A Virtual Environment for Resilient Infrastructure Modeling and Design
2015-09-01
Security CI Critical Infrastructure CID Center for Infrastructure Defense CSV Comma Separated Value DAD Defender-Attacker-Defender DHS Department...responses to disruptive events (e.g., cascading failure behavior) in a context- rich , controlled environment for exercises, education, and training...The general attacker-defender (AD) and defender-attacker-defender ( DAD ) models for CI are defined in Brown et al. (2006). These models help
Attack Detection in Sensor Network Target Localization Systems With Quantized Data
NASA Astrophysics Data System (ADS)
Zhang, Jiangfan; Wang, Xiaodong; Blum, Rick S.; Kaplan, Lance M.
2018-04-01
We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location with a large mean-square-error. The attack is a combination of man-in-the-middle, hacking, and spoofing attacks that can effectively change both signals going into and coming out of the sensor nodes in a realistic manner. We show that the essential effect of attacks is to alter the estimated distance between the target and each attacked sensor to a different extent, giving rise to a geometric inconsistency among the attacked and unattacked sensors. Hence, with the help of two secure sensors, a class of detectors are proposed to detect the attacked sensors by scrutinizing the existence of the geometric inconsistency. We show that the false alarm and miss probabilities of the proposed detectors decrease exponentially as the number of measurement samples increases, which implies that for sufficiently large number of samples, the proposed detectors can identify the attacked and unattacked sensors with any required accuracy.
Was there unmet mental health need after the September 11, 2001 terrorist attacks?
Stuber, Jennifer; Galea, Sandro; Boscarino, Joseph A; Schlesinger, Mark
2006-03-01
This study examined the use of professionals for mental health problems among New York City residents who were directly affected by the September 11, 2001 terrorist attacks on the World Trade Center (WTC) or had a probable diagnosis of post-traumatic stress disorder (PTSD) or depression in its aftermath. Correlates of help seeking from professionals for mental health problems after the attacks and barriers to care were also assessed. Data were from a random digit dial telephone survey of 2,752 adults representative of the Greater New York Metropolitan area conducted 6 months after the September 11 terrorist attacks. Fifteen percent of those directly affected and 36% of those with probable PTSD or depression sought help from a professional for a mental health problem after the attacks. There was little new utilization of professionals for mental health problems after the attacks among persons who were not already receiving care prior to September 11. Barriers that prevented people from seeking help for mental health problems 6 months after the September 11 attacks included traditional barriers to care (e.g., cost) and barriers that are unique to the post-disaster context (e.g., the belief that others need the services more than oneself). This study suggests that there was potential unmet mental health need in New York City 6 months after the September 11 attacks on the WTC, but these findings should be tempered by research showing an apparent decrease in population-rates of PTSD. In the aftermath of a disaster, interventions should target persons with mental health needs who were not previously seeking help from a professional for a mental health problem.
Joint Center for Operational Analysis Quarterly Bulletin. Volume 8, Issue 3, September 2006
2006-09-01
Kuwait drove planning for Operation Desert Storm. The Dayton Peace Accord included an agreement by warring factions not to attack coalition forces as they...informants.29 Pinpointing the insurgent strongholds substantially helps the military shape its plan of attack. The government prepares the political...campaign plan . The use of informants, sting operations, and undercover internal affairs officers to name the most salient means, is effective in
How to Prevent Type-Flaw Guessing Attacks on Password Protocols
2003-01-01
How to prevent type-flaw guessing attacks on password protocols∗ Sreekanth Malladi , Jim Alves-Foss Center for Secure and Dependable Systems...respectively. R Retagging 〈−(t, f),+(t′, f)〉. The retagging strand captures the concept of receiving a message of one type and sending it, with a claim of a...referrees for insightful comments. Thanks are also due to Ricardo Corin for many helpful technical discus- sions. References [AN94] M. Abadi and R
College that Serves New York's Finest Faces Deaths in a "Wartime" Atmosphere.
ERIC Educational Resources Information Center
Farrell, Elizabeth F.
2001-01-01
Describes how John Jay College of Criminal Justice, which serves many New York City police officers, is helping students and alumni at Ground Zero, location of the September 11, 2001 terrorist attacks on the World Trade Center. (EV)
Consensus-Based Cooperative Spectrum Sensing with Improved Robustness Against SSDF Attacks
NASA Astrophysics Data System (ADS)
Liu, Quan; Gao, Jun; Guo, Yunwei; Liu, Siyang
2011-05-01
Based on the consensus algorithm, an attack-proof cooperative spectrum sensing (CSS) scheme is presented for decentralized cognitive radio networks (CRNs), where a common fusion center is not available and some malicious users may launch attacks with spectrum sensing data falsification (SSDF). Local energy detection is firstly performed by each secondary user (SU), and then, utilizing the consensus notions, each SU can make its own decision individually only by local information exchange with its neighbors rather than any centralized fusion used in most existing schemes. With the help of some anti-attack tricks, each authentic SU can generally identify and exclude those malicious reports during the interactions within the neighborhood. Compared with the existing solutions, the proposed scheme is proved to have much better robustness against three categories of SSDF attack, without requiring any a priori knowledge of the whole network.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, James J.; Cook, Kristin A.
2005-05-09
Motivation Our country faces profound challenges that must be addressed in order to ensure our continued freedom and security. As the September 11, 2001, attacks on the Pentagon and World Trade Center illustrate, threats to the United States are present within our borders. On that day, after at least 20 months of planning and preparation, nineteen terrorists hijacked four airliners at three different airports in a coordinated attack. The hijackers crashed two planes into the World Trade Center’s twin towers and one plane into the Pentagon. The fourth plane, intended to attack another U.S. landmark, crashed in a field inmore » Pennsylvania. 2973 people lost their lives as a result of this attack. As the attack unfolded, government agencies and emergency response personnel had to respond in real time to situations for which policies and procedures did not exist. They were forced to assess situations and make decisions under extreme pressure, often without having critical information that would help them save additional lives. [National Commission on Terrorist Attacks, 2004]« less
2011-05-04
Nations General Assembly. China looks to secure the support and votes of these African states to help influence international politics moving forward. 1S...support and votes of th~se African states to help influence international politics moving forward. . . Conclusion: China’s declaration of their... international focus with the recognition of a new advei·sary. The attack on the World Trade Center brought telTorism to the forefront of the natiohal security
Palgi, Yuval; Shrira, Amit; Hamama-Raz, Yaira; Palgi, Sharon; Goodwin, Robin; Ben-Ezra, Menachem
2014-05-01
The present study examined whether recollections of the World Trade Center (WTC) terror attack and previous hurricanes moderated the relationship between exposure to Hurricane Sandy and related posttraumatic stress disorder (PTSD) symptoms. An online sample of 1000 participants from affected areas completed self-report questionnaires a month after Hurricane Sandy hit the East Coast of the United States. Participants reported their exposure to Hurricane Sandy, their PTSD symptoms, and recollections of the WTC terror attack and previous hurricanes elicited due to Hurricane Sandy. Exposure to Hurricane Sandy was related to PTSD symptoms among those with high level of recollections of the WTC terror attack and past hurricanes, but not among those with low level of recollections. The aftermath of exposure to Hurricane Sandy is related not only to exposure, but also to its interaction with recollections of past traumas. These findings have theoretical and practical implications for practitioners and health policy makers in evaluating and interpreting the impact of past memories on future natural disasters. This may help in intervention plans of social and psychological services. Copyright © 2014 Elsevier Inc. All rights reserved.
Infants, Toddlers, and Terror: Supporting Parents, Helping Children.
ERIC Educational Resources Information Center
Fenichel, Emily, Ed.
2002-01-01
"Zero to Three" is a single-focus bulletin of the National Center for Infants, Toddlers, and Families providing insight from multiple disciplines on the development of infants, toddlers, and their families. Responding to family needs in the wake of September 11, 2001 terrorist attacks, this issue focuses on infants, toddlers, and terror.…
Shamai, Michal
2005-06-01
This article describes research on the narratives of social workers who help terror victims, focusing on the relationship between the helpers' families and their work. Qualitative analysis of three training groups of social workers who are responsible for helping in the event of terror attacks in different parts of Israel, and of three debriefing groups for social workers after terror attacks, reveals that the helpers' families play a role in the narratives constructed by the helpers. Two main themes were identified. The first centers on the interaction between work and the family, and shows that in the situation of a terror attack, the conflict between the two disappears and the family often serves as a support system for the helpers. The second theme refers to the family dimension alone, and focuses on the dichotomy between vitality and loss. The way that family life events affect helpers'professional intervention is described. The findings are discussed in light of Conservation of Resources Theory, the fight-flight response to threat, and the concept of the family as a source of safety and risk taking.
Attacking a Dense Problem: A Learner-Centered Approach to Teaching Density
ERIC Educational Resources Information Center
Hitt, Austin M.
2005-01-01
Density is a difficult concept for students to learn because it is abstract and because it is derived from the concepts of mass and volume. The solution is to address density at each of the three levels of scientific understanding: macroscopic, particle/modeling, and symbolic. This article demonstrates how to help students gain a conceptual…
School Preparation to the Terrorist Threat. SVRC Fact Sheet
ERIC Educational Resources Information Center
School Violence Resource Center, 2004
2004-01-01
This fact sheet provides a list of "lessons learned" to assist schools in better preparing for a crisis event. The list was compiled by the Centers for Disease Control and Prevention and the U.S. Department of Education specifically to assist schools in preparing for a terrorist attack. The lessons can help schools better identify appropriate…
Wu, Ping; Duarte, Cristiane S.; Mandell, Donald J.; Fan, Bin; Liu, Xinhua; Fuller, Cordelia J.; Musa, George; Cohen, Michael; Cohen, Patricia; Hoven, Christina W.
2006-01-01
We examined exposure to the World Trade Center attack and changes in cigarette smoking and drinking among 2731 New York City public high-school students evaluated 6 months after the attack. Increased drinking was associated with direct exposure to the World Trade Center attack (P < .05). Increased smoking was not directly associated with exposure to the World Trade Center attack but was marginally significantly associated with posttraumatic stress disorder (P= .06). Our findings suggest that targeted substance-use interventions for youths may be warranted after large-scale disasters. PMID:16571705
Can Vitamins Help Prevent a Heart Attack?
... taking vitamins help prevent heart disease or a heart attack? Answers from Rekha Mankad, M.D. It's not yet clear ... risk of developing heart disease or having a heart attack. But, what is known is that no vitamin ...
The pancreas, a large gland that sits behind the stomach, produces enzymes that aid digestion and hormones that regulate blood sugar. Pancreatic cancer develops when cells that make up the ducts in the pancreas start to grow out of control. Udo Rudloff, M.D., is leading a clinical trial of a combination immunotherapy regimen to optimally help the immune system attack the tumor.
A new study published August 10, 2017, in Molecular Cell reveals how changes in the architecture of the nucleus can enable B lymphocytes to spring to action during an immune system attack and help fight infection. The discovery could lead scientists to a better understanding of how some tumor cells, especially blood cancer cells, make similar transitions from a dormant to an
Denisoff, Eilenna; Selby, Peter; Bagby, R Michael; Rudy, Laura
2005-01-01
Background Anxiety disorders are common problems that result in enormous suffering and economic costs. The efficacy of Web-based self-help approaches for anxiety disorders has been demonstrated in a number of controlled trials. However, there is little data regarding the patterns of use and effectiveness of freely available Web-based interventions outside the context of controlled trials. Objective To examine the use and longitudinal effectiveness of a freely available, 12-session, Web-based, cognitive behavioral therapy (CBT) program for panic disorder and agoraphobia. Methods Cumulative anonymous data were analyzed from 99695 users of the Panic Center. Usage statistics for the website were examined and a longitudinal survey of self-reported symptoms for people who registered for the CBT program was conducted. The primary outcome measures were self-reported panic-attack frequency and severity at the beginning of each session (sessions 2-12). Results Between September 1, 2002 and February 1, 2004, there were 484695 visits and 1148097 page views from 99695 users to the Panic Center. In that same time period, 1161 users registered for the CBT program. There was an extremely high attrition rate with only 12 (1.03%) out of 1161 of registered users completing the 12-week program. However, even for those who remained in the program less than 12 weeks we found statistically significant reductions (P<.002) in self-reported panic attack frequency and severity, comparing 2 weeks of data against data after 3, 6, or 8 weeks. For example, the 152 users completing only 3 sessions of the program reduced their average number of attacks per day from 1.03 (week 2) to 0.63 (week 3) (P<.001). Conclusions Freely available Web-based self-help will likely be associated with high attrition. However, for the highly self-selected group who stayed in the program, significant improvements were observed. PMID:15829479
The World Trade Center attack. Observations from New York's Bellevue Hospital.
Roccaforte, J D
2001-12-01
This report describes selected aspects of the response by Bellevue Hospital Center to the World Trade Center attack of 11 September 2001. The hospital is 2.5 miles (4 km) from the site of the attack. These first-hand observations and this analysis may aid in future preparations. Key issues described relate to communication, organization, injuries treated, staffing, and logistics.
Disaster Response on September 11, 2001 Through the Lens of Statistical Network Analysis.
Schweinberger, Michael; Petrescu-Prahova, Miruna; Vu, Duy Quang
2014-05-01
The rescue and relief operations triggered by the September 11, 2001 attacks on the World Trade Center in New York City demanded collaboration among hundreds of organisations. To shed light on the response to the September 11, 2001 attacks and help to plan and prepare the response to future disasters, we study the inter-organisational network that emerged in response to the attacks. Studying the inter-organisational network can help to shed light on (1) whether some organisations dominated the inter-organisational network and facilitated communication and coordination of the disaster response; (2) whether the dominating organisations were supposed to coordinate disaster response or emerged as coordinators in the wake of the disaster; and (3) the degree of network redundancy and sensitivity of the inter-organisational network to disturbances following the initial disaster. We introduce a Bayesian framework which can answer the substantive questions of interest while being as simple and parsimonious as possible. The framework allows organisations to have varying propensities to collaborate, while taking covariates into account, and allows to assess whether the inter-organisational network had network redundancy-in the form of transitivity-by using a test which may be regarded as a Bayesian score test. We discuss implications in terms of disaster management.
The World Trade Center Attack: Observations from New York's Bellevue Hospital
Roccaforte, J David
2001-01-01
This report describes selected aspects of the response by Bellevue Hospital Center to the World Trade Center attack of 11 September 2001. The hospital is 2.5 miles (4 km) from the site of the attack. These first-hand observations and this analysis may aid in future preparations. Key issues described relate to communication, organization, injuries treated, staffing, and logistics. PMID:11737913
A new study published August 10, 2017, in Molecular Cell reveals how changes in the architecture of the nucleus can enable B lymphocytes to spring to action during an immune system attack and help fight infection. The discovery could lead scientists to a better understanding of how some tumor cells, especially blood cancer cells, make similar transitions from a dormant to an active state. Read more. . .
CD8+ T Cells Need a Little Help(er) for Sustained Antitumor Response | Center for Cancer Research
The immune system comprises a powerful army of specialized cells and molecules that protect the body against invading foreign agents. For years, researchers have been trying to find a way to turn the wrath of the immune system against cancer. A significant amount of work related to cancer immunotherapy has focused on the potential of CD8+ cytotoxic T cells to attack and
Workplace response of companies exposed to the 9/11 World Trade Center attack: a focus-group study
North, Carol S.; Pfefferbaum, Betty; Hong, Barry A.; Gordon, Mollie R.; Kim, You-Seung; Lind, Lisa; Pollio, David E.
2014-01-01
The terrorist attacks of 11 September 2001 (9/11) left workplaces in pressing need of a mental health response capability. Unaddressed emotional sequelae may be devastating to the productivity and economic stability of a company’s workforce. In the second year after the attacks, 85 employees of five highly affected agencies participated in 12 focus groups to discuss workplace mental health issues. Managers felt ill prepared to manage the magnitude and the intensity of employees’ emotional responses. Rapid return to work, provision of workplace mental health services, and peer support were viewed as contributory to emotional recovery. Formal mental health services provided were perceived as insufficient. Drawing on their post-9/11 workplace experience, members of these groups identified practical measures that they found helpful in promoting healing outside of professional mental health services. These measures, consistent with many principles of psychological first aid, may be applied by workplace leaders who are not mental health professionals. PMID:23066661
Bouillet, Laurence; Boccon-Gibod, Isabelle; Launay, David; Gompel, Anne; Kanny, Gisele; Fabien, Vincent; Fain, Oliver
2017-03-01
The clinical characteristics and icatibant-treatment outcomes of patients with hereditary angioedema with normal C1 inhibitor (HAE-nC1 INH) are limited. We retrospectively analyzed data from French HAE patients enrolled in the Icatibant Outcome Survey registry (from July 2009 to September 2013) to compare disease characteristics and the effectiveness and safety of acute icatibant-treated angioedema attacks in patients with HAE-nC1 INH, HAE with C1 INH deficiency (type I), or dysfunction (type II). One center in Grenoble contributed 22 patients with HAE-nC1 INH and a family history of HAE while 15 centers across France contributed 153 patients with HAE type I and seven patients with HAE type II. Patients with HAE-nC1 INH compared to HAE type I, respectively, were more likely to be female (88.1% vs. 63.4%), older at median age of disease onset (21 years vs. 15 years), and have a greater rate of abdominal (80% vs. 61%) and laryngeal (23% vs. 14%) attacks. Icatibant was effective in both groups though the median time to resolution of attack was significantly longer in the HAE-nC1 INH group (20.0 h, 37 attacks) versus the HAE type I group (14.0 h, 67 attacks). Icatibant was self-administered for 96.1% of attacks in patients with HAE-nC1 INH and 75.8% in patients with HAE type I. No serious adverse side effects related to icatibant were reported. These data help further define the disease characteristics of HAE-nC1 INH in the French population and extend the limited data reporting the safe and effective use of icatibant in acute treatment of angioedema in French patients diagnosed with HAE-nC1 INH.
Boccon‐Gibod, Isabelle; Launay, David; Gompel, Anne; Kanny, Gisele; Fabien, Vincent; Fain, Oliver
2017-01-01
Abstract Introduction The clinical characteristics and icatibant‐treatment outcomes of patients with hereditary angioedema with normal C1 inhibitor (HAE‐nC1 INH) are limited. Methods We retrospectively analyzed data from French HAE patients enrolled in the Icatibant Outcome Survey registry (from July 2009 to September 2013) to compare disease characteristics and the effectiveness and safety of acute icatibant‐treated angioedema attacks in patients with HAE‐nC1 INH, HAE with C1 INH deficiency (type I), or dysfunction (type II). Results One center in Grenoble contributed 22 patients with HAE‐nC1 INH and a family history of HAE while 15 centers across France contributed 153 patients with HAE type I and seven patients with HAE type II. Patients with HAE‐nC1 INH compared to HAE type I, respectively, were more likely to be female (88.1% vs. 63.4%), older at median age of disease onset (21 years vs. 15 years), and have a greater rate of abdominal (80% vs. 61%) and laryngeal (23% vs. 14%) attacks. Icatibant was effective in both groups though the median time to resolution of attack was significantly longer in the HAE‐nC1 INH group (20.0 h, 37 attacks) versus the HAE type I group (14.0 h, 67 attacks). Icatibant was self‐administered for 96.1% of attacks in patients with HAE‐nC1 INH and 75.8% in patients with HAE type I. No serious adverse side effects related to icatibant were reported. Conclusions These data help further define the disease characteristics of HAE‐nC1 INH in the French population and extend the limited data reporting the safe and effective use of icatibant in acute treatment of angioedema in French patients diagnosed with HAE‐nC1 INH. PMID:28250922
Group Policy Reference Systems and Network Attack Center (SNAC)
2001-03-02
Policy Snap-in for a given Active Directory container . It is hoped that this map will alleviate some of the complexity in managing and understanding...help the reader locate specific policies within the Group Policy Snap-in for a given Active Directory container . It is hoped that this map will alleviate...Policy Snap-in for a given Active Directory container . It is hoped that this map will alleviate some of the complexity in managing and
Simulation of cyber attacks with applications in homeland defense training
NASA Astrophysics Data System (ADS)
Brown, Bill; Cutts, Andrew; McGrath, Dennis; Nicol, David M.; Smith, Timothy P.; Tofel, Brett
2003-09-01
We describe a tool to help exercise and train IT managers who make decisions about IP networks in the midst of cyber calamity. Our tool is interactive, centered around a network simulation. It includes various modes of communications one would use to make informed decisions. Our tool is capable of simulating networks with hundreds of components and dozens of players. Test indicate that it could support an exercise an order of magnitude larger and more complex.
ERIC Educational Resources Information Center
Tatar, Moshe; Amram, Sima; Kelman, Talia
2011-01-01
Exposure to terrorism poses a challenge for children and adolescents as well as parents. For many years, Israeli citizens have been exposed to ongoing terrorist attacks. The present article is aimed at revealing the reactions of Israeli parents when facing terrorist attacks and their perceptions regarding the help-seeking behaviours of their…
A Novel Network Attack Audit System based on Multi-Agent Technology
NASA Astrophysics Data System (ADS)
Jianping, Wang; Min, Chen; Xianwen, Wu
A network attack audit system which includes network attack audit Agent, host audit Agent and management control center audit Agent is proposed. And the improved multi-agent technology is carried out in the network attack audit Agent which has achieved satisfactory audit results. The audit system in terms of network attack is just in-depth, and with the function improvement of network attack audit Agent, different attack will be better analyzed and audit. In addition, the management control center Agent should manage and analyze audit results from AA (or HA) and audit data on time. And the history files of network packets and host log data should also be audit to find deeper violations that cannot be found in real time.
Altitude, Acute Mountain Sickness and Headache
... your migraine not only helps you reduce the frequency and intensity of your attacks, but can help ... learn more about your options for managing the frequency and symptoms of your attacks. “Nobody understands the ...
... it as instructed while awaiting emergency help. Take aspirin, if recommended. Taking aspirin during a heart attack could reduce heart damage by helping to keep your blood from clotting. Aspirin can interact with other medications, however, so don' ...
Gargano, Lisa M; Nguyen, Angela; DiGrande, Laura; Brackbill, Robert M
2016-09-01
Studies of individuals directly exposed to the World Trade Center (WTC) terrorist attacks of September 11, 2001 have found increased risk for post-traumatic stress disorder (PTSD) and binge drinking (BD). No long-term studies have been conducted on one highly exposed group, WTC tower evacuees. The study sample included 7,695 adult civilians in the WTC Health Registry. Logistic regression was used to examine the odds of PTSD and BD in 1,946 towers evacuees compared to 5,749 others in nearby buildings or on the street. WTC tower survivors were at increased risk for PTSD and BD compared to the others. Infrastructure and behavioral barriers experienced during evacuation were significantly associated with PTSD. WTC tower evacuees are at increased risk for PTSD and BD. Understanding the effects of disaster-related evacuation barriers on the long-term mental health status of survivors can help in the planning of continuing post-disaster treatment. Am. J. Ind. Med. 59:742-751, 2016. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
2004-06-09
KENNEDY SPACE CENTER, FLA. - At Cape Canaveral Air Force Station, KSC Firefighter Chris Maupin (left) watches as Lt. Keith Abell practices maneuvering apparatus on top of the firefighting vehicle with which they are able to direct the hoses to attack fires from above and below. The firefighters teamed up with task forces from Satellite Beach, Malabar, Melbourne, Palm Bay, Patrick Air Force Base and Brevard County to help fight wildfires in the Palm Bay and Malabar areas that threatened homes and property during the Memorial Day holiday weekend.
Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection
Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam
2015-01-01
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate. PMID:26295058
Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection.
Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam
2015-01-01
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.
Differentiating ictal panic with low-grade temporal lobe tumors from psychogenic panic attacks.
Ghods, Ali J; Ruban, Dmitry S; Wallace, David; Byrne, Richard W
2013-11-01
Indolent low-grade temporal lobe tumors may present with ictal panic that may be difficult to differentiate from psychogenic panic attacks. The current study aims to demonstrate the differences between the two disorders and help physicians generate a diagnostic paradigm. This was a retrospective study of 43 patients who underwent a temporal lobectomy between 1981 and 2008 for the treatment of intractable temporal lobe epilepsy secondary to low-grade neoplasms at Rush University Medical Center. A total of 10 patients in this group presented with ictal panic who were previously being treated for psychogenic panic attacks. Medical records were reviewed for age at seizure onset, duration of symptoms, lateralization of the epileptogenic zone, pathological diagnosis, and postsurgical seizure outcome according to the modified Engel classification. Neuropathologic findings of the 10 tumors were pleomorphic xanthoastrocytoma, ganglioglioma, oligodendroglioma, and dysembryoplastic neuroepithelial. The mean age of the patients undergoing surgery was 28 years (range, 15-49). The mean duration of panic symptoms prior to surgery was 9.8 years (range, 3-23). All patients had unprovoked ictal panic. None had symptoms suggestive of a brain tumor, such as signs of increased intracranial pressure or any focal neurologic deficit. In 5 of the patients, other symptoms associated with the ictal panic, including unusual sounds, nausea, automatism, uprising gastric sensation, and déjà vu were identified. Gross total resection of the lesion resulted in improved seizure outcome in all patients undergoing surgery. Patient follow-up was, on average, 7.4 years (range, 2-14) from time of surgery. Although similar, ictal panic from epilepsy and classic panic attacks are clinically distinguishable entities with different modalities of treatment. A careful history may help differentiate patients with ictal panic from those with psychogenic panic attacks and determine for which patients to obtain neuroimaging studies. © Copyright 2013 Physicians Postgraduate Press, Inc.
Workplace response of companies exposed to the 9/11 World Trade Center attack: a focus-group study.
North, Carol S; Pfefferbaum, Betty; Hong, Barry A; Gordon, Mollie R; Kim, You-Seung; Lind, Lisa; Pollio, David E
2013-01-01
The terrorist attacks of 11 September 2001 (9/11) left workplaces in pressing need of a mental health response capability. Unaddressed emotional sequelae may be devastating to the productivity and economic stability of a company's workforce. In the second year after the attacks, 85 employees of five highly affected agencies participated in 12 focus groups to discuss workplace mental health issues. Managers felt ill prepared to manage the magnitude and the intensity of employees' emotional responses. Rapid return to work, provision of workplace mental health services, and peer support were viewed as contributory to emotional recovery. Formal mental health services provided were perceived as insufficient. Drawing on their post-9/11 workplace experience, members of these groups identified practical measures that they found helpful in promoting healing outside of professional mental health services. These measures, consistent with many principles of psychological first aid, may be applied by workplace leaders who are not mental health professionals. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.
Development of mental health first aid guidelines for panic attacks: a Delphi study.
Kelly, Claire M; Jorm, Anthony F; Kitchener, Betty A
2009-08-10
Panic attacks are common, and while they are not life-threatening events, they can lead to the development of panic disorder and agoraphobia. Appropriate help at the time that a panic attack occurs may decrease the fear associated with the attack and reduce the risk of developing an anxiety disorder. However, few people have the knowledge and skills required to assist. Simple first aid guidelines may help members of the public to offer help to people who experience panic attacks. The Delphi method was used to reach consensus in a panel of experts. Experts included 50 professionals and 6 people who had experience of panic attacks and were active in mental health advocacy. Statements about how to assist someone who is having a panic attack were sourced through a systematic search of both professional and lay literature. These statements were rated for importance as first aid guidelines by the expert and consumer panels and guidelines were written using the items most consistently endorsed. Of 144 statements presented to the panels, 27 were accepted. These statements were used to develop the guidelines appended to this paper. There are a number of actions which are considered to be useful for members of the public to do if they encounter someone who is having a panic attack. These guidelines will be useful in revision of curricula of mental health first aid programs. They can also be used by members of the public who want immediate information about how to assist someone who is experiencing panic attacks.
Terrorism: Online Resources for Helping Students Understand and Cope.
ERIC Educational Resources Information Center
Green, Tim; Ramirez, Fred
2002-01-01
Presents an annotated bibliography of Web sites that focus on the issue of terrorism. Aims to assist teachers in educating their students and helping them cope with terrorism since the September 11, 2001 attack on the United States. Offers sites on other terrorist attacks on the U.S. (CMK)
A performance study of unmanned aerial vehicle-based sensor networks under cyber attack
NASA Astrophysics Data System (ADS)
Puchaty, Ethan M.
In UAV-based sensor networks, an emerging area of interest is the performance of these networks under cyber attack. This study seeks to evaluate the performance trade-offs from a System-of-Systems (SoS) perspective between various UAV communications architecture options in the context two missions: tracking ballistic missiles and tracking insurgents. An agent-based discrete event simulation is used to model a sensor communication network consisting of UAVs, military communications satellites, ground relay stations, and a mission control center. Network susceptibility to cyber attack is modeled with probabilistic failures and induced data variability, with performance metrics focusing on information availability, latency, and trustworthiness. Results demonstrated that using UAVs as routers increased network availability with a minimal latency penalty and communications satellite networks were best for long distance operations. Redundancy in the number of links between communication nodes helped mitigate cyber-caused link failures and add robustness in cases of induced data variability by an adversary. However, when failures were not independent, redundancy and UAV routing were detrimental in some cases to network performance. Sensitivity studies indicated that long cyber-caused downtimes and increasing failure dependencies resulted in build-ups of failures and caused significant degradations in network performance.
1977-06-01
defense missions in locations between the FEBA and the attackers’ targets; b) AAA can attack only aircraft attacking the guns them- selves or the targets...the guns are defending; c) SAM weapon systems can attack not only aircraft attack- ing them and the targets they defend but also, although possibly...Corporation), P.E. Louer (Department of the Army) and B.R. McEnany (Joint Chiefs of Staff/Studies, Analysis and Gaming Agency) for their help- ful
A Compilation of Necessary Elements for a Local Government Continuity of Operations Plan
2006-09-01
Community Resilience in the World Trade Center Attack (Newark: Univ. of Delaware, 2003), 4. 11 Subsequently, New York City developed a COOP after... Community Resilience , 4. 27 New York City Emergency Response Task Force, Enhancing New York City’s Emergency Preparedness A Report to Mayor Michael R...Elements of Community Resilience in the World Trade Center Attack. Disaster Research Center, Univ. of Delaware, Newark, DE, 2004. Walton, Matt S
Stem-Like Memory T Cells Are Discovered | Center for Cancer Research
T cells are the white blood cells that are the body’s first line of attack against foreign invaders. When designing immunotherapies to treat cancer the goal is to prolong the immune response of T cells a bit beyond what the body normally does when a bacterium or a virus is encountered. Nicholas P. Restifo, M.D., working with Luca Gattinoni, M.D., and other colleagues in CCR’s Surgery Branch recently discovered a subset within the human T cell population that may help clinicians to do just this.
National Counterterrorism Center: 2007 Report on Terrorism
2008-04-30
Approximately one half of the attacks in the NCTC database involve no loss of life. An attack that damages a pipeline and a car bomb attack that kills 100...rose by about 30 percent and 20 percent, respectively. Overall, suicide bombing attacks rose by about 50 percent and suicide car bombings about 40...January 2007, in Nukhaib, Al Anbar, Iraq, armed assailants in three cars attacked two buses transporting Shiite pilgrims back from the Hajj in Mecca to Al
DefenseLink Special: September 11, 2006
, when terrorists attacked the World Trade Center in New York and the Pentagon. | Story | Edmund G , Sept. 11, 2001, when he first heard of a plane hitting the World Trade Center. The first reports called , servicemembers share their memories of the Sept. 11, 2001, terror attacks when airliners hit New York's World
Center for Cancer Research investigators have discovered that some cancer cells catch immune signaling molecules called cytokines on their surfaces then slowly release the molecules. The results suggest that the immune system may exploit this weak spot to mount a prolonged attack on the tumor. Read more...
Cougar attacks on humans: a case report.
McKee, Denise
2003-01-01
Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.
Low speed aerodynamic characteristics of a lifting-body hypersonic research aircraft configuration
NASA Technical Reports Server (NTRS)
Penland, J. A.
1975-01-01
An experimental investigation of the low-speed longitudinal, lateral, and directional stability characteristics of a lifting-body hypersonic research airplane concept was conducted in a low-speed tunnel with a 12-foot (3.66-meter) octagonal test section at the Langley Research Center. The model was tested with two sets of horizontal and vertical tip controls having different planform areas, a center vertical tail and two sets of canard controls having trapezoidal and delta planforms, and retracted and deployed engine modules and canopy. This investigation was conducted at a dynamic pressure of 239.4 Pa (5 psf) (Mach number of 0.06) and a Reynolds number of 2 million based on the fuselage length. The tests were conducted through an angle-of-attack range of 0 deg to 30 deg and through horizontal-tail deflections of 10 deg to minus 30 deg. The complete configuration exhibited excessive positive static longitudinal stability about the design center-of-gravity location. However, the configuration was unstable laterally at low angles of attack and unstable directionally throughout the angle-of-attack range. Longitudinal control was insufficient to trim at usable angles of attack. Experiments showed that a rearward shift of the center of gravity and the use of a center-located vertical tail would result in a stable and controllable vehicle.
Drenckhan, I; Glöckner-Rist, A; Rist, F; Richter, J; Gloster, A T; Fehm, L; Lang, T; Alpers, G W; Hamm, A O; Fydrich, T; Kircher, T; Arolt, V; Deckert, J; Ströhle, A; Wittchen, H-U; Gerlach, A L
2015-06-01
Previous studies of the dimensional structure of panic attack symptoms have mostly identified a respiratory and a vestibular/mixed somatic dimension. Evidence for additional dimensions such as a cardiac dimension and the allocation of several of the panic attack symptom criteria is less consistent. Clarifying the dimensional structure of the panic attack symptoms should help to specify the relationship of potential risk factors like anxiety sensitivity and fear of suffocation to the experience of panic attacks and the development of panic disorder. In an outpatient multicentre study 350 panic patients with agoraphobia rated the intensity of each of the ten DSM-IV bodily symptoms during a typical panic attack. The factor structure of these data was investigated with nonlinear confirmatory factor analysis (CFA). The identified bodily symptom dimensions were related to panic cognitions, anxiety sensitivity and fear of suffocation by means of nonlinear structural equation modelling (SEM). CFA indicated a respiratory, a vestibular/mixed somatic and a cardiac dimension of the bodily symptom criteria. These three factors were differentially associated with specific panic cognitions, different anxiety sensitivity facets and suffocation fear. Taking into account the dimensional structure of panic attack symptoms may help to increase the specificity of the associations between the experience of panic attack symptoms and various panic related constructs.
Adams, Richard E; Boscarino, Joseph A
2011-01-01
Research suggests that perievent panic attacks--panic attacks in temporal proximity to traumatic events--are predictive of later mental health status, including the onset of depression. Using a community sample of New York City residents interviewed 1 year and 2 years after the World Trade Center Disaster, we estimated a structural equation model (SEM) using pre-disaster psychological status and post-disaster life events, together with psychosocial resources, to assess the relationship between perievent panic and later onset depression. Bivariate results revealed a significant association between perievent panic and both year-1 and year-2 depression. Results for the SEM, however showed that perievent panic was predictive of year-1 depression, but not year-2 depression, once potential confounders were controlled Year-2 stressors and year-2 psychosocial resources were the best predictors of year-2 depression onset. Pre-disaster psychological problems were directly implicated in year-1 depression, but not year-2 depression. We conclude that a conceptual model that includes pre- and post-disaster variables best explains the complex causal pathways between psychological status, stressor exposure, perievent panic attacks, and depression onset two years after the World Trade Center attacks.
He, Meilin; Devine, Laura; Zhuang, Jun
2018-02-01
The government, private sectors, and others users of the Internet are increasingly faced with the risk of cyber incidents. Damage to computer systems and theft of sensitive data caused by cyber attacks have the potential to result in lasting harm to entities under attack, or to society as a whole. The effects of cyber attacks are not always obvious, and detecting them is not a simple proposition. As the U.S. federal government believes that information sharing on cybersecurity issues among organizations is essential to safety, security, and resilience, the importance of trusted information exchange has been emphasized to support public and private decision making by encouraging the creation of the Information Sharing and Analysis Center (ISAC). Through a decision-theoretic approach, this article provides new perspectives on ISAC, and the advent of the new Information Sharing and Analysis Organizations (ISAOs), which are intended to provide similar benefits to organizations that cannot fit easily into the ISAC structure. To help understand the processes of information sharing against cyber threats, this article illustrates 15 representative information sharing structures between ISAC, government, and other participating entities, and provide discussions on the strategic interactions between different stakeholders. This article also identifies the costs of information sharing and information security borne by different parties in this public-private partnership both before and after cyber attacks, as well as the two main benefits. This article provides perspectives on the mechanism of information sharing and some detailed cost-benefit analysis. © 2017 Society for Risk Analysis.
Implications of the World Trade Center attack for the public health and health care infrastructures.
Klitzman, Susan; Freudenberg, Nicholas
2003-03-01
The September 11, 2001, attack on the World Trade Center had profound effects on the well-being of New York City. The authors describe and assess the strengths and weaknesses of the city's response to the public health, environmental/ occupational health, and mental health dimensions of the attack in the first 6 months after the event. They also examine the impact on the city's health care and social service system. The authors suggest lessons that can inform the development of a post-September 11th agenda for strengthening urban health infrastructures.
2002-09-06
To measure the psychological and emotional effects of the September 11, 2001, terrorist attacks on the World Trade Center (WTC), Connecticut, New Jersey, and New York added a terrorism module to their ongoing Behavioral Risk Factor Surveillance System (BRFSS). This report summarizes the results of the survey, which suggest widespread psychological and emotional effects in all segments of the three states' populations. The findings underscore the importance of collaboration among public health professionals to address the physical and emotional needs of persons affected by the September 11 attacks.
Implications of the World Trade Center Attack for the Public Health and Health Care Infrastructures
Klitzman, Susan; Freudenberg, Nicholas
2003-01-01
The September 11, 2001, attack on the World Trade Center had profound effects on the well-being of New York City. The authors describe and assess the strengths and weaknesses of the city’s response to the public health, environmental/ occupational health, and mental health dimensions of the attack in the first 6 months after the event. They also examine the impact on the city’s health care and social service system. The authors suggest lessons that can inform the development of a post–September 11th agenda for strengthening urban health infrastructures. PMID:12604481
2002-05-29
of the Budget, • New York City Partnership and Chamber of Commerce , Washington, DC 20548 Report Documentation Page Report Date 29MAY2002 Report Type...700R Impact of Terrorist Attacks on the World Trade Center 10 Eight Studies (cont’d) ! New York City Partnership and Chamber of Commerce , Economic...Center 29 Observations Observations The New York City Partnership and Chamber of Commerce study generated the most comprehensive estimates—direct and
Tian, Huawei; Zhao, Yao; Ni, Rongrong; Cao, Gang
2009-11-23
In a feature-based geometrically robust watermarking system, it is a challenging task to detect geometric-invariant regions (GIRs) which can survive a broad range of image processing operations. Instead of commonly used Harris detector or Mexican hat wavelet method, a more robust corner detector named multi-scale curvature product (MSCP) is adopted to extract salient features in this paper. Based on such features, disk-like GIRs are found, which consists of three steps. First, robust edge contours are extracted. Then, MSCP is utilized to detect the centers for GIRs. Third, the characteristic scale selection is performed to calculate the radius of each GIR. A novel sector-shaped partitioning method for the GIRs is designed, which can divide a GIR into several sector discs with the help of the most important corner (MIC). The watermark message is then embedded bit by bit in each sector by using Quantization Index Modulation (QIM). The GIRs and the divided sector discs are invariant to geometric transforms, so the watermarking method inherently has high robustness against geometric attacks. Experimental results show that the scheme has a better robustness against various image processing operations including common processing attacks, affine transforms, cropping, and random bending attack (RBA) than the previous approaches.
NASA Technical Reports Server (NTRS)
Stone, H. W.; Powell, R. W.
1985-01-01
A six degree of freedom simulation analysis was performed for the space shuttle orbiter during entry from Mach 8 to Mach 1.5 with realistic off nominal conditions by using the flight control systems defined by the shuttle contractor. The off nominal conditions included aerodynamic uncertainties in extrapolating from wind tunnel derived characteristics to full scale flight characteristics, uncertainties in the estimates of the reaction control system interaction with the orbiter aerodynamics, an error in deriving the angle of attack from onboard instrumentation, the failure of two of the four reaction control system thrusters on each side, and a lateral center of gravity offset coupled with vehicle and flow asymmetries. With combinations of these off nominal conditions, the flight control system performed satisfactorily. At low hypersonic speeds, a few cases exhibited unacceptable performances when errors in deriving the angle of attack from the onboard instrumentation were modeled. The orbiter was unable to maintain lateral trim for some cases between Mach 5 and Mach 2 and exhibited limit cycle tendencies or residual roll oscillations between Mach 3 and Mach 1. Piloting techniques and changes in some gains and switching times in the flight control system are suggested to help alleviate these problems.
Animals as sentinels of chemical terrorism agents: an evidence-based review.
Rabinowitz, Peter; Wiley, James; Odofin, Lynda; Wilcox, Matthew; Dein, F Joshua
2008-02-01
The goal of this systematic review was to identify evidence that animals could serve as sentinels of an attack with a chemical terrorism agent. The biomedical literature was systematically searched for evidence that wild or domestic animals exposed to certain chemical weapons of terrorism had either greater susceptibility, shorter latency period, or increased exposure risk versus humans. Additionally, we searched for documented reports of such animals historically serving as sentinels for chemical warfare agents. For a small number of agents, there was limited evidence that domestic and/or wild animals could provide sentinel information to humans following an airborne attack with chemical agents, usually related to increased potential for environmental exposure. Some of this evidence was based on anecdotal case reports, and in many cases high quality chemical terrorism agent evidence regarding comparative susceptibility, exposure, and latency between humans and sentinel animal species was not found. Currently, there is insufficient evidence for routine use of animals as sentinels for airborne chemical warfare agents. At the same time, Poison Center surveillance systems should include animal calls, and greater communication between veterinarians and physicians could help with preparedness for a chemical terrorism attack. Further analysis of comparative chemical warfare agent toxicity between sentinel animal species and humans is needed.
Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks
NASA Astrophysics Data System (ADS)
Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai
2017-09-01
Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.
Physical Attacks: An Analysis of Teacher Characteristics Using the Schools and Staffing Survey
ERIC Educational Resources Information Center
Williams, Thomas O., Jr.; Ernst, Jeremy V.
2016-01-01
This study investigated physical attacks as reported by public school teachers on the most recent Schools and Staffing Survey (SASS) from the National Center for Education Statistics administered by the Institute of Educational Sciences. For this study, characteristics of teachers who responded affirmatively to having been physically attacked in…
Developing Asthma-Friendly Childcare Centers with Online Training and Evaluation
Nowakowski, Alexandra Catherine Hayes; Carretta, Henry Joseph; Pineda, Nicole; Dudley, Julie Kurlfink; Forrest, Jamie R.
2016-01-01
In 2011, the Florida Asthma Coalition (FAC) began offering its Asthma-Friendly Childcare Center (AFCC) training online. This course teaches childcare center employees the fundamentals of effective asthma management. It covers basic asthma physiology, ways to recognize asthma attacks, techniques to help children experiencing attacks, and strategies to create healthy environments for asthmatics. A team of health services researchers evaluated both years of the online training. Evaluators used a quasi-experimental design with pretest, posttest, and follow-up assessment. Questions measured knowledge gain and retention, user satisfaction, and implementation of management strategies. Over 650 people from nearly all 67 Florida counties took AFCC training online between 2011 and 2013. Test scores improved by a minimum of 11% points in all program years evaluated. Gains in both knowledge and confidence were substantial and highly significant across years. While individual trainees did forget some content on follow-up, they seemed to retain the specific messages most relevant for their own workplaces. Most trainees also planned to implement multiple management strategies recommended by the training. A large majority of participants rated the training as excellent on all quality metrics, including relevance of content and time efficiency of the online format. Nearly all respondents perceived the training as useful for both providing improved care and fulfilling licensure or certification requirements. Many participants also indicated that their centers would pursue formal certification as AFCCs via the program offered by FAC. The online AFCC course performed strongly in its first years, yielding both high participant satisfaction and substantial improvement in workplace asthma management activity. This training holds promise for introducing and improving multidimensional asthma management strategies at childcare facilities nationwide. PMID:27014676
ERIC Educational Resources Information Center
Felix, Erika; Vernberg, Eric M.; Pfefferbaum, Rose L.; Gill, Dodie C.; Schorr, John; Boudreaux, Angela; Gurwitch, Robin H.; Galea, Sandro; Pfefferbaum, Betty
2010-01-01
Following terrorist events, teachers and nonteaching school personnel are important in helping children recover, yet little is known about their willingness to assist with this. We surveyed 399 employees from a Washington, D.C.-area school district following terror attacks (September 11, 2001, attacks; sniper shootings) about their exposure,…
NASA Technical Reports Server (NTRS)
Clark, L. E.; Richie, C. B.
1977-01-01
The hypersonic aerodynamic characteristics of an air-launched, delta-wing research aircraft concept were investigated at Mach 6. The effect of various components such as nose shape, wing camber, wing location, center vertical tail, wing tip fins, forward delta wing, engine nacelle, and speed brakes was also studied. Tests were conducted with a 0.021 scale model at a Reynolds number, based on model length, of 10.5 million and over an angel of attack range from -4 deg to 20 deg. Results show that most configurations with a center vertical tail have static longitudinal stability at trim, static directional stability at angles of attack up to 12 deg, and static lateral stability throughout the angle of attack range. Configurations with wing tip fins generally have static longitudinal stability at trim, have lateral stability at angles of attack above 8 deg, and are directionally unstable over the angle of attack range.
2004-06-09
KENNEDY SPACE CENTER, FLA. - At Cape Canaveral Air Force Station, Firefighter Chris Maupin (left) and Lt. Keith Abell demonstrate how the special aircraft firefighting vehicle (known as ARF) was used at the site of a recent fire in Brevard County, Fla. The firefighters sit inside the vehicle with a "driver" in the middle. They are able to direct the hoses to attack fires from above and below. The firefighters teamed up with task forces from Satellite Beach, Malabar, Melbourne, Palm Bay, Patrick Air Force Base and Brevard County to help fight wildfires in the Palm Bay and Malabar areas that threatened homes and property during the Memorial Day holiday weekend.
Level I center triage and mass casualties.
Hoey, Brian A; Schwab, C William
2004-05-01
The world has been marked by a recent series of high-profile terrorist attacks, including the attack of September 11, 2001, in New York City. Similar to natural disasters, these attacks often result in a large number of casualties necessitating triage strategies. The end of the twentieth century was marked by the development of trauma systems in the United States and abroad. By their very nature, trauma centers are best equipped to handle mass casualties resulting from natural and manmade disasters. Triage assessment tools and scoring systems have evolved to facilitate this triage process and to potentially reduce the morbidity and mortality associated with these events.
Deaths in World Trade Center terrorist attacks--New York City, 2001.
2002-09-11
On September 11, 2001, terrorists flew two hijacked airplanes into the World Trade Center (WTC) in lower Manhattan in New York City (NYC), destroying both towers of the WTC. This report presents preliminary vital statistics on the deaths caused by the terrorist attacks and describes the procedures developed by the New York City Department of Health and Mental Hygiene (NYCDOHMH) to issue death certificates in response to the attacks. These data underscore the need for legal mechanisms to expedite the issuance of death certificates in the absence of human remains and the need for vital registration systems that can be relocated in case of emergency.
Got Anxiety? Get Help: Tips for College Students
... anticipation of another panic attack and feelings of terror or impending doom Realistic fear of a threatening ... embarrassment or ridicule Panic Disorder: Severe attacks of terror, which may feel like you’re having a ...
ERIC Educational Resources Information Center
Edwards, Keith
2015-01-01
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…
Yu Wei; Michael Bevers; Erin J. Belval
2015-01-01
Initial attack dispatch rules can help shorten fire suppression response times by providing easy-to-follow recommendations based on fire weather, discovery time, location, and other factors that may influence fire behavior and the appropriate response. A new procedure is combined with a stochastic programming model and tested in this study for designing initial attack...
Somatotype, Level of Competition, and Performance in Attack in Elite Male Volleyball
Giannopoulos, Nikiforos; Vagenas, George; Noutsos, Konstantinos; Barzouka, Karolina; Bergeles, Nikolaos
2017-01-01
Abstract This study investigated the relationship between somatotype, level of competition, and performance in attack in elite level male volleyball players. The objective was to test for the potential covariation of competition level (Division A1 vs. A2) and playing position (hitters vs. centers vs. opposites) considering performance in attack. Anthropometric, body composition and somatotype variables were measured according to the Heath-Carter method. The attack actions of 144 players from 48 volleyball matches were analyzed and their performance was rated using a 5-point numerical scale. Results showed that players of Division A1 were taller, heavier, more muscular, and less endomorphic compared to those of Division A2. MANOVA and follow-up discriminant function analysis revealed somatotype differences among playing positions with centers and opposites being endomorph-ectomorph and hitters being central. Centers performed constantly better than hitters and opposites regardless of the division and somatotype. Multiple linear regression analysis showed that variables defining ectomorph and endomorph players, centers, and players of Division A1 significantly determined the relative performance superiority and were able to explain the variation in performance by almost 25%. These results could be taken into account by coaches when assigning players to particular playing positions or when designing individualized position-specific training programs. PMID:28828084
Somatotype, Level of Competition, and Performance in Attack in Elite Male Volleyball.
Giannopoulos, Nikiforos; Vagenas, George; Noutsos, Konstantinos; Barzouka, Karolina; Bergeles, Nikolaos
2017-09-01
This study investigated the relationship between somatotype, level of competition, and performance in attack in elite level male volleyball players. The objective was to test for the potential covariation of competition level (Division A1 vs. A2) and playing position (hitters vs. centers vs. opposites) considering performance in attack. Anthropometric, body composition and somatotype variables were measured according to the Heath-Carter method. The attack actions of 144 players from 48 volleyball matches were analyzed and their performance was rated using a 5-point numerical scale. Results showed that players of Division A1 were taller, heavier, more muscular, and less endomorphic compared to those of Division A2. MANOVA and follow-up discriminant function analysis revealed somatotype differences among playing positions with centers and opposites being endomorph-ectomorph and hitters being central. Centers performed constantly better than hitters and opposites regardless of the division and somatotype. Multiple linear regression analysis showed that variables defining ectomorph and endomorph players, centers, and players of Division A1 significantly determined the relative performance superiority and were able to explain the variation in performance by almost 25%. These results could be taken into account by coaches when assigning players to particular playing positions or when designing individualized position-specific training programs.
American hospitals react to terrorist attacks with determination.
Rees, T
2001-01-01
In this timely special section, editor Tom Rees recounts some of the swift, supportive actions health care providers took in response to the Sept. 11 terrorist attacks on the World Trade Center and the Pentagon.
An entangling-probe attack on Shor's algorithm for factorization
NASA Astrophysics Data System (ADS)
Azuma, Hiroo
2018-02-01
We investigate how to attack Shor's quantum algorithm for factorization with an entangling probe. We show that an attacker can steal an exact solution of Shor's algorithm outside an institute where the quantum computer is installed if he replaces its initialized quantum register with entangled qubits, namely the entangling probe. He can apply arbitrary local operations to his own probe. Moreover, we assume that there is an unauthorized person who helps the attacker to commit a crime inside the institute. He tells garbage data obtained from measurements of the quantum register to the attacker secretly behind a legitimate user's back. If the attacker succeeds in cracking Shor's algorithm, the legitimate user obtains a random answer and does not notice the attacker's illegal acts. We discuss how to detect the attacker. Finally, we estimate a probability that the quantum algorithm inevitably makes an error, of which the attacker can take advantage.
Epidemics of panic during a bioterrorist attack--a mathematical model.
Radosavljevic, Vladan; Radunovic, Desanka; Belojevic, Goran
2009-09-01
A bioterrorist attacks usually cause epidemics of panic in a targeted population. We have presented epidemiologic aspect of this phenomenon as a three-component model--host, information on an attack and social network. We have proposed a mathematical model of panic and counter-measures as the function of time in a population exposed to a bioterrorist attack. The model comprises ordinary differential equations and graphically presented combinations of the equations parameters. Clinically, we have presented a model through a sequence of psychic conditions and disorders initiated by an act of bioterrorism. This model might be helpful for an attacked community to timely and properly apply counter-measures and to minimize human mental suffering during a bioterrorist attack.
The San Bernardino, California, Terror Attack: Two Emergency Departments' Response.
Lee, Carol; Walters, Elizabeth; Borger, Rodney; Clem, Kathleen; Fenati, Gregory; Kiemeney, Michael; Seng, Sakona; Yuen, Ho-Wang; Neeki, Michael; Smith, Dustin
2016-01-01
On December 2, 2015, a terror attack in the city of San Bernardino, California killed 14 Americans and injured 22 in the deadliest attack on U.S. soil since September 11, 2001. Although emergency personnel and law enforcement officials frequently deal with multi-casualty incidents (MCIs), what occurred that day required an unprecedented response. Most of the severely injured victims were transported to either Loma Linda University Medical Center (LLUMC) or Arrowhead Regional Medical Center (ARMC). These two hospitals operate two designated trauma centers in the region and played crucial roles during the massive response that followed this attack. In an effort to shed a light on our response to others, we provide an account of how these two teaching hospitals prepared for and coordinated the medical care of these victims. In general, both centers were able to quickly mobilize large number of staff and resources. Prior disaster drills proved to be invaluable. Both centers witnessed excellent teamwork and coordination involving first responders, law enforcement, administration, and medical personnel from multiple specialty services. Those of us working that day felt safe and protected. Although we did identify areas we could have improved upon, including patchy communication and crowd-control, they were minor in nature and did not affect patient care. MCIs pose major challenges to emergency departments and trauma centers across the country. Responding to such incidents requires an ever-evolving approach as no two incidents will present exactly alike. It is our hope that this article will foster discussion and lead to improvements in management of future MCIs.
Exposure to Trauma and Separation Anxiety in Children after the WTC Attack
ERIC Educational Resources Information Center
Hoven, Christina W.; Duarte, Cristiane S.; Wu, Ping; Erickson, Elizabeth A.; Musa, George J.; Mandell, Donald J.
2004-01-01
The impact of exposure to the World Trade Center attack on children presenting separation anxiety disorder (SAD) 6 months after the attack was studied in a representative sample of New York City public school students (N = 8,236). Probable SAD occurred in 12.3% of the sample and was more frequent in girls, young children, and children who…
2013-09-01
attacker can acquire and use against a wireless infrastructure. Wireless attack tool kits such as the “ Raspberry – PI ” (shown in Figure 10), and...still use a tool such as the Raspberry – PI to perform attacks against a network from outside the controlled area or even inside the controlled area...when considering an insider attack. Figure 10. (From www.howtodocomputing.blogspot.com, n.d.) Wireless – PI is “a collection of pre-configured
Who can I trust? Extended fear during and after the Utøya terrorist attack.
Filkuková, Petra; Hafstad, Gertrud Sofie; Jensen, Tine K
2016-07-01
The aim of the study was to investigate specific peritraumatic reactions among adolescent and young adult survivors of the 2011 terrorist attack on Utøya Island, Norway. The authors focused specifically on a phenomenon that has so far not been thoroughly investigated: fear of nondangerous stimuli ("extended fear") during and immediately after the traumatic event. In total, 325 survivors of the shooting on Utøya Island were interviewed 4-5 months after the attack and provided a free narrative of the event. Posttraumatic stress symptoms were assessed using the UCLA PTSD Reaction Index; depression and anxiety were assessed using HSCL-8. For the purpose of the current study, the authors chose participants who were under the age of 26 at the time of the terrorist attack (M = 18.4 years), which constituted the vast majority of the total sample (93%). The authors found that 54% of the sample felt threatened during and immediately after the attack, not only by the perpetrator himself, but by other people as well; in most cases by people who came to help them (medical personnel, policemen, volunteers). The participants who mentioned experiencing extended fear in their trauma narratives had significantly higher scores of posttraumatic stress symptoms, anxiety, and depression 5 months after the attack than participants who did not peritraumatically experience extended fear. Early detection of extended fear can help in identifying individuals who will later develop symptomatology. In addition, knowledge of the phenomenon could help policemen and medical personnel understand survivors' seemingly irrational reactions. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
An academic medical center's response to widespread computer failure.
Genes, Nicholas; Chary, Michael; Chason, Kevin W
2013-01-01
As hospitals incorporate information technology (IT), their operations become increasingly vulnerable to technological breakdowns and attacks. Proper emergency management and business continuity planning require an approach to identify, mitigate, and work through IT downtime. Hospitals can prepare for these disasters by reviewing case studies. This case study details the disruption of computer operations at Mount Sinai Medical Center (MSMC), an urban academic teaching hospital. The events, and MSMC's response, are narrated and the impact on hospital operations is analyzed. MSMC's disaster management strategy prevented computer failure from compromising patient care, although walkouts and time-to-disposition in the emergency department (ED) notably increased. This incident highlights the importance of disaster preparedness and mitigation. It also demonstrates the value of using operational data to evaluate hospital responses to disasters. Quantifying normal hospital functions, just as with a patient's vital signs, may help quantitatively evaluate and improve disaster management and business continuity planning.
Osinubi, Omowunmi Y O; Gandhi, Sampada K; Ohman-Strickland, Pamela; Boglarsky, Cheryl; Fiedler, Nancy; Kipen, Howard; Robson, Mark
2008-02-01
To assess if organizational factors are predictors of workers' health and productivity after the World Trade Center attacks. We conducted a survey of 750 workers and compared those who had direct exposures to the World Trade Center attacks (south of Canal Street workers; primary victims) with those less directly exposed (north of Canal Street workers; other victims and non-victims). South of Canal Street workers reported headache more frequently than north of Canal Street workers did (P = 0.0202). Primary victims reported headache and cough more frequently than did other victims and non-victims (P = 0.0086 and 0.0043, respectively). Defensive organizational culture was an independent predictor of cough and job stress, and job stress was an independent predictor of on-the-job productivity losses. Organizational variables may modify health and productivity outcomes after a large-scale traumatic event in the workplace.
Mental health impact of the World Trade Center attacks on displaced Chinese workers.
Thiel de Bocanegra, Heike; Brickman, Ellen
2004-02-01
To identify psychological sequelae of the World Trade Center attacks in immigrant Chinese displaced workers, we interviewed 77 displaced workers in May 2002. One third of the sample was classified as at least moderately depressed, and 21% met diagnostic criteria for posttraumatic stress disorder; however, few had utilized mental health services. Depression and PTSD scores were positively correlated with age, age at immigration to the United States, and prescription drug use after September 11th, among other variables. Results suggest the need for mental health outreach in this community. This outreach should target both displaced workers and their informal support networks to facilitate identification of and service access for those impacted by the attacks.
Matthew Hansen, E; Steven Munson, A; Blackford, Darren C; Wakarchuk, David; Scott Baggett, L
2016-10-01
We tested lethal trap trees and repellent semiochemicals as area treatments to protect host trees from spruce beetle (Dendroctonus rufipennis Kirby) attacks. Lethal trap tree treatments ("spray treatment") combined a spruce beetle bait with carbaryl treatment of the baited spruce. Repellent treatments ("spray-repellent") combined a baited lethal trap tree within a 16-m grid of MCH (3-methylcyclohex-2-en-1-one) and two novel spruce beetle repellents. After beetle flight, we surveyed all trees within 50 m of plot center, stratified by 10-m radius subplots, and compared attack rates to those from baited and unbaited control plots. Compared to the baited controls, spruce in the spray treatment had significantly reduced likelihood of a more severe attack classification (e.g., mass-attacked over strip-attacked or unsuccessful-attacked over unattacked). Because spruce in the spray treatment also had significantly heightened probability of more severe attack classification than those in the unbaited controls, however, we do not recommend lethal trap trees as a stand-alone beetle suppression strategy for epidemic beetle populations. Spruce in the spray-repellent treatment were slightly more likely to be classified as more severely attacked within 30 m of plot center compared to unbaited controls but, overall, had reduced probabilities of beetle attack over the entire 50-m radius plots. The semiochemical repellents deployed in this study were effective at reducing attacks on spruce within treated plots despite the presence of a centrally located spruce beetle bait. Further testing will be required to clarify operational protocols such as dose, elution rate, and release device spacing. Published by Oxford University Press on behalf of Entomological Society of America 2016. This work is written by US Government employees and is in the public domain in the US.
Harvey-Vera, Alicia Yolanda; González-Zúñiga, Patricia; Vargas-Ojeda, Adriana Carolina; Medina-Mora, Maria Elena; Magis-Rodríguez, Carlos Leonardo; Wagner, Karla; Strathdee, Steffanie Anne; Werb, Daniel
2016-01-26
In 2009, Mexico reformed its health law to partially decriminalize drug possession considered for personal use and to increase mandatory referrals to certified drug rehabilitation centers in lieu of incarceration. Concurrently, news media reported violent attacks perpetrated by drug cartels against Mexican drug rehabilitation centers and instances of human rights violations by staff against people who inject drugs (PWID) in treatment. In many cases, these violent situations took place at "Peer Support" (Ayuda Mutua) drug rehabilitation centers that house a large number of drug-dependent PWID. In an effort to understand barriers to treatment uptake, we examined prevalence and correlates of perceived risk of violence at drug rehabilitation centers among PWID in Tijuana, Mexico. Secondary analysis of baseline data collected between March 2011 and May 2013 of PWID recruited into a prospective cohort study in Tijuana. Interviewer-administered surveys measured perceived risk of violence at drug rehabilitation centers by asking participants to indicate their level of agreement with the statement "going to rehabilitation puts me at risk of violence". Logistic regression was used to examine factors associated with perceived risk of violence. Of 733 PWID, 34.5 % perceived risk of violence at drug rehabilitation centers. In multivariate analysis, reporting ever having used crystal methamphetamine and cocaine (separately), having a great or urgent need to get help for drug use, and ever receiving professional help for drug/alcohol use were negatively associated with perceived risk of violence at drug rehabilitation centers, while having been told by law enforcement that drug rehabilitation attendance is mandatory was positively associated with perceived risk of violence. All associations were significant at a 0.05 alpha level. The perception of violence at drug rehabilitation centers among PWID does not represent the lived experience of those PWID who attended professionalized services, reported a great or urgent need to get help for their drug use and had a history of using crystal and cocaine. Professionalizing service delivery and engaging law enforcement in their new role of decriminalization and service referral for PWID could address the perceptions of violence at drug rehabilitation centers. Similarly, health authorities should expand periodic inspections at drug rehabilitation centers to guarantee quality service provision and minimize PWIDs' concerns about violence.
Panic Disorder in Children and Adolescents
... child and adolescent psychiatrist should be obtained. Several types of treatment are effective. Specific medications may stop panic attacks. Psychotherapy may also help the child and family learn ways to reduce stress or conflict that could otherwise cause a panic attack. With ...
Dynamic defense and network randomization for computer systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.
The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissancemore » stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.« less
Morber, M; Bartels, A; Erhard, M H
2013-01-01
The owner of a 6-months-old tomcat came to seek help because the cat had attacked her face on a near-daily basis. Through a detailed behavioural history, the cat's behaviour was diagnosed as human-directed predatory attack behaviour, play-related aggression and reduced motor as well as emotional self-control. Within a few weeks, behavioural therapy produced a significant improvement. After 5 months of therapy, the cat showed neither predatory attacks nor inappropriately rough or aggressive behaviour in play towards its owner or other humans.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chu, Tsong-Lun; Varuttamaseni, Athi; Baek, Joo-Seok
This paper provides an approach for developing potential attacks on I and C systems of NPPs and assessing their consequences. An important concept is that the NPPs were not designed to cope with Stuxnet-type of attacks (and any other cyber attacks). That is, the plants were only designed for design basis accidents. The safety margins and redundancies built in the design are all based on design basis accidents. They may be helpful in mitigating cyberattacks, but may not be adequate.
Sick-leave and help seeking among rescue workers after the terror attacks in Norway, 2011.
Gjerland, Astrid; Pedersen, May Janne Botha; Ekeberg, Øivind; Skogstad, Laila
2015-12-01
Several studies have addressed psychological problems after terror attacks, especially among victims. Fewer have addressed possible health consequences among rescue workers involved with terror attacks. This study's aim was to investigate the levels of sick-leave and psychological help seeking among rescue workers involved in the terror attacks in Norway on July 22, 2011, and to identify associations between sick-leave and background-, exposure- and work-related variables. This cross-sectional study included five groups of professional rescue personnel and one group of unaffiliated volunteers. The questionnaire was distributed approximately 10 months after the terror attacks, with a response rate of 61.3 % (N = 1790). A total of 9.7 % of participants self-reported sick-leave. The rate varied from 2.4 % among police officers to 14.5 % among unaffiliated volunteers, p < .001. There were 0.0-1.2 % of the professionals who were on sick-leave for more than 2 weeks and 5.5 % among the unaffiliated volunteers. More unaffiliated volunteers (42.6 %) and psychosocial personnel (16.3 %) consulted a psychologist or psychiatrist compared to other groups (3-9 %), p < .001. General healthcare providers (OR 6.1), psychosocial personnel (OR 6.3) and unaffiliated volunteers (OR 5.7) were associated with sick-leave, together with unwanted stress reactions (OR 1.6) and starting work on July 22 (OR 1.6). A small minority of professional rescue workers reported sick-leave for more than 2 weeks, and few had sought psychological help. Unaffiliated volunteers reported more stress symptoms, longer sick-leave duration and more psychological help seeking. This group may benefit from more support.
NASA Technical Reports Server (NTRS)
Stone, H. W.; Powell, R. W.
1984-01-01
A six-degree-of-freedom simulation analysis has been performed for the Space Shuttle Orbiter during entry from Mach 10 to 2.5 with realistic off-nominal conditions using the entry flight control system specified in May 1978. The off-nominal conditions included the following: (1) aerodynamic uncertainties, (2) an error in deriving the angle of attack from onboard instrumentation, (3) the failure of two of the four reaction control-system thrusters on each side, and (4) a lateral center-of-gravity offset. With combinations of the above off-nominal conditions, the control system performed satisfactorily with a few exceptions. The cases that did not exhibit satisfactory performance displayed the following main weaknesses. Marginal performance was exhibited at hypersonic speeds with a sensed angle-of-attack error of 4 deg. At supersonic speeds the system tended to be oscillatory, and the system diverged for several cases because of the inability to hold lateral trim. Several system modifications were suggested to help solve these problems and to maximize safety on the first flight: alter the elevon-trim and speed-brake schedules, delay switching to rudder trim until the rudder effectiveness is adequate, and reduce the overall rudder loop gain. These and other modifications were incorporated in a flight-control-system redesign in May 1979.
NASA Astrophysics Data System (ADS)
Huyck, Charles K.; Adams, Beverley J.; Kehrlein, David I.
2003-06-01
Remote sensing technology has been widely recognized for contributing to emergency response efforts after the World Trade Center attack on September 11th, 2001. The need to coordinate activities in the midst of a dense, yet relatively small area, made the combination of imagery and mapped data strategically useful. This paper reviews the role played by aerial photography, satellite imagery, and LIDAR data at Ground Zero. It examines how emergency managers utilized these datasets, and identifies significant problems that were encountered. It goes on to explore additional ways in which imagery could have been used, while presenting recommendations for more effective use in future disasters and Homeland Security applications. To plan adequately for future events, it was important to capture knowledge from individuals who responded to the World Trade Center attack. In recognition, interviews with key emergency management and geographic information system (GIS) personnel provide the basis of this paper. Successful techniques should not be forgotten, or serious problems dismissed. Although widely used after September 11th, it is important to recognize that with better planning, remote sensing and GIS could have played an even greater role. Together with a data acquisition timeline, an expanded discussion of these issues is available in the MCEER/NSF report “Emergency Response in the Wake of the World Trade Center Attack; The Remote Sensing Perspective” (Huyck and Adams, 2002)
Report from Ground Zero: How geoscientists aid in the aftermath of environmental disasters
Plumlee, Geoffrey S.
2009-01-01
People around the world remember when they first learned of the attacks on New York City’s World Trade Center towers on Sept. 11, 2001. For me, the memories are vivid — my feelings of shock, horror and sadness were similarly etched on the faces of all the attendees of a mining and the environment workshop in Buenos Aires, Argentina, where I was speaking. At that time, I had no idea that our small research group at the U.S. Geological Survey in Denver, Colo., would soon be called upon to help public officials understand the potential health and environmental implications of the disaster and the ensuing rescue, recovery and cleanup efforts.
NASA Astrophysics Data System (ADS)
Liu, Penghui; Liu, Jing
2017-08-01
Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.
Fourth High Alpha Conference, volume 2
NASA Technical Reports Server (NTRS)
1994-01-01
The goal of the Fourth High Alpha Conference, held at the NASA Dryden Flight Research Center on July 12-14, 1994, was to focus on the flight validation of high angle of attack technologies and provide an in-depth review of the latest high angle of attack activities. Areas that were covered include high angle of attack aerodynamics, propulsion and inlet dynamics, thrust vectoring, control laws and handling qualities, and tactical utility.
NASA Involvement in National Priority Support for Disasters
NASA Technical Reports Server (NTRS)
McGregor, Lloyd
2002-01-01
This viewgraph presentation provides an overview of the role NASA remote sensing played in planning recovery operations in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. The presentation includes AVIRIS and satellite imagery of the attack sites, and photographs taken on the ground after the attacks. One page of the presentation addresses NASA's role in disaster management of the 2002 Winter Olympics.
Fuzzy Expert System for Heart Attack Diagnosis
NASA Astrophysics Data System (ADS)
Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan
2017-08-01
Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.
The Aerodynamic Performance of the 24 Inch Houck Configuration
2007-03-01
a reference center of gravity for the aircraft must be picked . For the data reduction in this study, the center of gravity was placed at the...30 mph (Re ≈ 125K) for three different angles of attack of interest. An angle of attack of -2º was picked because lift was approximately zero at...likely be reduced with a more tapered trailing edge. The normalized turbulent kinetic energy reaches a peak value of approximately 0.012. The u
ERIC Educational Resources Information Center
Kristiansen, Aslaug
2015-01-01
The analysis is based on some moral experiences taking place during a terrorist attack on the Norwegian Labor Party's youth camp on the island of Utøya (outside of Oslo) July 22, 2011, where 69 young people were killed and several seriously injured. After the attack many of the survivors told stories of how strangers spontaneous had helped and…
A Simulation on Organizational Communication Patterns During a Terrorist Attack
2008-06-01
and the Air Support Headquarters. The call is created at the time of attack, and it automatically includes a request for help. Reliability of...communication conditions. 2. Air Support call : This call is produced for just the Headquarters of Air Component, only in case of armed attacks. The request can...estimated speed of armored vehicles in combat areas (West-Point Organization, 2002). When a call for air support is received, an information
2014-06-16
SCADA systems. These professionals should be aware of the vulnerabilities so they can take intelligent precautions to mitigate attacks. SCADA...vulnerabilities • Describe mitigation options for protecting a system from SCADA attacks For students that go on to pursue a degree in Computer...from SCADA attacks For students who do not remain in the IT realm, this introduction provides an awareness to help them mitigate threats for their
The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks
Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea
2016-01-01
Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379
Acute Therapy: Why Not Over-The-Counter or Other Nonspecific Options?
... gatherings or canceling plans with friends, but open communication will help all parties understand that it’s not ... your migraine not only helps you reduce the frequency and intensity of your attacks, but can help ...
DiGrande, Laura; Neria, Yuval; Brackbill, Robert M; Pulliam, Paul; Galea, Sandro
2011-02-01
Although the September 11, 2001, terrorist attacks were the largest human-made disaster in US history, there is little extant research documenting the attacks' consequences among those most directly affected, that is, persons who were in the World Trade Center towers. Data from a cross-sectional survey conducted 2-3 years after the attacks ascertained the prevalence of long-term, disaster-related posttraumatic stress symptoms and probable posttraumatic stress disorder (PTSD) in 3,271 civilians who evacuated World Trade Center towers 1 and 2. Overall, 95.6% of survivors reported at least 1 current posttraumatic stress symptom. The authors estimated the probable rate of PTSD at 15.0% by using the PTSD Checklist. Women and minorities were at an increased risk of PTSD. A strong inverse relation with annual income was observed. Five characteristics of direct exposure to the terrorist attacks independently predicted PTSD: being on a high floor in the towers, initiating evacuation late, being caught in the dust cloud that resulted from the tower collapses, personally witnessing horror, and sustaining an injury. Working for an employer that sustained fatalities also increased risk. Each addition of an experience of direct exposure resulted in a 2-fold increase in the risk of PTSD (odds ratio = 2.09, 95% confidence interval: 1.84, 2.36). Identification of these risk factors may be useful when screening survivors of large-scale terrorist events for long-term psychological sequelae.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ackerman, G; Bale, J; Moran, K
Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attackmore » chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4) the refinement of the DECIDe--the Determinants Effecting Critical Infrastructure Decisions--analytical framework to make the factors and dynamics identified by the study more ''usable'' in future efforts to assess terrorist intentions to target chemical-related infrastructure.« less
September 11, 2001. A CEO's story.
Greenberg, Jeffrey W
2002-10-01
On the day of the terrorist attacks on New York's World Trade Center, 1,779 employees of Marsh & McLennan Companies had office space in the twin towers, and another 129 were visiting that day. From his office at MMC headquarters in midtown, CEO Jeffrey Greenberg watched in horror as the second plane hit. By the time the towers fell, he had gathered a team of his colleagues to begin to outline how the company would respond. In this first-person account, Greenberg relates what it was like to manage through the unimaginable. The needs of MMC's people, and the families of employees who perished, took top priority. In the midst of chaos and unforeseeable problems, Greenberg and his colleagues improvised ways of communicating and assembled a broad-based program of support. Help appeared from all sides, from people of various ranks, titles, and functional expertise within MMC as well as past chairmen, outside directors, and retired executives. An emergency communications center was immediately set up at MMC headquarters and became a centralized location for messages and information and a memorial to colleagues lost in the attacks. The company arranged for grief counselors and established a family assistance center and a Family Relationship Management Program for those who had lost MMC employees. It has also provided families with access to long-term psychological and financial counseling. At the same time, Greenberg offers lessons about leadership, company culture, and adaptability. He and his colleagues held responsibility for a business beset by operational destruction and financial losses and facing dramatically changed market conditions. Their resolve was not simply to keep it on course but to come back stronger than ever.
DOT National Transportation Integrated Search
2012-05-01
The terrorist attacks on September 11th, as well as other coordinated attacks on transit centers in Madrid and London, have underscored the importance of evacuation planning to : transportation professionals. With computer technology advancement, urb...
Confronting the bomber: coping at the site of previous terror attacks.
Strous, Rael D; Mishaeli, Nurit; Ranen, Yaniv; Benatov, Joy; Green, Dovid; Zivotofsky, Ari Z
2007-03-01
Terror exposure has become commonplace in Israel, with civilians needing to develop appropriate coping mechanisms. This study investigated coping mechanisms of those who are able to return to leisure activity at sites of previous terror attacks. A specially designed questionnaire, exploring knowledge of the terror event, previous terror exposure, coping mechanisms, state of anxiety, and mood, was administered to 93 restaurant attendees at sites of well-known recent terror attacks (2001-2005). Most respondents were aware of the previous terror attack (92.3%) and most reported no fear at revisiting (70.3%), with 20.9% reporting some anxiety and 5.5% reporting moderate or severe anxiety. Sixty percent reported that they have no fear that a terror attack will reoccur at the same place. Some (27.7%) reported change in practices or decrease in one or more activity, especially use of public transport (18%). The most helpful reported resource for facilitating stress coping following a suicide bombing was to "call or be in touch with friends or relatives," and least helpful was "medicines." Over half of respondents (53%) reported that the current security climate affected their mood. Older individuals and females were more affected by terror events. Study observations confirm that resilience develops in the general population in response to ongoing terror attacks. Response to terror is heterogeneous with a range of coping mechanisms expressed.
Walter Reed Army Medical Center's mental health response to the Pentagon attack.
Cozza, Stephen J; Huleatt, William J; James, Larry C
2002-09-01
The September 11 terrorist attack on the Pentagon captured the attention and concern of America as well as the world. Given the extent of devastation, and the number of deaths at the Pentagon, it was believed that the uniformed mental health services would serve a pivotal role in the recovery and relief efforts. This article provides a synopsis of the complex and multidisciplinary mental health services provided by Walter Reed Army Medical Center in the wake of the September 11 attack on the Pentagon. This article offers an overview of the functions and roles of mental health team members, describes a constellation of services rendered, and describes how missions differed inside and outside of the Pentagon. Additionally, the authors provide the reader with how services were provided at the Family Assistance Center to family members of those killed during the attack. Liaison with civilian medical, mental health, and relief agencies and facilities will be discussed as well. The mental health response was an intensive and complicated experience and has yielded many lesson learned. To this end, the authors will provide the reader with an understanding of how the lessons learned during this mission may assist mental health commanders and leaders in planning and responding to similar deployments in the future.
Gong, Jie; Chen, Xinguang; Li, Sijian
2015-01-01
To evaluate the efficacy of the program Keep Moving toward Healthy Heart and Healthy Brain (KM2H2) in encouraging physical activities for the prevention of heart attack and stroke among hypertensive patients enrolled in the Community-Based Hypertension Control Program (CBHCP). Cluster randomized controlled trial with three waves of longitudinal assessments at baseline, 3 and 6 months post intervention. Community-based and patient-centered self-care for behavioral intervention in urban settings of China. A total of 450 participants diagnosed with hypertension from 12 community health centers in Wuhan, China were recruited, and were randomly assigned by center to receive either KM2H2 plus standard CBHCP care (6 centers and 232 patients) or the standard care only (6 centers and 218 patients). KM2H2 is a behavioral intervention guided by the Transtheoretical Model, the Model of Personalized Medicine and Social Capital Theory. It consists of six intervention sessions and two booster sessions engineered in a progressive manner. The purpose is to motivate and maintain physical activities for the prevention of heart attack and stroke. Heart attack and stroke (clinically diagnosed, primary outcome), blood pressure (measured, secondary outcome), and physical activity (self-report, tertiary outcome) were assessed at the individual level during the baseline, 3- and 6-month post-intervention. Relative to the standard care, receiving KM2H2 was associated with significant reductions in the incidence of heart attack (3.60% vs. 7.03%, p < .05) and stroke (5.11% vs. 9.90%, p<0.05), and moderate reduction in blood pressure (-3.72 mmHg in DBP and -2.92 mmHg in DBP) at 6-month post-intervention; and significant increases in physical activity at 3- (d = 0.53, 95% CI: 0.21, 0.85) and 6-month (d = 0.45, 95% CI: 0.04, 0.85) post-intervention, respectively. The program KM2H2 is efficacious to reduce the risk of heart attack and stroke among senior patients who are on anti-hypertensive medication. Findings of this study provide solid data supporting a formal phase-III trial to establish the effectiveness of KM2H2 for use in community settings for prevention. ISRCTN Register ISRCTN12608966.
Selenium as an electron acceptor during the catalytic mechanism of thioredoxin reductase.
Lothrop, Adam P; Snider, Gregg W; Ruggles, Erik L; Patel, Amar S; Lees, Watson J; Hondal, Robert J
2014-02-04
Mammalian thioredoxin reductase (TR) is a pyridine nucleotide disulfide oxidoreductase that uses the rare amino acid selenocysteine (Sec) in place of the more commonly used amino acid cysteine (Cys) in the redox-active tetrapeptide Gly-Cys-Sec-Gly motif to catalyze thiol/disulfide exchange reactions. Sec can accelerate the rate of these exchange reactions (i) by being a better nucleophile than Cys, (ii) by being a better electrophile than Cys, (iii) by being a better leaving group than Cys, or (iv) by using a combination of all three of these factors, being more chemically reactive than Cys. The role of the selenolate as a nucleophile in the reaction mechanism was recently demonstrated by creating a mutant of human thioredoxin reductase-1 in which the Cys497-Sec498 dyad of the C-terminal redox center was mutated to either a Ser497-Cys498 dyad or a Cys497-Ser498 dyad. Both mutant enzymes were incubated with human thioredoxin (Trx) to determine which mutant formed a mixed disulfide bond complex. Only the mutant containing the Ser497-Cys498 dyad formed a complex, and this structure has been determined by X-ray crystallography [Fritz-Wolf, K., Kehr, S., Stumpf, M., Rahlfs, S., and Becker, K. (2011) Crystal structure of the human thioredoxin reductase-thioredoxin complex. Nat. Commun. 2, 383]. This experimental observation most likely means that the selenolate is the nucleophile initially attacking the disulfide bond of Trx because a complex resulted only when Cys was present in the second position of the dyad. As a nucleophile, the selenolate of Sec helps to accelerate the rate of this exchange reaction relative to Cys in the Sec → Cys mutant enzyme. Another thiol/disulfide exchange reaction that occurs in the enzymatic cycle of the enzyme is the transfer of electrons from the thiolate of the interchange Cys residue of the N-terminal redox center to the eight-membered selenosulfide ring of the C-terminal redox center. The selenium atom of the selenosulfide could accelerate this exchange reaction by being a good leaving group (attack at the sulfur atom) or by being a good electrophile (attack at the selenium atom). Here we provide strong evidence that the selenium atom is attacked in this exchange step. This was shown by creating a mutant enzyme containing a Gly-Gly-Seccoo- motif that had 0.5% of the activity of the wild-type enzyme. This mutant lacks the adjacent, resolving Cys residue, which acts by attacking the mixed selenosulfide bond that occurs between the enzyme and substrate. A similar result was obtained when Sec was replaced with homocysteine. These results highlight the role of selenium as an electron acceptor in the catalytic mechanism of thioredoxin reductase as well as its established role as a donor of an electron to the substrate.
Emergency Preparedness: Are You Ready?
ERIC Educational Resources Information Center
Harley, Lorraine
2012-01-01
Most Americans who consider emergency preparedness think of someone or another country attacking the United States. Most newspaper and televised accounts involve community leaders and policymakers preparing for a terrorist attack. However, anyone who operates a child care center, family child care home, or has children of her own, knows that…
Fusion Center Guidelines: Developing and Sharing Information and Intelligence in a New Era
2007-07-06
and recovery efforts depend on tmely, accurate, and actonable nformaton about who the enem es are,61 where 61 Includng ther capabltes...ntentons, strengths, weaknesses. and how they operate, how they are supported, the targets the enem es ntend to attack, and the method of attack
A Taxonomy of Attacks on the DNP3 Protocol
NASA Astrophysics Data System (ADS)
East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet
Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.
Miska, Horst
2012-08-01
For emergency preparedness and response with respect to nuclear power plant accidents, the concept of Emergency Care Centers has been developed in Germany. This setup aims at monitoring contamination, to decontaminate if needed, assess the dose, and perform an initial medical evaluation of people who might have been affected by the accident. The concept has been tested in many exercises. In response to a terrorist attack involving a dirty bomb, this concept may prove useful for attending contaminated people who are not severely injured.
Nursing at ground zero: experiences during and after September 11 World Trade Center attack.
Dickerson, Suzanne Steffan; Jezewski, Mary Ann; Nelson-Tuttle, Christine; Shipkey, Nancy; Wilk, Nancy; Crandall, Blythe
2002-01-01
The purpose of this study is to discover shared perceptions, feelings, and common experiences of nurses after the September 11th World Trade Center terrorist attack through interpretive analysis of narrative stories of seventeen nurses. Six themes and one constitutive pattern describe the experiences: (a) Loss of a symbol and regaining new meaning, (b) Disaster without patients, (c) Coordinating with and without organizations, (d) Rediscovering the pride in nursing, (e) Traumatic Stress, and (f) Preparing for the future. The constitutive pattern is that nursing enables a humanitarian disaster response.
New threats to health data privacy.
Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y
2011-11-24
Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.
New threats to health data privacy
2011-01-01
Background Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. Results We study how patient privacy could be compromised with the help of today’s information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. Conclusion We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection. PMID:22168526
Heavy-Ion Microbeam Fault Injection into SRAM-Based FPGA Implementations of Cryptographic Circuits
NASA Astrophysics Data System (ADS)
Li, Huiyun; Du, Guanghua; Shao, Cuiping; Dai, Liang; Xu, Guoqing; Guo, Jinlong
2015-06-01
Transistors hit by heavy ions may conduct transiently, thereby introducing transient logic errors. Attackers can exploit these abnormal behaviors and extract sensitive information from the electronic devices. This paper demonstrates an ion irradiation fault injection attack experiment into a cryptographic field-programmable gate-array (FPGA) circuit. The experiment proved that the commercial FPGA chip is vulnerable to low-linear energy transfer carbon irradiation, and the attack can cause the leakage of secret key bits. A statistical model is established to estimate the possibility of an effective fault injection attack on cryptographic integrated circuits. The model incorporates the effects from temporal, spatial, and logical probability of an effective attack on the cryptographic circuits. The rate of successful attack calculated from the model conforms well to the experimental results. This quantitative success rate model can help evaluate security risk for designers as well as for the third-party assessment organizations.
Towards A Taxonomy Of Attacks Against Energy Control Systems
NASA Astrophysics Data System (ADS)
Fleury, Terry; Khurana, Himanshu; Welch, Von
Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.
Tobacco or Healthy Children: The Two Cannot Co-Exist
Pattemore, Philip Keith
2013-01-01
Tobacco exposure increases mortality and morbidity of the fetus, the child, the adolescent, and their children in turn. Nearly half the children in the world are exposed. Smoking is not merely personal choice or personal responsibility; those subtle phrases undermine those who have no choice in the matter. Tobacco control must take a multi-pronged attack. Smoking cessation by adults in childbearing years must take center stage of these efforts, because it is the only way to ensure a smoke-free environment for children. Smoke-free parents provide a role model for smoke-free young people, and erode the image of smoking as a desirable adult behavior to emulate. Pediatricians and pediatric pulmonologists have a key role to play here. This goal will reduce morbidity and mortality among adults and children. Legislation regarding taxation, environments, tobacco constituents, product placement and display, packaging, and media education are all key to this core goal. Smoke-free policy must be protected from attack based on trade agreements. Research is needed into more effective ways to attract and help people give up smoking, and into educating and re-deploying tobacco industry workers in emerging and developed countries. PMID:24400266
Migraine's House of Headaches…and Visiting the Neighbors
... episodes per day probably do. An increase in frequency over days-weeks always darkens the room and ... your migraine not only helps you reduce the frequency and intensity of your attacks, but can help ...
Revising School Attack Protections since 9/11
ERIC Educational Resources Information Center
Black, Susan
2004-01-01
The terrorist attacks of September 11, 2001, prompted federal officials to step up campaigns to make schools safe. After visiting Ground Zero at New York City's World Trade Center, Education Secretary Rodney Paige sent each chief state school officer suggestions for managing school crises. Many states also have school safety plans in place. New…
Subsonic Aerodynamic Characteristics of a Circular Body Earth-to-Orbit Vehicle
NASA Technical Reports Server (NTRS)
Lepsch, Roger A., Jr.; Ware, George M.; MacConochie, Ian O.
1996-01-01
A test of a generic reusable earth-to-orbit transport was conducted in the 7- by 10-Foot high-speed tunnel at the Langley Research Center at Mach number 0.3. The model had a body with a circular cross section and a thick clipped delta wing as the major lifting surface. For directional control, three different vertical fin arrangements were investigated: a conventional aft-mounted center vertical fin, wingtip fins, and a nose-mounted vertical fin. The configuration was longitudinally stable about the estimated center-of-gravity position of 0.72 body length and had sufficient pitch-control authority for stable trim over a wide range of angle of attack, regardless of fin arrangement. The maximum trimmed lift/drag ratio for the aft center-fin configuration was less than 5, whereas the other configurations had values of above 6. The aft center-fin configuration was directionally stable for all angles of attack tested. The wingtip and nose fins were not intended to produce directional stability but to be active controllers for artificial stabilization. Small rolling-moment values resulted from yaw control of the nose fin. Large adverse rolling-moment increments resulted from tip-fin controller deflection above 13 deg angle of attack. Flow visualization indicated that the adverse rolling-moment increments were probably caused by the influence of the deflected tip-fin controller on wing flow separation.
Helping Young Children in Frightening Times.
ERIC Educational Resources Information Center
Young Children, 2001
2001-01-01
Presents ways parents and other adults can help young children deal with tragedy and violence in the wake of terrorist attacks on the United States. Suggests giving reassurance and physical comfort, providing structure and stability, expecting a range of reactions, helping children to talk if they are ready, turning off the television, and…
Simulation of Attacks for Security in Wireless Sensor Network.
Diaz, Alvaro; Sanchez, Pablo
2016-11-18
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.
Almogy, Gidon; Belzberg, Howard; Mintz, Yoaz; Pikarsky, Alon K.; Zamir, Gideon; Rivkind, Avraham I.
2004-01-01
Objective: To review the experience of a large-volume trauma center in managing and treating casualties of suicide bombing attacks. Summary Background Data: The threat of suicide bombing attacks has escalated worldwide. The ability of the suicide bomber to deliver a relatively large explosive load accompanied by heavy shrapnel to the proximity of his or her victims has caused devastating effects. Methods: The authors reviewed and analyzed the experience obtained in treating victims of suicide bombings at the level I trauma center of the Hadassah University Hospital in Jerusalem, Israel from 2000 to 2003. Results: Evacuation is usually rapid due to the urban setting of these attacks. Numerous casualties are brought into the emergency department over a short period. The setting in which the device is detonated has implications on the type of injuries sustained by survivors. The injuries sustained by victims of suicide bombing attacks in semi-confined spaces are characterized by the degree and extent of widespread tissue damage and include multiple penetrating wounds of varying severity and location, blast injury, and burns. Conclusions: The approach to victims of suicide bombings is based on the guidelines for trauma management. Attention is given to the moderately injured, as these patients may harbor immediate life-threatening injuries. The concept of damage control can be modified to include rapid packing of multiple soft-tissue entry sites. Optimal utilization of manpower and resources is achieved by recruiting all available personnel, adopting a predetermined plan, and a centrally coordinated approach. Suicide bombing attacks seriously challenge the most experienced medical facilities. PMID:15075644
Suicide bombing attacks: update and modifications to the protocol.
Almogy, Gidon; Belzberg, Howard; Mintz, Yoaz; Pikarsky, Alon K; Zamir, Gideon; Rivkind, Avraham I
2004-03-01
To review the experience of a large-volume trauma center in managing and treating casualties of suicide bombing attacks. The threat of suicide bombing attacks has escalated worldwide. The ability of the suicide bomber to deliver a relatively large explosive load accompanied by heavy shrapnel to the proximity of his or her victims has caused devastating effects. The authors reviewed and analyzed the experience obtained in treating victims of suicide bombings at the level I trauma center of the Hadassah University Hospital in Jerusalem, Israel from 2000 to 2003. Evacuation is usually rapid due to the urban setting of these attacks. Numerous casualties are brought into the emergency department over a short period. The setting in which the device is detonated has implications on the type of injuries sustained by survivors. The injuries sustained by victims of suicide bombing attacks in semi-confined spaces are characterized by the degree and extent of widespread tissue damage and include multiple penetrating wounds of varying severity and location, blast injury, and burns. The approach to victims of suicide bombings is based on the guidelines for trauma management. Attention is given to the moderately injured, as these patients may harbor immediate life-threatening injuries. The concept of damage control can be modified to include rapid packing of multiple soft-tissue entry sites. Optimal utilization of manpower and resources is achieved by recruiting all available personnel, adopting a predetermined plan, and a centrally coordinated approach. Suicide bombing attacks seriously challenge the most experienced medical facilities.
Shrira, Amit; Palgi, Yuval; Hamama-Raz, Yaira; Goodwin, Robin; Ben-Ezra, Menachem
2014-01-01
The present study tested the maturation and inoculation hypotheses by examining whether age and previous exposure to the September 11, 2001, World Trade Center (WTC) terrorist attack moderated the relationship between degree of exposure to Hurricane Sandy and related posttraumatic stress disorder (PTSD) symptoms. An online sample of 1,000 participants from affected states completed self-report questionnaires one month after Hurricane Sandy hit the East Coast. Participants reported their degree of exposure to the WTC terrorist attack and to Hurricane Sandy, and their posttraumatic stress disorder (PTSD) symptoms following Hurricane Sandy. The positive relationship between degree of exposure to Hurricane Sandy and level of PTSD symptoms was weaker among older adults. An additional significant three-way interaction suggested that both age and previous exposure to the WTC terrorist attack moderated the relationship between degree of exposure to Hurricane Sandy and level of PTSD symptoms. Previous high degree of exposure to the WTC terrorist attack was related to a weaker effect of current exposure to Hurricane Sandy on PTSD symptoms among older adults. However, among younger adults, previous high degree of exposure to the WTC terrorist attack was related to a stronger effect of current exposure on PTSD symptoms. When confronted by a natural disaster, American older adults are generally resilient. Supporting the inoculation hypothesis, resilience of older adults may be partly related to the strength successfully extracted from previous exposure to adverse events.
Death at the Worksite: Helping Grieving Family Members
... Grief at Work Working Through Grief About Us Death at the Worksite: Helping Grieving Family Members By ... fatal heart attacks occur in the workplace. Other deaths — from accidents, for example — can also happen during ...
The Use of Paradoxical Intention in the Treatment of Panic Attacks.
ERIC Educational Resources Information Center
Dattilio, Frank M.
1987-01-01
Discusses the counseling use of paradoxical intention, in which clients are told to perform responses that seem incompatible with the goal for which they are seeking help. The use of paradoxical intention in the treatment of panic attacks is described and a case example is included. The nature and implementation of the technique are discussed.…
NASA Technical Reports Server (NTRS)
Spahr, J. R.
1954-01-01
The lift, pitching-moment, and drag characteristics of a missile configuration having a body of fineness ratio 9.33 and a cruciform triangular wing and tail of aspect ratio 4 were measured at a Mach number of 1.99 and a Reynolds number of 6.0 million, based on the body length. The tests were performed through an angle-of-attack range of -5 deg to 28 deg to investigate the effects on the aerodynamic characteristics of roll angle, wing-tail interdigitation, wing deflection, and interference among the components (body, wing, and tail). Theoretical lift and moment characteristics of the configuration and its components were calculated by the use of existing theoretical methods which have been modified for application to high angles of attack, and these characteristics are compared with experiment. The lift and drag characteristics of all combinations of the body, wing, and tail were independent of roll angle throughout the angle-of-attack range. The pitching-moment characteristics of the body-wing and body-wing-tail combinations, however, were influenced significantly by the roll angle at large angles of attack (greater than 10 deg). A roll from 0 deg (one pair of wing panels horizontal) to 45 deg caused a forward shift in the center of pressure which was of the same magnitude for both of these combinations, indicating that this shift originated from body-wing interference effects. A favorable lift-interference effect (lift of the combination greater than the sum of the lifts of the components) and a rearward shift in the center of pressure from a position corresponding to that for the components occurred at small angles of attack when the body was combined with either the exposed wing or tail surfaces. These lift and center-of-pressure interference effects were gradually reduced to zero as the angle of attack was increased to large values. The effect of wing-tail interference, which influenced primarily the pitching-moment characteristics, is dependent on the distance between the wing trailing vortex wake and the tail surfaces and thus was a function of angle of attack, angle of roll, and wing-tail interdigitation. Although the configuration at zero roll with the wing and tail in line exhibited the least center-of-pressure travel, the configuration with the wing and tail interdigitated had the least change in wing-tail interference over the angle-of-attack range. The lift effectiveness of the variable-incidence wing was reduced by more than 70 percent as a result of an increase in the combined angle of attack and wing incidence from 0 deg to 40 deg. The wing-tail interference (effective downwash at the tail) due to wing deflection was nearly zero as a result of a region of negative vorticity shed from the inboard portion of the wing. The lift characteristics of the configuration and its components were satisfactorily predicted by the calculated results, but the pitching moments at large angles of attack were not because of the influence of factors for which no adequate theory is available, such as the variation of the crossflow drag coefficient along the body and the effect of the wing downwash field on the afterbody loading.
KAMEDO report no. 87: bomb attack in Finnish shopping center, 2002.
Deverell, Edward; Ortenwall, Per; Almgren, Ola; Riddez, Louis
2007-01-01
The detonation of a bomb in a shopping center in Vantaa, Finland, took place on 11 October 2002. Seven people died as a result and > 160 people required medical attention. Because the rescue teams were inadequately trained to respond to terrorist attacks, the event was handled according to protocol. A number of problems arose, including: people from different rescue agencies were difficult to distinguish from each other; there was inadequate communication between the incident site and the main hospital; relatives of victims were not kept informed; and psychiatric problems in the wake of the disaster were not addressed sufficiently.
Disaster planning and emergency preparedness: lessons learned.
Babb, John; Tosatto, Robert; Hayslett, James
2002-01-01
Following the terrorist attacks of September 11, 2001, the federal response plan was activated immediately, with most efforts focused on helping recovery workers at Ground Zero in New York City. Comprehensive pharmacy services were critical in protecting the health of those potentially exposed to anthrax at U.S. Postal Service facilities and the U.S. Capitol. Responding to anthrax attacks taught many valuable lessons to emergency workers on how to manage a bioterrorist attack. Because of its central place in the life of many American communities, pharmacy is a natural and important ally of public health.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kearny, C.H.
The purpose of this book is to provide Americans with information and instructions that will significantly increase their chances of surviving a possible nuclear attack. It brings together field-tested instructions that, if followed by a large fraction of Americans during a crisis that preceded an attack, could save millions of lives. The author is convinced that the vulnerability of our country to nuclear threat or attack must be reduced and that the wide dissemination of the information contained in this book would help achieve that objective of our overall defense strategy.
Sequential defense against random and intentional attacks in complex networks.
Chen, Pin-Yu; Cheng, Shin-Ming
2015-02-01
Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.
Induction of panic attack by stimulation of the ventromedial hypothalamus.
Wilent, W Bryan; Oh, Michael Y; Buetefisch, Cathrin M; Bailes, Julian E; Cantella, Diane; Angle, Cindy; Whiting, Donald M
2010-06-01
Panic attacks are sudden debilitating attacks of intense distress often accompanied by physical symptoms such as shortness of breath and heart palpitations. Numerous brain regions, hormones, and neurotransmitter systems are putatively involved, but the etiology and neurocircuitry of panic attacks is far from established. One particular brain region of interest is the ventromedial hypothalamus (VMH). In cats and rats, electrical stimulation delivered to the VMH has been shown to evoke an emotional "panic attack-like" escape behavior, and in humans, stimulation targeting nuclei just posterior or anterior to the VMH has reportedly induced panic attacks. The authors report findings obtained in an awake patient undergoing bilateral implantation of deep brain stimulation electrodes into the hypothalamus that strongly implicates the VMH as being critically involved in the genesis of panic attacks. First, as the stimulating electrode progressed deeper into the VMH, the intensity of stimulation required to evoke an attack systematically decreased; second, while stimulation of the VMH in either hemisphere evoked panic, stimulation that appeared to be in the center of the VMH was more potent. Thus, this evidence supports the role of the VMH in the induction of panic attacks purported by animal studies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
John Homer; Ashok Varikuti; Xinming Ou
Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability ofmore » the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.« less
Gong, Jie; Chen, Xinguang; Li, Sijian
2015-01-01
Objective To evaluate the efficacy of the program Keep Moving toward Healthy Heart and Healthy Brain (KM2H2) in encouraging physical activities for the prevention of heart attack and stroke among hypertensive patients enrolled in the Community-Based Hypertension Control Program (CBHCP). Design Cluster randomized controlled trial with three waves of longitudinal assessments at baseline, 3 and 6 months post intervention. Setting Community-based and patient-centered self-care for behavioral intervention in urban settings of China. Participants A total of 450 participants diagnosed with hypertension from 12 community health centers in Wuhan, China were recruited, and were randomly assigned by center to receive either KM2H2 plus standard CBHCP care (6 centers and 232 patients) or the standard care only (6 centers and 218 patients). Intervention KM2H2 is a behavioral intervention guided by the Transtheoretical Model, the Model of Personalized Medicine and Social Capital Theory. It consists of six intervention sessions and two booster sessions engineered in a progressive manner. The purpose is to motivate and maintain physical activities for the prevention of heart attack and stroke. Outcome Measures Heart attack and stroke (clinically diagnosed, primary outcome), blood pressure (measured, secondary outcome), and physical activity (self-report, tertiary outcome) were assessed at the individual level during the baseline, 3- and 6-month post-intervention. Results Relative to the standard care, receiving KM2H2 was associated with significant reductions in the incidence of heart attack (3.60% vs. 7.03%, p < .05) and stroke (5.11% vs. 9.90%, p<0.05), and moderate reduction in blood pressure (-3.72mmHg in DBP and -2.92 mmHg in DBP) at 6-month post-intervention; and significant increases in physical activity at 3- (d = 0.53, 95% CI: 0.21, 0.85) and 6-month (d = 0.45, 95% CI: 0.04, 0.85) post-intervention, respectively. Conclusion The program KM2H2 is efficacious to reduce the risk of heart attack and stroke among senior patients who are on anti-hypertensive medication. Findings of this study provide solid data supporting a formal phase-III trial to establish the effectiveness of KM2H2 for use in community settings for prevention. Trial Registration ISRCTN Register ISRCTN12608966 PMID:26426421
NASA Technical Reports Server (NTRS)
Iversen, J.; Moghadam, M.
1981-01-01
Forty-six different fins, which were members of twelve plan-form families, were tested. A two dimensional Boeing single element airfoil at an angle of attack of eight degrees and a sweepback angle of thirty-two was used to simulate a portion of the wing of a generator aircraft. Various free stream velocities were used to test any individual fin at its particular angle of attack. While the fin itself was mounted on the upper surface of the generator model, the angle of attack of each fin was varied until stall was reached and/or passed. The relative fin vortex strengths were measured in two ways. First, the maximum angular velocity of a four blade rotor placed in the fin vortex center was measured with the use of a stroboscope. Second, the maximum rolling moment on a following wing model placed in the fin vortex center was measured by a force balance.
Karthick, T; Tandon, Poonam; Singh, Swapnil
2017-01-01
Tretinoin is known to be a pharmaceutical drug for treating acne vulgaris, keratosis pilaris, and acute promyelocytic leukemia. In order to reveal the possible conformers of tretinoin, the energies of all the conformers through rotational bonds have been evaluated by systematic rotor search analysis. The intramolecular interactions ranging from strong hydrogen bonds to weak van der Waals forces present in tretinoin have been distinguished with the help of electron density mapping and wavefunction analysis. The global reactivity descriptors and Fukui functions of tretinoin have been calculated and discussed. The sites suitable for electrophilic attack and nucleophilic attack have been identified with the help of Hirshfeld partitioning. The vibrational spectroscopic signature of tretinoin and mixed mode band assignments have been elucidated with the help of experimental and simulated spectra.
2007-12-14
nationals who were arrested in June 2007, for allegedly plotting to bomb New York’s John F. Kennedy ( JFK ) Airport lends credence to this. Three of the...charges of conspiring to attack New York City’s JFK Airport by planting explosives to blow up the airport’s major jet-fuel supply tanks and pipeline. The...conspirators, the same defendant compared the plot to attack JFK airport to the attacks on the World Trade Center on 11 September and he stated that “even the
Simulation of Attacks for Security in Wireless Sensor Network
Diaz, Alvaro; Sanchez, Pablo
2016-01-01
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710
9/11 to the Iraq War: Using Books to Help Children Understand Troubled Times
ERIC Educational Resources Information Center
Rycik, Mary Taylor
2006-01-01
Four years after the 9/11 attack on the United States, the country continues to be in considerable turmoil. Children have lived through the devastation of the September 11th attacks, the panic over the anthrax mailings, the hunt for terrorists in Afghanistan, elevated homeland security threat levels, the war in Iraq, the tsunami disaster, and…
ERIC Educational Resources Information Center
Van Leeuwen, Wouter; Baas, Matthijs
2017-01-01
Although creativity is helpful if not needed to deal with conflicts, research on the effects of conflict on creativity shows inconsistent findings. In this study, the possibility that effects may depend on people's role in conflict was considered. Whether, when, and why assuming the role of attacker or defender in conflict affects creative idea…
SCA security verification on wireless sensor network node
NASA Astrophysics Data System (ADS)
He, Wei; Pizarro, Carlos; de la Torre, Eduardo; Portilla, Jorge; Riesgo, Teresa
2011-05-01
Side Channel Attack (SCA) differs from traditional mathematic attacks. It gets around of the exhaustive mathematic calculation and precisely pin to certain points in the cryptographic algorithm to reveal confidential information from the running crypto-devices. Since the introduction of SCA by Paul Kocher et al [1], it has been considered to be one of the most critical threats to the resource restricted but security demanding applications, such as wireless sensor networks. In this paper, we focus our work on the SCA-concerned security verification on WSN (wireless sensor network). A detailed setup of the platform and an analysis of the results of DPA (power attack) and EMA (electromagnetic attack) is presented. The setup follows the way of low-cost setup to make effective SCAs. Meanwhile, surveying the weaknesses of WSNs in resisting SCA attacks, especially for the EM attack. Finally, SCA-Prevention suggestions based on Differential Security Strategy for the FPGA hardware implementation in WSN will be given, helping to get an improved compromise between security and cost.
Poomsrikaew, Ornwanya; Ryan, Catherine J; Zerwic, Julie J
2010-10-01
This study aimed to determine Thais' knowledge of heart attack symptoms and risk factors and whether that knowledge was related to age, gender or education. Via a street-intercept survey method, a convenience sample of people aged ≥ 35 years (n = 192) was recruited. Mean age was 47 ± 9.6 years (range 35-81), and 55.2% were female. Participants identified on average 5.6 of 9 heart attack symptoms (SD 1.8) and 5.3 of 8 heart attack risk factors (SD 2.1). However, 66.7% mistakenly thought the chest discomfort would be severe, sharp and stabbing, and many subjects erroneously selected symptoms that are actually stroke symptoms. There were no gender or educational differences in knowledge of heart attack symptoms and risk factors. Older adults recognized fewer total symptoms than did younger adults. These findings could direct health-care providers to help the Thai population differentiate symptoms of heart attack from stroke. © 2010 Blackwell Publishing Asia Pty Ltd.
[Case of exploding head syndrome].
Okura, Mutsumi; Taniguchi, Mitsutaka; Muraki, Hisae; Sugita, Hideko; Ohi, Motoharu
2010-01-01
Exploding head syndrome (EHS) attacks are characterized by the sensation of sudden loud banging noises, and are occasionally accompanied by the sensation of a flash light. Although these attacks in themselves are usually not painful, it is reported that EHS attacks may precede migraines and may be perceived as auras. A 53-year-old woman, with a 40-year history of fulgurating migraines, experienced 2 different types of EHS attacks. During most of the attacks, which were not painful, she heard sounds like someone yelling or cars passing by. Only 1 episode was accompanied with the sensation of a flash light and of sounds similar to those of an electrical short circuit. On the video-polysomnography, video-polysomnography showed 11 EHS attacks occurred during stage N1 and stage N2; these attacks were preceded by soft snoring. She also had moderate obstructive sleep apnea syndrome (Apnea Hypopnea Index: 16.7) for which an oral appliance was prescribed; the EHS attacks did not recur after this treatment. The pathophysiology of EHS is still unclear. A detailed analysis of PSG data may help in understanding the pathophysiology of this syndrome and also in the selection of therapeutic strategies.
Acosta, Judith K; Levenson, Richard L
2002-01-01
Part I of this series discussed our observations of Ground Zero of the World Trade Center (WTC) immediately after the attack on September 11, 2001, as well as the stress-response of police officers on site. This paper offers a variety of clinical techniques for emergency mental health practitioners and first responders for use with victims of critical incidents. The suggested interventions are based on the theory and clinical practice of Emergency Medical Hypnosis, Neuro-Linguistic Programming, and Ericksonian Psychotherapy. Specific examples of how they were applied with police personnel following the World Trade Center attack are provided along with specific clinical guidelines. These interventions are designed to augment and enhance standard CISM, mental health, and medical practice in the field.
Security Events and Vulnerability Data for Cybersecurity Risk Estimation.
Allodi, Luca; Massacci, Fabio
2017-08-01
Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of "weaponized" vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach. © 2017 Society for Risk Analysis.
Resilient help to switch and overlap hierarchical subsystems in a small human group
Fujii, K.; Yokoyama, K.; Koyama, T.; Rikukawa, A.; Yamada, H.; Yamamoto, Y.
2016-01-01
Groups of social organisms in nature are resilient systems that can overcome unpredicted threats by helping its members. These social organisms are assumed to behave both autonomously and cooperatively as individuals, the helper, the helped and other part of a group depending on the context such as emergencies. However, the structure and function of these resilient actions, such as how helpers help colleagues and how the helper’s action is effective at multiple subsystem scales remain unclear. Here we investigated the behaviour of organised and efficient small human groups in a ballgame defence, and identified three principles of hierarchical resilient help when under attack. First, at a present high emergency level, the helper simply switched the local roles in the attacked subsystem with the helped. Second, at an intermediate emergency level, the helpers effectively acted in overlapping subsystems. Third, for the most critical emergency, the helpers globally switched the action on the overall system. These resilient actions to the benefit of the system were assumed to be observed in only humans, which help colleagues at flexibly switched and overlapped hierarchical subsystem. We suggest that these multi-layered helping behaviours can help to understand resilient cooperation in social organisms and human groups. PMID:27045443
Corrigan, Malachy; McWilliams, Rita; Kelly, Kerry J; Niles, Justin; Cammarata, Claire; Jones, Kristina; Wartenberg, Daniel; Hallman, William K; Kipen, Howard M; Glass, Lara; Schorr, John K; Feirstein, Ira; Prezant, David J
2009-11-01
We sought to determine the frequency of psychological symptoms and elevated posttraumatic stress disorder (PTSD) risk among New York City firefighters after the World Trade Center (WTC) attack and whether these measures were associated with Counseling Services Unit (CSU) use or mental health-related medical leave over the first 2.5 years after the attack. Shortly after the WTC attack, a computerized, binary-response screening questionnaire was administered. Exposure assessment included WTC arrival time and "loss of a co-worker while working at the collapse." We determined elevated PTSD risk using thresholds derived from Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision, and a sensitivity-specificity analysis. Of 8487 participants, 76% reported at least 1 symptom, 1016 (12%) met criteria for elevated PTSD risk, and 2389 (28%) self-referred to the CSU, a 5-fold increase from before the attack. Higher scores were associated with CSU use, functional job impairment, and mental health-related medical leave. Exposure-response gradients were significant for all outcomes. This screening tool effectively identified elevated PTSD risk, higher CSU use, and functional impairment among firefighters and therefore may be useful in allocating scarce postdisaster mental health resources.
Flight test of the X-29A at high angle of attack: Flight dynamics and controls
NASA Technical Reports Server (NTRS)
Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.
1995-01-01
The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.
Martinson, S J; Fernádez Ajó, A A; Martínez, A S; Krivak-Tetley, F E; Villacide, J M; Ayres, M P; Corley, J C
2018-04-18
Accidental and intentional global movement of species has increased the frequency of novel plant-insect interactions. In Patagonia, the European woodwasp, Sirex noctilio, has invaded commercial plantations of North American pines. We compared the patterns of resin defenses and S. noctilio-caused mortality at two mixed-species forests near San Carlos de Bariloche, Argentina. We observed lower levels of resin flow and higher levels of mortality in Pinus contorta compared with Pinus ponderosa. In general, S. noctilio attacked trees with lower resin compared with neighboring trees. Resin production in P. ponderosa was not related to growth rates, but for P. contorta, slower growing trees produced less resin than faster growing conspecifics. For all infested trees, attack density and number of drills (ovipositor probes) per attack did not vary with resin production. Most attacks resulted in one or two drills. Attack rates and drills/attack were basically uniform across the bole of the tree except for a decrease in both drills/attack and attack density in the upper portion of the crown, and an increase in the attack density for the bottom 10% of the tree. Planted pines in Patagonia grow faster than their counterparts in North America, and produce less resin, consistent with the growth-differentiation balance hypothesis. Limited resin defenses may help to explain the high susceptibility of P. contorta to woodwasps in Patagonia.
Making and Keeping Friends: A Self-Help Guide. Recovering Your Mental Health Series.
ERIC Educational Resources Information Center
Copeland, Mary Ellen
People seem to have a natural need for friends. Friends increase enjoyment of life, relieve feelings of loneliness, and can help reduce stress and improve ones health. Having good friends is especially helpful when one is going through any kind of hard time: experiencing anxiety or panic attacks; depression, phobias, or delusional thinking; living…
... arthritis. It works by lowering the amount of uric acid in your blood, preventing gout attacks. The drug ... Sulfinpyrazone helps your body get rid of uric acid through your urine. This process may cause kidney stones. To help prevent kidney stones, be sure to drink 10 to 12 glasses (8 ...
NASA Astrophysics Data System (ADS)
Lyubimov, V. V.; Kurkina, E. V.
2018-05-01
The authors consider the problem of a dynamic system passing through a low-order resonance, describing an uncontrolled atmospheric descent of an asymmetric nanosatellite in the Earth's atmosphere. The authors perform mathematical and numerical modeling of the motion of the nanosatellite with a small mass-aerodynamic asymmetry relative to the center of mass. The aim of the study is to obtain new reliable approximate analytical estimates of perturbations of the angle of attack of a nanosatellite passing through resonance at angles of attack of not more than 0.5π. By using the stationary phase method, the authors were able to investigate a discontinuous perturbation in the angle of attack of a nanosatellite passing through a resonance with two different nanosatellite designs. Comparison of the results of the numerical modeling and new approximate analytical estimates of the perturbation of the angle of attack confirms the reliability of the said estimates.
Claassen, Cynthia A; Carmody, Thomas; Stewart, Sunita M; Bossarte, Robert M; Larkin, Gregory L; Woodward, Wayne A; Trivedi, Madhukar H
2010-05-01
The terrorist attacks in the USA on 11 September 2001 affected suicide rates in two European countries, whereas overall US rates remained stable. The effect on attack site rates, however, has not been studied. To examine post-attack suicide rates in areas surrounding the three airline crash sites. Daily mortality rates were modelled using time series techniques. Where rate change was significant, both duration and geographic scope were analysed. Around the World Trade Center, post-attack 180-day rates dropped significantly (t = 2.4, P = 0.0046), whereas comparison condition rates remained stable. No change was observed for Pentagon or Flight 93 crash sites. The differential effect by site suggests that proximity may be less important that other event characteristics. Both temporal and geographic aspects of rate fluctuation after sentinel events appear measurable and further analyses may contribute valuable knowledge about how sociological forces affect these rates.
Goto, Fumiyuki; Suzuki, Noriomi; Hara, Mariko; Tsuchihashi, Nana; Morimoto, Noriko
2015-07-01
The evaluation and management of vertigo in children varies among institutional and medical specialties. The aim of this study was to describe the characteristics of vertigo in children presenting at a national pediatric center. Patients < 16 years old presenting with vertigo to the department of otolaryngology at a national center for child health and development from April 2004 to October 2009 were included (N = 77; 42 males and 35 females; average age, 8.7 ± 3.4 years) in this study. The most common diagnoses were vestibular migraine (VM; N = 21), benign paroxysmal vertigo (BPV; N =16), unilateral vestibulopathy (N = 12), and psychogenic vertigo (N = 8). Significant differences were observed in the frequency of the diagnoses between children aged older and younger than 7 years: BPV was most common in children < 7 years of age (p < 0.01) and VM was most common in ≥ 27 years of age (p < 0.05). Because obtaining adequate information from children for making a correct diagnosis is sometimes difficult, acquiring sufficient information from the parents is important. In addition, getting the parents to record the nystagmus during a vertigo attack with a digital camera or cellular phone can be useful because observing the nystagmus recorded on the video is helpful for making a diagnosis. Furthermore, the parents are participating in their child's care by attempting to record the attack, strengthening the relationship between the parents and the child. The incidence of psychogenic vertigo is low (less than 10%). Therefore, although physicians have recently tended to define the disorder as psychogenic when no objective abnormality is found in a patient, making a diagnosis of psychogenic vertigo is not recommended. Because vertigo can sometimes make a child anxious, delivering the correct diagnosis and treatment at the early stage is important for preventing anxiety in affected children.
Possick, Chaya; Shamai, Michal; Sadeh, Ruth Ann
2014-05-01
This study focuses on expressed needs and structures of assistance received by Israeli parents whose children were killed in terror attacks. The loss takes place within a multi-systemic network that can be a healing force and/or a distorting factor in the grief process. The qualitative research paradigm employed privileges the knowledge of the parents themselves. In-depth interviews were conducted with 16 parents. (1) The primary criterion that determines the parents' attribution of helpfulness is perceived inclusiveness. (2) The subsystem of "family of the bereaved" is salient in the healing process. (3) There is a clear preference for the services provided by NGO's as opposed to governmental agencies. (4) The bereaved parents engage the symbolic level of the macro-system-the heritage of the Jewish people. The article concludes with the practical implications of the findings for the development and delivery of psychosocial services to parents bereaved in terror attacks.
1994-06-27
The modified F-18 High Alpha Research Vehicle (HARV) carries out air flow studies on a flight from the Dryden Flight Research Center, Edwards, California. Using oil, researchers were able to track the air flow across the wing at different speeds and angles of attack. A thrust vectoring system had been installed on the engines' exhaust nozzles for the high angle of attack research program. The thrust vectoring system, linked to the aircraft's flight control system, moves a set of three paddles on each engine to redirect thrust for directional control and increased maneuverability at angles of attack at up to 70 degrees.
RotCFD Analysis of the AH-56 Cheyenne Hub Drag
NASA Technical Reports Server (NTRS)
Solis, Eduardo; Bass, Tal A.; Keith, Matthew D.; Oppenheim, Rebecca T.; Runyon, Bryan T.; Veras-Alba, Belen
2016-01-01
In 2016, the U.S. Army Aviation Development Directorate (ADD) conducted tests in the U.S. Army 7- by 10- Foot Wind Tunnel at NASA Ames Research Center of a nonrotating 2/5th-scale AH-56 rotor hub. The objective of the tests was to determine how removing the mechanical control gyro affected the drag. Data for the lift, drag, and pitching moment were recorded for the 4-bladed rotor hub in various hardware configurations, azimuth angles, and angles of attack. Numerical simulations of a selection of the configurations and orientations were then performed, and the results were compared with the test data. To generate the simulation results, the hardware configurations were modeled using Creo and Rhinoceros 5, three-dimensional surface modeling computer-aided design (CAD) programs. The CAD model was imported into Rotorcraft Computational Fluid Dynamics (RotCFD), a computational fluid dynamics (CFD) tool used for analyzing rotor flow fields. RotCFD simulation results were compared with the experimental results of three hardware configurations at two azimuth angles, two angles of attack, and with and without wind tunnel walls. The results help validate RotCFD as a tool for analyzing low-drag rotor hub designs for advanced high-speed rotorcraft concepts. Future work will involve simulating additional hub geometries to reduce drag or tailor to other desired performance levels.
Implementation of a Single-Stage-To-Orbit (SSTO) model for stability and control analysis
NASA Astrophysics Data System (ADS)
Ingalls, Stephen A.
1995-07-01
Three NASA centers: Marshall Space Flight Center (MSFC), Langley Research Center (LaRC), and Johnson Space Center (JSC) are currently involved in studying a family of single-stage- and two-stage-to-orbit (SSTO/TSTO) vehicles to serve as the next generation space transportation system (STS). A rocketed winged-body is the current focus. The configuration (WB001) is a vertically-launched, horizontally-landing system with circular cross-section. Preliminary aerodynamic data was generated by LaRC and is a combination of wind-tunnel data, empirical methods, and Aerodynamic Preliminary Analysis System-(APAS) generated values. JSC's efforts involve descent trajectory design, stability analysis, and flight control system synthesis. Analysis of WB001's static stability indicates instability in 'tuck' (C(sub mu) less than 0: Mach = 0.30, alpha greater than 3.25 deg; Mach = 0.60, alpha greater than 8.04), an unstable dihedral effects (C(sub l(beta)) greater than 0: Mach = 30,alpha less than 12 deg.; Mach = 0.60, alpha less than 10.00 deg.), and, most significantly, an unstable weathercock stability derivative, C(sub n(beta)), at all angles of attack and subsonic Mach numbers. Longitudinal trim solutions for Mach = 0.30 and 0.60 indicate flight path angle possibilities ranging from around 12 (M = 0.30) to slightly over 20 degrees at Mach = 0.60. Trim angles of attack increase from 6.24 at Mach 0.60 and 10,000 feet to 17.7 deg. at Mach 0.30, sea-level. Lateral trim was attempted for a design cross-wind of 25.0 knots. The current vehicle aerodynamic and geometric characteristics will only yield a lateral trim solution at impractical tip-fin deflections (approximately equal to 43 deg.) and bank angles (21 deg.). A study of the lateral control surfaces, tip-fin controllers for WB001, indicate increased surface area would help address these instabilities, particularly the deficiency in C(sub n(beta)), but obviously at the expense of increased vehicle weight. Growth factors of approximately 7 were determined using a design C(sub n(beta)) of 0.100/radian (approximate subsonic values for the orbiter).
Implementation of a Single-Stage-To-Orbit (SSTO) model for stability and control analysis
NASA Technical Reports Server (NTRS)
Ingalls, Stephen A.
1995-01-01
Three NASA centers: Marshall Space Flight Center (MSFC), Langley Research Center (LaRC), and Johnson Space Center (JSC) are currently involved in studying a family of single-stage- and two-stage-to-orbit (SSTO/TSTO) vehicles to serve as the next generation space transportation system (STS). A rocketed winged-body is the current focus. The configuration (WB001) is a vertically-launched, horizontally-landing system with circular cross-section. Preliminary aerodynamic data was generated by LaRC and is a combination of wind-tunnel data, empirical methods, and Aerodynamic Preliminary Analysis System-(APAS) generated values. JSC's efforts involve descent trajectory design, stability analysis, and flight control system synthesis. Analysis of WB001's static stability indicates instability in 'tuck' (C(sub mu) less than 0: Mach = 0.30, alpha greater than 3.25 deg; Mach = 0.60, alpha greater than 8.04), an unstable dihedral effects (C(sub l(beta)) greater than 0: Mach = 30,alpha less than 12 deg.; Mach = 0.60, alpha less than 10.00 deg.), and, most significantly, an unstable weathercock stability derivative, C(sub n(beta)), at all angles of attack and subsonic Mach numbers. Longitudinal trim solutions for Mach = 0.30 and 0.60 indicate flight path angle possibilities ranging from around 12 (M = 0.30) to slightly over 20 degrees at Mach = 0.60. Trim angles of attack increase from 6.24 at Mach 0.60 and 10,000 feet to 17.7 deg. at Mach 0.30, sea-level. Lateral trim was attempted for a design cross-wind of 25.0 knots. The current vehicle aerodynamic and geometric characteristics will only yield a lateral trim solution at impractical tip-fin deflections (approximately equal to 43 deg.) and bank angles (21 deg.). A study of the lateral control surfaces, tip-fin controllers for WB001, indicate increased surface area would help address these instabilities, particularly the deficiency in C(sub n(beta)), but obviously at the expense of increased vehicle weight. Growth factors of approximately 7 were determined using a design C(sub n(beta)) of 0.100/radian (approximate subsonic values for the orbiter).
HEALTH AND ENVIRONMENTAL CONSEQUENCES OF THE WORLD TRADE CENTER DISASTER
The attack on the World Trade Center (WTC) created an acute environmental disaster of enormous magnitude. This study characterizes the environmental exposures resulting from destruction of the WTC and assesses their effects on health. Methods include ambient air sampling; analyse...
Report on Progress Toward Security and Stability in Afghanistan
2012-12-01
availability becomes more difficult further away from the cities. A lack of sufficient progress in governance and sustainable economic ...their confinement to areas away from major population centers. A small number of high-profile attacks (HPAs) occurred during the reporting period...activities were related to criminal networks. A small number of high-profiles attacks (HPAs) occurred during the reporting period. Contrary to insurgents
Cone, James E; Li, Jiehui; Kornblith, Erica; Gocheva, Vihra; Stellman, Steven D; Shaikh, Annum; Schwarzer, Ralf; Bowler, Rosemarie M
2015-05-01
Police enrolled in the World Trade Center Health Registry (WTCHR) demonstrated increased probable posttraumatic stress disorder (PTSD) after the terrorist attack of 9/11/2001. Police enrollees without pre-9/11 PTSD were studied. Probable PTSD was assessed by Posttraumatic Stress Check List (PCL). Risk factors for chronic, new onset or resolved PTSD were assessed using multinomial logistic regression. Half of police with probable PTSD in 2003-2007 continued to have probable PTSD in 2011-2012. Women had higher prevalence of PTSD than men (15.5% vs. 10.3%, P = 0.008). Risk factors for chronic PTSD included decreased social support, unemployment, 2+ life stressors in last 12 months, 2+ life-threatening events since 9/11, 2+ injuries during the 9/11 attacks, and unmet mental health needs. Police responders to the WTC attacks continue to bear a high mental health burden. Improved early access to mental health treatment for police exposed to disasters may be needed. © 2015 Wiley Periodicals, Inc.
Children's Literature in a Time of National Tragedy. ERIC Digest.
ERIC Educational Resources Information Center
Lu, Mei-Yu
This digest is intended to guide parents and teachers in helping children deal with the attacks of September 11, 2001 through the use of literature. It begins with suggestions, guidelines, and strategies which parents and teachers can use to help children deal with the tragedy, and it discusses the role of literature in helping children at a time…
MFIRE-2: A Multi Agent System for Flow-Based Intrusion Detection Using Stochastic Search
2012-03-01
attacks that are distributed in nature , but may not protect individual systems effectively without incurring large bandwidth penalties while collecting...system-level information to help prepare for more significant attacks. The type of information potentially revealed by footprinting includes account...key areas where MAS may be appropriate: • The environment is open, highly dynamic, uncertain, or complex • Agents are a natural metaphor—Many
NASA Technical Reports Server (NTRS)
Baber, Hal T , Jr; Moul, Martin T
1955-01-01
Two full-scale models of an inline, cruciform, canard missile configuration having a low-aspect-ratio wing equipped with flap-type controls were flight tested in order to determine the missile's longitudinal aerodynamic characteristics. Stability derivatives and control and drag characteristics are presented for a range of Mach number from 0.7 to 1.8. Nonlinear lift and moment curves were noted for the angle - of-attack range of this test (0 deg to 8 deg). The aerodynamic-center location for angles of attack near 50 remained nearly constant for supersonic speeds at 13.5 percent of the mean aerodynamic chord; whereas for angles of attack near 0 deg, there was a rapid forward movement of the aerodynamic center as the Mach number increased. At a control deflection of 0 deg, the missile's response to the longitudinal control was in an essentially fixed space plane which was not coincident with the pitch plane as a result of the missile rolling. As a consequence, stability characteristics were determined from the resultant of pitch and yaw motions. The damping-in-pitch derivatives for the two angle -of-attack ranges of the test are in close agreement and varied only slightly with Mach number. The horn-balanced trailing-edge flap was effective in producing angle of attack over the Mach number range.
NASA Technical Reports Server (NTRS)
Baber, H. T., Jr.; Moul, M. T.
1955-01-01
Two full-scale models of an inline, cruciform, canard missile configuration having a low-aspect-ratio wing equipped with flap-type controls were flight tested in order to determine the missile's longitudinal aerodynamic characteristics. Stability derivatives and control and drag characteristics are presented for a range of Mach number from 0.7 to 1.8. Nonlinear lift and moment curves were noted for the angle-of-attack range of this test (0 deg to 8 deg ). The aerodynamic-center location for angles of attack near 5 deg remained nearly constant for supersonic speeds at 13.5 percent of the mean aerodynamic chord; whereas for angles of attack near O deg, there was a rapid forward movement of the aerodynamic center as the Mach number increased. At a control deflection of O deg, the missile's response to the longitudinal control was in an essentially fixed space plane which was not coincident with the pitch plane as a result of the missile rolling. As a consequence, stability characteristics were determined from the resultant of pitch and yaw motions. The damping-in-pitch derivatives for the two angle-of-attack ranges of the test are in close agreement and varied only slightly with Mach number. The horn-balanced trailing-edge flap was effective in producing angle of attack over the Mach number range.
NASA Astrophysics Data System (ADS)
Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu
2017-05-01
This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.
The epidemiology of physical attack and rape among crack-using women.
Falck, R S; Wang, J; Carlson, R G; Siegal, H A
2001-02-01
This prospective study examines the epidemiology of physical attack and rape among a sample of 171 not-in-treatment, crack-cocaine using women. Since initiating crack use, 62% of the women reported suffering a physical attack. The annual rate of victimization by physical attack was 45%. Overall, more than half of the victims sought medical care subsequent to an attack. The prevalence of rape since crack use was initiated was 32%, and the annual rate was 11%. Among those women having been raped since they initiated crack use, 83% reported they were high on crack when the crime occurred as were an estimated 57% of the perpetrators. Logistic regression analyses showed that duration of crack use, arrest for prostitution, and some college education were predictors of having experienced a physical attack. Duration of crack use and a history of prostitution were predictors of suffering a rape. Drug abuse treatment programs must be sensitive to high levels of violence victimization experienced by crack-cocaine using women. Screening women for victimization, and treating the problems that emanate from it, may help make drug abuse treatment more effective.
Polar bear attacks on humans: Implications of a changing climate
Wilder, James; Vongraven, Dag; Atwood, Todd C.; Hansen, Bob; Jessen, Amalie; Kochnev, Anatoly A.; York, Geoff; Vallender, Rachel; Hedman, Daryll; Gibbons, Melissa
2017-01-01
Understanding causes of polar bear (Ursus maritimus) attacks on humans is critical to ensuring both human safety and polar bear conservation. Although considerable attention has been focused on understanding black (U. americanus) and grizzly (U. arctos) bear conflicts with humans, there have been few attempts to systematically collect, analyze, and interpret available information on human-polar bear conflicts across their range. To help fill this knowledge gap, a database was developed (Polar Bear-Human Information Management System [PBHIMS]) to facilitate the range-wide collection and analysis of human-polar bear conflict data. We populated the PBHIMS with data collected throughout the polar bear range, analyzed polar bear attacks on people, and found that reported attacks have been extremely rare. From 1870–2014, we documented 73 attacks by wild polar bears, distributed among the 5 polar bear Range States (Canada, Greenland, Norway, Russia, and United States), which resulted in 20 human fatalities and 63 human injuries. We found that nutritionally stressed adult male polar bears were the most likely to pose threats to human safety. Attacks by adult females were rare, and most were attributed to defense of cubs. We judged that bears acted as a predator in most attacks, and that nearly all attacks involved ≤2 people. Increased concern for both human and bear safety is warranted in light of predictions of increased numbers of nutritionally stressed bears spending longer amounts of time on land near people because of the loss of their sea ice habitat. Improved conflict investigation is needed to collect accurate and relevant data and communicate accurate bear safety messages and mitigation strategies to the public. With better information, people can take proactive measures in polar bear habitat to ensure their safety and prevent conflicts with polar bears. This work represents an important first step towards improving our understanding of factors influencing human-polar bear conflicts. Continued collection and analysis of range-wide data on interactions and conflicts will help increase human safety and ensure the conservation of polar bears for future generations.
CD8+ T Cells Need a Little Help(er) for Sustained Antitumor Response | Center for Cancer Research
The immune system comprises a powerful army of specialized cells and molecules that protect the body against invading foreign agents. For years, researchers have been trying to find a way to turn the wrath of the immune system against cancer. A significant amount of work related to cancer immunotherapy has focused on the potential of CD8+ cytotoxic T cells to attack and eliminate cancer cells. However, this approach has proved challenging for two reasons. First, there are several mechanisms in place to make sure that T cells and other components of the immune system ignore “self” molecules and cells, even if these cells become cancerous. Second, tumor microenvironments are often characterized by the presence of immunosuppressive factors capable of stifling T cell activation (a process called tolerization).
The World Trade Center Attack: Lessons for all aspects of health care
Tamber, Pritpal S; Vincent, Jean-Louis
2001-01-01
The attack on the World Trade Center had the potential to overwhelm New York's health services. Sadly, however, the predicted thousands of treatable patients failed to materialize. Horror and sadness has now been replaced by anger, fear, and the determination to be better prepared next time. This determination not only exists in politics but also in health care, and as with all attempts to enforce change there needs to be a period of collecting opinions and data. This article introduces nine reviews in Critical Care offering varied health care perspectives of the events of 11 September 2001 from people who were there and from experts in disaster management. PMID:11737910
Three-party quantum secure direct communication against collective noise
NASA Astrophysics Data System (ADS)
He, Ye-Feng; Ma, Wen-Ping
2017-10-01
Based on logical quantum states, two three-party quantum secure direct communication protocols are proposed, which can realize the exchange of the secret messages between three parties with the help of the measurement correlation property of six-particle entangled states. These two protocols can be immune to the collective-dephasing noise and the collective-rotation noise, respectively; neither of them has information leakage problem. The one-way transmission mode ensures that they can congenitally resist against the Trojan horse attacks and the teleportation attack. Furthermore, these two protocols are secure against other active attacks because of the use of the decoy state technology.
Percolation Features on Climate Network under Attacks of El Niño Events
NASA Astrophysics Data System (ADS)
Lu, Z.
2015-12-01
Percolation theory under different attacks is one of the main research areas in complex networks but never be applied to investigate climate network. In this study, for the first time we construct a climate network of surface air temperature field to analyze its percolation features. Here, we regard El Niño event as a kind of naturally attacks generated from Pacific Ocean to attack its upper climate network. We find that El Niño event leads an abrupt percolation phase transition to the climate network which makes it splitting and unstable suddenly. Comparing the results of the climate network under three different forms of attacks, including most connected attack (MA), localized attack (LA) and random attack (RA) respectively, it is found that both MA and LA lead first-order transition and RA leads second-order transition to the climate network. Furthermore, we find that most real attacks consist of all these three forms of attacks. With El Niño event emerging, the ratios of LA and MA increase and dominate the style of attack while RA decreasing. It means the percolation phase transition due to El Niño events is close to first-order transition mostly affected by LA and MA. Our research may help us further understand two questions from perspective of percolation on network: (1) Why not all warming in Pacific Ocean but El Niño events could affect the climate. (2) Why the climate affected by El Niño events changes abruptly.
Plasma Control of Separated Flows on Delta Wings at High Angles of Attack
2009-03-18
of Attack 5a. CONTRACT NUMBER ISTC Registration No: 3646 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Dr. Anatoly Alexandrovich...NUMBER(S) ISTC 06-7002 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution is unlimited. 13. SUPPLEMENTARY...This work is supported financially by EOARD and performed under the agreement with the International Science and Technology Center ( ISTC ), Moscow
Fire As A Weapon: High Rise Structures
2017-12-01
Trade Center, Happyland fire, Taj Mahal Fire, fire bombing , inferno terror, terrorist arsonists, counter-terrorism, arson attacks 15. NUMBER OF PAGES...kill civilians throughout the building without the attackers setting bombs throughout. However, the literature does not reflect the emerging threat...requiring the expertise to build bombs or anything of that nature; in other words, everyone can burn a house down, but it takes time and skill to blow it up
ERIC Educational Resources Information Center
Blackadar, Andy
This curriculum material, part of a continuing series on current and historical international issues, addresses the issues arising from the September 11, 2001, attacks on the World Trade Center and the Pentagon. On the morning of September 11, 2001, as people watched in horror, terrorist attacks were successfully launched against the United…
Flight calibration tests of a nose-boom-mounted fixed hemispherical flow-direction sensor
NASA Technical Reports Server (NTRS)
Armistead, K. H.; Webb, L. D.
1973-01-01
Flight calibrations of a fixed hemispherical flow angle-of-attack and angle-of-sideslip sensor were made from Mach numbers of 0.5 to 1.8. Maneuvers were performed by an F-104 airplane at selected altitudes to compare the measurement of flow angle of attack from the fixed hemispherical sensor with that from a standard angle-of-attack vane. The hemispherical flow-direction sensor measured differential pressure at two angle-of-attack ports and two angle-of-sideslip ports in diametrically opposed positions. Stagnation pressure was measured at a center port. The results of these tests showed that the calibration curves for the hemispherical flow-direction sensor were linear for angles of attack up to 13 deg. The overall uncertainty in determining angle of attack from these curves was plus or minus 0.35 deg or less. A Mach number position error calibration curve was also obtained for the hemispherical flow-direction sensor. The hemispherical flow-direction sensor exhibited a much larger position error than a standard uncompensated pitot-static probe.
NASA Technical Reports Server (NTRS)
Dugan, Duane W.
1959-01-01
The possibility of obtaining useful estimates of the static longitudinal stability of aircraft flying at high supersonic Mach numbers at angles of attack between 0 and +/-180 deg is explored. Existing theories, empirical formulas, and graphical procedures are employed to estimate the normal-force and pitching-moment characteristics of an example airplane configuration consisting of an ogive-cylinder body, trapezoidal wing, and cruciform trapezoidal tail. Existing wind-tunnel data for this configuration at a Mach number of 6.86 provide an evaluation of the estimates up to an angle of attack of 35 deg. Evaluation at higher angles of attack is afforded by data obtained from wind-tunnel tests made with the same configuration at angles of attack between 30 and 150 deg at five Mach numbers between 2.5 and 3.55. Over the ranges of Mach numbers and angles of attack investigated, predictions of normal force and center-of-pressure locations for the configuration considered agree well with those obtained experimentally, particularly at the higher Mach numbers.
Corrigan, Malachy; McWilliams, Rita; Kelly, Kerry J.; Niles, Justin; Cammarata, Claire; Jones, Kristina; Wartenberg, Daniel; Hallman, William K.; Kipen, Howard M.; Glass, Lara; Schorr, John K.; Feirstein, Ira
2009-01-01
Objectives. We sought to determine the frequency of psychological symptoms and elevated posttraumatic stress disorder (PTSD) risk among New York City firefighters after the World Trade Center (WTC) attack and whether these measures were associated with Counseling Services Unit (CSU) use or mental health–related medical leave over the first 2.5 years after the attack. Methods. Shortly after the WTC attack, a computerized, binary-response screening questionnaire was administered. Exposure assessment included WTC arrival time and “loss of a co-worker while working at the collapse.” We determined elevated PTSD risk using thresholds derived from Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision, and a sensitivity-specificity analysis. Results. Of 8487 participants, 76% reported at least 1 symptom, 1016 (12%) met criteria for elevated PTSD risk, and 2389 (28%) self-referred to the CSU, a 5-fold increase from before the attack. Higher scores were associated with CSU use, functional job impairment, and mental health–related medical leave. Exposure–response gradients were significant for all outcomes. Conclusions. This screening tool effectively identified elevated PTSD risk, higher CSU use, and functional impairment among firefighters and therefore may be useful in allocating scarce postdisaster mental health resources. PMID:19890176
Hitchcock, Penny J; Mair, Michael; Inglesby, Thomas V; Gross, Jonathan; Henderson, D A; O'Toole, Tara; Ahern-Seronde, Joa; Bahnfleth, William P; Brennan, Terry; Burroughs, H E Barney; Davidson, Cliff; Delp, William; Ensor, David S; Gomory, Ralph; Olsiewski, Paula; Samet, Jonathan M; Smith, William M; Streifel, Andrew J; White, Ronald H; Woods, James E
2006-01-01
The prospect of biological attacks is a growing strategic threat. Covert aerosol attacks inside a building are of particular concern. In the summer of 2005, the Center for Biosecurity of the University of Pittsburgh Medical Center convened a Working Group to determine what steps could be taken to reduce the risk of exposure of building occupants after an aerosol release of a biological weapon. The Working Group was composed of subject matter experts in air filtration, building ventilation and pressurization, air conditioning and air distribution, biosecurity, building design and operation, building decontamination and restoration, economics, medicine, public health, and public policy. The group focused on functions of the heating, ventilation, and air conditioning systems in commercial or public buildings that could reduce the risk of exposure to deleterious aerosols following biological attacks. The Working Group's recommendations for building owners are based on the use of currently available, off-the-shelf technologies. These recommendations are modest in expense and could be implemented immediately. It is also the Working Group's judgment that the commitment and stewardship of a lead government agency is essential to secure the necessary financial and human resources and to plan and build a comprehensive, effective program to reduce exposure to aerosolized infectious agents in buildings.
Cuthbertson, Andrew G. S.; Braham, Mohamed
2018-01-01
The almond bark beetle, Scolytus amygdali Geurin-Meneville, is responsible for significant loss of fruit production in almond orchards throughout the world. Here, we studied the damage and the incidences of S. amygdali attack on two different scales: (1) at the level of a single tree; and (2) in an entire orchard. Our results revealed no differences in attack level among four orientations (east, west, south and north sides) for the whole tree. However, the bark that was facing west side in the direction of the prevailing wind was found to be the most suitable for females to initiate attack in Stratum S2. Attack distribution remains the same among different strata (strata is vertical divisions of the tree from the ground to the uppermost twigs with ~40 cm intervals). More than 50% of attack was observed in the trunk of the tree and upper strata. However, multiplication rate (number of emerged adults/maternal gallery) varies significantly between strata. In addition, we studied attack intensity (holes produced by beetle per tree) comparing it to tree morphology (flowers, leaves and circumferences) and gum deposit. Our results revealed a positive correlation between attack intensity and gum deposits, and a negative correlation between attack intensity and tree morphology. This revealed that gum on the tree was an indicator for attack intensity. A positive correlation between attack intensity and the circumference of the tree revealed that older trees were more susceptible to S. amygdali attack. These results, while preliminary, aim to help in the monitoring of S. amygdali populations before deciding to apply any control measures. PMID:29301271
2015-09-11
A memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks stands at Fire Station 1 at NASA's Kennedy Space Center during its dedication on Sept. 11, 2015. A section of steel I-beam from the World Trade Center in New York forms the centerpiece of the monument.
Efforts at 9/11 Historic Sites FEMA debris specialist overlooking work at World Trade Center site - photo , terrorist attacks on the Pentagon and World Trade Center, the Advisory Council on Historic Preservation community," said Milford Wayne Donaldson, FAIA, ACHP chairman. "Yesterday, the world began to see
NASA Technical Reports Server (NTRS)
Ogburn, Marilyn E.; Foster, John V.; Hoffler, Keith D.
2005-01-01
This paper reviews the use of piloted simulation at Langley Research Center as part of the NASA High-Angle-of-Attack Technology Program (HATP), which was created to provide concepts and methods for the design of advanced fighter aircraft. A major research activity within this program is the development of the design processes required to take advantage of the benefits of advanced control concepts for high-angle-of-attack agility. Fundamental methodologies associated with the effective use of piloted simulation for this research are described, particularly those relating to the test techniques, validation of the test results, and design guideline/criteria development.
Supersonic aerodynamic characteristics of a circular body Earth-to-Orbit vehicle
NASA Technical Reports Server (NTRS)
Ware, George M.; Engelund, Walter C.; Macconochie, Ian O.
1994-01-01
The circular body configuration is a generic single- or multi-stage reusable Earth-to-orbit transport. A thick clipped-delta wing is the major lifting surface. For directional control, three different vertical fin arrangements were investigated: a conventional aft-mounted center fin, wingtip fins, and a nose-mounted fin. The tests were conducted in the Langley Unitary Plan Wind Tunnel. The configuration is longitudinally stable about the estimated center of gravity of 0.72 body length up to a Mach number of about 3.0. Above Mach 3.0, the model is longitudinally unstable at low angles of attack but has a stable secondary trim point at angles of attack above 30 deg. The model has sufficient pitch control authority with elevator and body flap to produce stable trim over the test range. The model with the center fin is directionally stable at low angles of attack up to a Mach number of 3.90. The rudder-like surfaces on the tip fins and the all-movable nose fin are designed as active controls to produce artificial directional stability and are effective in producing yawing moment. The wing trailing-edge aileron surfaces are effective in producing rolling moment, but they also produce large adverse yawing moment.
Cybersecurity for distributed energy resources and smart inverters
Qi, Junjian; Hahn, Adam; Lu, Xiaonan; ...
2016-12-01
The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less
Current and potential cyber attacks on medical journals; guidelines for improving security.
Dadkhah, Mehdi; Seno, Seyed Amin Hosseini; Borchardt, Glenn
2017-03-01
At the moment, scholarly publishing is faced with much academic misconduct and threats such as predatory journals, hijacked journals, phishing, and other scams. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats. It seems that information security is missing in some parts of scholarly publishing that particularly involves medical journals. In this paper, we explain different types of cyber-attacks that especially threaten editors and academic journals. We then explain the details involved in each type of attack. Finally, we present general guidelines for detection and prevention of the attacks. In some cases, we use small experiments to show that our claim is true. Finally, we conclude the paper with a prioritization of these attacks. Copyright © 2016 European Federation of Internal Medicine. Published by Elsevier B.V. All rights reserved.
Cybersecurity for distributed energy resources and smart inverters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Qi, Junjian; Hahn, Adam; Lu, Xiaonan
The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less
Richardson, Katherine M
2015-01-01
This study examines the relationship between meaning reconstruction with posttraumatic growth and depreciation in the aftermath of terrorist trauma and loss. A group of individuals (n=118) who were personally affected by the September 11, 2001 terrorist attacks were surveyed about their experiences and administered the Posttraumatic Growth Inventory and Impact of Event scales. Subjects were volunteer docents at the Tribute World Trade Center Visitor Center. Results revealed that ability to make sense of one's 9/11 experience was related to recovery but not to posttraumatic growth, whereas ability to find some benefit in the experience was related to growth. In addition, location in downtown Manhattan on September 11, 2001 was related to higher levels of posttraumatic depreciation. Findings suggest that two aspects of meaning reconstruction are differentially related to recovery and posttraumatic growth.
Brackbill, Robert M.; Cone, James E.; Farfel, Mark R.; Stellman, Steven D.
2014-01-01
Few studies have focused on injuries from the World Trade Center disaster on September 11, 2001. Severe injury has health consequences, including an increased mortality risk 10 years after injury and the risk of mental health problems, such as posttraumatic stress disorder (PTSD). The World Trade Center Health Registry identified 14,087 persons with none of a selected group of preexisting chronic conditions before 2002 who were present during and soon after the World Trade Center attacks, 1,980 of whom reported sustaining 1 or more types of injury (e.g., a broken bone or burn). Survey data obtained during 2003−2004 and 2006−2007 were used to assess the odds of reporting a diagnosis of chronic conditions (heart disease, respiratory disease, diabetes, cancer) up to 5–6 years after the attacks. Number of injury types and probable PTSD were significantly associated with having any chronic conditions diagnosed in 2002–2007. Persons with multiple injuries and PTSD had a 3-fold higher risk of heart disease than did those with no injury and no PTSD, and persons with multiple injuries and with no PTSD had a 2-fold higher risk of respiratory diseases. The present study shows that injured persons with or without comorbid PTSD have a higher risk of developing chronic diseases. Clinicians should be aware of the heightened risk of chronic heart and respiratory conditions among injured persons. PMID:24561992
Brackbill, Robert M; Cone, James E; Farfel, Mark R; Stellman, Steven D
2014-05-01
Few studies have focused on injuries from the World Trade Center disaster on September 11, 2001. Severe injury has health consequences, including an increased mortality risk 10 years after injury and the risk of mental health problems, such as posttraumatic stress disorder (PTSD). The World Trade Center Health Registry identified 14,087 persons with none of a selected group of preexisting chronic conditions before 2002 who were present during and soon after the World Trade Center attacks, 1,980 of whom reported sustaining 1 or more types of injury (e.g., a broken bone or burn). Survey data obtained during 2003-2004 and 2006-2007 were used to assess the odds of reporting a diagnosis of chronic conditions (heart disease, respiratory disease, diabetes, cancer) up to 5-6 years after the attacks. Number of injury types and probable PTSD were significantly associated with having any chronic conditions diagnosed in 2002-2007. Persons with multiple injuries and PTSD had a 3-fold higher risk of heart disease than did those with no injury and no PTSD, and persons with multiple injuries and with no PTSD had a 2-fold higher risk of respiratory diseases. The present study shows that injured persons with or without comorbid PTSD have a higher risk of developing chronic diseases. Clinicians should be aware of the heightened risk of chronic heart and respiratory conditions among injured persons.
... of Privacy Practices Notice of Nondiscrimination Manage Cookies Advertising Mayo Clinic is a not-for-profit organization and proceeds from Web advertising help support our mission. Mayo Clinic does not ...
Exposure and Human Health Evaluation of Airborne Pollution from the World Trade Center Disaster
In the days following the September 11, 2001, terrorist attack on New York City's World Trade Center (WTC) towers, many Federal agencies, including the U.S. Environmental Protection Agency (EPA), were called upon to bring their technical and scientific expertise to the national e...
2015-09-11
Firefighters stand at attention as a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks is dedicated at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. A section of steel I-beam from the World Trade Center in New York forms the centerpiece of the monument.
Neria, Yuval; Gross, Raz; Litz, Brett; Maguen, Shira; Insel, Beverly; Seirmarco, Gretchen; Rosenfeld, Helena; Suh, Eun Jung; Kishon, Ronit; Cook, Joan; Marshall, Randall D
2007-06-01
A Web-based survey of adults who experienced loss during the September 11, 2001, terrorist attacks was conducted to examine the prevalence and correlates of complicated grief (CG) 2.5-3.5 years after the attacks. Forty-three percent of a study group of 704 bereaved adults across the United States screened positive for CG. In multivariate analyses, CG was associated with female gender, loss of a child, death of deceased at the World Trade Center, and live exposure to coverage of the attacks on television. Posttraumatic stress disorder, major depression, anxiety, suicidal ideation, and increase in post-9/11 smoking were common among participants with CG. A majority of the participants with CG reported receiving grief counseling and psychiatric medication after 9/11. Clinical and policy implications are discussed.
Controlling forebody asymmetries in flight: Experience with boundary layer transition strips
NASA Technical Reports Server (NTRS)
Fisher, David F.; Cobleigh, Brent R.
1994-01-01
The NASA Dryden Flight Research Center has an ongoing program to investigate aircraft flight characteristics at high angles of attack. As part of this investigation, longitudinal boundary layer transition strips were installed on the F-18 HARV forebody, a preproduction F/A-18 radome with a nose-slice tendency, and the X-31 aircraft forebody and noseboom to reduce asymmetric yawing moments at high angles of attack. The transition strips were effective on the F-18 HARV at angles of attack above 60 deg. On the preproduction F/A-18 radome at an angle of attack near 50 deg the strips were not effective. When the transition strips were installed on the X-31 noseboom, a favorable effect was observed on the yawing moment dynamics but the magnitude of the yawing moment was not decreased.
Boscarino, Joseph A.; Adams, Richard E.; Figley, Charles R.; Galea, Sandro; Foa, Edna B.
2009-01-01
Objectives To help improve disaster planning and research, we studied psychosocial predictors of terrorism fear and preparedness among New York City residents after the World Trade Center disaster (WTCD). Method We conducted a random cross-sectional survey of 1,681 adults interviewed 2 years after the WTCD. Participants were living in New York City at the time of the attack and exposed to ongoing terrorist threats. Results We found 44.9 percent (95% confidence interval [CI] = 41.9−47.9) of residents were concerned about future attacks and 16.9 percent (95% CI = 14.7−19.3) reported a fear level of “10” on a 10-point analog scale. Furthermore, 14.8 percent (95% CI = 12.8−17.0) reported they had made some plans for a future attack, a significant increase from the previous year. In addition, although 42.6 percent (95% CI = 39.6−45.7) indicated that they would likely wait for evacuation instructions following a chemical, biological, or nuclear attack, 34.4 percent (95% CI = 31.5−37.3) reported they would evacuate immediately against official advice. Predictors of high terrorism fear in a multivariate model included Hispanic ethnicity (odds ratio [OR] = 2.0, P = .006), lower education (OR = 4.4, P < .001, and OR = 3.7, P < .001, respectively, for nonhigh school and high school graduates, compared with college graduates), being exposed to stressful life events (OR = 1.6, P = .048), having current posttraumatic stress disorder (3.1, P < .001), having a fear of death (OR = 2.5, P = .002), and reporting a likelihood of fleeing an attack against advice (OR = 1.5, P = .034). The best predictors of preparedness in a multivariate model was being between 30 to 64 years old (30−44 years old, OR = 2.6, P = .001; 45−64 yeas old, OR = 1.8, P = .03, respectively, compared with 18−29 years old), having higher exposure to the WTCD (moderate exposure, OR = 1.7, P = .05; high exposure, OR = 2.4, P = .002; very high exposure, OR = 4.1, P < .001), respectively, compared with no/little WTCD exposure), and having greater exposure to other lifetime traumatic events (high traumatic event exposure, OR = 2.1, P = .005, compared with no exposure). Conclusion Our study suggests that among those exposed to ongoing terrorism threats, terrorism fear and preparedness were related to socioeconomic factors, mental health status, terrorism exposure levels, and exposure to stressful life events. PMID:17041297
SIGAR Special Inspector General For Afghanistan Reconstruction
2017-07-30
soldiers. One of the worst terror attacks of the Afghan war occurred on May 31, when a truck bomb exploded in the center of Kabul’s diplomatic quarter...RISK-FREE A devastating bomb attack near Afghanistan’s presidential palace in Kabul on May 31, 2017, killed more than 150 people and wounded hundreds...truck- bomb explosion heavily damaged several embassies and injured staff from the German, Japanese, and Pakistani embassies, as well as some U.S
ERIC Educational Resources Information Center
2002
This study investigated the mental health needs of New York City (NYC) public school students 6 months after the September 11, 2001 attack. A needs assessment survey was conducted on 8,266 students in grades 4-12 from 94 schools in the Ground Zero area, other presumed high risk areas, and the remainder of NYC. The survey assessed such factors as…
Overcoming Information Overload in the Cockpit
2009-07-15
has much dierent information needs than a Chinook pi- lot does ying an air assault mission. The former is concerned primarily with angle of attack...pi- lots with an altitude tracking cue. The device conveys path angle error, the error angle between the current ight path and the interception path... angle of attack, NASA’s Dryden Flight Research Center developed a Pressure Cu that utilized a number of inatable, pneumatic bladders, held to the
Impact modeling and prediction of attacks on cyber targets
NASA Astrophysics Data System (ADS)
Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan
2010-04-01
In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.
NASA Astrophysics Data System (ADS)
Liu, Xuan
Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.
Outcomes-based Pricing Program Puts Money in Beneficiaries' Pockets.
Silverman, Ed
2017-08-01
Harvard Pilgrim's program gives rebates to beneficiaries if Repatha doesn't help them avoid a heart attack or stroke. It's just the latest in a growing number of outcomes-based pricing agreements in which an insurer can get a discount from a drugmaker if a drug doesn't help patients as much as expected.
Brault, D
1985-01-01
Haloalkane toxicity originates from attack on biological targets by reactive intermediates derived from haloalkane metabolism by a hemoprotein, cytochrome P-450. Carbon-centered radicals and their peroxyl derivatives are most likely involved. The reactions of iron porphyrin--a model for cytochrome P-450--with various carbon-centered and peroxyl radicals generated by pulse radiolysis are examined. Competition between iron porphyrin and unsaturated fatty acids for attack by peroxyl radicals is pointed out. These kinetic data are used to derive a model for toxicity of haloalkanes with particular attention to carbon tetrachloride and halothane. The importance of local oxygen concentration and structural arrangement of fatty acids around cytochrome P-450 is emphasized. PMID:3007100
National Center for Multisource Information Fusion
2009-04-01
discipline. The center has focused its efforts in solving the growing problems of exploiting massive quantities of diverse, and often...development of a comprehensive high level fusion framework that includes the addition of Levels 2, 3 and 4 type tools to the ECCARS...correlate IDS alerts into individual attacks and provide a threat assessment for the network. A comprehensive review of attack graphs was conducted
Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier
2006-08-26
The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.
Security attack detection algorithm for electric power gis system based on mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan
2017-05-01
Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.
Tongpeth, Jintana; Du, Huiyun; Clark, Robyn
2018-06-19
To evaluate the effectiveness of an interactive, avatar based education application to improve knowledge of and response to heart attack symptoms in people who are at risk of a heart attack. Poor knowledge of heart attack symptoms is recognised as a significant barrier to timely medical treatment. Numerous studies have demonstrated that technology can assist in patient education to improve knowledge and self-care. A single-center, non-blinded, two parallel groups, pragmatic randomized controlled trial. Seventy patients will be recruited from the coronary care unit of a public hospital. Eligible participants will be randomised to either the usual care or the intervention group (usual care plus avatar-based heart attack education app). The primary outcome of this study is knowledge. Secondary outcomes include response to heart attack symptoms, health service use and satisfaction. Study participants will be followed-up for six months. This study will evaluate the avatar based education app as a method to deliver vital information to patients. Participants' knowledge of and response to heart attack symptoms, as well as their health service use, will be assessed to evaluate the intervention effectiveness. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
French Ministry of Health's response to Paris attacks of 13 November 2015.
Philippe, Jean-Marc; Brahic, Olivier; Carli, Pierre; Tourtier, Jean-Pierre; Riou, Bruno; Vallet, Benoit
2016-04-01
On Friday November 13th at 9:20 pm, three kamikaze bombs went off around the Stade de France a stadium in Saint-Denis just outside Paris, 4 different shootings took place and bombings in Paris and hundreds of people were held hostage in a theater.This multi-site terrorist attack was the first of this magnitude in France. Drawing the lessons of these attacks and those which occurred in other countries from a health perspective is essential to continuously adapt and improve the French response to possible future attacks. Several issues would need to be further explored: Management of uncertainties: When to trigger the plans: after the 1st attack, the 2nd? When do attacks end and when to release mobilized resources? Management of victims: How to ensure that all victims are secured or taken care of? How to provide assistance when attacks are ongoing? Management of teams: Proper follow-up of persons involved in the response: health professionals, police and firemen, emergency call centers but also civil servants within administration that contributed to the response. Communication: Reactivity of all is a key element to secure appropriate resource is mobilized for the response. All actors have to be able to communicate quickly in a secured way.
Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks
NASA Astrophysics Data System (ADS)
Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi
2016-09-01
The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.
Effects of Angle of Attack and Velocity on Trailing Edge Noise
NASA Technical Reports Server (NTRS)
Hutcheson, Florence V.; Brooks, Thomas F.
2006-01-01
Trailing edge (TE) noise measurements for a NACA 63-215 airfoil model are presented, providing benchmark experimental data for a cambered airfoil. The effects of flow Mach number and angle of attack of the airfoil model with different TE bluntnesses are shown. Far-field noise spectra and directivity are obtained using a directional microphone array. Standard and diagonal removal beamforming techniques are evaluated employing tailored weighting functions for quantitatively accounting for the distributed line character of TE noise. Diagonal removal processing is used for the primary database as it successfully removes noise contaminates. Some TE noise predictions are reported to help interpret the data, with respect to flow speed, angle of attack, and TE bluntness on spectral shape and peak levels. Important findings include the validation of a TE noise directivity function for different airfoil angles of attack and the demonstration of the importance of the directivity function s convective amplification terms.
NASA Technical Reports Server (NTRS)
1976-01-01
A Langley-built 0.015-scale SSV orbiter configuration with remote independently operated left and right elevon surfaces was tested in the NASA/Langley Research Center Low Turbulence Pressure Tunnel. A detailed aerodynamic data base was obtained for the current shuttle orbiter configuration. Special attention was directed to definition of Reynolds number effects on nonlinear aerodynamic characteristics of the orbiter. Small increments in angle of attack, sideslip, and elevon/aileron position were studied in order to better define areas where nonlinearities may occur. Force and moment, and elevon position data were recorded over an angle of attack range -2 deg to 20 deg at angles of sideslip of 0 deg , + or - 2 deg, and + or - 4 deg. Tests were also made over an angle of sideslip range of -6 deg to 6 deg at selected angles of attack and elevon/aileron position. The test Mach numbers were from 0.15 to 0.30 at Reynolds numbers from 2.0 to 13.5 million per foot.
... heart attack. IVUS has helped providers understand how stents become clogged. This is called stent restenosis. ... IVUS is commonly done to make sure a stent is correctly placed during angioplasty. It may also ...
... help walking when you have a loss of balance during a vertigo attack. Avoid bright lights, TV, ... include: Blood pressure reading Electrocardiogram ( ECG ) Hearing tests Balance testing ( ENG ) Magnetic Resonance Imaging (MRI) Your provider ...
... of nonsteroidal anti-inflammatory drugs (NSAIDs), but not aspirin, may increase the risk of heart attack or ... your doctor about whether you may benefit from aspirin primary prevention , or using aspirin to help prevent ...
Leading edge flap system for aircraft control augmentation
NASA Technical Reports Server (NTRS)
Rao, D. M. (Inventor)
1984-01-01
Traditional roll control systems such as ailerons, elevons or spoilers are least effective at high angles of attack due to boundary layer separation over the wing. This invention uses independently deployed leading edge flaps on the upper surfaces of vortex stabilized wings to shift the center of lift outboard. A rolling moment is created that is used to control roll in flight at high angles of attack. The effectiveness of the rolling moment increases linearly with angle of attack. No adverse yaw effects are induced. In an alternate mode of operation, both leading edge flaps are deployed together at cruise speeds to create a very effective airbrake without appreciable modification in pitching moment. Little trim change is required.
In the days following the September 11, 2001, terrorist attack on New York City's World Trade Center (WTC) towers, EPA, other federal agencies, and New York City and New York State public health and environmental authorities initiated numerous air monitoring activities to better ...
MONITORING TOXIC ORGANIC GASES AND PARTICLES NEAR THE WORLD TRADE CENTER AFTER SEPTEMBER 11, 2001
The September 11, 2001 attack on the World Trade Center (WTC) resulted in an intense fire and the subsequent, complete collapse of the two main structures and adjacent buildings, as well as significant damage to many surrounding buildings within and around the WTC complex. Thi...
2015-09-11
Officials and firefighters at NASA's Kennedy Space Center observe the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at Kennedy on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
A memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks stands at Fire Station 1 at NASA's Kennedy Space Center prior to its dedication on Sept. 11, 2015. Beneath the American flag is a section of steel I-beam from the World Trade Center in New York that forms the centerpiece of the monument.
2015-09-11
Firefighters place the American flag at half-staff during dedication services for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. A section of steel I-beam from the World Trade Center in New York forms the centerpiece of the monument.
Busingye, Doreen; Pedigo, Ashley; Odoi, Agricola
2011-12-01
The objective of this study was to investigate temporal changes in geographic access to emergency heart attack and stroke care. Network analysis was used to compute travel time to the nearest emergency room (ER), cardiac, and stroke centers in Middle Tennessee. Populations within 30, 60, and 90 min driving time to the nearest ER, cardiac and stroke centers were identified. There were improvements in timely access to cardiac and stroke centers over the study period (1999-2010). There were significant (p<0.0001) increases in the proportion of the population with access to cardiac centers within 30 min from 29.4% (1999) to 62.4% (2009) while that for stroke changed from 5.4% (2004) to 46.1% (2010). Most (96%) of the population had access to an ER within 30 min from 1999 to 2010. Access to care has improved in the last decade but more still needs to be done to address disparities in rural communities. Copyright © 2011 Elsevier Ltd. All rights reserved.
Slat Noise Simulations: Status and Challenges
NASA Technical Reports Server (NTRS)
Choudhari, Meelan M.; Lockard, David P.; Khorrami, Mehdi R.; Mineck, Raymond E.
2011-01-01
Noise radiation from the leading edge slat of a high-lift system is known to be an important component of aircraft noise during approach. NASA's Langley Research Center is engaged in a coordinated series of investigations combining high-fidelity numerical simulations and detailed wind tunnel measurements of a generic, unswept, 3-element, high-lift configuration. The goal of this effort is to provide a validated predictive capability that would enable identification of the dominant noise source mechanisms and, ultimately, help develop physics inspired concepts for reducing the far-field acoustic intensity. This paper provides a brief overview of the current status of the computational effort and describes new findings pertaining to the effects of the angle of attack on the aeroacoustics of the slat cove region. Finally, the interplay of the simulation campaign with the concurrently evolving development of a benchmark dataset for an international workshop on airframe noise is outlined.
Computational Analysis of a Low-Boom Supersonic Inlet
NASA Technical Reports Server (NTRS)
Chima, Rodrick V.
2011-01-01
A low-boom supersonic inlet was designed for use on a conceptual small supersonic aircraft that would cruise with an over-wing Mach number of 1.7. The inlet was designed to minimize external overpressures, and used a novel bypass duct to divert the highest shock losses around the engine. The Wind-US CFD code was used to predict the effects of capture ratio, struts, bypass design, and angles of attack on inlet performance. The inlet was tested in the 8-ft by 6-ft Supersonic Wind Tunnel at NASA Glenn Research Center. Test results showed that the inlet had excellent performance, with capture ratios near one, a peak core total pressure recovery of 96 percent, and a stable operating range much larger than that of an engine. Predictions generally compared very well with the experimental data, and were used to help interpret some of the experimental results.
Anticipating Terrorist Safe Havens from Instability Induced Conflict
NASA Astrophysics Data System (ADS)
Shearer, Robert; Marvin, Brett
This chapter presents recent methods developed at the Center for Army Analysis to classify patterns of nation-state instability that lead to conflict. The ungoverned areas endemic to failed nation-states provide terrorist organizations with safe havens from which to plan and execute terrorist attacks. Identification of those states at risk for instability induced conflict should help to facilitate effective counter terrorism policy planning efforts. Nation-states that experience instability induced conflict are similar in that they share common instability factors that make them susceptible to experiencing conflict. We utilize standard pattern classification algorithms to identify these patterns. First, we identify features (political, military, economic and social) that capture the instability of a nation-state. Second, we forecast the future levels of these features for each nation-state. Third, we classify each future state’s conflict potential based upon the conflict level of those states in the past most similar to the future state.
High-Alpha Handling Qualities Flight Research on the NASA F/A-18 High Alpha Research Vehicle
NASA Technical Reports Server (NTRS)
Wichman, Keith D.; Pahle, Joseph W.; Bahm, Catherine; Davidson, John B.; Bacon, Barton J.; Murphy, Patrick C.; Ostroff, Aaron J.; Hoffler, Keith D.
1996-01-01
A flight research study of high-angle-of-attack handling qualities has been conducted at the NASA Dryden Flight Research Center using the F/A-18 High Alpha Research Vehicle (HARV). The objectives were to create a high-angle-of-attack handling qualities flight database, develop appropriate research evaluation maneuvers, and evaluate high-angle-of-attack handling qualities guidelines and criteria. Using linear and nonlinear simulations and flight research data, the predictions from each criterion were compared with the pilot ratings and comments. Proposed high-angle-of-attack nonlinear design guidelines and proposed handling qualities criteria and guidelines developed using piloted simulation were considered. Recently formulated time-domain Neal-Smith guidelines were also considered for application to high-angle-of-attack maneuvering. Conventional envelope criteria were evaluated for possible extension to the high-angle-of-attack regime. Additionally, the maneuvers were studied as potential evaluation techniques, including a limited validation of the proposed standard evaluation maneuver set. This paper gives an overview of these research objectives through examples and summarizes result highlights. The maneuver development is described briefly, the criteria evaluation is emphasized with example results given, and a brief discussion of the database form and content is presented.
Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.
Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li; Bo Chen; Ho, Daniel W C; Guoqiang Hu; Li Yu; Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li
2018-06-01
State estimation plays an essential role in the monitoring and supervision of cyber-physical systems (CPSs), and its importance has made the security and estimation performance a major concern. In this case, multisensor information fusion estimation (MIFE) provides an attractive alternative to study secure estimation problems because MIFE can potentially improve estimation accuracy and enhance reliability and robustness against attacks. From the perspective of the defender, the secure distributed Kalman fusion estimation problem is investigated in this paper for a class of CPSs under replay attacks, where each local estimate obtained by the sink node is transmitted to a remote fusion center through bandwidth constrained communication channels. A new mathematical model with compensation strategy is proposed to characterize the replay attacks and bandwidth constrains, and then a recursive distributed Kalman fusion estimator (DKFE) is designed in the linear minimum variance sense. According to different communication frameworks, two classes of data compression and compensation algorithms are developed such that the DKFEs can achieve the desired performance. Several attack-dependent and bandwidth-dependent conditions are derived such that the DKFEs are secure under replay attacks. An illustrative example is given to demonstrate the effectiveness of the proposed methods.
Henrich, Christopher C; Shahar, Golan
2008-09-01
This prospective study of 29 Israeli middle school students experiencing terror attacks by Qassam rockets addressed whether higher levels of baseline social support protected adolescents from adverse psychological effects of exposure to rocket attacks. Participants were assessed at two time points 5 months apart, before and after a period of military escalation from May to September 2007. Adolescent self-reported depression was measured at both time points, using the Center for Epidemiological Studies-Child Depression Scale. Social support from family, friends, and school was measured at time 1, via a short form of the Perceived Social Support Scale. Adolescents also reported their exposure to rocket attacks at both time points. There was a significant interaction between social support and exposure to rocket attacks predicting depression over time. As hypothesized, baseline levels of social support buffered against the effect of exposure to rocket attacks on increased depression. Conversely, social support was associated with increased depression for adolescents who were not exposed to rocket attacks. Findings highlight the potential importance of community mental health efforts to bolster schools, families, and peer groups as protective resources in times of traumatic stress.
Magnus effects on spinning transonic missiles
NASA Technical Reports Server (NTRS)
Seginer, A.; Rosenwasser, I.
1983-01-01
Magnus forces and moments were measured on a basic-finner model spinning in transonic flow. Spin was induced by canted fins or by full-span or semi-span, outboard and inboard roll controls. Magnus force and moment reversals were caused by Mach number, reduced spin rate, and angle of attack variations. Magnus center of pressure was found to be independent of the angle of attack but varied with the Mach number and model configuration or reduced spin rate.
The War Against Trucks Aerial Interdiction in Southern Laos 1968-1972
2005-01-01
History and its successors.) Capt. William A. Buckingham , Jr., USAF, an intelligence specialist in Southeast Asia during the Vietnam War, unearthed a... Buckingham , Mr. Carl Berger, Mr. Van Staaveren, Dr. Wayne W. Thompson, Dr. Elizabeth H. Hartsook, Mr. Lawrence J. Paszek, Mr. Eugene P. viii The War against...attacks (top); the hard-hit Cholon area of Saigon (center); the Imperial Palace in Hue, damaged during the 1968 Tet attacks (bottom). 77 Khe Sanh
Training for Terror: A Case Study of Al-Qaida
2002-03-01
Khaled Abou el Fadl, a law professor at the University of California at Los Angeles , states that bin Laden and the Taliban are selective in their... Rueda , 2001, p.20). 1. Al-Qaida Attack Chronology Al-Qaida gained notoriety in February 1993 for its bombing of the World Trade Center. This attack...overthrowing any regime that has been 35 corrupted by Western influence (Alexander, 2001, p.2). According to Alexander and Rueda , the following is a
Mortality, mauling, and maiming by vicious dogs.
Bini, John K; Cohn, Stephen M; Acosta, Shirley M; McFarland, Marilyn J; Muir, Mark T; Michalek, Joel E
2011-04-01
Maiming and death due to dog bites are uncommon but preventable tragedies. We postulated that patients admitted to a level I trauma center with dog bites would have severe injuries and that the gravest injuries would be those caused by pit bulls. We reviewed the medical records of patients admitted to our level I trauma center with dog bites during a 15-year period. We determined the demographic characteristics of the patients, their outcomes, and the breed and characteristics of the dogs that caused the injuries. Our Trauma and Emergency Surgery Services treated 228 patients with dog bite injuries; for 82 of those patients, the breed of dog involved was recorded (29 were injured by pit bulls). Compared with attacks by other breeds of dogs, attacks by pit bulls were associated with a higher median Injury Severity Scale score (4 vs. 1; P = 0.002), a higher risk of an admission Glasgow Coma Scale score of 8 or lower (17.2% vs. 0%; P = 0.006), higher median hospital charges ($10,500 vs. $7200; P = 0.003), and a higher risk of death (10.3% vs. 0%; P = 0.041). Attacks by pit bulls are associated with higher morbidity rates, higher hospital charges, and a higher risk of death than are attacks by other breeds of dogs. Strict regulation of pit bulls may substantially reduce the US mortality rates related to dog bites.
Rayne, Sierra
2005-12-09
Concentrations of tetra- through octa-chlorinated dibenzo-p-dioxins and dibenzofurans (PCDD/Fs) were determined in exterior window films from Manhattan and Brooklyn in New York City (NYC), USA, 6 weeks after the World Trade Center (WTC) attacks of 11 September 2001. High concentrations of the 2,3,7,8-substituted congeners (P(2378)CDD/Fs) were observed, at levels up to 6600 pg-TEQ g(-1) nearest the WTC site. An equilibrium partitioning model was developed to reconstruct total gas + particle-phase atmospheric concentrations of P(2378)CDD/Fs at each site. The reconstructed atmospheric and window film concentrations were subsequently used in a preliminary human health risk assessment to estimate the potential cancer and non-cancer risks posed to residents of lower Manhattan from these contaminants over the 6 week exposure period between the WTC attacks and sampling dates. Residents of lower Manhattan appear to have a slightly elevated cancer risk (up to 1.6% increase over background) and increased P(2378)CDD/F body burden (up to 8.0% increase over background) because of above-background exposure to high concentrations of P(2378)CDD/Fs produced from the WTC attacks during the short period between 11 September 2001, and window film sampling 6 weeks later.
Menendez, Anne Marie; Molloy, Janice; Magaldi, Maryann Corrigan
2006-10-01
Much attention has been focused on New York City firefighters and their responses to the traumatic events of the September 11, 2001, terrorist attacks on the World Trade Center, given their extensive involvement in rescue efforts, and the overwhelming loss of life among the fire department employees. It quickly became evident that the impact of this horrendous event had resonated deeply not only on the families and children of the firefighters who gave their lives, but also on those who had survived. The goal of this study was to conduct semi-structured focus groups of women whose firefighter husbands were directly involved in rescue efforts at Ground Zero. We hoped to identify patterns in survivors' responses to the events as well as any coping mechanisms that the participants used to manage their exposure to the tragedy. An analysis of transcripts from interviews reveals the nature and extent of the impact of the trauma on these women, their husbands, and their children. There were two recurring themes that were apparent from the interview data. Women used patterns of connectedness to other spouses to cope with the emotional impact of the event. In addition, participants reported a constant need to be vigilant in helping their families cope. Issues related to the family's physical, mental, and spiritual health in the context of nursing practice are discussed.
Security management based on trust determination in cognitive radio networks
NASA Astrophysics Data System (ADS)
Li, Jianwu; Feng, Zebing; Wei, Zhiqing; Feng, Zhiyong; Zhang, Ping
2014-12-01
Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.
Development of a Flush Airdata Sensing System on a Sharp-Nosed Vehicle for Flight at Mach 3 to 8
NASA Technical Reports Server (NTRS)
Davis, Mark C.; Pahle, Joseph W.; White, John Terry; Marshall, Laurie A.; Mashburn, Michael J.; Franks, Rick
2000-01-01
NASA Dryden Flight Research Center has developed a flush airdata sensing (FADS) system on a sharp-nosed, wedge-shaped vehicle. This paper details the design and calibration of a real-time angle-of-attack estimation scheme developed to meet the onboard airdata measurement requirements for a research vehicle equipped with a supersonic-combustion ramjet engine. The FADS system has been designed to perform in flights at Mach 3-8 and at -6 deg - 12 deg angle of attack. The description of the FADS architecture includes port layout, pneumatic design, and hardware integration. Predictive models of static and dynamic performance are compared with wind-tunnel results across the Mach and angle-of-attack range. Results indicate that static angle-of-attack accuracy and pneumatic lag can be adequately characterized and incorporated into a real-time algorithm.
Development of a Flush Airdata Sensing System on a Sharp-Nosed Vehicle for Flight at Mach 3 to 8
NASA Technical Reports Server (NTRS)
Davis, Mark C.; Pahle, Joseph W.; White, John Terry; Marshall, Laurie A.; Mashburn, Michael J.; Franks, Rick
2000-01-01
NASA Dryden Flight Research Center has developed a flush airdata sensing (FADS) system on a sharp-nosed, wedge-shaped vehicle. This paper details the design and calibration of a real-time angle-of-attack estimation scheme developed to meet the onboard airdata measurement requirements for a research vehicle equipped with a supersonic-combustion ramjet engine. The FADS system has been designed to perform in flights at speeds between Mach 3 and Mach 8 and at angles of attack between -6 deg. and 12 deg. The description of the FADS architecture includes port layout, pneumatic design, and hardware integration. Predictive models of static and dynamic performance are compared with wind-tunnel results across the Mach and angle-of-attack range. Results indicate that static angle-of-attack accuracy and pneumatic lag can be adequately characterized and incorporated into a real-time algorithm.
... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, ... Tools & Resources Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...
... symptoms and other medicines have not worked well. Crisis situations are attacks of weakness of the breathing ... may also be used to help end the crisis. This procedure involves removing the clear part of ...
Resilience in Arab American couples after September 11, 2001: a systems perspective.
Beitin, Ben K; Allen, Katherine R
2005-07-01
Guided by a family resiliency model grounded in systems theory and social constructionism, we conducted in-depth interviews to explore how 18 Arab American couples living in New York and New Jersey perceived and dealt with the terrorist attacks and aftereffects of September 11, 2001. Results are organized around five themes: Making sense of the attacks; the social environment after September 11, 2001; construction of identity: Arab and/or American; how couples cope: reactions and resources; and immigration and acculturation. Clinical recommendations include helping couples to uncover and to explore conflicts in both Arab and American identities, using genograms to deal with family-of-origin histories, recognizing specific couple dynamics linked to traditional gender roles, helping couples connect to religious and cultural communities, and assessing acculturation.
Panic attacks and panic disorder in a population-based sample of active Canadian military personnel.
Kinley, D Jolene; Walker, John R; Mackenzie, Corey S; Sareen, Jitender
2011-01-01
The factors contributing to psychiatric problems among military personnel, particularly for panic, are unclear. The objective of this study was to examine the prevalence and correlates of panic disorder and panic attacks in the Canadian military. Statistics Canada and the Department of National Defense conducted the Canadian Community Health Survey-Canadian Forces Supplement in 2002 (May to December) with a representative sample of active Canadian military personnel (aged 16-54 years; N = 8,441; response rate, 81.5%). Comparisons were made between respondents with no past-year panic attacks, panic attacks without panic disorder, and panic disorder on measures of DSM-IV mental disorders, as well as validated measures of disability, distress, suicidal ideation, perceived need for mental health treatment, and mental health service use. Lifetime exposure to combat operations, witnessing of atrocities, and deployments were also assessed. Panic disorder and panic attacks were common in the military population, with past-year prevalence estimates of 1.8% and 7.0%, respectively. Both panic disorder and panic attacks were associated with increased odds of all mental disorders assessed, suicidal ideation, 2-week disability, and distress. Perceived need for mental health treatment and service use were common in individuals with panic attacks and panic disorder (perceived need: 46.3% for panic attacks, 89.6% for panic disorder; service use: 32.5% for panic attacks, 74.5% for panic disorder). Panic attacks and panic disorder in the military are associated with outcomes that could be detrimental to well-being and work performance, and early detection of panic in this population could help reduce these negative outcomes. © Copyright 2011 Physicians Postgraduate Press, Inc.
NASA Technical Reports Server (NTRS)
Ware, George M.
1989-01-01
An investigation was conducted in the Langley Unitary Plan Wind Tunnel at Mach numbers from 1.6 to 4.5. The model had a low-aspect-ratio body with a flat undersurface. A center fin and two outboard fins were mounted on the aft portion of the upper body. The outboard fins were rolled outboard 40 deg from the vertical. Elevon surfaces made up the trailing edges of the outboard fins, and body flaps were located on the upper and lower aft fuselage. The center fin pivoted about its midchord for yaw control. The model was longitudinally stable about the design center-of-gravity position at 54 percent of the body length. The configuration with undeflected longitudinal controls trimmed near 0 deg angle of attack at Mach numbers from 1.6 to 3.0 where lift and lift-drag ratio were negative. Longitudinal trim was near the maximum lift-drag ratio (1.4) at Mach 4.5. The model was directionally stable over Mach number range except at angles of attack around 4 deg at M = 2.5. Pitch control deflection of more than -10 deg with either elevons or body flaps is needed to trim the model to angles of attack at which lift becomes positive. With increased control deflection, the lifting-body configuration should perform the assured crew return mission through the supersonic speed range.
Factors influencing care seeking for a self-defined worst panic attack.
Katerndahl, David A
2002-04-01
Only 60 percent of persons who experience panic attacks seek treatment for them, many at the emergency department. The author documented care-seeking behaviors among persons living in the community who had experienced panic attacks and studied determinants of care seeking. In-depth structured interviews were conducted with 97 randomly selected community-dwelling adults who met DSM-III-R criteria for panic attacks. Participants were asked whether they had contemplated using or had actually used medical, alternative, and family sources of care when they had experienced their worst attack. Seventy-seven participants (79 percent) had considered using a general medical or mental health site when they experienced their worst attack. Of these, 50 (52 percent) had actually used such a site. General medical sites were contemplated more often (72 percent of participants) than mental health sites (27 percent), particularly emergency departments (43 percent) and family physicians' offices (34 percent). Other sources, such as friends or family members, alternative sites, and self-treatment, were contemplated less often. Once contemplated, certain sources were readily used, such as ambulances, family members, and self-treatment. Several factors were significantly associated with whether a person contemplated seeking care: access or barriers to treatment, perception of symptoms and of the reasons for the panic attack, and family-related variables. Contemplation and use of a mental health site after a panic attack was rare among the participants in this study. Further study of determinants of care seeking may help explain why persons who experience panic attacks fail to seek treatment or seek treatment from non-mental health sources.
Informing pest prevention efforts through Sentinel Plant Monitoring
2010-01-01
Botanic gardens with international collections provide a unique opportunity to help detect potential invasive threats to forest health. Nursery stock is well-recognized as a major pathway for the introduction of invasive insects and pathogens to native ecosystems. Plant health regulators need help knowing what pests attack host plants abroad so they can develop ways to...
Semantic policy and adversarial modeling for cyber threat identification and avoidance
NASA Astrophysics Data System (ADS)
DeFrancesco, Anton; McQueary, Bruce
2009-05-01
Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.
A Clock Fingerprints-Based Approach for Wireless Transmitter Identification
NASA Astrophysics Data System (ADS)
Zhao, Caidan; Xie, Liang; Huang, Lianfen; Yao, Yan
Cognitive radio (CR) was proposed as one of the promising solutions for low spectrum utilization. However, security problems such as the primary user emulation (PUE) attack severely limit its applications. In this paper, we propose a clock fingerprints-based authentication approach to prevent PUE attacks in CR networks with the help of curve fitting and classifier. An experimental setup was constructed using the WLAN cards and software radio devices, and the corresponding results show that satisfied identification can be achieved for wireless transmitters.
North, Carol S.; Pollio, David E.; Smith, Rebecca P.; King, Richard V.; Pandya, Anand; Surís, Alina M.; Hong, Barry A.; Dean, Denis J.; Wallace, Nancy E.; Herman, Daniel B.; Conover, Sarah; Susser, Ezra; Pfefferbaum, Betty
2013-01-01
Objective Several studies have provided prevalence estimates of posttraumatic stress disorder (PTSD) related to the September 11, 2001 (9/11) attacks in broadly affected populations, although without sufficiently addressing qualifying exposures required for assessing PTSD and estimating its prevalence. A premise that people throughout the New York City area were exposed to the attacks on the World Trade Center (WTC) towers and are thus at risk for developing PTSD has important implications for both prevalence estimates and service provision. This premise has not, however, been tested with respect to DSM-IV-TR criteria for PTSD. This study examined associations between geographic distance from the 9/11 attacks on the WTC and reported 9/11 trauma exposures, and the role of specific trauma exposures in the development of PTSD. Methods Approximately 3 years after the attacks, 379 surviving employees (102 with direct exposures, including 65 in the towers, and 277 with varied exposures) recruited from 8 affected organizations were interviewed using the Diagnostic Interview Schedule/Disaster Supplement and reassessed at 6 years. The estimated closest geographic distance from the WTC towers during the attacks and specific disaster exposures were compared with the development of 9/11–related PTSD as defined by the Diagnostic and Statistical Manual, Fourth Edition, Text Revision. Results The direct exposure zone was largely concentrated within a radius of 0.1 mi and completely contained within 0.75 mi of the towers. PTSD symptom criteria at any time after the disaster were met by 35% of people directly exposed to danger, 20% of those exposed only through witnessed experiences, and 35% of those exposed only through a close associate’s direct exposure. Outside these exposure groups, few possible sources of exposure were evident among the few who were symptomatic, most of whom had preexisting psychiatric illness. Conclusions Exposures deserve careful consideration among widely affected populations after large terrorist attacks when conducting clinical assessments, estimating the magnitude of population PTSD burdens, and projecting needs for specific mental health interventions. PMID:21900416
North, Carol S; Pollio, David E; Smith, Rebecca P; King, Richard V; Pandya, Anand; Surís, Alina M; Hong, Barry A; Dean, Denis J; Wallace, Nancy E; Herman, Daniel B; Conover, Sarah; Susser, Ezra; Pfefferbaum, Betty
2011-09-01
Several studies have provided prevalence estimates of posttraumatic stress disorder (PTSD) related to the September 11, 2001 (9/11) attacks in broadly affected populations, although without sufficiently addressing qualifying exposures required for assessing PTSD and estimating its prevalence. A premise that people throughout the New York City area were exposed to the attacks on the World Trade Center (WTC) towers and are thus at risk for developing PTSD has important implications for both prevalence estimates and service provision. This premise has not, however, been tested with respect to DSM-IV-TR criteria for PTSD. This study examined associations between geographic distance from the 9/11 attacks on the WTC and reported 9/11 trauma exposures, and the role of specific trauma exposures in the development of PTSD. Approximately 3 years after the attacks, 379 surviving employees (102 with direct exposures, including 65 in the towers, and 277 with varied exposures) recruited from 8 affected organizations were interviewed using the Diagnostic Interview Schedule/Disaster Supplement and reassessed at 6 years. The estimated closest geographic distance from the WTC towers during the attacks and specific disaster exposures were compared with the development of 9/11-related PTSD as defined by the Diagnostic and Statistical Manual, Fourth Edition, Text Revision. The direct exposure zone was largely concentrated within a radius of 0.1 mi and completely contained within 0.75 mi of the towers. PTSD symptom criteria at any time after the disaster were met by 35% of people directly exposed to danger, 20% of those exposed only through witnessed experiences, and 35% of those exposed only through a close associate's direct exposure. Outside these exposure groups, few possible sources of exposure were evident among the few who were symptomatic, most of whom had preexisting psychiatric illness. Exposures deserve careful consideration among widely affected populations after large terrorist attacks when conducting clinical assessments, estimating the magnitude of population PTSD burdens, and projecting needs for specific mental health interventions.
... oxidase inhibitor to treat hyperuricemia (high levels of uric acid) in people with gout (sudden attacks of redness, ... is in a class of medications called selective uric acid reabsorption inhibitors. It works by helping the kidneys ...
NASA Astrophysics Data System (ADS)
Heilbron, John
2005-03-01
As an editor of the Annalen der Physik, Max Planck published Einstein's early papers on thermodynamics and on special relativity, which Planck probably was the first major physicist to appreciate. They respected one another not only as physicists but also, for their inspired creation of world pictures, as artists. Planck helped to establish Einstein in a sinecure at the center of German physics, Berlin. Despite their differences in scientific style, social life, politics, and religion, they became fast friends. Their mutual admiration survived World War I, during which Einstein advocated pacifism and Planck signed the infamous Manifesto of the 93 Intellectuals supporting the German invasion of Belgium. It also survived the Weimar Republic, which Einstein favored and Planck disliked. Physics drew them together, as both opposed the Copenhagen Interpretation; so did common decency, as Planck helped to protect Einstein from anti-semitic attacks. Their friendship did not survive the Nazis. As a standing secretary of the Berlin Academy, Planck had to advise Einstein to resign from it before his colleagues, outraged at his criticism of the new Germany from the safety of California, expelled him. Einstein never forgave his old friend and former fellow artist for not protesting publicly against his expulsion and denigration, and other enormities of National Socialism. .
NASA Technical Reports Server (NTRS)
Treybig, J. H.
1975-01-01
Thermal and equilibrium glide boundaries were used to analyze and/or design shuttle orbiter entry trajectories. Plots are presented of orbiter thermal and equilibrium glide boundaries in the drag/mass-relative velocity dynamic pressure-relative velocity, and altitude-relative velocity planes for an orbiter having a 32,000 pound payload and a 67.5% center of gravity location. These boundaries were defined for control points 1 through 4 of the shuttle orbiter for 40 deg-30 deg and 38 deg-28 deg ramped angle of attack entry profiles and 40 deg, 38 deg, 35 deg, 30 deg, 28 deg, and 25 deg constant angle of attack entry profiles each at 20 deg, 15 deg, and 10 deg constant body flap settings.
Bowen, William M; Chen, Jen-Yi; Tukel, Oya I
2014-01-01
Urban health authorities in the United States have been charged with developing plans for providing the infrastructure necessary to dispense prophylactic medications to their populations in the case of epidemic disease outbreak or bioterrorist attack. However, no specific method for such plans has been prescribed. This article formulates and demonstrates the use of an integer programming technique for helping to solve a part of the dispensing problem faced by cities, namely that of providing the federally required infrastructure at minimum cost, using their limited time and resources. Specifically, the technique minimizes the number of point-of-dispensing (POD) centers while covering every resident in all the census tracts within the city's jurisdiction. It also determines the optimal staffing requirement in terms of the number of nurses at each POD. This article includes a demonstration of the model using real data from Cleveland, OH, a mid-sized US city. Examples are provided of data and computational results for a variety of input parameter values such as population throughput rate, POD capacities, and distance limitations. The technique can be readily adapted to a wide range of urban areas.
A Scalable Data Integration and Analysis Architecture for Sensor Data of Pediatric Asthma.
Stripelis, Dimitris; Ambite, José Luis; Chiang, Yao-Yi; Eckel, Sandrah P; Habre, Rima
2017-04-01
According to the Centers for Disease Control, in the United States there are 6.8 million children living with asthma. Despite the importance of the disease, the available prognostic tools are not sufficient for biomedical researchers to thoroughly investigate the potential risks of the disease at scale. To overcome these challenges we present a big data integration and analysis infrastructure developed by our Data and Software Coordination and Integration Center (DSCIC) of the NIBIB-funded Pediatric Research using Integrated Sensor Monitoring Systems (PRISMS) program. Our goal is to help biomedical researchers to efficiently predict and prevent asthma attacks. The PRISMS-DSCIC is responsible for collecting, integrating, storing, and analyzing real-time environmental, physiological and behavioral data obtained from heterogeneous sensor and traditional data sources. Our architecture is based on the Apache Kafka, Spark and Hadoop frameworks and PostgreSQL DBMS. A main contribution of this work is extending the Spark framework with a mediation layer, based on logical schema mappings and query rewriting, to facilitate data analysis over a consistent harmonized schema. The system provides both batch and stream analytic capabilities over the massive data generated by wearable and fixed sensors.
Risk factors for hypertensive attack during pheochromocytoma resection
Kwon, Se Yun; Lee, Kyung Seop; Lee, Jun Nyung; Ha, Yun-Sok; Choi, Seock Hwan; Kim, Hyun Tae; Kim, Tae-Hwan; Yoo, Eun Sang
2016-01-01
Purpose We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. Materials and Methods Data from 53 patients diagnosed with pheochromocytoma at Kyungpook National Uriversity Medical Center between January 2000 and June 2012 were retrospectively analyzed. The subjects were divided into 2 groups depending on the presence or absence of hypertensive attack at the time of surgery. Patient demographic characteristics and preoperative evaluations were assessed for their prognostic relevance with respect to hypertensive attack. A univariate analysis was conducted, and a multivariate logistic regression analysis was also performed. Results In the univariate analysis, systolic blood pressure at presentation, preoperative hormonal status (including epinephrine, norepinephrine, vanillylmandelic acid, and metanephrine levels in a 24-hour urine sample), tumor size, and postoperative systolic blood pressure were significantly associated with the development of hypertensive attack. In the multivariate analysis, preoperative epinephrine level and tumor size were independent factors that predicted hypertensive attack. The highest odds ratio for tumor size (2.169) was obtained at a cutoff value of 4.25 cm and the highest odds ratio for preoperative epinephrine (1.020) was obtained at a cutoff value of 166.3 µg/d. Conclusions In this study, a large tumor size and an elevated preoperative urinary epinephrine level were risk factors for intraoperative hypertensive attack in patients with pheochromocytoma. PMID:27194549
Use of cannabis among 139 cluster headache sufferers.
Leroux, Elizabeth; Taifas, Irina; Valade, Dominique; Donnet, Anne; Chagnon, Miguel; Ducros, Anne
2013-02-01
A case report suggested the efficacy of cannabis to treat cluster headache (CH) attacks. Our aims were to study the frequency of cannabis use in CH patients, and the reported effects on attacks. A total of 139 patients with CH attending two French headache centers filled out questionnaires. Sixty-three of the 139 patients (45.3%) had a history of cannabis use. As compared to nonusers, cannabis users were more likely to be younger (p < 0.001), male (p = 0.002) and tobacco smokers (p < 0.001). Among the 27 patients (19.4% of the total cohort) who had tried cannabis to treat CH attacks, 25.9% reported some efficacy, 51.8% variable or uncertain effects, and 22.3% negative effects. Cannabis use is very frequent in CH patients, but its efficacy for the treatment of the attacks is limited. Less than one third of self-reported users mention a relief of their attacks following inhalation. Cannabis should not be recommended for CH unless controlled trials with synthetic selective cannabinoids show a more convincing therapeutic benefit.
... more information. J If you smoke or use e-cigarettes, quit. J Lose weight if needed. Eating healthy, ... lower LDL cholesterol. They also help lower your risk for a heart attack or stroke. Adults with ...
Diverticulitis Diet: Can Certain Foods Trigger an Attack?
... of Privacy Practices Notice of Nondiscrimination Manage Cookies Advertising Mayo Clinic is a not-for-profit organization and proceeds from Web advertising help support our mission. Mayo Clinic does not ...
Limit Asthma Attacks Caused by Colds or Flu
... of Privacy Practices Notice of Nondiscrimination Manage Cookies Advertising Mayo Clinic is a not-for-profit organization and proceeds from Web advertising help support our mission. Mayo Clinic does not ...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-28
...Title I of the James Zadroga 9/11 Health and Compensation Act of 2010 amended the Public Health Service Act (PHS Act) by adding Title XXXIII, which establishes the World Trade Center (WTC) Health Program. The WTC Health Program is administered by the Director of the National Institute for Occupational Safety and Health (NIOSH), within the Centers for Disease Control and Prevention (CDC), in the Department of Health and Human Services (HHS), and provides medical monitoring and treatment to eligible firefighters and related personnel, law enforcement officers, and rescue, recovery, and cleanup workers who responded to the September 11, 2001, terrorist attacks in New York City, Shanksville, Pennsylvania, and at the Pentagon, and to eligible survivors of the New York City attacks. Section 3311(a)(2)(C) of the PHS Act requires the WTC Program Administrator (Administrator) to develop eligibility criteria for enrollment of Shanksville, Pennsylvania and Pentagon responders. This interim final rule establishes those eligibility criteria.
NASA Technical Reports Server (NTRS)
Lackey, J.; Hadfield, C.
1992-01-01
Recent mishaps and incidents on Class IV aircraft have shown a need for establishing quantitative longitudinal high angle of attack (AOA) pitch control margin design guidelines for future aircraft. NASA Langley Research Center has conducted a series of simulation tests to define these design guidelines. Flight test results have confirmed the simulation studies in that pilot rating of high AOA nose-down recoveries were based on the short-term response interval in the forms of pitch acceleration and rate.
2015-09-11
An honor guard folds an American flag during the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
Kelvin Manning, associate director of NASA's Kennedy Space Center, speaks during the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at Kennedy on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
An honor guard prepares to fold an American flag during the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
The honor guard for the Fire Department at NASA's Kennedy Space Center conducts the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at Kennedy on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
The Brevard Police and Fire Pipe and Drum corps open the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
The Brevard Police and Fire Pipe and Drum corps perform during the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
Esteves, Pedro T; Araújo, Duarte; Vilar, Luís; Travassos, Bruno; Davids, Keith; Esteves, Carlos
2015-04-01
This study examined the continuous interpersonal interactions of performers in dyadic systems in team sports, as a function of changing information constraints. As a task vehicle, we investigated how attackers attained success in 1v1 sub-phases of basketball by exploring angular relations with immediate opponents and the basket. We hypothesized that angular relations would convey information for the attackers to dribble past defenders. Four basketball players performed as an attacker and defender in 1v1 sub-phases of basketball, in which the co-positioning and orientation of participants relative to the basket was manipulated. After video recording performance behaviors, we digitized participant movement displacement trajectories and categorized trials as successful or unsuccessful (from the attackers' viewpoint). Results revealed that, to successfully dribble past a defender, attackers tended to explore the left hand side of the space by defenders by increasing their angular velocity and decreasing their angular variability, especially in the center of the court. Interpersonal interactions and goal-achievement in attacker-defender dyads appear to have been constrained by the angular relations sustained between participants relative to the scoring target. Results revealed the functionality of exploratory behaviors of participants attempting re-align spatial relations with an opponent in 1v1 sub-phases of team games. Copyright © 2015 Elsevier B.V. All rights reserved.
NASA Technical Reports Server (NTRS)
Esparza, V.
1976-01-01
Separation data were obtained at a Mach number of 0.6 and three incidence angles of 4 deg, 6 deg, and 9 deg. The orbiter angle of attack was varied from 0 to 14 degrees. Longitudinal, lateral and normal separation increments were obtained for fixed 747 angles of attack of 0 deg, 2 deg, and 4 deg while varying orbiter angle of attack. Control surface settings on the 747 carrier included rudder deflections of 0 deg and 10 deg and horizontal stabilizer deflections of -1 deg and +5 deg. Photographs of tested configurations are shown.
... normal range. These healthy habits may help prevent future heart attacks and other health problems. Eat foods ... with health and disease. In: Goldman L, Schafer AI, eds. Goldman’s Cecil Medicine . 25th ed. Philadelphia, PA: ...
... After calling for help, take 1 uncoated adult aspirin (325 mg) or 4 uncoated baby aspirins (81 mg each). Don’t take this if you’re allergic to aspirin. If you are alone and are able, unlock ...
NASA Astrophysics Data System (ADS)
Chen, Junhua
2013-03-01
To cope with a large amount of data in current sensed environments, decision aid tools should provide their understanding of situations in a time-efficient manner, so there is an increasing need for real-time network security situation awareness and threat assessment. In this study, the state transition model of vulnerability in the network based on semi-Markov process is proposed at first. Once events are triggered by an attacker's action or system response, the current states of the vulnerabilities are known. Then we calculate the transition probabilities of the vulnerability from the current state to security failure state. Furthermore in order to improve accuracy of our algorithms, we adjust the probabilities that they exploit the vulnerability according to the attacker's skill level. In the light of the preconditions and post-conditions of vulnerabilities in the network, attack graph is built to visualize security situation in real time. Subsequently, we predict attack path, recognize attack intention and estimate the impact through analysis of attack graph. These help administrators to insight into intrusion steps, determine security state and assess threat. Finally testing in a network shows that this method is reasonable and feasible, and can undertake tremendous analysis task to facilitate administrators' work.
... 22, 2012 | News Release NIH launches trial to evaluate anti-inflammatory treatment for preventing heart attacks, strokes, ... and Usage No FEAR Act Grants and Funding Customer Service/Center for Health Information Email Alerts Jobs ...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chaffin, May
May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks.Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.
Managing Critical Infrastructures C.I.M. Suite
Dudenhoeffer, Donald
2018-05-23
See how a new software package developed by INL researchers could help protect infrastructure during natural disasters, terrorist attacks and electrical outages. For more information about INL research, visit http://www.facebook.com/idahonationallaboratory.
ERIC Educational Resources Information Center
Swann, Karen
1990-01-01
Explores how Edmund Burke's discourse on the sublime helps illuminate attacks on the vulgarization of culture (as typified by Allan Bloom), both for the presumedly "vulgar" reader and for the champions of high culture. (MG)
Jappens, Ludo
2017-01-01
Until 2015, major terrorist incidents in Belgium were considered a 'black swan'. However, the suicide attacks in Paris on 13th November, 2015 provided a wake-up call. Investigations revealed that the raid was prepared in Belgium by jihadists who grew up in Brussels and was coordinated by Belgian ISIS fighters in Syria. In an instant, it became clear that terror had been embedded in Belgian society and could erupt at any moment. At Belfius Bank Belgium, the subsequent months were a rollercoaster ride of terrorist-related events. Business activities were strongly affected, as the company's head office is located in the centre of Brussels. This paper focuses on the way Belfius responded to the events and how the lessons learned have helped to improve its business continuity and crisis management capability.
Frank, Steven D; Ranger, Christopher M
2016-08-01
Exotic ambrosia beetles are among the most damaging pests of trees grown in nurseries. The primary pests Xylosandrus crassiusculus Motschulsky and Xylosandrus germanus Blandford use ethanol to locate vulnerable trees. Research, primarily with X. germanus, has shown that flood-stressed trees emit ethanol and are preferentially attacked by ambrosia beetles. Our goal was to develop a media (also called potting soil) moisture threshold as an integrated pest management (IPM) tactic and assess grower practices that lead to ambrosia beetle attacks. Flooded Cornus florida L., Cornus kousa Burg., and Magnolia grandiflora L. trees incurred more attacks than unflooded trees that were not attacked. To determine optimal media moisture levels, we grew flood-tolerant Acer rubrum L. and flood-intolerant C. florida in containers with 10, 30, 50, 70, or 90% media moisture. No flooded or unflooded A. rubrum were attacked. However, C. florida grown in 70 or 90% moisture were attacked and died, whereas trees at 30 and 50% moisture were not attacked. Thus, we suggest an upper moisture threshold of 50% when growing C. florida and other flood-intolerant trees. However, during peak ambrosia beetle flight activity in spring 2013 and 2014, we found that media moisture levels in commercial nurseries were often between 50 and 90%. Implementing a media moisture threshold, as a new IPM tool, could reduce ambrosia beetle attacks and the need for insecticide applications, which is currently the only available management tactic. Future research should focus on how changes in substrates, irrigation, and other practices could help growers meet this threshold. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Cluster headache: clinical features and therapeutic options.
Gaul, Charly; Diener, Hans-Christoph; Müller, Oliver M
2011-08-01
Cluster headache is the most common type of trigemino-autonomic headache, affecting ca. 120 000 persons in Germany alone. The attacks of pain are in the periorbital area on one side, last 90 minutes on average, and are accompanied by trigemino-autonomic manifestations and restlessness. Most patients have episodic cluster headache; about 15% have chronic cluster headache, with greater impairment of their quality of life. The attacks often possess a circadian and seasonal rhythm. Selective literature review Oxygen inhalation and triptans are effective acute treatment for cluster attacks. First-line drugs for attack prophylaxis include verapamil and cortisone; alternatively, lithium and topiramate can be given. Short-term relief can be obtained by the subcutaneous infiltration of local anesthetics and steroids along the course of the greater occipital nerve, although most of the evidence in favor of this is not derived from randomized clinical trials. Patients whose pain is inadequately relieved by drug treatment can be offered newer, invasive treatments, such as deep brain stimulation in the hypothalamus (DBS) and bilateral occipital nerve stimulation (ONS). Pharmacotherapy for the treatment of acute attacks and for attack prophylaxis is effective in most patients. For the minority who do not gain adequate relief, newer invasive techniques are available in some referral centers. Definitive conclusions as to their value cannot yet be drawn from the available data.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lemaster, Michelle Nicole; Gay, David M.; Ehlen, Mark Andrew
2009-10-01
Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment whichmore » are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.« less
NASA Technical Reports Server (NTRS)
Walsh, Kevin R.; Yuhas, Andrew J.; Williams, John G.; Steenken, William G.
1997-01-01
The effects of high-angle-of-attack flight on aircraft inlet aerodynamic characteristics were investigated at NASA Dryden Flight Research Center, Edwards, California, as part of NASA's High Alpha Technology Program. The highly instrumented F/A-18A High Alpha Research Vehicle was used for this research. A newly designed inlet total-pressure rake was installed in front of the starboard F404-GE-400 engine to measure inlet recovery and distortion characteristics. One objective was to determine inlet total-pressure characteristics at steady high-angle-of-attack conditions. Other objectives include assessing whether significant differences exist in inlet distortion between rapid angle-of-attack maneuvers and corresponding steady aerodynamic conditions, assessing inlet characteristics during aircraft departures, providing data for developing and verifying computational fluid dynamic codes, and calculating engine airflow using five methods. This paper addresses the first objective by summarizing results of 79 flight maneuvers at steady aerodynamic conditions, ranging from -10 deg to 60 deg angle of attack and from -8 deg to 11 deg angle of sideslip at Mach 0.3 and 0.4. These data and the associated database have been rigorously validated to establish a foundation for understanding inlet characteristics at high angle of attack.
2001-01-01
Based on Energy Information Administration (EIA) contacts and trade press reports, overall U.S. and global oil supplies appear to have been minimally impacted by yesterday's terrorist attacks on the World Trade Center and the Pentagon.
Genetics Home Reference: Omenn syndrome
... cells attack the body's own cells and tissues, accounting for the autoimmune features of Omenn syndrome . Learn ... Immune Response Encyclopedia: Immunodeficiency Disorders Health Topic: Immune System and Disorders Genetic and Rare Diseases Information Center ( ...
Bakhshaie, Jafar; Zvolensky, Michael J; Goodwin, Renee D
2016-01-01
The current study examined the relationship between cigarette smoking (daily) and risk of onset and persistence of panic attacks over a 10-year period among adults in mid-adulthood in the United States and whether quitting smoking reduced the risk for panic attacks. Data were drawn from the Midlife Development in the United States Survey (N = 2,101), a nationally representative sample of adults aged 25 to 74 years at baseline (wave 1, 1994-1995) who were followed up 10 years later at wave 2 (2004-2006). Psychiatric diagnoses were based on the Composite International Diagnostic Interview Short-Form (CIDI-SF [based on DSM-III-R criteria]) scales. Logistic regressions were used to evaluate the associations between smoking status and the onset and persistence of panic attack after controlling for demographic characteristics and substance use problems. Daily smoking in 1994 (OR = 1.9 [95% CI, 1.1-3.3]) and persistent daily smoking in 1994 and 2005 (OR = 2.6 [95% CI, 1.4-4.8]) were associated with a significantly increased likelihood of panic attacks in 2005. Moreover, smoking abstinence significantly reduced the risk of new-onset panic attacks (OR = 0.6 [95% CI, 0.4-0.97]) and persistence of panic attacks (OR = 0.2 [95% CI, 0.1-0.5]). The present data provide novel evidence that smoking is associated with an increased risk of panic attacks and that quitting smoking helps reduce such risk. © Copyright 2016 Physicians Postgraduate Press, Inc.
Mullett-Hume, Elizabeth; Anshel, Daphne; Guevara, Vivianne; Cloitre, Marylene
2008-01-01
Two and one-half years after the September 11, 2001 World Trade Center attack, 204 middle school students in an immigrant community located near Ground Zero were assessed for posttraumatic stress disorder (PTSD) symptoms as influenced by "dose" of exposure to the attack and accumulated lifetime traumas. Ninety percent of students reported at least one traumatic event other than 9/11 (e.g., community violence) with an average of 4 lifetime events reported. An interaction was obtained such that the dose-response effect depended on presence of other traumas. Among students with the lowest number of additional traumas, the usual dose-response pattern of increasing PTSD symptoms with increasing 9/11 exposure was observed; among those with medium to high cumulative life trauma, PTSD symptoms were substantially higher and uniformly so regardless of 9/11 exposure dose. Results suggest that traumas that precede or follow mass violence often have as much as if not greater impact on long-term symptom severity than high-dose exposure to the event. Implications regarding the presence of continuing or previous trauma exposure for postdisaster and early intervention policies are discussed. (c) 2008 APA, all rights reserved
Measuring Progress in Conflict Environments (MPICE): A Metrics Framework
2010-06-04
offered by at- tendees at several peer review workshops held at the LBJ School of Public Affairs at the University of texas, the Carr Center at Harvard...at the Carr Center, Katherine Go- rove at the Center for Law and Military Operations, and Karen Guttieri at the naval Postgraduate School for their...in violent crime. QD, EK – Incidence of attacks or intimidation or discrimination against ex-combatants. QD, CA – Level of participation in the
AVQS: attack route-based vulnerability quantification scheme for smart grid.
Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.
Rogers, M Brooke; Amlôt, Richard; Rubin, G James; Wessely, Simon; Krieger, Kristian
2007-06-01
The public's understanding of chemical, biological, radiological and nuclear (CBRN) related issues and their likely actions following a CBRN incident is an issue of great concern, as public psychological and behavioural responses will help determine subsequent morbidity and mortality rates. This paper explores the role of effective government communication with the public and its role in mediating the social and psychological impact of terrorist attacks. We examine the importance of effective communication in reducing morbidity and mortality in the event of a terrorist attack and explore the impact of risk perceptions in determining the success or failure of risk communication strategies. This includes the examination of the role of fear as a health risk, and the identification of factors relevant to public trust in risk communication. Finally, an investigation of the type of information desired by members of the public leads the authors to make risk communication recommendations targeted at the promotion of more adaptive behaviours in response to CBRN attacks.
Hansen, E Matthew; Munson, A Steven; Blackford, Darren C; Graves, Andrew D; Coleman, Tom W; Baggett, L Scott
2017-10-01
We tested 3-methylcyclohex-2-en-1-one (MCH) and an Acer kairomone blend (AKB) as repellent semiochemicals for area and single tree protection to prevent spruce beetle (Dendroctonus rufipennis Kirby) attacks at locations in Utah and New Mexico. In the area protection study, we compared host infestation rates of MCH applications at three densities (20, 40, and 80 g MCH ha-1) against a control treatment over 0.64 ha plots centered within ~1.25 ha treatment blocks. All treatments included two baited funnel traps within the plot to assure spruce beetle pressure. Following beetle attack, plots were surveyed for new spruce beetle attacks and to quantify stand characteristics. The probability of more severe spruce beetle attacks was significantly reduced, by ~50%, in each of the MCH area treatments compared with the control treatment but there was no significant treatment difference among the MCH deployment densities. For the single tree protection study, we compared attack rates of MCH, Acer kairomone blend (AKB), and MCH plus AKB on spruce beetle-baited trees against bait-only trees. Each treatment was applied over a range of host diameters to test for host size effects. Seventy-five percent of control trees were mass-attacked, about one-third of MCH- and AKB-alone spruce was mass-attacked, and no MCH plus AKB spruce were mass-attacked. These results suggest that MCH alone is a marginal area and single tree protectant against spruce beetle but that deployment with other repellents can significantly increase treatment efficacy. Published by Oxford University Press on behalf of Entomological Society of America 2017. This work is written by (a) US Government employee(s) and is in the public domain in the US.
Li, Yongfang; Wang, Dunyou
2018-05-07
Recent studies have improved our understanding of the mechanism and dynamics of the bimolecular nucleophilic substitution (S N 2) reaction at the carbon center. Nonetheless, the S N 2 reaction at the nitrogen center has received scarce attention and is less understood. Herein, we propose a new reaction mechanism for the S N 2 reaction at the nitrogen center in the F - + NH 2 Cl reaction using ab initio molecular dynamics calculations. The newly proposed mechanism involves the rotation of NHCl with one proton of NH 2 Cl abstracted by the nucleophile, followed by the classical backside-attack process. The double-inversion mechanism revealed recently for the S N 2 reaction at the carbon center is also observed for the title reaction at the nitrogen center. In contrast to the F - + CH 3 Cl reaction with a proton abstraction-induced first inversion transition state, the F - + NH 2 Cl reaction is a hydrogen bond-induced inversion. This newly proposed reaction mechanism opens a reaction channel to avoid the proton abstraction mechanism at low collision energy. The double-inversion mechanism of the title reaction with a negative first-inversion transition relative to the energy of the reactants is expected to have larger contribution to the reaction rate than the F - + CH 3 Cl reaction with a positive first-inversion transition state.
2015-09-11
Rick Anderson, fire chief at NASA's Kennedy Space Center, on podium, left, and Lt. James Dumont lead the dedication service for a memorial to the343 first responder victims of the Sept. 11, 2001, terror attacks at Kennedy's Fire Station 1 on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
Rick Anderson, fire chief at NASA's Kennedy Space Center, on podium, left, and Lt. James Dumont lead the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Kennedy's Fire Station 1 on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
Aftermath of World Trade Center Attack
NASA Technical Reports Server (NTRS)
2002-01-01
This true-color image was taken by the Enhanced Thematic Mapper Plus (ETM+) aboard the Landsat 7 satellite on September 12, 2001, at roughly 11:30 a.m. Eastern Daylight Savings Time. Visit the NASA home page for photos from the space station and MODIS, and GlobalSecurity.org for images from other satellites. Image courtesy USGS Landsat 7 team, at the EROS Data Center.
Prediction of Sybil attack on WSN using Bayesian network and swarm intelligence
NASA Astrophysics Data System (ADS)
Muraleedharan, Rajani; Ye, Xiang; Osadciw, Lisa Ann
2008-04-01
Security in wireless sensor networks is typically sacrificed or kept minimal due to limited resources such as memory and battery power. Hence, the sensor nodes are prone to Denial-of-service attacks and detecting the threats is crucial in any application. In this paper, the Sybil attack is analyzed and a novel prediction method, combining Bayesian algorithm and Swarm Intelligence (SI) is proposed. Bayesian Networks (BN) is used in representing and reasoning problems, by modeling the elements of uncertainty. The decision from the BN is applied to SI forming an Hybrid Intelligence Scheme (HIS) to re-route the information and disconnecting the malicious nodes in future routes. A performance comparison based on the prediction using HIS vs. Ant System (AS) helps in prioritizing applications where decisions are time-critical.
Cruz, Miguel A; Burger, Ronald; Keim, Mark
2007-01-01
On 11 September 2001, terrorists hijacked two passenger planes and crashed them into the two towers of the World Trade Center (WTC) in New York City. These synchronized attacks were the largest act of terrorism ever committed on US soil. The impacts, fires, and subsequent collapse of the towers killed and injured thousands of people. Within minutes after the first plane crashed into the WTC, the Centers for Disease Control and Prevention (CDC) in Atlanta, Georgia, initiated one of the largest public health responses in its history. Staff of the CDC provided technical assistance on several key public health issues. During the acute phase of the event, CDC personnel assisted with: (1) assessing hospital capacity; (2) establishing injury and disease surveillance activities; (3) deploying emergency coordinators/liaisons to facilitate inter-agency coordination with the affected jurisdictions; and (4) arranging rapid delivery of emergency medical supplies, therapeutics, and personal protective equipment. This incident highlighted the need for adequate planning for all potential hazards and the importance of interagency and interdepartmental coordination in preparing for and responding to public health emergencies.
NASA's SR-71B and F-18 HARV aircraft left Edwards Air Force Base, Calif., on March 24, 2003
2003-03-24
Dryden Flight Research Center's SR-71B Blackbird aircraft, NASA tail number 831, is destined for the Kalamazoo Air Zoo museum in Kalamazoo, Mich., and the F-18 High Angle-of-Attack Research Vehicle (HARV) aircraft, NASA tail number 840, is going to the Virginia Air and Space Center in Hampton, Va. NASA's SR-71B was one of only two SR-71 trainer aircraft built, and served NASA in that role, as well as for some high-speed research, from 1991 to 1999. The F-18 HARV provided some of the most comprehensive data on the high-angle-of-attack flight regime, flying at angles of up to 70 degrees from the horizontal. The HARV flew 385 research flights at Dryden from 1987 through 1996.
A New Triage Support Tool in Case of Explosion.
Yavari-Sartakhti, Olivier; Briche, Frédérique; Jost, Daniel; Michaud, Nicolas; Bignand, Michel; Tourtier, Jean-Pierre
2018-04-01
Deafness frequently observed in explosion victims, currently following terrorist attack, is a barrier to communication between victims and first responders. This may result in a delay in the initial triage and evacuation. In such situations, Paris Fire Brigade (Paris, France) proposes the use of assistance cards to help conscious, but deafened patients at the site of an attack where there may be numerous victims. Yavari-Sartakhti O , Briche F , Jost D , Michaud N , Bignand M , Tourtier JP . A new triage support tool in case of explosion. Prehosp Disaster Med. 2018;33(2):213-214.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Russell, Anna Christine
2014-09-01
Throughout my HS-STEM internship, I worked on two different projects with a systems analysis group at Sandia National Laboratories in Livermore, California (SNLCA). The first, and primary, project entailed building a conceptual model of health surveillance detection of a bioterror attack. The second project was much smaller in scope and looked at cost tradeoffs between volumetric and surface decontamination after the release of anthrax in a city. Both projects helped me to understand the challenges of planning for a bioterror attack and the importance of preparedness in the public health sector.
Amyotrophic lateral sclerosis (ALS) is a nervous system disease that attacks nerve cells called neurons in your brain and spinal cord. These neurons ... breathing machine can help, but most people with ALS die from respiratory failure. The disease usually strikes ...
Testing simple deceptive honeypot tools
NASA Astrophysics Data System (ADS)
Yahyaoui, Aymen; Rowe, Neil C.
2015-05-01
Deception can be a useful defensive technique against cyber-attacks; it has the advantage of unexpectedness to attackers and offers a variety of tactics. Honeypots are a good tool for deception. They act as decoy computers to confuse attackers and exhaust their time and resources. This work tested the effectiveness of two free honeypot tools in real networks by varying their location and virtualization, and the effects of adding more deception to them. We tested a Web honeypot tool, Glastopf and an SSH honeypot tool Kippo. We deployed the Web honeypot in both a residential network and our organization's network and as both real and virtual machines; the organization honeypot attracted more attackers starting in the third week. Results also showed that the virtual honeypots received attacks from more unique IP addresses. They also showed that adding deception to the Web honeypot, in the form of additional linked Web pages and interactive features, generated more interest by attackers. For the purpose of comparison, we used examined log files of a legitimate Web-site www.cmand.org. The traffic distributions for the Web honeypot and the legitimate Web site showed similarities (with much malicious traffic from Brazil), but the SSH honeypot was different (with much malicious traffic from China). Contrary to previous experiments where traffic to static honeypots decreased quickly, our honeypots received increasing traffic over a period of three months. It appears that both honeypot tools are useful for providing intelligence about cyber-attack methods, and that additional deception is helpful.
Soltani, Rasmi; Lkbel, Chaieb; Habib Ben Hamouda, Med
2008-01-01
Oryctes agamemnon (Burmeister 1847) (Coleoptera, Scarabaeidae) was accidentally introduced in the southwestern oases of Tunisia (Tozeur) around 1980 and spread to the Rjim Maatoug region. In these areas O. agamemnon was specific to date palm trees causing severe damage that can result in potential danger due to collapse of the tree. This study was conducted from April 2004 to March 2006 in 4 sites in the region of Rjim Maatoug. Different levels of palm tree attack were determined, ovioposition sites were identified, and pest damage was described in detail to specify their relative importance and to indicate factors governing palm tree attack. Eggs were individually oviposited in the attacked parts. Dead parts of palm trees were the main target of O. agamemnon including the respiratory roots, tough, trunk bark, dry petiole and the periphery of the crown. The crown itself was not attacked. Feeding by larvae caused significant damage. The biggest danger occurred when heavy attacks of larvae invaded the respiratory roots at the level of the soil, and secondarily on the periphery of the crown, which can result in fungal diseases. Several cases of Deglet Nour date palm tree collapse were caused by this pest in Rjim Maatoug. Attacks on other parts of the tree were without danger for the palm tree. In the absence of pest management, application of a quarantine program combined with field cultivation techniques could help farmers significantly decrease attack of O. agamemnon on palm trees.
Attack rates of dengue fever in Swedish travellers.
Rocklöv, Joacim; Lohr, Wolfgang; Hjertqvist, Marika; Wilder-Smith, Annelies
2014-06-01
Dengue is endemic in many countries visited by Swedish travellers. We aimed to determine the attack rate of dengue in Swedish travellers and analyse the trends over time and the geographical variation. We obtained the following data from the Swedish Institute for Communicable Disease Control for the y 1995-2010: number of Swedish residents with confirmed dengue, the country and year of infection. We also obtained registers on the Swedish annual air traveller arrivals to dengue endemic areas from the United Nations World Tourist Organization for the time period. We estimated attack rates with 95% confidence intervals (CI). In total, 925 Swedish travellers with confirmed dengue were reported. We found an increasing trend over time for most destinations. The majority of the dengue cases were acquired in Thailand (492 out of 925 travellers; 53%), with an attack rate of 13.6 (95% CI 12.7, 14.4) per 100,000 travellers. However, the 2 highest attack rates per 100,000 travellers were found for Sri Lanka (45.3, 95% CI 34.3, 56.4) and Bangladesh (42.6, 95% CI 23.8, 61.5). Information on attack rates in travellers is more helpful in guiding travel medicine practitioners than reports of absolute numbers, as the latter reflect travel preferences rather than the true risk. Although the majority of dengue infections in Swedish travellers were acquired in Thailand, the attack rates for dengue in travellers to Sri Lanka and Bangladesh were much higher. These data aid in refining information on the risk of dengue in travellers.
Dynamic Stability Testing of the Genesis Sample Return Capsule
NASA Technical Reports Server (NTRS)
Cheatwood, F. McNeil; Winchenbach, Gerald L.; Hathaway, Wayne; Chapman, Gary
2000-01-01
This paper documents a series of free flight tests of a scale model of the Genesis Sample Return Capsule. These tests were conducted in the Aeroballistic Research Facility (ARF), located at Eglin AFB, FL, during April 1999 and were sponsored by NASA Langley Research Center. Because these blunt atmospheric entry shapes tend to experience small angle of attack dynamic instabilities (frequently leading to limit cycle motions), the primary purpose of the present tests was to determine the dynamic stability characteristics of the Genesis configuration. The tests were conducted over a Mach number range of 1.0 to 4.5. The results for this configuration indicate that the models were dynamically unstable at low angles of attack for all Mach numbers tested. At Mach numbers below 2.5, the models were also unstable at the higher angles of attack (above 15 deg), and motion amplitudes of up to 40 deg were experienced. Above Mach 2.5, the models were dynamically stable at the higher angles of attack.
Disability in Meniére's disease.
Cohen, H; Ewell, L R; Jenkins, H A
1995-01-01
The purpose of this study was to determine the level of disability among patients with Menière's disease, information needed by clinicians when evaluating patients for coverage under the Americans With Disabilities Act. We hypothesized that the unpredictability of vertiginous episodes or "Menière's attacks" would be the most disabling problem, combined with the lack of a safe place to sit down during Menière's attacks. All patients seen in the otolaryngology faculty practice at Baylor College of Medicine, Houston, Tex, and diagnosed as having Menière's disease over a 3-year period were sent a self-administered questionnaire. This practice is located at a tertiary care center. One hundred forty-nine potential subjects constituted the pool, from which data from 50 subjects provided complete data sets. The data from 50 adults suggested that the most problematic symptom was vertigo, followed by hearing loss. The unpredictability of Meniere's attacks and the lack of a safe place to rest during attacks was a significant problem for few subjects.
High angle-of-attack aerodynamics of a strake-canard-wing V/STOL fighter configuration
NASA Technical Reports Server (NTRS)
Durston, D. A.; Schreiner, J. A.
1983-01-01
High angle-of-attack aerodynamic data are analyzed for a strake-canard-wing V/STOL fighter configuration. The configuration represents a twin-engine supersonic V/STOL fighter aircraft which uses four longitudinal thrust-augmenting ejectors to provide vertical lift. The data were obtained in tests of a 9.39 percent scale model of the configuration in the NASA Ames 12-Foot Pressure Wind Tunnel, at a Mach number of 0.2. Trimmed aerodynamic characteristics, longitudinal control power, longitudinal and lateral/directional stability, and effects of alternate strake and canard configurations are analyzed. The configuration could not be trimmed (power-off) above 12 deg angle of attack because of the limited pitch control power and the high degree of longitudinal instability (28 percent) at this Mach number. Aerodynamic center location was found to be controllable by varying strake size and canard location without significantly affecting lift and drag. These configuration variations had relatively little effect on the lateral/directional stability up to 10 deg angle of attack.
Breivik--the Norwegian terrorist case.
Syse, Aslak
2014-01-01
On July 22, 2011, there were two murderous attacks in Norway. Both assaults - the bombing of governmental buildings in Oslo City center and the lethal shooting down of young members of the Labour Party on an island - were planned and accomplished by a lone perpetrator. These episodes give rise to several interesting questions. What happened really, and how could it happen? Was the perpetrator sane or insane? What was the ideological background for the attacks? It is unnecessary to discuss in any detail whether or not these acts should be categorized as terrorism. However, there is good reason to consider what these terror attacks imply for Norwegian society at large. What significance did the attacks have for Norwegian democracy, and did they have any impact on the 2013 parliamentary elections? What will be the future for the offender, both in the short term and in years to come? What will happen to the Norwegian insanity defense? These questions are addressed in this article. Copyright © 2014 John Wiley & Sons, Ltd.
How players exploit variability and regularity of game actions in female volleyball teams.
Ramos, Ana; Coutinho, Patrícia; Silva, Pedro; Davids, Keith; Mesquita, Isabel
2017-05-01
Variability analysis has been used to understand how competitive constraints shape different behaviours in team sports. In this study, we analysed and compared variability of tactical performance indices in players within complex I at two different competitive levels in volleyball. We also examined whether variability was influenced by set type and period. Eight matches from the 2012 Olympics competition and from the Portuguese national league in the 2014-2015 season were analysed (1496 rallies). Variability of setting conditions, attack zone, attack tempo and block opposition was assessed using Shannon entropy measures. Magnitude-based inferences were used to analyse the practical significance of compared values of selected variables. Results showed differences between elite and national teams for all variables, which were co-adapted to the competitive constraints of set type and set periods. Elite teams exploited system stability in setting conditions and block opposition, but greater unpredictability in zone and tempo of attack. These findings suggest that uncertainty in attacking actions was a key factor that could only be achieved with greater performance stability in other game actions. Data suggested how coaches could help setters develop the capacity to play at faster tempos, diversifying attack zones, especially at critical moments in competition.
The Diabetic Foot Attack: "'Tis Too Late to Retreat!"
Vas, Prashanth R J; Edmonds, Michael; Kavarthapu, Venu; Rashid, Hisham; Ahluwalia, Raju; Pankhurst, Christian; Papanas, Nikolaos
2018-03-01
The "diabetic foot attack" is one of the most devastating presentations of diabetic foot disease, typically presenting as an acutely inflamed foot with rapidly progressive skin and tissue necrosis, at times associated with significant systemic symptoms. Without intervention, it may escalate over hours to limb-threatening proportions and poses a high amputation risk. There are only best practice approaches but no international protocols to guide management. Immediate recognition of a typical infected diabetic foot attack, predominated by severe infection, with prompt surgical intervention to debride all infected tissue alongside broad-spectrum antibiotic therapy is vital to ensure both limb and patient survival. Postoperative access to multidisciplinary and advanced wound care therapies is also necessary. More subtle forms exist: these include the ischemic diabetic foot attack and, possibly, in a contemporary categorization, acute Charcot neuroarthropathy. To emphasize the importance of timely action especially in the infected and ischemic diabetic foot attack, we revisit the concept of "time is tissue" and draw parallels with advances in acute myocardial infarction and stroke care. At the moment, international protocols to guide management of severe diabetic foot presentations do not specifically use the term. However, we believe that it may help increase awareness of the urgent actions required in some situations.
ERIC Educational Resources Information Center
Bergmann, Barbara R.
In the wake of welfare reform efforts, the government is willing to provide or finance a wide range of services for working parents and help them purchase child care and child health insurance. Taken together, these services represent a significant attack on child poverty. Based on a basic needs' budget for families and the high proportion of a…
The physician's unique role in preventing violence: a neglected opportunity?
2012-01-01
Background Episodes of explosive rage and violence comprise a symptom complex which can have a devastating effect on a person's life. In the community this behavior is seen as workplace violence, domestic abuse and road rage, while in the clinical setting, this behavior is rarely mentioned by patients, despite evidence that it can signify an important biological disorder that may afflict more than three percent of the population. Discussion Patients are often reluctant to seek help for episodic attacks of rage, especially attacks which are accompanied by physical violence. Although, in the past, clinicians have had few treatment options to offer, recent neuroscience advances have created new possibilities to understand and help patients with this neglected problem. No formal medical guidelines for treating violence exist; however, many patients can be helped by diagnosis, referral and treatment. Treatment can include pharmaceuticals and nutrients, as well as referral for anger management or behavioral therapy. Summary The astute clinician has an opportunity to positively impact an important problem through the diagnosis and treatment of patients with symptoms of intermittent explosive disorder. PMID:23177023
Migraine headache is present in the aura phase
Hansen, Jakob M.; Lipton, Richard B.; Dodick, David W.; Silberstein, Stephen D.; Saper, Joel R.; Aurora, Sheena K.; Goadsby, Peter J.
2012-01-01
ABSTRACT Objectives: Migraine aura is commonly considered to be a distinct phase of a migraine attack that precedes headache. The objective of the study was to examine a large number of prospectively recorded attacks of migraine with aura and determine the timing of headache and other migraine symptoms relative to aura. Methods: As part of a clinical trial we collected prospective data on the time course of headache and other symptoms relative to the aura. Patients (n = 267) were enrolled from 16 centers, and asked to keep a headache diary for 1 month (phase I). They were asked to record headache symptoms as soon as possible after aura began and always within 1 hour of aura onset. A total of 456 attacks were reported during phase I by 201 patients. These patients were then randomized and included in phase II, during which a total of 405 attacks were reported in 164 patients. In total, we present data from 861 attacks of migraine with aura from 201 patients. Results: During the aura phase, the majority of attacks (73%) were associated with headache. Other migraine symptoms were also frequently reported during the aura: nausea (51%), photophobia (88%), and photophobia (73%). During the first 15 minutes within the onset of aura, 54% of patients reported headache fulfilling the criteria for migraine. Conclusion: Our results indicate that headaches as well as associated migraine symptoms are present early, during the aura phase of the migraine attack in the majority of patients. PMID:23115208
NASA Technical Reports Server (NTRS)
Penland, J. A.; Fournier, R. H.; Marcum, D. C., Jr.
1975-01-01
An experimental investigation of the static longitudinal, lateral, and directional stability characteristics of a hypersonic research airplane concept having a 70 deg swept double-delta wing was conducted in the Langley unitary plan wind tunnel. The configuration variables included wing planform, tip fins, center fin, and scramjet engine modules. The investigation was conducted at Mach numbers from 1.50 to 2.86 and at a constant Reynolds number, based on fuselage length, of 3,330,000. Tests were conducted through an angle-of-attack range from about -4 deg to 24 deg with angles of sideslip of 0 deg and 3 deg and at elevon deflections of 0, -10, and -20 deg. The complete configuration was trimmable up to angles of attack of about 22 deg with the exception of regions at low angles of attack where positive elevon deflections should provide trim capability. The angle-of-attack range for which static longitudinal stability also exists was reduced at the higher Mach numbers due to the tendency of the complete configuration to pitch up at the higher angles of attack. The complete configuration was statically stable directionally up to trimmed angles of attack of at least 20 deg for all Mach numbers M with the exception of a region near 4 deg at M = 2.86 and exhibited positive effective dihedral at all positive trimmed angles of attack.
Henrich, Christopher C; Shahar, Golan
2013-06-01
The effects of Israeli adolescents' exposure to rocket attacks over time were examined, focusing on anxiety, depression, aggression, and violence commission. A sample of 362 adolescents from southern Israel was followed from 2008 through 2011 with four annual assessments. Measures included exposure to rocket attacks (gauging whether children were affected by rocket attacks, both directly and indirectly, through friends and family), anxiety (items from the State Anxiety Inventory), depression (the Center for Epidemiological Studies Child Depression Scale), aggression (the Orpinas Aggression Scale), and violence commission (from the Social and Health Assessment). Concurrent and longitudinal findings differed. Wave 1 exposure to rockets attacks was associated with Wave 1 anxiety, depression, and aggression. Longitudinal results evinced only modest effects of exposure on anxiety and depression, no effects on aggression, but robust effects on violence commission. Exposure to terror attacks before the study predicted increased odds of violence commission at the fourth and final wave, controlling for violence commission at the first, second, and third wave. Exposure to rocket attacks in the second wave predicted increased odds of violence commission at the third wave. This is the first longitudinal study attesting to the prospective longitudinal effect of exposure to terrorism on adolescent violence. Findings should serve as a red flag for health care practitioners working in civil areas afflicted by terrorism and political violence. Copyright © 2013 American Academy of Child and Adolescent Psychiatry. Published by Elsevier Inc. All rights reserved.
1985-12-19
This image shows a plastic 1/48-scale model of an F-18 aircraft inside the "Water Tunnel" more formally known as the NASA Dryden Flow Visualization Facility. Water is pumped through the tunnel in the direction of normal airflow over the aircraft; then, colored dyes are pumped through tubes with needle valves. The dyes flow back along the airframe and over the airfoils highlighting their aerodynamic characteristics. The aircraft can also be moved through its pitch axis to observe airflow disruptions while simulating actual flight at high angles of attack. The Water Tunnel at NASA's Dryden Flight Research Center, Edwards, CA, became operational in 1983 when Dryden was a Flight Research Facility under the management of the Ames Research Center in Mountain View, CA. As a medium for visualizing fluid flow, water has played a significant role. Its use dates back to Leonardo da Vinci (1452-1519), the Renaissance Italian engineer, architect, painter, and sculptor. In more recent times, water tunnels have assisted the study of complex flows and flow-field interactions on aircraft shapes that generate strong vortex flows. Flow visualization in water tunnels assists in determining the strength of vortices, their location, and possible methods of controlling them. The design of the Dryden Water Tunnel imitated that of the Northrop Corporation's tunnel in Hawthorne, CA. Called the Flow Visualization Facility, the Dryden tunnel was built to assist researchers in understanding the aerodynamics of aircraft configured in such a way that they create strong vortex flows, particularly at high angles of attack. The tunnel provides results that compare well with data from aircraft in actual flight in another fluid-air. Other uses of the tunnel have included study of how such flight hardware as antennas, probes, pylons, parachutes, and experimental fixtures affect airflow. The facility has also been helpful in finding the best locations for emitting smoke from flight vehicles for flow vi
1/48-scale model of an F-18 aircraft in Flow Visualization Facility (FVF)
NASA Technical Reports Server (NTRS)
1985-01-01
This image shows a plastic 1/48-scale model of an F-18 aircraft inside the 'Water Tunnel' more formally known as the NASA Dryden Flow Visualization Facility. Water is pumped through the tunnel in the direction of normal airflow over the aircraft; then, colored dyes are pumped through tubes with needle valves. The dyes flow back along the airframe and over the airfoils highlighting their aerodynamic characteristics. The aircraft can also be moved through its pitch axis to observe airflow disruptions while simulating actual flight at high angles of attack. The Water Tunnel at NASA's Dryden Flight Research Center, Edwards, CA, became operational in 1983 when Dryden was a Flight Research Facility under the management of the Ames Research Center in Mountain View, CA. As a medium for visualizing fluid flow, water has played a significant role. Its use dates back to Leonardo da Vinci (1452-1519), the Renaissance Italian engineer, architect, painter, and sculptor. In more recent times, water tunnels have assisted the study of complex flows and flow-field interactions on aircraft shapes that generate strong vortex flows. Flow visualization in water tunnels assists in determining the strength of vortices, their location, and possible methods of controlling them. The design of the Dryden Water Tunnel imitated that of the Northrop Corporation's tunnel in Hawthorne, CA. Called the Flow Visualization Facility, the Dryden tunnel was built to assist researchers in understanding the aerodynamics of aircraft configured in such a way that they create strong vortex flows, particularly at high angles of attack. The tunnel provides results that compare well with data from aircraft in actual flight in another fluid-air. Other uses of the tunnel have included study of how such flight hardware as antennas, probes, pylons, parachutes, and experimental fixtures affect airflow. The facility has also been helpful in finding the best locations for emitting smoke from flight vehicles for flow visualization.
1/48-scale model of an F-18 aircraft in Flow Visualization Facility (FVF)
NASA Technical Reports Server (NTRS)
1980-01-01
This short movie clip shows a plastic 1/48-scale model of an F-18 aircraft inside the 'Water Tunnel' more formally known as the NASA Dryden Flow Visualization Facility. Water is pumped through the tunnel in the direction of normal airflow over the aircraft; then, colored dyes are pumped through tubes with needle valves. The dyes flow back along the airframe and over the airfoils highlighting their aerodynamic characteristics. The aircraft can also be moved through its pitch axis to observe airflow disruptions while simulating actual flight at high angles of attack. The Water Tunnel at NASA's Dryden Flight Research Center, Edwards, CA, became operational in 1983 when Dryden was a Flight Research Facility under the management of the Ames Research Center in Mountain View, CA. As a medium for visualizing fluid flow, water has played a significant role. Its use dates back to Leonardo da Vinci (1452-1519), the Renaissance Italian engineer, architect, painter, and sculptor. In more recent times, water tunnels have assisted the study of complex flows and flow-field interactions on aircraft shapes that generate strong vortex flows. Flow visualization in water tunnels assists in determining the strength of vortices, their location, and possible methods of controlling them. The design of the Dryden Water Tunnel imitated that of the Northrop Corporation's tunnel in Hawthorne, CA. Called the Flow Visualization Facility, the Dryden tunnel was built to assist researchers in understanding the aerodynamics of aircraft configured in such a way that they create strong vortex flows, particularly at high angles of attack. The tunnel provides results that compare well with data from aircraft in actual flight in another fluid-air. Other uses of the tunnel have included study of how such flight hardware as antennas, probes, pylons, parachutes, and experimental fixtures affect airflow. The facility has also been helpful in finding the best locations for emitting smoke from flight vehicles for flow visualization.
1976-12-01
corrosive attack by both acids and alkali and, in addition, is provided with a special Dynel veil for protection against fluoride attack. 3.1.4...throat region, namely , the entrance, center, and exit. In addition, at each station, the diameters were determined at two angular positions 90° apart. The...characterization test matrix. 3.2.1.1 Rocket Motor Environments Rocket motor environments were based on three advanced MX propellants, namely , * XLDB * HTPB * PEG
Risk assessment and prioritization
DOT National Transportation Integrated Search
2003-01-01
The first step to take in order to prevent and minimize the dangers of disasters or attacks, is risk assessment, followed closely by prioritization. This article discusses key vulnerability and risk assessment that Volpe Center has conducted in suppo...
Semiannual Report: Apr 1, 2003 - Sept 30, 2003
Semiannual Report #EPA-350-K-03-002, Nov, 2003. We recently issued a major report examining how EPA responded to the crisis at the World Trade Center following the terrorist attacks on September 11, 2001.
Sasaki, Shogo; Koga, Hideyuki; Krosshaug, Tron; Kaneko, Satoshi; Fukubayashi, Toru
2015-01-01
The strengths of interpersonal dyads formed by the attacker and defender in one-on-one situations are crucial for performance in team ball sports such as soccer. The purpose of this study was to analyze the kinematics of one-on-one defensive movements in soccer competitions, and determine the relationships between lower limb kinematics and the center of mass translation during cutting actions. Six defensive scenes in which a player was responding to an offender’s dribble attack were selected for analysis. To reconstruct the three-dimensional kinematics of the players, we used a photogrammetric model-based image-matching technique. The hip and knee kinematics were calculated from the matched skeleton model. In addition, the center of mass height was expressed as a ratio of each participant’s body height. The relationships between the center of mass height and the kinematics were determined by the Pearson’s product-moment correlation coefficient. The normalized center of mass height at initial contact was correlated with the vertical center of mass displacement (r = 0.832, p = 0.040) and hip flexion angle at initial contact (r = −0.823, p = 0.044). This suggests that the lower center of mass at initial contact is an important factor to reduce the downwards vertical center of mass translation during defensive cutting actions, and that this is executed primarily through hip flexion. It is therefore recommended that players land with an adequately flexed hip at initial contact during one-on-one cutting actions to minimize the vertical center of mass excursion. PMID:26240644
Rodriguez-Llanes, Jose M; Guha-Sapir, Debarati; Schlüter, Benjamin-Samuel; Hicks, Madelyn Hsiao-Rei
2018-01-01
Evidence of use of toxic gas chemical weapons in the Syrian war has been reported by governmental and non-governmental international organizations since the war started in March 2011. To date, the profiles of victims of the largest chemical attacks in Syria remain unknown. In this study, we used descriptive epidemiological analysis to describe demographic characteristics of victims of the largest chemical weapons attacks in the Syrian war. We analysed conflict-related, direct deaths from chemical weapons recorded in non-government-controlled areas by the Violation Documentation Center, occurring from March 18, 2011 to April 10, 2017, with complete information on the victim's date and place of death, cause and demographic group. 'Major' chemical weapons events were defined as events causing ten or more direct deaths. As of April 10, 2017, a total of 1206 direct deaths meeting inclusion criteria were recorded in the dataset from all chemical weapons attacks regardless of size. Five major chemical weapons attacks caused 1084 of these documented deaths. Civilians comprised the majority ( n = 1058, 97.6%) of direct deaths from major chemical weapons attacks in Syria and combatants comprised a minority of 2.4% ( n = 26). In the first three major chemical weapons attacks, which occurred in 2013, children comprised 13%-14% of direct deaths, ranging in numbers from 2 deaths among 14 to 117 deaths among 923. Children comprised higher proportions of direct deaths in later major chemical weapons attacks, forming 21% ( n = 7) of 33 deaths in the 2016 major attack and 34.8% ( n = 32) of 92 deaths in the 2017 major attack. Our finding of an extreme disparity in direct deaths from major chemical weapons attacks in Syria, with 97.6% of victims being civilians and only 2.4% being combatants provides evidence that major chemical weapons attacks were indiscriminate or targeted civilians directly; both violations of International Humanitarian Law (IHL). Identifying and quantifying chemical weapons violations requires inter-disciplinary collaboration to inform international policy, humanitarian intervention and legal action.
NASA Technical Reports Server (NTRS)
Burrows, Dale L; Newman, Ernest E
1954-01-01
An investigation at medium to high subsonic speeds has been conducted in the Langley low-turbulence pressure tunnel to determine the static stability and control characteristics and to measure the fin normal forces and moments for a model of a wingless fin-controlled missile. The data were obtained at Reynolds number of 2.1 x 10(6) based on the missile maximum diameter or 17.7 x 10(6) based on missile length; this Reynolds number was found to be large enough to avoid any large scale effects between the test and the expected flight Reynolds number. With the horizontal-fin deflection limited to a maximum of 6 degrees, longitudinally stable and trimmed flight could not be maintained beyond an angle of attack of 17 degrees for a Mach number of 0.88 and beyond 20 degrees for a Mach number of 0.50 for any center-of-gravity location without the use of some auxiliary stability or control device such as jet vanes. Mach number had no appreciable effect on the center-of-pressure positions and only a slight effect on neutral-point position. There was a shift in neutral-point position of about 1 caliber as the angle of attack was varied through the range for which the neutral point could be determined. Yawing the model to angles of sideslip up to 7 degrees had little effect on the longitudinal stability at angles of attack up to 15 degrees; however, above 15 degrees, the effect of sideslip was destabilizing. With the vertical fins at a plus-or-minus 6 degree roll deflection, the rolling moment caused by yawing the model at high angles of attack could be trimmed out up to angles of sideslip of 6.5 degrees and an angle of attack of 26 degrees for a Mach number of 0.50; this range of sideslip angles was reduced to 3 degrees at a Mach number of 0.88. The data indicated that, at lower angles of attack, the trim range extended to higher angles of sideslip. The total normal-force and hinge-moment coefficients for both horizontal fins were slightly nonlinear with both angle-of-attack and fin deflection. The effect of Mach number was to reduce the slopes of the hinge-moment coefficient with angle of attack and deflection angle. In general, the effort of increasing the sideslip angle was to reduce the values of the fin normal-force and hinge-moment coefficients.
Electrophysiology Studies (EPS)
... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...
... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...
... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...
Terrorism in surface transportation
DOT National Transportation Integrated Search
1996-06-01
The topic for this symposium was selected to help satisfy the increased need for awareness of and preparedness for possible terrorism attacks on the surface transportation systems within the United States and the world. A group of experts was assembl...
Counseling the Coronary Patient
ERIC Educational Resources Information Center
Semmler, Caryl; Semmler, Maynard
1974-01-01
The article discusses counseling sessions designed to a) help the coronary patient adjust to cardiovascular disease, b) diminish patient anxieties and fears, and c) educate the patient and family members on controlling risk factors to deter another coronary attack. (JS)
Stroke Risk Factors and Symptoms
... » [ pdf, 433 kb ] Order Materials » Stroke Risk Factors and Symptoms Risk Factors for a Stroke Stroke prevention is still ... it. Treatment can delay complications that increase the risk of stroke. Transient ischemic attacks (TIAs). Seek help. ...
Aerodynamic Stability and Performance of Next-Generation Parachutes for Mars Descent
NASA Technical Reports Server (NTRS)
Gonyea, Keir C.; Tanner, Christopher L.; Clark, Ian G.; Kushner, Laura K.; Schairer, Edward T.; Braun, Robert D.
2013-01-01
The Low Density Supersonic Decelerator Project is developing a next-generation supersonic parachute for use on future Mars missions. In order to determine the new parachute configuration, a wind tunnel test was conducted at the National Full-scale Aerodynamics Complex 80- by 120-foot Wind Tunnel at the NASA Ames Research Center. The goal of the wind tunnel test was to quantitatively determine the aerodynamic stability and performance of various canopy configurations in order to help select the design to be flown on the Supersonic Flight Dynamics tests. Parachute configurations included the diskgap- band, ringsail, and ringsail-variant designs referred to as a disksail and starsail. During the wind tunnel test, digital cameras captured synchronized image streams of the parachute from three directions. Stereo hotogrammetric processing was performed on the image data to track the position of the vent of the canopy throughout each run. The position data were processed to determine the geometric angular history of the parachute, which were then used to calculate the total angle of attack and its derivatives at each instant in time. Static and dynamic moment coefficients were extracted from these data using a parameter estimation method involving the one-dimensional equation of motion for a rotation of parachute. The coefficients were calculated over all of the available canopy states to reconstruct moment coefficient curves as a function of total angle of attack. From the stability curves, useful metrics such as the trim total angle of attack and pitch stiffness at the trim angle could be determined. These stability metrics were assessed in the context of the parachute's drag load and geometric porosity. While there was generally an inverse relationship between the drag load and the stability of the canopy, the data showed that it was possible to obtain similar stability properties as the disk-gap-band with slightly higher drag loads by appropriately tailoring the geometric porosity distribution.
NASA Technical Reports Server (NTRS)
Marek, Lindsay C.
2011-01-01
Boundary layer stability was analyzed for the HIFiRE-1 flight vehicle geometry for ground tests conducted at the CUBRC LENS I hypersonic shock test facility and the Langley Research Center (LaRC) 20- inch Mach 6 Tunnel. Boundary layer stability results were compared to transition onset location obtained from discrete heat transfer measurements from thin film gauges during the CUBRC test and spatially continuous heat transfer measurements from thermal phosphor paint data during the LaRC test. The focus of this analysis was on conditions at non-zero angles of attack as stability analysis has already been performed at zero degrees angle of attack. Also, the transition onset data obtained during flight testing was at nonzero angles of attack, so this analysis could be expanded in the future to include the results of the flight test data. Stability analysis was performed using the 2D parabolized stability software suite STABL (Stability and Transition Analysis for Hypersonic Boundary Layers) developed at the University of Minnesota and the mean flow solutions were computed using the DPLR finite volume Navier-Stokes computational fluid dynamics (CFD) solver. A center line slice of the 3D mean flow solution was used for the stability analysis to incorporate the angle of attack effects while still taking advantage of the 2D STABL software suite. The N-factors at transition onset and the value of Re(sub theta)/M(sub e), commonly used to predict boundary layer transition onset, were compared for all conditions analyzed. Ground test data was analyzed at Mach 7.2 and Mach 6.0 and angles of attack of 1deg, 3deg and 5deg. At these conditions, the flow was found to be second mode dominant for the HIFiRE-1 slender cone geometry. On the leeward side of the vehicle, a strong trend of transition onset location with angle of attack was observed as the boundary layer on the leeward side of the vehicle developed inflection points at streamwise positions on the vehicle that correlated to angle of attack. Inflection points are a strong instability mechanism that lead to rapid breakdown and transition to turbulence. The transition onset location on the windward side of the vehicle displayed no trend with angle of attack or freestream Reynolds number and transition was observed farther down the vehicle than observed on the leeward side of the vehicle. In analysis of both windward and leeward sides of the vehicle, use of the N factor methodology to develop trends to predict boundary layer transition onset showed improvements over the Re(sub theta)/M(sub e) empirical correlation methodology. Stronger correlations and less scatter in the data were observed when using the N factor method for these cases.
NASA Astrophysics Data System (ADS)
Zhou, Pan-Pan; Liu, Shubin; Ayers, Paul W.; Zhang, Rui-Qin
2017-10-01
Condensed-to-atom Fukui functions which reflect the atomic reactivity like the tendency susceptible to either nucleophilic or electrophilic attack demonstrate the bonding trend of an atom in a molecule. Accordingly, Fukui functions based concepts, that is, bonding reactivity descriptors which reveal the bonding properties of molecules in the reaction were put forward and then applied to pericyclic and cluster reactions to confirm their effectiveness and reliability. In terms of the results from the bonding descriptors, a covalent bond can readily be predicted between two atoms with large Fukui functions (i.e., one governs nucleophilic attack while the other one governs electrophilic attack, or both of them govern radical attacks) for pericyclic reactions. For SinOm clusters' reactions, the clusters with a low O atom ratio readily form a bond between two Si atoms with big values of their Fukui functions in which they respectively govern nucleophilic and electrophilic attacks or both govern radical attacks. Also, our results from bonding descriptors show that Si—Si bonds can be formed via the radical mechanism between two Si atoms, and formations of Si—O and O—O bonds are possible when the O content is high. These results conform with experimental findings and can help experimentalists design appropriate clusters to synthesize Si nanowires with high yields. The approach established in this work could be generalized and applied to study reactivity properties for other systems.
Gohdes, Dorothy; Fogle, Crystelle C.; Tadios, Fawn; Doore, Velva; Bell, Doreen S.; Harwell, Todd S.; Helgerson, Steven D.
2013-01-01
Introduction National initiatives to improve the recognition of heart attack and stroke warning signs have encouraged symptomatic people to seek early treatment, but few have shown significant effects in rural American Indian (AI) communities. Methods During 2009 and 2010, the Montana Cardiovascular Health Program, in collaboration with 2 tribal health departments, developed and conducted culturally specific public awareness campaigns for signs and symptoms of heart attack and stroke via local media. Telephone surveys were conducted before and after each campaign to evaluate the effectiveness of the campaigns. Results Knowledge of 3 or more heart attack warning signs and symptoms increased significantly on 1 reservation from 35% at baseline to 47% postcampaign. On the second reservation, recognition of 2 or more stroke signs and symptoms increased from 62% at baseline to 75% postcampaign, and the level of awareness remained at 73% approximately 4 months after the high-intensity campaign advertisements ended. Intent to call 9-1-1 did not increase in the heart attack campaign but did improve in the stroke campaign for specific symptoms. Recall of media campaigns on both reservations increased significantly from baseline to postcampaign for both media outlets (ie, radio and newspaper). Conclusion Carefully designed, culturally specific campaigns may help eliminate disparities in the recognition of heart attack and stroke warning signs in AI communities. PMID:23680509
Oser, Carrie S; Gohdes, Dorothy; Fogle, Crystelle C; Tadios, Fawn; Doore, Velva; Bell, Doreen S; Harwell, Todd S; Helgerson, Steven D
2013-05-16
National initiatives to improve the recognition of heart attack and stroke warning signs have encouraged symptomatic people to seek early treatment, but few have shown significant effects in rural American Indian (AI) communities. During 2009 and 2010, the Montana Cardiovascular Health Program, in collaboration with 2 tribal health departments, developed and conducted culturally specific public awareness campaigns for signs and symptoms of heart attack and stroke via local media. Telephone surveys were conducted before and after each campaign to evaluate the effectiveness of the campaigns. Knowledge of 3 or more heart attack warning signs and symptoms increased significantly on 1 reservation from 35% at baseline to 47% postcampaign. On the second reservation, recognition of 2 or more stroke signs and symptoms increased from 62% at baseline to 75% postcampaign, and the level of awareness remained at 73% approximately 4 months after the high-intensity campaign advertisements ended. Intent to call 9-1-1 did not increase in the heart attack campaign but did improve in the stroke campaign for specific symptoms. Recall of media campaigns on both reservations increased significantly from baseline to postcampaign for both media outlets (ie, radio and newspaper). Carefully designed, culturally specific campaigns may help eliminate disparities in the recognition of heart attack and stroke warning signs in AI communities.
2015-09-11
Rick Anderson, fire chief at NASA's Kennedy Space Center, on podium, left, and Brevard County Sheriff Wayne Ivey take part in the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Kennedy's Fire Station 1 on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
Chen, Peng; Lu, Jun; Haack, Robert A; Ye, Hui
2015-01-01
Tomicus brevipilosus (Eggers) (Coleoptera: Curculionidae, Scolytinae) was recently discovered as a new pest of Yunnan pine (Pinus yunnanensis Franchet) in Yunnan Province in southwestern China. However, little was known on its reproductive biology and pattern of trunk attack on Yunnan pine. The objectives of this study were to better understand the reproductive biology of T. brevipilosus by investigating the seasonality of trunk attacks by parent adults for the purpose of reproduction (i.e., breeding attacks) and the within-tree pattern of these attacks. Our results showed that T. brevipilosus breeding attacks in P. yunnanensis generally started in early March and ended in early June in Anning County, Yunnan. T. brevipilosus exhibited two general patterns of infestation. From early March to mid-April, T. brevipilosus bred preferentially in the trunks of Yunnan pine trees that were already infested by Tomicus yunnanensis Kirkendall and Faccoli and Tomicus minor (Hartig), colonizing spaces along the trunk (mostly in the mid- and lower trunk) that were not already occupied by the other two Tomicus species. Later, from about mid-April to early June, when there were no Yunnan pine trees newly infested by T. yunnanensis and T. minor, T. brevipilosus attacked Yunnan pine by itself, infesting the lower parts of the trunk first and then infesting progressively upward along the trunk into the crown. Infestation by T. brevipilosus extends the total period that P. yunnanensis trees are under attack by Tomicus beetles in southwestern China, which helps explain why Yunnan pine has suffered high levels of tree mortality in recent decades. © The Author 2015. Published by Oxford University Press on behalf of the Entomological Society of America.
Cooperation stimulation strategies for peer-to-peer wireless live video-sharing social networks.
Lin, W Sabrina; Zhao, H Vicky; Liu, K J Ray
2010-07-01
Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates the impact of human dynamics on video sharing systems. Users watching live streaming in the same wireless network share the same limited bandwidth of backbone connection to the Internet, thus, they might want to cooperate with each other to obtain better video quality. These users form a wireless live-streaming social network. Every user wishes to watch video with high quality while paying as little as possible cost to help others. This paper focuses on providing incentives for user cooperation. We propose a game-theoretic framework to model user behavior and to analyze the optimal strategies for user cooperation simulation in wireless live streaming. We first analyze the Pareto optimality and the time-sensitive bargaining equilibrium of the two-person game. We then extend the solution to the multiuser scenario. We also consider potential selfish users' cheating behavior and malicious users' attacking behavior and analyze the performance of the proposed strategies with the existence of cheating users and malicious attackers. Both our analytical and simulation results show that the proposed strategies can effectively stimulate user cooperation, achieve cheat free and attack resistance, and help provide reliable services for wireless live streaming applications.
Multi-party quantum key agreement protocol secure against collusion attacks
NASA Astrophysics Data System (ADS)
Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang
2017-07-01
The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.
NASA Technical Reports Server (NTRS)
Kingsland, R. B.
1976-01-01
Results of wind tunnel tests, conducted at the Langley Research Center Unitary Plan Wind Tunnel, are presented. The model tested was an 0.010-scale version of the Vehicle 3 Space Shuttle Configuration. Pressure measurements were made on the launch configuration, Orbiter alone, external tank alone, and solid rocket booster alone, to provide heat transfer pressure data. The tests were conducted for a Mach number range from 2.36 to 4.6 and Reynolds number range from 1.2 to 5 million per foot. The model was tested at angles of attack from -10 to 20 deg for a sideslip angle range from -5 to +5 deg, and at sideslip angles from -5 to 48 deg for 0 deg angle of attack. Tabulated data are given and photographs of the test configuration are shown.
Study of optical techniques for the Ames unitary wind tunnels. Part 3: Angle of attack
NASA Technical Reports Server (NTRS)
Lee, George
1992-01-01
A review of optical sensors that are capable of accurate angle of attack measurements in wind tunnels was conducted. These include sensors being used or being developed at NASA Ames and Langley Research Centers, Boeing Airplane Company, McDonald Aircraft Company, Arnold Engineering Development Center, National Aerospace Laboratory of the Netherlands, National Research Council of Canada, and the Royal Aircraft Establishment of England. Some commercial sensors that may be applicable to accurate angle measurements were also reviewed. It was found that the optical sensor systems were based on interferometers, polarized light detector, linear or area photodiode cameras, position sensing photodetectors, and laser scanners. Several of the optical sensors can meet the requirements of the Ames Unitary Plan Wind Tunnel. Two of these, the Boeing interferometer and the Complere lateral effect photodiode sensors are being developed for the Ames Unitary Plan Wind Tunnel.
Description of a landing site indicator (LASI) for light aircraft operation
NASA Technical Reports Server (NTRS)
Fuller, H. V.; Outlaw, B. K. E.
1976-01-01
An experimental cockpit mounted head-up type display system was developed and evaluated by LaRC pilots during the landing phase of light aircraft operations. The Landing Site Indicator (LASI) system display consists of angle of attack, angle of sideslip, and indicated airspeed images superimposed on the pilot's view through the windshield. The information is made visible to the pilot by means of a partially reflective viewing screen which is suspended directly in frot of the pilot's eyes. Synchro transmitters are operated by vanes, located at the left wing tip, which sense angle of attack and sideslip angle. Information is presented near the center of the display in the form of a moving index on a fixed grid. The airspeed is sensed by a pitot-static pressure transducer and is presented in numerical form at the top center of the display.
NASA Technical Reports Server (NTRS)
Michal, David H.
1950-01-01
An investigation of the static and dynamic longitudinal stability characteristics of 1/3.7 scale rocket-powered model of the Bell MX-776A has been made for a Mach number range from 0.8 to 1.6. Two models were tested with all control surfaces at 0 degree deflection and centers of gravity located 1/4 and 1/2 body diameters, respectively, ahead of the equivalent design location. Both models were stable about the trim conditions but did not trim at 0 degree angle of attack because of slight constructional asymmetries. The results indicated that the variation of lift and pitching moment was not linear with angle of attack. Both lift-curve slope and pitching-moment-curve slope were of the smallest magnitude near 0 degree angle of attack. In general, an increase in angle of attack was accompanied by a rearward movement of the aerodynamic center as the rear wing moved out of the downwash from the forward surfaces. This characteristic was more pronounced in the transonic region. The dynamic stability in the form of total damping factor varied with normal-force coefficient but was greatest for both models at a Mach number of approximately 1.25. The damping factor was greater at the lower trim normal-force coefficients except at a Mach number of 1.0. At that speed the damping factor was of about the same magnitude for both models. The drag coefficient increased with trim normal-force coefficient and was largest in the transonic region.
Complications to Avoid with Pre-Diabetes
... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...
Understand Your Risk for Cardiac Arrest
... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...
Medications Used to Treat Heart Failure
... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...
Risks for Heart Valve Problems
... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...
Terrorism in surface transportation : a symposium
DOT National Transportation Integrated Search
1996-06-01
The topic for this symposium was selected to help satisfy the increased need for awareness of and preparedness for possible terrorism attacks on the surface transportation systems within the United States and the world. A group of experts was assembl...
... help. A younger person who has had a heart attack may go through cardiac rehabilitation to try to return to work and normal activities. Someone with a lung disease may get pulmonary rehabilitation to be able to breathe better and improve their quality of life.
Evaluation of Aerodynamic Drag and Torque for External Tanks in Low Earth Orbit
Stone, William C.; Witzgall, Christoph
2006-01-01
A numerical procedure is described in which the aerodynamic drag and torque in low Earth orbit are calculated for a prototype Space Shuttle external tank and its components, the “LO2” and “LH2” tanks, carrying liquid oxygen and hydrogen, respectively, for any given angle of attack. Calculations assume the hypersonic limit of free molecular flow theory. Each shell of revolution is assumed to be described by a series of parametric equations for their respective contours. It is discretized into circular cross sections perpendicular to the axis of revolution, which yield a series of ellipses when projected according to the given angle of attack. The drag profile, that is, the projection of the entire shell is approximated by the convex envelope of those ellipses. The area of the drag profile, that is, the drag area, and its center of area moment, that is, the drag center, are then calculated and permit determination of the drag vector and the eccentricity vector from the center of gravity of the shell to the drag center. The aerodynamic torque is obtained as the cross product of those vectors. The tanks are assumed to be either evacuated or pressurized with a uniform internal gas distribution: dynamic shifting of the tank center of mass due to residual propellant sloshing is not considered. PMID:27274926
Farris, Samantha G.; Zvolensky, Michael J.; Blalock, Janice A.; Schmidt, Norman B.
2018-01-01
Introduction Empirical work has documented a robust and consistent relation between panic attacks and smoking behavior. Theoretical models posit smokers with panic attacks may rely on smoking to help them manage chronically elevated negative affect due to uncomfortable bodily states, which may explain higher levels of nicotine dependence and quit problems. Methods The current study examined the effects of panic attack history on nicotine dependence, perceived barriers for quitting, smoking inflexibility when emotionally distressed, and expired carbon monoxide among 461 treatment-seeking smokers. A multiple mediator path model was evaluated to examine the indirect effects of negative affect and negative affect reduction motives as mediators of the panic attack-smoking relations. Results Panic attack history was indirectly related to greater levels of nicotine dependence (b=0.039, CI95%=0.008, 0.097), perceived barriers to smoking cessation (b=0.195, CI95%=0.043, 0.479), smoking inflexibility/avoidance when emotionally distressed (b=0.188, CI95%=0.041, 0.445), and higher levels of expired carbon monoxide (b=0.071, CI95%=0.010, 0.230) through the sequential effects of negative affect and negative affect smoking motives. Conclusions The present results provide empirical support for the sequential mediating role of negative affect and smoking motives for negative affect reduction in the relation between panic attacks and a variety of smoking variables in treatment-seeking smokers. These mediating variables are likely important processes to address in smoking cessation treatment, especially in panic-vulnerable smokers. PMID:24720260
Farris, Samantha G; Zvolensky, Michael J; Blalock, Janice A; Schmidt, Norman B
2014-05-01
Empirical work has documented a robust and consistent relation between panic attacks and smoking behavior. Theoretical models posit smokers with panic attacks may rely on smoking to help them manage chronically elevated negative affect due to uncomfortable bodily states, which may explain higher levels of nicotine dependence and quit problems. The current study examined the effects of panic attack history on nicotine dependence, perceived barriers for quitting, smoking inflexibility when emotionally distressed, and expired carbon monoxide among 461 treatment-seeking smokers. A multiple mediator path model was evaluated to examine the indirect effects of negative affect and negative affect reduction motives as mediators of the panic attack-smoking relations. Panic attack history was indirectly related to greater levels of nicotine dependence (b = 0.039, CI95% = 0.008, 0.097), perceived barriers to smoking cessation (b = 0.195, CI95% = 0.043, 0.479), smoking inflexibility/avoidance when emotionally distressed (b = 0.188, CI95% = 0.041, 0.445), and higher levels of expired carbon monoxide (b = 0.071, CI95% = 0.010, 0.230) through the sequential effects of negative affect and negative affect smoking motives. The present results provide empirical support for the sequential mediating role of negative affect and smoking motives for negative affect reduction in the relation between panic attacks and a variety of smoking variables in treatment-seeking smokers. These mediating variables are likely important processes to address in smoking cessation treatment, especially in panic-vulnerable smokers.
Soltani, Rasmi; lkbel, Chaieb; Habib Ben Hamouda, Med
2008-01-01
Oryctes agamemnon (Burmeister 1847) (Coleoptera, Scarabaeidae) was accidentally introduced in the southwestern oases of Tunisia (Tozeur) around 1980 and spread to the Rjim Maatoug region. In these areas O. agamemnon was specific to date palm trees causing severe damage that can result in potential danger due to collapse of the tree. This study was conducted from April 2004 to March 2006 in 4 sites in the region of Rjim Maatoug. Different levels of palm tree attack were determined, ovioposition sites were identified, and pest damage was described in detail to specify their relative importance and to indicate factors governing palm tree attack. Eggs were individually oviposited in the attacked parts. Dead parts of palm trees were the main target of O. agamemnon including the respiratory roots, tough, trunk bark, dry petiole and the periphery of the crown. The crown itself was not attacked. Feeding by larvae caused significant damage. The biggest danger occurred when heavy attacks of larvae invaded the respiratory roots at the level of the soil, and secondarily on the periphery of the crown, which can result in fungal diseases. Several cases of Deglet Nour date palm tree collapse were caused by this pest in Rjim Maatoug. Attacks on other parts of the tree were without danger for the palm tree. In the absence of pest management, application of a quarantine program combined with field cultivation techniques could help farmers significantly decrease attack of O. agamemnon on palm trees. PMID:20302545
Known-plaintext attack on the double phase encoding and its implementation with parallel hardware
NASA Astrophysics Data System (ADS)
Wei, Hengzheng; Peng, Xiang; Liu, Haitao; Feng, Songlin; Gao, Bruce Z.
2008-03-01
A known-plaintext attack on the double phase encryption scheme implemented with parallel hardware is presented. The double random phase encoding (DRPE) is one of the most representative optical cryptosystems developed in mid of 90's and derives quite a few variants since then. Although the DRPE encryption system has a strong power resisting to a brute-force attack, the inherent architecture of DRPE leaves a hidden trouble due to its linearity nature. Recently the real security strength of this opto-cryptosystem has been doubted and analyzed from the cryptanalysis point of view. In this presentation, we demonstrate that the optical cryptosystems based on DRPE architecture are vulnerable to known-plain text attack. With this attack the two encryption keys in the DRPE can be accessed with the help of the phase retrieval technique. In our approach, we adopt hybrid input-output algorithm (HIO) to recover the random phase key in the object domain and then infer the key in frequency domain. Only a plaintext-ciphertext pair is sufficient to create vulnerability. Moreover this attack does not need to select particular plaintext. The phase retrieval technique based on HIO is an iterative process performing Fourier transforms, so it fits very much into the hardware implementation of the digital signal processor (DSP). We make use of the high performance DSP to accomplish the known-plaintext attack. Compared with the software implementation, the speed of the hardware implementation is much fast. The performance of this DSP-based cryptanalysis system is also evaluated.
NASA Technical Reports Server (NTRS)
Barrett, C. A.
1985-01-01
Multiple linear regression analysis was used to determine an equation for estimating hot corrosion attack for a series of Ni base cast turbine alloys. The U transform (i.e., 1/sin (% A/100) to the 1/2) was shown to give the best estimate of the dependent variable, y. A complete second degree equation is described for the centered" weight chemistries for the elements Cr, Al, Ti, Mo, W, Cb, Ta, and Co. In addition linear terms for the minor elements C, B, and Zr were added for a basic 47 term equation. The best reduced equation was determined by the stepwise selection method with essentially 13 terms. The Cr term was found to be the most important accounting for 60 percent of the explained variability hot corrosion attack.
Ferré Romeu, Pilar
2006-05-01
In this study, I investigated students' memories of the terrorist attacks of September 11, 2001, carried out by Al Qaeda terrorists against the World Trade Center in New York and the Pentagon in Washington. Participants completed on two occasions (2 weeks and 8 months after the events took place) a memory questionnaire that included an assessment of the phenomenal richness of their memories. The results showed that the participants remembered very well the circumstances in which they first heard about the terrorist attacks, that they were very confident about this information, and that these memories were characterized by a high phenomenal richness. Over time, there was a decrease in all of these variables, but people's ratings of phenomenology and confidence were still very high.
Febrile neutropenia in children with acute lymphoblastic leukemia: single center experience
Özdemir, Nihal; Tüysüz, Gülen; Çelik, Nigar; Yantri, Leman; Erginöz, Ethem; Apak, Hilmi; Özkan, Alp; Yıldız, İnci; Celkan, Tiraje
2016-01-01
Aim: An important life-threatening complication of intensive chemotherapy administered in children with leukemia is febrile neutropenia. The objective of this study was to evaluate the clinical features and consequences of febrile neutropenia attacks in children who were treated for acute lymphoblastic leukemia. Material and Methods: Nighty-six children who received chemotherapy for acute lymphoblastic leukemia in our center between January 1995 and December 2010 were included in the study. The data related to demographic characteristics, treatment features, relapse and febrile neutropenia incidences, risk factors, culture results and prognosis were retrospectively evaluated from the patients’ files. Results: A total of two hundred-ninety nine febrile neutropenia attacks observed in the patients during initial treatment and relapse treatment were evaluated. When the incidence of febrile neutropenia was evaluated by years, it was observed that the patients treated after year 2000 had statistically significantly more febrile neutopenia attacks compared to the patients treated before year 2000. When the incidences of febrile neutropenia during initial treatment and during relapse treatment were compared, it was observed that more febrile neutropenia attacks occured during relapse treatment. Fifty-nine percent of all febrile neutropenia attacks were fever of unknown origin. Eighty microorganisms grew in cultures during febrile neutropenia throughout treatment in 75 patients; 86% were bacterial infections (50% gram positive and 50% gram negative), 8% were viral infections and 6% were fungal infections. Coagulase negative staphylococcus (n=17) was the most frequent gram positive pathogen; E. Coli (n=17) was the most commonly grown gram negative pathogen. Conclusions: In this study, it was found that an increase in the incidence of febrile neutropenia occured in years. Increments in treatment intensities increase the incidence of febrile neutropenia while improving survival. Evaluation of febrile neutropenia results by hematology-oncology units in years will be directive in early and successful treatment. PMID:27489464
Operation Noble Eagle and the Use of Combat Air Patrols for Homeland Defense
2008-12-01
aviation security , together with the absence of terrorist attacks on the homeland and of no actionable intelligence indicating an imminent air threat in America. The following sub-areas were researched to help evaluate and recommend changes to the current ONE CAP policy: the history of air defense in America; U.S. air defense mistakes on 9/11 and the evolution of ONE; improvements in the intelligence community and aviation security since 9/11; specific threats to aviation and the risk of another 9/11-style attack in the United States; and the cost and
Arbitrary Symmetric Running Gait Generation for an Underactuated Biped Model.
Dadashzadeh, Behnam; Esmaeili, Mohammad; Macnab, Chris
2017-01-01
This paper investigates generating symmetric trajectories for an underactuated biped during the stance phase of running. We use a point mass biped (PMB) model for gait analysis that consists of a prismatic force actuator on a massless leg. The significance of this model is its ability to generate more general and versatile running gaits than the spring-loaded inverted pendulum (SLIP) model, making it more suitable as a template for real robots. The algorithm plans the necessary leg actuator force to cause the robot center of mass to undergo arbitrary trajectories in stance with any arbitrary attack angle and velocity angle. The necessary actuator forces follow from the inverse kinematics and dynamics. Then these calculated forces become the control input to the dynamic model. We compare various center-of-mass trajectories, including a circular arc and polynomials of the degrees 2, 4 and 6. The cost of transport and maximum leg force are calculated for various attack angles and velocity angles. The results show that choosing the velocity angle as small as possible is beneficial, but the angle of attack has an optimum value. We also find a new result: there exist biped running gaits with double-hump ground reaction force profiles which result in less maximum leg force than single-hump profiles.
Arbitrary Symmetric Running Gait Generation for an Underactuated Biped Model
Esmaeili, Mohammad; Macnab, Chris
2017-01-01
This paper investigates generating symmetric trajectories for an underactuated biped during the stance phase of running. We use a point mass biped (PMB) model for gait analysis that consists of a prismatic force actuator on a massless leg. The significance of this model is its ability to generate more general and versatile running gaits than the spring-loaded inverted pendulum (SLIP) model, making it more suitable as a template for real robots. The algorithm plans the necessary leg actuator force to cause the robot center of mass to undergo arbitrary trajectories in stance with any arbitrary attack angle and velocity angle. The necessary actuator forces follow from the inverse kinematics and dynamics. Then these calculated forces become the control input to the dynamic model. We compare various center-of-mass trajectories, including a circular arc and polynomials of the degrees 2, 4 and 6. The cost of transport and maximum leg force are calculated for various attack angles and velocity angles. The results show that choosing the velocity angle as small as possible is beneficial, but the angle of attack has an optimum value. We also find a new result: there exist biped running gaits with double-hump ground reaction force profiles which result in less maximum leg force than single-hump profiles. PMID:28118401
Schneier, Franklin R; Neria, Yuval; Pavlicova, Martina; Hembree, Elizabeth; Suh, Eun Jung; Amsel, Lawrence; Marshall, Randall D
2012-01-01
Selective serotonin reuptake inhibitors (SSRIs) are often recommended in combination with established cognitive-behavioral therapies (CBTs) for posttraumatic stress disorder (PTSD), but combined initial treatment of PTSD has not been studied under controlled conditions. There are also few studies of either SSRIs or CBT in treating PTSD related to terrorism. The authors compared prolonged exposure therapy (a CBT) plus paroxetine (an SSRI) with prolonged exposure plus placebo in the treatment of terrorism-related PTSD. Adult survivors of the World Trade Center attack of September 11, 2001, with PTSD were randomly assigned to 10 weeks of treatment with prolonged exposure (10 sessions) plus paroxetine (N=19) or prolonged exposure plus placebo (N=18). After week 10, patients discontinued prolonged exposure and were offered 12 additional weeks of continued randomized treatment. Patients treated with prolonged exposure plus paroxetine experienced significantly greater improvement in PTSD symptoms (incidence rate ratio=0.50, 95% CI=0.30-0.85) and remission status (odds ratio=12.6, 95% CI=1.23-129) during 10 weeks of combined treatment than patients treated with prolonged exposure plus placebo. Response rate and quality of life were also significantly more improved with combined treatment. The subset of patients who continued randomized treatment for 12 additional weeks showed no group differences. Initial treatment with paroxetine plus prolonged exposure was more efficacious than prolonged exposure plus placebo for PTSD related to the World Trade Center attack. Combined treatment medication and prolonged exposure therapy deserves further study in larger samples with diverse forms of PTSD and over longer follow-up periods.
Mann, Mana; Li, Jiehui; Farfel, Mark R; Maslow, Carey B; Osahan, Sukhminder; Stellman, Steven D
2014-01-01
Behavioral problems and psychopathologies were reported in children exposed to the World Trade Center (WTC) attacks in New York City within 2-3 y post-disaster. Little is known of subsequent 9/11 related behavioral and emotional problems. We assessed risk factors for behavioral difficulties and probable posttraumatic stress disorder (PTSD) in 489 adolescent enrollees ages 11-18 y of age in the World Trade Center Health Registry cohort using the Strengths and Difficulties Questionnaire (SDQ) and DISC Predictive Scales (DPS), respectively, as reported by the adolescents. Associations between parental PTSD and adolescent PTSD and behavioral problems were studied in a subset of 166 adolescent-parent pairs in which the parent was also a Registry enrollee. Nearly one-fifth (17.4%) of the adolescents, all of whom were 5-12 y old at the time of the attacks, scored in the abnormal (5.7%) or borderline (11.7%) range of total SDQ. Problems were more frequent in minority, low-income, and single-parent adolescents. Abnormal and borderline SDQ scores were significantly associated with direct WTC exposures and with WTC-related injury or death of a family member. Adolescent PTSD was significantly associated with WTC exposure and with fear of one's own injury or death, and with PTSD in the parent (OR = 5.6; 95% CI 1.1-28.4). This adolescent population should be monitored for persistence or worsening of these problems. Co-occurrence of parent and child mental health symptoms following a disaster may have implications for healthcare practitioners and for disaster response planners.
Convergences with behavior analysis: Recommendations from the rhetoric of inquiry
Czubaroff, J.
1993-01-01
This analysis speculates on reasons why behavior analysis has not had the professional impact it desires, and suggests that increased contact with non-behavior-analytic research traditions and increased research in the area of verbal behavior may reverse the profession's fortunes. Behaviorists have accured a number of advantages from constituting themselves as a separate school in psychology. Nonetheless, school status can lead to isolation from other research traditions and can restrict communicative encounters with outside scholars to efforts to attack their research programs and defend one's own. Efforts to counteract these tendencies should help bring behavior analysis into the mainstream of contemporary social science research. In addition, if behavior analysts reconsider some of their assumptions about verbal and nonverbal behaviors and some of their methodological assumptions about how verbal behavior is to be studied, and if they place verbal behavior research on center stage, they may make substantive contributions to the contemporary multidisciplinary study of language. PMID:22478127
Simple mathematical law benchmarks human confrontations.
Johnson, Neil F; Medina, Pablo; Zhao, Guannan; Messinger, Daniel S; Horgan, John; Gill, Paul; Bohorquez, Juan Camilo; Mattson, Whitney; Gangi, Devon; Qi, Hong; Manrique, Pedro; Velasquez, Nicolas; Morgenstern, Ana; Restrepo, Elvira; Johnson, Nicholas; Spagat, Michael; Zarama, Roberto
2013-12-10
Many high-profile societal problems involve an individual or group repeatedly attacking another - from child-parent disputes, sexual violence against women, civil unrest, violent conflicts and acts of terror, to current cyber-attacks on national infrastructure and ultrafast cyber-trades attacking stockholders. There is an urgent need to quantify the likely severity and timing of such future acts, shed light on likely perpetrators, and identify intervention strategies. Here we present a combined analysis of multiple datasets across all these domains which account for >100,000 events, and show that a simple mathematical law can benchmark them all. We derive this benchmark and interpret it, using a minimal mechanistic model grounded by state-of-the-art fieldwork. Our findings provide quantitative predictions concerning future attacks; a tool to help detect common perpetrators and abnormal behaviors; insight into the trajectory of a 'lone wolf'; identification of a critical threshold for spreading a message or idea among perpetrators; an intervention strategy to erode the most lethal clusters; and more broadly, a quantitative starting point for cross-disciplinary theorizing about human aggression at the individual and group level, in both real and online worlds.
Correlations and forecast of death tolls in the Syrian conflict.
Fujita, Kazuki; Shinomoto, Shigeru; Rocha, Luis E C
2017-11-16
The Syrian armed conflict has been ongoing since 2011 and has already caused thousands of deaths. The analysis of death tolls helps to understand the dynamics of the conflict and to better allocate resources and aid to the affected areas. In this article, we use information on the daily number of deaths to study temporal and spatial correlations in the data, and exploit this information to forecast events of deaths. We found that the number of violent deaths per day in Syria varies more widely than that in England in which non-violent deaths dominate. We have identified strong positive auto-correlations in Syrian cities and non-trivial cross-correlations across some of them. The results indicate synchronization in the number of deaths at different times and locations, suggesting respectively that local attacks are followed by more attacks at subsequent days and that coordinated attacks may also take place across different locations. Thus the analysis of high temporal resolution data across multiple cities makes it possible to infer attack strategies, warn potential occurrence of future events, and hopefully avoid further deaths.
Simple mathematical law benchmarks human confrontations
NASA Astrophysics Data System (ADS)
Johnson, Neil F.; Medina, Pablo; Zhao, Guannan; Messinger, Daniel S.; Horgan, John; Gill, Paul; Bohorquez, Juan Camilo; Mattson, Whitney; Gangi, Devon; Qi, Hong; Manrique, Pedro; Velasquez, Nicolas; Morgenstern, Ana; Restrepo, Elvira; Johnson, Nicholas; Spagat, Michael; Zarama, Roberto
2013-12-01
Many high-profile societal problems involve an individual or group repeatedly attacking another - from child-parent disputes, sexual violence against women, civil unrest, violent conflicts and acts of terror, to current cyber-attacks on national infrastructure and ultrafast cyber-trades attacking stockholders. There is an urgent need to quantify the likely severity and timing of such future acts, shed light on likely perpetrators, and identify intervention strategies. Here we present a combined analysis of multiple datasets across all these domains which account for >100,000 events, and show that a simple mathematical law can benchmark them all. We derive this benchmark and interpret it, using a minimal mechanistic model grounded by state-of-the-art fieldwork. Our findings provide quantitative predictions concerning future attacks; a tool to help detect common perpetrators and abnormal behaviors; insight into the trajectory of a `lone wolf' identification of a critical threshold for spreading a message or idea among perpetrators; an intervention strategy to erode the most lethal clusters; and more broadly, a quantitative starting point for cross-disciplinary theorizing about human aggression at the individual and group level, in both real and online worlds.
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification. PMID:25152923
Attack and improvements of fair quantum blind signature schemes
NASA Astrophysics Data System (ADS)
Zou, Xiangfu; Qiu, Daowen
2013-06-01
Blind signature schemes allow users to obtain the signature of a message while the signer learns neither the message nor the resulting signature. Therefore, blind signatures have been used to realize cryptographic protocols providing the anonymity of some participants, such as: secure electronic payment systems and electronic voting systems. A fair blind signature is a form of blind signature which the anonymity could be removed with the help of a trusted entity, when this is required for legal reasons. Recently, a fair quantum blind signature scheme was proposed and thought to be safe. In this paper, we first point out that there exists a new attack on fair quantum blind signature schemes. The attack shows that, if any sender has intercepted any valid signature, he (she) can counterfeit a valid signature for any message and can not be traced by the counterfeited blind signature. Then, we construct a fair quantum blind signature scheme by improved the existed one. The proposed fair quantum blind signature scheme can resist the preceding attack. Furthermore, we demonstrate the security of the proposed fair quantum blind signature scheme and compare it with the other one.
Security in maritime transport : risk factors and economic impact
DOT National Transportation Integrated Search
2003-07-01
Immediately after the devastating September 11th World Trade Center attacks in New York, governments around the world scrambled to assess their vulnerability to highly organised terrorist groups. World trade is dependent on maritime transport and gre...
Terrorist Attacks Put Academic Freedom to the Test.
ERIC Educational Resources Information Center
Wilson, Robin; Cox, Ana Marie
2001-01-01
Explores how, in the aftermath of the airplane hijackings and deaths at New York's World Trade Center and the Pentagon, academic freedom may be under threat. Provides examples of student or administrative action against professors offering different viewpoints. (EV)
Finding Effective Responses Against Cyber Attacks for Divided Nations
2015-12-01
Coordination Center LTE Long Term Evolution MAC Media Access Control MCRC Master Control and Reporting Center MEI Ministry of Electronics...satellites that aid Internet connections. Individual users can access the Internet via not only a wired connection up to 1 Gbps, but also by 4G LTE ...operate air-gapped intranets with security measures such as cryptographic modules that correspond to security levels. The MND does maintain the public
Guidelines for Managing Suspected Chemical and Biological Agent Incidents in Rail Tunnel Systems
DOT National Transportation Integrated Search
2002-03-01
These emergency management guidelines are designed to help transit managers (1) prepare and implement standard operating procedures (SOPs) for handling potential and actual chemical or biological agent attacks in their rail tunnel system and (2) unde...
Understand Your Risk for Excessive Blood Clotting
... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...
Recognizing Advanced Heart Failure and Knowing Your Options
... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...
Living with Your Implantable Cardioverter Defibrillator (ICD)
... and Live Our Interactive Cardiovascular Library has detailed animations and illustrations to help you learn about conditions, treatments and procedures related to heart disease and stroke. Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...
Travel Tips Help IBS Sufferers Enjoy Their Vacations
... can feel more in control when traveling." IFFGD's travel tips include: Allow enough time in the morning to get to the airport ... Heartache 2004-0929 Norton Honored 2004-0525 IBS Travel Tips ... Real World 2001-1119 Heartburn or Heart Attack Commentary ...
Health implications of radiological terrorism: Perspectives from Israel
Hagby, Moti; Goldberg, Avishay; Becker, Steven; Schwartz, Dagan; Bar-Dayan, Yaron
2009-01-01
September 11th events taught us, members of the medical community, that we need to prepared for the worst. Nuclear terror is no longer science fiction. Radiological weapons of mass terror come in three flavors: The first one is nuclear. Since 1992, there have been six known cases of highly enriched uranium or plutonium being intercepted by authorities as it passed in or out of the former Soviet Union. Constructing a nuclear fission weapon requires high-level expertise, substantial facilities, and lots of money. All three of which would be difficult, although not impossible, for a terrorist group to pull off without state support. However, terrorists could carry out potential mass destruction without sophisticated weaponry by targeting nuclear facilities using conventional bombs or hijacked aircrafts. Terror attacks could also carry out mass panic and radioactive contamination of people and environment by dispersal of radioactive materials with or without the use of conventional explosive devices. Most medical and para-medical personnel are not familiar with CBRN terror and radiation casualties. To lessen the impact of those potential attacks and provide care for the greatest number of potential survivors, the community as a whole – and the medical community in particular – must acquire the knowledge of the various signs and symptoms of exposure to irradiation and radioactive contamination as well as have a planned response once such an attack has occurred. Based on knowledge of radiation hazards, medical emergency planers should analyze the risks of each scenario, offer feasible solutions and translate them into internationally accepted plans that would be simple to carry out once such an attack took place. The planned response should be questioned and tested by drills. Those drills should check the triage, evacuation routes, decontamination posts, evacuation centers and receiving hospitals. It is crucial that the drill will consist of simulated casualties that will follow the evacuation route from point zero to the ED. Knowledge and exercise will reduce terror (fear) from radiation and help the community as a whole better cope with such an event. This article will review the general information of radiation types, their biological damage, clinical appearance and general concepts of nuclear event planning, focusing on medical response and focus on the Israeli perspective. PMID:19561972
NASA Technical Reports Server (NTRS)
Henderson, W. P.; Huffman, J. K.
1974-01-01
An investigation has been conducted to determine the effects of configuration variables on the lateral-directional stability characteristics of a wing-fuselage configuration. The variables under study included variations in the location of a single center-line vertical tail and twin vertical tails, wing height, fuselage strakes, and horizontal tails. The study was conducted in the Langley high-speed 7-by 10-foot tunnel at a Mach number of 0.30, at angles of attack up to 44 deg and at sideslip angles of 0 deg and plus or minus 5 deg.
Liftoff and Transition Aerodynamics of the Ares I (A106) Launch Vehicle
NASA Technical Reports Server (NTRS)
Capone, Francis J.; Paulson, John W., Jr.; Erickson, Gary E.
2011-01-01
An investigation has been conducted in the NASA Langley Research Center 14- by 22- Foot Subsonic Wind Tunnel to obtain the liftoff and transition aerodynamics of the Ares I (A106) Crew Launch Vehicle. Data were obtained in free-air at angles of attack from 10 to 90 at various roll angles and at roll angles of 0 to 360 at various angles of attack. In addition, tower effects were assessed by testing with and without a mobile launcher/tower at all wind azimuth angles and at various model heights to simulate the rise of the vehicle as it clears the tower on launch. The free-air data will be used for low speed high angle of attack flight simulation and as a bridge to the low angle of attack ascent database (0.5 < Mach < 5.0) being developed with data from the Langley Unitary Plan Wind Tunnel and Boeing Polysonic Wind Tunnel. The Ares I Database Development Team will add incremental tower effects data to the free-air data to develop the database for tower clearance.
Assessing Terrorist Motivations for Attacking Critical Infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ackerman, G; Abhayaratne, P; Bale, J
Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CImore » facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made possible the identification of several target selection factors that were both important in the development of the analytical framework and subsequently validated by the case studies. Similarly, statistical analysis of the CrITIC data yielded measurable evidence that supported hypotheses derived from the framework, the case studies, and the writings of various experts. Besides providing an important mechanism of self-reinforcement and validation, the project's multifaceted nature made it possible to discern aspects of CI attack motivations that would likely have been missed if any single approach had been adopted.« less
Cheeranont, Piyapan
2009-02-01
Bombing attacks by terrorists in the three most southern provinces of Thailand increased both in frequency and intensity from the year 2004 until now. Patterns of bombing were not only destroying buildings or killing targets victims by dropping bombs under roads and in public places but also harming scene investigators by dropping second bombs nearby. Emergency medical personnel working there also had some risks from these second bombs while helping victims at the scene. The purposes of the present study aimed to describe patterns and risks of bombing attacks, analyze locations of wounds of bombing casualties and propose a standing operation procedure for emergency medical technicians (EMTs) in helping victims at scenes to reduce harm from second bombs. The authors gathered some information about patterns of bombing from the Forward 4th Army Area Explosive Ordnance Disposal (EOD) team and reviewed insurgency related casualty reports from Yala, Pattani and Narathivasrajanakarin Hospital from January 2004 to December 2006. From these reports, data of deep wounds or wounds that caused serious injuries or deaths of 144 improvised explosive devices (IED) victims was collected and separated into fatal (45 casualties) and nonfatal groups (99 casualties). In each group, casualties' demographic data and number of casualties separated by locations of wounds and occupations are shown and compared by percentage of the total number of each group and was found that most of fatal casualties had wounds on head (42.22%), chest (33.33%) and abdomen (33.33%) that should be protected by wearing helmets and body armors. But there was a higher proportion of extremity injuries in non-fatal casualties (63.64%). Thus, the authors proposed measures for EMTs in helping victims at scenes to reduce their risks by wearing helmets and body armors and quickly removal of the injured with minimal medical intervention.
Money in the Bank. Lessons Learned from Past Counterinsurgency (COIN) Operations
2007-01-01
to work among their own people, which helped draw recruits from established social networks, exploited their familiarity with the villagers and the...in U.S. military support. Local indigenous forces were used to attack the VCI because they were familiar with the terrain and the inhabitants of the...cultivate human intelligence (HUMINT) through a cache of local assets and agents. Direct familiarity with the villagers can help soldiers detect the
Riedl, Marc A; Bernstein, Jonathan A; Craig, Timothy; Banerji, Aleena; Magerl, Markus; Cicardi, Marco; Longhurst, Hilary J; Shennak, Mustafa M; Yang, William H; Schranz, Jennifer; Baptista, Jovanna; Busse, Paula J
2017-01-01
Hereditary angioedema (HAE) is characterized by recurrent attacks of subcutaneous or submucosal edema. Attacks are unpredictable, debilitating, and have a significant impact on quality of life. Patients may be prescribed prophylactic therapy to prevent angioedema attacks. Current prophylactic treatments may be difficult to administer (i.e., intravenously), require frequent administrations or are not well tolerated, and breakthrough attacks may still occur frequently. Lanadelumab is a subcutaneously-administered monoclonal antibody inhibitor of plasma kallikrein in clinical development for prophylaxis of hereditary angioedema attacks. A Phase 1b study supported its efficacy in preventing attacks. A Phase 3, randomized, double-blind, placebo-controlled, parallel-arm study has been completed and an open-label extension is currently ongoing. The primary objective of the open-label extension is to evaluate the long-term safety of repeated subcutaneous administrations of lanadelumab in patients with type I/II HAE. Secondary objectives include evaluation of efficacy and time to first angioedema attack to determine outer bounds of the dosing interval. The study will also evaluate immunogenicity, pharmacokinetics/pharmacodynamics, quality of life, characteristics of breakthrough attacks, ease of self-administration, and safety/efficacy in patients who switch to lanadelumab from another prophylactic therapy. The open-label extension will enroll patients who completed the double-blind study ("rollover patients") and those who did not participate in the double-blind study ("non-rollover patients"), which includes patients who may or may not be currently using another prophylactic therapy. Rollover patients will receive a single 300 mg dose of lanadelumab on Day 0 and the second dose after the patient's first confirmed angioedema attack. Thereafter, lanadelumab will be administered every 2 weeks. Non-rollover patients will receive 300 mg lanadelumab every 2 weeks regardless of the first attack. All patients will receive their last dose on Day 350 (maximum of 26 doses), and will then undergo a 4-week follow-up. Prevention of attacks can reduce the burden of illness associated with HAE. Prophylactic therapy requires extended, repeated dosing and the results of this study will provide important data on the long-term safety and efficacy of lanadelumab, a monoclonal antibody inhibitor of plasma kallikrein for subcutaneous administration for the treatment of HAE. Trial registration NCT02741596.
NASA Technical Reports Server (NTRS)
Doggett, Glen P.; Chokani, Ndaona
1996-01-01
An experimental investigation of the effects of angle of attack on hypersonic boundary-layer stability on a flared-cone model was conducted in the low-disturbance Mach-6 Nozzle-Test Chamber Facility at NASA Langley Research Center. This unique facility provided a 'quiet' flow test environment which is well suited for stability experiments because the low levels of freestream 'noise' minimize artificial stimulation of flow-disturbance growth. Surface pressure and temperature measurements documented the adverse-pressure gradient and transition-onset location. Hot-wire anemometry diagnostics were applied to identify the instability mechanisms which lead to transition. In addition, the mean flow over the flared-cone geometry was modeled by laminar Navier-Stokes computations. Results show that the boundary layer becomes more stable on the windward ray and less stable on the leeward ray relative to the zero-degree angle-of-attack case. The second-mode instability dominates the transition process at a zero-degree angle of attack, however, on the windward ray at an angle of attack this mode was completely stabilized. The less-dominant first-mode instability was slightly destabilized on the windward ray. Non-linear mechanisms such as saturation and harmonic generation are identified from the flow-disturbance bispectra.
Olofsson, Martin; Vallin, Adrian; Jakobsson, Sven; Wiklund, Christer
2010-05-24
Predators preferentially attack vital body parts to avoid prey escape. Consequently, prey adaptations that make predators attack less crucial body parts are expected to evolve. Marginal eyespots on butterfly wings have long been thought to have this deflective, but hitherto undemonstrated function. Here we report that a butterfly, Lopinga achine, with broad-spectrum reflective white scales in its marginal eyespot pupils deceives a generalist avian predator, the blue tit, to attack the marginal eyespots, but only under particular conditions-in our experiments, low light intensities with a prominent UV component. Under high light intensity conditions with a similar UV component, and at low light intensities without UV, blue tits directed attacks towards the butterfly head. In nature, birds typically forage intensively at early dawn, when the light environment shifts to shorter wavelengths, and the contrast between the eyespot pupils and the background increases. Among butterflies, deflecting attacks is likely to be particularly important at dawn when low ambient temperatures make escape by flight impossible, and when insectivorous birds typically initiate another day's search for food. Our finding that the deflective function of eyespots is highly dependent on the ambient light environment helps explain why previous attempts have provided little support for the deflective role of marginal eyespots, and we hypothesize that the mechanism that we have discovered in our experiments in a laboratory setting may function also in nature when birds forage on resting butterflies under low light intensities.
Association of PTSD symptoms with asthma attacks among hurricane Katrina survivors.
Arcaya, Mariana C; Lowe, Sarah R; Rhodes, Jean E; Waters, Mary C; Subramanian, S V
2014-12-01
The relationship between posttraumatic stress disorder (PTSD) and asthma in the wake of natural disasters is poorly understood. Using pre- and postdisaster data (N = 405) from the Resilience in Survivors of Katrina (RISK) project, we examined associations between PTSD symptoms, measured by the Impact of Event Scale-Revised (IES-R), and self-reported postdisaster asthma attacks. A 1-point increase in the IES-R avoidance score, which corresponded to one standard deviation change in this sample, was associated with double the odds of reporting an asthma attack or episode since the hurricane, 95% CI Revise spacing among characters: [1.22, 4.16]. Association with hyperarousal and intrusion symptoms was null. Further research using objective measures of asthma morbidity is needed; nevertheless, these findings may help inform postdisaster health services delivery and predisaster mitigation planning. Copyright © 2014 International Society for Traumatic Stress Studies.
It could have been me: vicarious victims and disaster-focused distress.
Wayment, Heidi A
2004-04-01
College students who had experienced no personal bereavement in the September 11 terrorist attacks completed questionnaires between 3 and 5 weeks after the attacks and 5 months later. Cross-sectional and longitudinal structural equation model (SEM) analyses revealed that general distress and disaster-focused distress are discernable reactions following a collective loss. Both types of distress were higher among women and by those reporting social strain. General distress was associated with previous stressful events and mental health issues. Perceived similarity to the victims predicted disaster-focused distress and mediated the relationship between attending to media accounts of victims and disaster-focused distress. Only the disaster-focused distress reactions of survivor guilt and grief were associated with collective helping behaviors after the attacks and, for women, these behaviors were associated with greater reductions in these distress reactions over time. Discussion focuses on the importance of examining disaster-focused distress reactions following collective loss.
The stress and migraine interaction.
Sauro, Khara M; Becker, Werner J
2009-10-01
There are several ways in which stress may interact with migraine in those predisposed to migraine attacks. These interactions may result from biochemical changes related to the physiological stress response, as, for example, the release of corticotrophin releasing hormone, or from changes induced by the psychological response to stressors. Stress is the factor listed most often by migraine sufferers as a trigger for their attacks, but in addition there is evidence that stress can help initiate migraine in those predisposed to the disorder, and may also contribute to migraine chronification. Migraine attacks themselves can act as a stressor, thereby potentially leading to a vicious circle of increasing migraine frequency. Since the important factor in the stress-migraine interaction is likely the individual's responses to stressors, rather than the stressors themselves, the acquisition of effective stress management skills has the potential to reduce the impact of stressors on those with migraine.
Quantum secret information equal exchange protocol based on dense coding
NASA Astrophysics Data System (ADS)
Jiang, Ying-Hua; Zhang, Shi-Bin; Dai, Jin-Qiao; Shi, Zhi-Ping
2018-04-01
In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.
Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng
2013-06-01
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.
LABORATORY GUIDELINES FOR ANALYSIS OF BIOTERRORISM SAMPLES
After the attack on the World Trade Center on September 11, 2002, and the subsequent deaths associated with Bacillus anthracis spore contaminated mail, a worldwide need was apparent for increased laboratory capacity to safely analyze bioterrorism samples. The U.S. Department o...
Asselmann, Eva; Wittchen, Hans-Ulrich; Lieb, Roselind; Höfler, Michael; Beesdo-Baum, Katja
2014-12-01
Although fearful spells (FS) and panic attacks (PA) increase the risk for various mental disorders, few studies have examined whether help-seeking in those with FS/PA attenuates the risk for incident psychopathology. A community sample of adolescents and young adults (N=2978, aged 14-24 at baseline) was followed up in up to 3 assessment waves over 10 years. FS, PA, psychopathology, and help-seeking were assessed using the DSM-IV/M-CIDI. Logistic regressions with interaction terms (adjusted for sex and age) were used to test interactions between FS/PA and help-seeking at baseline on predicting incident psychopathology at follow-up. Cases with panic disorder (PD) at baseline were excluded from all analyses. FS/PA at baseline predicted the onset of any disorder, any anxiety disorder, PD, agoraphobia, generalized anxiety disorder, social phobia, and depression at follow-up (Odds Ratios, OR 1.62-5.80). FS/PA and help-seeking at baseline interacted on predicting incident PD (OR=0.09) and depression (OR=0.22) at follow-up in a way that FS/PA only predicted the respective disorders in individuals not seeking help at baseline. In those with FS/PA, a higher number of panic symptoms interacted with help-seeking on predicting incident PD (OR=0.63) in a way that a higher number of panic symptoms only increased the risk for PD in those without help-seeking at baseline. Help-seeking at baseline was not restricted to panic-specific interventions, but included treatment due to other psychological problems as well. Findings suggest that early help-seeking might modify psychopathology trajectories and prevent incident disorders in high-risk individuals with FS/PA. Copyright © 2014 Elsevier B.V. All rights reserved.
Transportation security : federal action needed to help address security challenges
DOT National Transportation Integrated Search
2003-06-30
The economic well being of the U.S. is dependent on the expeditious flow of people and goods through the transportation system. The attacks on September 11, 2001, illustrate the threats and vulnerabilities of the transportation system. Prior to Septe...
ERIC Educational Resources Information Center
Bennett, Gayle
2009-01-01
Working with alumni volunteers shouldn't create horror and suspense. Following a few key steps can help maintain a smooth relationship between alumni volunteers and the alumni relations office staff. In this article, the author discusses how to manage volunteers and keep the alumni volunteer relationship on track.
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
Měsíček, Libor; Choi, Jongsun
2018-01-01
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely. PMID:29796233
Toward more environmentally resistant gas turbines: Progress in NASA-Lewis programs
NASA Technical Reports Server (NTRS)
Lowell, C. E.; Grisaffe, S. J.; Levine, S. R.
1976-01-01
A wide range of programs are being conducted for improving the environmental resistance to oxidation and hot corrosion of gas turbine and power system materials. They range from fundamental efforts to delineate attack mechanisms, allow attack modeling and permit life prediction, to more applied efforts to develop potentially more resistant alloys and coatings. Oxidation life prediction efforts have resulted in a computer program which provides an initial method for predicting long time metal loss using short time oxidation data by means of a paralinear attack model. Efforts in alloy development have centered on oxide-dispersion strengthened alloys based on the Ni-Cr-Al system. Compositions have been identified which are compromises between oxidation and thermal fatigue resistance. Fundamental studies of hot corrosion mechanisms include thermodynamic studies of sodium sulfate formation during turbine combustion. Information concerning species formed during the vaporization of Na2SO4 has been developed using high temperature mass spectrometry.
Cohen, Mitchell L.; Friedman, Cindy R.; Scripp, Robert M.; Watz, Craig G.
2002-01-01
The biological attacks with powders containing Bacillus anthracis sent through the mail during September and October 2001 led to unprecedented public health and law enforcement investigations, which involved thousands of investigators from federal, state, and local agencies. Following recognition of the first cases of anthrax in Florida in early October 2001, investigators from Centers for Disease Control and Prevention (CDC) and the Federal Bureau of Investigation (FBI) were mobilized to assist investigators from state and local public health and law enforcement agencies. Although public health and criminal investigations have been conducted in concert in the past, the response to the anthrax attacks required close collaboration because of the immediate and ongoing threat to public safety. We describe the collaborations between CDC and FBI during the investigation of the 2001 anthrax attacks and highlight the challenges and successes of public health and law enforcement collaborations in general. PMID:12396931
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.
Ko, Hoon; Měsíček, Libor; Choi, Jongsun; Hwang, Seogchan
2018-01-01
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.
NASA Technical Reports Server (NTRS)
Huffman, J. K.
1975-01-01
The effects were studied of various vertical-tail configurations on the longitudinal and lateral directional-stability characteristics of a general research fighter model utilizing wing-body-canard. The study indicates that the addition of the high canard resulted in an increase in total lift at angles of attack above 4 deg with a maximum lift coefficient about twice as large as that for the wing-body configuration. For the wing-body (canard off) configuration, the center-line vertical tail indicates positive vertical-tail effectiveness throughout the test angle-of-attack range; however, for this configuration none of the wing-mounted vertical-tail locations tested resulted in a positive directional-stability increment at the higher angles of attack. For the wing-body-canard configuration several outboard locations of the wing-mounted vertical tails were found.
NASA Technical Reports Server (NTRS)
Esparza, V.
1976-01-01
Aerodynamic separation data obtained from a wind tunnel test of an 0.0125-scale SSV Orbiter model of a VC70-000002 Configuration and a 0.0125-scale 747 model was presented. Separation data was obtained at a Mach number of 0.6 and three incidence angles of 4, 6, and 8 degrees. The orbiter angle of attack was varied from 0 to 14 degrees. Longitudinal, lateral and normal separation increments were obtained for fixed 747 angles of attack of 0, 2, and 4 degrees while varying the orbiter angle of attack. Control surface settings on the 747 carrier included rudder deflections of 0 and 10 degrees and horizontal stabilizer deflections of -1 and +5 degrees.
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.
Park, Namje; Kang, Namhi
2015-12-24
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.
2008-09-01
rich mix of medical services that range from simple ambulatory visits to plastic surgery , neuro- surgery , general surgery , bariatric , ophthalmology...CENTER SAN DIEGO NMCSD is a 266-bed tertiary care facility providing patient services ranging from same day surgery to brain surgery . The hospital...orthopedics, cardiology, thoracic surgery , vascular surgery , transient ischemic attack/cerebro vascular accident (TIA/CVA), OB/GYN, urology, non
Blood and Treasure: The U.S. Debt and Its Implications for National Defense and Security
2012-12-01
Reserve Board, “Major Foreign Holders of Treasury Securities ,” 15 May 2012. http://www.treasury.gov/resource-center/ data -chart- center/tic/Documents...Coupled with numerous cyber -attacks and theft of intelligence, China could be performing dry runs and gaining intelligence on every occasion for the...THE U.S. DEBT AND ITS IMPLICATIONS FOR NATIONAL DEFENSE AND SECURITY by Nicholas C. Malokofsky December 2012 Thesis Advisor: Carolyn
Honey Bee Inhibitory Signaling Is Tuned to Threat Severity and Can Act as a Colony Alarm Signal
Li, Xinyu; Liu, Xiwen; Wang, Chao; Li, Jianjun
2016-01-01
Alarm communication is a key adaptation that helps social groups resist predation and rally defenses. In Asia, the world’s largest hornet, Vespa mandarinia, and the smaller hornet, Vespa velutina, prey upon foragers and nests of the Asian honey bee, Apis cerana. We attacked foragers and colony nest entrances with these predators and provide the first evidence, in social insects, of an alarm signal that encodes graded danger and attack context. We show that, like Apis mellifera, A. cerana possesses a vibrational “stop signal,” which can be triggered by predator attacks upon foragers and inhibits waggle dancing. Large hornet attacks were more dangerous and resulted in higher bee mortality. Per attack at the colony level, large hornets elicited more stop signals than small hornets. Unexpectedly, stop signals elicited by large hornets (SS large hornet) had a significantly higher vibrational fundamental frequency than those elicited by small hornets (SS small hornet) and were more effective at inhibiting waggle dancing. Stop signals resulting from attacks upon the nest entrance (SS nest) were produced by foragers and guards and were significantly longer in pulse duration than stop signals elicited by attacks upon foragers (SS forager). Unlike SS forager, SS nest were targeted at dancing and non-dancing foragers and had the common effect, tuned to hornet threat level, of inhibiting bee departures from the safe interior of the nest. Meanwhile, nest defenders were triggered by the bee alarm pheromone and live hornet presence to heat-ball the hornet. In A. cerana, sophisticated recruitment communication that encodes food location, the waggle dance, is therefore matched with an inhibitory/alarm signal that encodes information about the context of danger and its threat level. PMID:27014876
Honey Bee Inhibitory Signaling Is Tuned to Threat Severity and Can Act as a Colony Alarm Signal.
Tan, Ken; Dong, Shihao; Li, Xinyu; Liu, Xiwen; Wang, Chao; Li, Jianjun; Nieh, James C
2016-03-01
Alarm communication is a key adaptation that helps social groups resist predation and rally defenses. In Asia, the world's largest hornet, Vespa mandarinia, and the smaller hornet, Vespa velutina, prey upon foragers and nests of the Asian honey bee, Apis cerana. We attacked foragers and colony nest entrances with these predators and provide the first evidence, in social insects, of an alarm signal that encodes graded danger and attack context. We show that, like Apis mellifera, A. cerana possesses a vibrational "stop signal," which can be triggered by predator attacks upon foragers and inhibits waggle dancing. Large hornet attacks were more dangerous and resulted in higher bee mortality. Per attack at the colony level, large hornets elicited more stop signals than small hornets. Unexpectedly, stop signals elicited by large hornets (SS large hornet) had a significantly higher vibrational fundamental frequency than those elicited by small hornets (SS small hornet) and were more effective at inhibiting waggle dancing. Stop signals resulting from attacks upon the nest entrance (SS nest) were produced by foragers and guards and were significantly longer in pulse duration than stop signals elicited by attacks upon foragers (SS forager). Unlike SS forager, SS nest were targeted at dancing and non-dancing foragers and had the common effect, tuned to hornet threat level, of inhibiting bee departures from the safe interior of the nest. Meanwhile, nest defenders were triggered by the bee alarm pheromone and live hornet presence to heat-ball the hornet. In A. cerana, sophisticated recruitment communication that encodes food location, the waggle dance, is therefore matched with an inhibitory/alarm signal that encodes information about the context of danger and its threat level.
1998-06-22
KENNEDY SPACE CENTER, FLA. -- A large alligator attacks and eats a smaller one in a natural display of cannibalism. Although this event has been observed infrequently by Kennedy Space Center's staff photographers, it is common feeding behavior among the wild alligator population on the space center. Alligators are carnivorous and will eat any living thing that crosses their paths and is small enough for them to kill. For this reason, it is dangerous to feed wild alligators, and in Florida, it is also illegal. The Merritt Island National Wildlife Refuge, which is operated by the U.S. Fish and Wildlife Service, is located on Kennedy Space Center property.
1998-06-22
KENNEDY SPACE CENTER, FLA. -- A large alligator attacks and eats a smaller one in a natural display of cannibalism. Although this event has been observed infrequently by Kennedy Space Center's staff photographers, it is common feeding behavior among the wild alligator population on the space center. Alligators are carnivorous and will eat any living thing that crosses their paths and is small enough for them to kill. For this reason, it is dangerous to feed wild alligators, and in Florida, it is also illegal. The Merritt Island National Wildlife Refuge, which is operated by the U.S. Fish and Wildlife Service, is located on Kennedy Space Center property.
1998-06-22
KENNEDY SPACE CENTER, FLA. -- A large alligator attacks and eats a smaller one in a natural display of cannibalism. Although this event has been observed infrequently by Kennedy Space Center's staff photographers, it is common feeding behavior among the wild alligator population on the space center. Alligators are carnivorous and will eat any living thing that crosses their paths and is small enough for them to kill. For this reason, it is dangerous to feed wild alligators, and in Florida, it is also illegal. The Merritt Island National Wildlife Refuge, which is operated by the U.S. Fish and Wildlife Service, is located on Kennedy Space Center property.
1998-06-22
KENNEDY SPACE CENTER, FLA. -- A large alligator attacks and eats a smaller one in a natural display of cannibalism. Although this event has been observed infrequently by Kennedy Space Center's staff photographers, it is common feeding behavior among the wild alligator population on the space center. Alligators are carnivorous and will eat any living thing that crosses their paths and is small enough for them to kill. For this reason, it is dangerous to feed wild alligators, and in Florida, it is also illegal. The Merritt Island National Wildlife Refuge, which is operated by the U.S. Fish and Wildlife Service, is located on Kennedy Space Center property.
1998-06-22
KENNEDY SPACE CENTER, FLA. -- A large alligator attacks and eats a smaller one in a natural display of cannibalism. Although this event has been observed infrequently by Kennedy Space Center's staff photographers, it is common feeding behavior among the wild alligator population on the space center. Alligators are carnivorous and will eat any living thing that crosses their paths and is small enough for them to kill. For this reason, it is dangerous to feed wild alligators, and in Florida, it is also illegal. The Merritt Island National Wildlife Refuge, which is operated by the U.S. Fish and Wildlife Service, is located on Kennedy Space Center property.
Understanding estimated worker absenteeism rates during an influenza pandemic.
Thanner, Meridith H; Links, Jonathan M; Meltzer, Martin I; Scheulen, James J; Kelen, Gabor D
2011-01-01
Published employee absenteeism estimates during an influenza pandemic range from 10 to 40 percent. The purpose of this study was to estimate daily employee absenteeism through the duration of an influenza pandemic and to determine the relative impact of key variables used to derive the estimates. Using the Centers for Disease Control and Prevention's FluWorkLoss program, the authors estimated the number of absent employees on any given day over the course of a simulated 8-week pandemic wave by using varying attack rates. Employee data from a university with a large academic health system were used. Sensitivity of the program outputs to variation in predictor (inputs) values was assessed. Finally, the authors examined and documented the algorithmic sequence of the program. Using a 35 percent attack rate, a total of 47,270 workdays (or 3.4 percent of all available workdays) would be lost over the course of an 8-week pandemic among a population of 35,026 employees. The highest (peak) daily absenteeism estimate was 5.8 percent (minimum 4.8 percent; maximum 7.4 percent). Sensitivity analysis revealed that varying days missed for nonhospitalized illness had the greatest potential effect on peak absence rate (3.1 to 17.2 percent). Peak absence with 15 and 25 percent attack rates were 2.5 percent and 4.2 percent, respectively. The impact of an influenza pandemic on employee availability may be less than originally thought, even with a high attack rate. These data are generalizable and are not specific to institutions of higher education or medical centers. Thus, these findings provide realistic and useful estimates for influenza pandemic planning for most organizations.
Niles, J K; Webber, M P; Gustave, J; Zeig-Owens, R; Lee, R; Glass, L; Weiden, M D; Kelly, K J; Prezant, D J
2011-09-01
Our goal was to examine the effect of the World Trade Center (WTC) attack and subsequent New York City Fire Department (FDNY) rescue/recovery activities on firefighter retirements. We also analyzed the financial impact associated with the increased number and proportion of service-connected "accidental" disability retirements on the FDNY pension system. A total of 7,763 firefighters retired between 9/11/1994 and 9/10/2008. We compared the total number of retirements and the number and proportion of accidental disability retirements 7 years before and 7 years after the WTC attack. We categorized WTC-related accidental disability retirements by medical cause and worked with the New York City Office of the Actuary to approximate the financial impact by cause. In the 7 years before 9/11 there were 3,261 retirements, 48% (1,571) of which were accidental disability retirements. In the 7 years after 9/11, there were 4,502 retirements, 66% (2,970) were accidental disability retirements, of which 47% (1,402) were associated with WTC-related injuries or illnesses. After 9/11, the increase in accidental disability retirements was, for the most part, due to respiratory-related illnesses. Additional increases were attributed to psychological-related illnesses and musculoskeletal injuries incurred at the WTC site. Pension benefits associated with WTC-related accidental disability retirements have produced an increased financial burden of over $826 million on the FDNY pension system. The WTC attacks affected the health of the FDNY workforce resulting in more post-9/11 retirements than expected, and a larger proportion of these retirees with accidental disability pensions. Copyright © 2011 Wiley-Liss, Inc.
Bar-El, Yaron; Michaelson, Moshe; Hyames, Gila; Skorecki, Karl; Reisner, Shimon A; Beyar, Rafael
2009-09-01
The Rambam Medical Center, the major academic health center in northern Israel, serving a population of two million and providing specialized tertiary care, was exposed to an unprecedented experience during the Second Lebanon War in the summer of 2006. For more than one month, it was subjected to continuous rocket attacks, but it continued to provide emergency and routine medical services to the civilian population and also served the military personnel who were evacuated from the battlefront. To accomplish the goals of serving the population while itself being under fire, the Rambam Medical Center had to undertake major organizational decisions, which included maximizing safety within the hospital by shifting patients and departments, ensuring that the hospital was properly fortified, managing the health professional teams' work schedules, and providing needed services for the families of employees. The Rambam Medical Center's Level I trauma center expertise included multidisciplinary teams and extensive collaborations; modern imaging modalities usually reserved for peacetime medical practice were frequently used. The function of the hospital teams during the war was efficient and smooth, based on the long-term actions taken to prepare for disasters and wartime conditions. Routine hospital services continued, although at 60% of normal occupancy. Financial losses incurred were primarily due to the decrease in revenue-generating activity. The two most important components of managing the hospital under these conditions are (1) the ability to arrive at prompt and meaningful decisions with respect to the organizational and medical hospital operations and (2) the leadership and management of the professional staff and teams.
Alberts, Mark J; Latchaw, Richard E; Jagoda, Andy; Wechsler, Lawrence R; Crocco, Todd; George, Mary G; Connolly, E S; Mancini, Barbara; Prudhomme, Stephen; Gress, Daryl; Jensen, Mary E; Bass, Robert; Ruff, Robert; Foell, Kathy; Armonda, Rocco A; Emr, Marian; Warren, Margo; Baranski, Jim; Walker, Michael D
2011-09-01
The formation and certification of Primary Stroke Centers has progressed rapidly since the Brain Attack Coalition's original recommendations in 2000. The purpose of this article is to revise and update our recommendations for Primary Stroke Centers to reflect the latest data and experience. We conducted a literature review using MEDLINE and PubMed from March 2000 to January 2011. The review focused on studies that were relevant for acute stroke diagnosis, treatment, and care. Original references as well as meta-analyses and other care guidelines were also reviewed and included if found to be valid and relevant. Levels of evidence were added to reflect current guideline development practices. Based on the literature review and experience at Primary Stroke Centers, the importance of some elements has been further strengthened, and several new areas have been added. These include (1) the importance of acute stroke teams; (2) the importance of Stroke Units with telemetry monitoring; (3) performance of brain imaging with MRI and diffusion-weighted sequences; (4) assessment of cerebral vasculature with MR angiography or CT angiography; (5) cardiac imaging; (6) early initiation of rehabilitation therapies; and (7) certification by an independent body, including a site visit and disease performance measures. Based on the evidence, several elements of Primary Stroke Centers are particularly important for improving the care of patients with an acute stroke. Additional elements focus on imaging of the brain, the cerebral vasculature, and the heart. These new elements may improve the care and outcomes for patients with stroke cared for at a Primary Stroke Center.
In Memoriam: Claude Klee, M.D. | Center for Cancer Research
Claude Klee, M.D., a true giant among the many great biochemists at the National Institutes of Health (NIH), died on Monday, April 3, after suffering a heart attack. She was 85 years old. Learn more...
2012-04-25
Title I of the James Zadroga 9/11 Health and Compensation Act of 2010 amended the Public Health Service Act (PHS Act) to establish the World Trade Center (WTC) Health Program. Sections 3311, 3312, and 3321 of Title XXXIII of the PHS Act require that the WTC Program Administrator develop regulations to implement portions of the WTC Health Program established within the Department of Health and Human Services (HHS). The WTC Health Program, which is administered by the Director of the National Institute for Occupational Safety and Health (NIOSH), within the Centers for Disease Control and Prevention (CDC), provides medical monitoring and treatment to eligible firefighters and related personnel, law enforcement officers, and rescue, recovery and cleanup workers who responded to the September 11, 2001, terrorist attacks in New York City, Shanksville, PA, and at the Pentagon, and to eligible survivors of the New York City attacks. This final rule establishes the processes by which the WTC Program Administrator may add a new condition to the list of WTC-related health conditions through rulemaking, including a process for considering petitions by interested parties to add a new condition.
Buffet induced structural/flight-control system interaction of the X-29A aircraft
NASA Technical Reports Server (NTRS)
Voracek, David F.; Clarke, Robert
1991-01-01
High angle-of-attack flight regime research is currently being conducted for modern fighter aircraft at the NASA Ames Research Center's Dryden Flight Research Facility. This flight regime provides enhanced maneuverability to fighter pilots in combat situations. Flight research data are being acquired to compare and validate advanced computational fluid dynamic solutions and wind-tunnel models. High angle-of-attack flight creates unique aerodynamic phenomena including wing rock and buffet on the airframe. These phenomena increase the level of excitation of the structural modes, especially on the vertical and horizontal stabilizers. With high gain digital flight-control systems, this structural response may result in an aeroservoelastic interaction. A structural interaction on the X-29A aircraft was observed during high angle-of-attack flight testing. The roll and yaw rate gyros sensed the aircraft's structural modes at 11, 13, and 16 Hz. The rate gyro output signals were then amplified through the flight-control laws and sent as commands to the flaperons and rudder. The flight data indicated that as the angle of attack increased, the amplitude of the buffet on the vertical stabilizer increased, which resulted in more excitation to the structural modes. The flight-control system sensors and command signals showed this increase in modal power at the structural frequencies up to a 30 degree angle-of-attack. Beyond a 30 degree angle-of-attack, the vertical stabilizer response, the feedback sensor amplitude, and control surface command signal amplitude remained relatively constant. Data are presented that show the increased modal power in the aircraft structural accelerometers, the feedback sensors, and the command signals as a function of angle of attack. This structural interaction is traced from the aerodynamic buffet to the flight-control surfaces.
[Developing touch through rugby].
Becas, Didier; Luksenberg, Marion; Denis, Sandrine
2013-01-01
Rugby subjects the body to a tough test. Attack, defence, contact, touching are all elements which form part of this physical activity. It is very structured and safe from a psychological perspective. Taking pleasure in the game, with its rules, helps patients to develop interpersonal and relationship skills.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Engel, David W.; Jarman, Kenneth D.; Xu, Zhijie
This report describes our initial research to quantify uncertainties in the identification and characterization of possible attack states in a network. As a result, we should be able to estimate the current state in which the network is operating, based on a wide variety of network data, and attach a defensible measure of confidence to these state estimates. The output of this research will be new uncertainty quantification (UQ) methods to help develop a process for model development and apply UQ to characterize attacks/adversaries, create an understanding of the degree to which methods scale to "big" data, and offer methodsmore » for addressing model approaches with regard to validation and accuracy.« less
Collusion-resistant multimedia fingerprinting: a unified framework
NASA Astrophysics Data System (ADS)
Wu, Min; Trappe, Wade; Wang, Z. Jane; Liu, K. J. Ray
2004-06-01
Digital fingerprints are unique labels inserted in different copies of the same content before distribution. Each digital fingerprint is assigned to an inteded recipient, and can be used to trace the culprits who use their content for unintended purposes. Attacks mounted by multiple users, known as collusion attacks, provide a cost-effective method for attenuating the identifying fingerprint from each coluder, thus collusion poses a reeal challenge to protect the digital media data and enforce usage policies. This paper examines a few major design methodologies for collusion-resistant fingerprinting of multimedia, and presents a unified framework that helps highlight the common issues and the uniqueness of different fingerprinting techniques.
Science & Technology Review January/February 2010
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bearinger, J P
2009-11-30
This month's issue has the following articles: (1) Innovative Materials Rise to the Radiation Challenge - Commentary by Bruce Warner; (2) The Hunt for Better Radiation Detection - New materials will help radiation detectors pick up weak signals and accurately identify illicit radioactive sources; (3) Time-Critical Technology Identifies Deadly Bloodborne Pathogens - A portable device can simultaneously distinguish up to five bloodborne pathogens in just minutes; (4) Defending Computer Networks against Attack - A Laboratory effort takes a new approach to detecting increasingly sophisticated cyber attacks; and (5) Imaging Cargo's Inner Secrets - Livermore-University of California collaborators are modeling amore » new radiographic technique for identifying nuclear materials concealed inside cargo containers.« less
2013-01-01
Background Episodic cluster headache (ECH) is a primary headache disorder that severely impairs patient’s quality of life. First-line therapy in the initiation of a prophylactic treatment is verapamil. Due to its delayed onset of efficacy and the necessary slow titration of dosage for tolerability reasons prednisone is frequently added by clinicians to the initial prophylactic treatment of a cluster episode. This treatment strategy is thought to effectively reduce the number and intensity of cluster attacks in the beginning of a cluster episode (before verapamil is effective). This study will assess the efficacy and safety of oral prednisone as an add-on therapy to verapamil and compare it to a monotherapy with verapamil in the initial prophylactic treatment of a cluster episode. Methods and design PredCH is a prospective, randomized, double-blind, placebo-controlled trial with parallel study arms. Eligible patients with episodic cluster headache will be randomized to a treatment intervention with prednisone or a placebo arm. The multi-center trial will be conducted in eight German headache clinics that specialize in the treatment of ECH. Discussion PredCH is designed to assess whether oral prednisone added to first-line agent verapamil helps reduce the number and intensity of cluster attacks in the beginning of a cluster episode as compared to monotherapy with verapamil. Trial registration German Clinical Trials Register DRKS00004716 PMID:23889923
Rubinstein, Zohar; Polakevitz, Yakov; Ben Gershon, Bella; Lubin, Gadi; Bar-Dayan, Yaron
2010-07-01
The treatment of anxiety and acute stress reaction (ASR) in civilian casualties exposed to continuous missile attacks during Lebanon War II is described in this study. Casualties were treated in community stress centers (CSC) erected ad-hoc, as a result of cooperation between the Mental Health Section of the Home Front Command of the Israel Defense Forces (IDF), the Mental Health Services of the Ministry of Health (MOH) and the Emergency and Disaster Management Division of the MOH. A total of 536 casualties were admitted to the centers. Eighteen were evacuated to the zone hospitals due to physical problems. The remaining casualties were released within 2-4 hours of intensive intervention according to the protocol. Symptoms of casualties ranged from anxiety (and ASR)--90%; fear (mainly agoraphobia)--7%; adaptation--2%; sleep disturbances--1%. Mental health intervention included counseling talk--80%; ventilation--9%; relaxation--3%; non-verbaL intervention--3%; fulfillment of basic needs--1% and evacuation to hospitals--3%. We discovered that anxiety and ASR were the most prevalent syndromes among those casualties as a result of the missile attacks on the civil population. The CSCs succeeded in providing adequate response and treatment for the majority of the casualties, thus putting off the need to evacuate those casualties to the ERs. Thereby, evacuation resources were saved and the ER load was reduced. The authors recommend that preparedness of the population under missile attacks, as well as other disaster scenarios, which resulted in a high rate of mental casualties, will be focused in the activation of CSCs in the format which has been described in this article.
Mann, Mana; Li, Jiehui; Farfel, Mark R; Maslow, Carey B; Osahan, Sukhminder; Stellman, Steven D
2014-01-01
Behavioral problems and psychopathologies were reported in children exposed to the World Trade Center (WTC) attacks in New York City within 2–3 y post-disaster. Little is known of subsequent 9/11 related behavioral and emotional problems. We assessed risk factors for behavioral difficulties and probable posttraumatic stress disorder (PTSD) in 489 adolescent enrollees ages 11–18 y of age in the World Trade Center Health Registry cohort using the Strengths and Difficulties Questionnaire (SDQ) and DISC Predictive Scales (DPS), respectively, as reported by the adolescents. Associations between parental PTSD and adolescent PTSD and behavioral problems were studied in a subset of 166 adolescent-parent pairs in which the parent was also a Registry enrollee. Nearly one-fifth (17.4%) of the adolescents, all of whom were 5–12 y old at the time of the attacks, scored in the abnormal (5.7%) or borderline (11.7%) range of total SDQ. Problems were more frequent in minority, low-income, and single-parent adolescents. Abnormal and borderline SDQ scores were significantly associated with direct WTC exposures and with WTC-related injury or death of a family member. Adolescent PTSD was significantly associated with WTC exposure and with fear of one's own injury or death, and with PTSD in the parent (OR = 5.6; 95% CI 1.1–28.4). This adolescent population should be monitored for persistence or worsening of these problems. Co-occurrence of parent and child mental health symptoms following a disaster may have implications for healthcare practitioners and for disaster response planners. PMID:28229007
Alper, Howard E; Yu, Shengchao; Stellman, Steven D; Brackbill, Robert M
2017-12-01
The World Trade Center attack of September 11, 2001 in New York City (9/11) exposed thousands of people to intense concentrations of hazardous materials that have resulted in reports of increased levels of asthma, heart disease, diabetes, and other chronic diseases along with psychological illnesses such as post-traumatic stress disorder (PTSD). Few studies have discriminated between health consequences of immediate (short-term or acute) intense exposures versus chronic residential or workplace exposures. We used proportional hazards methods to determine adjusted hazard ratios (AHRs) for associations between several components of acute exposures (e.g., injury, immersion in the dust cloud) and four chronic disease outcomes: asthma, other non-neoplastic lung diseases, cardiovascular disease, and diabetes, in 8701 persons free of those conditions prior to exposure and who were physically present during or immediately after the World Trade Center attacks. Participants were followed prospectively up to 11 years post-9/11. Heart disease exhibited a dose-response association with sustaining injury (1 injury type: AHR =2.0, 95% CI (Confidence Interval) 1.1-3.6; 2 injury types: AHR = 3.1, 95% CI 1.2-7.9; 3 or more injury types: AHR = 6.8, 95% CI 2.0-22.6), while asthma and other lung diseases were both significantly associated with dust cloud exposure (AHR = 1.3, 95% CI 1.0-1.6). Diabetes was not associated with any of the predictors assessed in this study. In this study we demonstrated that the acute exposures of injury and dust cloud that were sustained on 9/11/2001 had significant associations with later heart and respiratory diseases. Continued monitoring of 9/11 exposed persons' health by medical providers is warranted for the foreseeable future.
Attacks, applications, and evaluation of known watermarking algorithms with Checkmark
NASA Astrophysics Data System (ADS)
Meerwald, Peter; Pereira, Shelby
2002-04-01
The Checkmark benchmarking tool was introduced to provide a framework for application-oriented evaluation of watermarking schemes. In this article we introduce new attacks and applications into the existing Checkmark framework. In addition to describing new attacks and applications, we also compare the performance of some well-known watermarking algorithms (proposed by Bruyndonckx,Cox, Fridrich, Dugad, Kim, Wang, Xia, Xie, Zhu and Pereira) with respect to the Checkmark benchmark. In particular, we consider the non-geometric application which contains tests that do not change the geometry of image. This attack constraint is artificial, but yet important for research purposes since a number of algorithms may be interesting, but would score poorly with respect to specific applications simply because geometric compensation has not been incorporated. We note, however, that with the help of image registration, even research algorithms that do not have counter-measures against geometric distortion -- such as a template or reference watermark -- can be evaluated. In the first version of the Checkmark benchmarking program, application-oriented evaluation was introduced, along with many new attacks not already considered in the literature. A second goal of this paper is to introduce new attacks and new applications into the Checkmark framework. In particular, we introduce the following new applications: video frame watermarking, medical imaging and watermarking of logos. Video frame watermarking includes low compression attacks and distortions which warp the edges of the video as well as general projective transformations which may result from someone filming the screen at a cinema. With respect to medical imaging, only small distortions are considered and furthermore it is essential that no distortions are present at embedding. Finally for logos, we consider images of small sizes and particularly compression, scaling, aspect ratio and other small distortions. The challenge of watermarking logos is essentially that of watermarking a small and typically simple image. With respect to new attacks, we consider: subsampling followed by interpolation, dithering and thresholding which both yield a binary image.
Alternative Fuels Data Center: Clean Cities Helps National Parks Model
Sustainable Transportation Clean Cities Helps National Parks Model Sustainable Transportation to someone by E-mail Share Alternative Fuels Data Center: Clean Cities Helps National Parks Model Sustainable Transportation on Facebook Tweet about Alternative Fuels Data Center: Clean Cities Helps National
Toyoda, Hiroyuki; Mori, Koji
2017-01-01
Workers who respond to large-scale disasters can be exposed to health hazards that do not exist in routine work. It is assumed that learning from past cases is effective for preparing for and responding to such problems, but published information is still insufficient. Accordingly, we conducted a literature review about the health issues and occupational health activities at the World Trade Center (WTC) terrorist attack and at the Fukushima Nuclear Power Plant accident to investigate how occupational health activities during disasters should be conducted. Seven studies about the WTC attack were extracted and categorized into the following topics: "in relation to emergency systems including occupational health management"; "in relation to improvement and prevention of health effects and occupational hygiene"; and "in relation to care systems aimed at mitigating health effects." Studies about the Fukushima Nuclear Power Plant accident have been used in a previous review. We conclude that, to prevent health effects in workers who respond to large-scale disasters, it is necessary to incorporate occupational health regulations into the national response plan, and to develop practical support functions that enable support to continue for an extended period, training systems for workers with opportunities to report accidents, and care systems to mitigate the health effects.
NASA Technical Reports Server (NTRS)
Kushner, Laura K.; Drain, Bethany A.; Schairer, Edward T.; Heineck, James T.; Bell, James H.
2017-01-01
Both AoA and MDM measurements can be made using an optical system that relies on photogrammetry. Optical measurements are being requested by customers in wind tunnels with increasing frequency due to their non-intrusive nature and recent hardware and software advances that allow measurements to become near real time. The NASA Ames Research Center Unitary Plan Wind Tunnel is currently developing a system based on photogrammetry to measure model deformation and model angle of attack. This paper describes the new system, its development, its use on recent tests and plans to further develop the system.
Zakerolhosseini, Ali; Sokouti, Massoud; Pezeshkian, Massoud
2013-01-01
Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner.
NASA Technical Reports Server (NTRS)
Reuter, William H.; Buning, Pieter G.; Hobson, Garth V.
1993-01-01
An effective control canard design to provide enhanced controllability throughout the flight regime is described which uses a 3D, Navier-Stokes computational solution. The use of canard by the Space Shuttle Orbiter in both hypersonic and subsonic flight regimes can enhance its usefullness by expanding its payload carrying capability and improving its static stability. The canard produces an additional nose-up pitching moment to relax center-of-gravity constraint and alleviates the need for large, lift-destroying elevon deflections required to maintain the high angles of attack for effective hypersonic flight.
Crippen, David
2001-01-01
On 7 December 1988, a severe earthquake hit in Armenia, a former republic of the Soviet Union (USSR); on 11 September 2001, a manmade attack of similar impact hit New York City. These events share similar implications for the role of the uninjured survivor. With basic training, the uninjured survivors could save lives without tools or resuscitation equipment. This article makes the case for teaching life-supporting first aid to the public in the hope that one day, should another such incident occur, they would be able to preserve injured victims until formal rescue occurs. PMID:11737915
Zakerolhosseini, Ali; Sokouti, Massoud; Pezeshkian, Massoud
2013-01-01
Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner. PMID:24252988
Crisis Management Research Summaries
ERIC Educational Resources Information Center
Brock, Stephen E., Ed.; Zhe, Elizabeth; Torem, Chris; Comeaux, Natashia; Dempsey, Allison
2010-01-01
This article presents a summary of recent crisis management publications. The first research report summarized, "Predictors of PTSD," was a study of predictor variables for responses to the World Trade Center attack. The second paper, "Effective Mental Health Response to Catastrophic Events," looked at effective responses following Hurricane…
PHYSICAL CHARACTERISTICS AND HEALTH EFFECTS OF AEROSOLS FROM COLLAPSED BUILDINGS
Airborne pollutants can rise to extreme levels when large buildings fall down. The terrorist attack on New York's World Trade Center (WTC) towers caused the release of an enormous quantity of pulverized building materials and combustion products into the local environment. Partic...
THE ESTABLISHMENT OF LABORATORY GUIDELINES FOR ANALYSIS OF BIOTERRORISM SAMPLES
After the attack on the World Trade Center on September 11, 2002, and the subsequent deaths associated with Bacillus anthracis spore contaminated mail, a worldwide need was apparent for increased laboratory capacity to safely analyze bioterrorism samples. The U.S. Department of ...
Managing pedestrians during evacuations of metropolitan areas.
DOT National Transportation Integrated Search
2007-03-01
The September 11(or 9/11), 2001, attacks on the high-profile workplaces of the World Trade Center (WTC) in New York City and the Pentagon in : the Washington, D.C. area, made real the impact of an unexpected, or no-notice, event in a metropolit...
Memorial Image Taken on Mars on Sept. 11, 2011
2011-09-12
This view from NASA rover Opportunity, of an American flag on metal recovered from the site of the World Trade Center towers shortly after their destruction, was taken on Mars on Sept. 11, 2011, the 10th anniversary of the attacks on the towers.
Ballistic Range Testing of the Mars Exploration Rover Entry Capsule
NASA Technical Reports Server (NTRS)
Schoenenberger, Mark; Hathaway, Wayne; Yates, Leslie; Desai, Prasun
2005-01-01
Results from a 25 shot ballistic range test of the Mars Exploration Rover (MER) aeroshell are presented. The supersonic pitch damping properties of the MER capsule were characterized between Mach = 1.5 and Mach = 3.5 and total angles-of-attack from 0 degrees to greater than 25 degrees. Three capsule center-of-gravity positions were tested across this range of conditions, 0.27, 0.30 and 0.33 body diameters aft of the nose. Parameter identification results show that the capsule is dynamically unstable at low angles-of-attack across the Mach numbers tested, with instability increasing with lower speeds. This dynamic instability was seen to increase with aft center-of-gravity movement. The MER outer mold line was very similar to the successful Mars Pathfinder capsule with only minor modifications. Pathfinder relied on Viking forced oscillation data for preflight predictions. The pitch damping data calculated from this test program are shown to more accurately reproduce the measured Path finder flight data.
Kendra, James M; Wachtendorf, Tricia
2003-03-01
In this paper we examine the reconstitution of the Emergency Operations Centre (EOC) after its destruction in the World Trade Center attack, using that event to highlight several features of resilience. The paper summarises basic EOC functions, and then presents conceptions of resilience as understood from several disciplinary perspectives, noting that work in these fields has sought to understand how a natural or social system that experiences disturbance sustains its functional processes. We observe that, although the physical EOC facility was destroyed, the organisation that had been established to manage crises in New York City continued, enabling a response that drew on the resources of New York City and neighbouring communities, states and the federal government. Availability of resources--which substituted for redundancy of personnel, equipment and space--pre-existing relationships that eased communication challenges as the emergency developed and the continuation of organisational patterns of response integration and role assignments were among the factors that contributed to resilience following the attack.
Cancellation control law for lateral-directional dynamics of a supermaneuverable aircraft
NASA Technical Reports Server (NTRS)
Snell, Antony
1993-01-01
Cancellation control laws are designed which reduce the high levels of lateral acceleration encountered during aggressive rolling maneuvers executed at high angle of attack. Two independent problem are examined. One is to reduce lateral acceleration at the mass center, while the other focuses on lateral acceleration at the pilot's station, located 7.0 m forward of the mass center. Both of these problems are challenging and somewhat different in their limitations. In each case the design is based on a linearization of the lateral-directional dynamics about a high angle of attack condition. The controllers incorporate dynamic inversion inner loops to provide control of stability-axis roll- and yaw-rates and then employ cancellation filters in both feed-forward and feed-back signal paths. The relative simplicity of the control laws should allow nonlinear generalizations to be devised. Although it is shown that lateral acceleration can be reduced substantially by such control laws, this is at the cost of slowed roll response, poor dutch-roll damping or a combination of the two.
NASA Technical Reports Server (NTRS)
Stough, H. Paul, III; Patton, James M., Jr.; Sliwa, Steven M.
1987-01-01
Flight tests were performed to investigate the stall, spin, and recovery characteristics of a low-wing, single-engine, light airplane with four interchangeable tail configurations. The four tail configurations were evaluated for effects of varying mass distribution, center-of-gravity position, and control inputs. The airplane tended to roll-off at the stall. Variations in tail configuration produced spins ranging from 40 deg to 60 deg angle of attack and turn rates of about 145 to 208 deg/sec. Some unrecoverable flat spins were encountered which required use of the airplane spin chute for recovery. For recoverable spins, antispin rudder followed by forward wheel with ailerons centered provided the quickest spin recovery. The moderate spin modes agreed very well with those predicted from spin-tunnel model tests, however, the flat spin was at a lower angle of attack and a slower rotation rate than indicated by the model tests.
CCR scientists tease out mechanisms of immune cell communication | Center for Cancer Research
Researchers from the Cancer and Inflammation Program at the Center for Cancer Research and the Ben-Gurion University of the Negev in Israel have discovered that the simple processes of molecular diffusion and absorption control the spread of cytokines through dense body tissues. The simple control mechanisms enable the immune response to tailor itself to the nature and severity of a pathogenic attack and to prevent dangerous autoimmune reactions. Read more...
The IDF: Tactical Success - Strategic Failure, SOD, the Second Intifada and Beyond
2011-05-19
the time periods in between. Additionally, Robert St. John’s biography Ben Gurion presented an interesting and useful account of one of Israel’s...Schiff, A History of the Israeli Army, 2. 9 Ibid., 4. 10 Robert St. John, Ben Gurion: The Biography of an Extraordinary Man (New York: Doubleday...Jewish settlements and Jews in Palestine’s population centers. The 1929 Arab Revolt centered on Jerusalem and consisted of Arab attacks against
Bargali, Harendra; Gore, Kedar
2017-01-01
Sloth bears (Melursus ursinus) caused the highest number of human deaths between 2001 and 2015 and ranked second compared to other wild animals in causing human casualties in the Kanha-Pench corridor area. We studied the patterns of sloth bear attacks in the region to understand the reasons for conflict. We interviewed 166 victims of sloth bear attacks which occurred between 2004 and 2016 and found that most attacks occurred in forests (81%), with the greatest number of those (42%) occurring during the collection of Non-Timber Forest Produce (NTFP), 15% during the collection of fuelwood and 13% during grazing of livestock. The remainder took place at forest edges or in agricultural fields (19%), most occurring when person(s) were working in fields (7%), defecating (5%), or engaged in construction work (3%). Most victims were between the ages of 31 to 50 (57%) and most (54%) were members of the Gond tribe. The majority of attacks occurred in summer (40%) followed by monsoon (35%) and winter (25%). Forty-four percent of victims were rescued by people, while 43% of the time bears retreated by themselves. In 60% of attacks, a single bear was involved, whereas 25% involved adult females with dependent cubs and the remainder (15%) of the cases involved a pair of bears. We discuss the compensation program for attack victims as well as other governmental programs which can help reduce conflict. Finally, we recommend short-term mitigation measures for forest-dependent communities. PMID:28448565
Dhamorikar, Aniruddha H; Mehta, Prakash; Bargali, Harendra; Gore, Kedar
2017-01-01
Sloth bears (Melursus ursinus) caused the highest number of human deaths between 2001 and 2015 and ranked second compared to other wild animals in causing human casualties in the Kanha-Pench corridor area. We studied the patterns of sloth bear attacks in the region to understand the reasons for conflict. We interviewed 166 victims of sloth bear attacks which occurred between 2004 and 2016 and found that most attacks occurred in forests (81%), with the greatest number of those (42%) occurring during the collection of Non-Timber Forest Produce (NTFP), 15% during the collection of fuelwood and 13% during grazing of livestock. The remainder took place at forest edges or in agricultural fields (19%), most occurring when person(s) were working in fields (7%), defecating (5%), or engaged in construction work (3%). Most victims were between the ages of 31 to 50 (57%) and most (54%) were members of the Gond tribe. The majority of attacks occurred in summer (40%) followed by monsoon (35%) and winter (25%). Forty-four percent of victims were rescued by people, while 43% of the time bears retreated by themselves. In 60% of attacks, a single bear was involved, whereas 25% involved adult females with dependent cubs and the remainder (15%) of the cases involved a pair of bears. We discuss the compensation program for attack victims as well as other governmental programs which can help reduce conflict. Finally, we recommend short-term mitigation measures for forest-dependent communities.
Ietsugu, Tetsuji; Sukigara, Masune; Furukawa, Toshiaki A
2007-12-01
The dichotomous diagnostic systems such as the Diagnostic and Statistical Manual of Mental Disorders (DSM) and International Classification of Diseases (ICD) lose much important information concerning what each symptom can offer. This study explored the characteristics and performances of DSM-IV and ICD-10 diagnostic criteria items for panic attack using modern item response theory (IRT). The National Comorbidity Survey used the Composite International Diagnostic Interview to assess 14 DSM-IV and ICD-10 panic attack diagnostic criteria items in the general population in the USA. The dimensionality and measurement properties of these items were evaluated using dichotomous factor analysis and the two-parameter IRT model. A total of 1213 respondents reported at least one subsyndromal or syndromal panic attack in their lifetime. Factor analysis indicated that all items constitute a unidimensional construct. The two-parameter IRT model produced meaningful and interpretable results. Among items with high discrimination parameters, the difficulty parameter for "palpitation" was relatively low, while those for "choking," "fear of dying" and "paresthesia" were relatively high. Several items including "dry mouth" and "fear of losing control" had low discrimination parameters. The item characteristics of diagnostic criteria among help-seeking clinical populations may be different from those that we observed in the general population and deserve further examination. "Paresthesia," "choking" and "fear of dying" can be thought to be good indicators of severe panic attacks, while "palpitation" can discriminate well between cases and non-cases at low level of panic attack severity. Items such as "dry mouth" would contribute less to the discrimination.
ICS logging solution for network-based attacks using Gumistix technology
NASA Astrophysics Data System (ADS)
Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan
2013-05-01
Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.
Simple mathematical law benchmarks human confrontations
Johnson, Neil F.; Medina, Pablo; Zhao, Guannan; Messinger, Daniel S.; Horgan, John; Gill, Paul; Bohorquez, Juan Camilo; Mattson, Whitney; Gangi, Devon; Qi, Hong; Manrique, Pedro; Velasquez, Nicolas; Morgenstern, Ana; Restrepo, Elvira; Johnson, Nicholas; Spagat, Michael; Zarama, Roberto
2013-01-01
Many high-profile societal problems involve an individual or group repeatedly attacking another – from child-parent disputes, sexual violence against women, civil unrest, violent conflicts and acts of terror, to current cyber-attacks on national infrastructure and ultrafast cyber-trades attacking stockholders. There is an urgent need to quantify the likely severity and timing of such future acts, shed light on likely perpetrators, and identify intervention strategies. Here we present a combined analysis of multiple datasets across all these domains which account for >100,000 events, and show that a simple mathematical law can benchmark them all. We derive this benchmark and interpret it, using a minimal mechanistic model grounded by state-of-the-art fieldwork. Our findings provide quantitative predictions concerning future attacks; a tool to help detect common perpetrators and abnormal behaviors; insight into the trajectory of a ‘lone wolf'; identification of a critical threshold for spreading a message or idea among perpetrators; an intervention strategy to erode the most lethal clusters; and more broadly, a quantitative starting point for cross-disciplinary theorizing about human aggression at the individual and group level, in both real and online worlds. PMID:24322528
Plant Responses to Pathogen Attack: Small RNAs in Focus.
Islam, Waqar; Noman, Ali; Qasim, Muhammad; Wang, Liande
2018-02-08
Small RNAs (sRNA) are a significant group of gene expression regulators for multiple biological processes in eukaryotes. In plants, many sRNA silencing pathways produce extensive array of sRNAs with specialized roles. The evidence on record advocates for the functions of sRNAs during plant microbe interactions. Host sRNAs are reckoned as mandatory elements of plant defense. sRNAs involved in plant defense processes via different pathways include both short interfering RNA (siRNA) and microRNA (miRNA) that actively regulate immunity in response to pathogenic attack via tackling pathogen-associated molecular patterns (PAMPs) and other effectors. In response to pathogen attack, plants protect themselves with the help of sRNA-dependent immune systems. That sRNA-mediated plant defense responses play a role during infections is an established fact. However, the regulations of several sRNAs still need extensive research. In this review, we discussed the topical advancements and findings relevant to pathogen attack and plant defense mediated by sRNAs. We attempted to point out diverse sRNAs as key defenders in plant systems. It is hoped that sRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases.
Tseng, Hui-Yun; Lin, Chung-Ping; Hsu, Jung-Ya; Pike, David A.; Huang, Wen-San
2014-01-01
Conspicuous colouration can evolve as a primary defence mechanism that advertises unprofitability and discourages predatory attacks. Geographic overlap is a primary determinant of whether individual predators encounter, and thus learn to avoid, such aposematic prey. We experimentally tested whether the conspicuous colouration displayed by Old World pachyrhynchid weevils (Pachyrhynchus tobafolius and Kashotonus multipunctatus) deters predation by visual predators (Swinhoe’s tree lizard; Agamidae, Japalura swinhonis). During staged encounters, sympatric lizards attacked weevils without conspicuous patterns at higher rates than weevils with intact conspicuous patterns, whereas allopatric lizards attacked weevils with intact patterns at higher rates than sympatric lizards. Sympatric lizards also attacked masked weevils at lower rates, suggesting that other attributes of the weevils (size/shape/smell) also facilitate recognition. Allopatric lizards rapidly learned to avoid weevils after only a single encounter, and maintained aversive behaviours for more than three weeks. The imperfect ability of visual predators to recognize potential prey as unpalatable, both in the presence and absence of the aposematic signal, may help explain how diverse forms of mimicry exploit the predator’s visual system to deter predation. PMID:24614681
Estimating the attack rate of pregnancy-associated listeriosis during a large outbreak.
Imanishi, Maho; Routh, Janell A; Klaber, Marigny; Gu, Weidong; Vanselow, Michelle S; Jackson, Kelly A; Sullivan-Chang, Loretta; Heinrichs, Gretchen; Jain, Neena; Albanese, Bernadette; Callaghan, William M; Mahon, Barbara E; Silk, Benjamin J
2015-01-01
In 2011, a multistate outbreak of listeriosis linked to contaminated cantaloupes raised concerns that many pregnant women might have been exposed to Listeria monocytogenes. Listeriosis during pregnancy can cause fetal death, premature delivery, and neonatal sepsis and meningitis. Little information is available to guide healthcare providers who care for asymptomatic pregnant women with suspected L. monocytogenes exposure. We tracked pregnancy-associated listeriosis cases using reportable diseases surveillance and enhanced surveillance for fetal death using vital records and inpatient fetal deaths data in Colorado. We surveyed 1,060 pregnant women about symptoms and exposures. We developed three methods to estimate how many pregnant women in Colorado ate the implicated cantaloupes, and we calculated attack rates. One laboratory-confirmed case of listeriosis was associated with pregnancy. The fetal death rate did not increase significantly compared to preoutbreak periods. Approximately 6,500-12,000 pregnant women in Colorado might have eaten the contaminated cantaloupes, an attack rate of ~1 per 10,000 exposed pregnant women. Despite many exposures, the risk of pregnancy-associated listeriosis was low. Our methods for estimating attack rates may help during future outbreaks and product recalls. Our findings offer relevant considerations for management of asymptomatic pregnant women with possible L. monocytogenes exposure.
Protecting ICS Systems Within the Energy Sector from Cyber Attacks
NASA Astrophysics Data System (ADS)
Barnes, Shaquille
Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.
Exploding head syndrome: six new cases and review of the literature.
Frese, Achim; Summ, Oliver; Evers, Stefan
2014-09-01
Exploding head syndrome (EHS) is characterized by attacks of a sudden noise or explosive feeling experienced in the head occurring during the transition from wake to sleep or from sleep to wake. We present six new cases extending the clinical experience with the syndrome. We also reviewed all available cases from the scientific literature and evaluated the typical features of EHS. The female to male ratio is 1.5 to 1. The median age at onset is 54. In average, one attack per day to one attack per week occurs. Some patients suffer from several attacks per night. In about half of all patients, a chronic time course can be observed but episodic or sporadic occurrence is also common. The most frequent accompanying symptoms beside the noise are fear and flashes of light. Polysomnographic studies do not reveal any specific sleep pattern associated with EHS. Tricyclic antidepressants are helpful in some patients. However, most patients do not need treatment because of the benign nature of the syndrome. EHS is a well-defined disease entity with a benign nature. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.
Plant Responses to Pathogen Attack: Small RNAs in Focus
2018-01-01
Small RNAs (sRNA) are a significant group of gene expression regulators for multiple biological processes in eukaryotes. In plants, many sRNA silencing pathways produce extensive array of sRNAs with specialized roles. The evidence on record advocates for the functions of sRNAs during plant microbe interactions. Host sRNAs are reckoned as mandatory elements of plant defense. sRNAs involved in plant defense processes via different pathways include both short interfering RNA (siRNA) and microRNA (miRNA) that actively regulate immunity in response to pathogenic attack via tackling pathogen-associated molecular patterns (PAMPs) and other effectors. In response to pathogen attack, plants protect themselves with the help of sRNA-dependent immune systems. That sRNA-mediated plant defense responses play a role during infections is an established fact. However, the regulations of several sRNAs still need extensive research. In this review, we discussed the topical advancements and findings relevant to pathogen attack and plant defense mediated by sRNAs. We attempted to point out diverse sRNAs as key defenders in plant systems. It is hoped that sRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases. PMID:29419801
Letting the story unfold: a case study of client-centered therapy for childhood traumatic grief.
Goodman, Robin F; Morgan, Alison V; Juriga, Sandra; Brown, Elissa J
2004-01-01
There has been increasing interest in the newly identified condition of childhood traumatic grief (CTG) since the 2001 attack on the World Trade Center. The case presented here is one of an adolescent girl who was diagnosed with CTG following the death of her father, a firefighter killed in the line of duty on September 11, 2001. Literature on CTG, its treatment, and adolescent development will be discussed. The application of client-centered treatment to CTG will be highlighted by the case description and diagnostic findings prior to, during, and following treatment.
A big alligator snacks on a smaller alligator
NASA Technical Reports Server (NTRS)
1998-01-01
A large alligator attacks and eats a smaller one in a natural display of cannibalism. Although this event has been observed infrequently by Kennedy Space Center's staff photographers, it is common feeding behavior among the wild alligator population on the space center. Alligators are carnivorous and will eat any living thing that crosses their paths and is small enough for them to kill. For this reason, it is dangerous to feed wild alligators, and in Florida, it is also illegal. Kennedy Space Center is located on the Merritt Island National Wildlife Refuge which is operated by the U.S. Fish and Wildlife Service.
NASA Technical Reports Server (NTRS)
Richwine, David M.; Fisher, David F.
1992-01-01
Flow-field measurements on the leading-edge extension (LEX) of the F-18 High Alpha Research Vehicle (HARV) were obtained using a rotating rake with 16 hemispherical-tipped five-hole probes. Detailed pressure, velocity, and flow direction data were obtained through the LEX vortex core. Data were gathered during 1-g quasi-stabilized flight conditions at angles of attack alpha from 10 degrees to 52 degrees and at Reynolds numbers based on mean aerodynamic cord up to 16 x 10(exp 6). Normalized dynamic pressures and crossflow velocities clearly showed the primary vortex above the LEX and formation of a secondary vortex at higher angles of attack. The vortex was characterized by a ring of high dynamic pressure surrounding a region of low dynamic pressure at the vortex core center. The vortex core, subcore diameter, and vertical location of the core above the LEX increased with angle of attack. Minimum values for static pressure were obtained in the vortex subcore and decreased nearly linearly with increasing angle of attack until vortex breakdown. Rake-measured static pressures were consistent with previously documented surface pressures and showed good agreement with flow visualization flight test results. Comparison of the LEX vortex flight test data to computational solutions at alpha approximately equals 19 degrees and 30 degrees showed fair correlation.
On cognitive debiasing and the judgment of suicide-attackers.
Bou Khalil, R; Richa, S
2018-03-23
Suicide-attacks are possibly increasing in frequency all over the world. To date, these attacks are not considered as a manifestation of a particular mental illness. However, the process of radicalization of suicide-attackers has to interest the field of mental health. One plausible explanation for the radicalization of individuals is the use of biased cognitive schemes by the indoctrinator. Among these cognitive schemes could figure the causal attribution bias in which the subject cannot distinguish in front of two factors that operate simultaneously, the share of each factor in achieving a certain goal. Another cognitive bias would be the confirmation bias during which the subject would tend to adhere to ideas from his/her own thinking or the thinking of subjects who share some cultural values with him/her and refute any other ideas. Finally, the bias of polarization or splitting could also be incriminated. Through this bias, the subject would either be proud of being a member of a cultural group or ashamed when he/she feels that this group is being attacked and that he/she is unable to rescue it. Approaches to increase the awareness of individuals to the adverse effects of these biased cognitive schemes may theoretically reduce the risk of committing suicide-attacks. However, despite numerous attempts of "deradicalization" involving technological means of communication as well as social "reintegration" centers, all approaches aiming at raising awareness of cognitive biases need to be studied in a scientific manner before they become widespread. Copyright © 2018 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.
Blanchard, Edward B; Kuhn, Eric; Rowell, Dianna L; Hickling, Edward J; Wittrock, David; Rogers, Rebecca L; Johnson, Michelle R; Steckler, Debra C
2004-02-01
From mid-October 2001 through the end of November 2001, we collected fairly large sets of questionnaires from undergraduates at three public universities (Albany, NY, n = 507, Augusta, GA, n = 336, Fargo, ND, n = 526 ) to assess rate of acute stress disorder (ASD) and level of ASD symptoms following the September 11th attacks, rate of current posttraumatic stress disorder (PTSD) and level of PTSD symptoms, and current level of depressive symptoms resulting from the September 11th attacks. We also gathered information on exposure to media coverage of the attacks, connectedness to the World Trade Center (WTC) and personnel there, and degree of engagement in reparative acts such as giving blood, attending vigils. We found higher levels of ASD, ASD symptoms, PTSD and PTSD symptoms as a function of geographical proximity to New York City (and within the Albany site, proximity of students' homes) and gender. Exposure (hours of TV watched) was a predictor in some instances as was connectedness to WTC victims. ASD symptoms were the strongest predictor of subsequent PTSD symptoms. Path models accounted for over 60% of the variance in PTSD symptoms.
Network traffic anomaly prediction using Artificial Neural Network
NASA Astrophysics Data System (ADS)
Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea
2017-03-01
As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.
LEACHING BOUNDARY MOVEMENT IN SOLIDIFIED/STABILIZED WASTE FORMS
Investigation of the leaching of cement-based waste forms in acetic acid solutions found that acids attacked the waste form from the surface toward the center. A sharp leaching boundary was identified in every leached sample, using pH color indica- tors. The movement of the leach...
Redefining Attack: Taking the Offensive Against Networks
2003-03-01
for his insight, inspiration, and thought provoking discussion that stretched the limits of our imaginations. The thesis all began with owls, mice ......order of battle for these elusive networks is hidden from view. There are few tanks to count, barracks and command centers to reconnoiter or industrial
Coordinate an Attack Using the Calculator
ERIC Educational Resources Information Center
Kranz, Sharie R.; Amato, Carlo A.; Freudenthal, Eric A.
2013-01-01
In this culture of instantaneous technology, students are familiar with immediate feedback. To maintain student engagement, it is vital for teachers to create similarly interactive experiences. Student-centered instruction is important in connecting students to key mathematical concepts. If the connection is not obvious, they may be unaware of…
T Cell Receptors that Recognize the Tyrosinase Tumor Antigen | NCI Technology Transfer Center | TTC
The National Cancer Institute, Surgery Branch, Tumor Immunology Section, is seeking statements of capability or interest from parties interested in collaborative research to further develop, evaluate, or commercialize T Cells Attacking Cancer: T Cell Receptors that Recognize the Tyrosinase Tumor Antigen
Terrorist Capabilities for Cyberattack: Overview and Policy Issues
2007-01-22
originated in the United States and in China (although some of the attacks apparently only traversed through networks in China, casting some doubt on the...detection. CRS-21 86 Louise Shelly , Organized Crime, Cybercrime and Terrorism, Computer Crime Research Center, September 27, 2004, [http://www.crime
... the risk of HIV drug resistance . ART can’t cure HIV, but HIV medicines help people with HIV live longer, healthier lives. ART also reduces the risk of HIV transmission (the spread of HIV to others). HIV attacks and destroys the CD4 cells of the immune system . CD4 cells are a ...
Verbenone flakes may help slow mountain pine beetle's spread
Nancy (featured scientist) Gillette
2009-01-01
According to "Aerially Applied Verbenone-Releasing Laminated Flakes Protect Pinus contorta Stands from Attack by Dendroctonus ponderosae (mountain pine beetle) in California and Idaho," a US Forest Serviceâfunded study appearing in the February issue of Forest Ecology and Management, not only has the "current...
Identifying the Key Weaknesses in Network Security at Colleges.
ERIC Educational Resources Information Center
Olsen, Florence
2000-01-01
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Association between stress at work and primary headache among nursing staff in Taiwan.
Lin, Kao-Chang; Huang, Chin-Chang; Wu, Chiou-Chuen
2007-04-01
Stress, one of the most commonly identified triggers for primary headache in the workplace, usually leads to inefficient work during attacks. Stress-related primary headaches in the nursing staff of hospitals have received little attention. To realize the association between stress and headache, and the means of coping with this kind of headache. A cross-sectional, hospital-based study using a semi-structured questionnaire was administered to 900 nursing staffers in a tertiary medical center in southern Taiwan. Thirty-two items, including basic information, headache- and stress-related questions, work satisfaction, and coping strategies were measured. Headache sufferers with either migraine or episodic tension headache (attacks <15 days per month) based on International Headache Society (IHS) criteria were enrolled for analysis. The Student's t-test, one-way analysis of variance (ANOVA), and chi-square test were used for statistical analysis. Three hundred eighty-six out of 779 responders (49.6%) had experienced primary headaches in the previous year, and 374 (48.1%) had had episodic-type headaches (<15 days/month). A careful neurological interview of the latter group revealed that 222 (28.5%) had migraine, 104 (13.4%) had tension headache, 37 (4.8%) had mixed migraine and tension headache, and 11 (1.4%) had other causes of headache. There were no demographic differences between the sufferers and nonsufferers, although a statistically significant difference was noted in self-reported sources of stress (individual P values ranged from .021 to < .001). Headache sufferers had more stress at work than non-headache sufferers (P < .001). The youngest and least experienced of the nursing staff, the unmarried, and those with a lower level of education had a higher level of stress. The methods used to deal with headaches were sleep, taking medicine, taking a rest, visiting the doctor, and seeking psychological help. Nurses commonly used acetaminophen (panadol--500 mg) to relieve their pain. These results indicate that stress at work is associated with primary headaches among nursing staff, and that nurses rarely seek help in the beginning. Therefore, nursing staff education aimed at ameliorating the stress and coping with the headaches, thus allowing the nurses to provide better patient care, may be warranted.
Predictors for attacks on people after deinstitutionalization.
Nøttestad, J Aa; Linaker, O M
2002-09-01
The deinstitutionalization movement is presently spreading in Europe, but studies evaluating the effects of deinstitutionalization on behaviour disturbances among people with intellectual disability (ID) are inconclusive. The prevalence of aggressive behaviour among people with ID is high in both institutions and in community. Aggression and attacks on people are a significant problem for people with ID in both institutions and society. In the present paper, the authors focus on individuals who started attacking people after deinstitutionalization. The authors studied individual and environmental characteristics before and after deinstitutionalization to look for individual and environmental predictors for the development of aggression with the hope that some could be possible intervention points for preventive action. In an institution for people with ID, all who did not attack people before deinstitutionalization were included. The individuals who started attacking others after deinstitutionalization (n = 22) were the study group (group A) and those who did not (n = 42) comprised the control group (group B). The population was examined before and after deinstitutionalization. As far as possible the same methods were used at both occasions. The covariates included individual ones, such as mental health, behaviour disturbances and behaviour deficits, and environmental ones, such as caretaker education, caretaker:patient ratio, housing and leisure activities. Psychiatric disorders were identified in 1987 and 1995 with the Psychopathology Instrument for Mentally Retarded Adults (PIMRA), which was filled in by the caretakers. Group A showed significantly more self-injurious behaviour (SIB) than group B in 1987. The sum of behaviour disturbances shown in the past year, attacks on property, SIB and other disruptive behaviours were also significantly higher in group A than in group B. The soundness scores on the PIMRA for the people in group A were lower than for the people in group B. Group A contained significantly fewer people without behavioural problems in the past year. The authors could not find any differences on other individual characteristics such as aetiologies of ID and behaviour deficits in 1987. The caretakers' evaluations of the clients need for help, based on behaviour disturbances and mental health problems, were significantly higher in group A. The people in this study differed in age, gender and degree of ID from those in most other studies on ID and challenging behaviour. The individual predictors for starting to attack others after deinstitutionalization were SIB, a slight load of other behaviour problems and a low soundness score on the PIMRA. The only environmental predictor was the caretakers' evaluation of the subjects' need for help caused by behaviour problems and mental illness. The authors could not identify possible preventive intervention points, neither individual or environmental, and therefore, further studies are needed.
Beaton, Randal; Murphy, Shirley
2002-04-01
1. Both biological and chemical weapons (BCW) could potentially be used in future terrorist attacks on U.S. workplaces and communities. 2. Threats of BCW terrorism may lead to anxiety, adverse health effects, and the exacerbation of psychiatric symptoms and syndromes in workers and managers. 3. Actual BCW attacks will likely cause both acute and chronic mental disorders in a significant number of surviving victims who may also be employees or employers. 4. Occupational health nurses can help prevent or remediate maladaptive psychological responses by educating themselves and their work forces, assisting in a risk assessment of the workplace, understanding disaster planning, and assisting management in policy formulation and psychosocial triage.
Israel-Cohen, Yael; Kashy-Rosenbaum, Gabriela; Kaplan, Oren
2014-06-01
Previous research has demonstrated that positive emotions help build psychological resources and facilitate adaptation to stress, yet few studies have considered the possible negative effects of positive emotions on stress. This study examined the relationship between high arousal, positive and negative affect, and posttraumatic stress disorder (PTSD) symptoms among 503 Israeli adolescents following a period of escalated missile attacks on their city. Our findings revealed that not only negative affect, but also positive affect at very high levels exhibited 2 weeks following missile attacks were independently associated with PTSD symptoms 2½ months later (η(2) = .09, η(2) = .02, respectively). Although the literature recognizes the risk factor of negative affect on the development of PTSD, we suggest that also positive affect at high levels immediately after such experiences may be a case of emotion context insensitivity and thus a maladaptive response to trauma. Further research should examine the mechanisms associated with positive emotions and PTSD. Copyright © 2014 International Society for Traumatic Stress Studies.
Alternative Fuels Data Center: Camp Discovery Helps Kids Build an Electric
Dune Buggy Camp Discovery Helps Kids Build an Electric Dune Buggy to someone by E-mail Share Alternative Fuels Data Center: Camp Discovery Helps Kids Build an Electric Dune Buggy on Facebook Tweet about Alternative Fuels Data Center: Camp Discovery Helps Kids Build an Electric Dune Buggy on Twitter Bookmark
Alternative Fuels Data Center: Natural Gas School Buses Help Kansas City
Save Money Natural Gas School Buses Help Kansas City Save Money to someone by E-mail Share Alternative Fuels Data Center: Natural Gas School Buses Help Kansas City Save Money on Facebook Tweet about Alternative Fuels Data Center: Natural Gas School Buses Help Kansas City Save Money on Twitter Bookmark
Rep. Ros-Lehtinen, Ileana [R-FL-18
2009-06-17
Senate - 07/20/2009 Received in the Senate and referred to the Committee on Foreign Relations. (All Actions) Tracker: This bill has the status Agreed to in HouseHere are the steps for Status of Legislation:
Bereavement and Coping of South Asian Families Post 9/11
ERIC Educational Resources Information Center
Inman, Arpana G.; Yeh, Christine J.; Madan-Bahel, Anvita; Nath, Shivani
2007-01-01
Eleven first-generation South Asian family members who lost a relative in the World Trade Center attacks on September 11, 2001, were interviewed about their loss and their coping strategies. Data were analyzed using consensual qualitative research (CQR) methodology. Participant responses clearly delineated bereavement reactions and coping within a…
ENVIRONMENTAL RESEARCH IN RESPONSE TO 9/11 AND HOMELAND SECURITY
The terrorist attacks on September 11, 2001 resulted in a disaster unlike any other on U.S. soil. The collapse of the World Trade Center (WTC) towers and the underground fires that burned for months required the efforts of numerous Federal, State and local agencies as well as uni...
The Multi-Agent Tactical Sentry: Designing and Delivering Robots to the CF
2008-08-01
believed that there is no substitute for having the man in the loop during military operations. After the World Trade Center and Tokyo subway attacks...and vibration isolation for the more sensitive components. Additional space was left to account for possible future changes to the primary sensors
Numerical Investigations of the Benchmark Supercritical Wing in Transonic Flow
NASA Technical Reports Server (NTRS)
Chwalowski, Pawel; Heeg, Jennifer; Biedron, Robert T.
2017-01-01
This paper builds on the computational aeroelastic results published previously and generated in support of the second Aeroelastic Prediction Workshop for the NASA Benchmark Supercritical Wing (BSCW) configuration. The computational results are obtained using FUN3D, an unstructured grid Reynolds-Averaged Navier-Stokes solver developed at the NASA Langley Research Center. The analysis results show the effects of the temporal and spatial resolution, the coupling scheme between the flow and the structural solvers, and the initial excitation conditions on the numerical flutter onset. Depending on the free stream condition and the angle of attack, the above parameters do affect the flutter onset. Two conditions are analyzed: Mach 0.74 with angle of attack 0 and Mach 0.85 with angle of attack 5. The results are presented in the form of the damping values computed from the wing pitch angle response as a function of the dynamic pressure or in the form of dynamic pressure as a function of the Mach number.
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle
Park, Namje; Kang, Namhi
2015-01-01
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things” are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks. PMID:26712759
Natarajan, Deepa; Caramaschi, Doretta
2009-01-01
Violence has been observed in humans and animals alike, indicating its evolutionary/biological significance. However, violence in animals has often been confounded with functional forms of aggressive behavior. Currently, violence in animals is identified primarily as either a quantitative behavior (an escalated, pathological and abnormal form of aggression characterized primarily by short attack latencies, and prolonged and frequent harm-oriented conflict behaviors) or a qualitative one (characterized by attack bites aimed at vulnerable parts of the opponent's body and context independent attacks regardless of the environment or the sex and type of the opponent). Identification of an operational definition for violence thus not only helps in understanding its potential differences from adaptive forms of aggression but also in the selection of appropriate animal models for both. We address this issue theoretically by drawing parallels from research on aggression and appeasement in humans and other animals. We also provide empirical evidences for violence in mice selected for high aggression by comparing our findings with other currently available potentially violent rodent models. The following violence-specific features namely (1) Display of low levels of pre-escalatory/ritualistic behaviors. (2) Immediate and escalated offense durations with low withdrawal rates despite the opponent's submissive supine and crouching/defeat postures. (3) Context independent indiscriminate attacks aimed at familiar/unfamiliar females, anaesthetized males and opponents and in neutral environments. (4) Orientation of attack-bites toward vulnerable body parts of the opponent resulting in severe wounding. (5) Low prefrontal serotonin (5-HT) levels upon repeated aggression. (6) Low basal heart rates and hyporesponsive hypothalamus–pituitary–adrenocortical (HPA) axis were identified uniquely in the short attack latency (SAL) mice suggesting a qualitative difference between violence and adaptive aggression in animals. PMID:20407576
Natarajan, Deepa; Caramaschi, Doretta
2010-01-01
Violence has been observed in humans and animals alike, indicating its evolutionary/biological significance. However, violence in animals has often been confounded with functional forms of aggressive behavior. Currently, violence in animals is identified primarily as either a quantitative behavior (an escalated, pathological and abnormal form of aggression characterized primarily by short attack latencies, and prolonged and frequent harm-oriented conflict behaviors) or a qualitative one (characterized by attack bites aimed at vulnerable parts of the opponent's body and context independent attacks regardless of the environment or the sex and type of the opponent). Identification of an operational definition for violence thus not only helps in understanding its potential differences from adaptive forms of aggression but also in the selection of appropriate animal models for both. We address this issue theoretically by drawing parallels from research on aggression and appeasement in humans and other animals. We also provide empirical evidences for violence in mice selected for high aggression by comparing our findings with other currently available potentially violent rodent models. The following violence-specific features namely (1) Display of low levels of pre-escalatory/ritualistic behaviors. (2) Immediate and escalated offense durations with low withdrawal rates despite the opponent's submissive supine and crouching/defeat postures. (3) Context independent indiscriminate attacks aimed at familiar/unfamiliar females, anaesthetized males and opponents and in neutral environments. (4) Orientation of attack-bites toward vulnerable body parts of the opponent resulting in severe wounding. (5) Low prefrontal serotonin (5-HT) levels upon repeated aggression. (6) Low basal heart rates and hyporesponsive hypothalamus-pituitary-adrenocortical (HPA) axis were identified uniquely in the short attack latency (SAL) mice suggesting a qualitative difference between violence and adaptive aggression in animals.
Aggression and courtship in Drosophila: pheromonal communication and sex recognition.
Fernández, María Paz; Kravitz, Edward A
2013-11-01
Upon encountering a conspecific in the wild, males have to rapidly detect, integrate and process the most relevant signals to evoke an appropriate behavioral response. Courtship and aggression are the most important social behaviors in nature for procreation and survival: for males, making the right choice between the two depends on the ability to identify the sex of the other individual. In flies as in most species, males court females and attack other males. Although many sensory modalities are involved in sex recognition, chemosensory communication mediated by specific molecules that serve as pheromones plays a key role in helping males distinguish between courtship and aggression targets. The chemosensory signals used by flies include volatile and non-volatile compounds, detected by the olfactory and gustatory systems. Recently, several putative olfactory and gustatory receptors have been identified that play key roles in sex recognition, allowing investigators to begin to map the neuronal circuits that convey this sensory information to higher processing centers in the brain. Here, we describe how Drosophila melanogaster males use taste and smell to make correct behavioral choices.
NASA Astrophysics Data System (ADS)
Willems, Sebastian; Esser, Burkard; Gülhan, Ali
2015-12-01
A detailed knowledge of the fluid-structure interaction in hypersonic flows is important for the design of future space transportation systems. The thermal aspect of such an interaction was investigated with the help of a generic model in the arc-heated wind tunnel L3K at the German Aerospace Center in Cologne. Flat and curved panels of the fibre-reinforced ceramics C/C-SiC with and without anti-oxidation coating where used. Several configurations with and without back plane insulation were tested at 10° and 20° angle of attack. The panel heating was measured with an infrared camera, several thermocouples and pyrometers. The experimental results show the influence of the shape as well as of radiation cooling and radiation heating. The experiments also reveal the effect of additional heating due to recombination of atomic oxygen on the surface. At certain configurations a local temperature peak moved over the panel. This thermal wave is also influenced by the silicon carbide coating. The analysis is supported by coupled fluid and structure simulations.
Aggression and Courtship in Drosophila: Pheromonal Communication and Sex Recognition
Fernández, María Paz; Kravitz, Edward A.
2013-01-01
Upon encountering a conspecific in the wild, males have to rapidly detect, integrate and process the most relevant signals to evoke an appropriate behavioral response. Courtship and aggression are the most important social behaviors in nature for procreation and survival: for males, making the right choice between the two depends on the ability to identify the sex of the other individual. In flies as in most species, males court females and attack other males. Although many sensory modalities are involved in sex recognition, chemosensory communication mediated by specific molecules that serve as pheromones plays a key role in helping males distinguish between courtship and aggression targets. The chemosensory signals used by flies include volatile and non-volatile compounds, detected by the olfactory and gustatory systems. Recently, several putative olfactory and gustatory receptors have been identified that play key roles in sex recognition, allowing investigators to begin to map the neuronal circuits that convey this sensory information to higher processing centers in the brain. Here, we describe how Drosophila melanogaster males use taste and smell to make correct behavioral choices. PMID:24043358
NASA Technical Reports Server (NTRS)
Straub, F. K.; Johnston, R. A.
1987-01-01
A 27% dynamically scaled model of the YAH-64 Advanced Attack Helicopter main rotor and hub has been designed and fabricated. The model will be tested in the NASA Langley Research Center V/STOL wind tunnel using the General Rotor Model System (GRMS). This report documents the studies performed to ensure dynamic similarity of the model with its full scale parent. It also contains a preliminary aeroelastic and aeromechanical substantiation for the rotor installation in the wind tunnel. From the limited studies performed no aeroelastic stability or load problems are projected. To alleviate a projected ground resonance problem, a modification of the roll characteristics of the GRMS is recommended.
Temporal Cyber Attack Detection.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ingram, Joey Burton; Draelos, Timothy J.; Galiardi, Meghan
Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms requiremore » large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.« less
Sensor noise camera identification: countering counter-forensics
NASA Astrophysics Data System (ADS)
Goljan, Miroslav; Fridrich, Jessica; Chen, Mo
2010-01-01
In camera identification using sensor noise, the camera that took a given image can be determined with high certainty by establishing the presence of the camera's sensor fingerprint in the image. In this paper, we develop methods to reveal counter-forensic activities in which an attacker estimates the camera fingerprint from a set of images and pastes it onto an image from a different camera with the intent to introduce a false alarm and, in doing so, frame an innocent victim. We start by classifying different scenarios based on the sophistication of the attacker's activity and the means available to her and to the victim, who wishes to defend herself. The key observation is that at least some of the images that were used by the attacker to estimate the fake fingerprint will likely be available to the victim as well. We describe the socalled "triangle test" that helps the victim reveal attacker's malicious activity with high certainty under a wide range of conditions. This test is then extended to the case when none of the images that the attacker used to create the fake fingerprint are available to the victim but the victim has at least two forged images to analyze. We demonstrate the test's performance experimentally and investigate its limitations. The conclusion that can be made from this study is that planting a sensor fingerprint in an image without leaving a trace is significantly more difficult than previously thought.
Flow-separation patterns on symmetric forebodies
NASA Technical Reports Server (NTRS)
Keener, Earl R.
1986-01-01
Flow-visualization studies of ogival, parabolic, and conical forebodies were made in a comprehensive investigation of the various types of flow patterns. Schlieren, vapor-screen, oil-flow, and sublimation flow-visualization tests were conducted over an angle-of-attack range from 0 deg. to 88 deg., over a Reynolds-number range from 0.3X10(6) to 2.0X10(6) (based on base diameter), and over a Mach number range from 0.1 to 2. The principal effects of angle of attack, Reynolds number, and Mach number on the occurrence of vortices, the position of vortex shedding, the principal surface-flow-separation patterns, the magnitude of surface-flow angles, and the extent of laminar and turbulent flow for symmetric, asymmetric, and wake-like flow-separation regimes are presented. It was found that the two-dimensional cylinder analogy was helpful in a qualitative sense in analyzing both the surface-flow patterns and the external flow field. The oil-flow studies showed three types of primary separation patterns at the higher Reynolds numbers owing to the influence of boundary-layer transition. The effect of angle of attack and Reynolds number is to change the axial location of the onset and extent of the primary transitional and turbulent separation regions. Crossflow inflectional-instability vortices were observed on the windward surface at angles of attack from 5 deg. to 55 deg. Their effect is to promote early transition. At low angles of attack, near 10 deg., an unexpected laminar-separation bubble occurs over the forward half of the forebody. At high angles of attack, at which vortex asymmetry occurs, the results support the proposition that the principal cause of vortex asymmetry is the hydrodynamic instability of the inviscid flow field. On the other hand, boundary-layer asymmetries also occur, especially at transitional Reynolds numbers. The position of asymmetric vortex shedding moves forward with increasing angle of attack and with increasing Reynolds number, and moves rearward with increasing Mach number.
Navigating the storm: report and recommendations from the Atlantic Storm exercise.
Smith, Bradley T; Inglesby, Thomas V; Brimmer, Esther; Borio, Luciana; Franco, Crystal; Gronvall, Gigi Kwik; Kramer, Bradley; Maldin, Beth; Nuzzo, Jennifer B; Schuler, Ari; Stern, Scott; Henderson, Donald A; Larsen, Randall J; Hamilton, Daniel S; O'Toole, Tara
2005-01-01
Atlantic Storm was a tabletop exercise simulating a series of bioterrorism attacks on the transatlantic community. The exercise occurred on January 14, 2005, in Washington, DC, and was organized and convened by the Center for Biosecurity of UPMC, the Center for Transatlantic Relations of Johns Hopkins University, and the Transatlantic Biosecurity Network. Atlantic Storm portrayed a summit meeting of presidents, prime ministers, and other international leaders from both sides of the Atlantic Ocean in which they responded to a campaign of bioterrorist attacks in several countries. The summit principals, who were all current or former senior government leaders, were challenged to address issues such as attaining situational awareness in the wake of a bioattack, coping with scarcity of critical medical resources such as vaccine, deciding how to manage the movement of people across borders, and communicating with their publics. Atlantic Storm illustrated that much might be done in advance to minimize the illness and death, as well as the social, economic, and political disruption, that could be caused by an international epidemic, be it natural or the result of a bioterrorist attack. These lessons are especially timely given the growing concerns over the possibility of an avian influenza pandemic that would require an international response. However, international leaders cannot create the necessary response systems in the midst of a crisis. Medical, public health, and diplomatic response systems and critical medical resources (e.g., medicines and vaccines) must be in place before a bioattack occurs or a pandemic emerges.
NASA Technical Reports Server (NTRS)
Kim, Hyun D.; Frate, Franco C.
2001-01-01
A subscale aerodynamic model of the GTX air-breathing launch vehicle was tested at NASA Glenn Research Center's 10- by 10-Foot Supersonic Wind Tunnel from Mach 2.0 to 3.5 at various angles-of-attack. The objective of the test was to investigate the effect of angle-of-attack on inlet mass capture, inlet diverter effectiveness, and the flowfield at the cowl lip plane. The flow-through inlets were tested with and without boundary-layer diverters. Quantitative measurements such as inlet mass flow rates and pitot-pressure distributions in the cowl lip plane are presented. At a 3deg angle-of-attack, the flow rates for the top and side inlets were within 8 percent of the zero angle-of-attack value, and little distortion was evident at the cowl lip plane. Surface oil flow patterns showing the shock/boundary-layer interaction caused by the inlet spikes are shown. In addition to inlet data, vehicle forebody static pressure distributions, boundary-layer profiles, and temperature-sensitive paint images to evaluate the boundary-layer transition are presented. Three-dimensional parabolized Navier-Stokes computational fluid dynamics calculations of the forebody flowfield are presented and show good agreement with the experimental static pressure distributions and boundary-layer profiles. With the boundary-layer diverters installed, no adverse aerodynamic phenomena were found that would prevent the inlets from operating at the required angles-of-attack. We recommend that phase 2 of the test program be initiated, where inlet contraction ratio and diverter geometry variations will be tested.
A Critical Analysis of USAir's Image Repair Discourse.
ERIC Educational Resources Information Center
Benoit, William L.; Czerwinski, Anne
1997-01-01
Applies the theory of image restoration to a case study of USAir's response to media coverage of a 1994 crash. Argues that introducing such case studies in the classroom helps students to understand the basic tenets of persuasion in the highly charged context of repairing a corporate reputation after an attack. (SR)
Parenting after September 11, 2001.
ERIC Educational Resources Information Center
Peter, Val J.
Many mothers and fathers are parenting differently since the terrorist attacks of September 11, 2001. This booklet describes how parents are discovering new ways to strengthen and build upon their relationships with their children and provides advice to parents on how to help their children grow closer to them, to become caring and sharing people,…
How Safe Are You at Work? Occupational Health and Safety Issues for School Counsellors.
ERIC Educational Resources Information Center
Low, John A.
Schools are becoming increasingly violent places. This workshop presentation examines ways to improve counselor facilities and to enhance work safety. Client populations for school counselors have changed significantly in recent times as school administrators refer more welfare related problems for help. Although violent attacks on counselors may…
Student Task Force: An Experiment in Interdisciplinary Education.
ERIC Educational Resources Information Center
Weiner, Harry
During the first semester of the 1971-72 academic year, students at 7 universities located in urban areas across the U.S. participated in an interdisciplinary program that was designed to help the students develop problem-solving techniques. The particular problem that the students attacked was that of drug addiction. This problem incorporated the…
ERIC Educational Resources Information Center
O'Neal, Steven E.; Range, Lillian M.
1993-01-01
Undergraduates (n=141) read vignette about suicidal person with either Acquired Immune Deficiency Syndrome, depression, drug abuse, anxiety, or adjustment problems. Found that suicidal person who was human immunodeficiency virus-positive engendered significantly less helpful responses from students than did suicidal person who had panic attacks.…
ERIC Educational Resources Information Center
Hitch, Chris
2008-01-01
There are two ways to avoid time-crunch panic attacks: work smarter and delegate wisely. In this article, the author provides a list of some strategies and tactics he has used to help more than 500 school executives in North Carolina work smarter, delegate more effectively and become more effective instructional leaders. These strategies fall into…