisol concentration (P = .08; n = 41). However, AT did not alter plasma cortisol responses (P = .99; n = 16 AT subjects vs n = 25 non-AT subjects). (1) The long-term AT therapy proved to be a significantly effective preventive intervention in migraine sufferers. We hypothesized that this long-term effect of AT is based on modulation of the pain anticipation system, which is strongly correlated with function of the anterior cingulate cortex. (2) We demonstrated that AT could not alter the nitroglycerin-induced acute migraine attacks, which are directly related to the dysfunctional brainstem activation according to previous studies. (3) Our results suggested that there are multiple, complex relationships between cortisol responses and migraine pain, which are possibly mediated by the brain serotonergic system. (4) In addition, our results provide further evidence that nitroglycerin-induced vasodilatation is not directly connected to either immediate headache or delayed migraine attack.

  10. Spatio-temporal synchrony of influenza in cities across Israel: the "Israel is one city" hypothesis.

    PubMed

    Barnea, Oren; Huppert, Amit; Katriel, Guy; Stone, Lewi

    2014-01-01

    We analysed an 11-year dataset (1998-2009) of Influenza-Like Illness (ILI) that was based on surveillance of ∽23% of Israel's population. We examined whether the level of synchrony of ILI epidemics in Israel's 12 largest cities is high enough to view Israel as a single epidemiological unit. Two methods were developed to assess the synchrony: (1) City-specific attack rates were fitted to a simple model in order to estimate the temporal differences in attack rates and spatial differences in reporting rates of ILI. The model showed good fit to the data (R2  =  0.76) and revealed considerable differences in reporting rates of ILI in different cities (up to a factor of 2.2). (2) A statistical test was developed to examine the null hypothesis (H0) that ILI incidence curves in two cities are essentially identical, and was tested using ILI data. Upon examining all possible pairs of incidence curves, 77.4% of pairs were found not to be different (H0 was not rejected). It was concluded that all cities generally have the same attack rate and follow the same epidemic curve each season, although the attack rate changes from season to season, providing strong support for the "Israel is one city" hypothesis. The cities which were the most out of synchronization were Bnei Brak, Beersheba and Haifa, the latter two being geographically remote from all other cities in the dataset and the former geographically very close to several other cities but socially separate due to being populated almost exclusively by ultra-orthodox Jews. Further evidence of assortative mixing of the ultra-orthodox population can be found in the 2001-2002 season, when ultra-orthodox cities and neighborhoods showed distinctly different incidence curves compared to the general population.

  11. Understanding estimated worker absenteeism rates during an influenza pandemic.

    PubMed

    Thanner, Meridith H; Links, Jonathan M; Meltzer, Martin I; Scheulen, James J; Kelen, Gabor D

    2011-01-01

    Published employee absenteeism estimates during an influenza pandemic range from 10 to 40 percent. The purpose of this study was to estimate daily employee absenteeism through the duration of an influenza pandemic and to determine the relative impact of key variables used to derive the estimates. Using the Centers for Disease Control and Prevention's FluWorkLoss program, the authors estimated the number of absent employees on any given day over the course of a simulated 8-week pandemic wave by using varying attack rates. Employee data from a university with a large academic health system were used. Sensitivity of the program outputs to variation in predictor (inputs) values was assessed. Finally, the authors examined and documented the algorithmic sequence of the program. Using a 35 percent attack rate, a total of 47,270 workdays (or 3.4 percent of all available workdays) would be lost over the course of an 8-week pandemic among a population of 35,026 employees. The highest (peak) daily absenteeism estimate was 5.8 percent (minimum 4.8 percent; maximum 7.4 percent). Sensitivity analysis revealed that varying days missed for nonhospitalized illness had the greatest potential effect on peak absence rate (3.1 to 17.2 percent). Peak absence with 15 and 25 percent attack rates were 2.5 percent and 4.2 percent, respectively. The impact of an influenza pandemic on employee availability may be less than originally thought, even with a high attack rate. These data are generalizable and are not specific to institutions of higher education or medical centers. Thus, these findings provide realistic and useful estimates for influenza pandemic planning for most organizations.

  12. Knowledge and Attitude of Iranian Red Crescent Society Volunteers in Dealing with Chemical Attacks.

    PubMed

    Nadjafi, Maryam; Hamzeh Pour, Siavash

    2017-04-01

    To evaluate the knowledge, attitude, and preparedness of Mahabad Red Crescent Society volunteers in dealing with chemical attacks. This prospective cross-sectional study was conducted on 120 Red Crescent Society volunteers in Mahabad City, Iran, during 2014-2015.The knowledge of the volunteers was evaluated and rated using a questionnaire as poor, moderate, and good. Also, the attitude of the volunteers towards the chemical attacks and their preparedness were rated as appropriate and inappropriate using a questionnaire. Data were analyzed using the SPSS software version 21. From a total of 120 volunteers, 62.5% were males. The mean age of the volunteers was 32.0 ± 8.2 years. None of the volunteers had adequate knowledge regarding management of the consequences of chemical terrorist attacks. Only 10 volunteers (8.3%) had appropriate attitude and 7 (5.8%) stated their preparedness for being sent to the crisis zone. Also, 116 volunteers (96.7%) declared that Mahabad Red Crescent Society has an inappropriate level of preparedness to encounter chemical terrorism attacks and release of chemical agents related to petrochemical industrial chlorine resources into the water and wastewater. The findings of the present study show poor knowledge and inappropriate attitude of Mahabad Red Crescent Society volunteers, and rescuers in encountering probable chemical attacks and industrial accidents. Furthermore, the Red Crescent Society had an inappropriate level of preparedness in the field of chemical terrorism from the viewpoint of the studied volunteers.

  13. Terminal attack trajectories of peregrine falcons are described by the proportional navigation guidance law of missiles

    PubMed Central

    Brighton, Caroline H.; Thomas, Adrian L. R.

    2017-01-01

    The ability to intercept uncooperative targets is key to many diverse flight behaviors, from courtship to predation. Previous research has looked for simple geometric rules describing the attack trajectories of animals, but the underlying feedback laws have remained obscure. Here, we use GPS loggers and onboard video cameras to study peregrine falcons, Falco peregrinus, attacking stationary targets, maneuvering targets, and live prey. We show that the terminal attack trajectories of peregrines are not described by any simple geometric rule as previously claimed, and instead use system identification techniques to fit a phenomenological model of the dynamical system generating the observed trajectories. We find that these trajectories are best—and exceedingly well—modeled by the proportional navigation (PN) guidance law used by most guided missiles. Under this guidance law, turning is commanded at a rate proportional to the angular rate of the line-of-sight between the attacker and its target, with a constant of proportionality (i.e., feedback gain) called the navigation constant (N). Whereas most guided missiles use navigation constants falling on the interval 3 ≤ N ≤ 5, peregrine attack trajectories are best fitted by lower navigation constants (median N < 3). This lower feedback gain is appropriate at the lower flight speed of a biological system, given its presumably higher error and longer delay. This same guidance law could find use in small visually guided drones designed to remove other drones from protected airspace. PMID:29203660

  14. Terminal attack trajectories of peregrine falcons are described by the proportional navigation guidance law of missiles.

    PubMed

    Brighton, Caroline H; Thomas, Adrian L R; Taylor, Graham K

    2017-12-19

    The ability to intercept uncooperative targets is key to many diverse flight behaviors, from courtship to predation. Previous research has looked for simple geometric rules describing the attack trajectories of animals, but the underlying feedback laws have remained obscure. Here, we use GPS loggers and onboard video cameras to study peregrine falcons, Falco peregrinus , attacking stationary targets, maneuvering targets, and live prey. We show that the terminal attack trajectories of peregrines are not described by any simple geometric rule as previously claimed, and instead use system identification techniques to fit a phenomenological model of the dynamical system generating the observed trajectories. We find that these trajectories are best-and exceedingly well-modeled by the proportional navigation (PN) guidance law used by most guided missiles. Under this guidance law, turning is commanded at a rate proportional to the angular rate of the line-of-sight between the attacker and its target, with a constant of proportionality (i.e., feedback gain) called the navigation constant ( N ). Whereas most guided missiles use navigation constants falling on the interval 3 ≤ N ≤ 5, peregrine attack trajectories are best fitted by lower navigation constants (median N < 3). This lower feedback gain is appropriate at the lower flight speed of a biological system, given its presumably higher error and longer delay. This same guidance law could find use in small visually guided drones designed to remove other drones from protected airspace. Copyright © 2017 the Author(s). Published by PNAS.

  15. Health as a target: South Africa's destabilization of Mozambique.

    PubMed

    Cliff, J; Noormahomed, A R

    1988-01-01

    Since 1982 attacks on the health services have been an integral part of South African destabilization of Mozambique. After independence in 1975, Mozambique began successfully to implement a primary health care policy. By attacking primary health care units, kidnapping and killing health workers and destroying transport, a South African supported rebel movement has attempted to undermine this policy. The combined effects of the negative economic consequences of the war, the forced displacement of over a million people and the destruction and disruption of health services have worsened the health of the Mozambican people. Preventive programmes have been severely disrupted. Effects on health include an increase in mortality rates, famine and infectious disease epidemics. Similarities exist between this war and the low intensity conflict in Nicaragua. Given the intensity of the onslaught, the primary health care system has proved remarkably resistant to destruction.

  16. Facelock: familiarity-based graphical authentication

    PubMed Central

    McLachlan, Jane L.; Renaud, Karen

    2014-01-01

    Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems. PMID:25024913

  17. Indirect Plant Defense against Insect Herbivores: A Review

    USDA-ARS?s Scientific Manuscript database

    Plants respond to herbivore attack by launching two types of defenses: direct defense and indirect defense. Direct defense includes all plant traits that increase the resistance of host plants to attacking insect herbivores by affecting the physiology and/or behavior of the attackers. Indirect defe...

  18. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  19. Posttraumatic stress disorder symptoms following media exposure to tragic events: impact of 9/11 on children at risk for anxiety disorders.

    PubMed

    Otto, Michael W; Henin, Aude; Hirshfeld-Becker, Dina R; Pollack, Mark H; Biederman, Joseph; Rosenbaum, Jerrold F

    2007-01-01

    With the extensive media coverage on September 11, 2001, adults and children indirectly witnessed the terrorist attacks leading to the deaths of almost 3,000 people. An ongoing longitudinal study provided the opportunity to examine pre-event characteristics and the impact of this media exposure. We assessed symptoms of PTSD in 166 children and 84 mothers who had no direct exposure to the 9/11 attacks. The sample included children who had parents with or without anxiety and mood disorders, and who had been assessed for the presence or absence of temperamental behavioral inhibition (BI). We found a 5.4 percent rate of symptomatic PTSD in response to 9/11 in children and 1.2 percent in their mothers. Children's identification with victims of the attack, and for younger children, the amount of television viewing predicted increased risk of PTSD symptoms. Parental depression was associated with higher symptoms, and pre-event levels of family support was associated with a lower risk for PTSD symptoms. BI in children was also linked to lower rates of PTSD symptoms, suggesting that a cautious and fearful approach to novelty may offer protection against exposure to media-based traumatic images. Media viewing of tragic events is sufficient to produce PTSD symptoms in vulnerable populations such as children. Given the links between PTSD symptoms and viewing habits, parental monitoring of media exposure may be important for younger children.

  20. The incidence of invasive aspergillosis among solid organ transplant recipients and implications for prophylaxis in lung transplants.

    PubMed

    Minari, A; Husni, R; Avery, R K; Longworth, D L; DeCamp, M; Bertin, M; Schilz, R; Smedira, N; Haug, M T; Mehta, A; Gordon, S M

    2002-12-01

    Invasive aspergillosis (IA) is associated with significant morbidity and mortality in solid organ transplant recipients but data on the incidence rates stratified by type of solid organ are limited. To describe the attack rates and incidence of IA in solid organ transplant recipients, and the impact of universal Aspergillus prophylaxis (aerosolized amphotericin B or oral itraconazole) in lung transplant recipients. The 2,046 patients who received solid organ transplants at the Cleveland Clinic Foundation from January 1990 through 1999 were studied. Cases were ascertained through computerized records of microbiology, cytology, and pathology reports. Definite IA was defined as a positive culture and pathology showing septate hyphae. Probable IA was clinical disease and either a positive culture or histopathology. Disseminated IA was defined as involvement of two or more noncontiguous anatomic sites. We identified 33 cases of IA (28% disseminated) in 2,046 patients (attack rate = 1.6%) for an incidence of 4.8 cases per 1,000 patient-years (33 cases/6,813 pt-years). Both the attack and the incidence rates were significantly higher for lung transplant recipients vs. other transplant recipients: lung 12.8% (24 cases/188 patients) or 40.5 cases/1,000-pt year vs. heart 0.4% (3/686) or 1.4 per 1,000-pt year vs. liver 0.7% (3/439) or 2.1 per 1,000-pt year vs. renal 0.4% (3/733) or 1.2 per 1,000-pt year (P < 0.01). The incidence of IA was highest during the first year after transplantation for all categories, but cases occurred after the first year of transplantation only in lung transplant recipients. The attack rate of IA in lung transplant recipients was significantly lower after institution of routine Aspergillus prophylaxis (4.9% vs. 18.2%, P < 0.05). The highest incidence and attack rate of invasive aspergillosis among solid organ transplant recipients occurs in lung transplant recipients and supports the routine use of Aspergillus prophylaxis for at least one year after transplantation in this group.

  1. The maul of the wild. Animal attacks can produce significant trauma.

    PubMed

    Conrad, L

    1994-03-01

    Wild-animal attacks are almost an anachronism in our day and age. They remind us that humans can still be food or prey. Cougar attacks, though rare, produce significant trauma. Characteristic patterns of injury and wound infection should be appropriately identified and treated. As we protect wild-animal species and acknowledge their right to share territory, interactions--and possibly attacks--are likely to increase. Awareness, education, knowledge and prevention, rather than the elimination of animal populations, may be the best way to control wild-animal attacks on humans in the future.

  2. Experimental study on discretely modulated continuous-variable quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shen Yong; Zou Hongxin; Chen Pingxing

    2010-08-15

    We present a discretely modulated continuous-variable quantum key distribution system in free space by using strong coherent states. The amplitude noise in the laser source is suppressed to the shot-noise limit by using a mode cleaner combined with a frequency shift technique. Also, it is proven that the phase noise in the source has no impact on the final secret key rate. In order to increase the encoding rate, we use broadband homodyne detectors and the no-switching protocol. In a realistic model, we establish a secret key rate of 46.8 kbits/s against collective attacks at an encoding rate of 10more » MHz for a 90% channel loss when the modulation variance is optimal.« less

  3. Cooperative Strategies to Develop Effective Stroke and Heart Attack Awareness Messages in Rural American Indian Communities, 2009–2010

    PubMed Central

    Gohdes, Dorothy; Fogle, Crystelle C.; Tadios, Fawn; Doore, Velva; Bell, Doreen S.; Harwell, Todd S.; Helgerson, Steven D.

    2013-01-01

    Introduction National initiatives to improve the recognition of heart attack and stroke warning signs have encouraged symptomatic people to seek early treatment, but few have shown significant effects in rural American Indian (AI) communities. Methods During 2009 and 2010, the Montana Cardiovascular Health Program, in collaboration with 2 tribal health departments, developed and conducted culturally specific public awareness campaigns for signs and symptoms of heart attack and stroke via local media. Telephone surveys were conducted before and after each campaign to evaluate the effectiveness of the campaigns. Results Knowledge of 3 or more heart attack warning signs and symptoms increased significantly on 1 reservation from 35% at baseline to 47% postcampaign. On the second reservation, recognition of 2 or more stroke signs and symptoms increased from 62% at baseline to 75% postcampaign, and the level of awareness remained at 73% approximately 4 months after the high-intensity campaign advertisements ended. Intent to call 9-1-1 did not increase in the heart attack campaign but did improve in the stroke campaign for specific symptoms. Recall of media campaigns on both reservations increased significantly from baseline to postcampaign for both media outlets (ie, radio and newspaper). Conclusion Carefully designed, culturally specific campaigns may help eliminate disparities in the recognition of heart attack and stroke warning signs in AI communities. PMID:23680509

  4. Cooperative strategies to develop effective stroke and heart attack awareness messages in rural american Indian communities, 2009-2010.

    PubMed

    Oser, Carrie S; Gohdes, Dorothy; Fogle, Crystelle C; Tadios, Fawn; Doore, Velva; Bell, Doreen S; Harwell, Todd S; Helgerson, Steven D

    2013-05-16

    National initiatives to improve the recognition of heart attack and stroke warning signs have encouraged symptomatic people to seek early treatment, but few have shown significant effects in rural American Indian (AI) communities. During 2009 and 2010, the Montana Cardiovascular Health Program, in collaboration with 2 tribal health departments, developed and conducted culturally specific public awareness campaigns for signs and symptoms of heart attack and stroke via local media. Telephone surveys were conducted before and after each campaign to evaluate the effectiveness of the campaigns. Knowledge of 3 or more heart attack warning signs and symptoms increased significantly on 1 reservation from 35% at baseline to 47% postcampaign. On the second reservation, recognition of 2 or more stroke signs and symptoms increased from 62% at baseline to 75% postcampaign, and the level of awareness remained at 73% approximately 4 months after the high-intensity campaign advertisements ended. Intent to call 9-1-1 did not increase in the heart attack campaign but did improve in the stroke campaign for specific symptoms. Recall of media campaigns on both reservations increased significantly from baseline to postcampaign for both media outlets (ie, radio and newspaper). Carefully designed, culturally specific campaigns may help eliminate disparities in the recognition of heart attack and stroke warning signs in AI communities.

  5. Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time-Series and Intervention Analysis.

    PubMed

    Li, Shuying; Zhuang, Jun; Shen, Shifei

    2017-07-01

    In recent years, various types of terrorist attacks occurred, causing worldwide catastrophes. According to the Global Terrorism Database (GTD), among all attack tactics, bombing attacks happened most frequently, followed by armed assaults. In this article, a model for analyzing and forecasting the conditional probability of bombing attacks (CPBAs) based on time-series methods is developed. In addition, intervention analysis is used to analyze the sudden increase in the time-series process. The results show that the CPBA increased dramatically at the end of 2011. During that time, the CPBA increased by 16.0% in a two-month period to reach the peak value, but still stays 9.0% greater than the predicted level after the temporary effect gradually decays. By contrast, no significant fluctuation can be found in the conditional probability process of armed assault. It can be inferred that some social unrest, such as America's troop withdrawal from Afghanistan and Iraq, could have led to the increase of the CPBA in Afghanistan, Iraq, and Pakistan. The integrated time-series and intervention model is used to forecast the monthly CPBA in 2014 and through 2064. The average relative error compared with the real data in 2014 is 3.5%. The model is also applied to the total number of attacks recorded by the GTD between 2004 and 2014. © 2016 Society for Risk Analysis.

  6. A systematic review of re-identification attacks on health data.

    PubMed

    El Emam, Khaled; Jonker, Elizabeth; Arbuckle, Luk; Malin, Bradley

    2011-01-01

    Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods. Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046-0.478) and 0.34 for attacks on health data (95% CI 0-0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods.

  7. A Systematic Review of Re-Identification Attacks on Health Data

    PubMed Central

    El Emam, Khaled; Jonker, Elizabeth; Arbuckle, Luk; Malin, Bradley

    2011-01-01

    Background Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods. Methods and Findings Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046–0.478) and 0.34 for attacks on health data (95% CI 0–0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. Conclusions The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods. PMID:22164229

  8. Optimality of Gaussian attacks in continuous-variable quantum cryptography.

    PubMed

    Navascués, Miguel; Grosshans, Frédéric; Acín, Antonio

    2006-11-10

    We analyze the asymptotic security of the family of Gaussian modulated quantum key distribution protocols for continuous-variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.

  9. Assessing Sexual Abuse/Attack Histories with Bariatric Surgery Patients

    ERIC Educational Resources Information Center

    Mahony, David

    2010-01-01

    This study assessed sexual abuse/attack histories in 537 bariatric surgery patients using the PsyBari. The prevalence rates found were lower (15.5%, 19.3% of women, 5.2% of men) than other studies that used bariatric surgery patients but consistent with studies that used nonbariatric obese subjects. Furthermore, bariatric surgery patients who…

  10. Distributed reinforcement learning for adaptive and robust network intrusion response

    NASA Astrophysics Data System (ADS)

    Malialis, Kleanthis; Devlin, Sam; Kudenko, Daniel

    2015-07-01

    Distributed denial of service (DDoS) attacks constitute a rapidly evolving threat in the current Internet. Multiagent Router Throttling is a novel approach to defend against DDoS attacks where multiple reinforcement learning agents are installed on a set of routers and learn to rate-limit or throttle traffic towards a victim server. The focus of this paper is on online learning and scalability. We propose an approach that incorporates task decomposition, team rewards and a form of reward shaping called difference rewards. One of the novel characteristics of the proposed system is that it provides a decentralised coordinated response to the DDoS problem, thus being resilient to DDoS attacks themselves. The proposed system learns remarkably fast, thus being suitable for online learning. Furthermore, its scalability is successfully demonstrated in experiments involving 1000 learning agents. We compare our approach against a baseline and a popular state-of-the-art throttling technique from the network security literature and show that the proposed approach is more effective, adaptive to sophisticated attack rate dynamics and robust to agent failures.

  11. Ethanol injection of ornamental trees facilitates testing insecticide efficacy against ambrosia beetles (Coleoptera: Curculionidae: Scolytinae).

    PubMed

    Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Ranger, Christopher M; Youssef, Nadeer N

    2013-02-01

    Exotic ambrosia beetles are damaging pests in ornamental tree nurseries in North America. The species Xylosandrus crassiusculus (Motshulsky) and Xylosandrus germanus (Blandford) are especially problematic. Management of these pests relies on preventive treatments of insecticides. However, field tests of recommended materials on nursery trees have been limited because of unreliable attacks by ambrosia beetles on experimental trees. Ethanol-injection of trees was used to induce colonization by ambrosia beetles to evaluate insecticides and botanical formulations for preventing attacks by ambrosia beetles. Experiments were conducted in Ohio, Tennessee, and Virginia. Experimental trees injected with ethanol had more attacks by ambrosia beetles than uninjected control trees in all but one experiment. Xylosandrus crassiusculus and X. germanus colonized trees injected with ethanol. In most experiments, attack rates declined 8 d after ethanol-injection. Ethanol-injection induced sufficient pressure from ambrosia beetles to evaluate the efficacy of insecticides for preventing attacks. Trunk sprays of permethrin suppressed cumulative total attacks by ambrosia beetles in most tests. Trunk sprays of the botanical formulations Armorex and Veggie Pharm suppressed cumulative total attacks in Ohio. Armorex, Armorex + Permethrin, and Veggie Pharm + Permethrin suppressed attacks in Tennessee. The bifenthrin product Onyx suppressed establishment of X. germanus in one Ohio experiment, and cumulative total ambrosia beetle attacks in Virginia. Substrate drenches and trunk sprays of neonicotinoids, or trunk sprays of anthranilic diamides or tolfenpyrad were not effective. Ethanol-injection is effective for inducing attacks and ensuring pressure by ambrosia beetles for testing insecticide efficacy on ornamental trees.

  12. Evaluation of Hematological Parameters in the Differentiation of Subarachnoid Hemorrhage and Other Headache Syndromes.

    PubMed

    Goktekin, Mehmet C; Yilmaz, Mustafa

    2018-06-01

    In this research, the aim was to compare hematological data for the differentiation of subarachnoid hemorrhage, migraine attack, and other headache syndromes during consultation in emergency service. In this research, which was designed as retrospective case control study, hematological parameters (WBC, HgB, HCT, PLT, lymphocyte and neutrophile counts and neutrophile/lymphocyte rates) of the patients consulting to emergency service with SAH and migraine and other consulting patients complaining mainly from headache and having normal cranial CT were analysed. Sixty migraine attack patients (F/M:47/13), 57 SAH patients (F/M:30/27), and 53 patients except migraine having normal brain CT (F/M:36/17) who were consulted to emergency service with headache complaint were included in our research. WBC, Hct, HgB, MCV, PLT, MPV, LY, Neu counts, and NY/LY rates were found to differentiate between SAH and migraine. WBC, PLT, MPV, LY, and Neu rates were found to differentiate between SAH and HS patients. Only Hct, HgB, MCV, and NY/LY rates were found to differ meaningfully between SAH and migraine patients but these rates were not found to have meaningful difference between SAH and HS patients. In addition, an increase in WBC counts and NY/LY rates and decrease in MPV counts in ROC analysis were found to be more specific for SAH. WBC, HgB, HCT, PLT, lymphocyte and Neu counts, and NY/LY rates can indicate distinguishing SAH and migraine. WBC, HgB, HCT, PLT, lymphocyte and Neu counts can indicate to the clinician a differentiation of SAH and other headache syndromes.

  13. China’s Global Quest for Energy

    DTIC Science & Technology

    2007-01-01

    U.S. However, over the past decade, Canada, Venezuela and Mexico , with their proximity and increasing production rates, have become major sources of...from Mexico and 18 percent from Canada.17 Following the September 11 attacks in New York, finger pointing began, and a number of lawsuits against...fourth largest oil supplier after Canada, Mexico and Saudi Arabia. Tensions between the U.S. and Venezuela have been flaring since an April 2002 coup

  14. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks.

    PubMed

    Saleh, Mohammed A; Abdul Manaf, Azizah

    2015-01-01

    The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  15. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    PubMed Central

    Saleh, Mohammed A.; Abdul Manaf, Azizah

    2015-01-01

    The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks. PMID:26065015

  16. Practical security and privacy attacks against biometric hashing using sparse recovery

    NASA Astrophysics Data System (ADS)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  17. Evaluation of caries progression in dentin treated by fluoride-containing materials using an in-air micro-PIGE and micro-PIXE measurement system

    NASA Astrophysics Data System (ADS)

    Yamamoto, H.; Iwami, Y.; Yagi, K.; Hayashi, M.; Komatsu, H.; Okuyama, K.; Matsuda, Y.; Yasuda, K.

    2015-04-01

    It is well-known that fluorine (F) is involved in the progression of caries. The evaluation of caries progression has conventionally been based on the change in mineral content using transverse microradiography (TMR). The purpose of this study was to evaluate the progression of dentinal caries by the change in calcium (Ca) content using Particle-Induced Gamma-ray Emission/Particle-Induced X-ray Emission (PIGE/PIXE) techniques at the Wakasa Wan Energy Research Center. We also assessed the relationship between caries progression rate and the concentration of F penetration into dentin from dental fluoride-containing materials (FCMs). Dentin sections of six extracted human teeth were prepared to obtain various amounts of F uptake using three types of FCMs. F and Ca distribution of specimens were obtained using PIGE/PIXE techniques. After evaluation, the specimens were immersed in 10 ml of demineralizing solution (pH 4.5) to simulate caries attack. To estimate caries progression rates, the same portions of the specimens were evaluated after caries attack treatment using PIGE/PIXE. A negative correlation between the F uptake in dentin and the rate of caries progression was observed. Therefore, caries progression in dentin was reduced by increasing the amount of F uptake from FCMs. This demonstrates that PIGE/PIXE techniques are valuable for estimating caries progression rates.

  18. Monitoring the Attack Incidences and Damage Caused by the Almond Bark Beetle, Scolytus amygdali, in Almond Orchards

    PubMed Central

    Cuthbertson, Andrew G. S.; Braham, Mohamed

    2018-01-01

    The almond bark beetle, Scolytus amygdali Geurin-Meneville, is responsible for significant loss of fruit production in almond orchards throughout the world. Here, we studied the damage and the incidences of S. amygdali attack on two different scales: (1) at the level of a single tree; and (2) in an entire orchard. Our results revealed no differences in attack level among four orientations (east, west, south and north sides) for the whole tree. However, the bark that was facing west side in the direction of the prevailing wind was found to be the most suitable for females to initiate attack in Stratum S2. Attack distribution remains the same among different strata (strata is vertical divisions of the tree from the ground to the uppermost twigs with ~40 cm intervals). More than 50% of attack was observed in the trunk of the tree and upper strata. However, multiplication rate (number of emerged adults/maternal gallery) varies significantly between strata. In addition, we studied attack intensity (holes produced by beetle per tree) comparing it to tree morphology (flowers, leaves and circumferences) and gum deposit. Our results revealed a positive correlation between attack intensity and gum deposits, and a negative correlation between attack intensity and tree morphology. This revealed that gum on the tree was an indicator for attack intensity. A positive correlation between attack intensity and the circumference of the tree revealed that older trees were more susceptible to S. amygdali attack. These results, while preliminary, aim to help in the monitoring of S. amygdali populations before deciding to apply any control measures. PMID:29301271

  19. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  20. The Effect of Password Management Procedures on the Entropy of User Selected Passwords

    ERIC Educational Resources Information Center

    Enamait, John D.

    2012-01-01

    Maintaining the security of information contained within computer systems poses challenges for users and administrators. Attacks on information systems continue to rise. Specifically, attacks that target user authentication are increasingly popular. These attacks are based on the common perception that traditional alphanumeric passwords are weak…

  1. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    PubMed

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  2. Heart attack risk perception biases among hypertension patients: the role of educational level and worry.

    PubMed

    Peterson, Laurel M; Helweg-Larsen, Marie; Volpp, Kevin G; Kimmel, Stephen E

    2012-01-01

    Risk biases such as comparative optimism (thinking one is better off than similar others) and risk inaccuracy (misestimating one's risk compared to one's calculated risk) for health outcomes are common. Little research has investigated racial or socioeconomic differences in these risk biases. Results from a survey of individuals with poorly controlled hypertension (N=813) indicated that participants showed (1) comparative optimism for heart attack risk by underestimating their heart attack risk compared to similar others, and (2) risk inaccuracy by overestimating their heart attack risk compared to their calculated heart attack risk. More highly educated participants were more comparatively optimistic because they rated their personal risk as lower; education was not related to risk inaccuracy. Neither race nor the federal poverty level was related to risk biases. Worry partially mediated the relationship between education and personal risk. Results are discussed as they relate to the existing literature on risk perception.

  3. Eigen model with general fitness functions and degradation rates

    NASA Astrophysics Data System (ADS)

    Hu, Chin-Kun; Saakian, David B.

    2006-03-01

    We present an exact solution of Eigen's quasispecies model with a general degradation rate and fitness functions, including a square root decrease of fitness with increasing Hamming distance from the wild type. The found behavior of the model with a degradation rate is analogous to a viral quasi-species under attack by the immune system of the host. Our exact solutions also revise the known results of neutral networks in quasispecies theory. To explain the existence of mutants with large Hamming distances from the wild type, we propose three different modifications of the Eigen model: mutation landscape, multiple adjacent mutations, and frequency-dependent fitness in which the steady state solution shows a multi-center behavior.

  4. The age distribution of mortality due to influenza: pandemic and peri-pandemic

    PubMed Central

    2012-01-01

    Background Pandemic influenza is said to 'shift mortality' to younger age groups; but also to spare a subpopulation of the elderly population. Does one of these effects dominate? Might this have important ramifications? Methods We estimated age-specific excess mortality rates for all-years for which data were available in the 20th century for Australia, Canada, France, Japan, the UK, and the USA for people older than 44 years of age. We modeled variation with age, and standardized estimates to allow direct comparison across age groups and countries. Attack rate data for four pandemics were assembled. Results For nearly all seasons, an exponential model characterized mortality data extremely well. For seasons of emergence and a variable number of seasons following, however, a subpopulation above a threshold age invariably enjoyed reduced mortality. 'Immune escape', a stepwise increase in mortality among the oldest elderly, was observed a number of seasons after both the A(H2N2) and A(H3N2) pandemics. The number of seasons from emergence to escape varied by country. For the latter pandemic, mortality rates in four countries increased for younger age groups but only in the season following that of emergence. Adaptation to both emergent viruses was apparent as a progressive decrease in mortality rates, which, with two exceptions, was seen only in younger age groups. Pandemic attack rate variation with age was estimated to be similar across four pandemics with very different mortality impact. Conclusions In all influenza pandemics of the 20th century, emergent viruses resembled those that had circulated previously within the lifespan of then-living people. Such individuals were relatively immune to the emergent strain, but this immunity waned with mutation of the emergent virus. An immune subpopulation complicates and may invalidate vaccine trials. Pandemic influenza does not 'shift' mortality to younger age groups; rather, the mortality level is reset by the virulence of the emerging virus and is moderated by immunity of past experience. In this study, we found that after immune escape, older age groups showed no further mortality reduction, despite their being the principal target of conventional influenza vaccines. Vaccines incorporating variants of pandemic viruses seem to provide little benefit to those previously immune. If attack rates truly are similar across pandemics, it must be the case that immunity to the pandemic virus does not prevent infection, but only mitigates the consequences. PMID:23234604

  5. The crevice corrosion behavior of chromium stainless steel and nickel base alloys in a reverse osmosis plant utilizing seawater

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Al-Odwani, A.; Carew, J.; Al-Hashem, A.

    1999-11-01

    The crevice corrosion tests were performed on UNS S31603, UNS S31703, UNS S31726, UNS S31254, UNS N08904, UNS N625, UNS N825 and UNS N276 was investigated in seawater and neutral brine solution using a multiple crevice washer assembly. PTFE multiple-crevice washers were bolted to both sides of the test specimens with PTFE bolts and nuts. The specimens were exposed to seawater flowing at a rate of 100 L/h for periods of 3,000 h and 6,000 h. Duplicate specimens were immersed in a plexiglass cell containing the flowing seawater at a temperature of 30 C. The results showed that all themore » tested coupons were susceptible to some degree of crevice corrosion attack. However, the stainless steels were the most severely affected. The degree of crevice corrosion attack for the nickel base alloys decreased as the percentage of molybdenum content in the alloys increased. Destruction of the passive layer by the concentration of chloride or acidity and reduction of hydrogen ions at the crevices is believed to be the cause of the crevice attack.« less

  6. Fuel clad chemical interactions in fast reactor MOX fuels

    NASA Astrophysics Data System (ADS)

    Viswanathan, R.

    2014-01-01

    Clad corrosion being one of the factors limiting the life of a mixed-oxide fast reactor fuel element pin at high burn-up, some aspects known about the key elements (oxygen, cesium, tellurium, iodine) in the clad-attack are discussed and many Fuel-Clad-Chemical-Interaction (FCCI) models available in the literature are also discussed. Based on its relatively superior predictive ability, the HEDL (Hanford Engineering Development Laboratory) relation is recommended: d/μm = ({0.507 ṡ [B/(at.% fission)] ṡ (T/K-705) ṡ [(O/M)i-1.935]} + 20.5) for (O/M)i ⩽ 1.98. A new model is proposed for (O/M)i ⩾ 1.98: d/μm = [B/(at.% fission)] ṡ (T/K-800)0.5 ṡ [(O/M)i-1.94] ṡ [P/(W cm-1)]0.5. Here, d is the maximum depth of clad attack, B is the burn-up, T is the clad inner surface temperature, (O/M)i is the initial oxygen-to-(uranium + plutonium) ratio, and P is the linear power rating. For fuels with [n(Pu)/n(M = U + Pu)] > 0.25, multiplication factors f are recommended to consider the potential increase in the depth of clad-attack.

  7. Analysis of characteristics associated with reinjection of icatibant: Results from the icatibant outcome survey.

    PubMed

    Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus

    2015-01-01

    Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms, reinjection rates may be slightly higher than shown here. Clinical trial identifier: NCT01034969.

  8. A Specialist Herbivore Uses Chemical Camouflage to Overcome the Defenses of an Ant-Plant Mutualism

    PubMed Central

    Whitehead, Susan R.; Reid, Ellen; Sapp, Joseph; Poveda, Katja; Royer, Anne M.; Posto, Amanda L.; Kessler, André

    2014-01-01

    Many plants and ants engage in mutualisms where plants provide food and shelter to the ants in exchange for protection against herbivores and competitors. Although several species of herbivores thwart ant defenses and extract resources from the plants, the mechanisms that allow these herbivores to avoid attack are poorly understood. The specialist insect herbivore, Piezogaster reclusus (Hemiptera: Coreidae), feeds on Neotropical bull-horn acacias (Vachellia collinsii) despite the presence of Pseudomyrmex spinicola ants that nest in and aggressively defend the trees. We tested three hypotheses for how P. reclusus feeds on V. collinsii while avoiding ant attack: (1) chemical camouflage via cuticular surface compounds, (2) chemical deterrence via metathoracic defense glands, and (3) behavioral traits that reduce ant detection or attack. Our results showed that compounds from both P. reclusus cuticles and metathoracic glands reduce the number of ant attacks, but only cuticular compounds appear to be essential in allowing P. reclusus to feed on bull-horn acacia trees undisturbed. In addition, we found that ant attack rates to P. reclusus increased significantly when individuals were transferred between P. spinicola ant colonies. These results are consistent with the hypothesis that chemical mimicry of colony-specific ant or host plant odors plays a key role in allowing P. reclusus to circumvent ant defenses and gain access to important resources, including food and possibly enemy-free space. This interaction between ants, acacias, and their herbivores provides an excellent example of the ability of herbivores to adapt to ant defenses of plants and suggests that herbivores may play an important role in the evolution and maintenance of mutualisms. PMID:25047551

  9. A specialist herbivore uses chemical camouflage to overcome the defenses of an ant-plant mutualism.

    PubMed

    Whitehead, Susan R; Reid, Ellen; Sapp, Joseph; Poveda, Katja; Royer, Anne M; Posto, Amanda L; Kessler, André

    2014-01-01

    Many plants and ants engage in mutualisms where plants provide food and shelter to the ants in exchange for protection against herbivores and competitors. Although several species of herbivores thwart ant defenses and extract resources from the plants, the mechanisms that allow these herbivores to avoid attack are poorly understood. The specialist insect herbivore, Piezogaster reclusus (Hemiptera: Coreidae), feeds on Neotropical bull-horn acacias (Vachellia collinsii) despite the presence of Pseudomyrmex spinicola ants that nest in and aggressively defend the trees. We tested three hypotheses for how P. reclusus feeds on V. collinsii while avoiding ant attack: (1) chemical camouflage via cuticular surface compounds, (2) chemical deterrence via metathoracic defense glands, and (3) behavioral traits that reduce ant detection or attack. Our results showed that compounds from both P. reclusus cuticles and metathoracic glands reduce the number of ant attacks, but only cuticular compounds appear to be essential in allowing P. reclusus to feed on bull-horn acacia trees undisturbed. In addition, we found that ant attack rates to P. reclusus increased significantly when individuals were transferred between P. spinicola ant colonies. These results are consistent with the hypothesis that chemical mimicry of colony-specific ant or host plant odors plays a key role in allowing P. reclusus to circumvent ant defenses and gain access to important resources, including food and possibly enemy-free space. This interaction between ants, acacias, and their herbivores provides an excellent example of the ability of herbivores to adapt to ant defenses of plants and suggests that herbivores may play an important role in the evolution and maintenance of mutualisms.

  10. Household transmission of SARS, 2003

    PubMed Central

    Wilson-Clark, Samantha D.; Deeks, Shelley L.; Gournis, Effie; Hay, Karen; Bondy, Susan; Kennedy, Erin; Johnson, Ian; Rea, Elizabeth; Kuschak, Theodore; Green, Diane; Abbas, Zahid; Guarda, Brenda

    2006-01-01

    Background In the 2003 outbreak in Toronto (in Ontario, Canada) of severe acute respiratory syndrome (SARS), about 20% of cases resulted from household transmission. The purpose of our study was to determine characteristics associated with the transmission of SARS within households. Methods A retrospective cohort of SARS-affected households was studied to determine risk factors for household transmission. Questionnaires addressed characteristics of the index case, the household and behaviours among household members. Potential risk factors for secondary transmission of infection were assessed in regression models appropriate to the outcome (secondary cases) and nonindependence of household members. Results The 74 households that participated included 18 secondary cases and 158 uninfected household members in addition to the 74 index cases. The household secondary attack rate was 10.2% (95% confidence interval [CI] 6.7%–23.5%). There was a linear association between the time the index patient spent at home after symptom onset and the secondary attack rate. Infected health care workers who were index cases had lower rates of household transmission. Interpretation SARS transmission in households is complex and increases with the length of time an ill person spends at home. Risk of transmission was lower when the index case was a health care worker. Rapid case identification is the public health measure most useful in minimizing exposure in the home. PMID:17098951

  11. Extended analysis of the Trojan-horse attack in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Vinay, Scott E.; Kok, Pieter

    2018-04-01

    The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.

  12. Olfactory-Triggered Panic Attacks Among Khmer Refugees: A Contextual Approach

    PubMed Central

    Hinton, Devon; Pich, Vuth; Chhean, Dara; Pollack, Mark

    2009-01-01

    One hundred Khmer refugees attending a psychiatric clinic were surveyed to determine the prevalence of olfactory-triggered panic attacks as well as certain characteristics of the episodes, including trigger (i.e. type of odor), frequency, length, somatic symptoms, and the rate of associated flashbacks and catastrophic cognitions. Forty-five of the 100 patients had experienced an olfactory-triggered panic attack in the last month. Trauma associations and catastrophic cognitions (e.g. fears of a ‘wind attack,’ ‘weakness,’ and ‘weak heart’) were common during events of olfactory panic. Several case examples are presented. A multifactorial model of the generation of olfactory panic is adduced. The therapeutic implications of this model for the treatment of olfactory panic are discussed. PMID:15446720

  13. Continuous-Variable Measurement-Device-Independent Multipartite Quantum Communication Using Coherent States

    NASA Astrophysics Data System (ADS)

    Zhou, Jian; Guo, Ying

    2017-02-01

    A continuous-variable measurement-device-independent (CV-MDI) multipartite quantum communication protocol is designed to realize multipartite communication based on the GHZ state analysis using Gaussian coherent states. It can remove detector side attack as the multi-mode measurement is blindly done in a suitable Black Box. The entanglement-based CV-MDI multipartite communication scheme and the equivalent prepare-and-measurement scheme are proposed to analyze the security and guide experiment, respectively. The general eavesdropping and coherent attack are considered for the security analysis. Subsequently, all the attacks are ascribed to coherent attack against imperfect links. The asymptotic key rate of the asymmetric configuration is also derived with the numeric simulations illustrating the performance of the proposed protocol.

  14. The Developmental Dynamics of Terrorist Organizations

    PubMed Central

    Clauset, Aaron; Gleditsch, Kristian Skrede

    2012-01-01

    We identify robust statistical patterns in the frequency and severity of violent attacks by terrorist organizations as they grow and age. Using group-level static and dynamic analyses of terrorist events worldwide from 1968–2008 and a simulation model of organizational dynamics, we show that the production of violent events tends to accelerate with increasing size and experience. This coupling of frequency, experience and size arises from a fundamental positive feedback loop in which attacks lead to growth which leads to increased production of new attacks. In contrast, event severity is independent of both size and experience. Thus larger, more experienced organizations are more deadly because they attack more frequently, not because their attacks are more deadly, and large events are equally likely to come from large and small organizations. These results hold across political ideologies and time, suggesting that the frequency and severity of terrorism may be constrained by fundamental processes. PMID:23185267

  15. Genetic attack on neural cryptography.

    PubMed

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  16. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  17. Is television traumatic? Dreams, stress, and media exposure in the aftermath of September 11, 2001.

    PubMed

    Propper, Ruth E; Stickgold, Robert; Keeley, Raeann; Christman, Stephen D

    2007-04-01

    The terrorist attacks of September 11, 2001, were traumatic for people living throughout the United States. It has been suggested that people living far from the attacks experienced increased stress because of their exposure to the terrorist events via the media, particularly via television. Following a traumatic or stressful event, individuals may have dreams that reflect that experience. As part of a course on dreaming, individuals recorded their dreams both prior to and following the terrorist attacks of September 11, 2001. On September 12, these same individuals reported their activities and media exposure the previous day. Results revealed (a) changes in dream features following the attacks and (b) a strong relation between exposure to the events on television and changes in dream features after the attacks. Because of the study's within-subjects design, the results provide evidence for a direct association between television viewing and subsequent increases in stress and trauma.

  18. Genetic attack on neural cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold formore » the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.« less

  19. Genetic attack on neural cryptography

    NASA Astrophysics Data System (ADS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  20. Carbon balance of a partially harvested mixed conifer forest following mountain pine beetle attack and its comparison to a clear-cut

    NASA Astrophysics Data System (ADS)

    Mathys, A.; Black, T. A.; Nesic, Z.; Nishio, G.; Brown, M.; Spittlehouse, D. L.; Fredeen, A. L.; Bowler, R.; Jassal, R. S.; Grant, N. J.; Burton, P. J.; Trofymow, J. A.; Meyer, G.

    2013-08-01

    The recent mountain pine beetle (MPB) outbreak has had an impact on the carbon (C) cycling of lodgepole pine forests in British Columbia. This study examines how partial harvesting as a forest management response to MPB infestation affects the net ecosystem production (NEP) of a mixed conifer forest (MPB-09) in Interior BC. MPB-09 is a 70-year-old stand that was partially harvested in 2009 after it had been attacked by MPB. Using the eddy-covariance technique, the C dynamics of the stand were studied over two years and compared to an adjacent clear-cut (MPB-09C) over the summertime. The annual NEP at MPB-09 increased from -108 g C m-2 in 2010 to -57 g C m-2 in 2011. The increase of NEP was due to the associated increase in annual gross ecosystem photosynthesis (GEP) from 812 g C m-2 in 2010 to 954 g C m-2 in 2011, exceeding the increase in annual respiration (Re) from 920 g C m-2 to 1011 g C m-2 during the two years. During the four month period between June and September 2010, NEP at MPB-09C was -103 g C m-2, indicating high C losses in the clear-cut. MPB-09 was a C sink during the growing season of both years, increasing from 9 g C m-2 in 2010 to 47 g C m-2 in 2011. The increase of NEP in the partially harvested stand amounted to a recovery corresponding to a 26% increase in the maximum assimilation rate in the second year. This study shows that retaining the healthy residual forest can result in higher C sequestration of MPB-attacked stands compared to clear-cut harvesting.

  1. On the Lateral Static Stability of Low-Aspect-Ratio Rectangular Wings

    NASA Astrophysics Data System (ADS)

    Linehan, Thomas; Mohseni, Kamran

    2017-11-01

    Low-aspect-ratio rectangular wings experience a reduction in lateral static stability at angles of attack distinct from that of lift stall. Stereoscopic digital particle image velocimetry is used to elucidate the flow physics behind this trend. Rectangular wings of AR = 0.75, 1, 1.5, 3 were tested at side-slip angles β = -10° and 0° with angle of attack varied in the range α =10° -40° . In side-slip, the leading-edge separation region emerges on the leeward wing where leading-edge flow reattachment is highly intermittent due to vortex shedding. The tip vortex downwash of the AR < 1.5 wings is sufficient to restrict the shedding of leading-edge vorticity, enabling sustained lift from the leading-edge separation region to high angles of attack. The windward tip vortex grows in size with increasing angle of attack, occupying an increasingly larger percentage of the windward wing. At high angles of attack pre-lift stall, the windward tip vortex lifts off the wing, resulting in separated flow underneath it. The downwash of the AR = 3 wing is insufficient to reattach the leading-edge flow at high incidence. The flow stalls on the leeward wing with stalled flow expanding upstream toward the windward wing with increasing angle of attack.

  2. Social Networking—Another Breach In The Wall

    NASA Astrophysics Data System (ADS)

    Bamnote, Gajendra; Patil, Gajendra; Shejole, Amol

    2010-11-01

    With the increasing popularity of social networks like Facebook and MySpace, such sites have lately become the favourite destinations for spammers and attackers. Social networks have experienced complex social engineering attacks, massive spam and aggressive malware distribution in the recent past. This paper presents a practical case study of social engineering, malware distribution and phishing attacks against social networking sites that are identified over last few months. It is explained how private data of the users are exposed to attackers and how easily their privacy is compromised as a result of these attacks and their own careless behaviour.

  3. Internet-based information-seeking behavior for transient ischemic attack.

    PubMed

    Abedi, Vida; Mbaye, Marieme; Tsivgoulis, Georgios; Male, Shailesh; Goyal, Nitin; Alexandrov, Andrei V; Zand, Ramin

    2015-12-01

    In recent years, Internet became an increasingly important tool for accessing health information and is being used more frequently to promote public health. To use Google search data to explore information seeking behavior for transient ischemic attack. We selected two groups of keywords related to transient ischemic attack: 'Transient Ischemic Attack' and 'Mini Stroke'. We obtained all available online search data performed in the United States from the Google search engine for a 10-year span--January 2004 to December 2013. The monthly and daily search data for the selected keywords were analyzed--using moving average--to explore the trends, peaks, and declining effects. There were three significant concurrent peaks in the Google search data for the selected keywords. Each peak was directly associated with media coverage and news headlines related to the incident of transient ischemic attack in a public figure. Following each event, it took three- to seven-days for the search trend to return to its respective average value. Furthermore, the trend was steady for 'Transient Ischemic Attack'; however, the search interest for the keyword 'Mini Stroke' shows a steady increase. The overall search interest for the selected keywords was significantly higher in the southeastern United States. Our study shows that changes in online search behavior can be associated with media coverage of key events (in our case transient ischemic attack) in public figures. These findings suggest that multimedia health promotion campaigns might be more effective, if increased promptly after similar media coverage. © 2015 World Stroke Organization.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Onyeji, Ijeoma; Bazilian, Morgan; Bronk, Chris

    Both the number and security implications of sophisticated cyber attacks on companies providing critical energy infrastructures are increasing. As power networks and, to a certain extent, oil and gas infrastructure both upstream and downstream, are becoming increasingly integrated with information communication technology systems, they are growing more susceptible to cyber attacks.

  5. Offense-Defense Balance in Cyberspace: A Proposed Model

    DTIC Science & Technology

    2012-12-01

    enable faster multitasking , the more computations per second can be accomplished. Increased processing speed will allow an attacker to send attacks...depend on what spam or DDoS needs to be accomplished with prices ranging from $30-$70 a day for DDoS to $10 for 1 million spam emails . 21 For...In addition to DDoS attacks on webservers, there were web defacements (using various tools such as SQL injections) and email flooding. The attacks

  6. Department of Defense Information Network (DODIN): A Study of Current Cyber Threats and Best Practices for Network Security

    DTIC Science & Technology

    2016-06-10

    DODIN) is being threatened by state actors, non-state actors, and continuous hacking and cyber-attacks. These threats against the network come in a...variety of forms; physical attacks from radio jamming, logical cyber threats from hacking , or a combination of both physical and logical attacks. Each...year the number of hacking attacks is increasing. Corporations like Symantec publish annual reports on cyber threats and provide tips for best

  7. One-Year Outcomes After Minor Stroke or High-Risk Transient Ischemic Attack: Korean Multicenter Stroke Registry Analysis.

    PubMed

    Park, Hong-Kyun; Kim, Beom Joon; Han, Moon-Ku; Park, Jong-Moo; Kang, Kyusik; Lee, Soo Joo; Kim, Jae Guk; Cha, Jae-Kwan; Kim, Dae-Hyun; Nah, Hyun-Wook; Park, Tai Hwan; Park, Sang-Soon; Lee, Kyung Bok; Lee, Jun; Hong, Keun-Sik; Cho, Yong-Jin; Lee, Byung-Chul; Yu, Kyung-Ho; Oh, Mi-Sun; Kim, Joon-Tae; Choi, Kang-Ho; Kim, Dong-Eog; Ryu, Wi-Sun; Choi, Jay Chol; Johansson, Saga; Lee, Su Jin; Lee, Won Hee; Lee, Ji Sung; Lee, Juneyoung; Bae, Hee-Joon

    2017-11-01

    Patients with minor ischemic stroke or transient ischemic attack are at high risk of recurrent stroke and vascular events, which are potentially disabling or fatal. This study aimed to evaluate contemporary subsequent vascular event risk after minor ischemic stroke or transient ischemic attack in Korea. Patients with minor ischemic stroke or high-risk transient ischemic attack admitted within 7 days of symptom onset were identified from a Korean multicenter stroke registry database. We estimated 3-month and 1-year event rates of the primary outcome (composite of stroke recurrence, myocardial infarction, or all-cause death), stroke recurrence, a major vascular event (composite of stroke recurrence, myocardial infarction, or vascular death), and all-cause death and explored differences in clinical characteristics and event rates according to antithrombotic strategies at discharge. Of 9506 patients enrolled in this study, 93.8% underwent angiographic assessment and 72.7% underwent cardiac evaluations; 25.1% had symptomatic stenosis or occlusion of intracranial arteries. At discharge, 95.2% of patients received antithrombotics (antiplatelet polytherapy, 37.1%; anticoagulation, 15.3%) and 86.2% received statins. The 3-month cumulative event rate was 5.9% for the primary outcome, 4.3% for stroke recurrence, 4.6% for a major vascular event, and 2.0% for all-cause death. Corresponding values at 1 year were 9.3%, 6.1%, 6.7%, and 4.1%, respectively. Patients receiving nonaspirin antithrombotic strategies or no antithrombotic agent had higher baseline risk profiles and at least 1.5× higher event rates for clinical event outcomes than those with aspirin monotherapy. Contemporary secondary stroke prevention strategies based on thorough diagnostic evaluation may contribute to the low subsequent vascular event rates observed in real-world clinical practice in Korea. © 2017 American Heart Association, Inc.

  8. Cognitive style, alprazolam plasma levels, and treatment response in panic disorder.

    PubMed

    Uhlenhuth, E H; Starcevic, Vladan; Qualls, Clifford; Antal, Edward J; Matuzas, William; Javaid, Javaid I; Barnhill, Jamie

    2008-01-01

    This study investigated an anxiety-prone cognitive style (measured by the Anxious Thoughts and Tendencies Questionnaire, AT&T) as a predictor of the acute response to increasing alprazolam plasma levels in panic disorder. Panic disorder patients (n=26) were treated with escalating doses of alprazolam for 4 weeks, then a fixed dose of 1 mg four times a day for 4 weeks. At 0, 1, 2, 3, 4, 6, and 8 weeks, trough alprazolam plasma levels; clinical, self-report, and performance measures; and vital signs were assessed. Panic attack data were from daily diaries. The repeated response measures were analyzed in relation to alprazolam plasma levels using SAS GENMOD, with patients classified as high or low on the baseline AT&T. Panic attacks, anticipatory anxiety, fear, avoidance, overall agoraphobia, the Hamilton Anxiety Rating Scale, and clinicians' global ratings improved with increasing alprazolam plasma levels. Hopkins Symptom Checklist-90 Anger-Hostility; Profile of Mood States Vigor, Confusion, and Friendliness; and speed and accuracy of performance worsened. Patients with high AT&T scores were worse throughout the study on situational panics, fear, avoidance, overall agoraphobia, the Hamilton Anxiety Rating Scale, the Hamilton Rating Scale for Depression, and Clinical Global Improvement; most Hopkins Symptom Checklist-90 clusters; Profile of Mood States Anxiety, Depression, and Confusion; and Continuous Performance Task omissions. We conclude that in panic disorder: (1) alprazolam has a broad spectrum of clinical activity related to plasma levels in individual patients; (2) sedation, disinhibition, and performance deficits may persist for at least a month after dose escalation ends; (3) marked anxiety-prone cognitions predict more symptoms throughout treatment, but do not modify the response to alprazolam and therefore should not influence the choice of alprazolam as treatment. Published 2007 Wiley-Liss, Inc.

  9. Methyl salicylate differently affects benzenoid and terpenoid volatile emissions in Betula pendula.

    PubMed

    Liu, Bin; Kaurilind, Eve; Jiang, Yifan; Niinemets, Ülo

    2018-06-20

    Methyl salicylate (MeSA) is a long-distance signal transduction chemical that plays an important role in plant responses to abiotic stress and herbivore and pathogen attacks. However, it is unclear how photosynthesis and elicitation of plant volatile organic compounds (VOC) from different metabolic pathways respond to the dose of MeSA. We applied different MeSA concentrations (0-50 mM) to study how exogenous MeSA alters VOC profiles of silver birch (Betula pendula Roth) leaves from application through recovery (0.5-23 h). Methyl salicylate application significantly reduced net assimilation rate in 10 mM and 20 mM MeSA-treated plants. No significant effects of MeSA were observed on the stomatal conductance at any MeSA concentration. Methyl salicylate elicited emissions of benzenoids (BZ), monoterpenes (MT) and fatty acid derived compounds (LOX products). Emission rates of BZ were positively, but emission rates of MT were negatively correlated with MeSA concentration. Total emission of LOX products was not influenced by MeSA concentration. Emission rate of MT was negatively correlated with BZ and the share of MT in the total emission blend decreased and the share of BZ increased with increasing MeSA concentration. Although the share of LOX products was similar across MeSA treatments, some LOX products responded differently to MeSA concentration, ultimately resulting in unique VOC blends. Overall, this study demonstrates inverse responses of MT and BZ to different MeSA doses such that plant defense mechanisms induced by lower MeSA doses mainly lead to enhanced MT synthesis, whereas greater MeSA doses trigger BZ-related defense mechanisms. Our results will contribute to improving the understanding of birch defenses induced upon regular herbivore attacks and pathogen infections in boreal forests.

  10. Terrorism, Governance, and Development

    DTIC Science & Technology

    2016-01-13

    Changes in unemployment are not positively correlated with changes in insurgent attacks in several important conflicts. Data from Afghanistan, Iraq...and the Philippines show no significant relationship between unemployment and the rate of insurgent attacks that kill civilians (Berman, et al...is that gainfully employed young men are less likely to participate in political violence, implying a positive correlation between unemployment and

  11. Myocardial perfusion imaging study of CO(2)-induced panic attack.

    PubMed

    Soares-Filho, Gastão L F; Machado, Sergio; Arias-Carrión, Oscar; Santulli, Gaetano; Mesquita, Claudio T; Cosci, Fiammetta; Silva, Adriana C; Nardi, Antonio E

    2014-01-15

    Chest pain is often seen alongside with panic attacks. Moreover, panic disorder has been suggested as a risk factor for cardiovascular disease and even a trigger for acute coronary syndrome. Patients with coronary artery disease may have myocardial ischemia in response to mental stress, in which panic attack is a strong component, by an increase in coronary vasomotor tone or sympathetic hyperactivity setting off an increase in myocardial oxygen consumption. Indeed, coronary artery spasm was presumed to be present in cases of cardiac ischemia linked to panic disorder. These findings correlating panic disorder with coronary artery disease lead us to raise questions about the favorable prognosis of chest pain in panic attack. To investigate whether myocardial ischemia is the genesis of chest pain in panic attacks, we developed a myocardial perfusion study through research by myocardial scintigraphy in patients with panic attacks induced in the laboratory by inhalation of 35% carbon dioxide. In conclusion, from the data obtained, some hypotheses are discussed from the viewpoint of endothelial dysfunction and microvascular disease present in mental stress response. Copyright © 2014 Elsevier Inc. All rights reserved.

  12. Efficacy of nifedipine and alfuzosin in the management of distal ureteric stones: A randomized, controlled study

    PubMed Central

    Sameer; Lal, Shyam; Charak, K. S.; Chakravarti, Sumit; Kohli, Supreeti; Ahmad, Shamshad

    2014-01-01

    Introduction: Stone disease is a significant and world-wide health problem. Recently, certain drugs have been used as a supplement to observation alone in an effort to improve spontaneous stone expulsion. We evaluated the efficacy of nifedipine and alfuzosin in the medical treatment of symptomatic, uncomplicated distal ureteral stones. Materials and Methods: This was a randomized controlled prospective study to determine the efficacy of alfuzosin and nifedipine as an adjunctive medical therapy, to increases the stone-expulsion rates in distal ureteric calculus of size ≤10 mm. Investigators and patients were blinded to the randomization scheme. Patients were randomly divided into three equal groups of 35 patients each. Patients in Group I received tablet nifedipine 30 mg/day, Group II received alfuzosin 10 mg/day and Group III was the control group received tablet diclofenac sodium. The patient blood pressure, stone position on imaging, number of pain attacks, time of stone-expulsion, hospital re-admission and any adverse events were assessed. Patients were followed-up weekly and continued until the patient was rendered stone free or up to 28 days. Statistical analysis was performed and P < 0.05 was considered to be significant. Results: Stone-expulsion was observed in 60%, 85.7% and 20% patients in Group I, II and III respectively. A statistically significant difference was noted in between Groups I versus III, Groups II versus III and Groups I versus II (P < 0.0001, P < 0.0001, and P < 0.0315 respectively). The mean number of pain attacks was 2.91 ± 1.01 for Group I, 1.8 ± 0.83 for Group II, and 2.82 ± 1.12 for Group III, which is statistical significant in Groups II versus III, and Groups I versus II (P < 0.001 and P < 0.001). Hospital re-admission rate was less in treatment groups when compare to control group (P < 0.0001). Conclusion: The use of alfuzosin and nifedipine as a medical expulsive therapy for distal ureteric stones proved to be safe and effective in term of increased stone-expulsion rate, reduced pain attacks and decrease hospital re-admissions. PMID:25378819

  13. The Aerodynamics of Axisymmetric Blunt Bodies Flying at Angle of Attack

    NASA Technical Reports Server (NTRS)

    Schoenenberger, Mark; Kutty, Prasad; Queen, Eric; Karlgaard, Chris

    2014-01-01

    The Mars Science Laboratory entry capsule is used as an example to demonstrate how a blunt body of revolution must be treated as asymmetric in some respects when flying at a non-zero trim angle of attack. A brief description of the axisymmetric moment equations are provided before solving a system of equations describing the lateral-directional moment equations for a blunt body trimming at an angle of attack. Simplifying assumptions are made which allow the solution to the equations to be rearranged to relate the roll and yaw stability with sideslip angle to the frequency of oscillation of the vehicle body rates. The equations show that for a blunt body the roll and yaw rates are in phase and proportional to each other. The ratio of the rates is determined by the static stability coefficients and mass properties about those axes. A trajectory simulation is used to validate the static yaw stability parameter identification equation and a simple method of identifying the oscillation frequency from the body rates. The approach is shown to successfully extract the modeled yaw stability coefficient along a simulated Mars entry in agreement with data earlier analysis of MSL flight data.

  14. The problem of dizziness and syncope in old age: transient ischemic attacks versus hypersensitive carotid sinus reflex.

    PubMed

    Uesu, C T; Eisenman, J I; Stemmer, E A

    1976-03-01

    In the elderly, a transient ischemic attack (TIA) and a hypersensitive carotid sinus reflex (HCSR) often co-exist and can pose a diagnostic challenge. Seven cases are presented. HCSR is a relative condition; besides increased irritability of the receptor or target organs, susceptibility of the nerve center to ischemia probably is induced by a slow heart rate or low blood pressure in any patient with pre-existing occlusive cerebrovascular disease. Dizziness and syncope of this type represent hemodynamic TIA in contrast to thromboembolic TIA. The carotid sinus massage test is recommended for differentiating the two types of TIA; the treatments differ. At present there is no uniform management that can be applied to either TIA or HCSR routinely. Therefore, treatment should be approached on an individual basis, keeping in mind the different pathophysiologic factors operating in the specific patient.

  15. Numerical study on influence of single control surface on aero elastic behavior of forward-swept wing

    NASA Astrophysics Data System (ADS)

    Wang, Ning; Su, Xinbing; Ma, Binlin; Zhang, Xiaofei

    2017-10-01

    In order to study the influence of elastic forward-swept wing (FSW) with single control surface, the computational fluid dynamics/computational structural dynamics (CFD/CSD) loose coupling static aero elastic numerical calculation method was adopted for numerical simulation. The effects of the elastic FSW with leading- or trailing-edge control surface on aero elastic characteristics were calculated and analysed under the condition of high subsonic speed. The result shows that, the deflection of every single control surface could change the aero elastic characteristics of elastic FSW greatly. Compared with the baseline model, when leading-edge control surface deflected up, under the condition of small angles of attack, the aerodynamic characteristics was poor, but the bending and torsional deformation decreased. Under the condition of moderate angles of attack, the aerodynamic characteristics was improved, but bending and torsional deformation increased; When leading-edge control surface deflected down, the aerodynamic characteristics was improved, the bending and torsional deformation decreased/increased under the condition of small/moderate angles of attack. Compared with the baseline model, when trailing-edge control surface deflected down, the aerodynamic characteristics was improved. The bending and torsional deformation increased under the condition of small angles of attack. The bending deformation increased under the condition of small angles of attack, but torsional deformation decreases under the condition of moderate angles of attack. So, for the elastic FSW, the deflection of trailing-edge control surface play a more important role on the improvement of aerodynamic and elastic deformation characteristics.

  16. Describing a multitrophic plant-herbivore-parasitoid system at four spatial scales

    NASA Astrophysics Data System (ADS)

    Cuautle, M.; Parra-Tabla, V.

    2014-02-01

    Herbivore-parasitoid interactions must be studied using a multitrophic and multispecies approach. The strength and direction of multiple effects through trophic levels may change across spatial scales. In this work, we use the herbaceous plant Ruellia nudiflora, its moth herbivore Tripudia quadrifera, and several parasitoid morphospecies that feed on the herbivore to answer the following questions: Do herbivore and parasitoid attack levels vary depending on the spatial scale considered? With which plant characteristics are the parasitoid and the herbivore associated? Do parasitoid morphospecies vary in the magnitude of their positive indirect effect on plant reproduction? We evaluated three approximations of herbivore and parasitoid abundance (raw numbers, ratios, and attack rates) at four spatial scales: regional (three different regions which differ in terms of abiotic and biotic characteristics); population (i.e. four populations within each region); patch (four 1 m2 plots in each population); and plant level (using a number of plant characteristics). Finally, we determined whether parasitoids have a positive indirect effect on plant reproductive success (seed number). Herbivore and parasitoid numbers differed at three of the spatial scales considered. However, herbivore/fruit ratio and attack rates did not differ at the population level. Parasitoid/host ratio and attack rates did not differ at any scale, although there was a tendency of a higher attack in one region. At the plant level, herbivore and parasitoid abundances were related to different plant traits, varying the importance and the direction (positive or negative) of those traits. In addition, only one parasitoid species (Bracon sp.) had a positive effect on plant fitness saving up to 20% of the seeds in a fruit. These results underline the importance of knowing the scales that are relevant to organisms at different trophic levels and distinguish between the specific effects of species.

  17. What happens in the pith stays in the pith: tissue-localized defense responses facilitate chemical niche differentiation between two spatially separated herbivores.

    PubMed

    Lee, Gisuk; Joo, Youngsung; Kim, Sang-Gyu; Baldwin, Ian T

    2017-11-01

    Herbivore attack is known to elicit systemic defense responses that spread throughout the host plant and influence the performance of other herbivores. While these plant-mediated indirect competitive interactions are well described, and the co-existence of herbivores from different feeding guilds is common, the mechanisms of co-existence are poorly understood. In both field and glasshouse experiments with a native tobacco, Nicotiana attenuata, we found no evidence of negative interactions when plants were simultaneously attacked by two spatially separated herbivores: a leaf chewer Manduca sexta and a stem borer Trichobaris mucorea. T. mucorea attack elicited jasmonic acid (JA) and jasmonoyl-l-isoleucine bursts in the pith of attacked stems similar to those that occur in leaves when M. sexta attacks N. attenuata leaves. Pith chlorogenic acid (CGA) levels increased 1000-fold to levels 6-fold higher than leaf levels after T. mucorea attack; these increases in pith CGA levels, which did not occur in M. sexta-attacked leaves, required JA signaling. With plants silenced in CGA biosynthesis (irHQT plants), CGA, as well as other caffeic acid conjugates, was demonstrated in both glasshouse and field experiments to function as a direct defense protecting piths against T. mucorea attack, but not against leaf chewers or sucking insects. T. mucorea attack does not systemically activate JA signaling in leaves, while M. sexta leaf-attack transiently induces detectable but minor pith JA levels that are dwarfed by local responses. We conclude that tissue-localized defense responses allow tissue-specialized herbivores to share the same host and occupy different chemical defense niches in the same hostplant. © 2017 The Authors The Plant Journal © 2017 John Wiley & Sons Ltd.

  18. Disparities in adult awareness of heart attack warning signs and symptoms--14 states, 2005.

    PubMed

    2008-02-22

    In 2005, approximately 920,000 persons in the United States had a myocardial infarction (i.e., heart attack); in 2004, approximately 157,000 heart attacks were fatal. One study indicated that approximately half of cardiac deaths occur within 1 hour of symptom onset, before patients reach a hospital. Timely access to emergency cardiac care, receipt of advanced treatment, and potential for surviving a heart attack all depend on 1) early recognition of warning signs and symptoms of a heart attack by persons who are having a heart attack and bystanders and 2) immediately calling 9-1-1. Healthy People 2010 includes an objective to increase from 46% to 50% the proportion of adults aged > or =20 years who are aware of the early warning signs and symptoms of a heart attack and the importance of accessing rapid emergency care by calling 9-1-1 (objective 12-2). To update estimates of public awareness of heart attack warning signs and symptoms and knowledge of the importance of calling 9-1-1, CDC analyzed 2005 Behavioral Risk Factor Surveillance System (BRFSS) data from the 14 states that included questions on signs and symptoms of a heart attack. This report describes the results of that analysis, which indicated that although the awareness of certain individual warning signs was as high as 93% (i.e., for shortness of breath), awareness of all five warning signs was 31%, underscoring the need for public health measures to increase public awareness of heart attack warning signs and symptoms. In addition, disparities in awareness were observed by race/ethnicity, sex, and level of education, suggesting that new public health measures should target populations with the lowest levels of awareness.

  19. Effect of Mahanarva fimbriolata (Hemiptera: Cercopidae) Attack on Photosynthetic Parameters of Sugarcane Genotypes of Contrasting Susceptibility.

    PubMed

    Soares, Bruno Oliveira; Chaves, Vinicius de Vicente; Tomaz, Adriano Cirino; Kuki, Kacilda Naomi; Peternelli, Luiz Alexandre; Barbosa, Márcio Henrique Pereira

    2017-12-05

    The aim of this study was to compare the effect of spittlebug Mahanarva fimbriolata Stål (Hemiptera: Cercopidae) on photosynthetic parameters of both a susceptible (SP81-3250) and a resistant (H.Kawandang) sugarcane genotype. In the first assay, the susceptibility level of genotypes to spittlebug was confirmed by comparing damage score and chlorophyll content of the plants. In the second assay, the effect of spittlebug nymphs on photosynthetic characteristics was assessed using the following parameters: Net photosynthetic rate (A), carboxylation efficiency (A/Ci), stomata conductance (gS), transpiration (E), electron transport rate (ETR), maximum quantum yield of Photosystem 2 (PSII) (FV/FM), effective quantum yield (Y(II)), photochemical quenching (Y(NPQ)), and nonphotochemical quenching (Y(NO)). Spittlebug nymphs affected the photosynthetic process of the susceptible genotype SP81-3250 by decreasing the Chl content, ETR, FV/FM, and Y(II). However, this genotype was able to maintain A probably due to its ability to maintain stomata aperture, increase the carboxylation efficiency of Rubisco, and dissipate excess energy through the xanthophyll cycle, as Y(NPQ) increased under the spittlebug attack. On the other hand, the spittlebug did not affect Chl content and FV/FM of the H.Kawandang genotype. Furthermore, H.Kawandang increased A to compensate for the sink demand by the spittlebug by increasing stomatal aperture and carboxylation efficiency and increasing efficiency of the photochemical apparatus in converting light energy into chemical products. We can conclude that the feeding habits of spittlebug nymphs have different impacts on photosynthesis of susceptible and resistant sugarcane genotypes. © The Author(s) 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  20. The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups

    DTIC Science & Technology

    2015-05-21

    Finally, developing countries often have less diversified economies and are more likely to experience a larger effect from a sector -specific attack.27...also affect economic growth. As government spending increases, interest rates can rise, crowding out private investment and consumption. The extent...and private citizens in order to weaken the general confidence in the state. They have focused less on targets of economic significance, as is often

  1. The Inhibitory Effects of Npas4 on Seizures in Pilocarpine-Induced Epileptic Rats

    PubMed Central

    Guo, Jiamei; Yang, Guang; Long, Xianghua; Hu, Rong; Shen, Wenjing; Wang, Xuefeng; Zeng, Kebin

    2014-01-01

    To explore the effects of neuronal Per-Arnt-Sim domain protein 4 (Npas4) on seizures in pilocarpine-induced epileptic rats, Npas4 expression was detected by double-label immunofluorescence, immunohistochemistry, and Western blotting in the brains of pilocarpine-induced epileptic model rats at 6 h, 24 h, 72 h, 7 d, 14 d, 30 d, and 60 d after status epilepticus. Npas4 was localized primarily in the nucleus and in the cytoplasm of neurons. The Npas4 protein levels increased in the acute phase of seizures (between 6 h and 72 h) and decreased in the chronic phases (between 7 d and 60 d) in the rat model. Npas4 expression was knocked down by specific siRNA interference. Then, the animals were treated with pilocarpine, and the effects on seizures were evaluated on the 7th day. The onset latencies of pilocarpine-induced seizures were decreased, while the seizure frequency, duration and attack rate increased in these rats. Our study indicates that Npas4 inhibits seizure attacks in pilocarpine-induced epileptic rats. PMID:25536221

  2. The inhibitory effects of Npas4 on seizures in pilocarpine-induced epileptic rats.

    PubMed

    Wang, Dan; Ren, Min; Guo, Jiamei; Yang, Guang; Long, Xianghua; Hu, Rong; Shen, Wenjing; Wang, Xuefeng; Zeng, Kebin

    2014-01-01

    To explore the effects of neuronal Per-Arnt-Sim domain protein 4 (Npas4) on seizures in pilocarpine-induced epileptic rats, Npas4 expression was detected by double-label immunofluorescence, immunohistochemistry, and Western blotting in the brains of pilocarpine-induced epileptic model rats at 6 h, 24 h, 72 h, 7 d, 14 d, 30 d, and 60 d after status epilepticus. Npas4 was localized primarily in the nucleus and in the cytoplasm of neurons. The Npas4 protein levels increased in the acute phase of seizures (between 6 h and 72 h) and decreased in the chronic phases (between 7 d and 60 d) in the rat model. Npas4 expression was knocked down by specific siRNA interference. Then, the animals were treated with pilocarpine, and the effects on seizures were evaluated on the 7th day. The onset latencies of pilocarpine-induced seizures were decreased, while the seizure frequency, duration and attack rate increased in these rats. Our study indicates that Npas4 inhibits seizure attacks in pilocarpine-induced epileptic rats.

  3. Pandemic influenza A(H1N1) outbreak among a group of medical students who traveled to the Dominican Republic.

    PubMed

    Vilella, Anna; Serrano, Beatriz; Marcos, Maria A; Serradesanferm, Anna; Mensa, Josep; Hayes, Edward; Anton, Andres; Rios, Jose; Pumarola, Tomas; Trilla, Antoni

    2012-01-01

    From the beginning of the influenza pandemic until the time the outbreak described here was detected, 77,201 cases of pandemic influenza A(H1N1) with 332 deaths had been reported worldwide, mostly in the United States and Mexico. All of the cases reported in Spain until then had a recent history of travel to Mexico, the Dominican Republic, or Chile. We describe an outbreak of influenza among medical students who traveled from Spain to the Dominican Republic in June 2009. We collected diagnostic samples and clinical histories from consenting medical students who had traveled to the Dominican Republic and from their household contacts after their return to Spain. Of 113 students on the trip, 62 (55%) developed symptoms; 39 (45%) of 86 students tested had laboratory evidence of influenza A(H1N1) infection. Most students developed symptoms either just before departure from the Dominican Republic or within days of returning to Spain. The estimated secondary attack rate of influenza-like illness among residential contacts of ill students after return to Spain was 2.1%. The attack rate of influenza A(H1N1) can vary widely depending on the circumstances of exposure. We report a high attack rate among a group of traveling medical students but a much lower secondary attack rate among their contacts after return from the trip. These findings may aid the development of recommendations to prevent influenza. © 2011 International Society of Travel Medicine.

  4. Application of Desalination with CFRP Composite Electrode to Concrete Deteriorated by Chloride Attack

    NASA Astrophysics Data System (ADS)

    Yamaguchi, Keisuke; Ueda, Takao; Nanasawa, Akira

    As a new rehabilitation technique for recovery both of loading ability and durability of concrete structures deteriorated by chloride attack, desalination (electrochemical chloride removal technique from concrete) using CFRP composite electrode bonding to concrete has been developed. In this study, basic application was tried using small RC specimens, and also application to the large-scale RC beams deteriorated by the chloride attack through the long-term exposure in the outdoors was investigated. As the result of bending test of treated specimens, the decrease of strengthening effect with the electrochemical treatment was observed in the case of small specimens using low absorption rate resin for bonding, on the other hand, in the case of large-scale RC beam using 20% absorption rate resin for bonding CFRP composite electrode, enough strengthening effect was obtained by the bending failure of RC beam with the fracture of CFRP board.

  5. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  6. Forebody tangential blowing for control at high angles of attack

    NASA Technical Reports Server (NTRS)

    Kroo, I.; Rock, S.; Roberts, L.

    1991-01-01

    A feasibility study to determine if the use of tangential leading edge blowing over the forebody could produce effective and practical control of the F-18 HARV aircraft at high angles of attack was conducted. A simplified model of the F-18 configuration using a vortex-lattice model was developed to obtain a better understanding of basic aerodynamic coupling effects and the influence of forebody circulation on lifting surface behavior. The effect of tangential blowing was estimated using existing wind tunnel data on normal forebody blowing and analytical studies of tangential blowing over conical forebodies. Incorporation of forebody blowing into the flight control system was investigated by adding this additional yaw control and sideforce generating actuator into the existing F-18 HARV simulation model. A control law was synthesized using LQG design methods that would schedule blowing rates as a function of vehicle sideslip, angle of attack, and roll and yaw rates.

  7. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  8. Magnus effects at high angles of attack and critical Reynolds numbers

    NASA Technical Reports Server (NTRS)

    Seginer, A.; Ringel, M.

    1983-01-01

    The Magnus force and moment experienced by a yawed, spinning cylinder were studied experimentally in low speed and subsonic flows at high angles of attack and critical Reynolds numbers. Flow-field visualization aided in describing a flow model that divides the Magnus phenomenon into a subcritical region, where reverse Magnus loads are experienced, and a supercritical region where these loads are not encountered. The roles of the spin rate, angle of attack, and crossflow Reynolds number in determining the boundaries of the subcritical region and the variations of the Magnus loads were studied.

  9. Impingement of Water Droplets on NACA 65A004 Airfoil at 8 deg Angle of Attack

    NASA Technical Reports Server (NTRS)

    Brun, R. J.; Gallagher, H. M.; Vogt, D. E.

    1954-01-01

    The trajectories of droplets in the air flowing past an NACA 65AO04 airfoil at an angle of attack of 8 deg were determined.. The amount of water in droplet form impinging on the airfoil, the area of droplet impingement, and the rate of droplet impingement per unit area on the airfoil surface were calculated from the trajectories and presented to cover a large range of flight and atmospheric conditions. These impingement characteristics are compared briefly with those previously reported for the same airfoil at an angle of attack of 4 deg.

  10. Poor sleep linked to increased risk of heart attack and stroke.

    PubMed

    2017-04-19

    Insomnia is associated with an increased risk of heart attack and stroke, according to a study in China. Researchers carried out a meta-analysis of 15 cohort studies to assess the association between insomnia symptoms and incidence or death from cardiovascular disease and stroke.

  11. Robustness of networks formed from interdependent correlated networks under intentional attacks

    NASA Astrophysics Data System (ADS)

    Liu, Long; Meng, Ke; Dong, Zhaoyang

    2018-02-01

    We study the problem of intentional attacks targeting to interdependent networks generated with known degree distribution (in-degree oriented model) or distribution of interlinks (out-degree oriented model). In both models, each node's degree is correlated with the number of its links that connect to the other network. For both models, varying the correlation coefficient has a significant effect on the robustness of a system undergoing random attacks or attacks targeting nodes with low degree. For a system with an assortative relationship between in-degree and out-degree, reducing the broadness of networks' degree distributions can increase the resistance of systems against intentional attacks.

  12. Volatile and within-needle terpene changes to Douglas-fir trees associated with Douglas-fir beetle (Coleoptera: Curculionidae) attack

    Treesearch

    A. D. Giunta; Justin Runyon; M. J. Jenkins; M. Teich

    2016-01-01

    Mass attack by tree-killing bark beetles (Curculionidae: Scolytinae) brings about large chemical changes in host trees that can have important ecological consequences. For example, mountain pine beetle (Dendroctonus ponderosae Hopkins) attack increases emission of terpenes by lodgepole pine (Pinus contorta Dougl. ex Loud.), affecting foliage flammability with...

  13. Finite Energy and Bounded Attacks on Control System Sensor Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less

  14. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  15. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  16. Framework and methodology for supply chain lifecycle analytics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamlet, Jason; Eames, Brandon K.; Kao, Gio K.

    The various technologies presented herein relate to pertaining to identifying and mitigating risks and attacks on a supply chain. A computer-implemented representation of a supply chain is generated comprising nodes (locations) and edges (objects, information). Risk to attack and different attack vectors can be defined for the various nodes and edges, and further, based upon the risks and attacks, (difficulty, consequence) pairs can be determined. One or more mitigations can be generated to increase a difficulty of attack and/or reduce consequence of an attack. The one or more mitigations can be constrained, e.g., by cost, time, etc., to facilitate determinationmore » of how feasible a respective mitigation is to implement with regard to finances available, duration to implement, etc. A context-free grammar can be utilized to identify one or more attacks in the supply chain. Further, the risks can undergo a ranking to enable mitigation priority to be determined.« less

  17. Wind-tunnel investigation of the flow correction for a model-mounted angle of attack sensor at angles of attack from -10 deg to 110 deg. [Langley 12-foot low speed wind tunnel test

    NASA Technical Reports Server (NTRS)

    Moul, T. M.

    1979-01-01

    A preliminary wind tunnel investigation was undertaken to determine the flow correction for a vane angle of attack sensor over an angle of attack range from -10 deg to 110 deg. The sensor was mounted ahead of the wing on a 1/5 scale model of a general aviation airplane. It was shown that the flow correction was substantial, reaching about 15 deg at an angle of attack of 90 deg. The flow correction was found to increase as the sensor was moved closer to the wing or closer to the fuselage. The experimentally determined slope of the flow correction versus the measured angle of attack below the stall angle of attack agreed closely with the slope of flight data from a similar full scale airplane.

  18. Modeling and Managing Risk in Billing Infrastructures

    NASA Astrophysics Data System (ADS)

    Baiardi, Fabrizio; Telmon, Claudio; Sgandurra, Daniele

    This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded - thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components.

  19. Mental health service use among American Red Cross disaster workers responding to the September 11, 2001 U.S. terrorist attacks.

    PubMed

    Elhai, Jon D; Jacobs, Gerard A; Kashdan, Todd B; DeJong, Gary L; Meyer, David L; Frueh, B Christopher

    2006-06-30

    In this article, we explored 1) the extent of mental health (MH) service use by American Red Cross disaster relief workers, both before (lifetime) and 1 year after the September 11, 2001 terrorist attacks, and 2) demographic, disaster and MH variables predicting (1-year) post-September 11 MH service use in this population. A sample of 3015 Red Cross disaster workers was surveyed 1 year after the attacks, regarding demographic characteristics, MH service use before and since the attacks, and posttraumatic stress disorder (PTSD) symptoms. Findings revealed that while 13.5% used MH services before the attacks, 10.7% used services after. Variables increasing the likelihood of MH service use after the attacks included the following: no previous MH treatment, younger age, being divorced/widowed, and higher PTSD intrusion or hyperarousal symptoms. Findings support other recent research on MH service use after the September 11 attacks.

  20. An analysis of influenza outbreaks in institutions and enclosed societies.

    PubMed

    Finnie, T J R; Copley, V R; Hall, I M; Leach, S

    2014-01-01

    This paper considers the reported attack ratio arising from outbreaks of influenza in enclosed societies. These societies are isolated from the wider community and have greater opportunities for contact between members which would aid the spread of disease. While the particular kind of society (prison, care home, school, barracks, etc.) was not a significant factor in an adjusted model of attack ratio, a person's occupation within the society was. In particular, children and military personnel suffer a greater attack ratio than other occupational types (staff, prisoners, etc.). There was no temporal trend in final attack ratio nor, with the exception of 1918, do pandemic years show abnormal attack ratios. We also observed that as community size increases, the attack ratio undergoes steep nonlinear decline. This statistical analysis draws attention to how the organization of such societies, their size and the occupations of individuals within them affect the final attack ratio.

  1. Regression methods for spatially correlated data: an example using beetle attacks in a seed orchard

    Treesearch

    Preisler Haiganoush; Nancy G. Rappaport; David L. Wood

    1997-01-01

    We present a statistical procedure for studying the simultaneous effects of observed covariates and unmeasured spatial variables on responses of interest. The procedure uses regression type analyses that can be used with existing statistical software packages. An example using the rate of twig beetle attacks on Douglas-fir trees in a seed orchard illustrates the...

  2. Aircrew Training Devices: Fidelity Features.

    DTIC Science & Technology

    1981-01-01

    providing artificial cues for glideslope and lineup . He found that an adaptive strategy for using augmenting cues, where the presence or absence of the...with continuously available sources of augmented information for lineup and glideslope in the simulatot, they performed more poorly on test trials...flown: fighting wing, barrel roll attack, sequential attack, free engagement, aileron roll and loop. Results indicated higher ratings of realism for

  3. Metasystox-R, applied in Mauget injectors, ineffective in protecting individual ponderosa pines from western pine beetles

    Treesearch

    Michael I. Haverty; Patrick J. Shea; John M. Wenz

    1996-01-01

    The effectiveness of registered application rates of the insecticide metasystox-R applied with Mauget tree injectors (INJECT-A-CIDE) was assessed in two strategies: (1) treatment of trees before western pine beetle attack (preventive treatment), and (2) treatment of trees after attack by western pine beetle (remedial treatment) for protection of individual, high-value...

  4. Expanding the Limits of Evidence-Based Medicine: A Discourse Analysis of Cardiac Rehabilitation Clinical Practice Guidelines.

    ERIC Educational Resources Information Center

    Wise, Meg

    Heart attacks are the leading cause of death in the United States, and cardiac rehabilitation, a form of post-MI (myocardial infarction) education, accounts for at most 20% of improved lifestyle behavior that can effectively manage symptoms, delay or prevent subsequent attacks, and lower mortality and morbidity rates. In an attempt to improve…

  5. Studies of the vicarious traumatization of college students by the September 11th attacks: effects of proximity, exposure and connectedness.

    PubMed

    Blanchard, Edward B; Kuhn, Eric; Rowell, Dianna L; Hickling, Edward J; Wittrock, David; Rogers, Rebecca L; Johnson, Michelle R; Steckler, Debra C

    2004-02-01

    From mid-October 2001 through the end of November 2001, we collected fairly large sets of questionnaires from undergraduates at three public universities (Albany, NY, n = 507, Augusta, GA, n = 336, Fargo, ND, n = 526 ) to assess rate of acute stress disorder (ASD) and level of ASD symptoms following the September 11th attacks, rate of current posttraumatic stress disorder (PTSD) and level of PTSD symptoms, and current level of depressive symptoms resulting from the September 11th attacks. We also gathered information on exposure to media coverage of the attacks, connectedness to the World Trade Center (WTC) and personnel there, and degree of engagement in reparative acts such as giving blood, attending vigils. We found higher levels of ASD, ASD symptoms, PTSD and PTSD symptoms as a function of geographical proximity to New York City (and within the Albany site, proximity of students' homes) and gender. Exposure (hours of TV watched) was a predictor in some instances as was connectedness to WTC victims. ASD symptoms were the strongest predictor of subsequent PTSD symptoms. Path models accounted for over 60% of the variance in PTSD symptoms.

  6. The effect of residual water on antacid properties of sucralfate gel dried by microwaves.

    PubMed

    Gainotti, Alessandro; Losi, Elena; Colombo, Paolo; Santi, Patrizia; Sonvico, Fabio; Baroni, Daniela; Massimo, Gina; Colombo, Gaia; Del Gaudio, Pasquale

    2006-01-20

    The aim of this work was to study the acid neutralization characteristics of microwave-dried sucralfate gel in relation to the water content and physical structure of the substance. Several dried sucralfate gels were compared with humid sucralfate gel and sucralfate nongel powder in terms of neutralization rate and buffering capacity. Humid sucralfate gel and microwave-dried gel exhibited antacid effectiveness. In particular, the neutralization rate of dried gel powders was inversely related to the water content: as the water content of dried powders decreased, the acid reaction rate linearly increased. The relationship was due to the different morphology of dried sucralfate gels. In fact, the porosity of the dried samples increased with the water reduction. However, the acid neutralization equivalent revealed that the dried sucralfate gel became more resistant to acid attack in the case of water content below 42%. Then, the microwave drying procedure had the opposite effect on the reactivity of the aluminum hydroxide component of dried sucralfate gel powders, since the rate of the reaction increased whereas the buffering capacity decreased as the amount of water was reduced.

  7. The effect of residual water on antacid properties of sucralfate gel dried by microwaves.

    PubMed

    Gainotti, Alessandro; Losi, Elena; Colombo, Paolo; Santi, Patrizia; Sonvico, Fabio; Baroni, Daniela; Massimo, Gina; Colombo, Gaia; Del Gaudio, Pasquale

    2006-03-01

    The aim of this work was to study the acid neutralization characteristics of microwave-dried sucralfate gel in relation to the water content and physical structure of the substance. Several dried sucralfate gels were compared with humid sucralfate gel and sucralfate nongel powder in terms of neutralization rate and buffering capacity. Humid sucralfate gel and microwave-dried gel exhibited antacid effectiveness. In particular, the neutralization rate of dried gel powders was inversely related to the water content: as the water content of dried powders decreased, the acid reaction rate linearly increased. The relationship was due to the different morphology of dried sucralfate gels. In fact, the porosity of the dried samples increased with the water reduction. However, the acid neutralization equivalent revealed that the dried sucralfate gel became more resistant to acid attack in the case of water content below 42%. Then, the microwave drying procedure had the opposite effect on the reactivity of the aluminum hydroxide component of dried sucralfate gel powders, since the rate of the reaction increased whereas the buffering capacity decreased as the amount of water was reduced.

  8. Spatio-Temporal Synchrony of Influenza in Cities across Israel: The “Israel Is One City” Hypothesis

    PubMed Central

    Barnea, Oren; Huppert, Amit; Katriel, Guy; Stone, Lewi

    2014-01-01

    We analysed an 11-year dataset (1998–2009) of Influenza-Like Illness (ILI) that was based on surveillance of ∽23% of Israel's population. We examined whether the level of synchrony of ILI epidemics in Israel's 12 largest cities is high enough to view Israel as a single epidemiological unit. Two methods were developed to assess the synchrony: (1) City-specific attack rates were fitted to a simple model in order to estimate the temporal differences in attack rates and spatial differences in reporting rates of ILI. The model showed good fit to the data (R2  =  0.76) and revealed considerable differences in reporting rates of ILI in different cities (up to a factor of 2.2). (2) A statistical test was developed to examine the null hypothesis (H0) that ILI incidence curves in two cities are essentially identical, and was tested using ILI data. Upon examining all possible pairs of incidence curves, 77.4% of pairs were found not to be different (H0 was not rejected). It was concluded that all cities generally have the same attack rate and follow the same epidemic curve each season, although the attack rate changes from season to season, providing strong support for the “Israel is one city” hypothesis. The cities which were the most out of synchronization were Bnei Brak, Beersheba and Haifa, the latter two being geographically remote from all other cities in the dataset and the former geographically very close to several other cities but socially separate due to being populated almost exclusively by ultra-orthodox Jews. Further evidence of assortative mixing of the ultra-orthodox population can be found in the 2001–2002 season, when ultra-orthodox cities and neighborhoods showed distinctly different incidence curves compared to the general population. PMID:24622820

  9. Chemical modification : a non-toxic approach to wood preservation

    Treesearch

    Roger M. Rowell

    2005-01-01

    Reaction of wood with anhydrides, isocyanates, and epoxides reduces the moisture content of the cell wall and increases the resistance of the modified wood to attack by fungi. As the level of bonded chemical increases. the cell wall equilibrium moisture content decreases and the resistance to attack by white-and brown-rot fungi increases. There is a direct relationship...

  10. Knowledge of signs and symptoms of heart attack and stroke among Singapore residents.

    PubMed

    Quah, Joy Li Juan; Yap, Susan; Cheah, Si Oon; Ng, Yih Yng; Goh, E Shaun; Doctor, Nausheen; Leong, Benjamin Sieu-Hon; Tiah, Ling; Chia, Michael Yih Chong; Ong, Marcus Eng Hock

    2014-01-01

    To determine the level of knowledge of signs and symptoms of heart attack and stroke in Singapore resident population, in comparison to the global community. A population based, random sample of 7,840 household addresses was selected from a validated national sampling frame. Each participant was asked eight questions on signs and symptoms of heart attack and 10 questions on stroke. The response rate was 65.2% with 4,192 respondents. The level of knowledge for preselected, common signs and symptoms of heart attack and stroke was 57.8% and 57.1%, respectively. The respondents scored a mean of 5.0 (SD 2.4) out of 8 for heart attack, while they scored a mean of 6.8 (SD 2.9) out of 10 for stroke. Respondents who were ≥ 50 years, with lower educational level, and unemployed/retired had the least knowledge about both conditions. The level of knowledge of signs and symptoms of heart attack and stroke in Singapore is comparable to USA and Canada. We found a comparable knowledge of stroke and heart attack signs and symptoms in the community to countries within the same economic, educational, and healthcare strata. However older persons, those with lower educational level and those who are unemployed/retired, require more public health education efforts.

  11. Geographic Wormhole Detection in Wireless Sensor Networks

    PubMed Central

    Sookhak, Mehdi; Akhundzada, Adnan; Sookhak, Alireza; Eslaminejad, Mohammadreza; Gani, Abdullah; Khurram Khan, Muhammad; Li, Xiong; Wang, Xiaomin

    2015-01-01

    Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP). The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS), Authentication of Nodes Scheme (ANS), Wormhole Detection uses Hound Packet (WHOP), and Wormhole Detection with Neighborhood Information (WDI) using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR) in the geographic routing protocols. PMID:25602616

  12. Identification of aerodynamic models for maneuvering aircraft

    NASA Technical Reports Server (NTRS)

    Chin, Suei; Lan, C. Edward

    1990-01-01

    Due to the requirement of increased performance and maneuverability, the flight envelope of a modern fighter is frequently extended to the high angle-of-attack regime. Vehicles maneuvering in this regime are subjected to nonlinear aerodynamic loads. The nonlinearities are due mainly to three-dimensional separated flow and concentrated vortex flow that occur at large angles of attack. Accurate prediction of these nonlinear airloads is of great importance in the analysis of a vehicle's flight motion and in the design of its flight control system. A satisfactory evaluation of the performance envelope of the aircraft may require a large number of coupled computations, one for each change in initial conditions. To avoid the disadvantage of solving the coupled flow-field equations and aircraft's motion equations, an alternate approach is to use a mathematical modeling to describe the steady and unsteady aerodynamics for the aircraft equations of motion. Aerodynamic forces and moments acting on a rapidly maneuvering aircraft are, in general, nonlinear functions of motion variables, their time rate of change, and the history of maneuvering. A numerical method was developed to analyze the nonlinear and time-dependent aerodynamic response to establish the generalized indicial function in terms of motion variables and their time rates of change.

  13. Aerodynamic Characteristics of Several Hypersonic Boost-Glide-Type Configurations at Mach Numbers from 2.30 to 4.63

    NASA Technical Reports Server (NTRS)

    Graves, Ernald B.; Carmel, Melvin M.

    1968-01-01

    An investigation has been conducted at Mach numbers from 2.30 to 4.63 to determine the static aerodynamic characteristics of several configurations designed for flight at hypersonic Mach numbers. Two all-wing and three wing-body configurations were tested through an angle-of-attack range from about -4 degrees to 33 degrees and an angle-of-sideslip range from about -4 degrees to 8 degrees at a Reynolds number of 3 times 10 (sup 6) per foot (9.84 times 10 (sup 6) per meter). The results of the investigation indicated that the wing-body configurations produced higher values of maximum lift-drag ratio than those produced by the all-wing models. The high wing-body configurations tend to have a self-trimming capability as opposed to that for the low wing-body configurations. Each of the configurations produced a positive dihedral effect that increased with increasing angle of attack and decreased with increasing Mach number. The high wing-body models produced decreasing values of directional stability with increase in angle of attack, whereas the low wing-body models provided increasing values of directional stability with increase in angle of attack.

  14. Efficacy and safety of an intravenous C1-inhibitor concentrate for long-term prophylaxis in hereditary angioedema

    PubMed Central

    Craig, Timothy; Shapiro, Ralph; Vegh, Arthur; Baker, James W.; Bernstein, Jonathan A.; Busse, Paula; Magerl, Markus; Martinez-Saguer, Inmaculada; Riedl, Marc A.; Lumry, William; Williams-Herman, Debora; Edelman, Jonathan; Feuersenger, Henrike; Machnig, Thomas

    2017-01-01

    Background: The plasma-derived, pasteurized, nanofiltered C1-inhibitor concentrate (pnfC1-INH) is approved in the United States as an intravenous (IV) on-demand treatment for hereditary angioedema (HAE) attacks, and, in Europe, as on demand and short-term prophylaxis. Objective: This analysis evaluated Berinert Patient Registry data regarding IV pnfC1-INH used as long-term prophylaxis (LTP). Methods: The international registry (2010–2014) collected prospective and retrospective usage, dosing, and safety data on individuals who used pnfC1-INH for any reason. Results: The registry included data on 47 subjects (80.9% female subjects; mean age, 44.8 years), which reflected 4082 infusions categorized as LTP and a total of 430.2 months of LTP administration. The median absolute dose of pnfC1-INH given for LTP was 1000 IU (range, 500–3000 IU), with a median time interval between infusion and a subsequent pnfC1-INH–treated attack of 72.0 hours (range, 0.0–166.4 hours). Fifteen subjects (31.9%) had no pnfC1-INH–treated HAE attacks within 7 days after pnfC1-INH infusion for LTP; 32 subjects (68.1%) experienced 246 attacks, with rates of 0.06 attacks per infusion and 0.57 attacks per month. A total of 81 adverse events were reported in 16 subjects (34.0%) (0.02 events per infusion; 0.19 events per month); only 3 adverse events were considered related to pnfC1-INH (noncardiac chest pain, postinfusion headache, deep vein thrombosis in a subject with an IV port). Conclusion: In this international registry, IV pnf-C1-INH given as LTP for HAE was safe and efficacious, with a low rate of attacks that required pnfC1-INH treatment, particularly within the first several days after LTP administration. PMID:28381322

  15. Behavioral Strategies of Phorid Parasitoids and Responses of Their Hosts, the Leaf-Cutting Ants

    PubMed Central

    Elizalde, Luciana; Folgarait, Patricia Julia

    2012-01-01

    Host-searching and oviposition behaviors of parasitoids, and defensive responses of the hosts, are fundamental in shaping the ecology of host-parasitoid interactions. In order to uncover key behavioral features for the little known interactions between phorid parasitoids (Diptera: Phoridae) and their leaf-cutting ant hosts (Formicidae: Attini), host-related behavioral strategies (i.e., host searching and oviposition) for 13 phorid species, and host defensive responses (i.e., hitchhikers and particular body postures) for 11 ant species, were studied. Data was collected at 14 localities, one of them characterized by its high species richness for this host-parasitoid system. Phorid species showed both great variation and specificity in attacking behaviors. Some chose their hosts using either an ambush or an actively searching strategy, while some species attacked ants on different body parts, and specialized on ants performing different tasks, such as when ants were foraging, removing wastes to refuse piles, or repairing the nest. Combining all the behaviors recorded, most phorid species differed in performance in at least one, making it possible to recognize species in the field through their behavior. Phorid species that attacked hosts with greater activity levels showed overall higher attack rates, although there was no significant correlation between attack rates by most phorid species and ant activity outside the nest while parasitoids were attacking. The presence of phorids was a significant determinant for the presence of defensive behaviors by the ants. Although ant species varied in the incidence levels of these defensive behaviors, most ant species reacted against different phorids by utilizing similar behaviors, in contrast to what parasitoids do. General features of the observed phorid-ant interactions were parasitoid specialization and corresponding high interspecific variation in their behaviors, while their hosts showed generalized responses to attacks with high intraspecific variation. Behavioral patterns as well as specific features of these ant-parasitoid interactions are described, and their ecological importance discussed. PMID:23448343

  16. Evaluation of avoralstat, an oral kallikrein inhibitor, in a Phase 3 hereditary angioedema prophylaxis trial: the OPUS-2 study.

    PubMed

    Riedl, Marc A; Aygören-Pürsün, Emel; Baker, James; Farkas, Henriette; Anderson, John; Bernstein, Jonathan A; Bouillet, Laurence; Busse, Paula; Manning, Michael; Magerl, Markus; Gompels, Mark; Huissoon, Aarnoud P; Longhurst, Hillary; Lumry, William; Ritchie, Bruce; Shapiro, Ralph; Soteres, Daniel; Banerji, Aleena; Cancian, Mauro; Johnston, Douglas T; Craig, Timothy J; Launay, David; Li, H Henry; Liebhaber, Myron; Nickel, Timothy; Offenberger, Jacob; Rae, William; Schrijvers, Rik; Triggiani, Massimo; Wedner, H James; Dobo, Sylvia; Cornpropst, Melanie; Clemons, Desiree; Fang, Lei; Collis, Phil; Sheridan, William P; Maurer, Marcus

    2018-04-24

    Effective inhibition of plasma kallikrein may have significant benefits for patients with hereditary angioedema due to deficiency of C1 inhibitor (C1-INH-HAE) by reducing the frequency of angioedema attacks. Avoralstat is a small molecule inhibitor of plasma kallikrein. This study (OPuS-2) evaluated the efficacy and safety of prophylactic avoralstat 300 or 500 mg compared with placebo. OPuS-2 was a Phase 3, multicenter, randomized, double-blind, placebo-controlled, parallel-group study. Subjects were administered avoralstat 300 mg, avoralstat 500 mg, or placebo orally 3 times per day for 12 weeks. The primary efficacy endpoint was the angioedema attack rate based on adjudicator-confirmed attacks. A total of 110 subjects were randomized and dosed. The least squares (LS) mean attack rates per week were 0.589, 0.675, and 0.593 for subjects receiving avoralstat 500 mg, avoralstat 300 mg, and placebo, respectively. Overall, 1 subject in each of the avoralstat groups and no subjects in the placebo group were attack-free during the 84-day treatment period. The LS mean duration of all confirmed attacks was 25.4, 29.4 and 31.4 hours for the avoralstat 500 mg, avoralstat 300 mg and placebo groups respectively. Using the Angioedema Quality of Life Questionnaire (AE-QoL), improved QoL was observed for the avoralstat 500 mg group compared with placebo. Avoralstat was generally safe and well tolerated. Although this study did not demonstrate efficacy of avoralstat in preventing angioedema attacks in C1-INH-HAE, it provided evidence of shortened angioedema episodes and improved QoL in the avoralstat 500 mg treatment group compared with placebo. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  17. A method for estimating the rolling moment due to spin rate for arbitrary planform wings

    NASA Technical Reports Server (NTRS)

    Poppen, W. A., Jr.

    1985-01-01

    The application of aerodynamic theory for estimating the force and moments acting upon spinning airplanes is of interest. For example, strip theory has been used to generate estimates of the aerodynamic characteristics as a function of spin rate for wing-dominated configurations for angles of attack up to 90 degrees. This work, which had been limited to constant chord wings, is extended here to wings comprised of tapered segments. Comparison of the analytical predictions with rotary balance wind tunnel results shows that large discrepancies remain, particularly for those angles-of-attack greater than 40 degrees.

  18. The incidence of plastic ingestion by fishes: from the prey's perspective.

    PubMed

    Carson, Henry S

    2013-09-15

    One of the primary threats to ocean ecosystems from plastic pollution is ingestion by marine organisms. Well-documented in seabirds, turtles, and marine mammals, ingestion by fish and sharks has received less attention until recently. We suggest that fishes of a variety of sizes attack drifting plastic with high frequency, as evidenced by the apparent bite marks commonly left behind. We examined 5518 plastic items from random plots on Kamilo Point, Hawai'i Island, and found 15.8% to have obvious signs of attack. Extrapolated to the entire amount of debris removed from the 15 km area, over 1.3 tons of plastic is attacked each year. Items with a bottle shape, or those blue or yellow in color, were attacked with a higher frequency. The triangular edges or punctures left by teeth ranged from 1 to 20 mm in width suggesting a variety of species attack plastic items. More research is needed to document the specific fishes and rates of plastic ingestion. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. A robust trust establishment scheme for wireless sensor networks.

    PubMed

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2015-03-23

    Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  20. Review of attacks on health care facilities in six conflicts of the past three decades.

    PubMed

    Briody, Carolyn; Rubenstein, Leonard; Roberts, Les; Penney, Eamon; Keenan, William; Horbar, Jeffrey

    2018-01-01

    In the ongoing conflicts of Syria and Yemen, there have been widespread reports of attacks on health care facilities and personnel. Tabulated evidence does suggest hospital bombings in Syria and Yemen are far higher than reported in other conflicts but it is unclear if this is a reporting artefact. This article examines attacks on health care facilities in conflicts in six middle- to high- income countries that have occurred over the past three decades to try and determine if attacks have become more common, and to assess the different methods used to collect data on attacks. The six conflicts reviewed are Yemen (2015-Present), Syria (2011- Present), Iraq (2003-2011), Chechnya (1999-2000), Kosovo (1998-1999), and Bosnia and Herzegovina (1992-1995). We attempted to get the highest quality source(s) with summary data of the number of facilities attacked for each of the conflicts. The only conflict that did not have summary data was the conflict in Iraq. In this case, we tallied individual reported events of attacks on health care. Physicians for Human Rights (PHR) reported attacks on 315 facilities (4.38 per month) in Syria over a 7-year period, while the Monitoring Violence against Health Care (MVH) tool launched later by the World Health Organization (WHO) Turkey Health Cluster reported attacks on 135 facilities (9.64 per month) over a 14-month period. Yemen had a reported 93 attacks (4.65 per month), Iraq 12 (0.12 per month), Chechnya > 24 (2.4 per month), Kosovo > 100 (6.67 per month), and Bosnia 21 (0.41 per month). Methodologies to collect data, and definitions of both facilities and attacks varied widely across sources. The number of reported facilities attacked is by far the greatest in Syria, suggesting that this phenomenon has increased compared to earlier conflicts. However, data on attacks of facilities was incomplete for all of the conflicts examined, methodologies varied widely, and in some cases, attacks were not defined at all. A global, standardized system that allows multiple reporting routes with different levels of confirmation, as seen in Syria, would likely allow for a more reliable and reproducible documentation system, and potentially, an increase in accountability.

  1. Rizatriptan versus rizatriptan plus rofecoxib versus rizatriptan plus tolfenamic acid in the acute treatment of migraine

    PubMed Central

    Krymchantowski, Abouch Valenty; Bigal, Marcelo Eduardo

    2004-01-01

    Background Rizatriptan is an effective and fast acting drug for the acute treatment of migraine. Some nonsteroidal anti-inflammatory drugs (NSAID) have also demonstrated efficacy in treating migraine attacks. There is evidence that the combination of a triptan and a NSAID decreases migraine recurrence in clinical practice. The primary aim of this randomized open label study was to assess the recurrence rates in migraine sufferers acutely treated with rizatriptan (RI) alone vs. rizatriptan plus a COX-2 enzyme inhibitor (rofecoxib, RO) vs. rizatriptan plus a traditional NSAID (tolfenamic acid, TO). We were also interested in comparing the efficacy rates within these three groups. Methods We assessed 45 patients from a headache clinic in Rio de Janeiro (35 women and 10 men, ages 18 to 65 years, mean 37 years). Patients with IHS migraine were randomized to one out of 3 groups, where they had to treat 6 consecutive moderate or severe attacks in counterbalanced order. In group 1, patients treated the first two attacks with 10 mg RI, the third and fourth attacks with RI + 50 mg RO and the last attacks with RI + 200 mg of TA. In group 2, we began with RI + TA, followed by RI, and RI + RO. Group 3 treated in the following order: RI + RO, RI + TA, RI alone. The presence of headache, nausea and photophobia at 1, 2 and 4 hours, as well as recurrence and side effects were compared. Results A total of 33 patients finished the study, treating 184 attacks. The pain-free rates at 1 hour were: RI: 15.5%; RI + RO: 22.6%; RI + TA: 20.3%(NS). Pain-free rates at 2 h were: RI: 37.9%; RI + RO: 62.9%, and RI + TA: 40.6% (p = 0.008 for RI vs. RI + RO; p = 0.007 for RI + RO vs. RI + TA, NS for RI vs RI + TA). At 4 h, pain-free rates were: RI: 69%; RI + RO: 82.3%; RI + TA: 78.1% (NS for all comparisons). The combination of RI + RO was superior to RI and to RI + TA in regard of the absense of nausea and photophobia at 4 hours. Recurrence (after being pain-free at 2 h) was observed in 50% of patients treated with RI, in 15,4% of those treated with RI + RO, and in 7,7% of those treated with RI + TA. Conclusions Despite the methodological limitations of this study, the combination of RI and RO revealed a higher response rate at 2 hours. Recurrence was also clearly decreased with both combinations in relation to the use of RI alone. Controlled studies are necessary to provide additional evidence. PMID:15222892

  2. Micellar modification of drug stability: analysis of the effect of hexadecyltrimethylammonium halides on the rate of degradation of cephaclor.

    PubMed

    Oliveira, A G; Cuccovia, I M; Chaimovich, H

    1990-01-01

    The intra- and intermolecular rates of degradation of cephaclor were determined with and without hexadecyltrimethylammonium bromide (CTABr). Micellar-derived spectral shifts were used to measure the association of the ionic forms as well as to determine the effect of CTABr on the apparent acid dissociation constant of the antibiotic. The rate of degradation of cephaclor increased with detergent and was salt sensitive. Micellar effects were analyzed quantitatively within the framework of the pseudophase ion exchange model. All experimental data were fitted to this model which was used to predict the combined effects of pH and detergent concentration. Micelles increased the rate of OH- attack on cephaclor; most of the effect was due to the concentration of reagents in the micellar pseudophase. The intramolecular degradation was catalyzed 25-fold by micelles, and a working hypothesis to rationalize this effect is proposed. The results demonstrate that quantitative analysis can be utilized to assess and predict effects of detergents on drug stability.

  3. Cybersecurity for distributed energy resources and smart inverters

    DOE PAGES

    Qi, Junjian; Hahn, Adam; Lu, Xiaonan; ...

    2016-12-01

    The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less

  4. Cybersecurity for distributed energy resources and smart inverters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Qi, Junjian; Hahn, Adam; Lu, Xiaonan

    The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less

  5. Treatment of intractable chronic cluster headache by occipital nerve stimulation: a cohort of 51 patients.

    PubMed

    Miller, S; Watkins, L; Matharu, M

    2017-02-01

    Chronic cluster headache is a rare, highly disabling primary headache condition. When medically intractable, occipital nerve stimulation can offer effective treatment. Open-label series have provided data on small cohorts only. We analyzed 51 subjects to evaluate the long-term outcomes of highly intractable chronic cluster headache with occipital nerve stimulation. Patients with intractable chronic cluster headache were implanted with occipital nerve stimulators during the period 2007-2014. The primary endpoint was improvement in daily attack frequency. Secondary endpoints included attack severity, attack duration, quality-of-life measures, headache disability scores and adverse events. We studied 51 patients [35 males; mean age at implant 47.78 (range 31-70) years; mean follow-up 39.17 (range 2-81) months]. Nineteen patients had other chronic headache types in addition in chronic cluster headache. At final follow-up, there was a 46.1% improvement in attack frequency (P < 0001) across all patients, 49.5% (P < 0.001) in those with cluster headache alone and 40.3% (P = 0.036) in those with multiple phenotypes. There were no significant differences in response in those with or without multiple headache types. The overall response rate (defined as at least a 50% improvement in attack frequency) was 52.9%. Significant reductions were also seen in attack duration and severity. Improvements were noted in headache disability scores and quality-of-life measures. Triptan use of responders dropped by 62.56%, resulting in significant cost savings. Adverse event rates were highly favorable. Occipital nerve stimulation appears to be a safe and efficacious treatment for highly intractable chronic cluster headache even after a mean follow-up of over 3 years. © 2016 EAN.

  6. Animal Violence Demystified

    PubMed Central

    Natarajan, Deepa; Caramaschi, Doretta

    2009-01-01

    Violence has been observed in humans and animals alike, indicating its evolutionary/biological significance. However, violence in animals has often been confounded with functional forms of aggressive behavior. Currently, violence in animals is identified primarily as either a quantitative behavior (an escalated, pathological and abnormal form of aggression characterized primarily by short attack latencies, and prolonged and frequent harm-oriented conflict behaviors) or a qualitative one (characterized by attack bites aimed at vulnerable parts of the opponent's body and context independent attacks regardless of the environment or the sex and type of the opponent). Identification of an operational definition for violence thus not only helps in understanding its potential differences from adaptive forms of aggression but also in the selection of appropriate animal models for both. We address this issue theoretically by drawing parallels from research on aggression and appeasement in humans and other animals. We also provide empirical evidences for violence in mice selected for high aggression by comparing our findings with other currently available potentially violent rodent models. The following violence-specific features namely (1) Display of low levels of pre-escalatory/ritualistic behaviors. (2) Immediate and escalated offense durations with low withdrawal rates despite the opponent's submissive supine and crouching/defeat postures. (3) Context independent indiscriminate attacks aimed at familiar/unfamiliar females, anaesthetized males and opponents and in neutral environments. (4) Orientation of attack-bites toward vulnerable body parts of the opponent resulting in severe wounding. (5) Low prefrontal serotonin (5-HT) levels upon repeated aggression. (6) Low basal heart rates and hyporesponsive hypothalamus–pituitary–adrenocortical (HPA) axis were identified uniquely in the short attack latency (SAL) mice suggesting a qualitative difference between violence and adaptive aggression in animals. PMID:20407576

  7. Animal violence demystified.

    PubMed

    Natarajan, Deepa; Caramaschi, Doretta

    2010-01-01

    Violence has been observed in humans and animals alike, indicating its evolutionary/biological significance. However, violence in animals has often been confounded with functional forms of aggressive behavior. Currently, violence in animals is identified primarily as either a quantitative behavior (an escalated, pathological and abnormal form of aggression characterized primarily by short attack latencies, and prolonged and frequent harm-oriented conflict behaviors) or a qualitative one (characterized by attack bites aimed at vulnerable parts of the opponent's body and context independent attacks regardless of the environment or the sex and type of the opponent). Identification of an operational definition for violence thus not only helps in understanding its potential differences from adaptive forms of aggression but also in the selection of appropriate animal models for both. We address this issue theoretically by drawing parallels from research on aggression and appeasement in humans and other animals. We also provide empirical evidences for violence in mice selected for high aggression by comparing our findings with other currently available potentially violent rodent models. The following violence-specific features namely (1) Display of low levels of pre-escalatory/ritualistic behaviors. (2) Immediate and escalated offense durations with low withdrawal rates despite the opponent's submissive supine and crouching/defeat postures. (3) Context independent indiscriminate attacks aimed at familiar/unfamiliar females, anaesthetized males and opponents and in neutral environments. (4) Orientation of attack-bites toward vulnerable body parts of the opponent resulting in severe wounding. (5) Low prefrontal serotonin (5-HT) levels upon repeated aggression. (6) Low basal heart rates and hyporesponsive hypothalamus-pituitary-adrenocortical (HPA) axis were identified uniquely in the short attack latency (SAL) mice suggesting a qualitative difference between violence and adaptive aggression in animals.

  8. Aftermath of Terror: A Nationwide Longitudinal Study of Posttraumatic Stress and Worry Across the Decade Following the September 11, 2001 Terrorist Attacks.

    PubMed

    Garfin, Dana Rose; Poulin, Michael J; Blum, Scott; Silver, Roxane Cohen

    2018-02-01

    Research conducted in the early years after the September 11, 2001 (9/11) terrorist attacks in New York, Pennsylvania, and Washington, DC demonstrated adverse psychological outcomes among residents of the United States who were exposed to the attacks both directly and indirectly via the media. However, less is known about the impact of this collective trauma over time. Beginning at the end of December 2006, a longitudinal study of a nationally representative sample of U.S. residents (Cohort 2, N = 1,613) examined the long-term effects of 9/11, with annual assessments administered every year for 3 years. We assessed rates of 9/11-related posttraumatic stress (PTS) annually during the first 2 years of the study; during the second and third years of the study, we assessed fear and worry regarding future terrorism. Rates of PTS among participants were compared with those assessed annually in a nationally representative sample between 2002 and 2004 (Cohort 1); results indicated a relatively stable pattern of 9/11-related PTS symptoms for 6 years following the attacks. Five to six years after 9/11, we found an association between 9/11-related PTS and both direct, B = 8.45, 95% CI [4.32, 12.59] and media-based (live television), B = 1.78, 95% CI [0.90, 2.65] exposure to the attacks. Six to 7 years post-9/11, fear and worry regarding future terrorism were predicted by 9/11-related PTS symptoms that had been reported approximately 5 years after the attacks, B = 0.04, 95% CI [0.03, 0.05]. The psychological legacy of 9/11 was perceptible among many U.S. residents throughout the decade that followed. Copyright © 2018 International Society for Traumatic Stress Studies.

  9. Experimental Evaluation of the Effect of Angle-of-attack on the External Aerodynamics and Mass Capture of a Symmetric Three-engine Air-breathing Launch Vehicle Configuration at Supersonic Speeds

    NASA Technical Reports Server (NTRS)

    Kim, Hyun D.; Frate, Franco C.

    2001-01-01

    A subscale aerodynamic model of the GTX air-breathing launch vehicle was tested at NASA Glenn Research Center's 10- by 10-Foot Supersonic Wind Tunnel from Mach 2.0 to 3.5 at various angles-of-attack. The objective of the test was to investigate the effect of angle-of-attack on inlet mass capture, inlet diverter effectiveness, and the flowfield at the cowl lip plane. The flow-through inlets were tested with and without boundary-layer diverters. Quantitative measurements such as inlet mass flow rates and pitot-pressure distributions in the cowl lip plane are presented. At a 3deg angle-of-attack, the flow rates for the top and side inlets were within 8 percent of the zero angle-of-attack value, and little distortion was evident at the cowl lip plane. Surface oil flow patterns showing the shock/boundary-layer interaction caused by the inlet spikes are shown. In addition to inlet data, vehicle forebody static pressure distributions, boundary-layer profiles, and temperature-sensitive paint images to evaluate the boundary-layer transition are presented. Three-dimensional parabolized Navier-Stokes computational fluid dynamics calculations of the forebody flowfield are presented and show good agreement with the experimental static pressure distributions and boundary-layer profiles. With the boundary-layer diverters installed, no adverse aerodynamic phenomena were found that would prevent the inlets from operating at the required angles-of-attack. We recommend that phase 2 of the test program be initiated, where inlet contraction ratio and diverter geometry variations will be tested.

  10. Investigation of the Characteristics of a High-Aspect-Ratio Wing in the Langley 8-Foot High-Speed Tunnel

    NASA Technical Reports Server (NTRS)

    Whitcomb, Richard T.

    1940-01-01

    An investigation of the characteristics of a wing with an aspect ratio of 9.0 and an NACA 65-210 airfoil section has been made at Mach number up to 0.925. The wing tested has a taper ratio of 2.5:1.0, no twist, dihedral, or sweepback, and 20-percent - chord 37.5-percent-semispan plain ailerons. The results showed that serious changes in the normal-force characteristics occurred when the Mach number was increased above 0.74 at angles of attack between 4 deg. and 10 deg. and above 0.80 at 0 deg. angle of attack.Because of small outboard shifts in the lateral center of load, the bending moment at the root for conditions corresponding to a 3g pull-out at an altitude of 35,000 feet increased by approximately 5% when the Much number was increased beyond 0.83 the negative pitching moments for the high angles of attack increased, whereas those for the low angles of attack decreased with a resulting large increase in the negative slope of the pitching-moment curves. A large increase occurred in the values of the drag coefficients for the range of lift coefficients needed for level flight at an altitude of 35,000 feet when the Mach number was increased beyond a value of 0.80. The wakes at a station 2.82 root chords behind the wing quarter-chord line extended approximately a chord above the wing chord line for the angles of attack required to recover from high-speed dives at high Mach numbers.

  11. Strong light illumination on gain-switched semiconductor lasers helps the eavesdropper in practical quantum key distribution systems

    NASA Astrophysics Data System (ADS)

    Fei, Yang-yang; Meng, Xiang-dong; Gao, Ming; Yang, Yi; Wang, Hong; Ma, Zhi

    2018-07-01

    The temperature of the semiconductor diode increases under strong light illumination whether thermoelectric cooler is installed or not, which changes the output wavelength of the laser (Lee et al., 2017). However, other characteristics also vary as temperature increases. These variations may help the eavesdropper in practical quantum key distribution systems. We study the effects of temperature increase on gain-switched semiconductor lasers by simulating temperature dependent rate equations. The results show that temperature increase may cause large intensity fluctuation, decrease the output intensity and lead the signal state and decoy state distinguishable. We also propose a modified photon number splitting attack by exploiting the effects of temperature increase. Countermeasures are also proposed.

  12. Population biology of the European woodwasp, Sirex noctilio, in Galicia, Spain.

    PubMed

    Lombardero, M J; Ayres, M P; Krivak-Tetley, F E; Fitza, K N E

    2016-10-01

    Sirex noctilio Fabricius (Hymenoptera, Siricidae) is rare and rarely studied where it is native in Eurasia, but is a widespread pest of pines in the Southern Hemisphere. Here we report on the abundance, basic biology, host use patterns and natural enemies of native S. noctilio in Galicia, Spain. Most trees attacked by S. noctilio failed to produce any adult progeny: >90% of emergences came from <20% of the attacked trees. The highest reproduction was in Pinus pinaster, followed by Pinus sylvestris and Pinus radiata. The proportions of S. noctilio requiring 1, 2 or 3 years for development were 0.72: 0.24: 0.04. Delayed development could be an adaptation to avoid parasitic nematodes, which sterilized 41.5% adults with one year generation time but only 19% of adults with 2 years generation time. Hymenoptera parasitoids accounted for 20% mortality. Sex ratios were male biased at 1: 2.9. Body size and fecundity were highly variable and lower than previously reported from the Southern Hemisphere. On attacked trees, there were 5-20 attacks per standard log (18 dm2), with usually 1-3 drills per attack. Attack densities and drills per attack were higher in trees that subsequently died. The production of S. noctilio per log was positively related to total attacks, and negatively related to: (1) attack density, (2) incidence of blue stain from Ophiostoma fungi and (3) frequency of lesions in plant tissue around points of attack. A preliminary life table for S. noctilio in Galicia estimated effects on potential population growth rate from (in decreasing order of importance) host suitability, unequal sex ratio, parasitic nematodes and Hymenoptera parasitoids.

  13. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  14. Resistance of borax–copper treated wood in aboveground exposure to attack by Formosan subterranean termites

    Treesearch

    Stan Lebow; Bessie Woodward; Douglas Crawford; William Abbott

    2005-01-01

    The spread of Formosan subterranean termites (FSTs) in the southern United States has increased public interest in finding a preservative treatment to protect framing lumber from termite attack. This study evaluated the use of a borax-based preservative to protect wood from FST attack. Southern Pine and Douglas-fir specimens were pressure-treated with three...

  15. In-flight flow visualization results from the X-29A aircraft at high angles of attack

    NASA Technical Reports Server (NTRS)

    Delfrate, John H.; Saltzman, John A.

    1992-01-01

    Flow visualization techniques were used on the X-29A aircraft at high angles of attack to study the vortical flow off the forebody and the surface flow on the wing and tail. The forebody vortex system was studied because asymmetries in the vortex system were suspected of inducing uncommanded yawing moments at zero sideslip. Smoke enabled visualization of the vortex system and correlation of its orientation with flight yawing moment data. Good agreement was found between vortex system asymmetries and the occurrence of yawing moments. Surface flow on the forward-swept wing of the X-29A was studied using tufts and flow cones. As angle of attack increased, separated flow initiated at the root and spread outboard encompassing the full wing by 30 deg angle of attack. In general, the progression of the separated flow correlated well with subscale model lift data. Surface flow on the vertical tail was also studied using tufts and flow cones. As angle of attack increased, separated flow initiated at the root and spread upward. The area of separated flow on the vertical tail at angles of attack greater than 20 deg correlated well with the marked decrease in aircraft directional stability.

  16. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks

    NASA Astrophysics Data System (ADS)

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-09-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.

  17. Social support buffers the effects of terrorism on adolescent depression: findings from Sderot, Israel.

    PubMed

    Henrich, Christopher C; Shahar, Golan

    2008-09-01

    This prospective study of 29 Israeli middle school students experiencing terror attacks by Qassam rockets addressed whether higher levels of baseline social support protected adolescents from adverse psychological effects of exposure to rocket attacks. Participants were assessed at two time points 5 months apart, before and after a period of military escalation from May to September 2007. Adolescent self-reported depression was measured at both time points, using the Center for Epidemiological Studies-Child Depression Scale. Social support from family, friends, and school was measured at time 1, via a short form of the Perceived Social Support Scale. Adolescents also reported their exposure to rocket attacks at both time points. There was a significant interaction between social support and exposure to rocket attacks predicting depression over time. As hypothesized, baseline levels of social support buffered against the effect of exposure to rocket attacks on increased depression. Conversely, social support was associated with increased depression for adolescents who were not exposed to rocket attacks. Findings highlight the potential importance of community mental health efforts to bolster schools, families, and peer groups as protective resources in times of traumatic stress.

  18. Kyol Goeu (‘Wind Overload’) Part I: A Cultural Syndrome of Orthostatic Panic among Khmer Refugees

    PubMed Central

    Hinton, Devon; Um, Khin; Ba, Phalnarith

    2009-01-01

    Certain cultural syndromes seem to increase the risk of panic attacks by generating catastrophic cognitions about symptoms of autonomic arousal. These schemas create a constant anxious scanning of the body, hence facilitating, maintaining, and producing panic. As a case in point, a Khmer fainting syndrome,‘wind overload’ (kyol goeu), results in dire expectations concerning the autonomic symptoms experienced upon standing, thus contributing to the high rate of orthostatically induced panic observed in this population. PMID:20852723

  19. Project CHECO Southeast Asia Report. Air Operations in Northern Laos, 1 November 1970 - 1 April 1971

    DTIC Science & Technology

    1971-05-03

    to be of sufficient size and scope to warrant a significant increase in the daily tacair sortie rate provided by Seventh Air Force. The execution of...weather, however, delayed the operation. A last-minute change of HLZs was made by CAS, but weather and faulty execution precluded proper zone...Artillery Airborne Battlefield Command and Control Center Attacks by Fire Jtq 1£4+, .. Auto Defense du Choc . Technically an obsolete tenn now. Refers

  20. German General Officer Casualties in World War II -- Harbinger for U.S. Army General Officer Casualties in Airland Battle

    DTIC Science & Technology

    1988-12-07

    grenades, air attacks, tank fire, snipers, and partisans. Many of these causes, such as air attacks and tank fire, were relatively infrequent occurrences...Tank Fire 5 9 Small Arms Fire 7 13 Grenade 3 5 Air Attack 18 32 Tank Fire 2 4 Partisans 5 9 Sniper 3 5 In World War I personal danger for officers had...accounts of individual demises reflect this increased lethality, and better describe the significant dangers to these senior commanders. 18 AIR ATTACK

  1. Development of mental health first aid guidelines for panic attacks: a Delphi study.

    PubMed

    Kelly, Claire M; Jorm, Anthony F; Kitchener, Betty A

    2009-08-10

    Panic attacks are common, and while they are not life-threatening events, they can lead to the development of panic disorder and agoraphobia. Appropriate help at the time that a panic attack occurs may decrease the fear associated with the attack and reduce the risk of developing an anxiety disorder. However, few people have the knowledge and skills required to assist. Simple first aid guidelines may help members of the public to offer help to people who experience panic attacks. The Delphi method was used to reach consensus in a panel of experts. Experts included 50 professionals and 6 people who had experience of panic attacks and were active in mental health advocacy. Statements about how to assist someone who is having a panic attack were sourced through a systematic search of both professional and lay literature. These statements were rated for importance as first aid guidelines by the expert and consumer panels and guidelines were written using the items most consistently endorsed. Of 144 statements presented to the panels, 27 were accepted. These statements were used to develop the guidelines appended to this paper. There are a number of actions which are considered to be useful for members of the public to do if they encounter someone who is having a panic attack. These guidelines will be useful in revision of curricula of mental health first aid programs. They can also be used by members of the public who want immediate information about how to assist someone who is experiencing panic attacks.

  2. Low Blood Pressure

    MedlinePlus

    ... to low blood pressure are an abnormally low heart rate ( bradycardia ), problems with heart valves , heart attack and ... occurred. Is low blood pressure related to low heart rate? Find out . This content was last reviewed October ...

  3. Forced Oscillation Wind Tunnel Testing for FASER Flight Research Aircraft

    NASA Technical Reports Server (NTRS)

    Hoe, Garrison; Owens, Donald B.; Denham, Casey

    2012-01-01

    As unmanned air vehicles (UAVs) continue to expand their flight envelopes into areas of high angular rate and high angle of attack, modeling the complex unsteady aerodynamics for simulation in these regimes has become more difficult using traditional methods. The goal of this experiment was to improve the current six degree-of-freedom aerodynamic model of a small UAV by replacing the analytically derived damping derivatives with experimentally derived values. The UAV is named the Free-flying Aircraft for Sub-scale Experimental Research, FASER, and was tested in the NASA Langley Research Center 12- Foot Low-Speed Tunnel. The forced oscillation wind tunnel test technique was used to measure damping in the roll and yaw axes. By imparting a variety of sinusoidal motions, the effects of non-dimensional angular rate and reduced frequency were examined over a large range of angle of attack and side-slip combinations. Tests were performed at angles of attack from -5 to 40 degrees, sideslip angles of -30 to 30 degrees, oscillation amplitudes from 5 to 30 degrees, and reduced frequencies from 0.010 to 0.133. Additionally, the effect of aileron or elevator deflection on the damping coefficients was examined. Comparisons are made of two different data reduction methods used to obtain the damping derivatives. The results show that the damping derivatives are mainly a function of angle of attack and have dependence on the non-dimensional rate and reduced frequency only in the stall/post-stall regime

  4. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  5. Controlling The Spread of Land-Attack Cruise Missiles.

    DTIC Science & Technology

    1995-01-01

    propellant additives and agents: (1) Bonding agents as follows: (i) tris(l-(2-methyl)aziridinyl) phosphine oxide (MAPO); (ii) trimesoyl-l(2-ethyl...Triphenyl bismuth (TPB) (ii) Isophorone diisocyanate (IPDI) (3) Burning rate modifiers as follows: (i) Catocene (ii) N-butyl- ferrocene (iii...Butacene (iv) Other ferrocene derivatives 9g Controlling the Spread of Land-Attack Cruise Missiles (4) Nitrate esters and nitrato plasticizers as

  6. Racism and Citizenship Education in Northern Ireland

    ERIC Educational Resources Information Center

    Gallagher, Eamonn

    2007-01-01

    Racist attitudes towards, and attacks on, the minority ethnic populations in Northern Ireland (NI) have increased dramatically over the last number of years. Despite the increased media attention regarding racist attacks, the fallacy that racism is not a major problem in NI is an enduring one. However, there is a growing recognition that minority…

  7. The geometry of high angle of attack maneuvers and the implications for Gy-induced neck injuries.

    PubMed

    Newman, David G; Ostler, David

    2011-08-01

    Modern super agile fighter aircraft have significantly expanded maneuverability envelopes, often involving very high angles of attack (AOA) in the post-stall region. One such maneuver is the high AOA velocity vector roll. The geometry of this flight maneuver is such that during the roll there is a significant lateral C load imposed on the unrestrained head-neck complex of the pilot. A mathematical analysis of the geometric relationship determining the magnitude of +/- Gy acceleration during high AOA maneuvering was conducted. This preliminary mathematical model is able to predict the Gy load imposed on the head-neck complex of the pilot for a given set of flight maneuver parameters. The analysis predicts that at an AOA of 700 and with a roll rate of 100 degrees x s(-1), the lateral G developed will be approximately 3.5 Gy. Increasing the roll rate increases the lateral G component: at 200 degrees x s(-1) the Gy, load is more than 6 Gy. There are serious potential implications of super agile maneuvers on the neck of the pilot. The G environment experienced by the pilot of super agile aircraft is increasingly multiaxial, involving +/- Gx, +/- Gy, and +/- Gz. The level of lateral G developed during these dynamic flight maneuvers should not be underestimated, as such G loads can potentially lead to neck injuries. While aircraft become ever more capable, a full understanding of the biodynamic effects on the pilot while exploiting the agility of the aircraft still needs to be developed.

  8. Rats and seabirds: effects of egg size on predation risk and the potential of conditioned taste aversion as a mitigation method.

    PubMed

    Latorre, Lucía; Larrinaga, Asier R; Santamaría, Luis

    2013-01-01

    Seabirds nesting on islands are threatened by invasive rodents, such as mice and rats, which may attack eggs, chicks and even adults. The low feasibility of rat eradications on many islands makes the development of alternate control plans necessary. We used a combination of field experiments on a Mediterranean island invaded by black rats (Rattusrattus) to evaluate (1) the predation risk posed to different-sized seabird eggs and (2), the potential of two deterrent methods (electronic and chemical) to reduce its impact. Rats were able to consume eggs of all sizes (12 to 68 g), but survival increased 13 times from the smallest to the largest eggs (which also had more resistant eggshells). Extrapolation to seabird eggs suggests that the smallest species (Hydrobatespelagicus) suffer the most severe predation risk, but even the largest (Larusmichahellis) could suffer >60% mortality. Nest attack was not reduced by the deterrents. However, chemical deterrence (conditioned taste aversion by lithium chloride) slowed the increase in predation rate over time, which resulted in a three-fold increase in egg survival to predation as compared to both control and electronic deterrence. At the end of the experimental period, this effect was confirmed by a treatment swap, which showed that conferred protection remains at least 15 days after cessation of the treatment. Results indicate that small seabird species are likely to suffer severe rates of nest predation by rats and that conditioned taste aversion, but not electronic repellents, may represent a suitable method to protect colonies when eradication or control is not feasible or cost-effective.

  9. Turbulent flow and heat transfer of Water/Al2O3 nanofluid inside a rectangular ribbed channel

    NASA Astrophysics Data System (ADS)

    Parsaiemehr, Mohammad; Pourfattah, Farzad; Akbari, Omid Ali; Toghraie, Davood; Sheikhzadeh, Ghanbarali

    2018-02-01

    In present study, the turbulent flow and heat transfer of Water/Al2O3 nanofluid inside a rectangular channel have been numerically simulated. The main purpose of present study is investigating the effect of attack angle of inclined rectangular rib, Reynolds number and volume fraction of nanoparticles on heat transfer enhancement. For this reason, the turbulent flow of nanofluid has been simulated at Reynolds numbers ranging from 15000 to 30000 and volume fractions of nanoparticles from 0 to 4%. The changes attack angle of ribs have been investigated ranging from 0 to 180°. The results show that, the changes of attack angle of ribs, due to the changes of flow pattern and created vortexes inside the channel, have significant effect on fluid mixing. Also, the maximum rate of heat transfer enhancement accomplishes in attack angle of 60°. In Reynolds numbers of 15000, 20000 and 30000 and attack angle of 60°, comparing to the attack angle of 0°, the amount of Nusselt number enhances to 2.37, 1.96 and 2 times, respectively. Also, it can be concluded that, in high Reynolds numbers, by using ribs and nanofluid, the performance evaluation criterion improves.

  10. High-Alpha Handling Qualities Flight Research on the NASA F/A-18 High Alpha Research Vehicle

    NASA Technical Reports Server (NTRS)

    Wichman, Keith D.; Pahle, Joseph W.; Bahm, Catherine; Davidson, John B.; Bacon, Barton J.; Murphy, Patrick C.; Ostroff, Aaron J.; Hoffler, Keith D.

    1996-01-01

    A flight research study of high-angle-of-attack handling qualities has been conducted at the NASA Dryden Flight Research Center using the F/A-18 High Alpha Research Vehicle (HARV). The objectives were to create a high-angle-of-attack handling qualities flight database, develop appropriate research evaluation maneuvers, and evaluate high-angle-of-attack handling qualities guidelines and criteria. Using linear and nonlinear simulations and flight research data, the predictions from each criterion were compared with the pilot ratings and comments. Proposed high-angle-of-attack nonlinear design guidelines and proposed handling qualities criteria and guidelines developed using piloted simulation were considered. Recently formulated time-domain Neal-Smith guidelines were also considered for application to high-angle-of-attack maneuvering. Conventional envelope criteria were evaluated for possible extension to the high-angle-of-attack regime. Additionally, the maneuvers were studied as potential evaluation techniques, including a limited validation of the proposed standard evaluation maneuver set. This paper gives an overview of these research objectives through examples and summarizes result highlights. The maneuver development is described briefly, the criteria evaluation is emphasized with example results given, and a brief discussion of the database form and content is presented.

  11. Airborne or Fomite Transmission for Norovirus? A Case Study Revisited.

    PubMed

    Xiao, Shenglan; Tang, Julian W; Li, Yuguo

    2017-12-14

    Norovirus infection, a highly prevalent condition associated with a high rate of morbidity, comprises a significant health issue. Although norovirus transmission mainly occurs via the fecal-oral and vomit-oral routes, airborne transmission has been proposed in recent decades. This paper re-examines a previously described norovirus outbreak in a hotel restaurant wherein airborne transmission was originally inferred. Specifically, the original evidence that suggested airborne transmission was re-analyzed by exploring an alternative hypothesis: could this outbreak instead have occurred via fomite transmission? This re-analysis was based on whether fomite transmission could have yielded similar attack rate distribution patterns. Seven representative serving pathways used by waiters were considered, and the infection risk distributions of the alternative fomite transmission routes were predicted using a multi-agent model. These distributions were compared to the reported attack rate distribution in the original study using a least square methods approach. The results show that with some reasonable assumptions of human behavior patterns and parameter values, the attack rate distribution corresponded well with that of the infection risk via the fomite route. This finding offers an alternative interpretation of the transmission routes that underlay this particular norovirus outbreak and an important consideration in the development of infection control guidelines and the investigation of similar norovirus outbreaks in future.

  12. Secondary attack rate of hepatitis A, varicella and mumps in household settings and reliability of family history to detect seronegative children for necessity of vaccination.

    PubMed

    Ceyhan, Mehmet; Tezer, Hasan; Yildirim, Inci

    2009-01-01

    Hepatitis A, varicella, and mumps are common in countries without universal immunization against these infections. Information about secondary household attack rates is limited. A prospective study was conducted in children <16 y of age who had household contact with the above infections. History for previous infections and vaccination was obtained from the parents. Specific antibodies in the sera during enrollment and at the end of the longest incubation periods were determined. A total of 113 children who had household contact with cases of varicella, hepatitis A, or mumps were enrolled. Secondary attack rate (SAR) was lower in hepatitis A (43.3%) than those for varicella (75.0%) and mumps (65.3%) (p<0.05). Rate of secondary asymptomatic infections was 25.6% in the hepatitis A group, 3.1% in the varicella group, and 16.6% in the mumps group. Positive predictive value (PPV) of the history was 100% for all 3 diseases and negative predictive value (NPV) was 85% for hepatitis A, 80.0% for varicella, and 56.2% for mumps. In conclusion, asymptomatic infections are important in the calculation of SARs in household contacts. PPV and NPV of medical history taken from parents might be useful when deciding the need for vaccination.

  13. The effects of scene content parameters, compression, and frame rate on the performance of analytics systems

    NASA Astrophysics Data System (ADS)

    Tsifouti, A.; Triantaphillidou, S.; Larabi, M. C.; Doré, G.; Bilissi, E.; Psarrou, A.

    2015-01-01

    In this investigation we study the effects of compression and frame rate reduction on the performance of four video analytics (VA) systems utilizing a low complexity scenario, such as the Sterile Zone (SZ). Additionally, we identify the most influential scene parameters affecting the performance of these systems. The SZ scenario is a scene consisting of a fence, not to be trespassed, and an area with grass. The VA system needs to alarm when there is an intruder (attack) entering the scene. The work includes testing of the systems with uncompressed and compressed (using H.264/MPEG-4 AVC at 25 and 5 frames per second) footage, consisting of quantified scene parameters. The scene parameters include descriptions of scene contrast, camera to subject distance, and attack portrayal. Additional footage, including only distractions (no attacks) is also investigated. Results have shown that every system has performed differently for each compression/frame rate level, whilst overall, compression has not adversely affected the performance of the systems. Frame rate reduction has decreased performance and scene parameters have influenced the behavior of the systems differently. Most false alarms were triggered with a distraction clip, including abrupt shadows through the fence. Findings could contribute to the improvement of VA systems.

  14. A review on delayed toxic effects of sulfur mustard in Iranian veterans

    PubMed Central

    2012-01-01

    Iranian soldiers were attacked with chemical bombs, rockets and artillery shells 387 times during the 8-years war by Iraq (1980–1988). More than 1,000 tons of sulfur mustard gas was used in the battlefields by the Iraqis against Iranian people. A high rate of morbidities occurred as the result of these attacks. This study aimed to evaluate the delayed toxic effects of sulfur mustard gas on Iranian victims. During a systematic search, a total of 193 (109 more relevant to the main aim) articles on sulfur mustard gas were reviewed using known international and national databases. No special evaluation was conducted on the quality of the articles and their publication in accredited journals was considered sufficient. High rate of morbidities as the result of chemical attacks by sulfur mustard among Iranian people occurred. Iranian researchers found a numerous late complications among the victims which we be listed as wide range of respiratory, ocular, dermatological, psychological, hematological, immunological, gastrointestinal and endocrine complications, all influenced the quality of life of exposed victims. The mortality rate due to this agent was 3%. Although, mortality rate induced by sulfur mustard among Iranian people was low, variety and chronicity of toxic effects and complications of this chemical agent were dramatic. PMID:23351810

  15. Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures.

    PubMed

    Johnson, Chris W

    2014-01-01

    We identify four roles that social networking plays in the 'attribution problem', which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing. Recipients are more likely to open infected attachments when they come from a trusted source. Third, social networking infrastructures create disposable architectures to coordinate attacks through command and control servers. The ubiquitous nature of these architectures makes it difficult to determine who owns and operates the servers. Finally, governments recruit anti-social criminal networks to launch attacks on third-party infrastructures using botnets. The closing sections identify a roadmap to increase resilience against the 'dark side' of social networking.

  16. Combined interventions for mitigation of an influenza A (H1N1) 2009 outbreak in a physical training camp in Beijing, China.

    PubMed

    Chu, Chen-Yi; de Silva, U Chandimal; Guo, Jin-Peng; Wang, Yong; Wen, Liang; Lee, Vernon J; Li, Shen-Long; Huang, Liu-Yu

    2017-07-01

    Many studies have suggested the effectiveness of single control measures in the containment and mitigation of pandemic influenza A (H1N1) 2009. The effects of combined interventions by multiple control measures in reducing the impact of an influenza A (H1N1) 2009 outbreak in a closed physical training camp in Beijing, China were evaluated. Oseltamivir was prescribed for the treatment of confirmed cases and possible cases and as prophylaxis for all other participants in this training camp. Public health control measures were applied simultaneously, including the isolation of patients and possible cases, personal protection and hygiene, and social distancing measures. Symptom surveillance of all participants was initiated, and the actual attack rate was calculated. For comparison, the theoretical attack rate for this outbreak was projected using the Newton-Raphson numerical method. A total of 3256 persons were present at the physical training camp. During the outbreak, 405 (68.3%) possible cases and 26 (4.4%) confirmed cases were reported before the intervention and completed oseltamivir treatment; 162 (27.3%) possible cases were reported after the intervention and received part treatment and part prophylaxis. The other 2663 participants completed oseltamivir prophylaxis. Of the possible cases, 181 with fever ≥38.5°C were isolated. The actual attack rate for this outbreak of pandemic influenza A (H1N1) 2009 was 18.2%, which is much lower than the theoretical attack rate of 80% projected. Combined interventions of large-scale antiviral ring prophylaxis and treatment and public health control measures could be applied to reduce the magnitude of influenza A (H1N1) 2009 outbreaks in closed settings. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  17. Does fluoride in drinking water delay tooth eruption?

    PubMed

    Jolaoso, Ismail Adeyemi; Kumar, Jayanth; Moss, Mark E

    2014-01-01

    The objectives of this study are to determine the effect of fluoride exposure on permanent tooth eruption patterns as well as to understand its effect on caries attack rate by accounting for the number of erupted tooth surfaces. We analyzed data from the 1986-1987 National Survey of Oral Health of US Schoolchildren to determine the mean number of erupted permanent teeth and permanent first molars according to fluoride level in drinking water. The analysis included 13,348 children aged 5-17 years with a history of single residence. We also estimated the attack rate (decayed, missing, and filled surfaces/surfaces at risk) for fluoride deficient, suboptimal, and optimally fluoridated areas adjusting for covariates. Multivariable statistical analyses were performed to control for potential confounders. By age 7, almost all permanent first molars had erupted. The adjusted mean number of erupted permanent first molars per child were 3.81, 3.67, and 3.92 in areas with <0.3, 0.3-<0.7, and 0.7-1.2 ppm of fluoride, respectively. The adjusted caries attack rate in the first permanent molars among 5- to 17-year-old children was 93, 81, and 78 per 1,000 surfaces in fluoride deficient, suboptimal, and optimally fluoridated areas, respectively (P < 0.0001). This pattern of higher first molar attack rate among children in the fluoride-deficient communities was also observed in all erupted teeth. Exposure to fluoride in drinking water did not delay the eruption of permanent teeth. The observed difference in dental caries experience among children exposed to different fluoride levels could not be explained by the timing of eruption of permanent teeth. © 2014 American Association of Public Health Dentistry.

  18. Predator attack rate evolution in space: the role of ecology mediated by complex emergent spatial structure and self-shading.

    PubMed

    Messinger, Susanna M; Ostling, Annette

    2013-11-01

    Predation interactions are an important element of ecological communities. Population spatial structure has been shown to influence predator evolution, resulting in the evolution of a reduced predator attack rate; however, the evolutionary role of traits governing predator and prey ecology is unknown. The evolutionary effect of spatial structure on a predator's attack rate has primarily been explored assuming a fixed metapopulation spatial structure, and understood in terms of group selection. But endogenously generated, emergent spatial structure is common in nature. Furthermore, the evolutionary influence of ecological traits may be mediated through the spatial self-structuring process. Drawing from theory on pathogens, the evolutionary effect of emergent spatial structure can be understood in terms of self-shading, where a voracious predator limits its long-term invasion potential by reducing local prey availability. Here we formalize the effects of self-shading for predators using spatial moment equations. Then, through simulations, we show that in a spatial context self-shading leads to relationships between predator-prey ecology and the predator's attack rate that are not expected in a non-spatial context. Some relationships are analogous to relationships already shown for host-pathogen interactions, but others represent new trait dimensions. Finally, since understanding the effects of ecology using existing self-shading theory requires simplifications of the emergent spatial structure that do not apply well here, we also develop metrics describing the complex spatial structure of the predator and prey populations to help us explain the evolutionary effect of predator and prey ecology in the context of self-shading. The identification of these metrics may provide a step towards expansion of the predictive domain of self-shading theory to more complex spatial dynamics. Copyright © 2013 Elsevier Inc. All rights reserved.

  19. A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?

    PubMed

    Bodford, Jessica E; Kwan, Virginia S Y

    2018-02-01

    The current study examines hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) through a general game theoretic framework-that is, as a product of costs and benefits. Given the inherent risk of carrying out a hacktivist attack (e.g., legal action, imprisonment), it would be rational for the user to weigh these risks against perceived benefits of carrying out the attack. As such, we examined computer science students' estimations of risks, payoffs, and attack likelihood through a game theoretic design. Furthermore, this study aims at constructing a descriptive profile of potential hacktivists, exploring two predicted covariates of attack decision making, namely, peer prevalence of hacking and sex differences. Contrary to expectations, results suggest that participants' estimations of attack likelihood stemmed solely from expected payoffs, rather than subjective risks. Peer prevalence significantly predicted increased payoffs and attack likelihood, suggesting an underlying descriptive norm in social networks. Notably, we observed no sex differences in the decision to attack, nor in the factors predicting attack likelihood. Implications for policymakers and the understanding and prevention of hacktivism are discussed, as are the possible ramifications of widely communicated payoffs over potential risks in hacking communities.

  20. Random Visitor: Defense against Identity Attacks in P2P Networks

    NASA Astrophysics Data System (ADS)

    Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  1. Attack Detection in Sensor Network Target Localization Systems With Quantized Data

    NASA Astrophysics Data System (ADS)

    Zhang, Jiangfan; Wang, Xiaodong; Blum, Rick S.; Kaplan, Lance M.

    2018-04-01

    We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location with a large mean-square-error. The attack is a combination of man-in-the-middle, hacking, and spoofing attacks that can effectively change both signals going into and coming out of the sensor nodes in a realistic manner. We show that the essential effect of attacks is to alter the estimated distance between the target and each attacked sensor to a different extent, giving rise to a geometric inconsistency among the attacked and unattacked sensors. Hence, with the help of two secure sensors, a class of detectors are proposed to detect the attacked sensors by scrutinizing the existence of the geometric inconsistency. We show that the false alarm and miss probabilities of the proposed detectors decrease exponentially as the number of measurement samples increases, which implies that for sufficiently large number of samples, the proposed detectors can identify the attacked and unattacked sensors with any required accuracy.

  2. Heat-balling wasps by honeybees

    NASA Astrophysics Data System (ADS)

    Ken, Tan; Hepburn, H. R.; Radloff, S. E.; Yusheng, Yu; Yiqiu, Liu; Danyin, Zhou; Neumann, P.

    2005-10-01

    Defensiveness of honeybee colonies of Apis cerana and Apis mellifera (actively balling the wasps but reduction of foraging) against predatory wasps, Vespa velutina, and false wasps was assessed. There were significantly more worker bees in balls of the former than latter. Core temperatures in a ball around a live wasp of A. cerana were significantly higher than those of A. mellifera, and also significantly more when exposed to false wasps. Core temperatures of bee balls exposed to false wasps were significantly lower than those exposed to V. velutina for both A. cerana and for A. mellifera. The lethal thermal limits for V. velutina, A. cerana and A. mellifera were significantly different, so that both species of honeybees have a thermal safety factor in heat-killing such wasp predators. During wasps attacks at the hives measured at 3, 6 and 12 min, the numbers of Apis cerana cerana and Apis cerana indica bees continuing to forage were significantly reduced with increased wasp attack time. Tropical lowland A. c. indica reduced foraging rates significantly more than the highland A. c. cerana bees; but, there was no significant effect on foraging by A. mellifera. The latency to recovery of honeybee foraging was significantly greater the longer the duration of wasp attacks. The results show remarkable thermal fine-tuning in a co-evolving predator prey relationship.

  3. Media exposure to terrorism and people's risk perception: The role of environmental sensitivity and psychophysiological response to stress.

    PubMed

    Rubaltelli, Enrico; Scrimin, Sara; Moscardino, Ughetta; Priolo, Giulia; Buodo, Giulia

    2018-03-02

    Terrorist attacks have a destabilizing impact on the general population, causing distress and fear. However, not all individuals are equally susceptible to the effects of terror threat. This study aimed to examine whether exposure to terrorism-related pictures interacted with individual differences in environmental sensitivity and psychophysiological response to stress to explain people's risk perception, operationalized as perceived likelihood of a terrorist attack and willingness to trade off one's privacy to increase national security. Ninety-five university students were randomly assigned to one of two conditions (terrorism-related vs. neutral pictures). After watching the pictures, they answered questions concerning risk perception and completed questionnaires. Stress was induced by the Mannheim Multicomponent Stress Test, during which heart rate was recorded. Results showed that the perceived likelihood of future attacks was affected by the interaction between exposure to terrorism pictures and psychophysiological reactivity to stress, whereas willingness to trade off one's privacy to improve national security was influenced by the interaction between exposure to terrorism pictures and environmental sensitivity. The study suggests that individuals high in sensitivity and psychophysiological stress reactivity are particularly affected by terrorism-related pictures. Psychologists should direct their efforts to raise general awareness of the negative effects, especially for some people, of such media coverage. © 2018 The British Psychological Society.

  4. Heavy cannabis users at elevated risk of stroke: evidence from a general population survey.

    PubMed

    Hemachandra, Dilini; McKetin, Rebecca; Cherbuin, Nicolas; Anstey, Kaarin J

    2016-06-01

    Case reports and hospital-based case-control studies suggest that cannabis use may increase the risk of stroke. We examined the risk of non-fatal stroke or transient ischemic attack (TIA) among cannabis users in the general community. A general population survey of Australians aged 20-24 years (n=2,383), 40-44 years (n=2,525) and 60-64 years (n=2,547) was used to determine the odds of lifetime stroke or TIA among participants who had smoked cannabis in the past year while adjusting for other stroke risk factors. There were 153 stroke/TIA cases (2.1%). After adjusting for age cohort, past year cannabis users (n=1,043) had 3.3 times the rate of stroke/TIA (95% CI 1.8-6.3, p<0.001). The incidence rate ratio (IRR) reduced to 2.3 after adjustment for covariates related to stroke, including tobacco smoking (95% CI 1.1-4.5). Elevated stroke/TIA was specific to participants who used cannabis weekly or more often (IRR 4.7, 95% CI 2.1-10.7) with no elevation among participants who used cannabis less often. Heavy cannabis users in the general community have a higher rate of non-fatal stroke or transient ischemic attack than non-cannabis users. © 2015 Public Health Association of Australia.

  5. Epidemiological and laboratory characterization of a yellow fever outbreak in northern Uganda, October 2010-January 2011.

    PubMed

    Wamala, Joseph F; Malimbo, Mugagga; Okot, Charles L; Atai-Omoruto, Ann D; Tenywa, Emmanuel; Miller, Jeffrey R; Balinandi, Stephen; Shoemaker, Trevor; Oyoo, Charles; Omony, Emmanuel O; Kagirita, Atek; Musenero, Monica M; Makumbi, Issa; Nanyunja, Miriam; Lutwama, Julius J; Downing, Robert; Mbonye, Anthony K

    2012-07-01

    In November 2010, following reports of an outbreak of a fatal, febrile, hemorrhagic illness in northern Uganda, the Uganda Ministry of Health established multisector teams to respond to the outbreak. This was a case-series investigation in which the response teams conducted epidemiological and laboratory investigations on suspect cases. The cases identified were line-listed and a data analysis was undertaken regularly to guide the outbreak response. Overall, 181 cases met the yellow fever (YF) suspected case definition; there were 45 deaths (case fatality rate 24.9%). Only 13 (7.5%) of the suspected YF cases were laboratory confirmed, and molecular sequencing revealed 92% homology to the YF virus strain Couma (Ethiopia), East African genotype. Suspected YF cases had fever (100%) and unexplained bleeding (97.8%), but jaundice was rare (11.6%). The overall attack rate was 13 cases/100000 population, and the attack rate was higher for males than females and increased with age. The index clusters were linked to economic activities undertaken by males around forests. This was the largest YF outbreak ever reported in Uganda. The wide geographical case dispersion as well as the male and older age preponderance suggests transmission during the outbreak was largely sylvatic and related to occupational activities around forests. Copyright © 2012 International Society for Infectious Diseases. Published by Elsevier Ltd. All rights reserved.

  6. How timely closure can reduce outbreak duration: gastroenteritis in care homes in North West England, 2012-2016.

    PubMed

    Inns, Thomas; Keenan, Alex; Huyton, Rita; Harris, John; Iturriza-Gomara, Miren; O'Brien, Sarah J; Vivancos, Roberto

    2018-04-12

    Data on outbreaks of infectious gastroenteritis in care homes have been collected using an internet-based surveillance system in North West England since 2012. We analysed the burden and characteristics of care home outbreaks to inform future public health decision-making. We described characteristics of care homes and summary measures of the outbreaks such as attack rate, duration and pathogen identified. The primary analysis outcome was duration of closure following an outbreak. We used negative binomial regression to estimate Incidence Rate Ratios (IRR) and confidence intervals (CI) for each explanatory variable. We recorded 795 outbreaks from 379 care homes (37.1 outbreaks per 100 care homes per year). In total 11,568 cases, 75 hospitalisations and 29 deaths were reported. Closure within three days of the first case (IRR = 0.442, 95%CI 0.366-0.534) was significantly associated with reduced duration of closure. The total size of the home (IRR = 1.426, 95%CI = 1.275-1.595) and the total attack rate (IRR = 1.434, 95%CI = 1.257-1.595) were significantly associated with increased duration of closure. Care homes that closed promptly had outbreaks of shorter duration. Care home providers, and those advising them on infection control, should aim to close homes quickly to prevent lengthy disruption to services.

  7. Bio-inspired diversity for increasing attacker workload

    NASA Astrophysics Data System (ADS)

    Kuhn, Stephen

    2014-05-01

    Much of the traffic in modern computer networks is conducted between clients and servers, rather than client-toclient. As a result, servers represent a high-value target for collection and analysis of network traffic. As they reside at a single network location (i.e. IP/MAC address) for long periods of time. Servers present a static target for surveillance, and a unique opportunity to observe the network traffic. Although servers present a heightened value for attackers, the security community as a whole has shifted more towards protecting clients in recent years leaving a gap in coverage. In addition, servers typically remain active on networks for years, potentially decades. This paper builds on previous work that demonstrated a proof of concept leveraging existing technology for increasing attacker workload. Here we present our clean slate approach to increasing attacker workload through a novel hypervisor and micro-kernel, utilizing next generation virtualization technology to create synthetic diversity of the server's presence including the hardware components.

  8. The association of a heart attack or stroke with depressive symptoms stratified by the presence of a close social contact: findings from the National Health and Aging Trends Study Cohort.

    PubMed

    Simning, Adam; Seplaki, Christopher L; Conwell, Yeates

    2018-01-01

    The objective of the study is to examine whether the risk of having clinically significant depressive symptoms following a heart attack or stroke varies by the presence of a close social contact. The National Health and Aging Trends Study is a nationally representative longitudinal survey of US Medicare beneficiaries aged 65 and older initiated in 2011. A total of 5643 older adults had information on social contacts at baseline and depressive symptoms at the 1-year follow-up interview. The two-item Patient Health Questionnaire identified clinically significant depressive symptoms. Interview questions examined social contacts and the presence of self-reported heart attack or stroke during the year of follow-up. A total of 297 older adults reported experiencing a heart attack and/or stroke between their baseline and follow-up interviews. In regression analyses accounting for sociodemographics, baseline depressive symptoms, medical comorbidity, and activities of daily living impairment, older adults with no close social contacts had increased odds of depressive symptoms at follow-up after experiencing a heart attack or stroke, while those with close social contacts had increased odds of depressive symptoms at follow-up after experiencing a stroke, but not a heart attack. Older adults have increased odds of having depressive symptoms following a self-reported stroke, but only those with no close social contacts had increased odds of depressive symptoms following a heart attack. Social networks may play a role in the mechanisms underlying depression among older adults experiencing certain acute health events. Future work exploring the potential causal relationships suggested here, if confirmed, could inform interventions to alleviate or prevent depression among at risk older adults. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  9. Posttraumatic stress disorder, alcohol use, and perceived safety after the terrorist attack on the pentagon.

    PubMed

    Grieger, Thomas A; Fullerton, Carol S; Ursano, Robert J

    2003-10-01

    The authors examined posttraumatic stress disorder (PTSD), alcohol use, and perceptions of safety in a sample of survivors of the September 11, 2001, terrorist attack on the Pentagon. Analyses were conducted to examine the effect of past traumatic experience, trauma exposure, initial emotional response, and peritraumatic dissociation on probable PTSD, substance use, and perceived safety among 77 survivors seven months after the attack. Eleven respondents (14 percent) had PTSD. Those with PTSD reported higher levels of initial emotional response and peritraumatic dissociation. Ten respondents (13 percent) reported increased use of alcohol. Women were more than five times as likely as men to have PTSD and almost seven times as likely to report increased use of alcohol. Persons with higher peritraumatic dissociation were more likely to develop PTSD and report increased alcohol use. Those with lower perceived safety at seven months had higher initial emotional response and greater peritraumatic dissociation and were more likely to have PTSD, to have increased alcohol use, and to be female. The association of perceived safety with gender, the presence of PTSD, and increased alcohol use among survivors of the terrorist attack on the Pentagon warrants further study.

  10. Leopard in a tea-cup: A study of leopard habitat-use and human-leopard interactions in north-eastern India.

    PubMed

    Kshettry, Aritra; Vaidyanathan, Srinivas; Athreya, Vidya

    2017-01-01

    There is increasing evidence of the importance of multi-use landscapes for the conservation of large carnivores. However, when carnivore ranges overlap with high density of humans, there are often serious conservation challenges. This is especially true in countries like India where loss of peoples' lives and property to large wildlife are not uncommon. The leopard (Panthera pardus) is a large felid that is widespread in India, often sharing landscapes with high human densities. In order to understand the ecology of leopards in a human use landscape and the nature of human-leopard interactions, we studied (i) the spatial and temporal distribution and the characteristics of leopard attacks on people, (ii) the spatial variability in the pattern of habitat use by the leopard, and (iii) the spatial relationship between attack locations and habitat use by leopards. The study site, located in northern West Bengal, India, is a densely populated mixed-use landscape of 630 km2, comprising of forests, tea plantations, agriculture fields, and human settlements. A total of 171 leopard attacks on humans were reported between January 2009 and March 2016, most of which occurred within the tea-gardens. None of the attacks was fatal. We found significant spatial clustering of locations of leopard attacks on humans. However, most of the attacks were restricted to certain tea estates and occurred mostly between January and May. Analysis of habitat use by leopards showed that the probability of use of areas with more ground vegetation cover was high while that of areas with high density of buildings was low. However, locations of leopard attacks on people did not coincide with areas that showed a higher probability of use by leopards. This indicates that an increased use of an area by leopards, by itself, does not necessarily imply an increase in attacks on people. The spatial and temporal clustering of attack locations allowed us to use this information to prioritize areas to focus mitigation activities in order reduce negative encounters between people and leopards in this landscape which has had a long history of conflict.

  11. Leopard in a tea-cup: A study of leopard habitat-use and human-leopard interactions in north-eastern India

    PubMed Central

    2017-01-01

    There is increasing evidence of the importance of multi-use landscapes for the conservation of large carnivores. However, when carnivore ranges overlap with high density of humans, there are often serious conservation challenges. This is especially true in countries like India where loss of peoples’ lives and property to large wildlife are not uncommon. The leopard (Panthera pardus) is a large felid that is widespread in India, often sharing landscapes with high human densities. In order to understand the ecology of leopards in a human use landscape and the nature of human-leopard interactions, we studied (i) the spatial and temporal distribution and the characteristics of leopard attacks on people, (ii) the spatial variability in the pattern of habitat use by the leopard, and (iii) the spatial relationship between attack locations and habitat use by leopards. The study site, located in northern West Bengal, India, is a densely populated mixed-use landscape of 630 km2, comprising of forests, tea plantations, agriculture fields, and human settlements. A total of 171 leopard attacks on humans were reported between January 2009 and March 2016, most of which occurred within the tea-gardens. None of the attacks was fatal. We found significant spatial clustering of locations of leopard attacks on humans. However, most of the attacks were restricted to certain tea estates and occurred mostly between January and May. Analysis of habitat use by leopards showed that the probability of use of areas with more ground vegetation cover was high while that of areas with high density of buildings was low. However, locations of leopard attacks on people did not coincide with areas that showed a higher probability of use by leopards. This indicates that an increased use of an area by leopards, by itself, does not necessarily imply an increase in attacks on people. The spatial and temporal clustering of attack locations allowed us to use this information to prioritize areas to focus mitigation activities in order reduce negative encounters between people and leopards in this landscape which has had a long history of conflict. PMID:28493999

  12. Cigarette smoking and the onset and persistence of panic attacks during mid-adulthood in the United States: 1994-2005.

    PubMed

    Bakhshaie, Jafar; Zvolensky, Michael J; Goodwin, Renee D

    2016-01-01

    The current study examined the relationship between cigarette smoking (daily) and risk of onset and persistence of panic attacks over a 10-year period among adults in mid-adulthood in the United States and whether quitting smoking reduced the risk for panic attacks. Data were drawn from the Midlife Development in the United States Survey (N = 2,101), a nationally representative sample of adults aged 25 to 74 years at baseline (wave 1, 1994-1995) who were followed up 10 years later at wave 2 (2004-2006). Psychiatric diagnoses were based on the Composite International Diagnostic Interview Short-Form (CIDI-SF [based on DSM-III-R criteria]) scales. Logistic regressions were used to evaluate the associations between smoking status and the onset and persistence of panic attack after controlling for demographic characteristics and substance use problems. Daily smoking in 1994 (OR = 1.9 [95% CI, 1.1-3.3]) and persistent daily smoking in 1994 and 2005 (OR = 2.6 [95% CI, 1.4-4.8]) were associated with a significantly increased likelihood of panic attacks in 2005. Moreover, smoking abstinence significantly reduced the risk of new-onset panic attacks (OR = 0.6 [95% CI, 0.4-0.97]) and persistence of panic attacks (OR = 0.2 [95% CI, 0.1-0.5]). The present data provide novel evidence that smoking is associated with an increased risk of panic attacks and that quitting smoking helps reduce such risk. © Copyright 2016 Physicians Postgraduate Press, Inc.

  13. Household Transmission of Influenza A(H1N1)pdm09 in the Pandemic and Post-Pandemic Seasons

    PubMed Central

    Casado, Itziar; Martínez-Baz, Iván; Burgui, Rosana; Irisarri, Fátima; Arriazu, Maite; Elía, Fernando; Navascués, Ana; Ezpeleta, Carmen; Aldaz, Pablo; Castilla, Jesús

    2014-01-01

    Background The transmission of influenza viruses occurs person to person and is facilitated by contacts within enclosed environments such as households. The aim of this study was to evaluate secondary attack rates and factors associated with household transmission of laboratory-confirmed influenza A(H1N1)pdm09 in the pandemic and post-pandemic seasons. Methods During the 2009–2010 and 2010–2011 influenza seasons, 76 sentinel physicians in Navarra, Spain, took nasopharyngeal and pharyngeal swabs from patients diagnosed with influenza-like illness. A trained nurse telephoned households of those patients who were laboratory-confirmed for influenza A(H1N1)pdm09 to ask about the symptoms, risk factors and vaccination status of each household member. Results In the 405 households with a patient laboratory-confirmed for influenza A(H1N1)pdm09, 977 susceptible contacts were identified; 16% of them (95% CI 14–19%) presented influenza-like illness and were considered as secondary cases. The secondary attack rate was 14% in 2009–2010 and 19% in the 2010–2011 season (p = 0.049), an increase that mainly affected persons with major chronic conditions. In the multivariate logistic regression analysis, the risk of being a secondary case was higher in the 2010–2011 season than in the 2009–2010 season (adjusted odds ratio: 1.72; 95% CI 1.17–2.54), and in children under 5 years, with a decreasing risk in older contacts. Influenza vaccination was associated with lesser incidence of influenza-like illness near to statistical significance (adjusted odds ratio: 0.29; 95% CI 0.08–1.03). Conclusion The secondary attack rate in households was higher in the second season than in the first pandemic season. Children had a greater risk of infection. Preventive measures should be maintained in the second pandemic season, especially in high-risk persons. PMID:25254376

  14. Factors associated with nosocomial SARS-CoV transmission among healthcare workers in Hanoi, Vietnam, 2003

    PubMed Central

    Reynolds, Mary G; Anh, Bach Huy; Thu, Vu Hoang; Montgomery, Joel M; Bausch, Daniel G; Shah, J Jina; Maloney, Susan; Leitmeyer, Katrin C; Huy, Vu Quang; Horby, Peter; Plant, Aileen Y; Uyeki, Timothy M

    2006-01-01

    Background In March of 2003, an outbreak of Severe Acute Respiratory Syndrome (SARS) occurred in Northern Vietnam. This outbreak began when a traveler arriving from Hong Kong sought medical care at a small hospital (Hospital A) in Hanoi, initiating a serious and substantial transmission event within the hospital, and subsequent limited spread within the community. Methods We surveyed Hospital A personnel for exposure to the index patient and for symptoms of disease during the outbreak. Additionally, serum specimens were collected and assayed for antibody to SARS-associated coronavirus (SARS-CoV) antibody and job-specific attack rates were calculated. A nested case-control analysis was performed to assess risk factors for acquiring SARS-CoV infection. Results One hundred and fifty-three of 193 (79.3%) clinical and non-clinical staff consented to participate. Excluding job categories with <3 workers, the highest SARS attack rates occurred among nurses who worked in the outpatient and inpatient general wards (57.1, 47.4%, respectively). Nurses assigned to the operating room/intensive care unit, experienced the lowest attack rates (7.1%) among all clinical staff. Serologic evidence of SARS-CoV infection was detected in 4 individuals, including 2 non-clinical workers, who had not previously been identified as SARS cases; none reported having had fever or cough. Entering the index patient's room and having seen (viewed) the patient were the behaviors associated with highest risk for infection by univariate analysis (odds ratios 20.0, 14.0; 95% confidence intervals 4.1–97.1, 3.6–55.3, respectively). Conclusion This study highlights job categories and activities associated with increased risk for SARS-CoV infection and demonstrates that a broad diversity of hospital workers may be vulnerable during an outbreak. These findings may help guide recommendations for the protection of vulnerable occupational groups and may have implications for other respiratory infections such as influenza. PMID:16907978

  15. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

    PubMed

    Nirmal Raja, K; Maraline Beno, M

    2017-07-01

    In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

  16. Changes in cerebral blood flow and vasoreactivity in response to acetazolamide in patients with transient global amnesia

    PubMed Central

    Sakashita, Y.; Kanai, M.; Sugimoto, T.; Taki, S.; Takamori, M.

    1997-01-01

    OBJECTIVE—Previous reports about changes in cerebral blood flow (CBF) in transient global amnesia disclosed decreased flow in some parts of the brain. However, CBF analyses in most reports were qualitative but not quantitative. The purpose of this study was to determine changes in CBF in transient global amnesia.
METHODS—The CBF was measured and the vasoreactive response to acetazolamide was evaluated in six patients with transient global amnesia using technetium-99m hexamethylpropylene amine oxime single-photon emission computed tomography (SPECT). The CBF was measured during an attack in two patients and soon after an attack in the other four. About one month later, CBF was re-evaluated in each patient.
RESULTS—Two patients examined during an attack and one patient examined five hours after an attack had increased blood flow in the occipital cortex and cerebellum. Three patients examined at six to 10 hours after an attack had decreased blood flow in the thalamus, cerebellum, or putamen. These abnormalities of blood flow almost disappeared in all patients one month after onset. The vasodilatory response to acetazolamide, which was evaluated initially using SPECT, was poor in areas of increased blood flow. By the second evaluation of CBF with acetazolamide, the vasodilatory response had returned to normal.
CONCLUSIONS—In a patient with transient global amnesia, CBF increased in the vertebrobasilar territory during the attack and decreased afterwards. The vasodilatory response to acetazolamide may be impaired in the parts of the brain with increased blood flow. It is suggested that transient global amnesia is distinct from migraine but may share the same underlying mechanism.

 PMID:9408101

  17. Contextual Factors Among Indiscriminate or Large Attacks on Food or Water Supplies, 1946-2015

    PubMed Central

    Hunter, Paul R.

    2016-01-01

    This research updates previous inventories of malicious attacks on food and water and includes data from 1946 through mid-2015. A systematic search of news reports, databases, and previous inventories of poisoning events was undertaken. Incidents that threatened or were intended to achieve direct harm to humans and that were either relatively large (more than 4 victims) or indiscriminate in intent or realization were included. Agents could be chemical, biological, or radionuclear. Reports of candidate incidents were subjected to systematic inclusion and exclusion criteria as well as validity analysis (not always clearly undertaken in previous inventories of such attacks). We summarize contextual aspects of the attacks that may be important for scenario prioritization, modelling, and defensive preparedness. Opportunity, and particularly access to dangerous agents, is key to most realized attacks. The most common motives and relative success rate in causing harm were very different between food and water attacks. The likelihood that people were made ill or died also varied by food or water mode and according to motive and opportunity for delivery of the hazardous agent. Deaths and illness associated with attacks during food manufacture and prior to sale have been fewer than those in some other contexts. Valuable opportunities for food defense improvements are identified in other contexts, especially food prepared in private or community settings. PMID:26889577

  18. Knowledge of Signs and Symptoms of Heart Attack and Stroke among Singapore Residents

    PubMed Central

    Quah, Joy Li Juan; Yap, Susan; Cheah, Si Oon; Ng, Yih Yng; Goh, E. Shaun; Doctor, Nausheen; Leong, Benjamin Sieu-Hon; Tiah, Ling; Chia, Michael Yih Chong; Ong, Marcus Eng Hock

    2014-01-01

    Aim. To determine the level of knowledge of signs and symptoms of heart attack and stroke in Singapore resident population, in comparison to the global community. Methods. A population based, random sample of 7,840 household addresses was selected from a validated national sampling frame. Each participant was asked eight questions on signs and symptoms of heart attack and 10 questions on stroke. Results. The response rate was 65.2% with 4,192 respondents. The level of knowledge for preselected, common signs and symptoms of heart attack and stroke was 57.8% and 57.1%, respectively. The respondents scored a mean of 5.0 (SD 2.4) out of 8 for heart attack, while they scored a mean of 6.8 (SD 2.9) out of 10 for stroke. Respondents who were ≥50 years, with lower educational level, and unemployed/retired had the least knowledge about both conditions. The level of knowledge of signs and symptoms of heart attack and stroke in Singapore is comparable to USA and Canada. Conclusion. We found a comparable knowledge of stroke and heart attack signs and symptoms in the community to countries within the same economic, educational, and healthcare strata. However older persons, those with lower educational level and those who are unemployed/retired, require more public health education efforts. PMID:24812623

  19. Aerodynamic Characteristics of Low-Aspect-Ratio Wings in Close Proximity to the Ground

    NASA Technical Reports Server (NTRS)

    Fink, Marvin P.; Lastinger, James L.

    1961-01-01

    A wind-tunnel investigation has been conducted to determine the effect of ground proximity on the aerodynamic characteristics of thick highly cambered rectangular wings with aspect ratios of 1. 2, 4, and 6. The results showed that, for these aspect ratios, as the ground war, approached all wings experienced increases in lift-curve slope and reductions in induced drag which resulted in increases in lift-drag ratio. Although an increase in lift-curve slope was obtained for all aspect ratios as the ground was approached, the lift coefficient at an angle of attack of 0 deg for any given aspect ratio remained nearly constant. The experimental results were in general agreement with Wieselsberger's ground-effect theory (NACA Technical Memorandum 77). As the wings approached the ground, there was an increase in static longitudinal stability at positive angles of attack. When operating in ground effect, all the wings had stability of height at positive angles of attack and instability of height at negative angles of attack. Wing-tip fairings on the wings with aspect ratios of 1 and 2 produced small increases in lift-drag ratio in ground effect. End plates extending only below the chord plane on the wing with an aspect ratio of 1 provided increases in lift coefficient and in lift-drag ratio in ground effect.

  20. A Reynolds Number Study of Wing Leading-Edge Effects on a Supersonic Transport Model at Mach 0.3

    NASA Technical Reports Server (NTRS)

    Williams, M. Susan; Owens, Lewis R., Jr.; Chu, Julio

    1999-01-01

    A representative supersonic transport design was tested in the National Transonic Facility (NTF) in its original configuration with small-radius leading-edge flaps and also with modified large-radius inboard leading-edge flaps. Aerodynamic data were obtained over a range of Reynolds numbers at a Mach number of 0.3 and angles of attack up to 16 deg. Increasing the radius of the inboard leading-edge flap delayed nose-up pitching moment to a higher lift coefficient. Deflecting the large-radius leading-edge flap produced an overall decrease in lift coefficient and delayed nose-up pitching moment to even higher angles of attack as compared with the undeflected large- radius leading-edge flap. At angles of attack corresponding to the maximum untrimmed lift-to-drag ratio, lift and drag coefficients decreased while lift-to-drag ratio increased with increasing Reynolds number. At an angle of attack of 13.5 deg., the pitching-moment coefficient was nearly constant with increasing Reynolds number for both the small-radius leading-edge flap and the deflected large-radius leading-edge flap. However, the pitching moment coefficient increased with increasing Reynolds number for the undeflected large-radius leading-edge flap above a chord Reynolds number of about 35 x 10 (exp 6).

Top