NASA Astrophysics Data System (ADS)
Hu, Haibin
2017-05-01
Among numerous WEB security issues, SQL injection is the most notable and dangerous. In this study, characteristics and procedures of SQL injection are analyzed, and the method for detecting the SQL injection attack is illustrated. The defense resistance and remedy model of SQL injection attack is established from the perspective of non-intrusive SQL injection attack and defense. Moreover, the ability of resisting the SQL injection attack of the server has been comprehensively improved through the security strategies on operation system, IIS and database, etc.. Corresponding codes are realized. The method is well applied in the actual projects.
Combating Memory Corruption Attacks On Scada Devices
NASA Astrophysics Data System (ADS)
Bellettini, Carlo; Rrushi, Julian
Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.
Protecting Database Centric Web Services against SQL/XPath Injection Attacks
NASA Astrophysics Data System (ADS)
Laranjeiro, Nuno; Vieira, Marco; Madeira, Henrique
Web services represent a powerful interface for back-end database systems and are increasingly being used in business critical applications. However, field studies show that a large number of web services are deployed with security flaws (e.g., having SQL Injection vulnerabilities). Although several techniques for the identification of security vulnerabilities have been proposed, developing non-vulnerable web services is still a difficult task. In fact, security-related concerns are hard to apply as they involve adding complexity to already complex code. This paper proposes an approach to secure web services against SQL and XPath Injection attacks, by transparently detecting and aborting service invocations that try to take advantage of potential vulnerabilities. Our mechanism was applied to secure several web services specified by the TPC-App benchmark, showing to be 100% effective in stopping attacks, non-intrusive and very easy to use.
Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
NASA Astrophysics Data System (ADS)
Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon
The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.
Secure and Practical Defense Against Code-Injection Attacks using Software Dynamic Translation
2006-06-16
Cache inst1 inst2 … instx inst3 inst4 cmpl %eax,%ecx trampoline Code Fragment1 inst7 inst8 … trampoline Code Fragment2 Context Switch Fetch Decode...inst4 cmpl %eax,%ecx bne L4 inst5 inst6 … jmp L8 L4: inst7 inst8 … Application Text CFn CFn+1 CFn+2 CFn+3 CFn+4 CFn+5 CFn+x inst5 inst6 … trampoline
Software Security Knowledge: CWE. Knowing What Could Make Software Vulnerable to Attack
2011-05-01
shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1...Buffer • CWE-642: External Control of Critical State Data • CWE-73: External Control of File Name or Path • CWE-426: Untrusted Search Path • CWE...94: Failure to Control Generation of Code (aka ’Code Injection’) • CWE-494: Download of Code Without Integrity Check • CWE-404: Improper Resource
Application distribution model and related security attacks in VANET
NASA Astrophysics Data System (ADS)
Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian
2013-03-01
In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.
Ultrabroadband photonic internet: safety aspects
NASA Astrophysics Data System (ADS)
Kalicki, Arkadiusz; Romaniuk, Ryszard
2008-11-01
Web applications became most popular medium in the Internet. Popularity, easiness of web application frameworks together with careless development results in high number of vulnerabilities and attacks. There are several types of attacks possible because of improper input validation. SQL injection is ability to execute arbitrary SQL queries in a database through an existing application. Cross-site scripting is the vulnerability which allows malicious web users to inject code into the web pages viewed by other users. Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains malicious request. Web spam in blogs. There are several techniques to mitigate attacks. Most important are web application strong design, correct input validation, defined data types for each field and parameterized statements in SQL queries. Server hardening with firewall, modern security policies systems and safe web framework interpreter configuration are essential. It is advised to keep proper security level on client side, keep updated software and install personal web firewalls or IDS/IPS systems. Good habits are logging out from services just after finishing work and using even separate web browser for most important sites, like e-banking.
Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gallagher, Brian; Eliassi-Rad, Tina
2009-07-08
As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to executemore » arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.« less
Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus
2015-01-01
Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms, reinjection rates may be slightly higher than shown here. Clinical trial identifier: NCT01034969.
Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Ranger, Christopher M; Youssef, Nadeer N
2013-02-01
Exotic ambrosia beetles are damaging pests in ornamental tree nurseries in North America. The species Xylosandrus crassiusculus (Motshulsky) and Xylosandrus germanus (Blandford) are especially problematic. Management of these pests relies on preventive treatments of insecticides. However, field tests of recommended materials on nursery trees have been limited because of unreliable attacks by ambrosia beetles on experimental trees. Ethanol-injection of trees was used to induce colonization by ambrosia beetles to evaluate insecticides and botanical formulations for preventing attacks by ambrosia beetles. Experiments were conducted in Ohio, Tennessee, and Virginia. Experimental trees injected with ethanol had more attacks by ambrosia beetles than uninjected control trees in all but one experiment. Xylosandrus crassiusculus and X. germanus colonized trees injected with ethanol. In most experiments, attack rates declined 8 d after ethanol-injection. Ethanol-injection induced sufficient pressure from ambrosia beetles to evaluate the efficacy of insecticides for preventing attacks. Trunk sprays of permethrin suppressed cumulative total attacks by ambrosia beetles in most tests. Trunk sprays of the botanical formulations Armorex and Veggie Pharm suppressed cumulative total attacks in Ohio. Armorex, Armorex + Permethrin, and Veggie Pharm + Permethrin suppressed attacks in Tennessee. The bifenthrin product Onyx suppressed establishment of X. germanus in one Ohio experiment, and cumulative total ambrosia beetle attacks in Virginia. Substrate drenches and trunk sprays of neonicotinoids, or trunk sprays of anthranilic diamides or tolfenpyrad were not effective. Ethanol-injection is effective for inducing attacks and ensuring pressure by ambrosia beetles for testing insecticide efficacy on ornamental trees.
Spike-Nosed Bodies and Forward Injected Jets in Supersonic Flow
NASA Technical Reports Server (NTRS)
Gilinsky, M.; Washington, C.; Blankson, I. M.; Shvets, A. I.
2002-01-01
The paper contains new numerical simulation and experimental test results of blunt body drag reduction using thin spikes mounted in front of a body and one- or two-phase jets injected against a supersonic flow. Numerical simulations utilizing the NASA CFL3D code were conducted at the Hampton University Fluid Mechanics and Acoustics Laboratory (FM&AL) and experimental tests were conducted using the facilities of the IM/MSU Aeromechanics and Gas Dynamics Laboratory. Previous results were presented at the 37th AIAA/ASME/SAE/ASEE Joint Propulsion Conference. Those results were based on some experimental and numerical simulation tests for supersonic flow around spike-nosed or shell-nosed bodies, and numerical simulations were conducted only for a single spike-nosed or shell-nosed body at zero attack angle, alpha=0. In this paper, experimental test results of gas, liquid and solid particle jet injection against a supersonic flow are presented. In addition, numerical simulation results for supersonic flow around a multiple spike-nosed body with non-zero attack angles and with a gas and solid particle forward jet injection are included. Aerodynamic coefficients: drag, C(sub D), lift, C(sub L), and longitudinal momentum, M(sub z), obtained by numerical simulation and experimental tests are compared and show good agreement.
Spike-Nosed Bodies and Forward Injected Jets in Supersonic Flow
NASA Technical Reports Server (NTRS)
Gilinsky, M.; Washington, C.; Blankson, I. M.; Shvets, A. I.
2002-01-01
The paper contains new numerical simulation and experimental test results of blunt body drag reduction using thin spikes mounted in front of a body and one- or two-phase jets injected against a supersonic flow. Numerical simulations utilizing the NASA CFL3D code were conducted at the Hampton University Fluid Mechanics and Acoustics Laboratory (FM&AL) and experimental tests were conducted using the facilities of the IM/MSU Aeromechanics and Gas Dynamics Laboratory. Previous results were presented at the 37th AIAA/ASME/SAE/ASEE Joint Propulsion Conference. Those results were based on some experimental and numerical simulation tests for supersonic flow around spike-nosed or shell-nosed bodies, and numerical simulations were conducted only for a single spike-nosed or shell-nosed body at zero attack angle, alpha = 0 degrees. In this paper, experimental test results of gas, liquid and solid particle jet injection against a supersonic flow are presented. In addition, numerical simulation results for supersonic flow around a multiple spike-nosed body with non-zero attack angles and with a gas and solid particle forward jet injection are included. Aerodynamic coefficients: drag, C (sub D), lift, C(sub L), and longitudinal momentum, M(sub z), obtained by numerical simulation and experimental tests are compared and show good agreement.
CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical Systems
2018-04-19
AFRL-AFOSR-JP-TR-2018-0035 CORESAFE:A Formal Approach against Code Replacement Attacks on Cyber Physical Systems Sandeep Shukla INDIAN INSTITUTE OF...Formal Approach against Code Replacement Attacks on Cyber Physical Systems 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA2386-16-1-4099 5c. PROGRAM ELEMENT...Institute of Technology Kanpur India Final Report for AOARD Grant “CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical
Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment
NASA Technical Reports Server (NTRS)
Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda
2013-01-01
The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.
Design of Provider-Provisioned Website Protection Scheme against Malware Distribution
NASA Astrophysics Data System (ADS)
Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka
Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.
Decoy state method for quantum cryptography based on phase coding into faint laser pulses
NASA Astrophysics Data System (ADS)
Kulik, S. P.; Molotkov, S. N.
2017-12-01
We discuss the photon number splitting attack (PNS) in systems of quantum cryptography with phase coding. It is shown that this attack, as well as the structural equations for the PNS attack for phase encoding, differs physically from the analogous attack applied to the polarization coding. As far as we know, in practice, in all works to date processing of experimental data has been done for phase coding, but using formulas for polarization coding. This can lead to inadequate results for the length of the secret key. These calculations are important for the correct interpretation of the results, especially if it concerns the criterion of secrecy in quantum cryptography.
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
NASA Astrophysics Data System (ADS)
Jaimez, Marc; Esparza, Oscar; Muñoz, Jose L.; Alins-Delgado, Juan J.; Mata-Díaz, Jorge
Mobile agents are software entities consisting of code, data, state and itinerary that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In particular, collusion attacks have been barely studied in the literature. This paper presents a mechanism that avoids collusion attacks based on code passing. Our proposal is based on a Multi-Code agent, which contains a different variant of the code for each host. A Trusted Third Party is responsible for providing the information to extract its own variant to the hosts, and for taking trusted timestamps that will be used to verify time coherence.
NASA Astrophysics Data System (ADS)
Jung, Sungmo; Kim, Jong Hyun; Cagalaban, Giovanni; Lim, Ji-Hoon; Kim, Seoksoo
More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of 'an executing environment aware attack' by analyzing system behaviors and monitoring memory.
Heavy-Ion Microbeam Fault Injection into SRAM-Based FPGA Implementations of Cryptographic Circuits
NASA Astrophysics Data System (ADS)
Li, Huiyun; Du, Guanghua; Shao, Cuiping; Dai, Liang; Xu, Guoqing; Guo, Jinlong
2015-06-01
Transistors hit by heavy ions may conduct transiently, thereby introducing transient logic errors. Attackers can exploit these abnormal behaviors and extract sensitive information from the electronic devices. This paper demonstrates an ion irradiation fault injection attack experiment into a cryptographic field-programmable gate-array (FPGA) circuit. The experiment proved that the commercial FPGA chip is vulnerable to low-linear energy transfer carbon irradiation, and the attack can cause the leakage of secret key bits. A statistical model is established to estimate the possibility of an effective fault injection attack on cryptographic integrated circuits. The model incorporates the effects from temporal, spatial, and logical probability of an effective attack on the cryptographic circuits. The rate of successful attack calculated from the model conforms well to the experimental results. This quantitative success rate model can help evaluate security risk for designers as well as for the third-party assessment organizations.
Preventing SQL Code Injection by Combining Static and Runtime Analysis
2008-05-01
attacker changes the developer’s intended structure of an SQ L com- mand by inserting new SQ L keywords or operators. (Su and Wasser - mann provide a...FROM b o o k s WHERE a u t h o r = ’ ’ GROUP BY r a t i n g We use symbol as a placeholder for the indeterminate part of the command (in this...dialects of SQL.) In our model, we mark transitions that correspond to externally defined strings with the symbol . To illustrate, Figure 2 shows the SQL
Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.
Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less
Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)
NASA Astrophysics Data System (ADS)
Ariwibowo, Sigit; Windarta, Susila
2016-02-01
In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.
SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases
NASA Astrophysics Data System (ADS)
Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.
One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.
NASA Technical Reports Server (NTRS)
Weilmuenster, K. J.; Hamilton, H. H., II
1983-01-01
A computer code HALIS, designed to compute the three dimensional flow about shuttle like configurations at angles of attack greater than 25 deg, is described. Results from HALIS are compared where possible with an existing flow field code; such comparisons show excellent agreement. Also, HALIS results are compared with experimental pressure distributions on shuttle models over a wide range of angle of attack. These comparisons are excellent. It is demonstrated that the HALIS code can incorporate equilibrium air chemistry in flow field computations.
NASA Astrophysics Data System (ADS)
Liu, Xuan
Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.
Physical Watermarking for Securing Cyber-Physical Systems via Packet Drop Injections
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ozel, Omur; Weekrakkody, Sean; Sinopoli, Bruno
Physical watermarking is a well known solution for detecting integrity attacks on Cyber-Physical Systems (CPSs) such as the smart grid. Here, a random control input is injected into the system in order to authenticate physical dynamics and sensors which may have been corrupted by adversaries. Packet drops may naturally occur in a CPS due to network imperfections. To our knowledge, previous work has not considered the role of packet drops in detecting integrity attacks. In this paper, we investigate the merit of injecting Bernoulli packet drops into the control inputs sent to actuators as a new physical watermarking scheme. Withmore » the classical linear quadratic objective function and an independent and identically distributed packet drop injection sequence, we study the effect of packet drops on meeting security and control objectives. Our results indicate that the packet drops could act as a potential physical watermark for attack detection in CPSs.« less
Analysis of Defenses Against Code Reuse Attacks on Modern and New Architectures
2015-09-01
soundness or completeness. An incomplete analysis will produce extra edges in the CFG that might allow an attacker to slip through. An unsound analysis...Analysis of Defenses Against Code Reuse Attacks on Modern and New Architectures by Isaac Noah Evans Submitted to the Department of Electrical...Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer
Attacks on quantum key distribution protocols that employ non-ITS authentication
NASA Astrophysics Data System (ADS)
Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.
2016-01-01
We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.
Known-plaintext attack on a joint transform correlator encrypting system.
Barrera, John Fredy; Vargas, Carlos; Tebaldi, Myrian; Torroba, Roberto; Bolognini, Nestor
2010-11-01
We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg-Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext-ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.
A supersonic three-dimensional code for flow over blunt bodies: Program documentation and test cases
NASA Technical Reports Server (NTRS)
Chaussee, D. S.; Mcmillan, O. J.
1980-01-01
The use of a computer code for the calculation of steady, supersonic, three dimensional, inviscid flow over blunt bodies is illustrated. Input and output are given and explained for two cases: a pointed code of 20 deg half angle at 15 deg angle of attack in a free stream with M sub infinite = 7, and a cone-ogive-cylinder at 10 deg angle of attack with M sub infinite = 2.86. A source listing of the computer code is provided.
... causes pain, swelling, and damage) including the following: rheumatoid arthritis (a condition in which the body attacks its ... If you are using adalimumab injection to treat rheumatoid arthritis, your doctor may tell you to inject the ...
... body and causes pain, swelling, and damage) including: rheumatoid arthritis (condition in which the body attacks its own ... doctor.If golimumab injection is used to treat rheumatoid arthritis, it may also be injected intravenously (into a ...
Reset Tree-Based Optical Fault Detection
Lee, Dong-Geon; Choi, Dooho; Seo, Jungtaek; Kim, Howon
2013-01-01
In this paper, we present a new reset tree-based scheme to protect cryptographic hardware against optical fault injection attacks. As one of the most powerful invasive attacks on cryptographic hardware, optical fault attacks cause semiconductors to misbehave by injecting high-energy light into a decapped integrated circuit. The contaminated result from the affected chip is then used to reveal secret information, such as a key, from the cryptographic hardware. Since the advent of such attacks, various countermeasures have been proposed. Although most of these countermeasures are strong, there is still the possibility of attack. In this paper, we present a novel optical fault detection scheme that utilizes the buffers on a circuit's reset signal tree as a fault detection sensor. To evaluate our proposal, we model radiation-induced currents into circuit components and perform a SPICE simulation. The proposed scheme is expected to be used as a supplemental security tool. PMID:23698267
Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks
Cho, Ying-Chiang; Pan, Jen-Yi
2013-01-01
Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out. PMID:24574863
Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.
Cho, Ying-Chiang; Pan, Jen-Yi
2013-01-01
Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.
Application of thin-layer Navier-Stokes equations near maximum lift
NASA Technical Reports Server (NTRS)
Anderson, W. K.; Thomas, J. L.; Rumsey, C. L.
1984-01-01
The flowfield about a NACA 0012 airfoil at a Mach number of 0.3 and Reynolds number of 1 million is computed through an angle of attack range, up to 18 deg, corresponding to conditions up to and beyond the maximum lift coefficient. Results obtained using the compressible thin-layer Navier-Stokes equations are presented as well as results from the compressible Euler equations with and without a viscous coupling procedure. The applicability of each code is assessed and many thin-layer Navier-Stokes benchmark solutions are obtained which can be used for comparison with other codes intended for use at high angles of attack. Reasonable agreement of the Navier-Stokes code with experiment and the viscous-inviscid interaction code is obtained at moderate angles of attack. An unsteady solution is obtained with the thin-layer Navier-Stokes code at the highest angle of attack considered. The maximum lift coefficient is overpredicted, however, in comparison to experimental data, which is attributed to the presence of a laminar separation bubble near the leading edge not modeled in the computations. Two comparisons with experimental data are also presented at a higher Mach number.
... rejection (attack of a transplanted organ by the immune system of a person receiving the organ) of kidney ... It works by decreasing the activity of the immune system to prevent it from attacking the transplanted kidney.
... rejection (attack of the transplanted organ by the immune system of the person receiving the organ) in people ... works by decreasing the activity of the body's immune system so it will not attack the transplanted organ.
Attacks on public telephone networks: technologies and challenges
NASA Astrophysics Data System (ADS)
Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet
2003-09-01
Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.
Passive Fingerprinting Of Computer Network Reconnaissance Tools
2009-09-01
v6 for version 6 MITM : Man-In-The-Middle Attack MSS: Maximum Segment Size NOP: No Operation Performed NPS: Naval Postgraduate School OS...specific, or man-in-the- middle ( MITM ) attacks. Depending on the attacker’s position to access the targeted network, the attacker may be able to...identification numbers. Both are ordinarily supposed to be initialized as a random number to make it difficult for an attacker to perform an injection MITM
76 FR 26729 - Ceridian Corporation; Analysis of Proposed Consent Order to Aid Public Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-09
... result of these failures, hackers executed an SQL injection attack on the Powerpay Web site and Web application. Through this attack, the hackers found personal information stored in Powerpay on Ceridian's...
Security attack detection algorithm for electric power gis system based on mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan
2017-05-01
Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.
Offense-Defense Balance in Cyberspace: A Proposed Model
2012-12-01
enable faster multitasking , the more computations per second can be accomplished. Increased processing speed will allow an attacker to send attacks...depend on what spam or DDoS needs to be accomplished with prices ranging from $30-$70 a day for DDoS to $10 for 1 million spam emails . 21 For...In addition to DDoS attacks on webservers, there were web defacements (using various tools such as SQL injections) and email flooding. The attacks
Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems
Gao, Min; Tian, Renli; Wen, Junhao; Xiong, Qingyu; Ling, Bin; Yang, Linda
2015-01-01
In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes. PMID:26267477
Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems.
Gao, Min; Tian, Renli; Wen, Junhao; Xiong, Qingyu; Ling, Bin; Yang, Linda
2015-01-01
In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes.
Public Figure Attacks in the United States, 1995-2015.
Meloy, J Reid; Amman, Molly
2016-09-01
An archival descriptive study of public figure attackers in the United States between 1995 and 2015 was undertaken. Fifty-six incidents were identified, primarily through exhaustive internet searches, composed of 58 attackers and 58 victims. A code book was developed which focused upon victims, offenders, pre-attack behaviors including direct threats, attack characteristics, post-offense and other outcomes, motivations and psychological abstracts. The average interrater agreement for coding of bivariate variables was 0.835 (intraclass correlation coefficient). The three most likely victim categories were politicians, judges, and athletes. Attackers were males, many with a psychiatric disorder, most were grandiose, and most had both a violent and nonviolent criminal history. The known motivations for the attacks were often angry and personal, the most common being dissatisfaction with a judicial or other governmental process (23%). In only one case was the primary motivation to achieve notoriety. Lethality risk during an attack was 55%. Collateral injury or death occurred in 29% of the incidents. Only 5% communicated a direct threat to the target beforehand. The term "publicly intimate figure" is introduced to describe the sociocultural blurring of public and private lives among the targets, and its possible role in some attackers' perceptions and motivations. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.
... has not improved when treated with other medications, rheumatoid arthritis (a condition in which the body attacks its ... continues. When certolizumab injection is used to treat rheumatoid arthritis, it is usually given every other week and ...
Methods, media, and systems for detecting attack on a digital processing device
Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli
2014-07-22
Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.
Methods, media, and systems for detecting attack on a digital processing device
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stolfo, Salvatore J.; Li, Wei-Jen; Keromytis, Angelos D.
Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document tomore » the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.« less
Yalın, Osman Özgür; Uludüz, Derya; Özge, Aynur
2018-01-01
Short-lasting unilateral neuralgiform headache attacks with conjunctival injection and tearing (SUNCT) is a rare, primary headache syndrome, which is classified as a subtype of trigeminal autonomic cephalalgias. Although SUNCT is usually refractory to treatment, several antiepileptic drugs have recently shown promising results for its treatment. However, there is a lack of evidence regarding the course of SUNCT during pregnancy and the available treatment options. Here, we present a 30-week pregnant female with SUNCT who was successfully treated with infra- and supraorbital nerve blocks. Headache attacks completely diminished after the injection, and recurrence was not observed. Although lamotrigine may be relatively safe in pregnant patients with SUNCT attacks, peripheral nerve block may be a feasible technique and can be considered as a safe and effective treatment option. This is the first SUNCT case in the literature that was successfully treated with infra- and supraorbital nerve blocks during pregnancy.
Python Source Code Plagiarism Attacks on Introductory Programming Course Assignments
ERIC Educational Resources Information Center
Karnalim, Oscar
2017-01-01
This paper empirically enlists Python plagiarism attacks that have been found on Introductory Programming course assignments for undergraduate students. According to our observation toward 400 plagiarism-suspected cases, there are 35 plagiarism attacks that have been conducted by students. It starts with comment & whitespace modification as…
Execute-Only Attacks against Execute-Only Defenses
2015-11-13
attacks that have been widely used to bypass randomization-based memory corruption defenses. A recent technique, Readactor, provides one of the... corruption defenses with various impacts. We analyze the prevalence of opportunities for such attacks in popular code bases and build two proof-of-concept...our countermeasures introduce only a modest additional overhead. I. INTRODUCTION Memory corruption has been a primary vector of attacks against
NASA Technical Reports Server (NTRS)
Hwang, D. P.; Boldman, D. R.; Hughes, C. E.
1994-01-01
An axisymmetric panel code and a three dimensional Navier-Stokes code (used as an inviscid Euler code) were verified for low speed, high angle of attack flow conditions. A three dimensional Navier-Stokes code (used as an inviscid code), and an axisymmetric Navier-Stokes code (used as both viscous and inviscid code) were also assessed for high Mach number cruise conditions. The boundary layer calculations were made by using the results from the panel code or Euler calculation. The panel method can predict the internal surface pressure distributions very well if no shock exists. However, only Euler and Navier-Stokes calculations can provide a good prediction of the surface static pressure distribution including the pressure rise across the shock. Because of the high CPU time required for a three dimensional Navier-Stokes calculation, only the axisymmetric Navier-Stokes calculation was considered at cruise conditions. The use of suction and tangential blowing boundary layer control to eliminate the flow separation on the internal surface was demonstrated for low free stream Mach number and high angle of attack cases. The calculation also shows that transition from laminar flow to turbulent flow on the external cowl surface can be delayed by using suction boundary layer control at cruise flow conditions. The results were compared with experimental data where possible.
DROP: Detecting Return-Oriented Programming Malicious Code
NASA Astrophysics Data System (ADS)
Chen, Ping; Xiao, Hai; Shen, Xiaobin; Yin, Xinchun; Mao, Bing; Xie, Li
Return-Oriented Programming (ROP) is a new technique that helps the attacker construct malicious code mounted on x86/SPARC executables without any function call at all. Such technique makes the ROP malicious code contain no instruction, which is different from existing attacks. Moreover, it hides the malicious code in benign code. Thus, it circumvents the approaches that prevent control flow diversion outside legitimate regions (such as W ⊕ X ) and most malicious code scanning techniques (such as anti-virus scanners). However, ROP has its own intrinsic feature which is different from normal program design: (1) uses short instruction sequence ending in "ret", which is called gadget, and (2) executes the gadgets contiguously in specific memory space, such as standard GNU libc. Based on the features of the ROP malicious code, in this paper, we present a tool DROP, which is focused on dynamically detecting ROP malicious code. Preliminary experimental results show that DROP can efficiently detect ROP malicious code, and have no false positives and negatives.
Smart Grid Integrity Attacks: Characterizations and Countermeasures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Eilyan Bitar; Miles McQueen
2011-10-01
Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacksmore » [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.« less
NASA Astrophysics Data System (ADS)
Choubey, Gautam; Pandey, K. M.
2017-04-01
Numerical analysis of the supersonic combustion and flow structure through a scramjet engine at Mach 7 with alternating wedge fuel injection and with three angle of attack (α=-3°, α=0°, α=3°) have been studied in the present research article. The configuration used here is slight modification of the Rabadan et al. scramjet model. Steady two dimensional (2D) Reynolds-averaged Navier-Stokes (RANS) simulation and Shear stress transport (SST) based on k-ω turbulent model is used to predict the shock structure and combustion phenomenon inside the scramjet combustor. All the simulations are done by using Ansys 14-Fluent code. The combustion model used here is the combination of eddy dissipation and finite rate chemistry models since this model avoids Arrhenius calculations in which reaction rates are controlled by turbulence. Present results show that the geometry with negative angle of attack (α=-3°) have lowest ignition delay and it improves the performance of scramjet combustor as compared to geometry with α=0°, α=3°. The combustion phenomena and efficiency is also found to be stronger and highest in case of α=-3°.
Carpenter, Russ E.; Korzan, Wayne J.; Bockholt, Craig; Watt, Michael J.; Forster, Gina L.; Renner, Kenneth J.; Summers, Cliff H.
2009-01-01
Salmonids establish social hierarchies as a result of aggressive social interactions. The establishment of dominant or subordinate status is strongly linked to neuroendocrine responses mediated through the stress axis. In this study, we tested the effects of icv CRF on the behavioral outcome, plasma cortisol and monoamine function in trout subjected to a socially aggressive encounter. Rainbow trout were treated with an icv injection of artificial cerebrospinal fluid (aCSF), 500 or 2000 ng ovine CRF, or not injected. Fish were allowed to interact with a similarly sized conspecific for 15 minutes. Following the behavioral interaction, plasma cortisol and central monoamine concentrations were analyzed. Trout treated with CRF were victorious in approximately 60% of the aggressive encounters against aCSF treated opponents. Trout injected with CRF exhibited a reduction in the total number of attacks and decreased latency to attack. When trout were divided winners and losers, only victorious CRF-treated fish exhibited a reduced latency to attack and fewer retreats. Social stress increased cortisol levels in both winners and losers of aggressive interaction. This effect was enhanced with the additional stress incurred from icv injection of aCSF. However, icv CRF in addition to social stress decreased plasma cortisol in both winners and losers. While aggression stimulated significant changes in serotonergic and dopaminergic activity, the magnitude and direction were dependent on limbic brain region, CRF dose, and outcome of social aggression. With broad effects on aggressive behavior, anxiety, stress responsiveness, and central monoaminergic activity, CRF plays an important role modulating the behavioral components of social interaction. PMID:18992791
Research on offense and defense technology for iOS kernel security mechanism
NASA Astrophysics Data System (ADS)
Chu, Sijun; Wu, Hao
2018-04-01
iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.
Image counter-forensics based on feature injection
NASA Astrophysics Data System (ADS)
Iuliani, M.; Rossetto, S.; Bianchi, T.; De Rosa, Alessia; Piva, A.; Barni, M.
2014-02-01
Starting from the concept that many image forensic tools are based on the detection of some features revealing a particular aspect of the history of an image, in this work we model the counter-forensic attack as the injection of a specific fake feature pointing to the same history of an authentic reference image. We propose a general attack strategy that does not rely on a specific detector structure. Given a source image x and a target image y, the adversary processes x in the pixel domain producing an attacked image ~x, perceptually similar to x, whose feature f(~x) is as close as possible to f(y) computed on y. Our proposed counter-forensic attack consists in the constrained minimization of the feature distance Φ(z) =│ f(z) - f(y)│ through iterative methods based on gradient descent. To solve the intrinsic limit due to the numerical estimation of the gradient on large images, we propose the application of a feature decomposition process, that allows the problem to be reduced into many subproblems on the blocks the image is partitioned into. The proposed strategy has been tested by attacking three different features and its performance has been compared to state-of-the-art counter-forensic methods.
Method for detecting core malware sites related to biomedical information systems.
Kim, Dohoon; Choi, Donghee; Jin, Jonghyun
2015-01-01
Most advanced persistent threat attacks target web users through malicious code within landing (exploit) or distribution sites. There is an urgent need to block the affected websites. Attacks on biomedical information systems are no exception to this issue. In this paper, we present a method for locating malicious websites that attempt to attack biomedical information systems. Our approach uses malicious code crawling to rearrange websites in the order of their risk index by analyzing the centrality between malware sites and proactively eliminates the root of these sites by finding the core-hub node, thereby reducing unnecessary security policies. In particular, we dynamically estimate the risk index of the affected websites by analyzing various centrality measures and converting them into a single quantified vector. On average, the proactive elimination of core malicious websites results in an average improvement in zero-day attack detection of more than 20%.
Method for Detecting Core Malware Sites Related to Biomedical Information Systems
Kim, Dohoon; Choi, Donghee; Jin, Jonghyun
2015-01-01
Most advanced persistent threat attacks target web users through malicious code within landing (exploit) or distribution sites. There is an urgent need to block the affected websites. Attacks on biomedical information systems are no exception to this issue. In this paper, we present a method for locating malicious websites that attempt to attack biomedical information systems. Our approach uses malicious code crawling to rearrange websites in the order of their risk index by analyzing the centrality between malware sites and proactively eliminates the root of these sites by finding the core-hub node, thereby reducing unnecessary security policies. In particular, we dynamically estimate the risk index of the affected websites by analyzing various centrality measures and converting them into a single quantified vector. On average, the proactive elimination of core malicious websites results in an average improvement in zero-day attack detection of more than 20%. PMID:25821511
Optimal space-time attacks on system state estimation under a sparsity constraint
NASA Astrophysics Data System (ADS)
Lu, Jingyang; Niu, Ruixin; Han, Puxiao
2016-05-01
System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary's perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary's goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary's limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.
NASA Technical Reports Server (NTRS)
Smith, Crawford F.; Podleski, Steve D.
1993-01-01
The proper use of a computational fluid dynamics code requires a good understanding of the particular code being applied. In this report the application of CFL3D, a thin-layer Navier-Stokes code, is compared with the results obtained from PARC3D, a full Navier-Stokes code. In order to gain an understanding of the use of this code, a simple problem was chosen in which several key features of the code could be exercised. The problem chosen is a cone in supersonic flow at an angle of attack. The issues of grid resolution, grid blocking, and multigridding with CFL3D are explored. The use of multigridding resulted in a significant reduction in the computational time required to solve the problem. Solutions obtained are compared with the results using the full Navier-Stokes equations solver PARC3D. The results obtained with the CFL3D code compared well with the PARC3D solutions.
Security enhanced BioEncoding for protecting iris codes
NASA Astrophysics Data System (ADS)
Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya
2011-06-01
Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.
Economic burden of gouty arthritis attacks for employees with frequent and infrequent attacks.
Lynch, Wendy; Chan, Wing; Kleinman, Nathan; Andrews, L M; Yadao, Anthony M
2013-04-01
The objective of this study was to compare episode-related and annual costs and work absence days for employees with <3 versus ≥ 3 annual gout attacks. Human Capital Management Services data (2009-2010) from adult employees with gout (International Classification of Diseases, Ninth Revision code 274.x) and ≥ 12 months of medical and pharmacy benefits were studied. Outcomes of interest included medical and drug costs, number of emergency department and urgent care visits, number of inpatient days, short- and long-term disability, sick leave, workers' compensation costs, and work absence days. An algorithm based on diagnosis code and antigout medication use identified acute gout treatment episodes. Multivariate analysis compared annual and pre-episode vs. during-episode outcomes for employees with ≥ 3 vs. <3 gout annual attacks. Of 3361 employees with gout, 76 had ≥ 3 attacks; these employees had higher short-term disability costs ($1663 vs. $643, P=0.06) and days (11.68 versus 4.61, P<0.05), more emergency room visits (0.55 vs. 0.23, P<0.0001), and urgent care visits (0.07 vs. 0.04, P<0.01), and lower pharmacy costs ($1677 vs. $1108, P<0.0001) than those with <3 attacks. Medical costs both before ($203 higher) and during attacks ($136 higher) were significantly higher for those with ≥ 3 attacks than for those with <3 attacks. Additionally, a quadratic increasing relationship was found between number of attacks and cost. Frequency of acute gout attacks (≥ 3 episodes per year) among employees with gout was associated with greater short-term disability cost, absence days, and emergency department and urgent care visits, and trends toward higher overall costs.
A secure RFID authentication protocol adopting error correction code.
Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min
2014-01-01
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.
Time-marching transonic flutter solutions including angle-of-attack effects
NASA Technical Reports Server (NTRS)
Edwards, J. W.; Bennett, R. M.; Whitlow, W., Jr.; Seidel, D. A.
1982-01-01
Transonic aeroelastic solutions based upon the transonic small perturbation potential equation were studied. Time-marching transient solutions of plunging and pitching airfoils were analyzed using a complex exponential modal identification technique, and seven alternative integration techniques for the structural equations were evaluated. The HYTRAN2 code was used to determine transonic flutter boundaries versus Mach number and angle-of-attack for NACA 64A010 and MBB A-3 airfoils. In the code, a monotone differencing method, which eliminates leading edge expansion shocks, is used to solve the potential equation. When the effect of static pitching moment upon the angle-of-attack is included, the MBB A-3 airfoil can have multiple flutter speeds at a given Mach number.
A Secure RFID Authentication Protocol Adopting Error Correction Code
Zheng, Xinying; Chen, Pei-Yu
2014-01-01
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619
The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks
Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea
2016-01-01
Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379
NASA Astrophysics Data System (ADS)
JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu
2017-05-01
Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.
Opportunistic quantum network coding based on quantum teleportation
NASA Astrophysics Data System (ADS)
Shang, Tao; Du, Gang; Liu, Jian-wei
2016-04-01
It seems impossible to endow opportunistic characteristic to quantum network on the basis that quantum channel cannot be overheard without disturbance. In this paper, we propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation. Concretely, it utilizes quantum channel for secure transmission of quantum states and can detect eavesdroppers by means of quantum channel verification. What is more, it utilizes classical channel for both opportunistic listening to neighbor states and opportunistic coding by broadcasting measurement outcome. Analysis results show that our scheme can reduce the times of transmissions over classical channels for relay nodes and can effectively defend against classical passive attack and quantum active attack.
Development of a 3-D upwind PNS code for chemically reacting hypersonic flowfields
NASA Technical Reports Server (NTRS)
Tannehill, J. C.; Wadawadigi, G.
1992-01-01
Two new parabolized Navier-Stokes (PNS) codes were developed to compute the three-dimensional, viscous, chemically reacting flow of air around hypersonic vehicles such as the National Aero-Space Plane (NASP). The first code (TONIC) solves the gas dynamic and species conservation equations in a fully coupled manner using an implicit, approximately-factored, central-difference algorithm. This code was upgraded to include shock fitting and the capability of computing the flow around complex body shapes. The revised TONIC code was validated by computing the chemically-reacting (M(sub infinity) = 25.3) flow around a 10 deg half-angle cone at various angles of attack and the Ames All-Body model at 0 deg angle of attack. The results of these calculations were in good agreement with the results from the UPS code. One of the major drawbacks of the TONIC code is that the central-differencing of fluxes across interior flowfield discontinuities tends to introduce errors into the solution in the form of local flow property oscillations. The second code (UPS), originally developed for a perfect gas, has been extended to permit either perfect gas, equilibrium air, or nonequilibrium air computations. The code solves the PNS equations using a finite-volume, upwind TVD method based on Roe's approximate Riemann solver that was modified to account for real gas effects. The dissipation term associated with this algorithm is sufficiently adaptive to flow conditions that, even when attempting to capture very strong shock waves, no additional smoothing is required. For nonequilibrium calculations, the code solves the fluid dynamic and species continuity equations in a loosely-coupled manner. This code was used to calculate the hypersonic, laminar flow of chemically reacting air over cones at various angles of attack. In addition, the flow around the McDonnel Douglas generic option blended-wing-body was computed and comparisons were made between the perfect gas, equilibrium air, and the nonequilibrium air results.
NASA Technical Reports Server (NTRS)
Kumar, A.; Graves, R. A., Jr.
1980-01-01
A user's guide is provided for a computer code which calculates the laminar and turbulent hypersonic flows about blunt axisymmetric bodies, such as spherically blunted cones, hyperboloids, etc., at zero and small angles of attack. The code is written in STAR FORTRAN language for the CDC-STAR-100 computer. Time-dependent, viscous-shock-layer-type equations are used to describe the flow field. These equations are solved by an explicit, two-step, time asymptotic, finite-difference method. For the turbulent flow, a two-layer, eddy-viscosity model is used. The code provides complete flow-field properties including shock location, surface pressure distribution, surface heating rates, and skin-friction coefficients. This report contains descriptions of the input and output, the listing of the program, and a sample flow-field solution.
Validation of a three-dimensional viscous analysis of axisymmetric supersonic inlet flow fields
NASA Technical Reports Server (NTRS)
Benson, T. J.; Anderson, B. H.
1983-01-01
A three-dimensional viscous marching analysis for supersonic inlets was developed. To verify this analysis several benchmark axisymmetric test configurations were studied and are compared to experimental data. Detailed two-dimensional results for shock-boundary layer interactions are presented for flows with and without boundary layer bleed. Three dimensional calculations of a cone at angle of attack and a full inlet at attack are also discussed and evaluated. Results of the calculations demonstrate the code's ability to predict complex flow fields and establish guidelines for future calculations using similar codes.
Computational/Experimental Aeroheating Predictions for X-33. Phase 2; Vehicle
NASA Technical Reports Server (NTRS)
Hamilton, H. Harris, II; Weilmuenster, K. James; Horvath, Thomas J.; Berry, Scott A.
1998-01-01
Laminar and turbulent heating-rate calculations from an "engineering" code and laminar calculations from a "benchmark" Navier-Stokes code are compared with experimental wind-tunnel data obtained on several candidate configurations for the X-33 Phase 2 flight vehicle. The experimental data were obtained at a Mach number of 6 and a freestream Reynolds number ranging from 1 to 8 x 10(exp 6)/ft. Comparisons are presented along the windward symmetry plane and in a circumferential direction around the body at several axial stations at angles of attack from 20 to 40 deg. The experimental results include both laminar and turbulent flow. For the highest angle of attack some of the measured heating data exhibited a "non-laminar" behavior which caused the heating to increase above the laminar level long before "classical" transition to turbulent flow was observed. This trend was not observed at the lower angles of attack. When the flow was laminar, both codes predicted the heating along the windward symmetry plane reasonably well but under-predicted the heating in the chine region. When the flow was turbulent the LATCH code accurately predicted the measured heating rates. Both codes were used to calculate heating rates over the X-33 vehicle at the peak heating point on the design trajectory and they were found to be in very good agreement over most of the vehicle windward surface.
Des Jarlais, D C; Cooper, H L F; Arasteh, K; Feelemyer, J; McKnight, C; Ross, Z
2018-01-01
We identified potential geographic "hotspots" for drug-injecting transmission of HIV and hepatitis C virus (HCV) among persons who inject drugs (PWID) in New York City. The HIV epidemic among PWID is currently in an "end of the epidemic" stage, while HCV is in a continuing, high prevalence (> 50%) stage. We recruited 910 PWID entering Mount Sinai Beth Israel substance use treatment programs from 2011-2015. Structured interviews and HIV/ HCV testing were conducted. Residential ZIP codes were used as geographic units of analysis. Potential "hotspots" for HIV and HCV transmission were defined as 1) having relatively large numbers of PWID 2) having 2 or more HIV (or HCV) seropositive PWID reporting transmission risk-passing on used syringes to others, and 3) having 2 or more HIV (or HCV) seronegative PWID reporting acquisition risk-injecting with previously used needles/syringes. Hotspots for injecting drug use initiation were defined as ZIP codes with 5 or more persons who began injecting within the previous 6 years. Among PWID, 96% injected heroin, 81% male, 34% White, 15% African-American, 47% Latinx, mean age 40 (SD = 10), 7% HIV seropositive, 62% HCV seropositive. Participants resided in 234 ZIP codes. No ZIP codes were identified as potential hotspots due to small numbers of HIV seropositive PWID reporting transmission risk. Four ZIP codes were identified as potential hotspots for HCV transmission. 12 ZIP codes identified as hotspots for injecting drug use initiation. For HIV, the lack of potential hotspots is further validation of widespread effectiveness of efforts to reduce injecting-related HIV transmission. Injecting-related HIV transmission is likely to be a rare, random event. HCV prevention efforts should include focus on potential hotspots for transmission and on hotspots for initiation into injecting drug use. We consider application of methods for the current opioid epidemic in the US.
Bilateral Deep Peroneal Nerve Paralysis Following Kerosene Self-Injection into External Hemorrhoids
Rostami, Khalil; Farzaneh, Esmaeil; Abolhassani, Hassan
2010-01-01
Along with conventional therapies, some abrogated traditional treatment had been used for hemorrhoids like local Kerosene injection especially for extremely irritated external hemorrhoids. We report a rare case of Kerosene self-injection into the hemorrhoid. Despite antibiotics therapy, extent debridement, and colostomy, the patient died after 24 hours because of heart attack. Moreover, we discuss here the case with contact or injection of hydrocarbon materials and early care action to decrease the extensions of injury and side effects. PMID:20936130
A taxonomy and discussion of software attack technologies
NASA Astrophysics Data System (ADS)
Banks, Sheila B.; Stytz, Martin R.
2005-03-01
Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research and a discussion of the motivation for our work. Section two contains a presents our taxonomy of software attacks and a discussion of the strategies employed and general weaknesses exploited for each attack. Section three contains a summary and suggestions for further research.
2016-12-01
theory, passenger rail bombing , attacker-defender methodology 15. NUMBER OF PAGES 103 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...bombers carried out a successful coordinated attack against the London mass transit system in July 2005. Three suicide bombings occurred on trains and...iron rods to make shrapnel. The precise timing indicates the terrorists themselves detonated their own devices. In March 2016, a suicide bomb
NASA Astrophysics Data System (ADS)
Rebscher, D.; Wolf, J. L.; Jung, B.; Bensabat, J.; Segev, R.; Niemi, A. P.
2014-12-01
The aim of the CO2QUEST project (Impact of the Quality of CO2 on Storage and Transport) is to investigate the effect of typical impurities in the CO2 stream captured from fossil fuel power plants on its safe and economic transportation and deep geologic storage. An important part of this EU funded project is to enhance the understanding of typical impurity effects in a CO2 stream regarding the performance of the storage. Based on the experimental site Heletz in Israel, where injection tests of water as well as of super-critical pure and impure CO2 will be conducted, numerical simulations are performed. These studies illustrate flow and transport of CO2 and brine as well as impurities induced chemical reactions in relation to changes in the reservoir, e.g. porosity, permeability, pH-value, and mineral composition. Using different THC codes (TOUGH2-ECO2N, TOUGHREACT, PFLOTRAN), the spatial distribution of CO2 and impurities, both in the supercritical and aqueous phases, are calculated. The equation of state (EOS) of above numerical codes are properly modified to deal with binary/tertiary gas mixtures (e.g. CO2-N2 or CO2-SO2). In addition, simulations for a push-pull test of about 10 days duration are performed, which will be validated against experimental field data. Preliminary results are as follows: (a) As expected, the injection of SO2 leads to a strong decrease in pH-value, hence, the total dissolution of carbonate minerals could be observed. (b) Due to the acidic attack on clay minerals , which is enhanced compared to a pure CO2 dissolution, a higher amount of metal ions are released, in particular Fe2+ and Mg2+ by a factor of 25 and 10, respectively. Whereas secondary precipitation occurs only for sulphur minerals, namely anhydrite and pyrite. (c) The co-injection of CO2 with N2 changes physical properties of the gas mixture. Increasing N2 contents induces density decrease of the gas mixture, resulting in faster and wider plume migration compared to the pure CO2 injection case.
Hepatomegaly due to self-induced hyperinsulinism.
Asherov, J; Mimouni, M; Varsano, I; Lubin, E; Laron, Z
1979-01-01
Repeated hypoglycaemic attacks, associated with transient hepatomegaly, in a 12-year-old insulin-dependent diabetic girl continued despite reduction in dose and, later, complete discontinuance of insulin. The attacks ceased while she was in hospital, necessitating reinstitution of insulin. The hepatomegaly resolved when surreptitious additional insulin injections were discovered and stopped. Hepatomegaly in diabetics should arouse suspicion of overdosage with insulin. Images Figure PMID:444328
Michael I. Haverty; Patrick J. Shea; John M. Wenz
1996-01-01
The effectiveness of registered application rates of the insecticide metasystox-R applied with Mauget tree injectors (INJECT-A-CIDE) was assessed in two strategies: (1) treatment of trees before western pine beetle attack (preventive treatment), and (2) treatment of trees after attack by western pine beetle (remedial treatment) for protection of individual, high-value...
Network traffic anomaly prediction using Artificial Neural Network
NASA Astrophysics Data System (ADS)
Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea
2017-03-01
As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.
Moura, Felipe Arruda; van Emmerik, Richard E A; Santana, Juliana Exel; Martins, Luiz Eduardo Barreto; Barros, Ricardo Machado Leite de; Cunha, Sergio Augusto
2016-12-01
The purpose of this study was to investigate the coordination between teams spread during football matches using cross-correlation and vector coding techniques. Using a video-based tracking system, we obtained the trajectories of 257 players during 10 matches. Team spread was calculated as functions of time. For a general coordination description, we calculated the cross-correlation between the signals. Vector coding was used to identify the coordination patterns between teams during offensive sequences that ended in shots on goal or defensive tackles. Cross-correlation showed that opponent teams have a tendency to present in-phase coordination, with a short time lag. During offensive sequences, vector coding results showed that, although in-phase coordination dominated, other patterns were observed. We verified that during the early stages, offensive sequences ending in shots on goal present greater anti-phase and attacking team phase periods, compared to sequences ending in tackles. Results suggest that the attacking team may seek to present a contrary behaviour of its opponent (or may lead the adversary behaviour) in the beginning of the attacking play, regarding to the distribution strategy, to increase the chances of a shot on goal. The techniques allowed detecting the coordination patterns between teams, providing additional information about football dynamics and players' interaction.
Guise, Andy; Melo, Jason; Mittal, Maria Luisa; Rafful, Claudia; Cuevas-Mota, Jazmine; Davidson, Peter; Garfein, Richard S; Werb, Dan
2018-05-01
Injection drug use initiation is shaped by social networks and structural contexts, with people who inject drugs often assisting in this process. We sought to explore the norms and contexts linked to assisting others to initiate injection drug use in San Diego, USA, to inform the development of structural interventions to prevent this phenomenon. We undertook qualitative interviews with a purposive sample of people who inject drugs and had reported assisting others to initiate injection (n = 17) and a sub-sample of people who inject drugs (n = 4) who had not reported initiating others to triangulate accounts. We analyzed data thematically and abductively. Respondents' accounts of providing initiation assistance were consistent with themes and motives reported in other contexts: of seeking to reduce harm to the 'initiate', responding to requests for help, fostering pleasure, accessing resources, and claims that initiation assistance was unintentional. We developed analysis of these themes to explore initiation assistance as governed by a 'moral code'. We delineate a fragmented moral code which includes a range of meanings and social contexts that shape initiation assistance. We also show how assistance is happening within a structural context that limits discussion of injection drug use, reflecting a prevailing silence on drug use linked to stigma and criminalization. In San Diego, the assistance of others to initiate injection drug use is governed by a fragmented moral code situated within particular social norms and contexts. Interventions that address the social and structural conditions shaped by and shaping this code may be beneficial, in tandem with efforts to support safe injection and the reduction of injection-related harms. Copyright © 2018 Elsevier B.V. All rights reserved.
SUNCT syndrome. Two cases in Argentina.
Raimondi, E; Gardella, L
1998-05-01
Two patients suffering from SUNCT syndrome are presented. Some features are remarkable. The first patient was a 69-year-old man whose first crisis was located in the right supraorbital region. After a 4-month spontaneous remission, the pain returned to the upper part of the cheek, radiating to the supraciliary region on the same side, with lacrimation and conjunctival injection. Rhinorrhea was absent. The painful attacks were triggered by head movements. Clinical improvement occurred with carbamazepine treatment. The second patient was a 48-year-old woman whose painful attacks lasted from 30 to 45 seconds followed by a burning sensation lasting 2 hours. Autonomic signs such as conjunctival injection, lacrimation, and edema and ipsilateral ptosis of the upper lid were rather marked. There was never any rhinorrhea. Her attacks were triggered by head and eye movements. She responded to the administration of corticosteroids and carbamazepine. According to these features, the two patients had SUNCT syndrome, and the positive carbamazepine response suggests a relationship with trigeminal neuralgia.
Maritime Security: Potential Terrorist Attacks and Protection Priorities
2007-01-09
Liquefied Natural Gas: Siting and Safety .” Feb. 15, 2005. 108 U.S. Coast Guard. U.S. Coast Guard Captain of the Port Long Island Sound Waterways...Order Code RL33787 Maritime Security: Potential Terrorist Attacks and Protection Priorities January 9, 2007 Paul W. Parfomak and John Frittelli...Terrorist Attacks and Protection Priorities 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK
Thaker, Maria; Vanak, Abi T; Lima, Steven L; Hews, Diana K
2010-01-01
Elevated plasma corticosterone during stressful events is linked to rapid changes in behavior in vertebrates and can mediate learning and memory consolidation. We tested the importance of acute corticosterone elevation in aversive learning of a novel stressor by wild male eastern fence lizards (Sceloporus undulatus). We found that inhibiting corticosterone elevation (using metyrapone, a corticosterone synthesis blocker) during an encounter with a novel attacker impaired immediate escape responses and limited learning and recall during future encounters. In the wild and in outdoor enclosures, lizards whose acute corticosterone response was blocked by an earlier metyrapone injection did not alter their escape behavior during repeated encounters with the attacker. Control-injected (unblocked) lizards, however, progressively increased flight initiation distance and decreased hiding duration during subsequent encounters. Aversive responses were also initially higher for control lizards exposed to a higher intensity first attack. Further, we demonstrate a role of corticosterone elevation in recollection, since unblocked lizards had heightened antipredator responses 24-28 h later. Exogenously restoring corticosterone levels in metyrapone-injected lizards maintained aversive behaviors and learning at control (unblocked) levels. We suggest that the corticosterone mediation of antipredator behaviors and aversive learning is a critical and general mechanism for the behavioral flexibility of vertebrate prey.
Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.
Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262
DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain
2015-01-01
Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.
DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain
2015-01-01
Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717
Trends in Utilization of Vocal Fold Injection Procedures.
Rosow, David E
2015-11-01
Office-based vocal fold injections have become increasingly popular over the past 15 years. Examination of trends in procedure coding for vocal fold injections in the United States from 2000 to 2012 was undertaken to see if they reflect this shift. The US Part B Medicare claims database was queried from 2000 through 2012 for multiple Current Procedural Terminology codes. Over the period studied, the number of nonoperative laryngoscopic injections (31513, 31570) and operative medialization laryngoplasties (31588) remained constant. Operative vocal fold injection (31571) demonstrated marked linear growth over the 12-year study period, from 744 procedures in 2000 to 4788 in 2012-an increase >640%. The dramatic increased incidence in the use of code 31571 reflects an increasing share of vocal fold injections being performed in the operating room and not in an office setting, running counter to the prevailing trend toward awake, office-based injection procedures. © American Academy of Otolaryngology—Head and Neck Surgery Foundation 2015.
Christopher J. Fettig; Donald M. Grosman; A. Steven. Munson
2013-01-01
Bark beetles (Coleoptera: Curculionidae, Scolytinae) are important tree mortality agents in western coniferous forests. Protection of individual trees from bark beetle attack has historically involved applications of liquid formulations of contact insecticides to the tree bole using hydraulic sprayers. More recently, researchers have examined the effectiveness of...
Cooper, H. L. F.; Arasteh, K.; Feelemyer, J.; McKnight, C.; Ross, Z.
2018-01-01
Objective We identified potential geographic “hotspots” for drug-injecting transmission of HIV and hepatitis C virus (HCV) among persons who inject drugs (PWID) in New York City. The HIV epidemic among PWID is currently in an “end of the epidemic” stage, while HCV is in a continuing, high prevalence (> 50%) stage. Methods We recruited 910 PWID entering Mount Sinai Beth Israel substance use treatment programs from 2011–2015. Structured interviews and HIV/ HCV testing were conducted. Residential ZIP codes were used as geographic units of analysis. Potential “hotspots” for HIV and HCV transmission were defined as 1) having relatively large numbers of PWID 2) having 2 or more HIV (or HCV) seropositive PWID reporting transmission risk—passing on used syringes to others, and 3) having 2 or more HIV (or HCV) seronegative PWID reporting acquisition risk—injecting with previously used needles/syringes. Hotspots for injecting drug use initiation were defined as ZIP codes with 5 or more persons who began injecting within the previous 6 years. Results Among PWID, 96% injected heroin, 81% male, 34% White, 15% African-American, 47% Latinx, mean age 40 (SD = 10), 7% HIV seropositive, 62% HCV seropositive. Participants resided in 234 ZIP codes. No ZIP codes were identified as potential hotspots due to small numbers of HIV seropositive PWID reporting transmission risk. Four ZIP codes were identified as potential hotspots for HCV transmission. 12 ZIP codes identified as hotspots for injecting drug use initiation. Discussion For HIV, the lack of potential hotspots is further validation of widespread effectiveness of efforts to reduce injecting-related HIV transmission. Injecting-related HIV transmission is likely to be a rare, random event. HCV prevention efforts should include focus on potential hotspots for transmission and on hotspots for initiation into injecting drug use. We consider application of methods for the current opioid epidemic in the US. PMID:29596464
Parametric study on laminar flow for finite wings at supersonic speeds
NASA Technical Reports Server (NTRS)
Garcia, Joseph Avila
1994-01-01
Laminar flow control has been identified as a key element in the development of the next generation of High Speed Transports. Extending the amount of laminar flow over an aircraft will increase range, payload, and altitude capabilities as well as lower fuel requirements, skin temperature, and therefore the overall cost. A parametric study to predict the extent of laminar flow for finite wings at supersonic speeds was conducted using a computational fluid dynamics (CFD) code coupled with a boundary layer stability code. The parameters investigated in this study were Reynolds number, angle of attack, and sweep. The results showed that an increase in angle of attack for specific Reynolds numbers can actually delay transition. Therefore, higher lift capability, caused by the increased angle of attack, as well as a reduction in viscous drag, due to the delay in transition, can be expected simultaneously. This results in larger payload and range.
Development of the Orion Crew Module Static Aerodynamic Database. Part 1; Hypersonic
NASA Technical Reports Server (NTRS)
Bibb, Karen L.; Walker, Eric L.; Robinson, Philip E.
2011-01-01
The Orion aerodynamic database provides force and moment coefficients given the velocity, attitude, configuration, etc. of the Crew Exploration Vehicle (CEV). The database is developed and maintained by the NASA CEV Aerosciences Project team from computational and experimental aerodynamic simulations. The database is used primarily by the Guidance, Navigation, and Control (GNC) team to design vehicle trajectories and assess flight performance. The initial hypersonic re-entry portion of the Crew Module (CM) database was developed in 2006. Updates incorporating additional data and improvements to the database formulation and uncertainty methodologies have been made since then. This paper details the process used to develop the CM database, including nominal values and uncertainties, for Mach numbers greater than 8 and angles of attack between 140deg and 180deg. The primary available data are more than 1000 viscous, reacting gas chemistry computational simulations using both the Laura and Dplr codes, over a range of Mach numbers from 2 to 37 and a range of angles of attack from 147deg to 172deg. Uncertainties were based on grid convergence, laminar-turbulent solution variations, combined altitude and code-to-code variations, and expected heatshield asymmetry. A radial basis function response surface tool, NEAR-RS, was used to fit the coefficient data smoothly in a velocity-angle-of-attack space. The resulting database is presented and includes some data comparisons and a discussion of the predicted variation of trim angle of attack and lift-to-drag ratio. The database provides a variation in trim angle of attack on the order of +/-2deg, and a range in lift-to-drag ratio of +/-0.035 for typical vehicle flight conditions.
Aberer, Werner; Maurer, Marcus; Bouillet, Laurence; Zanichelli, Andrea; Caballero, Teresa; Longhurst, Hilary J; Perrin, Amandine; Andresen, Irmgard
2017-01-01
Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prophylaxis (LTP), breakthrough attacks are known to occur. We used data from the Icatibant Outcome Survey (IOS) to evaluate the characteristics of breakthrough attacks and the effectiveness of icatibant as a treatment option. Data on LTP use, attacks, and treatments were recorded. Attack characteristics, treatment characteristics, and outcomes (time to treatment, time to resolution, and duration of attack) were compared for attacks that occurred with versus without LTP. Data on 3228 icatibant-treated attacks from 448 patients with C1-INH-HAE were analyzed; 30.1% of attacks occurred while patients were using LTP. Attack rate, attack severity, and the distribution of attack sites were similar across all types of LTP used, and were comparable to the results found in patients who did not receive LTP. Attacks were successfully treated with icatibant; 82.5% of all breakthrough attacks were treated with a single icatibant injection without C1-INH rescue medication. Treatment outcomes were comparable for breakthrough attacks across all LTP types, and for attacks without LTP. Patients who use LTP should be aware that breakthrough attacks can occur, and such attacks can be severe. Thus, patients with C1-INH-HAE using LTP should have emergency treatment readily available. Data from IOS show that icatibant is effective for the treatment of breakthrough attacks. Trial Registration NCT01034969.
A Secure and Robust Approach to Software Tamper Resistance
NASA Astrophysics Data System (ADS)
Ghosh, Sudeep; Hiser, Jason D.; Davidson, Jack W.
Software tamper-resistance mechanisms have increasingly assumed significance as a technique to prevent unintended uses of software. Closely related to anti-tampering techniques are obfuscation techniques, which make code difficult to understand or analyze and therefore, challenging to modify meaningfully. This paper describes a secure and robust approach to software tamper resistance and obfuscation using process-level virtualization. The proposed techniques involve novel uses of software check summing guards and encryption to protect an application. In particular, a virtual machine (VM) is assembled with the application at software build time such that the application cannot run without the VM. The VM provides just-in-time decryption of the program and dynamism for the application's code. The application's code is used to protect the VM to ensure a level of circular protection. Finally, to prevent the attacker from obtaining an analyzable snapshot of the code, the VM periodically discards all decrypted code. We describe a prototype implementation of these techniques and evaluate the run-time performance of applications using our system. We also discuss how our system provides stronger protection against tampering attacks than previously described tamper-resistance approaches.
NASA Astrophysics Data System (ADS)
Kumar, Ravi; Bhaduri, Basanta; Nishchal, Naveen K.
2018-01-01
In this study, we propose a quick response (QR) code based nonlinear optical image encryption technique using spiral phase transform (SPT), equal modulus decomposition (EMD) and singular value decomposition (SVD). First, the primary image is converted into a QR code and then multiplied with a spiral phase mask (SPM). Next, the product is spiral phase transformed with particular spiral phase function, and further, the EMD is performed on the output of SPT, which results into two complex images, Z 1 and Z 2. Among these, Z 1 is further Fresnel propagated with distance d, and Z 2 is reserved as a decryption key. Afterwards, SVD is performed on Fresnel propagated output to get three decomposed matrices i.e. one diagonal matrix and two unitary matrices. The two unitary matrices are modulated with two different SPMs and then, the inverse SVD is performed using the diagonal matrix and modulated unitary matrices to get the final encrypted image. Numerical simulation results confirm the validity and effectiveness of the proposed technique. The proposed technique is robust against noise attack, specific attack, and brutal force attack. Simulation results are presented in support of the proposed idea.
Facelock: familiarity-based graphical authentication.
Jenkins, Rob; McLachlan, Jane L; Renaud, Karen
2014-01-01
Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.
Operational Exercise Integration Recommendations for DoD Cyber Ranges
2015-08-05
be the precision and recall of a security information and event management (SIEM) system ’s notifications of unauthorized access to that directory...network traffic, port scanning Deplete Resources TCP flooding, memory leak exploitation Injection Cross-site scripting attacks, SQL injection Deceptive...requirements for personnel development; tactics, techniques, and procedures (TTPs) devel- opment; and mission rehearsals . While unique in their own
Multicollision attack on CBC-MAC, EMAC, and XCBC-MAC of AES-128 algorithm
NASA Astrophysics Data System (ADS)
Brolin Sihite, Alfonso; Hayat Susanti, Bety
2017-10-01
A Message Authentication Codes (MAC) can be constructed based on a block cipher algorithm. CBC-MAC, EMAC, and XCBC-MAC constructions are some of MAC schemes that used in the hash function. In this paper, we do multicollision attack on CBC-MAC, EMAC, and XCBC-MAC construction which uses AES-128 block cipher algorithm as basic construction. The method of multicollision attack utilizes the concept of existential forgery on CBC-MAC. The results show that the multicollision can be obtained easily in CBC-MAC, EMAC, and XCBC-MAC construction.
... Antibiotics such as clindamycin will not kill the viruses that cause colds, flu, and other viral infections. ... may be spread as part of a bioterror attack) and toxoplasmosis (an infection that may cause serious ...
Moving Target Techniques: Leveraging Uncertainty for Cyber Defense
2015-08-24
vulnerability (a flaw or bug that an attacker can exploit to penetrate or disrupt a system) to successfully compromise systems. Defenders, however...device drivers, numerous software applications, and hardware components. Within the cyberspace, this imbalance between a simple, one- bug attack...parsing code itself could have security-relevant software bugs . Dynamic Network Techniques in the dynamic network domain change the properties
Evaluating the Generality and Limits of Blind Return-Oriented Programming Attacks
2015-12-01
consider a recently proposed information disclosure vulnerability called blind return-oriented programming (BROP). Under certain conditions, this...implementation disclosure attacks 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF...Science iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT We consider a recently proposed information disclosure vulnerability called blind return
Chosen-plaintext attack on a joint transform correlator encrypting system
NASA Astrophysics Data System (ADS)
Barrera, John Fredy; Vargas, Carlos; Tebaldi, Myrian; Torroba, Roberto
2010-10-01
We demonstrate that optical encryption methods based on the joint transform correlator architecture are vulnerable to chosen-plaintext attack. An unauthorized user, who introduces three chosen plaintexts in the accessible encryption machine, can obtain the security key code mask. In this contribution, we also propose an alternative method to eliminate ambiguities that allows obtaining the right decrypting key.
Dynamic interactions between hypersonic vehicle aerodynamics and propulsion system performance
NASA Technical Reports Server (NTRS)
Flandro, G. A.; Roach, R. L.; Buschek, H.
1992-01-01
Described here is the development of a flexible simulation model for scramjet hypersonic propulsion systems. The primary goal is determination of sensitivity of the thrust vector and other system parameters to angle of attack changes of the vehicle. Such information is crucial in design and analysis of control system performance for hypersonic vehicles. The code is also intended to be a key element in carrying out dynamic interaction studies involving the influence of vehicle vibrations on propulsion system/control system coupling and flight stability. Simple models are employed to represent the various processes comprising the propulsion system. A method of characteristics (MOC) approach is used to solve the forebody and external nozzle flow fields. This results in a very fast computational algorithm capable of carrying out the vast number of simulation computations needed in guidance, stability, and control studies. The three-dimensional fore- and aft body (nozzle) geometry is characterized by the centerline profiles as represented by a series of coordinate points and body cross-section curvature. The engine module geometry is represented by an adjustable vertical grid to accommodate variations of the field parameters throughout the inlet and combustor. The scramjet inlet is modeled as a two-dimensional supersonic flow containing adjustable sidewall wedges and multiple fuel injection struts. The inlet geometry including the sidewall wedge angles, the number of injection struts, their sweepback relative to the vehicle reference line, and strut cross-section are user selectable. Combustion is currently represented by a Rayleigh line calculation including corrections for variable gas properties; improved models are being developed for this important element of the propulsion flow field. The program generates (1) variation of thrust magnitude and direction with angle of attack, (2) pitching moment and line of action of the thrust vector, (3) pressure and temperature distributions throughout the system, and (4) performance parameters such as thrust coefficient, specific impulse, mass flow rates, and equivalence ratio. Preliminary results are in good agreement with available performance data for systems resembling the NASP vehicle configuration.
GNSS Spoofing Detection and Mitigation Based on Maximum Likelihood Estimation
Li, Hong; Lu, Mingquan
2017-01-01
Spoofing attacks are threatening the global navigation satellite system (GNSS). The maximum likelihood estimation (MLE)-based positioning technique is a direct positioning method originally developed for multipath rejection and weak signal processing. We find this method also has a potential ability for GNSS anti-spoofing since a spoofing attack that misleads the positioning and timing result will cause distortion to the MLE cost function. Based on the method, an estimation-cancellation approach is presented to detect spoofing attacks and recover the navigation solution. A statistic is derived for spoofing detection with the principle of the generalized likelihood ratio test (GLRT). Then, the MLE cost function is decomposed to further validate whether the navigation solution obtained by MLE-based positioning is formed by consistent signals. Both formulae and simulations are provided to evaluate the anti-spoofing performance. Experiments with recordings in real GNSS spoofing scenarios are also performed to validate the practicability of the approach. Results show that the method works even when the code phase differences between the spoofing and authentic signals are much less than one code chip, which can improve the availability of GNSS service greatly under spoofing attacks. PMID:28665318
GNSS Spoofing Detection and Mitigation Based on Maximum Likelihood Estimation.
Wang, Fei; Li, Hong; Lu, Mingquan
2017-06-30
Spoofing attacks are threatening the global navigation satellite system (GNSS). The maximum likelihood estimation (MLE)-based positioning technique is a direct positioning method originally developed for multipath rejection and weak signal processing. We find this method also has a potential ability for GNSS anti-spoofing since a spoofing attack that misleads the positioning and timing result will cause distortion to the MLE cost function. Based on the method, an estimation-cancellation approach is presented to detect spoofing attacks and recover the navigation solution. A statistic is derived for spoofing detection with the principle of the generalized likelihood ratio test (GLRT). Then, the MLE cost function is decomposed to further validate whether the navigation solution obtained by MLE-based positioning is formed by consistent signals. Both formulae and simulations are provided to evaluate the anti-spoofing performance. Experiments with recordings in real GNSS spoofing scenarios are also performed to validate the practicability of the approach. Results show that the method works even when the code phase differences between the spoofing and authentic signals are much less than one code chip, which can improve the availability of GNSS service greatly under spoofing attacks.
Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys
NASA Astrophysics Data System (ADS)
Takahashi, Junko; Fukunaga, Toshinori
This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.
Computer Viruses: Prevention, Detection, and Treatment
1990-03-12
executed, also carries out its covert function, potentially undetected. This class of attack earned the term "Trojan horse" from the original of Greek ... mythology , signifying a gift which conceals a malicious purpose. 1 cause harm. The offending code may be present in a code segment the user "touches," which
Using the Domain Name System to Thwart Automated Client-Based Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Taylor, Curtis R; Shue, Craig A
2011-09-01
On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less
Randomized Prediction Games for Adversarial Machine Learning.
Rota Bulo, Samuel; Biggio, Battista; Pillai, Ignazio; Pelillo, Marcello; Roli, Fabio
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.
... of the transplanted organ by the transplant recipient's immune system) in people who have received kidney, liver, or ... It works by decreasing the activity of the immune system to prevent it from attacking the transplanted organ.
... Rasuvo, Xatmep, others) to treat the symptoms of rheumatoid arthritis (RA; a condition in which the body attacks ... and CLL by killing cancer cells. It treats rheumatoid arthritis, granulomatosis with polyangiitis, and microscopic polyangiitis by blocking ...
... with daily activities, and joint damage caused by rheumatoid arthritis (a condition in which the body attacks its ... that fight infection). People who have had severe rheumatoid arthritis for a long time may have a greater ...
... and sometimes other medications to treat severe active rheumatoid arthritis (RA; a condition in which the body attacks ... to stop scales from forming. Methotrexate may treat rheumatoid arthritis by decreasing the activity of the immune system.
Ranger, Christopher M; Reding, Michael E; Oliver, Jason B; Schultz, Peter B; Moyseenko, James J; Youssef, Nadeer
2011-10-01
Ambrosia beetles (Coleoptera: Curculionidae: Scolytinae) pose a significant challenge to producers of ornamental nursery stock. Conventional insecticides are commonly used for management purposes, but plant-derived essential oils also may discourage ambrosia beetles from initiating attacks. To identify promising commercially available products, field-based efficacy trials were conducted in Ohio in 2009 and 2010 with the following products: Armorex (Soil Technologies), Cinnacure (Proguard, Inc.), EcoTrol (EcoSMART Technologies, Inc.), and Veggie Pharm (Pharm Solutions, Inc.). Potted Magnolia virginiana L. were first injected with 75 ml of 5% ethanol to ensure ambrosia beetle pressure on experimental trees. Mixtures of each product (10% in water) and a water control were applied until runoff and attacks occurring under field conditions were quantified at 1, 4, 7, and 14 d after treatment (DAT). Ambrosia beetle attacks generally increased over time but at differing rates depending on the particular treatment. In 2009, Armorex and Veggie Pharm were associated with the lowest cumulative attacks 14 DAT. In 2010, Armorex and Cinnacure were associated with the fewest attacks 14 DAT. Solid phase microextraction-gas chromatography-mass spectrometry was used to characterize the volatile compounds associated with each product. Allyl isothiocyanate, a compound with known repellent and insecticidal properties, was unique and predominant in Armorex. These experiments identified commercially available botanicals containing plant essential oils with activity against ambrosia beetles, along with demonstrating the usefulness of ethanol-injection to ensure ambrosia beetle pressure under field conditions. Characterizing the constituents of efficacious botanically based products could also lead to the development of improved botanical insecticides.
Facelock: familiarity-based graphical authentication
McLachlan, Jane L.; Renaud, Karen
2014-01-01
Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems. PMID:25024913
Aerodynamic-structural model of offwind yacht sails
NASA Astrophysics Data System (ADS)
Mairs, Christopher M.
An aerodynamic-structural model of offwind yacht sails was created that is useful in predicting sail forces. Two sails were examined experimentally and computationally at several wind angles to explore a variety of flow regimes. The accuracy of the numerical solutions was measured by comparing to experimental results. The two sails examined were a Code 0 and a reaching asymmetric spinnaker. During experiment, balance, wake, and sail shape data were recorded for both sails in various configurations. Two computational steps were used to evaluate the computational model. First, an aerodynamic flow model that includes viscosity effects was used to examine the experimental flying shapes that were recorded. Second, the aerodynamic model was combined with a nonlinear, structural, finite element analysis (FEA) model. The aerodynamic and structural models were used iteratively to predict final flying shapes of offwind sails, starting with the design shapes. The Code 0 has relatively low camber and is used at small angles of attack. It was examined experimentally and computationally at a single angle of attack in two trim configurations, a baseline and overtrimmed setting. Experimentally, the Code 0 was stable and maintained large flow attachment regions. The digitized flying shapes from experiment were examined in the aerodynamic model. Force area predictions matched experimental results well. When the aerodynamic-structural tool was employed, the predictive capability was slightly worse. The reaching asymmetric spinnaker has higher camber and operates at higher angles of attack than the Code 0. Experimentally and computationally, it was examined at two angles of attack. Like the Code 0, at each wind angle, baseline and overtrimmed settings were examined. Experimentally, sail oscillations and large flow detachment regions were encountered. The computational analysis began by examining the experimental flying shapes in the aerodynamic model. In the baseline setting, the computational force predictions were fair at both wind angles examined. Force predictions were much improved in the overtrimmed setting when the sail was highly stalled and more stable. The same trends in force prediction were seen when employing the aerodynamic-structural model. Predictions were good to fair in the baseline setting but improved in the overtrimmed configuration.
Validation of the NCC Code for Staged Transverse Injection and Computations for a RBCC Combustor
NASA Technical Reports Server (NTRS)
Ajmani, Kumud; Liu, Nan-Suey
2005-01-01
The NCC code was validated for a case involving staged transverse injection into Mach 2 flow behind a rearward facing step. Comparisons with experimental data and with solutions from the FPVortex code was then used to perform computations to study fuel-air mixing for the combustor of a candidate rocket based combined cycle engine geometry. Comparisons with a one-dimensional analysis and a three-dimensional code (VULCAN) were performed to assess the qualitative and quantitative performance of the NCC solver.
Moving Target Techniques: Leveraging Uncertainty for CyberDefense
2015-12-15
cyberattacks is a continual struggle for system managers. Attackers often need only find one vulnerability (a flaw or bug that an attacker can exploit...additional parsing code itself could have security-relevant software bugs . Dynamic Network Techniques in the dynamic network domain change the...evaluation of MT techniques can benefit from a variety of evaluation approaches, including abstract analysis, modeling and simulation, test bed
Nodes and Codes: The Reality of Cyber Warfare
2012-05-17
Nodes and Codes explores the reality of cyber warfare through the story of Stuxnet, a string of weaponized code that reached through a domain...nodes. Stuxnet served as a proof-of-concept for cyber weapons and provided a comparative laboratory to study the reality of cyber warfare from the...military powers most often associated with advanced, offensive cyber attack capabilities. The reality of cyber warfare holds significant operational
Predicting Attack-Prone Components with Source Code Static Analyzers
2009-05-01
models to determine if additional metrics are required to increase the accuracy of the model: non-security SCSA warnings, code churn and size, the count...code churn and size, the count of faults found manually during development, and the measure of coupling between components. The dependent variable...is the count of vulnerabilities reported by testing and those found in the field. We evaluated our model on three commercial telecommunications
NASA Technical Reports Server (NTRS)
Chaderjian, N. M.
1986-01-01
A computer code is under development whereby the thin-layer Reynolds-averaged Navier-Stokes equations are to be applied to realistic fighter-aircraft configurations. This transonic Navier-Stokes code (TNS) utilizes a zonal approach in order to treat complex geometries and satisfy in-core computer memory constraints. The zonal approach has been applied to isolated wing geometries in order to facilitate code development. Part 1 of this paper addresses the TNS finite-difference algorithm, zonal methodology, and code validation with experimental data. Part 2 of this paper addresses some numerical issues such as code robustness, efficiency, and accuracy at high angles of attack. Special free-stream-preserving metrics proved an effective way to treat H-mesh singularities over a large range of severe flow conditions, including strong leading-edge flow gradients, massive shock-induced separation, and stall. Furthermore, lift and drag coefficients have been computed for a wing up through CLmax. Numerical oil flow patterns and particle trajectories are presented both for subcritical and transonic flow. These flow simulations are rich with complex separated flow physics and demonstrate the efficiency and robustness of the zonal approach.
Cluster headache: present and future therapy.
Leone, Massimo; Giustiniani, Alessandro; Cecchini, Alberto Proietti
2017-05-01
Cluster headache is characterized by severe, unilateral headache attacks of orbital, supraorbital or temporal pain lasting 15-180 min accompanied by ipsilateral lacrimation, rhinorrhea and other cranial autonomic manifestations. Cluster headache attacks need fast-acting abortive agents because the pain peaks very quickly; sumatriptan injection is the gold standard acute treatment. First-line preventative drugs include verapamil and carbolithium. Other drugs demonstrated effective in open trials include topiramate, valproic acid, gabapentin and others. Steroids are very effective; local injection in the occipital area is also effective but its prolonged use needs caution. Monoclonal antibodies against calcitonin gene-related peptide are under investigation as prophylactic agents in both episodic and chronic cluster headache. A number of neurostimulation procedures including occipital nerve stimulation, vagus nerve stimulation, sphenopalatine ganglion stimulation and the more invasive hypothalamic stimulation are employed in chronic intractable cluster headache.
Serotonin₂A/C receptors mediate the aggressive phenotype of TLX gene knockout mice.
Juárez, Pablo; Valdovinos, Maria G; May, Michael E; Lloyd, Blair P; Couppis, Maria H; Kennedy, Craig H
2013-11-01
Deleting the tailless (TLX) gene in mice produces a highly aggressive phenotype yet to be characterized in terms of heterozygous animals or neurotransmitter mechanisms. We sought to establish pharmacological control over aggression and study the role of serotonin (5-HT)(2A/C) receptors in mediating changes in aggression. We analyzed aggression in mice heterozygous (+/-) or homozygous (-/-) for the TLX gene and wild-types (+/+) using a resident-intruder paradigm. No +/+ mice were aggressive, 36% of +/- TLX and 100% of -/- TLX mice showed aggression. Dose-effect functions were established for clozapine (0.1-1.5mg/kg, ip), ketanserin (0.3-1.25 mg/kg, ip), and (±)-1-(2,5-dimethoxy-4-iodophenyl)-2-aminopropane [(±)DOI] (0.5-2.0 mg/kg, ip). Injecting clozapine decreased the frequency and duration of attacks for +/- TLX and -/- TLX mice. Clozapine did not decrease grooming in either +/- TLX or -/- TLX mice but may have increased locomotion for -/- TLX mice. Injecting ketanserin, a 5-HT(2A/C) receptor antagonist, produced differential decreases in frequency and latency to aggression between genotypes and corresponding increases in locomotor behavior. Injecting (±)DOI, a 5-HT(2A/C) receptor agonist, increased the frequency and duration of attacks, decreased the latency to attacks, and decreased locomotion in +/- and -/- TLX mice. Results of the current study suggest aggression displayed by TLX null and heterozygous mice involves 5-HT(2A/C) receptors. Copyright © 2013 Elsevier B.V. All rights reserved.
Time trend of injection drug errors before and after implementation of bar-code verification system.
Sakushima, Ken; Umeki, Reona; Endoh, Akira; Ito, Yoichi M; Nasuhara, Yasuyuki
2015-01-01
Bar-code technology, used for verification of patients and their medication, could prevent medication errors in clinical practice. Retrospective analysis of electronically stored medical error reports was conducted in a university hospital. The number of reported medication errors of injected drugs, including wrong drug administration and administration to the wrong patient, was compared before and after implementation of the bar-code verification system for inpatient care. A total of 2867 error reports associated with injection drugs were extracted. Wrong patient errors decreased significantly after implementation of the bar-code verification system (17.4/year vs. 4.5/year, p< 0.05), although wrong drug errors did not decrease sufficiently (24.2/year vs. 20.3/year). The source of medication errors due to wrong drugs was drug preparation in hospital wards. Bar-code medication administration is effective for prevention of wrong patient errors. However, ordinary bar-code verification systems are limited in their ability to prevent incorrect drug preparation in hospital wards.
Comparing Turbulence Simulation with Experiment in DIII-D
NASA Astrophysics Data System (ADS)
Ross, D. W.; Bravenec, R. V.; Dorland, W.; Beer, M. A.; Hammett, G. W.; McKee, G. R.; Murakami, M.; Jackson, G. L.
2000-10-01
Gyrofluid simulations of DIII-D discharges with the GRYFFIN code(D. W. Ross et al.), Transport Task Force Workshop, Burlington, VT, (2000). are compared with transport and fluctuation measurements. The evolution of confinement-improved discharges(G. R. McKee et al.), Phys. Plasmas 7, 1870 (200) is studied at early times following impurity injection, when EXB rotational shear plays a small role. The ion thermal transport predicted by the code is consistent with the experimental values. Experimentally, changes in density profiles resulting from the injection of neon, lead to reduction in fluctuation levels and transport following the injection. This triggers subsequent changes in the shearing rate that further reduce the turbulence.(M. Murakami et al.), European Physical Society, Budapest (2000); M. Murakami et al., this meeting. Estimated uncertainties in the plasma profiles, however, make it difficult to simulate these reductions with the code. These cases will also be studied with the GS2 gyrokinetic code.
Subclinical endophthalmitis following a rooster attack.
Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M
2006-12-01
Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.
PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure
NASA Astrophysics Data System (ADS)
Kaminsky, Dan; Patterson, Meredith L.; Sassaman, Len
Research unveiled in December of 2008 [15] showed how MD5's long-known flaws could be actively exploited to attack the real-worldCertification Authority infrastructure. In this paper, we demonstrate two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the primary root certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We also draw particular attention to two possibly unrecognized vectors for implementation flaws that have been problematic in the past: the ASN.1 BER decoder required to parsePKCS#10, and the potential for SQL injection fromtext contained within its requests. Finally, we explore why the implications of these attacks are broader than some have realized - first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only intended to stop phishing attacks from names similar to trusted brands. As per the work of Adam Barth and Collin Jackson [4], EV does not prevent an attacker who can synthesize or acquire a "low assurance" certificate for a given name from acquiring the "green bar" EV experience.
The effects of rotational flow, viscosity, thickness, and shape on transonic flutter dip phenomena
NASA Technical Reports Server (NTRS)
Reddy, T. S. R.; Srivastava, Rakesh; Kaza, Krishna Rao V.
1988-01-01
The transonic flutter dip phenomena on thin airfoils, which are employed for propfan blades, is investigated using an integrated Euler/Navier-Stokes code and a two degrees of freedom typical section structural model. As a part of the code validation, the flutter characteristics of the NACA 64A010 airfoil are also investigated. In addition, the effects of artificial dissipation models, rotational flow, initial conditions, mean angle of attack, viscosity, airfoil thickness and shape on flutter are investigated. The results obtained with a Euler code for the NACA 64A010 airfoil are in reasonable agreement with published results obtained by using transonic small disturbance and Euler codes. The two artificial dissipation models, one based on the local pressure gradient scaled by a common factor and the other based on the local pressure gradient scaled by a spectral radius, predicted the same flutter speeds except in the recovery region for the case studied. The effects of rotational flow, initial conditions, mean angle of attack, and viscosity for the Reynold's number studied seem to be negligible or small on the minima of the flutter dip.
A Combinatorial Geometry Computer Description of the MEP-021A Generator Set
1979-02-01
Generator Computer Description Gasoline Generator GIFT MEP-021A 20. ABSTRACT fCbntteu* an rararaa eta* ft namamwaay anal Identify by block number) This... GIFT code is also stored on magnetic tape for future vulnerability analysis. 00,] *7,1473 EDITION OF • NOV 65 IS OBSOLETE UNCLASSIFIED SECURITY...the Geometric Information for Targets ( GIFT ) computer code. The GIFT code traces shotlines through a COM-GEOM description from any specified attack
Acupoint injection of onabotulinumtoxin A for migraines.
Hou, Min; Xie, Jun-Fan; Kong, Xiang-Pan; Zhang, Yi; Shao, Yu-Feng; Wang, Can; Ren, Wen-Ting; Cui, Guang-Fu; Xin, Le; Hou, Yi-Ping
2015-10-30
Onabotulinumtoxin A (BoNTA) has been reported to be effective in the therapy for migraines. Acupuncture has been used worldwide for the treatment of migraine attacks. Injection of a small amount of drug at acupuncture points is an innovation as compared to traditional acupuncture. The purpose of this study was to evaluate and compare the effectiveness of fixed (muscle)-site and acupoint-site injections of BoNTA for migraine therapy in a randomized, double-blinded, placebo-controlled clinical trial extending over four months. Subjects with both episodic and chronic migraines respectively received a placebo (n = 19) or BoNTA (2.5 U each site, 25 U per subject) injection at fixed-sites (n = 41) including occipitofrontalis, corrugator supercilii, temporalis and trapeziue, or at acupoint-sites (n = 42) including Yintang (EX-HN3), Taiyang (EX-HN5), Baihui (GV20), Shuaigu (GB8), Fengchi (GB20) and Tianzhu (BL10). The variations between baseline and BoNTA post-injection for four months were calculated monthly as outcome measures. BoNTA injections at fixed-sites and acupoint-sites significantly reduced the migraine attack frequency, intensity, duration and associated symptoms for four months compared with placebo (p < 0.01). The efficacy of BoNTA for migraines in the acupoint-site group (93% improvement) was more significant than that in the fixed-site group (85% improvement) (p < 0.01). BoNTA administration for migraines is effective, and at acupoint-sites shows more efficacy than at fixed-sites. Further blinded studies are necessary to establish the efficacy of a low dose toxin (25 U) introduced with this methodology in chronic and episodic migraines.
Acupoint Injection of Onabotulinumtoxin A for Migraines
Hou, Min; Xie, Jun-Fan; Kong, Xiang-Pan; Zhang, Yi; Shao, Yu-Feng; Wang, Can; Ren, Wen-Ting; Cui, Guang-Fu; Xin, Le; Hou, Yi-Ping
2015-01-01
Onabotulinumtoxin A (BoNTA) has been reported to be effective in the therapy for migraines. Acupuncture has been used worldwide for the treatment of migraine attacks. Injection of a small amount of drug at acupuncture points is an innovation as compared to traditional acupuncture. The purpose of this study was to evaluate and compare the effectiveness of fixed (muscle)-site and acupoint-site injections of BoNTA for migraine therapy in a randomized, double-blinded, placebo-controlled clinical trial extending over four months. Subjects with both episodic and chronic migraines respectively received a placebo (n = 19) or BoNTA (2.5 U each site, 25 U per subject) injection at fixed-sites (n = 41) including occipitofrontalis, corrugator supercilii, temporalis and trapeziue, or at acupoint-sites (n = 42) including Yintang (EX-HN3), Taiyang (EX-HN5), Baihui (GV20), Shuaigu (GB8), Fengchi (GB20) and Tianzhu (BL10). The variations between baseline and BoNTA post-injection for four months were calculated monthly as outcome measures. BoNTA injections at fixed-sites and acupoint-sites significantly reduced the migraine attack frequency, intensity, duration and associated symptoms for four months compared with placebo (p < 0.01). The efficacy of BoNTA for migraines in the acupoint-site group (93% improvement) was more significant than that in the fixed-site group (85% improvement) (p < 0.01). BoNTA administration for migraines is effective, and at acupoint-sites shows more efficacy than at fixed-sites. Further blinded studies are necessary to establish the efficacy of a low dose toxin (25 U) introduced with this methodology in chronic and episodic migraines. PMID:26529014
Palmieri, L.; Barchielli, A.; Cesana, G.; de Campora, E.; Goldoni, C.A.; Spolaore, P.; Uguccioni, M.; Vancheri, F.; Vanuzzo, D.; Ciccarelli, P.; Giampaoli, S.
2007-01-01
Background The Italian register of cardiovascular diseases is a surveillance system of fatal and nonfatal cardiovascular events in the general population aged 35–74 years. It was launched in Italy at the end of the 1990s with the aim of estimating periodically the occurrence and case fatality rate of coronary and cerebrovascular events in the different geographical areas of the country. This paper presents data for cerebrovascular events. Methods Currentevents were assessed through record linkage between two sources of information: death certificates and hospital discharge diagnosis records. Events were identified through the ICD codes and duration. To calculate the number of estimated events, current events were multiplied by the positive predictive value of each specific mortality or discharge code derived from the validation of a sample of suspected events. Attack rates were calculated by dividing estimatedevents by resident population, and case fatality rate at 28 days was determined from the ratio of estimated fatal to total events. Results Attack rates were found to be higher in men than in women: mean age-standardized attack rate was 21.9/10,000 in men and 12.5/10,000 in women; age-standardized 28-day case fatality rate was higher in women (17.1%) than in men (14.5%). Significant geographical differences were found in attack rates of both men and women. Case fatality was significantly heterogeneous in both men and women. Conclusions Differences still exist in the geographical distribution of attack and case fatality rates of cerebrovascular events, regardless of the north-south gradient. These data show the feasibility of implementing a population-based register using a validated routine database, necessary for monitoring cardiovascular diseases. PMID:17971632
Krymchantowski, Abouch Valenty; Carneiro, Henrique; Barbosa, Jackeline; Jevoux, Carla
2008-06-01
Nonsteroidal anti-inflammatory drugs (NSAID) are effective to treat migraine attacks. Lysine clonixinate (LC) and dipyrone (metamizol) have been proven effective to treat acute migraine. The aim of this study was to evaluate the efficacy and tolerability of the intravenous formulations of LC and dipyrone in the treatment of severe migraine attacks. Thirty patients (28 women, 2 men), aged 18 to 48 years with migraine according the International Headache Society (IHS) (2004) were studied. The patients were randomized into 2 groups when presenting to an emergency department with a severe migraine attack. The study was single-blind. Headache intensity, nausea, photophobia and side effects were evaluated at 0, 30, 60 and 90 minutes after the drug administration. Rectal indomethacin as rescue medication (RM) was available after 2 hours and its use compared between groups. All patients completed the study. At 30 minutes, 0% of the dipyrone group 13% of the LC group were pain free (p=0.46). At 60 and 90 minutes, 2 (13%) and 5 (33%) patients from the dipyrone group and 11 (73%) and 13 (86.7%) patients from the LC group were pain free (p<0.001). At 60 minutes, significantly more patients from the LC group were nausea-free (p<0.001). Regarding photophobia, there were no differences between groups at 60 minutes (p=0.11). The use of RM at 2 hours did not differ among groups (p=0.50). Pain in the site of the injection was reported by more patients of the LC group compared to the dipyrone group (p<0.0001). LC is significantly superior to dipyrone in treating severe migraine attacks. LC promotes significantly more burning at the site of the injection.
Müller, J-M V; Wissemann, J; Meli, M L; Dasen, G; Lutz, H; Heinzerling, L; Feige, K
2011-11-01
Whole blood pharmacokinetics of intratumourally injected naked plasmid DNA coding for equine Interleukin 12 (IL-12) was assessed as a means of in vivo gene transfer in the treatment of melanoma in grey horses. The expression of induced interferon gamma (IFN-g) was evaluated in order to determine the pharmacodynamic properties of in vivo gene transduction. Seven grey horses bearing melanoma were injected intratumourally with 250 µg naked plasmid DNA coding for IL-12. Peripheral blood and biopsies from the injection site were taken at 13 time points until day 14 post injection (p.i.). Samples were analysed using quantitative real-time PCR. Plasmid DNA was quantified in blood samples and mRNA expression for IFN-g in tissue samples. Plasmid DNA showed fast elimination kinetics with more than 99 % of the plasmid disappearing within 36 hours. IFN-g expression increased quickly after IL-12 plasmid injection, but varied between individual horses. Intratumoural injection of plasmid DNA is a feasible method for inducing transgene expression in vivo. Biological activity of the transgene IL-12 was confirmed by measuring expression of IFN-g.
Peter, Frank J.; Dalton, Larry J.; Plummer, David W.
2002-01-01
A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.
Muscarine- and carbachol-induced aggressions: fear and irritable kinds of aggressions.
Beleslin, D B; Samardzić, R
1977-12-28
In unaneasthetized and unrestrained cats, muscarine and carbachol were injected into the cerebral ventricles. The kind of aggressive behaviour depended on the cholinomimetic drug and was classified as fear and an irritable kind of aggression. Muscarine induced the fear kind of aggression. The aggressive behaviour was usually preceded by attempts to escape and the attack was relevant to the situation. For the attack the presence of some threatening agent was needed. The aggression was accompanied by intense motor but less autonomic activation. On the other hand, carbachol induced an irritable kind of aggression and had the following characteristics: for the attack the presence of some threatening agent was not needed; the attack was not relevant to the situation; the aggression was not preceded by attempts to escape; and the aggressive behaviour was accompanied by intense motor and autonomic activation. It is concluded that cholinoceptive mechanisms are involved in the control of aggressive behaviour.
A-7 Aloft Demonstration Flight Test Plan
1975-09-01
6095979 72A2130 Power Supply 12 VDC 6095681 72A29 NOC 72A30 ALOFT ASCU Adapter Set 72A3100 ALOFT ASCU Adapter L20-249-1 72A3110 Page assy L Bay and ASCU ...checks will also be performed for each of the following: 3.1.2.1.1 ASCU Codes. Verification will be made that all legal ASCU codes are recognized and...invalid codes inhibit attack mode. A check will also be made to verify that the ASCU codes for pilot-option weapons A-25 enable the retarded weapons
Effect of 7 July 2005 terrorist attacks in London on suicide in England and Wales.
Salib, Emad; Cortina-Borja, Mario
2009-01-01
A reduction in suicide in England and Wales has been reported after the attacks of 11 September 2001 in the USA. It may be plausible therefore to expect a much greater impact on suicide in the UK in response to the events of 7 July 2005, caused by the first suicide terrorist attack by Islamic extremists on British soil. To examine the effect of the 7 July 2005 terrorist attacks in London on suicide rates in England and Wales. Analysis of number of suicide (ICD-10 codes X60-X84) and undetermined injury deaths (ICD-10 codes Y10-Y34) reported in England and Wales in the 12 weeks before and after 7 July 2005. We used Shewhart Control Charts based on Poisson rates to explore adjusted daily and weekly suicide rates and rate differences with respect to 7 July 2005. A brief but significant reduction in daily suicide rate was observed a few days after the terrorist attack in London on 7 July 2005. Further reduction was also observed on the 21 July 2005, coinciding with the second wave of attacks. No similar reduction in suicide was seen during the same period in the previous 4 years. Poisson regression models with indicator variables for each day in July 2005 revealed a reduction of 40% of the expected daily rate for these 2 days only. We found no evidence of any longer-term effect on suicide. The study findings are contrary to our expectation and only weakly support Durkheim's theory that periods of national threat lower the suicide rate through the impact on social cohesion. It is possible that previous experience of IRA terrorism in the UK may have limited the effect of the 7 July 2005 attacks on suicide in England and Wales. The shock value of suicide terrorism and its psychological potency appear to diminish over time as the tactic becomes overused.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beaver, Justin M; Borges, Raymond Charles; Buckner, Mark A
Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in amore » critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.« less
SUNCT and SUNA: Recognition and Treatment.
Pareja, Juan A; Alvarez, Mónica; Montojo, Teresa
2013-02-01
The problem of short-lasting unilateral neuralgiform headache attacks with conjunctival injection and tearing (SUNCT) and short-lasting unilateral neuralgiform headache attacks with cranial autonomic symptoms (SUNA) management remains unsolved. Despite a myriad of therapeutic trials, no convincingly effective remedy for SUNCT and SUNA is available at present. Based on open-label communications, some patients seemed to benefit from some pharmacologic, interventional, or invasive procedures. Possible effective preventive drugs are carbamazepine, lamotrigine, gabapentin, and topiramate. At present, the drug of choice for SUNCT seems to be lamotrigine whereas SUNA may better respond to gabapentin. There is no available abortive treatment for the individual attacks. During the worst periods, intravenous lidocaine may decrease the flow of SUNCT/SUNA attacks. In SUNCT, bilateral blockade of the greater occipital nerve, and superior cervical ganglion opioid blockade have been reported as temporary/partially effective in one patient each. Botulinum toxin injected around the symptomatic orbit provided sustained relief to one patient. Owing to the scarcity of reports the results of these interventions should be taken as preliminary. Invasive therapy with interventions directed to the first division of the trigeminal nerve or Gasserian ganglion, with local anesthetics or alcohol, radiofrequency thermocoagulation, microvascular decompression, and gamma-knife neurosurgery, have been tried in the treatment of refractory SUNCT. Some patients seemed to benefit from such interventions, but one should still have a critical attitude to these claims since no convincing results have been obtained as yet. The few SUNCT patients who underwent deep brain hypothalamic stimulation obtained a substantial and persistent relief.
NASA Astrophysics Data System (ADS)
Taiwo, Ambali; Alnassar, Ghusoon; Bakar, M. H. Abu; Khir, M. F. Abdul; Mahdi, Mohd Adzir; Mokhtar, M.
2018-05-01
One-weight authentication code for multi-user quantum key distribution (QKD) is proposed. The code is developed for Optical Code Division Multiplexing (OCDMA) based QKD network. A unique address assigned to individual user, coupled with degrading probability of predicting the source of the qubit transmitted in the channel offer excellent secure mechanism against any form of channel attack on OCDMA based QKD network. Flexibility in design as well as ease of modifying the number of users are equally exceptional quality presented by the code in contrast to Optical Orthogonal Code (OOC) earlier implemented for the same purpose. The code was successfully applied to eight simultaneous users at effective key rate of 32 bps over 27 km transmission distance.
NASA Technical Reports Server (NTRS)
Rivers, Melissa; Hunter, Craig; Vatsa, Veer
2017-01-01
Two Navier-Stokes codes were used to compute flow over the High-Lift Common Research Model (HL-CRM) in preparation for a wind tunnel test to be performed at the NASA Langley Research Center 14-by-22-Foot Subsonic Tunnel in fiscal year 2018. Both flight and wind tunnel conditions were simulated by the two codes at set Mach numbers and Reynolds numbers over a full angle-of-attack range for three configurations: cruise, landing and takeoff. Force curves, drag polars and surface pressure contour comparisons are shown for the two codes. The lift and drag curves compare well for the cruise configuration up to 10deg angle of attack but not as well for the other two configurations. The drag polars compare reasonably well for all three configurations. The surface pressure contours compare well for some of the conditions modeled but not as well for others.
Facility Targeting, Protection and Mission Decision Making Using the VISAC Code
NASA Technical Reports Server (NTRS)
Morris, Robert H.; Sulfredge, C. David
2011-01-01
The Visual Interactive Site Analysis Code (VISAC) has been used by DTRA and several other agencies to aid in targeting facilities and to predict the associated collateral effects for the go, no go mission decision making process. VISAC integrates the three concepts of target geometric modeling, damage assessment capabilities, and an event/fault tree methodology for evaluating accident/incident consequences. It can analyze a variety of accidents/incidents at nuclear or industrial facilities, ranging from simple component sabotage to an attack with military or terrorist weapons. For nuclear facilities, VISAC predicts the facility damage, estimated downtime, amount and timing of any radionuclides released. Used in conjunction with DTRA's HPAC code, VISAC also can analyze transport and dispersion of the radionuclides, levels of contamination of the surrounding area, and the population at risk. VISAC has also been used by the NRC to aid in the development of protective measures for nuclear facilities that may be subjected to attacks by car/truck bombs.
QR code-based non-linear image encryption using Shearlet transform and spiral phase transform
NASA Astrophysics Data System (ADS)
Kumar, Ravi; Bhaduri, Basanta; Hennelly, Bryan
2018-02-01
In this paper, we propose a new quick response (QR) code-based non-linear technique for image encryption using Shearlet transform (ST) and spiral phase transform. The input image is first converted into a QR code and then scrambled using the Arnold transform. The scrambled image is then decomposed into five coefficients using the ST and the first Shearlet coefficient, C1 is interchanged with a security key before performing the inverse ST. The output after inverse ST is then modulated with a random phase mask and further spiral phase transformed to get the final encrypted image. The first coefficient, C1 is used as a private key for decryption. The sensitivity of the security keys is analysed in terms of correlation coefficient and peak signal-to noise ratio. The robustness of the scheme is also checked against various attacks such as noise, occlusion and special attacks. Numerical simulation results are shown in support of the proposed technique and an optoelectronic set-up for encryption is also proposed.
NASA Technical Reports Server (NTRS)
Denning, Peter J.
1989-01-01
In November 1988 a worm program invaded several thousand UNIX-operated Sun workstations and VAX computers attached to the Research Internet, seriously disrupting service for several days but damaging no files. An analysis of the work's decompiled code revealed a battery of attacks by a knowledgeable insider, and demonstrated a number of security weaknesses. The attack occurred in an open network, and little can be inferred about the vulnerabilities of closed networks used for critical operations. The attack showed that passwork protection procedures need review and strengthening. It showed that sets of mutually trusting computers need to be carefully controlled. Sharp public reaction crystalized into a demand for user awareness and accountability in a networked world.
NASA Technical Reports Server (NTRS)
Micol, John R.
1992-01-01
Pressure distributions measured on a 60 degree half-angle elliptic cone, raked off at an angle of 73 degrees from the cone centerline and having an ellipsoid nose (ellipticity equal to 2.0 in the symmetry plane) are presented for angles of attack from -10 degrees to 10 degrees. The high normal shock density ratio aspect of a real gas was simulated by testing in Mach 6 air and CF sub 4 (density ratio equal to 5.25 and 12.0, respectively). The effects of Reynolds number, angle of attack, and normal shock density ratio on these measurements are examined, and comparisons with a three dimensional Euler code known as HALIS are made. A significant effect of density ratio on pressure distributions on the cone section of the configuration was observed; the magnitude of this effect decreased with increasing angle of attack. The effect of Reynolds number on pressure distributions was negligible for forebody pressure distributions, but a measurable effect was noted on base pressures. In general, the HALIS code accurately predicted the measured pressure distributions in air and CF sub 4.
Yasuda, Makiko; Gan, Lin; Chen, Brenden; Kadirvel, Senkottuvelan; Yu, Chunli; Phillips, John D; New, Maria I; Liebow, Abigail; Fitzgerald, Kevin; Querbes, William; Desnick, Robert J
2014-05-27
The acute hepatic porphyrias are inherited disorders of heme biosynthesis characterized by life-threatening acute neurovisceral attacks. Factors that induce the expression of hepatic 5-aminolevulinic acid synthase 1 (ALAS1) result in the accumulation of the neurotoxic porphyrin precursors 5-aminolevulinic acid (ALA) and porphobilinogen (PBG), which recent studies indicate are primarily responsible for the acute attacks. Current treatment of these attacks involves i.v. administration of hemin, but a faster-acting, more effective, and safer therapy is needed. Here, we describe preclinical studies of liver-directed small interfering RNAs (siRNAs) targeting Alas1 (Alas1-siRNAs) in a mouse model of acute intermittent porphyria, the most common acute hepatic porphyria. A single i.v. dose of Alas1-siRNA prevented the phenobarbital-induced biochemical acute attacks for approximately 2 wk. Injection of Alas1-siRNA during an induced acute attack significantly decreased plasma ALA and PBG levels within 8 h, more rapidly and effectively than a single hemin infusion. Alas1-siRNA was well tolerated and a therapeutic dose did not cause hepatic heme deficiency. These studies provide proof-of-concept for the clinical development of RNA interference therapy for the prevention and treatment of the acute attacks of the acute hepatic porphyrias.
The analysis of a nonsimilar laminar boundary layer
NASA Technical Reports Server (NTRS)
Stalmach, D. D.; Bertin, J. J.
1978-01-01
A computer code is described which yields accurate solutions for a broad range of laminar, nonsimilar boundary layers, providing the inviscid flow field is known. The boundary layer may be subject to mass injection for perfect-gas, nonreacting flows. If no mass injection is present, the code can be used with either perfect-gas or real-gas thermodynamic models. Solutions, ranging from two-dimensional similarity solutions to solutions for the boundary layer on the Space Shuttle Orbiter during reentry conditions, have been obtained with the code. Comparisons of these solutions, and others, with solutions presented in the literature; and with solutions obtained from other codes, demonstrate the accuracy of the present code.
NASA Technical Reports Server (NTRS)
Eklund, Dean R.; Northam, G. B.; Mcdaniel, J. C.; Smith, Cliff
1992-01-01
A CFD (Computational Fluid Dynamics) competition was held at the Third Scramjet Combustor Modeling Workshop to assess the current state-of-the-art in CFD codes for the analysis of scramjet combustors. Solutions from six three-dimensional Navier-Stokes codes were compared for the case of staged injection of air behind a step into a Mach 2 flow. This case was investigated experimentally at the University of Virginia and extensive in-stream data was obtained. Code-to-code comparisons have been made with regard to both accuracy and efficiency. The turbulence models employed in the solutions are believed to be a major source of discrepancy between the six solutions.
Computation of asymmetric supersonic flows around cones at large incidence
NASA Technical Reports Server (NTRS)
Degani, David
1987-01-01
The Schiff-Steger parabolized Navier-Stokes (PNS) code has been modified to allow computation of conical flowfields around cones at high incidence. The improved algorithm of Degani and Schiff has been incorporated with the PNS code. This algorithm adds the cross derivative and circumferential viscous terms to the original PNS code and modifies the algebraic eddy viscosity turbulence model to take into account regions of so called cross-flow separation. Assuming the flowfield is conical (but not necessarily symmetric) a marching stepback procedure is used: the solution is marched one step downstream using improved PNS code and the flow variables are then scaled to place the solution back to the original station. The process is repeated until no change in the flow variables is observed with further marching. The flow variables are then constant along rays of the flowfield. The experiments obtained by Bannik and Nebbeling were chosen as a test case. In these experiments a cone of 7.5 deg. half angle at Mach number 2.94 and Reynolds number 1.372 x 10(7) was tested up 34 deg. angle of attack. At high angle of attack nonconical asymmetric leeward side vortex patterns were observed. In the first set of computations, using an earlier obtained solution of the above cone for angle of attack of 22.6 deg. and at station x=0.5 as a starting solution, the angle of attack was gradually increased up to 34 deg. During this procedure the grid was carfully adjusted to capture the bow shock. A stable, converged symmetric solution was obtained. Since the numerical code converged to a symmetric solution which is not the physical one, the stability was tested by a random perturbation at each point. The possible effect of surface roughness or non perfect body shape was also investigated. It was concluded that although the assumption of conical viscous flows can be very useful for certain cases, it can not be used for the present case. Thus the second part of the investigation attempted to obtain a marching (in space) solution with the PNS method using the conical solution as initial data. Finally, the solution of the full Navier-Stokes equations was carried out.
Plotkin, Marian; Vaibavi, Srirangam Ramanujam; Rufaihah, Abdul Jalil; Nithya, Venkateswaran; Wang, Jing; Shachaf, Yonatan; Kofidis, Theo; Seliktar, Dror
2014-02-01
This study compares the effect of four injectable hydrogels with different mechanical properties on the post-myocardial infarction left ventricle (LV) remodeling process. The bioactive hydrogels were synthesized from Tetronic-fibrinogen (TF) and PEG-fibrinogen (PF) conjugates; each hydrogel was supplemented with two levels of additional cross-linker to increase the matrix stiffness as measured by the shear storage modulus (G'). Infarcts created by ligating the left anterior descending coronary artery in a rodent model were treated with the hydrogels, and all four treatment groups showed an increase in wall thickness, arterial density, and viable cardiac tissue in the peri-infarct areas of the LV. Echocardiography and hemodynamics data of the PF/TF treated groups showed significant improvement of heart function associated with the attenuated effects of the remodeling process. Multi-factorial regression analysis indicated that the group with the highest modulus exhibited the best rescue of heart function and highest neovascularization. The results of this study demonstrate that multiple properties of an injectable bioactive biomaterial, and notably the matrix stiffness, provide the multifaceted stimulation necessary to preserve cardiac function and prevent adverse remodeling following a heart attack. Copyright © 2013 Elsevier Ltd. All rights reserved.
Deterring watermark collusion attacks using signal processing techniques
NASA Astrophysics Data System (ADS)
Lemma, Aweke N.; van der Veen, Michiel
2007-02-01
Collusion attack is a malicious watermark removal attack in which the hacker has access to multiple copies of the same content with different watermarks and tries to remove the watermark using averaging. In the literature, several solutions to collusion attacks have been reported. The main stream solutions aim at designing watermark codes that are inherently resistant to collusion attacks. The other approaches propose signal processing based solutions that aim at modifying the watermarked signals in such a way that averaging multiple copies of the content leads to a significant degradation of the content quality. In this paper, we present signal processing based technique that may be deployed for deterring collusion attacks. We formulate the problem in the context of electronic music distribution where the content is generally available in the compressed domain. Thus, we first extend the collusion resistance principles to bit stream signals and secondly present experimental based analysis to estimate a bound on the maximum number of modified versions of a content that satisfy good perceptibility requirement on one hand and destructive averaging property on the other hand.
Injecting Artificial Memory Errors Into a Running Computer Program
NASA Technical Reports Server (NTRS)
Bornstein, Benjamin J.; Granat, Robert A.; Wagstaff, Kiri L.
2008-01-01
Single-event upsets (SEUs) or bitflips are computer memory errors caused by radiation. BITFLIPS (Basic Instrumentation Tool for Fault Localized Injection of Probabilistic SEUs) is a computer program that deliberately injects SEUs into another computer program, while the latter is running, for the purpose of evaluating the fault tolerance of that program. BITFLIPS was written as a plug-in extension of the open-source Valgrind debugging and profiling software. BITFLIPS can inject SEUs into any program that can be run on the Linux operating system, without needing to modify the program s source code. Further, if access to the original program source code is available, BITFLIPS offers fine-grained control over exactly when and which areas of memory (as specified via program variables) will be subjected to SEUs. The rate of injection of SEUs is controlled by specifying either a fault probability or a fault rate based on memory size and radiation exposure time, in units of SEUs per byte per second. BITFLIPS can also log each SEU that it injects and, if program source code is available, report the magnitude of effect of the SEU on a floating-point value or other program variable.
2013-02-14
L acts to “provided resources for national and joint kinetic attack requirements.”24 Additionally, the Marine Corps Force Structure Review Group...for unusual system activity and searching for signs of known malware, unlike what is depicted in movies such as Hackers, where opposing cyber...never admitted involvement but the attacks originated in Russia. The FBI code name for the inquiry was Moonlight Maze. 29. Jeffrey Carr, Inside Cyber
A numerical analysis of the British Experimental Rotor Program blade
NASA Technical Reports Server (NTRS)
Duque, Earl P. N.
1989-01-01
Two Computational Fluid Dynamic codes which solve the compressible full-potential and the Reynolds-Averaged Thin-Layer Navier-Stokes equations were used to analyze the nonrotating aerodynamic characteristics of the British Experimental Rotor Program (BERP) helicopter blade at three flow regimes: low angle of attack, high angle of attack and transonic. Excellent agreement was found between the numerical results and experiment. In the low angle of attack regime, the BERP had less induced drag than a comparable aspect ratio rectangular planform wing. At high angle of attack, the blade attained high-lift by maintaining attached flow at the outermost spanwise locations. In the transonic regime, the BERP design reduces the shock strength at the outer spanwise locations which affects wave drag and shock-induced separation. Overall, the BERP blade exhibited many favorable aerodynamic characteristics in comparison to conventional helicopter rotor blades.
NASA Technical Reports Server (NTRS)
Zoby, E. V.
1981-01-01
An engineering method has been developed for computing the windward-symmetry plane convective heat-transfer rates on Shuttle-like vehicles at large angles of attack. The engineering code includes an approximate inviscid flowfield technique, laminar and turbulent heating-rate expressions, an approximation to account for the variable-entropy effects on the surface heating and the concept of an equivalent axisymmetric body to model the windward-ray flowfields of Shuttle-like vehicles at angles of attack from 25 to 45 degrees. The engineering method is validated by comparing computed heating results with corresponding experimental data measured on Shuttle and advanced transportation models over a wide range of flow conditions and angles of attack from 25 to 40 degrees and also with results of existing prediction techniques. The comparisons are in good agreement.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-06
..., ado- K2 $29.40 trastuzumab emtansine, 1 mg. C9736 Laparoscopy, G2 2,010.57 surgical, radiofrequency... Injection, K2 545.44 Doxorubicin Hydrochloride, Liposomal, Not Otherwise Specified, 10 mg. Q2051 Injection, K2 196.42 Zoledronic Acid, Not Otherwise Specified, 1 mg. * Note: HCPCS code Q2050 replaced code...
Metrics for Assessment of Smart Grid Data Integrity Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Miles McQueen; Russell Bent
2012-07-01
There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less
Dopaminergic regulation of sleep and cataplexy in a murine model of narcolepsy.
Burgess, Christian R; Tse, Gavin; Gillis, Lauren; Peever, John H
2010-10-01
To determine if the dopaminergic system modulates cataplexy, sleep attacks and sleep-wake behavior in narcoleptic mice. Hypocretin/orexin knockout (i.e., narcoleptic) and wild-type mice were administered amphetamine and specific dopamine receptor modulators to determine their effects on sleep, cataplexy and sleep attacks. Hypocretin knockout (n = 17) and wild-type mice (n = 21). Cataplexy, sleep attacks and sleep-wake behavior were identified using electroencephalogram, electromyogram and videography. These behaviors were monitored for 4 hours after an i.p. injection of saline, amphetamine and specific dopamine receptor modulators (D1- and D2-like receptor modulators). Amphetamine (2 mg/kg), which increases brain dopamine levels, decreased sleep attacks and cataplexy by 61% and 67%, suggesting that dopamine transmission modulates such behaviors. Dopamine receptor modulation also had powerful effects on sleep attacks and cataplexy. Activation (SKF 38393; 20 mg/kg) and blockade (SCH 23390; 1 mg/kg) of D1-like receptors decreased and increased sleep attacks by 77% and 88%, without affecting cataplexy. Pharmacological activation of D2-like receptors (quinpirole; 0.5 mg/kg) increased cataplectic attacks by 172% and blockade of these receptors (eticlopride; 1 mg/kg) potently suppressed them by 97%. Manipulation of D2-like receptors did not affect sleep attacks. We show that the dopaminergic system plays a role in regulating both cataplexy and sleep attacks in narcoleptic mice. We found that cataplexy is modulated by a D2-like receptor mechanism, whereas dopamine modulates sleep attacks by a D1-like receptor mechanism. These results support a role for the dopamine system in regulating sleep attacks and cataplexy in a murine model of narcolepsy.
Sevgi, Eser Başak; Erdener, Sefik Evren; Demirci, Mehmet; Topcuoglu, Mehmet Akif; Dalkara, Turgay
2012-01-01
Background Although controversial, paradoxical embolism via patent foramen ovale (PFO) may account for some of the migraine attacks in a subset of migraine with aura (MA) patients. Induction of MA attacks with air bubble injection during transcranial Doppler ultrasound in MA patients with PFO supports this view. It is likely that cerebral embolism in patients with right-to-left shunt induces bioelectrical abnormalities to initiate MA under some conditions. Methods and Results We investigated changes in cerebral bioelectrical activity after intravenous microbubble injection in 10 MA patients with large PFO and right-to-left cardiac shunt. Eight PFO patients without migraine but with large right-to-left shunt and 12 MA patients without PFO served as controls. Four MA patients with PFO were reexamined with sham injections of saline without microbubbles. Bioelectrical activity was evaluated using spectral electroencephalography and, passage of microbubbles through cerebral arteries was monitored with transcranial Doppler ultrasound. Microbubble embolism caused significant electroencephalographic power increase in MA+PFO patients but not in control groups including the sham-injected MA+PFO patients. Headache developed in 2 MA with PFO patients after microbubble injection. Conclusions These findings demonstrate that air microembolism through large PFOs may cause cerebral bioelectrical disturbances and, occasionally, headache in MA patients, which may reflect an increased reactivity of their brain to transient subclinical hypoxia–ischemia, and suggest that paradoxical embolism is not a common cause of migraine but may induce headache in the presence of a large PFO and facilitating conditions. PMID:23316313
NASA Astrophysics Data System (ADS)
Elbaz, Reouven; Torres, Lionel; Sassatelli, Gilles; Guillemin, Pierre; Bardouillet, Michel; Martinez, Albert
The bus between the System on Chip (SoC) and the external memory is one of the weakest points of computer systems: an adversary can easily probe this bus in order to read private data (data confidentiality concern) or to inject data (data integrity concern). The conventional way to protect data against such attacks and to ensure data confidentiality and integrity is to implement two dedicated engines: one performing data encryption and another data authentication. This approach, while secure, prevents parallelizability of the underlying computations. In this paper, we introduce the concept of Block-Level Added Redundancy Explicit Authentication (BL-AREA) and we describe a Parallelized Encryption and Integrity Checking Engine (PE-ICE) based on this concept. BL-AREA and PE-ICE have been designed to provide an effective solution to ensure both security services while allowing for full parallelization on processor read and write operations and optimizing the hardware resources. Compared to standard encryption which ensures only confidentiality, we show that PE-ICE additionally guarantees code and data integrity for less than 4% of run-time performance overhead.
Caballero, Teresa; Zanichelli, Andrea; Aberer, Werner; Maurer, Marcus; Longhurst, Hilary J; Bouillet, Laurence; Andresen, Irmgard
2018-01-01
Icatibant is a bradykinin B2-receptor antagonist used for the treatment of hereditary angioedema attacks resulting from C1-inhibitor deficiency. Treatment is not adjusted by body weight however the impact of body mass index (BMI) on the effectiveness of icatibant is not documented in the literature. We examined disease characteristics and icatibant treatment effectiveness in patients stratified by BMI in the Icatibant Outcome Survey, an ongoing, international, observational study monitoring the real-world safety and effectiveness of icatibant. Attack and treatment characteristics as well as outcomes following treatment with icatibant were compared among patients with underweight, normal, overweight, and obese BMI. Data from 2697 icatibant-treated attacks in 342 patients (3.5, 44.7, 34.8, and 17.0% patients of underweight, normal, overweight, and obese BMI, respectively) were analyzed. There was no significant difference in the frequency and severity of attacks across BMI groups, although obese patients tended to have more attacks of high severity. There was no impact of BMI on the frequency of laryngeal attacks, but patients with normal BMI had fewer cutaneous attacks and more abdominal attacks. Most attacks (71.9-83.8%) were treated with a single icatibant injection without the need for rescue with plasma-derived C1-inhibitor (pdC1-INH), regardless of BMI. Patients with obese BMI used pdC1-INH as rescue treatment more often (P < 0.0001; P = 0.0232 excluding 2 outliers) and treated attacks earlier than patients with normal BMI (P = 0.007). Furthermore, time to resolution and duration of attack were shorter for patients with high BMI (P < 0.001 for overweight and P < 0.05 for obese versus normal). Overall, icatibant was comparatively effective in treating attacks in patients across all BMI groups. Trial registration NCT01034969.
Aerodynamic investigations of a disc-wing
NASA Astrophysics Data System (ADS)
Dumitrache, Alexandru; Frunzulica, Florin; Grigorescu, Sorin
2017-01-01
The purpose of this paper is to evaluate the aerodynamic characteristics of a wing-disc, for a civil application in the fire-fighting system. The aerodynamic analysis is performed using a CFD code, named ANSYS Fluent, in the flow speed range up to 25 m/s, at lower and higher angle of attack. The simulation is three-dimensional, using URANS completed by a SST turbulence model. The results are used to examine the flow around the disc with increasing angle of attack and the structure of the wake.
NASA Technical Reports Server (NTRS)
Agarwal, R.; Rakich, J. V.
1978-01-01
Computational results obtained with a parabolic Navier-Stokes marching code are presented for supersonic viscous flow past a pointed cone at angle of attack undergoing a combined spinning and coning motion. The code takes into account the asymmetries in the flow field resulting from the motion and computes the asymmetric shock shape, crossflow and streamwise shear, heat transfer, crossflow separation and vortex structure. The side force and moment are also computed. Reasonably good agreement is obtained with the side force measurements of Schiff and Tobak. Comparison is also made with the only available numerical inviscid analysis. It is found that the asymmetric pressure loads due to coning motion are much larger than all other viscous forces due to spin and coning, making viscous forces negligible in the combined motion.
Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moore, Michael Roy; Bridges, Robert A; Combs, Frank L
Modern vehicles rely on hundreds of on-board electronic control units (ECUs) communicating over in-vehicle networks. As external interfaces to the car control networks (such as the on-board diagnostic (OBD) port, auxiliary media ports, etc.) become common, and vehicle-to-vehicle / vehicle-to-infrastructure technology is in the near future, the attack surface for vehicles grows, exposing control networks to potentially life-critical attacks. This paper addresses the need for securing the CAN bus by detecting anomalous traffic patterns via unusual refresh rates of certain commands. While previous works have identified signal frequency as an important feature for CAN bus intrusion detection, this paper providesmore » the first such algorithm with experiments on five attack scenarios. Our data-driven anomaly detection algorithm requires only five seconds of training time (on normal data) and achieves true positive / false discovery rates of 0.9998/0.00298, respectively (micro-averaged across the five experimental tests).« less
Degradation of phagocytosed lysosomes by Kupffer cell lysosomes.
Henell, F; Ericsson, J L; Glaumann, H
1983-05-01
Lysosomal membranes are apparently resistant to hydrolytic attack from their own enzymes. Alternatively, degradation occurs but is compensated for by continuous insertion of new membrane components. It may be hypothesized that a mechanism operating exclusively on the luminal side of the lysosomal membrane serves to protect the membrane from being degraded. To evaluate this notion the cytoplasmic side of the lysosomal membrane has been exposed to lysosomal enzymes in vivo. Lysosomes were isolated and subsequently injected into the portal vein of a series of rats. The uptake of the injected organelles by Kupffer cells and their subsequent degradation in lysosomes were monitored by means of electron microscopy. Four minutes after injection lysosomes were seen attached to the surface of the Kupffer cells. After 30 minutes the injected material was present in Kupffer cell phagolysosomes, and signs of degradation of the phagocytosed lysosomes were seen. By 2 hours only a few distinct membranes were left, and by 12 hours the injected lysosomes were no longer recognizable. Instead, the phagolysosomes of Kupffer cells were laden with lipid-like droplets and irregular membranous structures. Acid phosphatase histochemistry and labeling of preexisting Kupffer cell lysosomes with marker particles indicated that the phagosomes engulfing the injected lysosomes acquired hydrolytic enzymes within 30 minutes after their formation. The degradation rate of injected lysosomes was estimated by measuring the decay of radioactivity from a rat liver mitochondrial lysosomal fraction after administration of lysosomes isotopically prelabeled with 14C-leucine and 14C-glycerol. The half-life of the lysosomal membrane proteins varied between 1.5 and 2.0 hours, whereas that of the lipid component was in the range of 2.0 to 3.5 hours. These findings demonstrate that lysosomal membranes are degraded if their outer surface is exposed to lysosomal enzymes. Both the ultrastructural analysis and the isotopic studies indicate that proteins are degraded faster than lipids. Apparently, the cytoplasmic surface of the lysosomes is susceptible to lysosomal hydrolytic attack.
Ischemia may be the primary cause of the neurologic deficits in classic migraine
DOE Office of Scientific and Technical Information (OSTI.GOV)
Skyhoj Olsen, T.; Friberg, L.; Lassen, N.A.
1987-02-01
This study investigates whether the cerebral blood flow reduction occurring in attacks of classic migraine is sufficient to cause neurologic deficits. Regional cerebral blood flow measured with the xenon 133 intracarotid injection technique was analyzed in 11 patients in whom a low-flow area developed during attacks of classic migraine. When measured with this technique, regional cerebral blood flow in focal low-flow areas will be overestimated because of the effect of scattered radiation (Compton scatter) on the recordings. In this study, this effect was particularly taken into account when evaluating the degree of blood flow reduction. During attacks of classic migraine,more » cerebral blood flow reductions averaging 52% were observed focally in the 11 patients. Cerebral blood flow levels known to be insufficient for normal cortical function (less than 16 to 23 mL/100 g/min) were measured in seven patients during the attacks. This was probably also the case in the remaining four patients, but the effect of scattered radiation made a reliable evaluation of blood flow impossible. It is concluded that the blood flow reduction that occurs during attacks of classic migraine is sufficient to cause ischemia and neurologic deficits. Hence, this study suggests a vascular origin of the prodromal neurologic deficits that may accompany attacks of classic migraine.« less
CFD Variability for a Civil Transport Aircraft Near Buffet-Onset Conditions
NASA Technical Reports Server (NTRS)
Rumsey, Christopher L.; Morrison, Joseph H.; Biedron, Robert T.
2003-01-01
A CFD sensitivity analysis is conducted for an aircraft at several conditions, including flow with substantial separation (buffet onset). The sensitivity is studied using two different Navier-Stokes computer codes, three different turbulence models, and two different grid treatments of the wing trailing edge. This effort is a follow-on to an earlier study of CFD variation over a different aircraft in buffet onset conditions. Similar to the earlier study, the turbulence model is found to have the largest effect, with a variation of 3.8% in lift at the buffet onset angle of attack. Drag and moment variation are 2.9% and 23.6%, respectively. The variations due to code and trailing edge cap grid are smaller than that due to turbulence model. Overall, the combined approximate error band in CFD due to code, turbulence model, and trailing edge treatment at the buffet onset angle of attack are: 4% in lift, 3% in drag, and 31% in moment. The CFD results show similar trends to flight test data, but also exhibit a lift curve break not seen in the data.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pollet, J.
2006-07-01
This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less
Robust and Blind 3D Mesh Watermarking in Spatial Domain Based on Faces Categorization and Sorting
NASA Astrophysics Data System (ADS)
Molaei, Amir Masoud; Ebrahimnezhad, Hossein; Sedaaghi, Mohammad Hossein
2016-06-01
In this paper, a 3D watermarking algorithm in spatial domain is presented with blind detection. In the proposed method, a negligible visual distortion is observed in host model. Initially, a preprocessing is applied on the 3D model to make it robust against geometric transformation attacks. Then, a number of triangle faces are determined as mark triangles using a novel systematic approach in which faces are categorized and sorted robustly. In order to enhance the capability of information retrieval by attacks, block watermarks are encoded using Reed-Solomon block error-correcting code before embedding into the mark triangles. Next, the encoded watermarks are embedded in spherical coordinates. The proposed method is robust against additive noise, mesh smoothing and quantization attacks. Also, it is stout next to geometric transformation, vertices and faces reordering attacks. Moreover, the proposed algorithm is designed so that it is robust against the cropping attack. Simulation results confirm that the watermarked models confront very low distortion if the control parameters are selected properly. Comparison with other methods demonstrates that the proposed method has good performance against the mesh smoothing attacks.
NASA Astrophysics Data System (ADS)
Chahrazed, Yahiaoui; Jean-Louis, Lanet; Mohamed, Mezghiche; Karim, Tamine
2018-01-01
Fault attack represents one of the serious threats against Java Card security. It consists of physical perturbation of chip components to introduce faults in the code execution. A fault may be induced using a laser beam to impact opcodes and operands of instructions. This could lead to a mutation of the application code in such a way that it becomes hostile. Any successful attack may reveal a secret information stored in the card or grant an undesired authorisation. We propose a methodology to recognise, during the development step, the sensitive patterns to the fault attack in the Java Card applications. It is based on the concepts from text categorisation and machine learning. In fact, in this method, we represented the patterns using opcodes n-grams as features, and we evaluated different machine learning classifiers. The results show that the classifiers performed poorly when classifying dangerous sensitive patterns, due to the imbalance of our data-set. The number of dangerous sensitive patterns is much lower than the number of not dangerous patterns. We used resampling techniques to balance the class distribution in our data-set. The experimental results indicated that the resampling techniques improved the accuracy of the classifiers. In addition, our proposed method reduces the execution time of sensitive patterns classification in comparison to the SmartCM tool. This tool is used in our study to evaluate the effect of faults on Java Card applications.
Simple Criteria to Determine the Set of Key Parameters of the DRPE Method by a Brute-force Attack
NASA Astrophysics Data System (ADS)
Nalegaev, S. S.; Petrov, N. V.
Known techniques of breaking Double Random Phase Encoding (DRPE), which bypass the resource-intensive brute-force method, require at least two conditions: the attacker knows the encryption algorithm; there is an access to the pairs of source and encoded images. Our numerical results show that for the accurate recovery by numerical brute-force attack, someone needs only some a priori information about the source images, which can be quite general. From the results of our numerical experiments with optical data encryption DRPE with digital holography, we have proposed four simple criteria for guaranteed and accurate data recovery. These criteria can be applied, if the grayscale, binary (including QR-codes) or color images are used as a source.
H.264/AVC digital fingerprinting based on spatio-temporal just noticeable distortion
NASA Astrophysics Data System (ADS)
Ait Saadi, Karima; Bouridane, Ahmed; Guessoum, Abderrezak
2014-01-01
This paper presents a robust adaptive embedding scheme using a modified Spatio-Temporal noticeable distortion (JND) model that is designed for tracing the distribution of the H.264/AVC video content and protecting them from unauthorized redistribution. The Embedding process is performed during coding process in selected macroblocks type Intra 4x4 within I-Frame. The method uses spread-spectrum technique in order to obtain robustness against collusion attacks and the JND model to dynamically adjust the embedding strength and control the energy of the embedded fingerprints so as to ensure their imperceptibility. Linear and non linear collusion attacks are performed to show the robustness of the proposed technique against collusion attacks while maintaining visual quality unchanged.
Analytic barrage attack model. Final report, January 1986-January 1989
DOE Office of Scientific and Technical Information (OSTI.GOV)
St Ledger, J.W.; Naegeli, R.E.; Dowden, N.A.
An analytic model is developed for a nuclear barrage attack, assuming weapons with no aiming error and a cookie-cutter damage function. The model is then extended with approximations for the effects of aiming error and distance damage sigma. The final result is a fast running model which calculates probability of damage for a barrage attack. The probability of damage is accurate to within seven percent or better, for weapon reliabilities of 50 to 100 percent, distance damage sigmas of 0.5 or less, and zero to very large circular error probabilities. FORTRAN 77 coding is included in the report for themore » analytic model and for a numerical model used to check the analytic results.« less
Pellet Injection in ITER with ∇B-induced Drift Effect using TASK/TR and HPI2 Codes
NASA Astrophysics Data System (ADS)
Kongkurd, R.; Wisitsorasak, A.
2017-09-01
The impact of pellet injection in International Thermonuclear Experimental Reactor (ITER) are investigated using integrated predictive modeling codes TASK/TR and HPI2 . In the core, the plasma profiles are predicted by the TASK/TR code in which the core transport models consist of a combination of the MMM95 anomalous transport model and NCLASS neoclassical transport. The pellet ablation in the plasma is described using neutral gas shielding (NGS) model with inclusion of the ∇B-induced \\overrightarrow{E}× \\overrightarrow{B} drift of the ionized ablated pellet particles. It is found that the high-field-side injection can deposit the pellet mass deeper than the injection from the low-field-side due to the advantage of the ∇B-induced drift. When pellets with deuterium-tritium mixing ratio of unity are launched with speed of 200 m/s, radius of 3 mm and injected at frequency of 2 Hz, the line average density and the plasma stored energy are increased by 80% and 25% respectively. The pellet material is mostly deposited at the normalized minor radius of 0.5 from the edge.
Three Dimensional Solution of Pneumatic Active Control of Forebody Vortex Asymmetry
NASA Technical Reports Server (NTRS)
Kandil, Osama A.; SharafEl-Din, Hazem H.; Liu, C. H.
1995-01-01
Pneumatic active control of asymmetric vortical flows around a slender pointed forebody is investigated using the three dimensional solution for the compressible thin-layer Navier-Stokes equation. The computational applications cover the normal and tangential injection control of asymmetric flows around a 5 degree semi-apex angle cone at a 40 degree angle of attack, 1.4 freestream Mach number and 6 x 10(exp 6) freestream Reynolds number (based on the cone length). The effective tangential angle range of 67.5 approaches minus 67.5 degrees is used for both normal and tangential ports of injection. The effective axial length of injection is varied from 0.03 to 0.05. The computational solver uses the implicit, upwind, flux difference splitting finite volume scheme, and the grid consists of 161 x 55 x 65 points in the wrap around, normal and axial directions, respectively. The results show that tangential injection is more effective than normal injection.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huang, Hai; Spencer, Benjamin W.; Cai, Guowei
Concrete is widely used in the construction of nuclear facilities because of its structural strength and its ability to shield radiation. The use of concrete in nuclear power plants for containment and shielding of radiation and radioactive materials has made its performance crucial for the safe operation of the facility. As such, when life extension is considered for nuclear power plants, it is critical to have accurate and reliable predictive tools to address concerns related to various aging processes of concrete structures and the capacity of structures subjected to age-related degradation. The goal of this report is to document themore » progress of the development and implementation of a fully coupled thermo-hydro-mechanical-chemical model in GRIZZLY code with the ultimate goal to reliably simulate and predict long-term performance and response of aged NPP concrete structures subjected to a number of aging mechanisms including external chemical attacks and volume-changing chemical reactions within concrete structures induced by alkali-silica reactions and long-term exposure to irradiation. Based on a number of survey reports of concrete aging mechanisms relevant to nuclear power plants and recommendations from researchers in concrete community, we’ve implemented three modules during FY15 in GRIZZLY code, (1) multi-species reactive diffusion model within cement materials; (2) coupled moisture and heat transfer model in concrete; and (3) anisotropic, stress-dependent, alkali-silica reaction induced swelling model. The multi-species reactive diffusion model was implemented with the objective to model aging of concrete structures subjected to aggressive external chemical attacks (e.g., chloride attack, sulfate attack, etc.). It considers multiple processes relevant to external chemical attacks such as diffusion of ions in aqueous phase within pore spaces, equilibrium chemical speciation reactions and kinetic mineral dissolution/precipitation. The moisture/heat transfer module was implemented to simulate long-term spatial and temporal evolutions of the moisture and temperature fields within concrete structures at both room and elevated temperatures. The ASR swelling model implemented in GRIZZLY code can simulate anisotropic expansions of ASR gel under either uniaxial, biaxial and triaxial stress states, and can be run simultaneously with the moisture/heat transfer model and coupled with various elastic/inelastic solid mechanics models that were implemented in GRIZZLY code previously. This report provides detailed descriptions of the governing equations, constitutive equations and numerical algorithms of the three modules implemented in GRIZZLY during FY15, simulation results of example problems and model validation results by comparing simulations with available experimental data reported in the literature. The close match between the experiments and simulations clearly demonstrate the potential of GRIZZLY code for reliable evaluation and prediction of long-term performance and response of aged concrete structures in nuclear power plants.« less
Janjua, Naveed Zafar; Islam, Nazrul; Kuo, Margot; Yu, Amanda; Wong, Stanley; Butt, Zahid A; Gilbert, Mark; Buxton, Jane; Chapinal, Nuria; Samji, Hasina; Chong, Mei; Alvarez, Maria; Wong, Jason; Tyndall, Mark W; Krajden, Mel
2018-05-01
Large linked healthcare administrative datasets could be used to monitor programs providing prevention and treatment services to people who inject drugs (PWID). However, diagnostic codes in administrative datasets do not differentiate non-injection from injection drug use (IDU). We validated algorithms based on diagnostic codes and prescription records representing IDU in administrative datasets against interview-based IDU data. The British Columbia Hepatitis Testers Cohort (BC-HTC) includes ∼1.7 million individuals tested for HCV/HIV or reported HBV/HCV/HIV/tuberculosis cases in BC from 1990 to 2015, linked to administrative datasets including physician visit, hospitalization and prescription drug records. IDU, assessed through interviews as part of enhanced surveillance at the time of HIV or HCV/HBV diagnosis from a subset of cases included in the BC-HTC (n = 6559), was used as the gold standard. ICD-9/ICD-10 codes for IDU and injecting-related infections (IRI) were grouped with records of opioid substitution therapy (OST) into multiple IDU algorithms in administrative datasets. We assessed the performance of IDU algorithms through calculation of sensitivity, specificity, positive predictive, and negative predictive values. Sensitivity was highest (90-94%), and specificity was lowest (42-73%) for algorithms based either on IDU or IRI and drug misuse codes. Algorithms requiring both drug misuse and IRI had lower sensitivity (57-60%) and higher specificity (90-92%). An optimal sensitivity and specificity combination was found with two medical visits or a single hospitalization for injectable drugs with (83%/82%) and without OST (78%/83%), respectively. Based on algorithms that included two medical visits, a single hospitalization or OST records, there were 41,358 (1.2% of 11-65 years individuals in BC) recent PWID in BC based on health encounters during 3- year period (2013-2015). Algorithms for identifying PWID using diagnostic codes in linked administrative data could be used for tracking the progress of programing aimed at PWID. With population-based datasets, this tool can be used to inform much needed estimates of PWID population size. Copyright © 2018 Elsevier B.V. All rights reserved.
3D-DIVIMP-HC modeling analysis of methane injection into DIII-D using the DiMES porous plug injector
NASA Astrophysics Data System (ADS)
Mu, Y.; McLean, A. G.; Elder, J. D.; Stangeby, P. C.; Bray, B. D.; Brooks, N. H.; Davis, J. W.; Fenstermacher, M. E.; Groth, M.; Lasnier, C. J.; Rudakov, D. L.; Watkins, J. G.; West, W. P.; Wong, C. P. C.
2009-06-01
A self-contained gas injection system for the Divertor Material Evaluation System (DiMES) on DIII-D, the porous plug injector (PPI), has been employed for in situ study of chemical erosion in the tokamak divertor environment by injection of CH 4 [A.G. McLean et al., these Proceedings]. A new interpretive code, 3D-DIVIMP-HC, has been developed and applied to the interpretation of the CH, CI, and CII emissions. Particular emphasis is placed on the interpretation of 2D filtered-camera (TV) pictures in CH, CI and CII light taken from a view essentially straight down on the PPI. The code replicates sufficient measurements to conclude that most of the basic elements of the controlling physics and chemistry have been identified and incorporated in the code-model.
CBP Toolbox Version 3.0 “Beta Testing” Performance Evaluation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, III, F. G.
2016-07-29
One function of the Cementitious Barriers Partnership (CBP) is to assess available models of cement degradation and to assemble suitable models into a “Toolbox” that would be made available to members of the partnership, as well as the DOE Complex. To this end, SRNL and Vanderbilt University collaborated to develop an interface using the GoldSim software to the STADIUM @ code developed by SIMCO Technologies, Inc. and LeachXS/ORCHESTRA developed by Energy research Centre of the Netherlands (ECN). Release of Version 3.0 of the CBP Toolbox is planned in the near future. As a part of this release, an increased levelmore » of quality assurance for the partner codes and the GoldSim interface has been developed. This report documents results from evaluation testing of the ability of CBP Toolbox 3.0 to perform simulations of concrete degradation applicable to performance assessment of waste disposal facilities. Simulations of the behavior of Savannah River Saltstone Vault 2 and Vault 1/4 concrete subject to sulfate attack and carbonation over a 500- to 1000-year time period were run using a new and upgraded version of the STADIUM @ code and the version of LeachXS/ORCHESTRA released in Version 2.0 of the CBP Toolbox. Running both codes allowed comparison of results from two models which take very different approaches to simulating cement degradation. In addition, simulations of chloride attack on the two concretes were made using the STADIUM @ code. The evaluation sought to demonstrate that: 1) the codes are capable of running extended realistic simulations in a reasonable amount of time; 2) the codes produce “reasonable” results; the code developers have provided validation test results as part of their code QA documentation; and 3) the two codes produce results that are consistent with one another. Results of the evaluation testing showed that the three criteria listed above were met by the CBP partner codes. Therefore, it is concluded that the codes can be used to support performance assessment. This conclusion takes into account the QA documentation produced for the partner codes and for the CBP Toolbox.« less
Combined LAURA-UPS hypersonic solution procedure
NASA Technical Reports Server (NTRS)
Wood, William A.; Thompson, Richard A.
1993-01-01
A combined solution procedure for hypersonic flowfields around blunted slender bodies was implemented using a thin-layer Navier-Stokes code (LAURA) in the nose region and a parabolized Navier-Stokes code (UPS) on the after body region. Perfect gas, equilibrium air, and non-equilibrium air solutions to sharp cones and a sharp wedge were obtained using UPS alone as a preliminary step. Surface heating rates are presented for two slender bodies with blunted noses, having used LAURA to provide a starting solution to UPS downstream of the sonic line. These are an 8 deg sphere-cone in Mach 5, perfect gas, laminar flow at 0 and 4 deg angles of attack and the Reentry F body at Mach 20, 80,000 ft equilibrium gas conditions for 0 and 0.14 deg angles of attack. The results indicate that this procedure is a timely and accurate method for obtaining aerothermodynamic predictions on slender hypersonic vehicles.
Modification and Validation of Conceptual Design Aerodynamic Prediction Method HASC95 With VTXCHN
NASA Technical Reports Server (NTRS)
Albright, Alan E.; Dixon, Charles J.; Hegedus, Martin C.
1996-01-01
A conceptual/preliminary design level subsonic aerodynamic prediction code HASC (High Angle of Attack Stability and Control) has been improved in several areas, validated, and documented. The improved code includes improved methodologies for increased accuracy and robustness, and simplified input/output files. An engineering method called VTXCHN (Vortex Chine) for prediciting nose vortex shedding from circular and non-circular forebodies with sharp chine edges has been improved and integrated into the HASC code. This report contains a summary of modifications, description of the code, user's guide, and validation of HASC. Appendices include discussion of a new HASC utility code, listings of sample input and output files, and a discussion of the application of HASC to buffet analysis.
Nitrocobinamide, a New Cyanide Antidote That Can Be Administered by Intramuscular Injection
Chan, Adriano; Jiang, Jingjing; Fridman, Alla; Guo, Ling T.; Shelton, G. Diane; Liu, Ming-Tao; Green, Carol; Haushalter, Kristofer J.; Patel, Hemal H.; Lee, Jangwoen; Yoon, David; Burney, Tanya; Mukai, David; Mahon, Sari B.; Brenner, Matthew; Pilz, Renate B.; Boss, Gerry R.
2015-01-01
Currently available cyanide antidotes must be given by intravenous injection over 5–10 min, making them illsuited for treating many people in the field, as could occur in a major fire, an industrial accident, or a terrorist attack. These scenarios call for a drug that can be given quickly, e.g., by intramuscular injection. We have shown that aquohydroxocobinamide is a potent cyanide antidote in animal models of cyanide poisoning, but it is unstable in solution and poorly absorbed after intramuscular injection. Here we show that adding sodium nitrite to cobinamide yields a stable derivative (referred to as nitrocobinamide) that rescues cyanide-poisoned mice and rabbits when given by intramuscular injection. We also show that the efficacy of nitrocobinamide is markedly enhanced by coadministering sodium thiosulfate (reducing the total injected volume), and we calculate that ∼1.4 mL each of nitrocobinamide and sodium thiosulfate should rescue a human from a lethal cyanide exposure. PMID:25650735
Cryptographic salting for security enhancement of double random phase encryption schemes
NASA Astrophysics Data System (ADS)
Velez Zea, Alejandro; Fredy Barrera, John; Torroba, Roberto
2017-10-01
Security in optical encryption techniques is a subject of great importance, especially in light of recent reports of successful attacks. We propose a new procedure to reinforce the ciphertexts generated in double random phase encrypting experimental setups. This ciphertext is protected by multiplexing with a ‘salt’ ciphertext coded with the same setup. We present an experimental implementation of the ‘salting’ technique. Thereafter, we analyze the resistance of the ‘salted’ ciphertext under some of the commonly known attacks reported in the literature, demonstrating the validity of our proposal.
Capacity and optimal collusion attack channels for Gaussian fingerprinting games
NASA Astrophysics Data System (ADS)
Wang, Ying; Moulin, Pierre
2007-02-01
In content fingerprinting, the same media covertext - image, video, audio, or text - is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to "remove" their fingerprints and forge a pirated copy. To trace the forgery back to members of the coalition, we need fingerprinting codes that can reliably identify the fingerprints of those members. Researchers have been focusing on designing or testing fingerprints for Gaussian host signals and the mean square error (MSE) distortion under some classes of collusion attacks, in terms of the detector's error probability in detecting collusion members. For example, under the assumptions of Gaussian fingerprints and Gaussian attacks (the fingerprinted signals are averaged and then the result is passed through a Gaussian test channel), Moulin and Briassouli1 derived optimal strategies in a game-theoretic framework that uses the detector's error probability as the performance measure for a binary decision problem (whether a user participates in the collusion attack or not); Stone2 and Zhao et al. 3 studied average and other non-linear collusion attacks for Gaussian-like fingerprints; Wang et al. 4 stated that the average collusion attack is the most efficient one for orthogonal fingerprints; Kiyavash and Moulin 5 derived a mathematical proof of the optimality of the average collusion attack under some assumptions. In this paper, we also consider Gaussian cover signals, the MSE distortion, and memoryless collusion attacks. We do not make any assumption about the fingerprinting codes used other than an embedding distortion constraint. Also, our only assumptions about the attack channel are an expected distortion constraint, a memoryless constraint, and a fairness constraint. That is, the colluders are allowed to use any arbitrary nonlinear strategy subject to the above constraints. Under those constraints on the fingerprint embedder and the colluders, fingerprinting capacity is obtained as the solution of a mutual-information game involving probability density functions (pdf's) designed by the embedder and the colluders. We show that the optimal fingerprinting strategy is a Gaussian test channel where the fingerprinted signal is the sum of an attenuated version of the cover signal plus a Gaussian information-bearing noise, and the optimal collusion strategy is to average fingerprinted signals possessed by all the colluders and pass the averaged copy through a Gaussian test channel. The capacity result and the optimal strategies are the same for both the private and public games. In the former scenario, the original covertext is available to the decoder, while in the latter setup, the original covertext is available to the encoder but not to the decoder.
CFD Analyses and Jet-Noise Predictions of Chevron Nozzles with Vortex Stabilization
NASA Technical Reports Server (NTRS)
Dippold, Vance
2008-01-01
The wind computational fluid dynamics code was used to perform a series of analyses on a single-flow plug nozzle with chevrons. Air was injected from tubes tangent to the nozzle outer surface at three different points along the chevron at the nozzle exit: near the chevron notch, at the chevron mid-point, and near the chevron tip. Three injection pressures were used for each injection tube location--10, 30, and 50 psig-giving injection mass flow rates of 0.1, 0.2, and 0.3 percent of the nozzle mass flow. The results showed subtle changes in the jet plume s turbulence and vorticity structure in the region immediately downstream of the nozzle exit. Distinctive patterns in the plume structure emerged from each injection location, and these became more pronounced as the injection pressure was increased. However, no significant changes in centerline velocity decay or turbulent kinetic energy were observed in the jet plume as a result of flow injection. Furthermore, computational acoustics calculations performed with the JeNo code showed no real reduction in jet noise relative to the baseline chevron nozzle.
NASA Astrophysics Data System (ADS)
Lobanov, P. D.; Usov, E. V.; Butov, A. A.; Pribaturin, N. A.; Mosunova, N. A.; Strizhov, V. F.; Chukhno, V. I.; Kutlimetov, A. E.
2017-10-01
Experiments with impulse gas injection into model coolants, such as water or the Rose alloy, performed at the Novosibirsk Branch of the Nuclear Safety Institute, Russian Academy of Sciences, are described. The test facility and the experimental conditions are presented in details. The dependence of coolant pressure on the injected gas flow and the time of injection was determined. The purpose of these experiments was to verify the physical models of thermohydraulic codes for calculation of the processes that could occur during the rupture of tubes of a steam generator with heavy liquid metal coolant or during fuel rod failure in water-cooled reactors. The experimental results were used for verification of the HYDRA-IBRAE/LM system thermohydraulic code developed at the Nuclear Safety Institute, Russian Academy of Sciences. The models of gas bubble transportation in a vertical channel that are used in the code are described in detail. A two-phase flow pattern diagram and correlations for prediction of friction of bubbles and slugs as they float up in a vertical channel and of two-phase flow friction factor are presented. Based on the results of simulation of these experiments using the HYDRA-IBRAE/LM code, the arithmetic mean error in predicted pressures was calculated, and the predictions were analyzed considering the uncertainty in the input data, geometry of the test facility, and the error of the empirical correlation. The analysis revealed major factors having a considerable effect on the predictions. The recommendations are given on updating of the experimental results and improvement of the models used in the thermohydraulic code.
NASA Astrophysics Data System (ADS)
Islam, M. S.; Nakashima, Y.; Hatayama, A.
2017-12-01
The linear divertor analysis with fluid model (LINDA) code has been developed in order to simulate plasma behavior in the end-cell of linear fusion device GAMMA 10/PDX. This paper presents the basic structure and simulated results of the LINDA code. The atomic processes of hydrogen and impurities have been included in the present model in order to investigate energy loss processes and mechanism of plasma detachment. A comparison among Ar, Kr and Xe shows that Xe is the most effective gas on the reduction of electron and ion temperature. Xe injection leads to strong reduction in the temperature of electron and ion. The energy loss terms for both the electron and the ion are enhanced significantly during Xe injection. It is shown that the major energy loss channels for ion and electron are charge-exchange loss and radiative power loss of the radiator gas, respectively. These outcomes indicate that Xe injection in the plasma edge region is effective for reducing plasma energy and generating detached plasma in linear device GAMMA 10/PDX.
On-demand anakinra treatment is effective in mevalonate kinase deficiency.
Bodar, E J; Kuijk, L M; Drenth, J P H; van der Meer, J W M; Simon, A; Frenkel, J
2011-12-01
Mevalonate kinase deficiency (MKD) is a hereditary autoinflammatory syndrome marked by recurrent attacks of fever and inflammation. Severe enzyme deficiency results in mevalonic aciduria (MA) and milder deficiency in hyperimmunoglobulin D syndrome (HIDS). Treatment remains a challenge. To observe the effect of the recombinant interleukin-1 receptor antagonist anakinra in patients with MKD. A prospective observational study was undertaken. Two patients with MA started continuous treatment with anakinra (1-2 mg/kg/day) and nine patients with HIDS chose between continuous treatment and on-demand treatment (starting at first symptoms of attack, 100 mg/day or 1 mg/kg/day for 5-7 days). Anakinra induced partial remission in one patient with MA but there was no response in the other patient with MA. In one patient with HIDS continuous treatment induced complete remission for 7 months but was stopped because of side effects. Eight patients with HIDS preferred on-demand treatment from the start. This induced a clinical response (≥50% reduction in duration) in 8 of 12 treated attacks without a change in attack frequency. Anakinra prevented fever attacks due to vaccination without inhibiting antibody induction. No major side effects were seen. On-demand treatment with anakinra in HIDS decreases the duration and severity of fever attacks. Because of the burden of daily injections and relatively long asymptomatic intervals of HIDS, all patients with HIDS preferred on-demand treatment.
Müller, Cláudia Janaina Torres; Quintino-Dos-Santos, Jeyce Willig; Schimitel, Fagna Giacomin; Tufik, Sérgio; Beijamini, Vanessa; Canteras, Newton Sabino; Schenberg, Luiz Carlos
2017-04-21
Intravenous injections of potassium cyanide (KCN) both elicit escape by its own and facilitate escape to electrical stimulation of the periaqueductal gray matter (PAG). Moreover, whereas the KCN-evoked escape is potentiated by CO 2 , it is suppressed by both lesions of PAG and clinically effective treatments with panicolytics. These and other data suggest that the PAG harbors a hypoxia-sensitive alarm system the activation of which could both precipitate panic and render the subject hypersensitive to CO 2 . Although prior c-Fos immunohistochemistry studies reported widespread activations of PAG following KCN injections, the employment of repeated injections of high doses of KCN (>60µg) in anesthetized rats compromised both the localization of KCN-responsive areas and their correlation with escape behavior. Accordingly, here we compared the brainstem activations of saline-injected controls (air/saline) with those produced by a single intravenous injection of 40-µg KCN (air/KCN), a 2-min exposure to 13% CO 2 (CO 2 /saline), or a combined stimulus (CO 2 /KCN). Behavioral effects of KCN microinjections into the PAG were assessed as well. Data showed that whereas the KCN microinjections were ineffective, KCN intravenous injections elicited escape in all tested rats. Moreover, whereas the CO 2 alone was ineffective, it potentiated the KCN-evoked escape. Compared to controls, the nucleus tractus solitarius was significantly activated in both CO 2 /saline and CO 2 /KCN groups. Additionally, whereas the laterodorsal tegmental nucleus was activated by all treatments, the rostrolateral and caudoventrolateral PAG were activated by air/KCN only. Data suggest that the latter structures are key components of a hypoxia-sensitive suffocation alarm which activation may trigger a panic attack. Copyright © 2017 IBRO. Published by Elsevier Ltd. All rights reserved.
In-network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection
NASA Astrophysics Data System (ADS)
Albano, Michele; Gao, Jie
In a sensor network of n nodes in which k of them have sensed interesting data, we perform in-network erasure coding such that each node stores a linear combination of all the network data with random coefficients. This scheme greatly improves data resilience to node failures: as long as there are k nodes that survive an attack, all the data produced in the sensor network can be recovered with high probability. The in-network coding storage scheme also improves data collection rate by mobile mules and allows for easy scheduling of data mules.
Deep Learning-Based Data Forgery Detection in Automatic Generation Control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Fengli; Li, Qinghua
Automatic Generation Control (AGC) is a key control system in the power grid. It is used to calculate the Area Control Error (ACE) based on frequency and tie-line power flow between balancing areas, and then adjust power generation to maintain the power system frequency in an acceptable range. However, attackers might inject malicious frequency or tie-line power flow measurements to mislead AGC to do false generation correction which will harm the power grid operation. Such attacks are hard to be detected since they do not violate physical power system models. In this work, we propose algorithms based on Neural Networkmore » and Fourier Transform to detect data forgery attacks in AGC. Different from the few previous work that rely on accurate load prediction to detect data forgery, our solution only uses the ACE data already available in existing AGC systems. In particular, our solution learns the normal patterns of ACE time series and detects abnormal patterns caused by artificial attacks. Evaluations on the real ACE dataset show that our methods have high detection accuracy.« less
NASA Technical Reports Server (NTRS)
Walsh, Kevin R.; Yuhas, Andrew J.; Williams, John G.; Steenken, William G.
1997-01-01
The effects of high-angle-of-attack flight on aircraft inlet aerodynamic characteristics were investigated at NASA Dryden Flight Research Center, Edwards, California, as part of NASA's High Alpha Technology Program. The highly instrumented F/A-18A High Alpha Research Vehicle was used for this research. A newly designed inlet total-pressure rake was installed in front of the starboard F404-GE-400 engine to measure inlet recovery and distortion characteristics. One objective was to determine inlet total-pressure characteristics at steady high-angle-of-attack conditions. Other objectives include assessing whether significant differences exist in inlet distortion between rapid angle-of-attack maneuvers and corresponding steady aerodynamic conditions, assessing inlet characteristics during aircraft departures, providing data for developing and verifying computational fluid dynamic codes, and calculating engine airflow using five methods. This paper addresses the first objective by summarizing results of 79 flight maneuvers at steady aerodynamic conditions, ranging from -10 deg to 60 deg angle of attack and from -8 deg to 11 deg angle of sideslip at Mach 0.3 and 0.4. These data and the associated database have been rigorously validated to establish a foundation for understanding inlet characteristics at high angle of attack.
Computer code for analyzing the performance of aquifer thermal energy storage systems
NASA Astrophysics Data System (ADS)
Vail, L. W.; Kincaid, C. T.; Kannberg, L. D.
1985-05-01
A code called Aquifer Thermal Energy Storage System Simulator (ATESSS) has been developed to analyze the operational performance of ATES systems. The ATESSS code provides an ability to examine the interrelationships among design specifications, general operational strategies, and unpredictable variations in the demand for energy. The uses of the code can vary the well field layout, heat exchanger size, and pumping/injection schedule. Unpredictable aspects of supply and demand may also be examined through the use of a stochastic model of selected system parameters. While employing a relatively simple model of the aquifer, the ATESSS code plays an important role in the design and operation of ATES facilities by augmenting experience provided by the relatively few field experiments and demonstration projects. ATESSS has been used to characterize the effect of different pumping/injection schedules on a hypothetical ATES system and to estimate the recovery at the St. Paul, Minnesota, field experiment.
Neurotensin inversely modulates maternal aggression
Gammie, Stephen C.; D’Anna, Kimberly L.; Gerstein, Hilary; Stevenson, Sharon A.
2008-01-01
Neurotensin (NT) is a versatile neuropeptide involved in analgesia, hypothermia, and schizophrenia. Although NT is released from and acts upon brain regions involved in social behaviors, it has not been linked to a social behavior. We previously selected mice for high maternal aggression (maternal defense), an important social behavior that protects offspring, and found significantly lower NT expression in the CNS of highly protective females. Our current study directly tested NT’s role in maternal defense. Intracerebroventricular (icv) injections of NT significantly impaired defense in terms of time aggressive and number of attacks at all doses tested (0.05, 0.1, 1.0, and 3.0 μg). Other maternal behaviors, including pup retrieval, were unaltered following NT injections (0.05 μg) relative to vehicle, suggesting specificity of NT action on defense. Further, icv injections of the NT receptor 1 (NT1) antagonist, SR 48692 (30 μg), significantly elevated maternal aggression in terms of time aggressive and attack number. To understand where NT may regulate aggression, we examined Fos following injection of either 0.1 μg NT or vehicle. 13 of 26 brain regions examined exhibited significant Fos increases with NT, including regions expressing NT1 and previously implicated in maternal aggression, such as lateral septum, bed nucleus of stria terminalis, paraventricular nucleus, and central amygdala. Together, our results indicate that NT inversely regulates maternal aggression and provide the first direct evidence that lowering of NT signaling can be a mechanism for maternal aggression. To our knowledge, this is the first study to directly link NT to a social behavior. PMID:19118604
Automated Virtual Machine Introspection for Host-Based Intrusion Detection
2009-03-01
boxes represent the code and data sections of each process in memory with arrows representing hooks planted by malware to jump to the malware code...a useful indication of intrusion, it is also susceptible to mimicry and concurrency attacks [Pro03,Wat07]. Additionally, most research abstracts away...sequence of system calls that accomplishes his or her intent [WS02]. This “ mimicry attack” takes advantage of the fact that many HIDS discard the pa
NASA Astrophysics Data System (ADS)
Vatansever, Fatma; Kawakubo, Masayoshi; Chung, Hoon; Hamblin, Michael R.
2013-02-01
We have previously shown that photodynamic therapy mediated by a vascular regimen of benzoporphyrin derivative and 690nm light is capable of inducing a robust immune response in the mouse CT26.CL25 tumor model that contains a tumor-rejection antigen, beta-galactosidase (β-gal). For the first time we show that PDT can stimulate the production of serum IgG antibodies against the β-gal antigen. It is known that a common cause of death from cancer, particularly lung cancer, is brain metastases; especially the inoperable ones that do not respond to traditional cytotoxic therapies either. We asked whether PDT of a primary tumor could stimulate immune response that could attack the distant brain metastases. We have developed a mouse model of generating brain metastases by injecting CT26.CL25 tumor cells into the brain as well as injecting the same cancer cells under the skin at the same time. When the subcutaneous tumor was treated with PDT, we observed a survival advantage compared to mice that had untreated brain metastases alone.
Erie, Jay C; Barkmeier, Andrew J; Hodge, David O; Mahr, Michael A
2016-06-01
To estimate geographic variation of intravitreal injection rates and Medicare anti-vascular endothelial growth factor (VEGF) drug costs per injection in aging Americans. Observational cohort study using 2013 Medicare claims database. United States fee-for-service (FFS) Part B Medicare beneficiaries and their providers. Medicare Provider Utilization and Payment Data furnished by the Centers for Medicare and Medicaid Services was used to identify all intravitreal injection claims and anti-VEGF drug claims among FFS Medicare beneficiaries in all 50 states and the District of Columbia in 2013. The rate of FFS Medicare beneficiaries receiving intravitreal injections and the mean Medicare-allowed drug payment per anti-VEGF injection was calculated nationally and for each state. Geographic variations were evaluated by using extremal quotient, coefficient of variation, and systematic component of variance (SCV). Rate of FFS Medicare Part B beneficiaries receiving intravitreal injections (Current Procedural Terminology [CPT] code, 67028), nationally and by state; mean Medicare-allowed drug payment per anti-VEGF injection (CPT code, 67028; and treatment-specific J-codes, J0178, J2778, J9035, J3490, and J3590) nationally and by state. In 2013, the rate of FFS Medicare beneficiaries receiving intravitreal injections varied widely by 7-fold across states (range by state, 4 per 1000 [Wyoming]-28 per 1000 [Utah]), averaging 19 per 1000 beneficiaries. The mean SCV was 8.5, confirming high nonrandom geographic variation. There were more than 2.1 million anti-VEGF drug claims, totaling more than $2.3 billion in Medicare payments for anti-VEGF agents in 2013. The mean national Medicare drug payment per anti-VEGF injection varied widely by 6.2-fold across states (range by state, $242 [South Carolina]-$1509 [Maine]), averaging $1078 per injection. Nationally, 94% of injections were office based and 6% were facility based. High variation was observed in intravitreal injection rates and in Medicare drug payments per anti-VEGF injection across the United States in 2013. Identifying factors that contribute to high variation may help the ophthalmology community to optimize further the delivery and use of anti-VEGF agents. Copyright © 2016 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.
Liu, Bo; Leng, Yangming; Zhou, Renhong; Liu, Jingjing; Liu, Dongdong; Zhang, Su-Lin; Kong, Wei-Jia
2016-01-01
Abstract Drop attack (DA) associated with Ménière's disease (MD) and delayed endolymphatic hydrops (DEH) is not common and may cause life-threatening clinical problems. The intratympanic dexamethasone (ITD) is one of primary treatments for MD or DEH. Our study investigated the effect of ITD on the DA associated with endolymphatic hydrops (EH). We retrospectively reviewed 10 patients with MD- and DEH-associated DA between January 2009 and December 2013 in Outpatient Department of Otolaryngology, Union Hospital, Wuhan, China. Among them, 7 patients (5 cases with MD, 2 cases of DEH) received ITD (4 times, on weekly basis). Further repeated ITD courses or intratympanic gentamicin (ITG) were given if the vertigo was not satisfactorily controlled. The number of DA and status of vertigo control after intratympanic injection were evaluated. After a follow-up study lasting from 19 to 35 months, DA in 5 cases (71.4%) disappeared after initial ITD course. In 2 cases, DA was altogether controlled after an additional intratympanic injection (repeated ITD or/and ITG). This study showed that ITD promises to be a first-line conservative treatment for MD- or DEH-related DA since the steroid possesses no inner-ear toxicity. Furthermore, for MD- or DEH-related DA refractory to ITD, ITG can be an effective alternative. PMID:28033296
Anomaly Detection at Multiple Scales (ADAMS)
2011-11-09
must resort to generating their own data that simulates insider attacks. The Schonlau dataset is the most widely used for academic study. It...measurements are estimated by well-known software plagiarism tools . 39 As explained above, there are many different techniques for code trans- formation
Familial paroxysmal nonkinesigenic dyskinesia: clinical and genetic analysis of a Taiwanese family.
Yeh, Tu-Hsueh; Lin, Juei-Jueng; Lai, Szu-Chia; Wu-Chou, Yah-Huei; Chen, An-Chih; Yueh, Kuo-Chu; Chen, Rou-Shayn; Lu, Chin-Song
2012-12-15
Paroxysmal nonkinesigenic dyskinesia (PNKD) is a rare disorder in autosomal dominant inheritance. The clinical features and genetic findings of PNKD, rarely described in the Asians, were mostly delineated from European families. The present study characterized the clinical and genetic findings of a Taiwanese PNKD family. The clinical features of our five patients in successive three generations included onset age less than 10 years, attack duration between 3 min and 4h, and a variety of aura symptoms. The attacks were provoked not by sudden action but by emotional stress, caffeine, fatigue, heavy exercise and sleep deprivation. Sleep could abolish or diminish the attack and the attacks responded well to clonazepam. Sequencing the whole coding region of PNKD/MR-1 gene identified a heterozygous c.20 C>T (p.Ala7Val) mutation which was clearly segregated in the five affected patients. Comparing our patients with previously reported 18 families with PNKD/MR-1 mutations, the majority of the patients exhibited quite similar manifestations in attack patterns and precipitating factors. The recurrent conservative mutations in different ethnicities indicate importance in the pathogenesis of PNKD. Copyright © 2012 Elsevier B.V. All rights reserved.
Institute for Defense Analyses Tactical Warfare (TACWAR) Model. Program Maintenance Manual. Part II.
1977-09-06
Accession For XTIS GRA&I DTIC TAB U1nannounced Q Just if latlon B vl an/o .0EgsTe. Distriution l3L-j b ’On/ n4I Availbilit Code CONTENTS Section Page...the TACWAR modeln xx GLOSSARY Abbreviation -Meaning AAA antiaircraft artillery ABA airbase attacker * ABAE airbase attacker escort ABAS airbase...Do011010 End KS: .. US 001102 rsr ll rlOf do 1001) K spoft O tad-mi IDT *)WISIT 10046 ,tca ft K fmUt dhl IST INS ____nl ABA mcNOA Es AZ *in
Computational Modeling for the Flow Over a Multi-Element Airfoil
NASA Technical Reports Server (NTRS)
Liou, William W.; Liu, Feng-Jun
1999-01-01
The flow over a multi-element airfoil is computed using two two-equation turbulence models. The computations are performed using the INS2D) Navier-Stokes code for two angles of attack. Overset grids are used for the three-element airfoil. The computed results are compared with experimental data for the surface pressure, skin friction coefficient, and velocity magnitude. The computed surface quantities generally agree well with the measurement. The computed results reveal the possible existence of a mixing-layer-like region of flow next to the suction surface of the slat for both angles of attack.
Conical Euler simulation and active suppression of delta wing rocking motion
NASA Technical Reports Server (NTRS)
Lee, Elizabeth M.; Batina, John T.
1990-01-01
A conical Euler code was developed to study unsteady vortex-dominated flows about rolling highly-swept delta wings, undergoing either forced or free-to-roll motions including active roll suppression. The flow solver of the code involves a multistage Runge-Kutta time-stepping scheme which uses a finite volume spatial discretization of the Euler equations on an unstructured grid of triangles. The code allows for the additional analysis of the free-to-roll case, by including the rigid-body equation of motion for its simultaneous time integration with the governing flow equations. Results are presented for a 75 deg swept sharp leading edge delta wing at a freestream Mach number of 1.2 and at alpha equal to 10 and 30 deg angle of attack. A forced harmonic analysis indicates that the rolling moment coefficient provides: (1) a positive damping at the lower angle of attack equal to 10 deg, which is verified in a free-to-roll calculation; (2) a negative damping at the higher angle of attack equal to 30 deg at the small roll amplitudes. A free-to-roll calculation for the latter case produces an initially divergent response, but as the amplitude of motion grows with time, the response transitions to a wing-rock type of limit cycle oscillation. The wing rocking motion may be actively suppressed, however, through the use of a rate-feedback control law and antisymmetrically deflected leading edge flaps. The descriptions of the conical Euler flow solver and the free-to-roll analysis are presented. Results are also presented which give insight into the flow physics associated with unsteady vortical flows about forced and free-to-roll delta wings, including the active roll suppression of this wing-rock phenomenon.
Improving Remote Voting Security with CodeVoting
NASA Astrophysics Data System (ADS)
Joaquim, Rui; Ribeiro, Carlos; Ferreira, Paulo
One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors.
Quantum direct communication protocol strengthening against Pavičić’s attack
NASA Astrophysics Data System (ADS)
Zhang, Bo; Shi, Wei-Xu; Wang, Jian; Tang, Chao-Jing
2015-12-01
A quantum circuit providing an undetectable eavesdropping of information in message mode, which compromises all two-state ψ-ϕ quantum direct communication (QDC) protocols, has been recently proposed by Pavičić [Phys. Rev. A 87 (2013) 042326]. A modification of the protocol’s control mode is proposed, which improves users’ 25% detection probability of Eve to 50% at best, as that in ping-pong protocol. The modification also improves the detection probability of Wójcik’s attack [Phys. Rev. Lett 90 (2003) 157901] to 75% at best. The resistance against man-in-the-middle (MITM) attack as well as the discussion of security for four Bell state protocols is presented. As a result, the protocol security is strengthened both theoretically and practically, and quantum advantage of superdense coding is restored.
Optical information encryption based on incoherent superposition with the help of the QR code
NASA Astrophysics Data System (ADS)
Qin, Yi; Gong, Qiong
2014-01-01
In this paper, a novel optical information encryption approach is proposed with the help of QR code. This method is based on the concept of incoherent superposition which we introduce for the first time. The information to be encrypted is first transformed into the corresponding QR code, and thereafter the QR code is further encrypted into two phase only masks analytically by use of the intensity superposition of two diffraction wave fields. The proposed method has several advantages over the previous interference-based method, such as a higher security level, a better robustness against noise attack, a more relaxed work condition, and so on. Numerical simulation results and actual smartphone collected results are shown to validate our proposal.
Validation of CFD Codes for Parawing Geometries in Subsonic to Supersonic Flows
NASA Technical Reports Server (NTRS)
Cruz-Ayoroa, Juan G.; Garcia, Joseph A.; Melton, John E.
2014-01-01
Computational Fluid Dynamic studies of a rigid parawing at Mach numbers from 0.8 to 4.65 were carried out using three established inviscid, viscous and independent panel method codes. Pressure distributions along four chordwise sections of the wing were compared to experimental wind tunnel data gathered from NASA technical reports. Results show good prediction of the overall trends and magnitudes of the pressure distributions for the inviscid and viscous solvers. Pressure results for the panel method code diverge from test data at large angles of attack due to shock interaction phenomena. Trends in the flow behavior and their effect on the integrated force and moments on this type of wing are examined in detail using the inviscid CFD code results.
Influence of flowfield and vehicle parameters on engineering aerothermal methods
NASA Technical Reports Server (NTRS)
Wurster, Kathryn E.; Zoby, E. Vincent; Thompson, Richard A.
1989-01-01
The reliability and flexibility of three engineering codes used in the aerosphace industry (AEROHEAT, INCHES, and MINIVER) were investigated by comparing the results of these codes with Reentry F flight data and ground-test heat-transfer data for a range of cone angles, and with the predictions obtained using the detailed VSL3D code; the engineering solutions were also compared. In particular, the impact of several vehicle and flow-field parameters on the heat transfer and the capability of the engineering codes to predict these results were determined. It was found that entropy, pressure gradient, nose bluntness, gas chemistry, and angle of attack all affect heating levels. A comparison of the results of the three engineering codes with Reentry F flight data and with the predictions obtained of the VSL3D code showed a very good agreement in the regions of the applicability of the codes. It is emphasized that the parameters used in this study can significantly influence the actual heating levels and the prediction capability of a code.
NASA Technical Reports Server (NTRS)
Fulton, Patsy S.
1988-01-01
A wind-tunnel pressure study was conducted on an axisymmetric missile configuration in the Unitary Plan Wind Tunnel at NASA Langley Research Center. The Mach numbers ranged from 1.70 to 2.86 and the angles of attack ranged from minus 4 degrees to plus 24 degrees. The computational accuracy for limited conditions of a space-marching Euler code was assessed.
NASA Technical Reports Server (NTRS)
Chaderjian, Neal M.
1991-01-01
Computations from two Navier-Stokes codes, NSS and F3D, are presented for a tangent-ogive-cylinder body at high angle of attack. Features of this steady flow include a pair of primary vortices on the leeward side of the body as well as secondary vortices. The topological and physical plausibility of this vortical structure is discussed. The accuracy of these codes are assessed by comparison of the numerical solutions with experimental data. The effects of turbulence model, numerical dissipation, and grid refinement are presented. The overall efficiency of these codes are also assessed by examining their convergence rates, computational time per time step, and maximum allowable time step for time-accurate computations. Overall, the numerical results from both codes compared equally well with experimental data, however, the NSS code was found to be significantly more efficient than the F3D code.
Accuracy comparison among different machine learning techniques for detecting malicious codes
NASA Astrophysics Data System (ADS)
Narang, Komal
2016-03-01
In this paper, a machine learning based model for malware detection is proposed. It can detect newly released malware i.e. zero day attack by analyzing operation codes on Android operating system. The accuracy of Naïve Bayes, Support Vector Machine (SVM) and Neural Network for detecting malicious code has been compared for the proposed model. In the experiment 400 benign files, 100 system files and 500 malicious files have been used to construct the model. The model yields the best accuracy 88.9% when neural network is used as classifier and achieved 95% and 82.8% accuracy for sensitivity and specificity respectively.
Single-shot secure quantum network coding on butterfly network with free public communication
NASA Astrophysics Data System (ADS)
Owari, Masaki; Kato, Go; Hayashi, Masahito
2018-01-01
Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical communication in the multiple unicast setting under restricted eavesdropper’s power. This protocol certainly transmits quantum states when there is no attack. We also show the secrecy with shared randomness as additional resource when the eavesdropper wiretaps one of the channels in the butterfly network and also derives the information sending through public classical communication. Our protocol does not require verification process, which ensures single-shot security.
An Idealized, Single Radial Swirler, Lean-Direct-Injection (LDI) Concept Meshing Script
NASA Technical Reports Server (NTRS)
Iannetti, Anthony C.; Thompson, Daniel
2008-01-01
To easily study combustor design parameters using computational fluid dynamics codes (CFD), a Gridgen Glyph-based macro (based on the Tcl scripting language) dubbed BladeMaker has been developed for the meshing of an idealized, single radial swirler, lean-direct-injection (LDI) combustor. BladeMaker is capable of taking in a number of parameters, such as blade width, blade tilt with respect to the perpendicular, swirler cup radius, and grid densities, and producing a three-dimensional meshed radial swirler with a can-annular (canned) combustor. This complex script produces a data format suitable for but not specific to the National Combustion Code (NCC), a state-of-the-art CFD code developed for reacting flow processes.
Interactive Programming Support for Secure Software Development
ERIC Educational Resources Information Center
Xie, Jing
2012-01-01
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
Long non-coding RNAs as molecular players in plant defense against pathogens.
Zaynab, Madiha; Fatima, Mahpara; Abbas, Safdar; Umair, Muhammad; Sharif, Yasir; Raza, Muhammad Ammar
2018-05-31
Long non-coding RNAs (lncRNAs) has significant role in of gene expression and silencing pathways for several biological processes in eukaryotes. lncRNAs has been reported as key player in remodeling chromatin and genome architecture, RNA stabilization and transcription regulation, including enhancer-associated activity. Host lncRNAs are reckoned as compulsory elements of plant defense. In response to pathogen attack, plants protect themselves with the help of lncRNAs -dependent immune systems in which lncRNAs regulate pathogen-associated molecular patterns (PAMPs) and other effectors. Role of lncRNAs in plant microbe interaction has been studied extensively but regulations of several lncRNAs still need extensive research. In this study we discussed and provide as overview the topical advancements and findings relevant to pathogen attack and plant defense mediated by lncRNAs. It is hoped that lncRNAs would be exploited as a mainstream player to achieve food security by tackling different plant diseases. Copyright © 2018. Published by Elsevier Ltd.
Bellamy, Jaime L; Goff, Brandon J; Sayeed, Siraj A
2016-09-01
Knee osteoarthritis is a disabling disease that costs billions of dollars to treat. Corticosteroid gives varying pain relief and costs $12 per injection, whereas ketorolac costs $2 per injection, per institutional costs. The aim of this study was to compare ketorolac with corticosteroid based on pain relief using patient outcome measures and cost data. A total of 35 patients were randomized to ketorolac or corticosteroid intra-articular knee injection in a double-blind, prospective study. Follow-up was 24 weeks. Osteoarthritis was evaluated using Kellgren-Lawrence grading. Visual analog scale (VAS) was the primary outcome measure. A query of the institutional database was performed for International Classification of Diseases, Ninth Revision codes 715.16 and 719.46, and procedure code 20610 over a 3-year period. Two-way, repeated measures analysis of variance and Spearman rank correlation were used for statistical analysis. Mean VAS for ketorolac and corticosteroid decreased significantly from baseline at 2 weeks, 6.3-4.6 and 5.2-3.6, respectively and remained decreased for 24 weeks. There was no correlation between VAS and demographics within treatments. There were 220, 602, and 405 injections performed on patients with the International Classification of Diseases, Ninth Revision codes 715.16 and 719.46 during 2013, 2014, and 2015, respectively. The cost savings per year using ketorolac instead of corticosteroid would be $2259.40, $6182.54, and $4159.35 for 2013, 2014, and 2015, respectively, with a total savings of $12,601.29 over this period. Pain relief was similar between ketorolac and corticosteroid injections. Ketorolac knee injection is safe and effective with a cost savings percentage difference of 143% when compared with corticosteroid. Copyright © 2016 Elsevier Inc. All rights reserved.
Air pollution sources and childhood asthma attacks in Catano, Puerto Rico.
Loyo-Berríos, Nilsa I; Irizarry, Rafael; Hennessey, Joseph G; Tao, Xuguang Grant; Matanoski, Genevieve
2007-04-15
Asthma prevalence in the Cataño Air Basin of Puerto Rico is 27% for children aged 13-14 years and 45% for children aged 5-6 years. There is concern that these rates are related to air pollution. The authors conducted a nested case-control study to evaluate whether proximity to air pollution point sources was associated with increased risk of asthma attacks. For 1997-2001, 1,382 asthma-related medical visits (International Classification of Diseases, Ninth Revision, codes 493 and 493.9) in children under 17 were identified through health insurance claims. Controls were children with no asthma attacks who were randomly selected from enrollees in two health insurance companies by incidence density sampling (1:5) and matched to cases on gender, age, insurance company, and event date. The distance from a point source to the subject's residence area represented a surrogate exposure measurement. Odds ratios for a 1-km decrease in distance were obtained by conditional logistic regression. Risk of asthma attack was associated with residing near a grain mill (odds ratio (OR) = 1.35), petroleum refinery (OR = 1.44), asphalt plant (OR = 1.23), or power plant (OR = 1.28) (all p's < 0.05). Residence near major air emissions sources (>100 tons/year) increased asthma attack risk by 108% (p < 0.05). These results showed that proximity to some air pollution sources is associated with increased risks of asthma attacks.
Estimating the annual number of strokes and the issue of imperfect data: an example from Australia.
Cadilhac, Dominique A; Vos, Theo; Thrift, Amanda G
2014-01-01
Estimates of strokes in Australia are typically obtained using 1996-1997 age-specific attack rates from the pilot North East Melbourne Stroke Incidence (NEMESIS) Study (eight postcode regions). Declining hospitalizations for stroke indicate the potential to overestimate cases. To illustrate how current methods may potentially overestimate the number of strokes in Australia. Hospital separations data (primary discharge ICD10 codes I60 to I64) and three stroke projection models were compared. Each model had age- and gender-specific attack rates from the NEMESIS study applied to the 2003 population. One model used the 2003 Burden of Disease approach where the ratio of the 1996-1997 NEMESIS study incidence to hospital separation rate in the same year was adjusted by the 2002/2003 hospital separation rate within the same geographic region using relevant ICD-primary diagnosis codes. Hospital separations data were inflated by 12·1% to account for nonhospitalized stroke, while the Burden of Disease model was inflated by 27·6% to account for recurrent stroke events in that year. The third model used 1997-1999 attack rates from the larger 22-postcode NEMESIS study region. In 2003, Australian hospitalizations for stroke (I60 to I64) were 33,022, and extrapolation to all stroke (hospitalized and nonhospitalized) was 37,568. Applying NEMESIS study attack rates to the 2003 Australian population, 50,731 strokes were projected. Fewer cases for 2003 were estimated with the Burden of Disease model (28,364) and 22-postcode NEMESIS study rates (41,332). Estimating the number of strokes in a country can be highly variable depending on the recency of data, the type of data available, and the methods used. © 2013 The Authors. International Journal of Stroke © 2013 World Stroke Organization.
NASA Technical Reports Server (NTRS)
Kinard, Tim A.; Harris, Brenda W.; Raj, Pradeep
1995-01-01
Vortex flows on a twin-tail and a single-tail modular transonic vortex interaction (MTVI) model, representative of a generic fighter configuration, are computationally simulated in this study using the Three-dimensional Euler/Navier-Stokes Aerodynamic Method (TEAM). The primary objective is to provide an assessment of viscous effects on benign (10 deg angle of attack) and burst (35 deg angle of attack) vortex flow solutions. This study was conducted in support of a NASA project aimed at assessing the viability of using Euler technology to predict aerodynamic characteristics of aircraft configurations at moderate-to-high angles of attack in a preliminary design environment. The TEAM code solves the Euler and Reynolds-average Navier-Stokes equations on patched multiblock structured grids. Its algorithm is based on a cell-centered finite-volume formulation with multistage time-stepping scheme. Viscous effects are assessed by comparing the computed inviscid and viscous solutions with each other and experimental data. Also, results of Euler solution sensitivity to grid density and numerical dissipation are presented for the twin-tail model. The results show that proper accounting of viscous effects is necessary for detailed design and optimization but Euler solutions can provide meaningful guidelines for preliminary design of flight vehicles which exhibit vortex flows in parts of their flight envelope.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jared Stimson
FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE Computer Forensics is concerned with the use of computer investigation and analysis techniques in order to collect evidence suitable for presentation in court. The examination of volatile memory is a relatively new but important area in computer forensics. More recently criminals are becoming more forensically aware and are now able to compromise computers without accessing the hard disk of the target computer. This means that traditional incident response practice of pulling the plug will destroy the only evidence of the crime. While some techniques are available for acquiring the contentsmore » of main memory, few exist which can analyze these data in a meaningful way. One reason for this is how memory is managed by the operating system. Data belonging to one process can be distributed arbitrarily across physical memory or the hard disk, making it very difficult to recover useful information. This report will focus on how these disparate sources of information can be combined to give a single, contiguous address space for each process. Using address translation a tool is developed to reconstruct the virtual address space of a process by combining a physical memory dump with the page-file on the hard disk. COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS As computer network technology continues to grow so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online prescience, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to uncover company and government secrets. Every year billions of dollars are invested in preventing and recovering from the introduction of malicious code into a system. However, there is little research being done on leveraging these attacks for counterintelligence opportunities. With the ever-increasing number of vulnerable computers on the Internet the task of attributing these attacks to an organization or a single person is a daunting one. This thesis will demonstrate the idea of intentionally running a piece of malicious code in a secure environment in order to gain counterintelligence on an attacker.« less
Numerical Simulation of a Double-anode Magnetron Injection Gun for 110 GHz, 1 MW Gyrotron
NASA Astrophysics Data System (ADS)
Singh, Udaybir; Kumar, Nitin; Purohit, L. P.; Sinha, Ashok K.
2010-07-01
A 40 A double-anode magnetron injection gun for a 1 MW, 110 GHz gyrotron has been designed. The preliminary design has been obtained by using some trade-off equations. The electron beam analysis has been performed by using the commercially available code EGUN and the in-house developed code MIGANS. The operating mode of the gyrotron is TE22,6 and it is operated in the fundamental harmonic. The electron beam with a low transverse velocity spread ( δ {β_{ bot max }} = 2.26% ) and the transverse-to-axial velocity ratio of the electron beam (α) = 1.37 is obtained. The simulated results of the MIG obtained with the EGUN code have been validated with another trajectory code TRAK. The results on the design output parameters obtained by both the codes are in good agreement. The sensitivity analysis has been carried out by changing the different gun parameters to decide the fabrication tolerance.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fu, Pengcheng; Mcclure, Mark; Shiozawa, Sogo
A series of experiments performed at the Fenton Hill hot dry rock site after stage 2 drilling of Phase I reservoir provided intriguing field observations on the reservoir’s responses to injection and venting under various conditions. Two teams participating in the US DOE Geothermal Technologies Office (GTO)’s Code Comparison Study (CCS) used different numerical codes to model these five experiments with the objective of inferring the hydraulic stimulation mechanism involved. The codes used by the two teams are based on different numerical principles, and the assumptions made were also different, due to intrinsic limitations in the codes and the modelers’more » personal interpretations of the field observations. Both sets of models were able to produce the most important field observations and both found that it was the combination of the vertical gradient of the fracture opening pressure, injection volume, and the use/absence of proppant that yielded the different outcomes of the five experiments.« less
Fractal Viscous Fingering in Fracture Networks
NASA Astrophysics Data System (ADS)
Boyle, E.; Sams, W.; Ferer, M.; Smith, D. H.
2007-12-01
We have used two very different physical models and computer codes to study miscible injection of a low- viscosity fluid into a simple fracture network, where it displaces a much-more viscous "defending" fluid through "rock" that is otherwise impermeable. The one code (NETfLow) is a standard pore level model, originally intended to treat laboratory-scale experiments; it assumes negligible mixing of the two fluids. The other code (NFFLOW) was written to treat reservoir-scale engineering problems; It explicitly treats the flow through the fractures and allows for significant mixing of the fluids at the interface. Both codes treat the fractures as parallel plates, of different effective apertures. Results are presented for the composition profiles from both codes. Independent of the degree of fluid-mixing, the profiles from both models have a functional form identical to that for fractal viscous fingering (i.e., diffusion limited aggregation, DLA). The two codes that solve the equations for different models gave similar results; together they suggest that the injection of a low-viscosity fluid into large- scale fracture networks may be much more significantly affected by fractal fingering than previously illustrated.
MHD Simulation of the HIT-SI Experiment
NASA Astrophysics Data System (ADS)
Marklin, George
2003-10-01
The Helicity Injected Torus (HIT) experiment at the University of Washington has been reconfigured into a high beta spheromak with steady state AC current drive [1]. Helicity is injected by two half torus Reversed Field Pinches (RFP's) connected to the ends of the cylindrically symmetric flux conserver, rotated by 90 degrees from each other. The RFP's are driven with sinusoidally varying voltage and flux. Each side has its voltage and flux in phase, but is 90 degrees out of phase from the other side. The helicity injection rate, which is proportional to the voltage times the flux, goes like sin(wt)^2 on one side and cos(wt)^2 on the other, making the total injection rate constant in time. The complex multiply connected 3-dimensional geometry of this device make it difficult to simulate with existing codes that typically use a structured mesh. This poster will describe a new 3D MHD simulation code and a new 3D Taylor state code which both use an unstructured finite element mesh. The mesh is generated from a CAD-like description of an arbitrary arrangement of 3D geometrical objects. Taylor states in the HIT-SI geometry will be shown for different combinations of fluxes in the two injectors. MHD simulation results will be shown starting from a Taylor state with uniform density and temperature and continuing through several cycles of time dependent helicity injection. Field line tracing plots will show the quality of the flux surfaces at various stages in the injection cycle. [1] T. R. Jarboe, Fusion Technology, vol. 36, p. 85, 1999
Provably secure identity-based identification and signature schemes from code assumptions
Zhao, Yiming
2017-01-01
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940
Provably secure identity-based identification and signature schemes from code assumptions.
Song, Bo; Zhao, Yiming
2017-01-01
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.
A Secure Information Framework with APRQ Properties
NASA Astrophysics Data System (ADS)
Rupa, Ch.
2017-08-01
Internet of the things is the most trending topics in the digital world. Security issues are rampant. In the corporate or institutional setting, security risks are apparent from the outset. Market leaders are unable to use the cryptographic techniques due to their complexities. Hence many bits of private information, including ID, are readily available for third parties to see and to utilize. There is a need to decrease the complexity and increase the robustness of the cryptographic approaches. In view of this, a new cryptographic technique as good encryption pact with adjacency, random prime number and quantum code properties has been proposed. Here, encryption can be done by using quantum photons with gray code. This approach uses the concepts of physics and mathematics with no external key exchange to improve the security of the data. It also reduces the key attacks by generation of a key at the party side instead of sharing. This method makes the security more robust than with the existing approach. Important properties of gray code and quantum are adjacency property and different photons to a single bit (0 or 1). These can reduce the avalanche effect. Cryptanalysis of the proposed method shows that it is resistant to various attacks and stronger than the existing approaches.
Vulnerabilities in Bytecode Removed by Analysis, Nuanced Confinement and Diversification (VIBRANCE)
2015-06-01
VIBRANCE tool starts with a vulnerable Java application and automatically hardens it against SQL injection, OS command injection, file path traversal...7 2.2 Java Front End...7 2.2.2 Java Byte Code Parser
Hale, Brent; Knackmuhs, Eric; Mackert, Michael
2018-01-01
Background Anonymous verbal attacks against overweight individuals on social media are common and widespread. These comments often use negative, misogynist, or derogatory words, which stigmatize the targeted individuals with obesity. These verbal attacks may cause depression in overweight individuals, which could subsequently promote unhealthy eating behavior (ie, binge eating) and further weight gain. To develop an intervention policy and strategies that tackle the anonymous, Web-based verbal attacks, a thorough understanding of the comments is necessary. Objective This study aimed to examine how anonymous users verbally attack or defend overweight individuals in terms of 3 themes: (1) topic of verbal attack (ie, what aspects of overweight individuals are verbally attacked), (2) gender of commenters and targeted overweight individuals, and (3) intensity of derogation depending on the targeted gender (ie, the number of swear words used within comments). Methods This study analyzed the content of YouTube comments that discuss overweight individuals or groups from 2 viral videos, titled “Fat Girl Tinder Date” and “Fat Guy Tinder Date.” The twin videos provide an avenue through which to analyze discussions of obesity as they organically occurred in a contemporary setting. We randomly sampled and analyzed 320 comments based on a coding instrument developed for this study. Results First, there were twice as many comments verbally attacking overweight individuals (n=174) than comments defending them (n=89). Second, overweight women are attacked for their capacities (eg, laziness, maturity; 14/51, 28%), whereas overweight men are attacked for their heterosocial skills (eg, rudeness, annoyance; 24/29, 83%). Third, the majority of commenters who attacked overweight women are male (42/52, 81%). Fourth, attacking comments generated toward overweight women included more swear words (mean 0.44, SD 0.77) than those targeting men (mean 0.23, SD 0.48). Conclusions Our data elucidate a worrying situation of frequent disinhibited aggressive messages against overweight individuals online. Importantly, the patterns of verbal aggression differ depending on the gender of the targeted overweight individuals. Thus, gender-tailored intervention strategies that specifically tackle Internet users’ verbal aggression against overweight individuals need to be developed. PMID:29559426
Thurnheer, R; Henz, S; Knoblauch, A
1997-09-01
The term "sleep-related laryngospasm" refers to episodic, abrupt interruption of sleep accompanied by feelings of acute suffocation followed by stridor. The condition is included in the diagnostic and coding manual of the American Sleep Disorders Association (ASDA), but there are few references in the peer-reviewed literature. Our description of the distinct clinical picture associated with this condition is based on an analysis of the histories of a series of 10 patients. The patients and their families gave precise, uniform accounts of the dramatic attacks. Diagnostic work-up included pulmonary and gastroenterological assessment. All patients reported sudden awakening from sleep due to feelings of acute suffocation, accompanied by intense fear. Apnoea lasting 5-45 s was followed by stridor. Breathing returned to normal within minutes. Patients were left exhausted by the attacks. Nine of our 10 patients had evidence of gastro-oesophageal reflux and six responded to antireflux therapy. We conclude that the nocturnal choking attacks (and the occasional daytime attacks experienced by some of the patients) are caused by laryngospasm. The pathogenesis of the apparent underlying laryngeal irritability is unknown. The condition may be related to a gastro-oesophageal reflux.
Quantum secret information equal exchange protocol based on dense coding
NASA Astrophysics Data System (ADS)
Jiang, Ying-Hua; Zhang, Shi-Bin; Dai, Jin-Qiao; Shi, Zhi-Ping
2018-04-01
In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.
Fault-tolerant simple quantum-bit commitment unbreakable by individual attacks
NASA Astrophysics Data System (ADS)
Shimizu, Kaoru; Imoto, Nobuyuki
2002-03-01
This paper proposes a simple scheme for quantum-bit commitment that is secure against individual particle attacks, where a sender is unable to use quantum logical operations to manipulate multiparticle entanglement for performing quantum collective and coherent attacks. Our scheme employs a cryptographic quantum communication channel defined in a four-dimensional Hilbert space and can be implemented by using single-photon interference. For an ideal case of zero-loss and noiseless quantum channels, our basic scheme relies only on the physical features of quantum states. Moreover, as long as the bit-flip error rates are sufficiently small (less than a few percent), we can improve our scheme and make it fault tolerant by adopting simple error-correcting codes with a short length. Compared with the well-known Brassard-Crepeau-Jozsa-Langlois 1993 (BCJL93) protocol, our scheme is mathematically far simpler, more efficient in terms of transmitted photon number, and better tolerant of bit-flip errors.
Focal hyperemia followed by spreading oligemia and impaired activation of rCBF in classic migraine
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olesen, J.; Larsen, B.; Lauritzen, M.
1981-04-01
Regional cerebral blood flow (rCBF) was measured in 254 areas of a hemisphere with the xenon 133 intraarterial injection method. Six cases of classic migraine were followed from the normal state into the prodromal phase, and in 3 cases further into the headache phase. One patient with common migraine was similarly followed during his only classic attack. The attacks were initiated by focal hyperemia in 3 patients. During prodromes all patients displayed occipitoparietal rCBF reduction (oligemia), but in only 1 case did the reduction approach critical values. Oligemia gradually spread anteriorly in the course of 15 to 45 minutes. Inmore » 4 patients a global oligemia was observed. In 4 patients severe headache was present concomitantly with oligemia and with no sign of hyperemia or nonhomogeneous brain perfusion. The normal rCBF increase during cortical activity (hand movement, speech, and similar activities) was impaired in 6 patients. The results indicate that the vasospastic model of the migraine attack is too simplistic.« less
Medical aspects of the Iraqi missile attacks on Israel.
Karsenty, E; Shemer, J; Alshech, I; Cojocaru, B; Moscovitz, M; Shapiro, Y; Danon, Y L
1991-01-01
During the period 18 January-28 February 1991, a total of 39 Iraqi modified Scud missiles landed in Israel, most of them in the densely populated Tel Aviv area. There were 23 missile attack alerts. These attacks caused 1,059 cases of injury; there were two deaths and 232 patients were admitted to emergency rooms for injuries directly related to the explosions, only one of which was severe. A survey among 91 of the injured showed that 46.6% of the wounds were caused by glass splinters, 31.1% were blunt contusions, and 22.2% were acute psychological reactions. No case of blast injury was reported. Inappropriate injection of atropine was reported in 230 cases. Acute anxiety was the reason for admission of 544 patients to emergency rooms. Another 40 patients sustained various traumas while rushing to the sealed room. The relatively low number of injured people is striking in view of the density of population in the areas hit. Various explanations are discussed.
Using Semantic Templates to Study Vulnerabilities Recorded in Large Software Repositories
ERIC Educational Resources Information Center
Wu, Yan
2011-01-01
Software vulnerabilities allow an attacker to reduce a system's Confidentiality, Availability, and Integrity by exposing information, executing malicious code, and undermine system functionalities that contribute to the overall system purpose and need. With new vulnerabilities discovered everyday in a variety of applications and user environments,…
Real Time Network Monitoring and Reporting System
ERIC Educational Resources Information Center
Massengale, Ricky L., Sr.
2009-01-01
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
A Weakest Precondition Approach to Robustness
NASA Astrophysics Data System (ADS)
Balliu, Musard; Mastroeni, Isabella
With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.
Antonaci, Fabio; Fredriksen, Torbjørn; Pareja, Juan A.; Sjaastad, Ottar
2018-01-01
A solitary patient with symptoms similar to those of shortlasting unilateral neuralgiform conjunctival injection and tearing (SUNCT) was first mentioned in 1978. The term SUNCT was first used in 1991. SUNCT is an acronym; the “S” signifies “Shortlasting”; the “U” symbolizes “Unilateral”; “N” stands for “Neuralgiform”; the “C” for “Conjunctival injection”; and “T” for “Tearing.” The term short-lasting unilateral neuralgiform headache attacks with cranial autonomic symptoms were marketed in 2004. The terminology and new view points are discussed and nosography proposal for SUNCT is presented. PMID:29740387
Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit
2015-09-01
Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack. Copyright © 2015 Elsevier B.V. All rights reserved.
DAMAGE MODELING OF INJECTION-MOLDED SHORT- AND LONG-FIBER THERMOPLASTICS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nguyen, Ba Nghiep; Kunc, Vlastimil; Bapanapalli, Satish K.
2009-10-30
This article applies the recent anisotropic rotary diffusion – reduced strain closure (ARD-RSC) model for predicting fiber orientation and a new damage model for injection-molded long-fiber thermoplastics (LFTs) to analyze progressive damage leading to total failure of injection-molded long-glass-fiber/polypropylene (PP) specimens. The ARD-RSC model was implemented in a research version of the Autodesk Moldflow Plastics Insight (MPI) processing code, and it has been used to simulate injection-molding of a long-glass-fiber/PP plaque. The damage model combines micromechanical modeling with a continuum damage mechanics description to predict the nonlinear behavior due to plasticity coupled with damage in LFTs. This model has beenmore » implemented in the ABAQUS finite element code via user-subroutines and has been used in the damage analyses of tensile specimens removed from the injection-molded long-glass-fiber/PP plaques. Experimental characterization and mechanical testing were performed to provide input data to support and validate both process modeling and damage analyses. The predictions are in agreement with the experimental results.« less
Simulation of the ELMs triggering by lithium pellet on EAST tokamak using BOUT + +
NASA Astrophysics Data System (ADS)
Wang, Y. M.; Xu, X. Q.; Wang, Z.; Sun, Z.; Hu, J. S.; Gao, X.
2017-10-01
A new lithium granule injector (LGI) was developed on EAST. Using the LGI, lithium granules can be efficiently injected into EAST tokamak with the granule radius 0.2-1 mm and the granules velocity 30-110 m/s. ELM pacing was realized during EAST shot #70123 at time window from 4.4-4.7s, the average velocity of the pellet was 75 m/s and the average injection rate is at 99Hz. The BOUT + + 6-field electromagnetic turbulence code has been used to simulate the ELM pacing process. A neutral gas shielding (NGS) model has been implemented during the pellet ablation process. The neutral transport code is used to evaluate the ionized electron and Li ion densities with the charge exchange as a dominant factor in the neutral cloud diffusion process. The snapshot plasma profiles during the pellet ablation and toroidal symmetrization process are used in the 6-field turbulence code to evaluate the impact of the pellets on ELMs. Destabilizing effects of the peeling-ballooning modes are found with lithium pellet injection, which is consistent with the experimental results. A scan of the pellet size, shape and the injection velocity will be conducted, which will benefit the pellet injection design in both the present and future devices. Prepared by LLNL under Contract DE-AC52-07NA27344 and this work is supported by the National Natural Science Fonudation of China (Grant No. 11505221) and China Scholarship Council (Grant No. 201504910132).
Flow visualization study of close-coupled canard wing and strake wing configuration
NASA Technical Reports Server (NTRS)
Miner, D. D.; Gloss, B. B.
1975-01-01
The Langley 1/8-scale V/STOL model tunnel was used to qualitatively determine the flow fields associated with semi-span close coupled canard wing and strake wing models. Small helium filled bubbles were injected upstream of the models to make the flow visible. Photographs were taken over the angle-of-attack ranges of -10 deg to 40 deg.
Anticonvulsant and neuroprotective effects of Pimpinella anisum in rat brain
2012-01-01
Background Essential oil of Pimpinella anisum L. Apiaceae (anise oil) has been widely used in traditional Persian medicine to treat a variety of diseases, including some neurological disorders. This study was aimed to test the possible anti-seizure and anti-hypoxia effects of anise oil. Methods The effects of different concentrations of anise oil were tested on seizure attacks induced by pentylenetetrazol (PTZ) injection and neuronal hypoxia induced by oxygen withdrawal as well as on production of dark neurons and induction of long-term potentiation (LTP) in in vivo and in vitro experimental models of rat brain. Results Anise oil significantly prolonged the latency of seizure attacks and reduced the amplitude and duration of epileptiform burst discharges induced by injection of intraperitoneal PTZ. In addition, anise oil significantly inhibited production of dark neurons in different regions of the brain in epileptic rats. Anise oil also significantly enhanced the duration of the appearance of anoxic terminal negativity induced by oxygen withdrawal and inhibited induction of LTP in hippocampal slices. Conclusions Our data indicate the anticonvulsant and neuroprotective effects of anise oil, likely via inhibition of synaptic plasticity. Further evaluation of anise oil to use in the treatment of neurological disorders is suggested. PMID:22709243
FDNS code to predict wall heat fluxes or wall temperatures in rocket nozzles
NASA Technical Reports Server (NTRS)
Karr, Gerald R.
1993-01-01
This report summarizes the findings on the NASA contract NAG8-212, Task No. 3. The overall project consists of three tasks, all of which have been successfully completed. In addition, some supporting supplemental work, not required by the contract, has been performed and is documented herein. Task 1 involved the modification of the wall functions in the code FDNS to use a Reynolds Analogy-based method. Task 2 involved the verification of the code against experimentally available data. The data chosen for comparison was from an experiment involving the injection of helium from a wall jet. Results obtained in completing this task also show the sensitivity of the FDNS code to unknown conditions at the injection slot. Task 3 required computation of the flow of hot exhaust gases through the P&W 40K subscale nozzle. Computations were performed both with and without film coolant injection. The FDNS program tends to overpredict heat fluxes, but, with suitable modeling of backside cooling, may give reasonable wall temperature predictions. For film cooling in the P&W 40K calorimeter subscale nozzle, the average wall temperature is reduced from 1750 R to about 1050 R by the film cooling. The average wall heat flux is reduced by a factor of three.
A Case of Occupational Asthma in a Plastic Injection Process Worker
2013-01-01
Objectives We report a case of death due to asthma attack in a plastic injection process worker with a history of asthma. Methods To assess task relevance, personal history including occupational history and medical records were reviewed. Samples of the substances utilized in the injection process were collected by visiting the patient’s workplace. The work environment with the actual process was reproduced in the laboratory, and the released substances were evaluated. Results The medical records confirmed that the patient’s conventional asthma was in remission. The analysis of the resins discharged from the injection process simulation revealed styrene, which causes occupational asthma, and benzenepropanoic acid, 3,5-bis(1,1-dimethylethyl)-4-hydroxy-, and octadecyl ester. Even though it was not the case in the present study, various harmful substances capable of inducing asthma such as formaldehyde, acrolein, and acetic acid are released during resin processing. Conclusion A worker was likely to occur occupational asthma as a result of the exposure to the harmful substances generated during the plastic injection process. PMID:24472161
Calculation of prompt loss and toroidal field ripple loss under neutral beam injection on EAST
NASA Astrophysics Data System (ADS)
Wu, Bin; Hao, Baolong; White, Roscoe; Wang, Jinfang; Zang, Qing; Han, Xiaofeng; Hu, Chundong
2017-02-01
Neutral beam injection is a major auxiliary heating method in the EAST experimental campaign. This paper gives detailed calculations of beam loss with different plasma equilibria using the guiding center code ORBIT and NUBEAM/TRANSP. Increasing plasma current can dramatically lower the beam ion prompt loss and ripple loss. Countercurrent beam injection gives a much larger prompt loss fraction than co-injection, and ripple-induced collisionless stochastic diffusion is the dominant loss channel.
Calculation of prompt loss and toroidal field ripple loss under neutral beam injection on EAST
Wu, Bin; Hao, Baolong; White, Roscoe; ...
2016-12-09
Here, neutral beam injection is a major auxiliary heating method in the EAST experimental campaign. This paper gives detailed calculations of beam loss with different plasma equilibria using the guiding center code ORBIT and NUBEAM/TRANSP. Increasing plasma current can dramatically lower the beam ion prompt loss and ripple loss. Countercurrent beam injection gives a much larger prompt loss fraction than co-injection, and ripple-induced collisionless stochastic diffusion is the dominant loss channel.
Calculation of prompt loss and toroidal field ripple loss under neutral beam injection on EAST
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Bin; Hao, Baolong; White, Roscoe
Here, neutral beam injection is a major auxiliary heating method in the EAST experimental campaign. This paper gives detailed calculations of beam loss with different plasma equilibria using the guiding center code ORBIT and NUBEAM/TRANSP. Increasing plasma current can dramatically lower the beam ion prompt loss and ripple loss. Countercurrent beam injection gives a much larger prompt loss fraction than co-injection, and ripple-induced collisionless stochastic diffusion is the dominant loss channel.
Development of a dynamic coupled hydro-geomechanical code and its application to induced seismicity
NASA Astrophysics Data System (ADS)
Miah, Md Mamun
This research describes the importance of a hydro-geomechanical coupling in the geologic sub-surface environment from fluid injection at geothermal plants, large-scale geological CO2 sequestration for climate mitigation, enhanced oil recovery, and hydraulic fracturing during wells construction in the oil and gas industries. A sequential computational code is developed to capture the multiphysics interaction behavior by linking a flow simulation code TOUGH2 and a geomechanics modeling code PyLith. Numerical formulation of each code is discussed to demonstrate their modeling capabilities. The computational framework involves sequential coupling, and solution of two sub-problems- fluid flow through fractured and porous media and reservoir geomechanics. For each time step of flow calculation, pressure field is passed to the geomechanics code to compute effective stress field and fault slips. A simplified permeability model is implemented in the code that accounts for the permeability of porous and saturated rocks subject to confining stresses. The accuracy of the TOUGH-PyLith coupled simulator is tested by simulating Terzaghi's 1D consolidation problem. The modeling capability of coupled poroelasticity is validated by benchmarking it against Mandel's problem. The code is used to simulate both quasi-static and dynamic earthquake nucleation and slip distribution on a fault from the combined effect of far field tectonic loading and fluid injection by using an appropriate fault constitutive friction model. Results from the quasi-static induced earthquake simulations show a delayed response in earthquake nucleation. This is attributed to the increased total stress in the domain and not accounting for pressure on the fault. However, this issue is resolved in the final chapter in simulating a single event earthquake dynamic rupture. Simulation results show that fluid pressure has a positive effect on slip nucleation and subsequent crack propagation. This is confirmed by running a sensitivity analysis that shows an increase in injection well distance results in delayed slip nucleation and rupture propagation on the fault.
Injecting Errors for Testing Built-In Test Software
NASA Technical Reports Server (NTRS)
Gender, Thomas K.; Chow, James
2010-01-01
Two algorithms have been conceived to enable automated, thorough testing of Built-in test (BIT) software. The first algorithm applies to BIT routines that define pass/fail criteria based on values of data read from such hardware devices as memories, input ports, or registers. This algorithm simulates effects of errors in a device under test by (1) intercepting data from the device and (2) performing AND operations between the data and the data mask specific to the device. This operation yields values not expected by the BIT routine. This algorithm entails very small, permanent instrumentation of the software under test (SUT) for performing the AND operations. The second algorithm applies to BIT programs that provide services to users application programs via commands or callable interfaces and requires a capability for test-driver software to read and write the memory used in execution of the SUT. This algorithm identifies all SUT code execution addresses where errors are to be injected, then temporarily replaces the code at those addresses with small test code sequences to inject latent severe errors, then determines whether, as desired, the SUT detects the errors and recovers
Design of a double-anode magnetron-injection gun for the W-band gyrotron
NASA Astrophysics Data System (ADS)
Jang, Kwang Ho; Choi, Jin Joo; So, Joon Ho
2015-07-01
A double-anode magnetron-injection gun (MIG) was designed. The MIG is for a W-band 10-kW gyrotron. Analytic equations based on adiabatic theory and angular momentum conservation were used to examine the initial design parameters such as the cathode angle, and the radius of the beam emitting surface. The MIG's performances were predicted by using an electron trajectory code, the EGUN code. The beam spread of the axial velocity, Δvz/vz, obtained from the EGUN code was observed to be 1.34% at α = 1.3. The cathode edge emission and the thermal effect were modeled. The cathode edge emission was found to have a major effect on the velocity spread. The electron beam's quality was significantly improved by affixing non-emissive cylinders to the cathode.
2015-03-01
our focus will remain on Android rather than being all-inclusive of others such as iOS, Blackberry 10, and Windows Phone. The proof-of-concept...the attack surface for malicious applications to compromise vulnerable Services grows . Additionally, Services also have a life cycle with
Transformative Rendering of Internet Resources
2012-10-01
4 Securing WiFi Connections...comes from legitimate web sites that have themselves been hacked . There is no way of anticipating which of these sites have been hacked and therefore...pose a security threat to visitors. The purpose of most of this web page hacking is to plant malicious code on the web site that will attack any
Design of a Double Anode Magnetron Injection Gun for Q-band Gyro-TWT Using Boundary Element Method
NASA Astrophysics Data System (ADS)
Li, Zhiliang; Feng, Jinjun; Liu, Bentian
2018-04-01
This paper presents a novel design code for double anode magnetron injection guns (MIGs) in gyro-devices based on boundary element method (BEM). The physical and mathematical models were constructed, and then the code using BEM for MIG's calculation was developed. Using the code, a double anode MIG for a Q-band gyrotron traveling-wave tube (gyro-TWT) amplifier operating in the circular TE01 mode at the fundamental cyclotron harmonic was designed. In order to verify the reliability of this code, velocity spread and guiding center radius of the MIG simulated by the BEM code were compared with these from the commonly used EGUN code, showing a reasonable agreement. Then, a Q-band gyro-TWT was fabricated and tested. The testing results show that the device has achieved an average power of 5kW and peak power ≥ 150 kW at a 3% duty cycle within bandwidth of 2 GHz, and maximum output peak power of 220 kW, with a corresponding saturated gain of 50.9 dB and efficiency of 39.8%. This paper demonstrates that the BEM code can be used as an effective approach for analysis of electron optics system in gyro-devices.
Investigations on the sensitivity of the computer code TURBO-2D
NASA Astrophysics Data System (ADS)
Amon, B.
1994-12-01
The two-dimensional computer model TURBO-2D for the calculation of two-phase flow was used to calculate the cold injection of fuel into a model chamber. Investigations of the influence of the input parameter on its sensitivity relative to the obtained results were made. In addition to that calculations were performed and compared using experimental injection pressure data and corresponding averaged injection parameter.
An Extensible NetLogo Model for Visualizing Message Routing Protocols
2017-08-01
the hard sciences to the social sciences to computer-generated art. NetLogo represents the world as a set of...describe the model is shown here; for the supporting methods , refer to the source code. Approved for public release; distribution is unlimited. 4 iv...if ticks - last-inject > time-to-inject [inject] if run# > #runs [stop] end Next, we present some basic statistics collected for the
Jeon, Yongwoog Andrew; Hale, Brent; Knackmuhs, Eric; Mackert, Michael
2018-03-20
Anonymous verbal attacks against overweight individuals on social media are common and widespread. These comments often use negative, misogynist, or derogatory words, which stigmatize the targeted individuals with obesity. These verbal attacks may cause depression in overweight individuals, which could subsequently promote unhealthy eating behavior (ie, binge eating) and further weight gain. To develop an intervention policy and strategies that tackle the anonymous, Web-based verbal attacks, a thorough understanding of the comments is necessary. This study aimed to examine how anonymous users verbally attack or defend overweight individuals in terms of 3 themes: (1) topic of verbal attack (ie, what aspects of overweight individuals are verbally attacked), (2) gender of commenters and targeted overweight individuals, and (3) intensity of derogation depending on the targeted gender (ie, the number of swear words used within comments). This study analyzed the content of YouTube comments that discuss overweight individuals or groups from 2 viral videos, titled "Fat Girl Tinder Date" and "Fat Guy Tinder Date." The twin videos provide an avenue through which to analyze discussions of obesity as they organically occurred in a contemporary setting. We randomly sampled and analyzed 320 comments based on a coding instrument developed for this study. First, there were twice as many comments verbally attacking overweight individuals (n=174) than comments defending them (n=89). Second, overweight women are attacked for their capacities (eg, laziness, maturity; 14/51, 28%), whereas overweight men are attacked for their heterosocial skills (eg, rudeness, annoyance; 24/29, 83%). Third, the majority of commenters who attacked overweight women are male (42/52, 81%). Fourth, attacking comments generated toward overweight women included more swear words (mean 0.44, SD 0.77) than those targeting men (mean 0.23, SD 0.48). Our data elucidate a worrying situation of frequent disinhibited aggressive messages against overweight individuals online. Importantly, the patterns of verbal aggression differ depending on the gender of the targeted overweight individuals. Thus, gender-tailored intervention strategies that specifically tackle Internet users' verbal aggression against overweight individuals need to be developed. ©Yongwoog Andrew Jeon, Brent Hale, Eric Knackmuhs, Michael Mackert. Originally published in the Interactive Journal of Medical Research (http://www.i-jmr.org/), 20.03.2018.
NASA Astrophysics Data System (ADS)
Wang, Zhi-peng; Zhang, Shuai; Liu, Hong-zhao; Qin, Yi
2014-12-01
Based on phase retrieval algorithm and QR code, a new optical encryption technology that only needs to record one intensity distribution is proposed. In this encryption process, firstly, the QR code is generated from the information to be encrypted; and then the generated QR code is placed in the input plane of 4-f system to have a double random phase encryption. For only one intensity distribution in the output plane is recorded as the ciphertext, the encryption process is greatly simplified. In the decryption process, the corresponding QR code is retrieved using phase retrieval algorithm. A priori information about QR code is used as support constraint in the input plane, which helps solve the stagnation problem. The original information can be recovered without distortion by scanning the QR code. The encryption process can be implemented either optically or digitally, and the decryption process uses digital method. In addition, the security of the proposed optical encryption technology is analyzed. Theoretical analysis and computer simulations show that this optical encryption system is invulnerable to various attacks, and suitable for harsh transmission conditions.
Hi-alpha forebody design. Part 1: Methodology base and initial parametrics
NASA Technical Reports Server (NTRS)
Mason, William H.; Ravi, R.
1992-01-01
The use of Computational Fluid Dynamics (CFD) has been investigated for the analysis and design of aircraft forebodies at high angle of attack combined with sideslip. The results of the investigation show that CFD has reached a level of development where computational methods can be used for high angle of attack aerodynamic design. The classic wind tunnel experiment for the F-5A forebody directional stability has been reproduced computationally over an angle of attack range from 10 degrees to 45 degrees, and good agreement with experimental data was obtained. Computations have also been made at combined angle of attack and sideslip over a chine forebody, demonstrating the qualitative features of the flow, although not producing good agreement with measured experimental pressure distributions. The computations were performed using the code known as cfl3D for both the Euler equations and the Reynolds equations using a form of the Baldwin-Lomax turbulence model. To study the relation between forebody shape and directional stability characteristics, a generic parametric forebody model has been defined which provides a simple analytic math model with flexibility to capture the key shape characteristics of the entire range of forebodies of interest, including chines.
PAN AIR application to the F-106B
NASA Technical Reports Server (NTRS)
Ghaffari, F.
1986-01-01
The PAN AIR computer code was employed in the present study to investigate the aerodynamic effects of the various geometrical changes and flow conditions on a configuration similar to the F-106B half-airplane tested in the Langley 30x60-foot wind tunnel. The various geometries studied included two forebodies (original and shortened), two inlet flow conditions (open and closed) two vortex flap situations (off and on). The attached flow theoretical solutions were obtained for Mach number of 0.08 and angle of attack of 8 deg., 10 deg., 12 deg., and 14 deg. In general this investigation revealed that the shortening of the forebody or closing of the inlet produced only a small change in the overall aerodynamic coefficients of the basic F-106B configuration throughout the examined angles of attack. However, closing the inlet of the configuration resulted in a slightly higher drag level at low angles of attack. Furthermore, at and above 10 deg. angle of attack, it was shown that the presence of the vortex flap causes an increase in the total lift and drag. Also, these theoretical results showed the expected reduction in longitudinal stability level with addition of the vortex flap to the basic F-106B configuration.
Coding ethical behaviour: the challenges of biological weapons.
Rappert, Brian
2003-10-01
Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.
Numerical computation of space shuttle orbiter flow field
NASA Technical Reports Server (NTRS)
Tannehill, John C.
1988-01-01
A new parabolized Navier-Stokes (PNS) code has been developed to compute the hypersonic, viscous chemically reacting flow fields around 3-D bodies. The flow medium is assumed to be a multicomponent mixture of thermally perfect but calorically imperfect gases. The new PNS code solves the gas dynamic and species conservation equations in a coupled manner using a noniterative, implicit, approximately factored, finite difference algorithm. The space-marching method is made well-posed by special treatment of the streamwise pressure gradient term. The code has been used to compute hypersonic laminar flow of chemically reacting air over cones at angle of attack. The results of the computations are compared with the results of reacting boundary-layer computations and show excellent agreement.
Experimental scrambling and noise reduction applied to the optical encryption of QR codes.
Barrera, John Fredy; Vélez, Alejandro; Torroba, Roberto
2014-08-25
In this contribution, we implement two techniques to reinforce optical encryption, which we restrict in particular to the QR codes, but could be applied in a general encoding situation. To our knowledge, we present the first experimental-positional optical scrambling merged with an optical encryption procedure. The inclusion of an experimental scrambling technique in an optical encryption protocol, in particular dealing with a QR code "container", adds more protection to the encoding proposal. Additionally, a nonlinear normalization technique is applied to reduce the noise over the recovered images besides increasing the security against attacks. The opto-digital techniques employ an interferometric arrangement and a joint transform correlator encrypting architecture. The experimental results demonstrate the capability of the methods to accomplish the task.
40 CFR 147.1450 - State-administered program.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Nevada Administrative Code [NAC], Underground Injection Control Regulations, Sections 1 through 96.1, Inclusive. July 22, 1987, revised September 3, 1987 (amending NAC Chapter 445). (5) Nevada Administrative Code [NAC], Regulations and Rules of Practice and Procedure adopted Pursuant to NRS 534A, Sections 1...
40 CFR 147.1450 - State-administered program.
Code of Federal Regulations, 2011 CFR
2011-07-01
...) Nevada Administrative Code [NAC], Underground Injection Control Regulations, Sections 1 through 96.1, Inclusive. July 22, 1987, revised September 3, 1987 (amending NAC Chapter 445). (5) Nevada Administrative Code [NAC], Regulations and Rules of Practice and Procedure adopted Pursuant to NRS 534A, Sections 1...
Exercise-induced downbeat nystagmus in a Korean family with a nonsense mutation in CACNA1A.
Choi, Jae-Hwan; Seo, Jae-Deuk; Choi, Yu Ri; Kim, Min-Ji; Shin, Jin-Hong; Kim, Ji Soo; Choi, Kwang-Dong
2015-08-01
Episodic ataxia type 2 (EA2) is characterized by recurrent attacks of vertigo and ataxia lasting hours triggered by emotional stress or exercise. Although interictal horizontal gaze-evoked nystagmus and rebound nystagmus are commonly observed in patients with EA2, the nystagmus has been rarely reported during the vertigo attack. To better describe exercise-induced nystagmus in EA2, four affected members from three generations of a Korean family with EA2 received full neurological and neuro-otological evaluations. Vertigo was provoked in the proband with running for 10 min to record eye movements during the vertigo attack. We performed a polymerase chain reaction-based direct sequence analysis of all coding regions of CACNA1A in all participants. The four affected members had a history of exertional vertigo, imbalance, childhood epilepsy, headache, and paresthesia. The provocation induced severe vertigo and imbalance lasting several hours, and oculography documented pure downbeat nystagmus during the attack. Genetic analyses identified a nonsense mutation in exon 23 which has been registered in dbSNP as a pathogenic allele (c.3832C>T, p.R1278X) in all the affected members. Ictal downbeat nystagmus in the studied family indicates cerebellar dysfunction during the vertigo attack in EA2. In patients with episodic vertigo and ataxia, the observation of exercise-induced nystagmus would provide a clue for EA2.
Reduced 3d modeling on injection schemes for laser wakefield acceleration at plasma scale lengths
NASA Astrophysics Data System (ADS)
Helm, Anton; Vieira, Jorge; Silva, Luis; Fonseca, Ricardo
2017-10-01
Current modelling techniques for laser wakefield acceleration (LWFA) are based on particle-in-cell (PIC) codes which are computationally demanding. In PIC simulations the laser wavelength λ0, in μm-range, has to be resolved over the acceleration lengths in meter-range. A promising approach is the ponderomotive guiding center solver (PGC) by only considering the laser envelope for laser pulse propagation. Therefore only the plasma skin depth λp has to be resolved, leading to speedups of (λp /λ0) 2. This allows to perform a wide-range of parameter studies and use it for λ0 <<λp studies. We present the 3d version of a PGC solver in the massively parallel, fully relativistic PIC code OSIRIS. Further, a discussion and characterization of the validity of the PGC solver for injection schemes on the plasma scale lengths, such as down-ramp injection, magnetic injection and ionization injection, through parametric studies, full PIC simulations and theoretical scaling, is presented. This work was partially supported by Fundacao para a Ciencia e Tecnologia (FCT), Portugal, through Grant No. PTDC/FIS-PLA/2940/2014 and PD/BD/105882/2014.
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.
Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly
2014-02-01
Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model.
Casani, Augusto Pietro; Piaggi, Paolo; Cerchiai, Niccolò; Seccia, Veronica; Franceschini, Stefano Sellari; Dallan, Iacopo
2012-03-01
To determine the efficacy and safety of low-dose intratympanic gentamicin (ITG) compared with intratympanic dexamethasone (ITD) in patients with intractable unilateral Ménière disease (MD). Open prospective randomized controlled study. Tertiary referral center. Sixty patients affected by definite unilateral MD were enrolled between January 1, 2007, and June 30, 2008. Thirty-two patients were treated with a buffered gentamicin solution injected in the middle ear (maximum of 2 injections); 28 patients were treated with ITD (4 mg/mL, 3 injections at intervals of 1 every 3 days). Mean outcome measurements consisted of control of vertigo attacks, pure tone average (PTA), speech discrimination score, functional disability score, and statistical analysis using repeated measures analysis of variance. In the ITG group at 2-year follow-up, complete control of vertigo (class A) was achieved in 26 patients (81%) and substantial control of vertigo (class B) in 4 patients (12.5%). In the ITD group, class A was achieved in 12 (43%), and class B in 5 (18%) patients. In the gentamicin group, 4 patients showed a reduction in PTA of ≥10 dB. In the ITD group, PTA was unchanged or slightly improved in 16 patients (belonging to class A-B) and worse in 12. Low-dose ITG achieved better outcome than ITD in the control of vertigo attacks in patients suffering from unilateral MD, with a very low incidence of hearing deterioration. ITD offers poorer vertigo control rate, and hearing preservation is achieved only in cases with no vertigo recurrences.
Yuan, Jun; Liu, Yufei; Yang, Zhicong; Cai, Yanshan; Deng, Zhiai; Qin, Pengzhe; Li, Tiegang; Dong, Zhiqiang; Yan, Ziqiang; Zhou, Duanhua; Luo, Huiming; Ma, Huilai; Pang, Xinglin; Fontaine, Robert E
2009-09-01
We investigated an outbreak of gluteal abscesses following intramuscular (IM) injections given at a clinic in rural China to identify the causative agent, source, and method of exposure. We defined a case as an abscess that appeared at the site of an injection given since June 1, 2006. We compared case rates by injection route, medication, and diluents. We reviewed injection practices, and cultured abscesses and environmental sites for mycobacteria. From October through December 2006, 5.8% (n=35) of 604 persons who had received injections at the clinic developed a case. All 35 cases occurred in 184 patients (attack rate=19.0%) who had received IM injections with various drugs that had been mixed with normal saline (NS); risk ratio=infinity; p<0.0001. No cases occurred in the absence of NS exposure. We identified Mycobacterium abscessus from eight abscesses and from the clinic water supply, and observed the inappropriate reuse of a 16-gauge needle left in the rubber septum of 100 ml multiple-dose bottles of NS in the clinic. Fourteen percent (n=527) of the 3887 registered residents of this village had been treated with IM drugs over a three-month period, often for minor illnesses. This outbreak of M. abscessus occurred from exposure to extrinsically contaminated NS through improper injection practices. Frequent treatment of minor illnesses with IM injections of antibiotics was likely an important contributing factor to the size of this outbreak.
A computational investigation of fuel mixing in a hypersonic scramjet
NASA Technical Reports Server (NTRS)
Fathauer, Brett W.; Rogers, R. C.
1993-01-01
A parabolized, Navier-Stokes code, SHIP3D, is used to numerically investigate the mixing between air injection and hydrogen injection from a swept ramp injector configuration into either a mainstream low-enthalpy flow or a hypervelocity test flow. The mixing comparisons between air and hydrogen injection reveal the importance of matching injectant-to-mainstream mass flow ratios. In flows with the same injectant-to-mainstream dynamic pressure ratio, the mixing definition was altered for the air injection cases. Comparisons of the computed results indicate that the air injection cases overestimate the mixing performance associated with hydrogen injection simulation. A lifting length parameter, to account for the time a fluid particle transverses through the mixing region, is defined and used to establish a connection of injectant mixing in hypervelocity flows, based on nonreactive, low-enthalpy flows.
Oshima, S; Ogawa, H; Yasue, H; Okumura, K; Matsuyama, K; Miyagi, H
1989-07-01
Plasma fibrinopeptide A levels, beta-thromboglobulin levels and platelet factor 4 levels were estimated by enzyme-linked immunosorbent assay before and after hyperventilation in 12 patients with coronary vasospastic angina and in 12 control subjects matched for age and gender. In all 12 study patients, anginal attacks accompanied by electrocardiographic (ECG) changes (ST elevation in 11 patients and ST depression in 1 patient) were induced by hyperventilation. Coronary angiography was performed on 11 of the 12 patients, and coronary artery spasm with the same ECG changes was induced by intracoronary injection of acetylcholine in all 11. The plasma fibrinopeptide A levels increased significantly from 2.0 +/- 0.4 to 10.0 +/- 2.4 ng/ml during the attack (p less than 0.001) in the study patients, but remained unchanged before and after hyperventilation in the control subjects. The plasma levels of beta-thromboglobulin and platelet factor 4 remained unchanged after hyperventilation in both groups. Our data indicate that coronary artery spasm may induce thrombin generation and trigger thrombus formation in the coronary artery.
NASA Technical Reports Server (NTRS)
Hicks, Raymond M.; Cliff, Susan E.
1991-01-01
Full-potential, Euler, and Navier-Stokes computational fluid dynamics (CFD) codes were evaluated for use in analyzing the flow field about airfoils sections operating at Mach numbers from 0.20 to 0.60 and Reynolds numbers from 500,000 to 2,000,000. The potential code (LBAUER) includes weakly coupled integral boundary layer equations for laminar and turbulent flow with simple transition and separation models. The Navier-Stokes code (ARC2D) uses the thin-layer formulation of the Reynolds-averaged equations with an algebraic turbulence model. The Euler code (ISES) includes strongly coupled integral boundary layer equations and advanced transition and separation calculations with the capability to model laminar separation bubbles and limited zones of turbulent separation. The best experiment/CFD correlation was obtained with the Euler code because its boundary layer equations model the physics of the flow better than the other two codes. An unusual reversal of boundary layer separation with increasing angle of attack, following initial shock formation on the upper surface of the airfoil, was found in the experiment data. This phenomenon was not predicted by the CFD codes evaluated.
TRO-2D - A code for rational transonic aerodynamic optimization
NASA Technical Reports Server (NTRS)
Davis, W. H., Jr.
1985-01-01
Features and sample applications of the transonic rational optimization (TRO-2D) code are outlined. TRO-2D includes the airfoil analysis code FLO-36, the CONMIN optimization code and a rational approach to defining aero-function shapes for geometry modification. The program is part of an effort to develop an aerodynamically smart optimizer that will simplify and shorten the design process. The user has a selection of drag minimization and associated minimum lift, moment, and the pressure distribution, a choice among 14 resident aero-function shapes, and options on aerodynamic and geometric constraints. Design variables such as the angle of attack, leading edge radius and camber, shock strength and movement, supersonic pressure plateau control, etc., are discussed. The results of calculations of a reduced leading edge camber transonic airfoil and an airfoil with a natural laminar flow are provided, showing that only four design variables need be specified to obtain satisfactory results.
Study of Forebody Injection and Mixing with Application to Hypervelocity Airbreathing Propulsion
NASA Technical Reports Server (NTRS)
Axdahl, Erik; Kumar, Ajay; Wilhite, Alan
2012-01-01
The use of premixed, shock-induced combustion in the context of a hypervelocity, airbreathing vehicle requires effective injection and mixing of hydrogen fuel and air on the vehicle forebody. Three dimensional computational simulations of fuel injection and mixing from flush-wall and modified ramp and strut injectors are reported in this study. A well-established code, VULCAN, is used to conduct nonreacting, viscous, turbulent simulations on a flat plate at conditions relevant to a Mach 12 flight vehicle forebody. In comparing results of various fuel injection strategies, it is found that strut injection provides the greatest balance of performance between mixing efficiency and stream thrust potential.
Evaluation of Water Injection Effect on NO(x) Formation for a Staged Gas Turbine Combustor
NASA Technical Reports Server (NTRS)
Fan, L.; Yang, S. L.; Kundu, K. P.
1996-01-01
NO(x) emission control by water injection on a staged turbine combustor (STC) was modeled using the KIVA-2 code with modification. Water is injected into the rich-burn combustion zone of the combustor by a single nozzle. Parametric study for different water injection patterns was performed. Results show NO(x) emission will decrease after water being injected. Water nozzle location also has significant effect for NO formation and fuel ignition. The chemical kinetic model is also sensitive to the excess water. Through this study, a better understanding of the physics and chemical kinetics is obtained, this will enhance the STC design process.
Charles E. Flower; Jennifer E. Dalton; Kathleen S. Knight; Marie Brikha; Miquel A. Gonzalez-Meler
2015-01-01
Emerald ash borer (EAB), a non-native invasive tree-boring beetle, is the primary agent behind thewidespread mortality of ash trees (Fraxinus spp.) in both natural forests and urban areas of North Amer-ica. While a variety of insecticide options have been adopted for protection against EAB attacks, little hasbeen reported on the success of...
LAVA: Large scale Automated Vulnerability Addition
2016-05-23
memory copy, e.g., are reasonable attack points. If the goal is to inject divide- by-zero, then arithmetic operations involving division will be...ways. First, it introduces deterministic record and replay , which can be used for iterated and expensive analyses that cannot be performed online... memory . Since our approach records the correspondence between source lines and program basic block execution, it would be just as easy to figure out
NASA Astrophysics Data System (ADS)
Singh, Udaybir; Kumar, Nitin; Kumar, Anil; Purohit, Laxmi Prasad; Sinha, Ashok Kumar
2011-07-01
This paper presents the design of two types of magnetron injection guns (MIG's) for 1 MW, 127.5 GHz gyrotron. TE24,8 mode has been chosen as the operating mode. In-house developed code MIGSYN has been used to estimate the initial gun parameters. The electron trajectory tracing program EGUN and in-house developed code MIGANS have been used to optimize the single-anode and the double-anode design for 80 kV, 40 A MIG. The parametric analysis of MIG has also been presented. The advantages and the disadvantages of each kind of configuration have been critically examined.
NASA Astrophysics Data System (ADS)
Froger, E.; Marque, J. P.
The electromagnetic response of an orbiting satellite to an electrostatic discharge is compared to that of the same object subjected (in a susceptibility test) to an injection current. In the absence of actual data, the comparison was performed on the basis of two numerical simulations: one using the GEODE particle code for the orbiting case, and the other using the ALICE code for a representative injection configuration. It is found that the evolution of the electromagnetic fields is controlled in particular by the particle emission rhythm, giving rise to an ejection flux 'slit' whose rise time is about several tens of nanoseconds.
ERIC Educational Resources Information Center
Waters, John K.
2009-01-01
In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…
Numerical investigation of heat transfer on film-cooled turbine blades.
Ginibre, P; Lefebvre, M; Liamis, N
2001-05-01
The accurate heat transfer prediction of film-cooled blades is a key issue for the aerothermal turbine design. For this purpose, advanced numerical methods have been developed at Snecma Moteurs. The goal of this paper is the assessment of a three-dimensional Navier-Stokes solver, based on the ONERA CANARI-COMET code, devoted to the steady aerothermal computations of film-cooled blades. The code uses a multidomain approach to discretize the blade to blade channel with overlapping structured meshes for the injection holes. The turbulence closure is done by means of either Michel mixing length model or Spalart-Allmaras one transport equation model. Computations of thin 3D slices of three film-cooled nozzle guide vane blades with multiple injections are performed. Aerothermal predictions are compared to experiments carried out by the von Karman Institute. The behavior of the turbulence models is discussed, and velocity and temperature injection profiles are investigated.
A CFD Model for High Pressure Liquid Poison Injection for CANDU-6 Shutdown System No. 2
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bo Wook Rhee; Chang Jun Jeong; Hye Jeong Yun
2002-07-01
In CANDU reactor one of the two reactor shutdown systems is the liquid poison injection system which injects the highly pressurized liquid neutron poison into the moderator tank via small holes on the nozzle pipes. To ensure the safe shutdown of a reactor it is necessary for the poison curtains generated by jets provide quick, and enough negative reactivity to the reactor during the early stage of the accident. In order to produce the neutron cross section necessary to perform this work, the poison concentration distribution during the transient is necessary. In this study, a set of models for analyzingmore » the transient poison concentration induced by this high pressure poison injection jet activated upon the reactor trip in a CANDU-6 reactor moderator tank has been developed and used to generate the poison concentration distribution of the poison curtains induced by the high pressure jets injected into the vacant region between the pressure tube banks. The poison injection rate through the jet holes drilled on the nozzle pipes is obtained by a 1-D transient hydrodynamic code called, ALITRIG, and this injection rate is used to provide the inlet boundary condition to a 3-D CFD model of the moderator tank based on CFX4.3, a CFD code, to simulate the formation of the poison jet curtain inside the moderator tank. For validation, an attempt was made to validate this model against a poison injection experiment performed at BARC. As conclusion this set of models is judged to be appropriate. (authors)« less
NASA Astrophysics Data System (ADS)
Froger, Etienne
1993-05-01
A description of the electromagnetic behavior of a satellite subjected to an electric discharge is given using a specially developed numerical code. One of the particularities of vacuum discharges, obtained by irradiation of polymers, is the intense emission of electrons into the spacecraft environment. Electromagnetic radiation, associated with the trajectories of the particles around the spacecraft, is considered as the main source of the interference observed. In the absence of accurate orbital data and realistic ground tests, the assessment of these effects requires numerical simulation of the interaction between this electron source and the spacecraft. This is done by the GEODE particle code which is applied to characteristic configurations in order to estimate the spacecraft response to a discharge, which is simulated from a vacuum discharge model designed in laboratory. The spacecraft response to a current injection is simulated by the ALICE numerical three dimensional code. The comparison between discharge and injection effects, from the results given by the two codes, illustrates the representativity of electromagnetic susceptibility tests and the main parameters for their definition.
NASA Astrophysics Data System (ADS)
Boche, Holger; Cai, Minglai; Deppe, Christian; Nötzel, Janis
2017-10-01
We analyze arbitrarily varying classical-quantum wiretap channels. These channels are subject to two attacks at the same time: one passive (eavesdropping) and one active (jamming). We elaborate on our previous studies [H. Boche et al., Quantum Inf. Process. 15(11), 4853-4895 (2016) and H. Boche et al., Quantum Inf. Process. 16(1), 1-48 (2016)] by introducing a reduced class of allowable codes that fulfills a more stringent secrecy requirement than earlier definitions. In addition, we prove that non-symmetrizability of the legal link is sufficient for equality of the deterministic and the common randomness assisted secrecy capacities. Finally, we focus on analytic properties of both secrecy capacities: We completely characterize their discontinuity points and their super-activation properties.
NASA Technical Reports Server (NTRS)
Agnone, Anthony M.
1987-01-01
The performance of a fixed-geometry, swept, mixed compression hypersonic inlet is presented. The experimental evaluation was conducted for a Mach number of 6.0 and for several angles of attack. The measured surface pressures and pitot pressure surveys at the inlet throat are compared to computations using a three-dimensional Euler code and an integral boundary layer theory. Unique features of the intake design, including the boundary layer control, insure a high inlet performance. The experimental data show the inlet has a high mass averaged total pressure recovery, a high mass capture and nearly uniform flow diffusion. The swept inlet exhibits excellent starting characteristics, and high flow stability at angle of attack.
An Integrated Fuselage-Sting Balance for a Sonic-Boom Wind-Tunnel Model
NASA Technical Reports Server (NTRS)
Mack, Robert J.
2004-01-01
Measured and predicted pressure signatures from a lifting wind-tunnel model can be compared when the lift on the model is accurately known. The model's lift can be set by bending the support sting to a desired angle of attack. This method is simple in practice, but difficult to accurately apply. A second method is to build a normal force/pitching moment balance into the aft end of the sting, and use an angle-of-attack mechanism to set model attitude. In this report, a method for designing a sting/balance into the aft fuselage/sting of a sonic-boom model is described. A computer code is given, and a sample sting design is outlined to demonstrate the method.
Laser Blow-Off Impurity Injection Experiments at the HSX Stellarator
NASA Astrophysics Data System (ADS)
Castillo, J. F.; Bader, A.; Likin, K. M.; Anderson, D. T.; Anderson, F. S. B.; Kumar, S. T. A.; Talmadge, J. N.
2017-10-01
Results from the HSX laser blow-off experiment are presented and compared to a synthetic diagnostic implemented in the STRAHL impurity transport modeling code in order to measure the impurity transport diffusivity and convective velocity. A laser blow-off impurity injection system is used to rapidly deposit a small, controlled quantity of aluminum into the confinement volume. Five AXUV photodiode arrays are used to take time-resolved measurements of the impurity radiation. The spatially one-dimensional impurity transport code STRAHL is used to calculate a time-dependent plasma emissivity profile. Modeled intensity signals calculated from a synthetic diagnostic code provide direct comparison between plasma simulation and experimental results. An optimization algorithm with impurity transport coefficients acting as free parameters is used to fit the model to experimental data. This work is supported by US DOE Grant DE-FG02-93ER54222.
Yalcin, Arzu Didem
2015-01-01
Omalizumab depletes free IgE in the blood and interstitial space and inhibits IgE binding to FcεRI on basophils, mast cells, and dendritic cells. We stopped omalizumab treatment after four years. Recurrences of urticaria symptoms were found to be higher in patients with chronic urticaria than recurrences of asthmatic symptoms in severe persistent asthma patients. For the very first time, we used omalizumab in symptomatic therapy of recurrent laryngeal oedema and urticaria attacks in a patient with postoperative pulmonary carcinoid tumor for eight months. During the four years of follow-up, no recurrence was noted in pulmonary carcinoid tumor. Control PET CT results revealed normal findings. After omalizumab treatment, laryngeal oedema and urticaria symptoms were decreased. The most common adverse reaction from omalizumab is injection site induration, injection site itching, injection site pain, and bruising but the package insert contains warnings regarding parasitic infections. While there are no reports of fatal anaphylaxis as a result of omalizumab, some cases have been serious and potentially life-threatening. Therefore, the FDA requires that people receiving omalizumab be monitored in the physician's office for a period of time after their injections. PMID:26075226
Optimization of the multi-turn injection efficiency for a medical synchrotron
NASA Astrophysics Data System (ADS)
Kim, J.; Yoon, M.; Yim, H.
2016-09-01
We present a method for optimizing the multi-turn injection efficiency for a medical synchrotron. We show that for a given injection energy, the injection efficiency can be greatly enhanced by choosing transverse tunes appropriately and by optimizing the injection bump and the number of turns required for beam injection. We verify our study by applying the method to the Korea Heavy Ion Medical Accelerator (KHIMA) synchrotron which is currently being built at the campus of Dongnam Institute of Radiological and Medical Sciences (DIRAMS) in Busan, Korea. First the frequency map analysis was performed with the help of the ELEGANT and the ACCSIM codes. The tunes that yielded good injection efficiency were then selected. With these tunes, the injection bump and the number of turns required for injection were then optimized by tracking a number of particles for up to one thousand turns after injection, beyond which no further beam loss occurred. Results for the optimization of the injection efficiency for proton ions are presented.
Khan, Mohammad Iqbal; Tariq, Mohammad; Rashid, Danyal
2008-01-01
Carotid endarterectomy is the most commonly performed vascular surgical procedure. One of the complications of carotid endarterectomy is Pseudoaneurysm of the carotid artery frequently managed by endo-vascular technique. Pseudoaneurysm caused by other aetiological factors is rare entity. Penetrating trauma and neck surgery are known but very rare causes of pseudo aneurysm of the carotid artery. We have successfully managed a case of carotid artery pseudoaneurysm caused by incision and drainage of parapharyngeal abscess. This surgery also leads to the palsy of right vagus nerve causing complete hoarseness of voice. The patient presented with Transit Ischaemic Attacks (TIA) and amurosis fugos. Resection of aneurysm and reconstruction of right carotid artery lead to complete recovery. Vocal cord palsy was managed by Vox implant injection leading to full recovery.
Solutions for Coding Societal Events
2016-12-01
develop a prototype system for civil unrest event extraction, and (3) engineer BBN ACCENT (ACCurate Events from Natural Text ) to support broad use by...56 iv List of Tables Table 1: Features in similarity metric. Abbreviations are as follows. TG: text graph...extraction of a stream of events (e.g. protests, attacks, etc.) from unstructured text (e.g. news, social media). This technical report presents results
Communication Breakdown: DHS Operations During a Cyber Attack
2010-12-01
is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and...maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of...Presidential Directive, Malware, National Exercise, Quadrennial Homeland Security Review , Trusted Internet Connections, Zero-Day Exploits 16. PRICE CODE 17
Quantum dense key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.
2004-03-01
This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.
Safe2Tell[R]: An Anonymous, 24/7 Reporting System for Preventing School Violence
ERIC Educational Resources Information Center
Payne, Susan R. T.; Elliott, Delbert S.
2011-01-01
There is widespread agreement that many school shootings could be prevented if authorities were informed that a student was planning or preparing to carry out an attack. A universal problem is that young people are highly reluctant to report on their peers. This code of silence represents a major barrier to prevention efforts. In response to the…
Strategic Bombing and the Thermonuclear Breakthrough: An Example of Disconnected Defense Planning,
1981-04-01
30 March 1944 attack against Nuremburg that saw the loss of 94 of about 800 aircraft (with serious damage to 72 others). However, while the British...tested a very powerful fission bomb, with the code name KING, that had an explosive yield of 500 kilotons. Its purpose was to provide the U.S. with an ex
An improved control mode for the ping-pong protocol operation in imperfect quantum channels
NASA Astrophysics Data System (ADS)
Zawadzki, Piotr
2015-07-01
Quantum direct communication (QDC) can bring confidentiality of sensitive information without any encryption. A ping-pong protocol, a well-known example of entanglement-based QDC, offers asymptotic security in a perfect quantum channel. However, it has been shown (Wójcik in Phys Rev Lett 90(15):157901, 2003. doi:10.1103/PhysRevLett.90.157901) that it is not secure in the presence of losses. Moreover, legitimate parities cannot rely on dense information coding due to possible undetectable eavesdropping even in the perfect setting (Pavičić in Phys Rev A 87(4):042326, 2013. doi:10.1103/PhysRevA.87.042326). We have identified the source of the above-mentioned weaknesses in the incomplete check of the EPR pair coherence. We propose an improved version of the control mode, and we discuss its relation to the already-known attacks that undermine the QDC security. It follows that the new control mode detects these attacks with high probability and independently on a quantum channel type. As a result, an asymptotic security of the QDC communication can be maintained for imperfect quantum channels, also in the regime of dense information coding.
NASA Astrophysics Data System (ADS)
Eshetu, W. W.; Lyon, J.; Wiltberger, M. J.; Hudson, M. K.
2017-12-01
Test particle simulations of electron injection by the bursty bulk flows (BBFs) have been done using a test particle tracer code [1], and the output fields of the Lyon-Feddor-Mobarry global magnetohydro- dynamics (MHD) code[2]. The MHD code was run with high resolu- tion (oct resolution), and with specified solar wind conditions so as to reproduce the observed qualitative picture of the BBFs [3]. Test par- ticles were injected so that they interact with earthward propagating BBFs. The result of the simulation shows that electrons are pushed ahead of the BBFs and accelerated into the inner magnetosphere. Once electrons are in the inner magnetosphere they are further energized by drift resonance with the azimuthal electric field. In addition pitch angle scattering of electrons resulting in the violation conservation of the first adiabatic invariant has been observed. The violation of the first adiabatic invariant occurs as electrons cross a weak magnetic field region with a strong gradient of the field perturbed by the BBFs. References 1. Kress, B. T., Hudson,M. K., Looper, M. D. , Albert, J., Lyon, J. G., and Goodrich, C. C. (2007), Global MHD test particle simulations of ¿ 10 MeV radiation belt electrons during storm sudden commencement, J. Geophys. Res., 112, A09215, doi:10.1029/2006JA012218. Lyon,J. G., Fedder, J. A., and Mobarry, C.M., The Lyon- Fedder-Mobarry (LFM) Global MHD Magnetospheric Simulation Code (2004), J. Atm. And Solar-Terrestrial Phys., 66, Issue 15-16, 1333- 1350,doi:10.1016/j.jastp. Wiltberger, Merkin, M., Lyon, J. G., and Ohtani, S. (2015), High-resolution global magnetohydrodynamic simulation of bursty bulk flows, J. Geophys. Res. Space Physics, 120, 45554566, doi:10.1002/2015JA021080.
Reconstruction of improvised explosive device blast loading to personnel in the open
NASA Astrophysics Data System (ADS)
Wiri, Suthee; Needham, Charles
2016-05-01
Significant advances in reconstructing attacks by improvised explosive devices (IEDs) and other blast events are reported. A high-fidelity three-dimensional computational fluid dynamics tool, called Second-order Hydrodynamic Automatic Mesh Refinement Code, was used for the analysis. Computer-aided design models for subjects or vehicles in the scene accurately represent geometries of objects in the blast field. A wide range of scenario types and blast exposure levels were reconstructed including free field blast, enclosed space of vehicle cabin, IED attack on a vehicle, buried charges, recoilless rifle operation, rocket-propelled grenade attack and missile attack with single subject or multiple subject exposure to pressure levels from ˜ 27.6 kPa (˜ 4 psi) to greater than 690 kPa (>100 psi). To create a full 3D pressure time-resolved reconstruction of a blast event for injury and blast exposure analysis, a combination of intelligence data and Blast Gauge data can be used to reconstruct an actual in-theatre blast event. The methodology to reconstruct an event and the "lessons learned" from multiple reconstructions in open space are presented. The analysis uses records of blast pressure at discrete points, and the output is a spatial and temporal blast load distribution for all personnel involved.
Expert Planning Processes in Writing
1990-12-17
For example, here are some target ideas from the immunity text: " protozoa attack red blood cells " agglutin clumps pathogens together * vaccination ...majors may have already understood (e.g., vaccination is an injection of a virus), we conducted a second analysis scoring only for the "hard" concepts...page texts, a clear and an unclear version on each of two topics, autism and statistics. The clear autism and the unclear statistics texts were
Determining Correlation between Shark Location and Atmospheric Wind and Thermal Parameters.
NASA Astrophysics Data System (ADS)
Merchant, J.
2017-12-01
Millions of people visit the nation's shorelines every summer. As recreational use of the ocean increases across the country, so too does the risk of shark attacks on people. According to George H. Burgess, curator for the International Shark Attack File and the Florida Program for Shark Research "The number of shark-human interactions occurring in a given year is directly correlated with the amount of time humans spend in the sea. As world population continues its upsurge and interest in aquatic recreation concurrently rises, we realistically should expect increases in the number of shark attacks and other aquatic recreation-related injuries". Burgess' analysis released in February of 2016, states "2015 yearly total of 98 unprovoked attacks (worldwide) was the highest on record" until 2016. Adding to the previous record number of global shark/human interactions in 2015 were 10 confirmed cases of people bitten by sharks off the shores of North Carolina and South Carolina over a five week period in June and July of 2015. The unusually high amount of attacks within close proximity over a short period of time garnered significant media attention nationwide. Preliminary data resulting from the analysis of these 2015 shark attacks and separate acoustic shark location data from Dr. Gregory Skomal's (Program Manager, Senior Marine Fisheries Biologist for the state of Massachusetts) ongoing research across Cape Code do indicate a correlation between environmental and biological factors leading up to human/shark interactions. Not only will these preliminary findings be presented, but a full description of how the use of higher resolution remote sensing and in-situ surface wind and thermal measurements would improve real time detection and prediction of these dangerous conditions, up to hours in advance, mitigating human risk and interaction with shark.
NASA Technical Reports Server (NTRS)
Wey, Thomas; Liu, Nan-Suey
2013-01-01
This paper summarizes the procedures of generating a polyhedral mesh derived from hanging-node elements as well as presents sample results from its application to the numerical solution of a single element lean direct injection (LDI) combustor using an open-source version of the National Combustion Code (NCC).
1977-08-30
Administer a rectal suppository 081-91C-1240 Administer an injection (SC or IM) 081-91C-1241 Administer an intradermal injection 081-91C-1242 Administer a...in this language task: Shouting Radio communications Coded messages Spellings Conversation Requests wI-3 SPEAKING *TASK: Formulate and produce
Gene Identification Algorithms Using Exploratory Statistical Analysis of Periodicity
NASA Astrophysics Data System (ADS)
Mukherjee, Shashi Bajaj; Sen, Pradip Kumar
2010-10-01
Studying periodic pattern is expected as a standard line of attack for recognizing DNA sequence in identification of gene and similar problems. But peculiarly very little significant work is done in this direction. This paper studies statistical properties of DNA sequences of complete genome using a new technique. A DNA sequence is converted to a numeric sequence using various types of mappings and standard Fourier technique is applied to study the periodicity. Distinct statistical behaviour of periodicity parameters is found in coding and non-coding sequences, which can be used to distinguish between these parts. Here DNA sequences of Drosophila melanogaster were analyzed with significant accuracy.
Computations of the Magnus effect for slender bodies in supersonic flow
NASA Technical Reports Server (NTRS)
Sturek, W. B.; Schiff, L. B.
1980-01-01
A recently reported Parabolized Navier-Stokes code has been employed to compute the supersonic flow field about spinning cone, ogive-cylinder, and boattailed bodies of revolution at moderate incidence. The computations were performed for flow conditions where extensive measurements for wall pressure, boundary layer velocity profiles and Magnus force had been obtained. Comparisons between the computational results and experiment indicate excellent agreement for angles of attack up to six degrees. The comparisons for Magnus effects show that the code accurately predicts the effects of body shape and Mach number for the selected models for Mach numbers in the range of 2-4.
Emerging technology for transonic wind-tunnel-wall interference assessment and corrections
NASA Technical Reports Server (NTRS)
Newman, P. A.; Kemp, W. B., Jr.; Garriz, J. A.
1988-01-01
Several nonlinear transonic codes and a panel method code for wind tunnel/wall interference assessment and correction (WIAC) studies are reviewed. Contrasts between two- and three-dimensional transonic testing factors which affect WIAC procedures are illustrated with airfoil data from the NASA/Langley 0.3-meter transonic cyrogenic tunnel and Pathfinder I data. Also, three-dimensional transonic WIAC results for Mach number and angle-of-attack corrections to data from a relatively large 20 deg swept semispan wing in the solid wall NASA/Ames high Reynolds number Channel I are verified by three-dimensional thin-layer Navier-Stokes free-air solutions.
Vaccinations and multiple sclerosis.
Gout, O
2001-04-01
Two problems must be considered in regard to the relationship between vaccinations and MS: Do vaccinations favour the first attack of MS? Do they increase the short- or long-term risk in patients with known disease? Answers to these questions are difficult due to the paucity of reported cases, our ignorance of the precise frequency of neurological adverse events in vaccines based on prospective studies, and finally by the lack of a well established pathophysiology. In most instances, the role of the vaccine is based on a temporal link between the injection and the onset of neurological disease, and more rarely to a positive reintroduction. Acute disseminated encephalomyelitis (ADEM), a monophasic and multifocal illness of the white and grey matter, has been observed following various viral or bacterial infections as well as vaccine injections for diseases such as pertussis, tetanus and yellow fever. The similarities between ADEM and experimental allergic encephalitis (EAE) are suggestive of an immunological process. In addition to the dramatic presentation of ADEM, more limited white matter involvement, such as optic neuritis or myelitis, has been reported following vaccine injections, and has occasionally been counted as the first attack of MS. In France, 25 million inhabitants, almost half of the population, were vaccinated against hepatitis B (HB) between 1991 and 1999. Several hundred cases of an acute central demyelinating event following HB vaccination were reported to the pharmacovigilance unit, leading to a modification of vaccination policy in the schools and the initiation of several studies designed to examine the possible relationship between the vaccine and the central demyelinating events. The results of these studies failed to establish the causality of the HB vaccine. Nevertheless, molecular mimicry between HB antigen(s) and one or more myelin proteins, or a non-specific activation of autoreactive lymphocytes, could constitute possible pathogenetic mechanisms for these adverse neurological events.
ElMahdy, Mahmoud Farouk; Kassem, Hussien Heshmat; Ewis, Essam Baligh; Mahdy, Soliman Gharieb
2014-03-01
Management of postcatheterization femoral artery pseudoaneurysm (FAP) is problematic. Ultrasound-guided compression (UGC) is painful and cumbersome. Thrombin injection is costly and may cause thromboembolism. Ultrasound-guided para-aneurysmal saline injection (PASI) has been described but was never compared against other treatment methods of FAP. We aimed at comparing the success rate and complications of PASI versus UGC. We randomly assigned 80 patients with postcatheterization FAPs to either UGC (40 patients) or PASI (40 patients). We compared the 2 procedures regarding successful obliteration of the FAP, incidence of vasovagal attacks, procedure time, discontinuation of antiplatelet and/or anticoagulants, and the Doppler waveform in the ipsilateral pedal arteries at the end of the procedure. There was no significant difference between patients in both groups regarding clinical and vascular duplex data. The mean durations of UGC and PASI procedures were 58.14 ± 28.45 and 30.33 ± 8.56 minutes, respectively (p = 0.045). Vasovagal attacks were reported in 10 (25%) and 2 patients (5%) treated with UGC and PASI, respectively (p = 0.05). All patients in both groups had triphasic Doppler waveform in the infrapopliteal arteries before and after the procedure. The primary and final success rates were 75%, 92.5%, 87.5%, and 95% for UGC and PASI, respectively (p = 0.43). In successfully treated patients, there was no reperfusion of the FAP in the follow-up studies (days 1 and 7) in both groups. In conclusion, ultrasound-guided PASI is an effective method for the treatment of FAP. Compared with UGC, PASI is faster, less likely to cause vasovagal reactions, and can be more convenient to patients and physicians. Copyright © 2014 Elsevier Inc. All rights reserved.
Biello, Katie B; Hosek, Sybil; Drucker, Morgan T; Belzer, Marvin; Mimiaga, Matthew J; Marrow, Elliot; Coffey-Esquivel, Julia; Brothers, Jennifer; Mayer, Kenneth H
2017-09-19
Young men who have sex with men account for approximately 20% of incident HIV infections in the U.S. Antiretroviral pre-exposure prophylaxis (PrEP) administered as a daily pill has been shown to decrease HIV acquisition in at-risk individuals. New modalities for PrEP are being developed and tested, including injectable PrEP; however, acceptability of these emerging modalities has not yet been examined in youth. We conducted six focus groups with 36 young men and transgender men and women who have sex with men in Boston, Chicago, and Los Angeles in 2016 to assess interest in and preference for different PrEP modalities. Youth were purposively recruited based on diversity of age, race/ethnicity, and prior PrEP experience. Data were coded using content coding based on key domains of the interview guide, in particular around the central themes of interest in and barriers and facilitators to injectable PrEP use. Participants were knowledgeable about oral PrEP but suggested barriers to broader uptake, including stigma, marginalization, and access to information. While participants were split on preference for injectable versus oral PrEP, they agreed quarterly injections may be more manageable and better for those who have adherence difficulties and for those who engage in sex more frequently. Concerns specific to injectable PrEP included: severity/duration of side effects, pain, level of protection prior to next injection, distrust of medical system and injections, and cost. Understanding barriers to and preferences for diverse prevention modalities will allow for more HIV prevention options, improved products, and better interventions, thus allowing individuals to make informed HIV prevention choices.
Cancienne, Jourdan M; Gwathmey, F Winston; Werner, Brian C
2016-01-01
To employ a national database of Medicare patients to evaluate the association of ipsilateral intra-articular knee corticosteroid injections at the time of knee arthroscopy with the incidence of postoperative infection. A national Medicare insurance database was queried for patients who underwent ipsilateral intra-articular corticosteroid injection of the knee at the time of knee arthroscopy from 2005 to 2012. Patients who underwent arthroscopically assisted open procedures, those who underwent more complex arthroscopic procedures, and those for whom laterality were not coded were excluded. This study group was compared to a control cohort of patients without intraoperative steroid injections that was matched to the study group for age, gender, obesity, diabetes mellitus, and smoking status. Infection rates within 3 and 6 months postoperatively were assessed using International Classification of Diseases, 9th Revision, and Current Procedural Terminology codes. The incidence of postoperative infection rates after knee arthroscopy was significantly higher at 3 months (0.66%; odds ratio [OR], 2.6; P < .0001) and 6 months (1.92%; OR, 3.6; P < .0001) in patients who underwent ipsilateral intra-articular knee steroid injection at the time of knee arthroscopy (n = 2,866) compared with matched controls without intraoperative injections (n = 170,350) at 3 months (0.25%) and 6 months (0.54%). The present study demonstrates a significant increase in postoperative infection in Medicare patients who underwent ipsilateral intra-articular knee corticosteroid injections at the time of knee arthroscopy compared with a matched control group without intraoperative injection. Therapeutic Level III, retrospective comparative study. Copyright © 2016 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas
2004-10-01
If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware ismore » necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements on this method as well as demonstrating its implementation for various algorithms. We also examine cryptographic techniques to achieve obfuscation including encrypted functions and offer a new application to digital signature algorithms. To better understand the lack of security proofs for obfuscation techniques, we examine in detail general theoretical models of obfuscation. We explain the need for formal models in order to obtain provable security and the progress made in this direction thus far. Finally we tackle the problem of verifying remote execution. We introduce some methods of verifying remote exponentiation computations and some insight into generic computation checking.« less
Ion absorption of the high harmonic fast wave in the National Spherical Torus Experiment
NASA Astrophysics Data System (ADS)
Rosenberg, Adam Lewis
Ion absorption of the high harmonic fast wave in a spherical torus is of critical importance to assessing the viability of the wave as a means of heating and driving current. Analysis of recent NSTX shots has revealed that under some conditions when neutral beam and RF power are injected into the plasma simultaneously, a fast ion population with energy above the beam injection energy is sustained by the wave. In agreement with modeling, these experiments find the RF-induced fast ion tail strength and neutron rate at lower B-fields to be less enhanced, likely due to a larger β profile, which promotes greater off-axis absorption where the fast ion population is small. Ion loss codes find the increased loss fraction with decreased B insufficient to account for the changes in tail strength, providing further evidence that this is an RF interaction effect. Though greater ion absorption is predicted with lower k∥, surprisingly little variation in the tail was observed, along with a neutron rate enhancement with higher k∥. Data from the neutral particle analyzer, neutron detectors, x-ray crystal spectrometer, and Thomson scattering is presented, along with results from the TRANSP transport analysis code, ray-tracing codes HPRT and CURRAY, full-wave code and AORSA, quasilinear code CQL3D, and ion loss codes EIGOL and CONBEAM.
McKenzie, Donald J.
1976-01-01
In 1966, a furfural plant at Belle Glade, Florida, began injecting hot, acidic liquid waste into the saline, water-filled lower part of the Floridan aquifer, between the depths of 1 ,495-1,939 feet. The beds above and below the injection zone were subjected to attack by the acid waste. By 1969, effects of the waste were detected in the water of the well monitoring the upper part of the Floridan aquifer at 1,400 feet. The disposal well was deepened late in 1971 to 2,242 feet in an attempt to stop the upward migration of waste. The results of research investigations by the U.S. Geological Survey during 1966-73 indicated that the waste continued to move upward and laterally. This investigated, continued by the U.S. Geological Survey in 1973-1975, shows that the remedial actions of repairing the disposal well liner and injecting periodically into the deep monitor well at 2,060 feet failed to contain the wastes within the lower part of the Floridan aquifer. The data collected by the Survey are supported by the owner 's chemical-oxygen-demand and pH determinations. A hydraulic connection between the injection zone and the overlying monitoring zone is implied. Plans call for injecting into deepter strata. (Woodard-USGS)
Mansha, Sana; Imran, Muhammad; Shah, Amir Miraj Ul Hussain; Jamal, Muhsin; Ahmed, Fayyaz; Atif, Muhammad; Saleem, Muhammmad; Safi, Sher Zaman; Fatima, Zareen; Bilal Waqar, Ahmed
2017-06-01
Hepatitis B virus (HBV) and hepatitis C virus (HCV) are the major cause of the global burden of hepatitis. One of the main routes of transmission for both viruses is through exposure to infected blood, which includes sharing blood-contaminated syringes and needles. Human immunodeficiency virus (HIV) attacks the immune system and results in acquired immune deficiency syndrome and opportunistic infections. The objective of this study was to assess the epidemiology of HBV and HCV infections among HIV-infected people who inject drugs (PWID). The study enrolled 100 PWID from different addiction centers of the city of Lahore in Pakistan. All subjects were HIV-infected males and were above 16 years of age. Screening of HBV and HCV infections was performed through immunochromatography tests and enzyme-linked immunosorbent assays. The prevalence of HCV and HBV infections among the 100 HIV-infected PWID was 55% and 6%, respectively. HIV monoinfection was found in 37% of the subjects, while triple infection was detected in 2% of the subjects. Majority of the HIV-infected PWID were using heroin and Avil injections (65%). Half of the subjects had used injection drugs for 1-5 years, while 32% had used injection drugs for 6-10 years. HCV infection was more common than HBV infection among the enrolled subjects. Most of the PWID were practicing heroin and Avil injections.
Sasajima, Hirofumi; Yagi, Syunsuke; Osada, Hiromu; Zako, Masahiro
2017-05-04
Injections of lipopolysaccharide in animal models generate acute anterior uveitis (also known as endotoxin-induced uveitis), but the effects of lipopolysaccharide injection are unknown in humans. We describe an unusual case in which acute anterior uveitis was dramatically activated subsequent to botulinum toxin injection in a patient with Behçet's disease but the acute anterior uveitis was satisfactorily attenuated by infliximab. A 53-year-old Japanese man had normal ocular findings at his regularly scheduled appointment. He had been diagnosed as having incomplete-type Behçet's disease 11 years before. Three years after the diagnosis he was given systemic infusions of 5 mg/kg infliximab every 8 weeks and he had not experienced a uveitis attack for 8 years with no treatment other than infliximab. Two days after the eye examination, he received intracutaneous botulinum toxin injections to treat axillary hyperhidrosis on both sides. Three hours after the injections, he noted rapidly increasing floaters in his right eye. Four days after the injections, his right eye showed severe acute anterior uveitis with deteriorated aqueous flare and anterior vitreous opacity. He received his scheduled infliximab injection, and the right acute anterior uveitis immediately attenuated. Botulinum toxin may have clinical effects similar to those of lipopolysaccharide in endotoxin-induced uveitis models. To the best of our knowledge, this is the first report to suggest that botulinum toxin may trigger acute anterior uveitis, although the precise mechanism is still unclear.
NASA Astrophysics Data System (ADS)
Leihong, Zhang; Zilan, Pan; Luying, Wu; Xiuhua, Ma
2016-11-01
To solve the problem that large images can hardly be retrieved for stringent hardware restrictions and the security level is low, a method based on compressive ghost imaging (CGI) with Fast Fourier Transform (FFT) is proposed, named FFT-CGI. Initially, the information is encrypted by the sender with FFT, and the FFT-coded image is encrypted by the system of CGI with a secret key. Then the receiver decrypts the image with the aid of compressive sensing (CS) and FFT. Simulation results are given to verify the feasibility, security, and compression of the proposed encryption scheme. The experiment suggests the method can improve the quality of large images compared with conventional ghost imaging and achieve the imaging for large-sized images, further the amount of data transmitted largely reduced because of the combination of compressive sensing and FFT, and improve the security level of ghost images through ciphertext-only attack (COA), chosen-plaintext attack (CPA), and noise attack. This technique can be immediately applied to encryption and data storage with the advantages of high security, fast transmission, and high quality of reconstructed information.
Measurement of Unsteady Pressure Data on a Large HSCT Semispan Wing and Comparison with Analysis
NASA Technical Reports Server (NTRS)
Scott, Robert C.; Silva, Walter A.; Florance, James R.; Keller, Donald F.
2002-01-01
Experimental data from wind-tunnel tests of the Rigid Semispan Model (RSM) performed at NASA Langley's Transonic Dynamics Tunnel (TDT) are presented. The primary focus of the paper is on data obtained from testing of the RSM on the Oscillating Turntable (OTT). The OTT is capable of oscillating models in pitch at various amplitudes and frequencies about mean angles of attack. Steady and unsteady pressure data obtained during testing of the RSM on the OTT is presented and compared to data obtained from previous tests of the RSM on a load balance and on a Pitch and Plunge Apparatus (PAPA). Testing of the RSM on the PAPA resulted in utter boundaries that were strongly dependent on angle of attack across the Mach number range. Pressure data from all three tests indicates the existence of vortical flows at moderate angles of attack. The correlation between the vortical flows and the unusual utter boundaries from the RSM/PAPA test is discussed. Comparisons of experimental data with analyses using the CFL3Dv6 computational fluid dynamics code are presented.
NASA Technical Reports Server (NTRS)
Luckring, James M.; Rizzi, Arthur; Davis, M. Bruce
2014-01-01
A coordinated project has been underway to improve CFD predictions of slender airframe aerodynamics. The work is focused on two flow conditions and leverages a unique flight data set obtained with an F-16XL aircraft. These conditions, a low-speed high angleof- attack case and a transonic low angle-of-attack case, were selected from a prior prediction campaign wherein the CFD failed to provide acceptable results. In this paper the background, objectives and approach to the current project are presented. The work embodies predictions from multiple numerical formulations that are contributed from multiple organizations, and the context of this campaign to other multi-code, multiorganizational efforts is included. The relevance of this body of work toward future supersonic commercial transport concepts is also briefly addressed.
Inlet flow field investigation. Part 1: Transonic flow field survey
NASA Technical Reports Server (NTRS)
Yetter, J. A.; Salemann, V.; Sussman, M. B.
1984-01-01
A wind tunnel investigation was conducted to determine the local inlet flow field characteristics of an advanced tactical supersonic cruise airplane. A data base for the development and validation of analytical codes directed at the analysis of inlet flow fields for advanced supersonic airplanes was established. Testing was conducted at the NASA-Langley 16-foot Transonic Tunnel at freestream Mach numbers of 0.6 to 1.20 and angles of attack from 0.0 to 10.0 degrees. Inlet flow field surveys were made at locations representative of wing (upper and lower surface) and forebody mounted inlet concepts. Results are presented in the form of local inlet flow field angle of attack, sideflow angle, and Mach number contours. Wing surface pressure distributions supplement the flow field data.
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks
Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly
2014-01-01
Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model. PMID:25485311
Stable isotope reactive transport modeling in water-rock interactions during CO2 injection
NASA Astrophysics Data System (ADS)
Hidalgo, Juan J.; Lagneau, Vincent; Agrinier, Pierre
2010-05-01
Stable isotopes can be of great usefulness in the characterization and monitoring of CO2 sequestration sites. Stable isotopes can be used to track the migration of the CO2 plume and identify leakage sources. Moreover, they provide unique information about the chemical reactions that take place on the CO2-water-rock system. However, there is a lack of appropriate tools that help modelers to incorporate stable isotope information into the flow and transport models used in CO2 sequestration problems. In this work, we present a numerical tool for modeling the transport of stable isotopes in groundwater reactive systems. The code is an extension of the groundwater single-phase flow and reactive transport code HYTEC [2]. HYTEC's transport module was modified to include element isotopes as separate species. This way, it is able to track isotope composition of the system by computing the mixing between the background water and the injected solution accounting for the dependency of diffusion on the isotope mass. The chemical module and database have been expanded to included isotopic exchange with minerals and the isotope fractionation associated with chemical reactions and mineral dissolution or precipitation. The performance of the code is illustrated through a series of column synthetic models. The code is also used to model the aqueous phase CO2 injection test carried out at the Lamont-Doherty Earth Observatory site (Palisades, New York, USA) [1]. References [1] N. Assayag, J. Matter, M. Ader, D. Goldberg, and P. Agrinier. Water-rock interactions during a CO2 injection field-test: Implications on host rock dissolution and alteration effects. Chemical Geology, 265(1-2):227-235, July 2009. [2] Jan van der Lee, Laurent De Windt, Vincent Lagneau, and Patrick Goblet. Module-oriented modeling of reactive transport with HYTEC. Computers & Geosciences, 29(3):265-275, April 2003.
2015-09-01
intrusion detection systems , neural networks 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF... detection system (IDS) software, which learns to detect and classify network attacks and intrusions through prior training data. With the added criteria of...BACKGROUND The growing threat of malicious network activities and intrusion attempts makes intrusion detection systems (IDS) a
ERIC Educational Resources Information Center
Duhaylongsod, Leslie
2017-01-01
Using transcripts of 6 classroom debates that took place in 4 urban schools, the present study takes a closer look at what middle school students do during classroom debates in the context of a social studies curriculum designed to support student argumentation in debate. Two coding schemes were used to analyze student comments in the transcripts:…
An Analysis of the Defense Acquisition Strategy for Unmanned Systems
2014-03-01
product service code RAA Rapid Acquisition Authority RCS radar cross section REF Rapid Equipping Force RFID radio frequency identification RDT...commercialization of the radio frequency identification (RFID) chip also provides a useful basis for comparison. WWII served as the proving ground for RFID...companies following the September 11 , 2001 attacks. It is important to note that despite advances in GPS technology and long-range communications
Anomaly-Based Intrusion Detection Systems Utilizing System Call Data
2012-03-01
Functionality Description Persistence mechanism Mimicry technique Camouflage malware image: • renaming its image • appending its image to victim...particular industrial plant . Exactly which one was targeted still remains unknown, however a majority of the attacks took place in Iran [24]. Due... plant to unstable phase and eventually physical damage. It is interesting to note that a particular block of code - block DB8061 is automatically
NASA Technical Reports Server (NTRS)
Lee-Rausch, Elizabeth M.; Batina, John T.
1993-01-01
A conical Euler code was developed to study unsteady vortex-dominated flows about rolling, highly swept delta wings undergoing either forced motions or free-to-roll motions that include active roll suppression. The flow solver of the code involves a multistage, Runge-Kutta time-stepping scheme that uses a cell-centered, finite-volume, spatial discretization of the Euler equations on an unstructured grid of triangles. The code allows for the additional analysis of the free to-roll case by simultaneously integrating in time the rigid-body equation of motion with the governing flow equations. Results are presented for a delta wing with a 75 deg swept, sharp leading edge at a free-stream Mach number of 1.2 and at 10 deg, 20 deg, and 30 deg angle of attack alpha. At the lower angles of attack (10 and 20 deg), forced-harmonic analyses indicate that the rolling-moment coefficients provide a positive damping, which is verified by free-to-roll calculations. In contrast, at the higher angle of attack (30 deg), a forced-harmonic analysis indicates that the rolling-moment coefficient provides negative damping at the small roll amplitudes. A free-to-roll calculation for this case produces an initially divergent response, but as the amplitude of motion grows with time, the response transitions to a wing-rock type of limit cycle oscillation, which is characteristic of highly swept delta wings. This limit cycle oscillation may be actively suppressed through the use of a rate-feedback control law and antisymmetrically deflected leading-edge flaps. Descriptions of the conical Euler flow solver and the free-to roll analysis are included in this report. Results are presented that demonstrate how the systematic analysis of the forced response of the delta wing can be used to predict the stable, neutrally stable, and unstable free response of the delta wing. These results also give insight into the flow physics associated with unsteady vortical flows about delta wings undergoing forced motions and free-to-roll motions, including the active suppression of the wing-rock type phenomenon. The conical Euler methodology developed is directly extend able to three-dimensional calculations.
Computational Predictions of the Performance Wright 'Bent End' Propellers
NASA Technical Reports Server (NTRS)
Wang, Xiang-Yu; Ash, Robert L.; Bobbitt, Percy J.; Prior, Edwin (Technical Monitor)
2002-01-01
Computational analysis of two 1911 Wright brothers 'Bent End' wooden propeller reproductions have been performed and compared with experimental test results from the Langley Full Scale Wind Tunnel. The purpose of the analysis was to check the consistency of the experimental results and to validate the reliability of the tests. This report is one part of the project on the propeller performance research of the Wright 'Bent End' propellers, intend to document the Wright brothers' pioneering propeller design contributions. Two computer codes were used in the computational predictions. The FLO-MG Navier-Stokes code is a CFD (Computational Fluid Dynamics) code based on the Navier-Stokes Equations. It is mainly used to compute the lift coefficient and the drag coefficient at specified angles of attack at different radii. Those calculated data are the intermediate results of the computation and a part of the necessary input for the Propeller Design Analysis Code (based on Adkins and Libeck method), which is a propeller design code used to compute the propeller thrust coefficient, the propeller power coefficient and the propeller propulsive efficiency.
Modeling of short fiber reinforced injection moulded composite
NASA Astrophysics Data System (ADS)
Kulkarni, A.; Aswini, N.; Dandekar, C. R.; Makhe, S.
2012-09-01
A micromechanics based finite element model (FEM) is developed to facilitate the design of a new production quality fiber reinforced plastic injection molded part. The composite part under study is composed of a polyetheretherketone (PEEK) matrix reinforced with 30% by volume fraction of short carbon fibers. The constitutive material models are obtained by using micromechanics based homogenization theories. The analysis is carried out by successfully coupling two commercial codes, Moldflow and ANSYS. Moldflow software is used to predict the fiber orientation by considering the flow kinetics and molding parameters. Material models are inputted into the commercial software ANSYS as per the predicted fiber orientation and the structural analysis is carried out. Thus in the present approach a coupling between two commercial codes namely Moldflow and ANSYS has been established to enable the analysis of the short fiber reinforced injection moulded composite parts. The load-deflection curve is obtained based on three constitutive material model namely an isotropy, transversely isotropy and orthotropy. Average values of the predicted quantities are compared to experimental results, obtaining a good correlation. In this manner, the coupled Moldflow-ANSYS model successfully predicts the load deflection curve of a composite injection molded part.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Skyhoj Olsen, T.; Lassen, N.A.
1989-01-01
The present study reports cerebral blood flow (CBF) measurements in 11 patients during attacks of classic migraine (CM)--migraine with aura. In 6 and 7 patients, respectively, cerebral vascular reactivity to increased blood pressure and to hypocapnia was also investigated during the CM attacks. The Xenon-133 intraarterial injection technique was used to measure CBF. In this study, based in part on previously published data, methodological limitations, in particular caused by scattered radiation (Compton scatter), are critically analysed. Based on this analysis and the results of the CBF studies it is concluded: During CM attacks CBF appears to decrease focally in themore » posterior part of the brain to a level around 20 ml/100 g/min which is consistent with a mild degree of ischemia. Changes of CBF in focal low flow areas are difficult to evaluate accurately with the Xe-133 technique. In most cases true CBF may change 50% or more in the low flow areas without giving rise to significantly measurable changes of CBF. This analysis suggests that the autoregulation response cannot be evaluated in the low flow areas with the technique used while the observations are compatible with the concept that a vasoconstrictive state, unresponsive to hypocapnia, prevails in the low flow areas during CM attacks. The gradual increase in size of the low flow area seen in several cases may be interpreted in two different ways. A spreading process may actually exist. However, due to Compton scatter, a gradual decrease of CBF in a territory that does not increase in size will also appear as a gradually spreading low flow area when studied with the Xe-133 intracarotid technique.« less
Installed F/A-18 inlet flow calculations at 30 degrees angle-of-attack: A comparative study
NASA Technical Reports Server (NTRS)
Smith, C. Frederic; Podleski, Steve D.
1994-01-01
NASA Lewis is currently engaged in a research effort as a team member of the High Alpha Technology Program (HATP) within NASA. This program utilizes a specially equipped F/A-18, the High Alpha Research Vehicle (HARV), in an ambitious effort to improve the maneuverability of high-performance military aircraft at low subsonic speed, high angle of attack conditions. The overall objective of the Lewis effort is to develop inlet technology that will ensure efficient airflow delivery to the engine during these maneuvers. One part of the Lewis approach utilizes computational fluid dynamics codes to predict the installed performance of inlets for these highly maneuverable aircraft. Full Navier-Stokes (FNS) calculations on the installed F/A-18 inlet at 30 degrees angle of attack, 0 degrees yaw, and a freestream Mach number of 0.2 have been obtained in this study using an algebraic turbulence model with two grids (original and revised). Results obtained with the original grid were used to determine where further grid refinements and additional geometry were needed. In order to account properly for the external effects, the forebody, leading edge extension (LEX), ramp, and wing were included with inlet geometry. In the original grid, the diverter, LEX slot, and leading edge flap were not included due to insufficient geometry definition, but were included in a revised grid. In addition, a thin-layer Navier-Stokes (TLNS) code is used with the revised grid and the numerical results are compared to those obtained with the FNS code. The TLNS code was used to evaluate the effects on the solution using a code with more recent CFD developments such as upwinding with TVD schemes versus central differencing with artificial dissipation. The calculations are compared to a limited amount of available experimental data. The predicted forebody/fuselage surface static pressures compared well with data of all solutions. The predicted trajectory of the vortex generated under the LEX was different for each solution. These discrepancies are attributed to differences in the grid resolution and turbulence modeling. All solutions predict that this vortex is ingested by the inlet. The predicted inlet total pressure recoveries are lower than data and the distortions are higher than data. The results obtained with the revised grid were significantly improved from the original grid results. The original grid results indicated the ingested vortex migrated to the engine face and caused additional distortions to those already present due to secondary flow development. The revised grid results indicate that the ingested vortex is dissipated along the inlet duct inboard wall. The TLNS results indicate the flow at the engine face was much more distorted than the FNS results and is attributed to the pole boundary condition introducing numerical distortions into the flow field.
Lepiarczyk, E; Bossowska, A; Kaleczyc, J; Majewski, M
2011-01-01
Botulinum toxin (BTX) belongs to a family of neurotoxins which strongly influence the function of autonomic neurons supplying the urinary bladder. Accordingly, BTX has been used as an effective drug in experimental therapies of a range of neurogenic bladder disorders. However, there is no detailed information dealing with the influence of BTX on the morphological and chemical properties of nerve fibres supplying the urinary bladder wall. Therefore, the present study investigated, using double-labeling immunohistochemistry, the distribution, relative frequency and chemical coding of cholinergic and noradrenergic nerve fibers supplying the wall of the urinary bladder in normal female pigs (n = 6) and in the pigs (n = 6) after intravesical BTX injections. In the pigs injected with BTX, the number of adrenergic (DbetaH-positive) nerve fibers distributed in the bladder wall (urothelium, submucosa and muscle coat) was distinctly higher while the number of cholinergic (VAChT-positive) nerve terminals was lower than that found in the control animals. Moreover, the injections of BTX resulted in some changes dealing with the chemical coding of the adrenergic nerve fibers. In contrast to the normal pigs, in BTX injected animals the number of DbetaH/NPY- or DbetaH/CGRP-positive axons was higher in the muscle coat, and some fibres distributed in the urothelium and submucosa expressed immunoreactivity to CGRP. The results obtained suggest that the therapeutic effects of BTX on the urinary bladder might be dependent on changes in the distribution and chemical coding of nerve fibers supplying this organ.
A New Therapeutic Paradigm for Breast Cancer Exploiting Low Dose Estrogen-Induced Apoptosis
2014-08-01
incidences of stroke, pulmonary embolism , colorectal cancer, hip fractures , and death from other causes. After a mean follow-up of 6.8 years, no signifi- cant... embolism , DVT, transient ischemic attack, osteoporotic fracture , cataracts, death, and quality of life. The data was reported at a median follow-up time...injected into the axillary mammary fat pads of ovariectomized athymic mice. The mice were then divided into 4 groups and treated as follows: placebo
INJECTION SYSTEM DESIGN FOR THE BSNS/RCS.
DOE Office of Scientific and Technical Information (OSTI.GOV)
WEI, J.; TANG, J.Y.; CHEN, Y.
2006-06-23
The BSNS injection system is designed to take one uninterrupted long drift in one of the four dispersion-free straight sections to host all the injection devices. Painting bumper magnets are used for both horizontal and vertical phase space painting. Closed-orbit bumper magnets are used for facilitating the installation of the injection septa and decreasing proton traversal in the stripping foil. Even with large beam emittance of about 300 {pi}mm.mrad used, BSNS/RCS still approaches the space charge limit during the injection/trapping phase for the accumulated particles of 1.9*10{sup 13} and at the low injection energy of 80 MeV. Uniform-like beam distributionmore » by well-designed painting scheme is then obtained to decrease the tune shift/spread. ORBIT code is used for the 3D simulations. Upgrading to higher injection energy has also been considered.« less
Method for transition prediction in high-speed boundary layers, phase 2
NASA Astrophysics Data System (ADS)
Herbert, T.; Stuckert, G. K.; Lin, N.
1993-09-01
The parabolized stability equations (PSE) are a new and more reliable approach to analyzing the stability of streamwise varying flows such as boundary layers. This approach has been previously validated for idealized incompressible flows. Here, the PSE are formulated for highly compressible flows in general curvilinear coordinates to permit the analysis of high-speed boundary-layer flows over fairly general bodies. Vigorous numerical studies are carried out to study convergence and accuracy of the linear-stability code LSH and the linear/nonlinear PSE code PSH. Physical interfaces are set up to analyze the M = 8 boundary layer over a blunt cone calculated by using a thin-layer Navier Stokes (TNLS) code and the flow over a sharp cone at angle of attack calculated using the AFWAL parabolized Navier-Stokes (PNS) code. While stability and transition studies at high speeds are far from routine, the method developed here is the best tool available to research the physical processes in high-speed boundary layers.
FUN3D and CFL3D Computations for the First High Lift Prediction Workshop
NASA Technical Reports Server (NTRS)
Park, Michael A.; Lee-Rausch, Elizabeth M.; Rumsey, Christopher L.
2011-01-01
Two Reynolds-averaged Navier-Stokes codes were used to compute flow over the NASA Trapezoidal Wing at high lift conditions for the 1st AIAA CFD High Lift Prediction Workshop, held in Chicago in June 2010. The unstructured-grid code FUN3D and the structured-grid code CFL3D were applied to several different grid systems. The effects of code, grid system, turbulence model, viscous term treatment, and brackets were studied. The SST model on this configuration predicted lower lift than the Spalart-Allmaras model at high angles of attack; the Spalart-Allmaras model agreed better with experiment. Neglecting viscous cross-derivative terms caused poorer prediction in the wing tip vortex region. Output-based grid adaptation was applied to the unstructured-grid solutions. The adapted grids better resolved wake structures and reduced flap flow separation, which was also observed in uniform grid refinement studies. Limitations of the adaptation method as well as areas for future improvement were identified.
Hypersonic vehicle simulation model: Winged-cone configuration
NASA Technical Reports Server (NTRS)
Shaughnessy, John D.; Pinckney, S. Zane; Mcminn, John D.; Cruz, Christopher I.; Kelley, Marie-Louise
1990-01-01
Aerodynamic, propulsion, and mass models for a generic, horizontal-takeoff, single-stage-to-orbit (SSTO) configuration are presented which are suitable for use in point mass as well as batch and real-time six degree-of-freedom simulations. The simulations can be used to investigate ascent performance issues and to allow research, refinement, and evaluation of integrated guidance/flight/propulsion/thermal control systems, design concepts, and methodologies for SSTO missions. Aerodynamic force and moment coefficients are given as functions of angle of attack, Mach number, and control surface deflections. The model data were estimated by using a subsonic/supersonic panel code and a hypersonic local surface inclination code. Thrust coefficient and engine specific impulse were estimated using a two-dimensional forebody, inlet, nozzle code and a one-dimensional combustor code and are given as functions of Mach number, dynamic pressure, and fuel equivalence ratio. Rigid-body mass moments of inertia and center of gravity location are functions of vehicle weight which is in turn a function of fuel flow.
Longley, Susan L; Watson, David; Noyes, Russell; Yoder, Kevin
2006-01-01
A dimensional and psychometrically informed taxonomy of anxiety is emerging, but the specific and nonspecific dimensions of panic and phobic anxiety require greater clarification. In this study, confirmatory factor analyses of data from a sample of 438 college students were used to validate a model of panic and phobic anxiety with six content factors; multiple scales from self-report measures were indicators of each model component. The model included a nonspecific component of (1) neuroticism and two specific components of panic attack, (2) physiological hyperarousal, and (3) anxiety sensitivity. The model also included three phobia components of (4) classically defined agoraphobia, (5) social phobia, and (6) blood-injection phobia. In these data, agoraphobia correlated more strongly with both the social phobia and blood phobia components than with either the physiological hyperarousal or the anxiety sensitivity components. These findings suggest that the association between panic attacks and agoraphobia warrants greater attention.
Numerical Simulation of MIG for 42 GHz, 200 kW Gyrotron
NASA Astrophysics Data System (ADS)
Singh, Udaybir; Bera, Anirban; Kumar, Narendra; Purohit, L. P.; Sinha, Ashok K.
2010-06-01
A triode type magnetron injection gun (MIG) of a 42 GHz, 200 kW gyrotron for an Indian TOKAMAK system is designed by using the commercially available code EGUN. The operating voltages of the modulating anode and the accelerating anode are 29 kV and 65 kV respectively. The operating mode of the gyrotron is TE03 and it is operated in fundamental harmonic. The simulated results of MIG obtained with the EGUN code are validated with another trajectory code TRAK.
Research on Protective Effect and Mechanism of Idazoxan on lps Attacked Acute Hepatic Injury
NASA Astrophysics Data System (ADS)
Zhu, Junyu; Ying, Shangqi; Kang, Wenyuan; Huang, Wenjuan; Liang, Huaping
2018-01-01
Objective: To observe the protection effect of Idazoxan (IDA) on LPS induced acute hepatic injury, and to explore its action mechanism. Methods: 60 adult C57BL/6 mice were divided into a control group (20 mice, intraperitoneal injection of phosphate buffer), a model group (20 mice, intraperitoneal injection of LPS 10 mg/kg) and a agmatine group (20 mice, intraperitoneal injection of LPS 10 mg/kg and agmatine 200 mg/kg) according to random number table method. Blood and liver tissue were collected for preparation of tissue homogenate. Enzyme-linked immunosorbent assay (ELISA) was adopted for detecting tumor necrosis factor-α (TNF-α) and interleukin (IL- 1β and IL - 6) contents in the serum and liver tissue at 24h after molding. Automatic biochemical analyzer is used for determining alanine transaminase (ALT), aspartate aminotransferase (AST) and lactate dehydrogenase (LDH) level at 24h after molding; The liver tissue pathology changes were observed at 24h after molding. Macrophage RAW264.7 cells were stimulated by 10 μg/mL LPS and with or without IDA (100 μmol/L). 2’, 7’-dichlorofluoresce in diacetate (DCFH-DA) was used as a fluorescent probe for detection of intracellular reactive oxygen species (ROS) level; qRT - PCR method was used for detecting antioxidant enzymes HO-1 and NQO-1 mRNA expression level at 2h, 4h and 8 h. Results: mice in the model group suffered from depression, curling and food water forbidding at 6h after molding. Mice in the Idazoxan group have obviously better spirit and activity than that of model group. The serum ALT, AST and LDH level of LPS attacked acute hepatic injury mice can be effectively alleviated after Idazoxan treatment. The expression of proinflammatory factor TNF-α and IL-6 in the liver can be reduced. The liver showed obvious pathological changes at 24 h after injection, such as liver cell swelling, necrosis, congestion, inflammatory cell infiltration, etc.; The liver cell injury was prominently alleviated in IDA treatment group. Compared with the control group, LPS significantly increased ROS level in RAW264.7 cells. The ROS level was decreased with concentration dependence after IDA intervention. IDA increased HO-1 mRNA expression of RAW264.7 cells. It had no influence on NQO-1mRNA. Conclusion: IDA significantly reduces the serum liver injury indexes and contents of TNF-α, IL-6 and other inflammatory mediators in liver tissues. It can alleviate the liver pathology change, thereby it can generate protection function on LPS attacked acute hepatic injury. Its action mechanism may be related to IDA-enhanced liver macrophage antioxidant function.
Liquid rocket combustor computer code development
NASA Technical Reports Server (NTRS)
Liang, P. Y.
1985-01-01
The Advanced Rocket Injector/Combustor Code (ARICC) that has been developed to model the complete chemical/fluid/thermal processes occurring inside rocket combustion chambers are highlighted. The code, derived from the CONCHAS-SPRAY code originally developed at Los Alamos National Laboratory incorporates powerful features such as the ability to model complex injector combustion chamber geometries, Lagrangian tracking of droplets, full chemical equilibrium and kinetic reactions for multiple species, a fractional volume of fluid (VOF) description of liquid jet injection in addition to the gaseous phase fluid dynamics, and turbulent mass, energy, and momentum transport. Atomization and droplet dynamic models from earlier generation codes are transplated into the present code. Currently, ARICC is specialized for liquid oxygen/hydrogen propellants, although other fuel/oxidizer pairs can be easily substituted.
'Heart attack' symptoms and decision-making: the case of older rural women.
Jackson, M N G; McCulloch, B J
2014-01-01
Women are just as vulnerable to 'heart attacks' (used throughout this study to mean 'myocardial infarction') as men and are often unaware of many associated symptoms. Researchers have illustrated that women have difficulty identifying the symptoms of cardiovascular disease, with patients often delaying treatment after the onset of symptoms. Some individuals wait hours or even days before seeking medical care. This is particularly concerning for older rural women because the rates of death from cardiovascular disease and cancer are higher in some rural areas. Despite idealistic views of country life as being active, less stressful, and possessing strong social and community support, rural Americans are more likely than their urban counterparts to face challenges to maintaining health.
The purpose of this paper is to utilize information gathered from a qualitative study exploring older rural women's identification of symptoms and health decision-making specific to heart attack vignettes. Snowball sampling was the main approach utilized to access participants; after an initial contact was successful, participants contacted additional older rural women to see if they might be willing to participate in an interview. This resulted in a final sample of 33 women who resided in rural Midwestern areas of the USA, were 65 years or older, lived in a county defined as rural by the US Census, and were willing to participate in a face-to-face interview. Each interview included a demographic questionnaire, a health questionnaire, and three health vignettes with follow-up questions. Vignettes provided a way of initiating discussions about health decisions without invading the privacy known to be important to rural residents. The term 'heart attack' was used in the interviews because it was thought to be better recognised than the medical term 'myocardial infarction'. All data were audio taped, transcribed, and coded using line-by-line coding. Data were analyzed using content analysis. The study showed that women had difficulty identifying heart attack symptoms when they did not have previous exposure to the symptoms either through personal experience or educational programs. Individuals incorrectly identified symptoms of a heart attack by associating symptoms with sleep problems, stroke, arthritis, stiffness in the neck, influenza, nerve damage, osteoporosis, bone cancer, tooth infection, and a pulled muscle. Misdiagnosis of symptoms most often led to a delay in seeking treatment in these women. Additionally, the women in this study discussed a reluctance to access care because of concerns related to maintaining their privacy, belief that the ambulance would take too long to reach them, and they did not want to bother their relatives for help. The findings of this study suggest implications for educational programs and interventions in rural environments and provide information that can facilitate better-informed communication between healthcare professionals and rural women.
NASA Astrophysics Data System (ADS)
Gómez, Eudoxio Ramos; Zenit, Roberto; Rivera, Carlos González; Trápaga, Gerardo; Ramírez-Argáez, Marco A.
2013-04-01
In this work, a 3D numerical simulation using a Euler-Euler-based model implemented into a commercial CFD code was used to simulate fluid flow and turbulence structure in a water physical model of an aluminum ladle equipped with an impeller for degassing treatment. The effect of critical process parameters such as rotor speed, gas flow rate, and the point of gas injection (conventional injection through the shaft vs a novel injection through the bottom of the ladle) on the fluid flow and vortex formation was analyzed with this model. The commercial CFD code PHOENICS 3.4 was used to solve all conservation equations governing the process for this two-phase fluid flow system. The mathematical model was reasonably well validated against experimentally measured liquid velocity and vortex sizes in a water physical model built specifically for this investigation. From the results, it was concluded that the angular speed of the impeller is the most important parameter in promoting better stirred baths and creating smaller and better distributed bubbles in the liquid. The pumping effect of the impeller is increased as the impeller rotation speed increases. Gas flow rate is detrimental to bath stirring and diminishes the pumping effect of the impeller. Finally, although the injection point was the least significant variable, it was found that the "novel" injection improves stirring in the ladle.
A Numerical Simulation of a Normal Sonic Jet into a Hypersonic Cross-Flow
NASA Technical Reports Server (NTRS)
Jeffries, Damon K.; Krishnamurthy, Ramesh; Chandra, Suresh
1997-01-01
This study involves numerical modeling of a normal sonic jet injection into a hypersonic cross-flow. The numerical code used for simulation is GASP (General Aerodynamic Simulation Program.) First the numerical predictions are compared with well established solutions for compressible laminar flow. Then comparisons are made with non-injection test case measurements of surface pressure distributions. Good agreement with the measurements is observed. Currently comparisons are underway with the injection case. All the experimental data were generated at the Southampton University Light Piston Isentropic Compression Tube.
Precision digital pulse phase generator
McEwan, T.E.
1996-10-08
A timing generator comprises a crystal oscillator connected to provide an output reference pulse. A resistor-capacitor combination is connected to provide a variable-delay output pulse from an input connected to the crystal oscillator. A phase monitor is connected to provide duty-cycle representations of the reference and variable-delay output pulse phase. An operational amplifier drives a control voltage to the resistor-capacitor combination according to currents integrated from the phase monitor and injected into summing junctions. A digital-to-analog converter injects a control current into the summing junctions according to an input digital control code. A servo equilibrium results that provides a phase delay of the variable-delay output pulse to the output reference pulse that linearly depends on the input digital control code. 2 figs.
Precision digital pulse phase generator
McEwan, Thomas E.
1996-01-01
A timing generator comprises a crystal oscillator connected to provide an output reference pulse. A resistor-capacitor combination is connected to provide a variable-delay output pulse from an input connected to the crystal oscillator. A phase monitor is connected to provide duty-cycle representations of the reference and variable-delay output pulse phase. An operational amplifier drives a control voltage to the resistor-capacitor combination according to currents integrated from the phase monitor and injected into summing junctions. A digital-to-analog converter injects a control current into the summing junctions according to an input digital control code. A servo equilibrium results that provides a phase delay of the variable-delay output pulse to the output reference pulse that linearly depends on the input digital control code.
NASA Technical Reports Server (NTRS)
Kumar, A.; Graeves, R. A.
1980-01-01
A user's guide for a computer code 'COLTS' (Coupled Laminar and Turbulent Solutions) is provided which calculates the laminar and turbulent hypersonic flows with radiation and coupled ablation injection past a Jovian entry probe. Time-dependent viscous-shock-layer equations are used to describe the flow field. These equations are solved by an explicit, two-step, time-asymptotic finite-difference method. Eddy viscosity in the turbulent flow is approximated by a two-layer model. In all, 19 chemical species are used to describe the injection of carbon-phenolic ablator in the hydrogen-helium gas mixture. The equilibrium composition of the mixture is determined by a free-energy minimization technique. A detailed frequency dependence of the absorption coefficient for various species is considered to obtain the radiative flux. The code is written for a CDC-CYBER-203 computer and is capable of providing solutions for ablated probe shapes also.
NASA Technical Reports Server (NTRS)
Rhode, M. N.; Engelund, Walter C.; Mendenhall, Michael R.
1995-01-01
Experimental longitudinal and lateral-directional aerodynamic characteristics were obtained for the Pegasus and Pegasus XL configurations over a Mach number range from 1.6 to 6 and angles of attack from -4 to +24 degrees. Angle of sideslip was varied from -6 to +6 degrees, and control surfaces were deflected to obtain elevon, aileron, and rudder effectiveness. Experimental data for the Pegasus configuration are compared with engineering code predictions performed by Nielsen Engineering & Research, Inc. (NEAR) in the aerodynamic design of the Pegasus vehicle, and with results from the Aerodynamic Preliminary Analysis System (APAS) code. Comparisons of experimental results are also made with longitudinal flight data from Flight #2 of the Pegasus vehicle. Results show that the longitudinal aerodynamic characteristics of the Pegasus and Pegasus XL configurations are similar, having the same lift-curve slope and drag levels across the Mach number range. Both configurations are longitudinally stable, with stability decreasing towards neutral levels as Mach number increases. Directional stability is negative at moderate to high angles of attack due to separated flow over the vertical tail. Dihedral effect is positive for both configurations, but is reduced 30-50 percent for the Pegasus XL configuration because of the horizontal tail anhedral. Predicted longitudinal characteristics and both longitudinal and lateral-directional control effectiveness are generally in good agreement with experiment. Due to the complex leeside flowfield, lateral-directional characteristics are not as well predicted by the engineering codes. Experiment and flight data are in good agreement across the Mach number range.
Numerical simulation of steady supersonic flow over spinning bodies of revolution
NASA Technical Reports Server (NTRS)
Sturek, W. B.; Schiff, L. B.
1982-01-01
A recently reported parabolized Navier-Stokes code has been employed to compute the supersonic flowfield about a spinning cone and spinning and nonspinning ogive cylinder and boattailed bodies of revolution at moderate incidence. The computations were performed for flow conditions where extensive measurements for wall pressure, boundary-layer velocity profiles, and Magnus force had been obtained. Comparisons between the computational results and experiment indicate excellent agreement for angles of attack up to 6 deg. At angles greater than 6 deg discrepancies are noted which are tentatively attributed to turbulence modeling errors. The comparisons for Magnus effects show that the code accurately predicts the effects of body shape for the selected models.
Prevention of Hereditary Angioedema Attacks with a Subcutaneous C1 Inhibitor.
Longhurst, Hilary; Cicardi, Marco; Craig, Timothy; Bork, Konrad; Grattan, Clive; Baker, James; Li, Huamin H; Reshef, Avner; Bonner, James; Bernstein, Jonathan A; Anderson, John; Lumry, William R; Farkas, Henriette; Katelaris, Constance H; Sussman, Gordon L; Jacobs, Joshua; Riedl, Marc; Manning, Michael E; Hebert, Jacques; Keith, Paul K; Kivity, Shmuel; Neri, Sergio; Levy, Donald S; Baeza, Maria L; Nathan, Robert; Schwartz, Lawrence B; Caballero, Teresa; Yang, William; Crisan, Ioana; Hernandez, María D; Hussain, Iftikhar; Tarzi, Michael; Ritchie, Bruce; Králíčková, Pavlina; Guilarte, Mar; Rehman, Syed M; Banerji, Aleena; Gower, Richard G; Bensen-Kennedy, Debra; Edelman, Jonathan; Feuersenger, Henrike; Lawo, John-Philip; Machnig, Thomas; Pawaskar, Dipti; Pragst, Ingo; Zuraw, Bruce L
2017-03-23
Hereditary angioedema is a disabling, potentially fatal condition caused by deficiency (type I) or dysfunction (type II) of the C1 inhibitor protein. In a phase 2 trial, the use of CSL830, a nanofiltered C1 inhibitor preparation that is suitable for subcutaneous injection, resulted in functional levels of C1 inhibitor activity that would be expected to provide effective prophylaxis of attacks. We conducted an international, prospective, multicenter, randomized, double-blind, placebo-controlled, dose-ranging, phase 3 trial to evaluate the efficacy and safety of self-administered subcutaneous CSL830 in patients with type I or type II hereditary angioedema who had had four or more attacks in a consecutive 2-month period within 3 months before screening. We randomly assigned the patients to one of four treatment sequences in a crossover design, each involving two 16-week treatment periods: either 40 IU or 60 IU of CSL830 per kilogram of body weight twice weekly followed by placebo, or vice versa. The primary efficacy end point was the number of attacks of angioedema. Secondary efficacy end points were the proportion of patients who had a response (≥50% reduction in the number of attacks with CSL830 as compared with placebo) and the number of times that rescue medication was used. Of the 90 patients who underwent randomization, 79 completed the trial. Both doses of CSL830, as compared with placebo, reduced the rate of attacks of hereditary angioedema (mean difference with 40 IU, -2.42 attacks per month; 95% confidence interval [CI], -3.38 to -1.46; and mean difference with 60 IU, -3.51 attacks per month; 95% CI, -4.21 to -2.81; P<0.001 for both comparisons). Response rates were 76% (95% CI, 62 to 87) in the 40-IU group and 90% (95% CI, 77 to 96) in the 60-IU group. The need for rescue medication was reduced from 5.55 uses per month in the placebo group to 1.13 uses per month in the 40-IU group and from 3.89 uses in the placebo group to 0.32 uses per month in the 60-IU group. Adverse events (most commonly mild and transient local site reactions) occurred in similar proportions of patients who received CSL830 and those who received placebo. In patients with hereditary angioedema, the prophylactic use of a subcutaneous C1 inhibitor twice weekly significantly reduced the frequency of acute attacks. (Funded by CSL Behring; COMPACT EudraCT number, 2013-000916-10 , and ClinicalTrials.gov number, NCT01912456 .).
Sajjad, Muhammad; Mehmood, Irfan; Baik, Sung Wook
2017-01-01
Medical image collections contain a wealth of information which can assist radiologists and medical experts in diagnosis and disease detection for making well-informed decisions. However, this objective can only be realized if efficient access is provided to semantically relevant cases from the ever-growing medical image repositories. In this paper, we present an efficient method for representing medical images by incorporating visual saliency and deep features obtained from a fine-tuned convolutional neural network (CNN) pre-trained on natural images. Saliency detector is employed to automatically identify regions of interest like tumors, fractures, and calcified spots in images prior to feature extraction. Neuronal activation features termed as neural codes from different CNN layers are comprehensively studied to identify most appropriate features for representing radiographs. This study revealed that neural codes from the last fully connected layer of the fine-tuned CNN are found to be the most suitable for representing medical images. The neural codes extracted from the entire image and salient part of the image are fused to obtain the saliency-injected neural codes (SiNC) descriptor which is used for indexing and retrieval. Finally, locality sensitive hashing techniques are applied on the SiNC descriptor to acquire short binary codes for allowing efficient retrieval in large scale image collections. Comprehensive experimental evaluations on the radiology images dataset reveal that the proposed framework achieves high retrieval accuracy and efficiency for scalable image retrieval applications and compares favorably with existing approaches. PMID:28771497
An Analysis of Hardware-Assisted Virtual Machine Based Rootkits
2014-06-01
certain aspects of TPM implementation just to name a few. HyperWall is an architecture proposed by Szefer and Lee to protect guest VMs from...DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) The use of virtual machine (VM) technology has expanded rapidly since AMD and Intel implemented ...Intel VT-x implementations of Blue Pill to identify commonalities in the respective versions’ attack methodologies from both a functional and technical
Security Considerations For Network-Centric Weapon Systems
2009-09-01
who exploits some weakness in these protective measures and impersonates a trusted network member can gain the ability to reprogram the victim node to...permitting the attacker to conduct a small-scale reprogramming and insert malicious code such as viruses or worms (McClure, Scambray, and Kurtz 2005, 218...people requesting this information because of the subconscious assumption that everything will end well because it has in the past. Defense
Predicting Catastrophic BGP Routing Instabilities
2004-03-01
predict a BGP routing instability confine their focus to either macro- or micro -level metrics, but not to both. The inherent limitations of each of...Level and Micro -Level Metrics Correlation; Worm Attack Studies; 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY... micro -level metrics, but not to both. The inherent limitations of each of these forms of metric gives rise to an excessive rate of spurious alerts
A numerical study of the effects of wind tunnel wall proximity on an airfoil model
NASA Technical Reports Server (NTRS)
Potsdam, Mark; Roberts, Leonard
1990-01-01
A procedure was developed for modeling wind tunnel flows using computational fluid dynamics. Using this method, a numerical study was undertaken to explore the effects of solid wind tunnel wall proximity and Reynolds number on a two-dimensional airfoil model at low speed. Wind tunnel walls are located at varying wind tunnel height to airfoil chord ratios and the results are compared with freestream flow in the absence of wind tunnel walls. Discrepancies between the constrained and unconstrained flows can be attributed to the presence of the walls. Results are for a Mach Number of 0.25 at angles of attack through stall. A typical wind tunnel Reynolds number of 1,200,000 and full-scale flight Reynolds number of 6,000,000 were investigated. At this low Mach number, wind tunnel wall corrections to Mach number and angle of attack are supported. Reynolds number effects are seen to be a consideration in wind tunnel testing and wall interference correction methods. An unstructured grid Navier-Stokes code is used with a Baldwin-Lomax turbulence model. The numerical method is described since unstructured flow solvers present several difficulties and fundamental differences from structured grid codes, especially in the area of turbulence modeling and grid generation.
Process of afterburning combustible constituents of exhaust gases from rotary kilns
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schnabel, W.; Scheu, E.; Serbent, H.
1984-03-13
In order to avoid incrustation and an excessively strong thermal attack on the afterburning chamber, the exhaust gases which contain gaseous and solid constituents which are combustible are afterburned in a plurality of stages, which are connected in series. The rate at which oxygen is supplied to each stage is so controlled that part of the combustible constituents is afterburned in each stage. The gas which is about to enter each succeeding stage is cooled by injected water.
Prediction of Business Jet Airloads Using The Overflow Navier-Stokes Code
NASA Technical Reports Server (NTRS)
Bounajem, Elias; Buning, Pieter G.
2001-01-01
The objective of this work is to evaluate the application of Navier-Stokes computational fluid dynamics technology, for the purpose of predicting off-design condition airloads on a business jet configuration in the transonic regime. The NASA Navier-Stokes flow solver OVERFLOW with Chimera overset grid capability, availability of several numerical schemes and convergence acceleration techniques was selected for this work. A set of scripts which have been compiled to reduce the time required for the grid generation process are described. Several turbulence models are evaluated in the presence of separated flow regions on the wing. Computed results are compared to available wind tunnel data for two Mach numbers and a range of angles-of-attack. Comparisons of wing surface pressure from numerical simulation and wind tunnel measurements show good agreement up to fairly high angles-of-attack.
Secure Wake-Up Scheme for WBANs
NASA Astrophysics Data System (ADS)
Liu, Jing-Wei; Ameen, Moshaddique Al; Kwak, Kyung-Sup
Network life time and hence device life time is one of the fundamental metrics in wireless body area networks (WBAN). To prolong it, especially those of implanted sensors, each node must conserve its energy as much as possible. While a variety of wake-up/sleep mechanisms have been proposed, the wake-up radio potentially serves as a vehicle to introduce vulnerabilities and attacks to WBAN, eventually resulting in its malfunctions. In this paper, we propose a novel secure wake-up scheme, in which a wake-up authentication code (WAC) is employed to ensure that a BAN Node (BN) is woken up by the correct BAN Network Controller (BNC) rather than unintended users or malicious attackers. The scheme is thus particularly implemented by a two-radio architecture. We show that our scheme provides higher security while consuming less energy than the existing schemes.
Safe2Tell® : an anonymous, 24/7 reporting system for preventing school violence.
Payne, Susan R T; Elliott, Delbert S
2011-01-01
There is widespread agreement that many school shootings could be prevented if authorities were informed that a student was planning or preparing to carry out an attack. A universal problem is that young people are highly reluctant to report on their peers. This code of silence represents a major barrier to prevention efforts. In response to the Columbine shooting, the state of Colorado established the Safe2Tell® anonymous, 24/7 reporting system for receiving and forwarding threats of violence, bullying, and other concerns. This article describes how the program has grown to the point that it now receives more than 100 calls per month. A series of case examples illustrates its success in responding to threatening situations, including twenty-eight potential school attacks. Copyright © 2011 Wiley Periodicals, Inc., A Wiley Company.
Analysis of film cooling in rocket nozzles
NASA Technical Reports Server (NTRS)
Woodbury, Keith A.
1993-01-01
This report summarizes the findings on the NASA contract NAG8-212, Task No. 3. The overall project consists of three tasks, all of which have been successfully completed. In addition, some supporting supplemental work, not required by the contract, has been performed and is documented herein. Task 1 involved the modification of the wall functions in the code FDNS (Finite Difference Navier-Stokes) to use a Reynolds Analogy-based method. This task was completed in August, 1992. Task 2 involved the verification of the code against experimentally available data. The data chosen for comparison was from an experiment involving the injection of helium from a wall jet. Results obtained in completing this task also show the sensitivity of the FDNS code to unknown conditions at the injection slot. This task was completed in September, 1992. Task 3 required the computation of the flow of hot exhaust gases through the P&W 40K subscale nozzle. Computations were performed both with and without film coolant injection. This task was completed in July, 1993. The FDNS program tends to overpredict heat fluxes, but, with suitable modeling of backside cooling, may give reasonable wall temperature predictions. For film cooling in the P&W 40K calorimeter subscale nozzle, the average wall temperature is reduced from 1750R to about 1050R by the film cooling. The average wall heat flux is reduced by a factor of 3.
A Computer Program for Flow-Log Analysis of Single Holes (FLASH)
Day-Lewis, F. D.; Johnson, C.D.; Paillet, Frederick L.; Halford, K.J.
2011-01-01
A new computer program, FLASH (Flow-Log Analysis of Single Holes), is presented for the analysis of borehole vertical flow logs. The code is based on an analytical solution for steady-state multilayer radial flow to a borehole. The code includes options for (1) discrete fractures and (2) multilayer aquifers. Given vertical flow profiles collected under both ambient and stressed (pumping or injection) conditions, the user can estimate fracture (or layer) transmissivities and far-field hydraulic heads. FLASH is coded in Microsoft Excel with Visual Basic for Applications routines. The code supports manual and automated model calibration. ?? 2011, The Author(s). Ground Water ?? 2011, National Ground Water Association.
Automatic Processing of Reactive Polymers
NASA Technical Reports Server (NTRS)
Roylance, D.
1985-01-01
A series of process modeling computer codes were examined. The codes use finite element techniques to determine the time-dependent process parameters operative during nonisothermal reactive flows such as can occur in reaction injection molding or composites fabrication. The use of these analytical codes to perform experimental control functions is examined; since the models can determine the state of all variables everywhere in the system, they can be used in a manner similar to currently available experimental probes. A small but well instrumented reaction vessel in which fiber-reinforced plaques are cured using computer control and data acquisition was used. The finite element codes were also extended to treat this particular process.
NASA Astrophysics Data System (ADS)
López-Coto, R.; Hahn, J.; BenZvi, S.; Dingus, B.; Hinton, J.; Nisa, M. U.; Parsons, R. D.; Greus, F. Salesa; Zhang, H.; Zhou, H.
2018-11-01
The positron excess measured by PAMELA and AMS can only be explained if there is one or several sources injecting them. Moreover, at the highest energies, it requires the presence of nearby ( ∼ hundreds of parsecs) and middle age (maximum of ∼ hundreds of kyr) sources. Pulsars, as factories of electrons and positrons, are one of the proposed candidates to explain the origin of this excess. To calculate the contribution of these sources to the electron and positron flux at the Earth, we developed EDGE (Electron Diffusion and Gamma rays to the Earth), a code to treat the propagation of electrons and compute their diffusion from a central source with a flexible injection spectrum. Using this code, we can derive the source's gamma-ray spectrum, spatial extension, the all-electron density in space, the electron and positron flux reaching the Earth and the positron fraction measured at the Earth. We present in this paper the foundations of the code and study how different parameters affect the gamma-ray spectrum of a source and the electron flux measured at the Earth. We also studied the effect of several approximations usually performed in these studies. This code has been used to derive the results of the positron flux measured at the Earth in [1].
PARALLEL PERTURBATION MODEL FOR CYCLE TO CYCLE VARIABILITY PPM4CCV
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ameen, Muhsin Mohammed; Som, Sibendu
This code consists of a Fortran 90 implementation of the parallel perturbation model to compute cyclic variability in spark ignition (SI) engines. Cycle-to-cycle variability (CCV) is known to be detrimental to SI engine operation resulting in partial burn and knock, and result in an overall reduction in the reliability of the engine. Numerical prediction of cycle-to-cycle variability (CCV) in SI engines is extremely challenging for two key reasons: (i) high-fidelity methods such as large eddy simulation (LES) are required to accurately capture the in-cylinder turbulent flow field, and (ii) CCV is experienced over long timescales and hence the simulations needmore » to be performed for hundreds of consecutive cycles. In the new technique, the strategy is to perform multiple parallel simulations, each of which encompasses 2-3 cycles, by effectively perturbing the simulation parameters such as the initial and boundary conditions. The PPM4CCV code is a pre-processing code and can be coupled with any engine CFD code. PPM4CCV was coupled with Converge CFD code and a 10-time speedup was demonstrated over the conventional multi-cycle LES in predicting the CCV for a motored engine. Recently, the model is also being applied to fired engines including port fuel injected (PFI) and direct injection spark ignition engines and the preliminary results are very encouraging.« less
MODFLOW 2.0: A program for predicting moderator flow patterns
NASA Astrophysics Data System (ADS)
Peterson, P. F.; Paik, I. K.
1991-07-01
Sudden changes in the temperature of flowing liquids can result in transient buoyancy forces which strongly impact the flow hydrodynamics via flow stratification. These effects have been studied for the case of potential flow of stratified liquids to line sinks, but not for moderator flow in SRS reactors. Standard codes, such as TRAC and COMMIX, do not have the capability to capture the stratification effect, due to strong numerical diffusion which smears away the hot/cold fluid interface. A related problem with standard codes is the inability to track plumes injected into the liquid flow, again due to numerical diffusion. The combined effects of buoyant stratification and plume dispersion have been identified as being important in the operation of the Supplementary Safety System which injects neutron-poison ink into SRS reactors to provide safe shutdown in the event of safety rod failure. The MODFLOW code discussed here provides transient moderator flow pattern information with stratification effects, and tracks the location of ink plumes in the reactor. The code, written in Fortran, is compiled for Macintosh II computers, and includes subroutines for interactive control and graphical output. Removing the graphics capabilities, the code can also be compiled on other computers. With graphics, in addition to the capability to perform safety related computations, MODFLOW also provides an easy tool for becoming familiar with flow distributions in SRS reactors.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Behafarid, F.; Shaver, D. R.; Bolotnov, I. A.
The required technological and safety standards for future Gen IV Reactors can only be achieved if advanced simulation capabilities become available, which combine high performance computing with the necessary level of modeling detail and high accuracy of predictions. The purpose of this paper is to present new results of multi-scale three-dimensional (3D) simulations of the inter-related phenomena, which occur as a result of fuel element heat-up and cladding failure, including the injection of a jet of gaseous fission products into a partially blocked Sodium Fast Reactor (SFR) coolant channel, and gas/molten sodium transport along the coolant channels. The computational approachmore » to the analysis of the overall accident scenario is based on using two different inter-communicating computational multiphase fluid dynamics (CMFD) codes: a CFD code, PHASTA, and a RANS code, NPHASE-CMFD. Using the geometry and time history of cladding failure and the gas injection rate, direct numerical simulations (DNS), combined with the Level Set method, of two-phase turbulent flow have been performed by the PHASTA code. The model allows one to track the evolution of gas/liquid interfaces at a centimeter scale. The simulated phenomena include the formation and breakup of the jet of fission products injected into the liquid sodium coolant. The PHASTA outflow has been averaged over time to obtain mean phasic velocities and volumetric concentrations, as well as the liquid turbulent kinetic energy and turbulence dissipation rate, all of which have served as the input to the core-scale simulations using the NPHASE-CMFD code. A sliding window time averaging has been used to capture mean flow parameters for transient cases. The results presented in the paper include testing and validation of the proposed models, as well the predictions of fission-gas/liquid-sodium transport along a multi-rod fuel assembly of SFR during a partial loss-of-flow accident. (authors)« less
Lee, Kyungmin; Chung, Heeyoung; Park, Youngsuk
2014-01-01
Purpose To determine if short term effects of intravitreal anti-vascular endothelial growth factor or steroid injection are correlated with fluid turbidity, as detected by spectral domain optical coherence tomography (SD-OCT) in diabetic macular edema (DME) patients. Methods A total of 583 medical records were reviewed and 104 cases were enrolled. Sixty eyes received a single intravitreal bevacizumab injection (IVB) on the first attack of DME and 44 eyes received triamcinolone acetonide treatment (IVTA). Intraretinal fluid turbidity in DME patients was estimated with initialintravitreal SD-OCT and analyzed with color histograms from a Photoshop program. Central macular thickness and visual acuity using a logarithm from the minimum angle of resolution chart, were assessed at the initial period and 2 months after injections. Results Visual acuity and central macular thickness improved after injections in both groups. In the IVB group, visual acuity and central macular thickness changed less as the intraretinal fluid became more turbid. In the IVTA group, visual acuity underwent less change while central macular thickness had a greater reduction (r = -0.675, p = 0.001) as the intraretinal fluid was more turbid. Conclusions IVB and IVTA injections were effective in reducing central macular thickness and improving visual acuity in DME patients. Further, fluid turbidity, which was detected by SD-OCT may be one of the indexes that highlight the influence of the steroid-dependent pathogenetic mechanism. PMID:25120338
Lee, Kyungmin; Chung, Heeyoung; Park, Youngsuk; Sohn, Joonhong
2014-08-01
To determine if short term effects of intravitreal anti-vascular endothelial growth factor or steroid injection are correlated with fluid turbidity, as detected by spectral domain optical coherence tomography (SD-OCT) in diabetic macular edema (DME) patients. A total of 583 medical records were reviewed and 104 cases were enrolled. Sixty eyes received a single intravitreal bevacizumab injection (IVB) on the first attack of DME and 44 eyes received triamcinolone acetonide treatment (IVTA). Intraretinal fluid turbidity in DME patients was estimated with initial intravitreal SD-OCT and analyzed with color histograms from a Photoshop program. Central macular thickness and visual acuity using a logarithm from the minimum angle of resolution chart, were assessed at the initial period and 2 months after injections. Visual acuity and central macular thickness improved after injections in both groups. In the IVB group, visual acuity and central macular thickness changed less as the intraretinal fluid became more turbid. In the IVTA group, visual acuity underwent less change while central macular thickness had a greater reduction (r = -0.675, p = 0.001) as the intraretinal fluid was more turbid. IVB and IVTA injections were effective in reducing central macular thickness and improving visual acuity in DME patients. Further, fluid turbidity, which was detected by SD-OCT may be one of the indexes that highlight the influence of the steroid-dependent pathogenetic mechanism.
DefEX: Hands-On Cyber Defense Exercise for Undergraduate Students
2011-07-01
Injection, and 4) File Upload. Next, the students patched the associated flawed Perl and PHP Hypertext Preprocessor ( PHP ) code. Finally, students...underlying script. The Zora XSS vulnerability existed in a PHP file that echoed unfiltered user input back to the screen. To eliminate the...vulnerability, students filtered the input using the PHP htmlentities function and retested the code. The htmlentities function translates certain ambiguous
A publicly available SSC+EC code.
NASA Astrophysics Data System (ADS)
Georganopoulos, M.; Perlman, E. S.; Kazanas, D.; Wingert, B.; Castro, R.
2004-08-01
We present a time-dependent one zone SSC+EC code that takes into account the KN-cross section, and calculates self-consistently all orders of Compton scattering. In particular, it produces separate results for the first order Compton component, and for the total Compton emission. The kinetic equation is solved using a stable implicit scheme, and the user can select from a range of physically motivated temporal electron injection profile. The code is written in C, is fully documented and will soon be publicly available through the Internet, along with a set of IDL visualization routines.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, F.; Brown, K.; Flach, G.
The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material propertiesmore » via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown & Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown & Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface was developed to link GoldSim with external codes (Smith III et al. 2010). The DLL uses a list of code inputs provided by GoldSim to create an input file for the external application, runs the external code, and returns a list of outputs (read from files created by the external application) back to GoldSim. In this way GoldSim provides: (1) a unified user interface to the applications, (2) the capability of coupling selected codes in a synergistic manner, and (3) the capability of performing probabilistic uncertainty analysis with the codes. GoldSim is made available by the GoldSim Technology Group as a free 'Player' version that allows running but not editing GoldSim models. The player version makes the software readily available to a wider community of users that would wish to use the CBP application but do not have a license for GoldSim.« less
Estimation of equivalence ratio distribution in diesel spray using a computational fluid dynamics
NASA Astrophysics Data System (ADS)
Suzuki, Yasumasa; Tsujimura, Taku; Kusaka, Jin
2014-08-01
It is important to understand the mechanism of mixing and atomization of the diesel spray. In addition, the computational prediction of mixing behavior and internal structure of a diesel spray is expected to promote the further understanding about a diesel spray and development of the diesel engine including devices for fuel injection. In this study, we predicted the formation of diesel fuel spray with 3D-CFD code and validated the application by comparing experimental results of the fuel spray behavior and the equivalence ratio visualized by Layleigh-scatter imaging under some ambient, injection and fuel conditions. Using the applicable constants of KH-RT model, we can predict the liquid length spray on a quantitative level. under various fuel injection, ambient and fuel conditions. On the other hand, the change of the vapor penetration and the fuel mass fraction and equivalence ratio distribution with change of fuel injection and ambient conditions quantitatively. The 3D-CFD code used in this study predicts the spray cone angle and entrainment of ambient gas are predicted excessively, therefore there is the possibility of the improvement in the prediction accuracy by the refinement of fuel droplets breakup and evaporation model and the quantitative prediction of spray cone angle.
Experimental studies and simulations of hydrogen pellet ablation in the stellarator TJ-II
NASA Astrophysics Data System (ADS)
Panadero, N.; McCarthy, K. J.; Koechl, F.; Baldzuhn, J.; Velasco, J. L.; Combs, S. K.; de la Cal, E.; García, R.; Hernández Sánchez, J.; Silvagni, D.; Turkin, Y.; TJ-II Team; W7-X Team
2018-02-01
Plasma core fuelling is a key issue for the development of steady-state scenarios in large magnetically-confined fusion devices, in particular for helical-type machines. At present, cryogenic pellet injection is the most promising technique for efficient fuelling. Here, pellet ablation and fuelling efficiency experiments, using a compact pellet injector, are carried out in electron cyclotron resonance and neutral beam injection heated plasmas of the stellarator TJ-II. Ablation profiles are reconstructed from light emissions collected by silicon photodiodes and a fast-frame camera system, under the assumptions that such emissions are loosely related to the ablation rate and that pellet radial acceleration is negligible. In addition, pellet particle deposition and fuelling efficiency are determined using density profiles provided by a Thomson scattering system. Furthermore, experimental results are compared with ablation and deposition profiles provided by the HPI2 pellet code, which is adapted here for the stellarators Wendelstein 7-X (W7-X) and TJ-II. Finally, the HPI2 code is used to simulate ablation and deposition profiles for pellets of different sizes and velocities injected into relevant W7-X plasma scenarios, while estimating the plasmoid drift and the fuelling efficiency of injections made from two W7-X ports.
40 CFR 86.1542 - Information required.
Code of Federal Regulations, 2013 CFR
2013-07-01
...), fuel system (including number of carburetors, number of carburetor barrels, fuel injection type and fuel tank(s) capacity and location), engine code, gross vehicle weight rating, inertia weight class and...
Migration of tungsten dust in tokamaks: role of dust-wall collisions
NASA Astrophysics Data System (ADS)
Ratynskaia, S.; Vignitchouk, L.; Tolias, P.; Bykov, I.; Bergsåker, H.; Litnovsky, A.; den Harder, N.; Lazzaro, E.
2013-12-01
The modelling of a controlled tungsten dust injection experiment in TEXTOR by the dust dynamics code MIGRAINe is reported. The code, in addition to the standard dust-plasma interaction processes, also encompasses major mechanical aspects of dust-surface collisions. The use of analytical expressions for the restitution coefficients as functions of the dust radius and impact velocity allows us to account for the sticking and rebound phenomena that define which parts of the dust size distribution can migrate efficiently. The experiment provided unambiguous evidence of long-distance dust migration; artificially introduced tungsten dust particles were collected 120° toroidally away from the injection point, but also a selectivity in the permissible size of transported grains was observed. The main experimental results are reproduced by modelling.
Computation of H2/air reacting flowfields in drag-reduction external combustion
NASA Technical Reports Server (NTRS)
Lai, H. T.
1992-01-01
Numerical simulation and analysis of the solution are presented for a laminar reacting flowfield of air and hydrogen in the case of external combustion employed to reduce base drag in hypersonic vehicles operating at transonic speeds. The flowfield consists of a transonic air stream at a Mach number of 1.26 and a sonic transverse hydrogen injection along a row of 26 orifices. Self-sustained combustion is computed over an expansion ramp downstream of the injection and a flameholder, using the recently developed RPLUS code. Measured data is available only for surface pressure distributions and is used for validation of the code in practical 3D reacting flowfields. Pressure comparison shows generally good agreements, and the main effects of combustion are also qualitatively consistent with experiment.
Skills Associated with Line Breaks in Elite Rugby Union
den Hollander, Steve; Brown, James; Lambert, Michael; Treu, Paul; Hendricks, Sharief
2016-01-01
The ability of the attacking team to break through the defensive line is a key indicator of success as it creates opportunities to score tries. The aim of this study was to analyse line breaks and identify the associated skills and playing characteristics. The 2013 Super Rugby season (125 games) was analysed, in which 362 line breaks were identified and coded using variables that assessed team patterns and non-contact attacking skills in the phases preceding the line break. There was an average of 3 line breaks per game, with 39% of line breaks resulting in a try. Line breaks occurred when the ball-carrier was running fast [61%, x2(4) = 25.784, p = 0.000, Cramer’s v = 0.1922, weak]. At a moderate distance, short lateral passes (19%) and skip passes (15%) attributed to the highest percentage of line breaks [x2(26) = 50.899, p = 0.036, Cramer’s v = 0.2484, moderate]. Faster defensive line speeds resulted in more line breaks [x2(12) = 61.703, p < 0.001, Cramer’s v = 0.3026, moderate]. Line breaks are associated with overall team success and try scoring opportunities. Awareness of the defenders line speed and depth, fast running speed when receiving the ball and quick passing between attackers to the outside backs creates line break opportunities. During training, coaches should emphasise the movement speed of the ball between attackers and manipulate the speed and distance of the defenders. Key points Line breaks are associated with overall team success and try scoring opportunities. Awareness of the defenders line speed and depth, fast running speed when receiving the ball and quick passing between attackers to the outside backs creates line break opportunities During training, coaches should emphasise the movement speed of the ball between attackers and manipulate the speed and distance of the defenders. PMID:27803629
Gabbett, Tim J; Polley, Chris; Dwyer, Dan B; Kearney, Simon; Corvo, Alex
2014-09-01
No study has investigated the influence of field position and phase of play on the physical demands of match-play in professional rugby league forwards. We investigated the physical demands placed on forwards in elite rugby league matches, with special reference to how these demands differed between attack and defence, and in different field positions. Cohort study. Twenty-two rugby league players (26 ± 3 years) from the same professional club participated in this study. Global positioning system (GPS) analysis was completed during 23 matches. Video footage was synchronised with the GPS files and coded for the time spent in attack and defence, and in one of three different field positions (0-30 m, 31-70 m, 71-100 m). The physical demands of defence were consistently greater than attack. Moderate to large differences (ES=0.62-1.41) were found between defence and attack for distance covered (109 ± 16 m/min vs. 82 ± 12 m/min), low speed distance (104 ± 15 m/min vs. 78 ± 11 m/min), frequency of collisions (1.9 ± 0.7/min vs. 0.8 ± 0.3/min), and repeated high-intensity effort bouts (1 every 4.9 ± 5.1 min vs. 1 every 9.4 ± 6.1 min). The running demands and frequency of repeated high-intensity effort bouts were greater when defending in the opposition's 30 m zone (i.e. 71-100 m), with repeated high-intensity effort bouts also occurring more frequently when defending the team's own try-line and when attacking the opposition's try-line. Specific training drills designed to replicate the attacking and defensive demands of different field positional zones are likely to be effective in preparing players for the most demanding activities that occur in professional rugby league match-play. Copyright © 2013 Sports Medicine Australia. Published by Elsevier Ltd. All rights reserved.
Error-correcting pairs for a public-key cryptosystem
NASA Astrophysics Data System (ADS)
Pellikaan, Ruud; Márquez-Corbella, Irene
2017-06-01
Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post-quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification. The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken. One of the main requirements of a code-based cryptosystem is having high performance t-bounded decoding algorithms which is achieved in the case the code has a t-error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error-correcting pair. In this paper, the class of codes with a t-ECP is proposed for the McEliece cryptosystem. Moreover, we study the hardness of distinguishing arbitrary codes from those having a t-error correcting pair.
Supraventricular tachycardia after fenoterol inhalation: report of two cases.
Hung, Yu-Fa; Yang, Winnie; Chang, Mei-Ling
2003-01-01
Supraventricular tachycardia (SVT) following fenoterol inhalation in metered-dose inhaler (MDI) has never been reported. We report two cases of SVT after fenoterol inhalation in MDI. Case one was a 4-year-old boy who had asthma since early childhood. Paroxysmal supraventricular tachycardia (PSVT) was found after fenoterol inhalation (MDI), which returned to normal sinus rhythm following adenosine injection. The other one was a 9-year-old male who also had asthma since early childhood. He suffered from attacks of PSVT four times after fenoterol inhalation within one year. After verapamil injection and vagal maneuvers, PSVT was converted to normal sinus rhythm. There were no other episodes of SVT after discontinuing usage of fenoterol inhalation for 2 years in the follow-up. We report these two cases to remind pediatricians that cardiac arrhythmias should be evaluated following fenoterol inhalation (MDI).
Modeling of lithium granule injection in NSTX using M3D-C1
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fil, A.; Kolemen, E.; Ferraro, N.
In this paper, we present simulations of pedestal control by lithium granule injection (LGI) in NSTX. A model for small granule ablation has been implemented in the M3D-C1 code (Jardin et al 2012 Comput. Sci. Discovery 5 014002), allowing the simulation of realistic lithium granule injections. 2D and 3D simulations of Li injections in NSTX H-mode plasmas are performed and the effect of granule size, injection angle and velocity on the pedestal gradient increase is studied. The amplitude of the local pressure perturbation caused by the granules is found to be highly dependent on the solid granule size. Adjusting themore » granule injection velocity allows one to inject more particles at the pedestal top. 3D simulations show the destabilization of high order MHD modes whose amplitude is directly linked to the localized pressure perturbation, which is found to depend on the toroidal localization of the granule density source.« less
Modeling of lithium granule injection in NSTX using M3D-C1
Fil, A.; Kolemen, E.; Ferraro, N.; ...
2017-04-06
In this paper, we present simulations of pedestal control by lithium granule injection (LGI) in NSTX. A model for small granule ablation has been implemented in the M3D-C1 code (Jardin et al 2012 Comput. Sci. Discovery 5 014002), allowing the simulation of realistic lithium granule injections. 2D and 3D simulations of Li injections in NSTX H-mode plasmas are performed and the effect of granule size, injection angle and velocity on the pedestal gradient increase is studied. The amplitude of the local pressure perturbation caused by the granules is found to be highly dependent on the solid granule size. Adjusting themore » granule injection velocity allows one to inject more particles at the pedestal top. 3D simulations show the destabilization of high order MHD modes whose amplitude is directly linked to the localized pressure perturbation, which is found to depend on the toroidal localization of the granule density source.« less
Phase-Space Detection of Cyber Events
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hernandez Jimenez, Jarilyn M; Ferber, Aaron E; Prowell, Stacy J
Energy Delivery Systems (EDS) are a network of processes that produce, transfer and distribute energy. EDS are increasingly dependent on networked computing assets, as are many Industrial Control Systems. Consequently, cyber-attacks pose a real and pertinent threat, as evidenced by Stuxnet, Shamoon and Dragonfly. Hence, there is a critical need for novel methods to detect, prevent, and mitigate effects of such attacks. To detect cyber-attacks in EDS, we developed a framework for gathering and analyzing timing data that involves establishing a baseline execution profile and then capturing the effect of perturbations in the state from injecting various malware. The datamore » analysis was based on nonlinear dynamics and graph theory to improve detection of anomalous events in cyber applications. The goal was the extraction of changing dynamics or anomalous activity in the underlying computer system. Takens' theorem in nonlinear dynamics allows reconstruction of topologically invariant, time-delay-embedding states from the computer data in a sufficiently high-dimensional space. The resultant dynamical states were nodes, and the state-to-state transitions were links in a mathematical graph. Alternatively, sequential tabulation of executing instructions provides the nodes with corresponding instruction-to-instruction links. Graph theorems guarantee graph-invariant measures to quantify the dynamical changes in the running applications. Results showed a successful detection of cyber events.« less
Sabzi Khoshnami, Mohammad; Mohammadi, Elham; Addelyan Rasi, Hamideh; Khankeh, Hamid Reza; Arshi, Maliheh
2017-05-01
Acid attack, a worldwide phenomenon, has been increasing in recent years. In addition to severe injuries to the face and body, such violence leads to psychological and social problems that affect the survivors' quality of life. The present study provides a more in-depth understanding of this phenomenon and explores the nature and dimensions of acid attacks based on survivors' experiences. A grounded theory study using semi-structured, recorded interviews and applying purposeful theoretical sampling was conducted with 12 acid attack survivors in Iran. Data were analysed using constant comparison in open, axial and selective coding stages. A conceptual model was developed to explain the relationships among the main categories extracted through the grounded theory study. Physical and psychological wounds emerged as a core category. Traditional context and extreme beauty value in society acted as the context of the physical and psychological wounds experienced. Living with a drug abuser with behavioural disorders and lack of problem-solving skills in interpersonal conflict were found to be causal conditions. Action strategies to deal with this experience were found to be composed of individual, interpersonal and structural levels. Education, percentage and place of burning acted as intervening conditions that influenced survivors' strategies. Finally, adverse consequences of social deprivation and feeling helpless and hindered were found to have an important impact. Acid attack lead to physical and psychological wounds in survivors. This is a multi-dimensional phenomenon involving illness, disability, and victimization, and requires a wide range of strategies at different levels. The conceptual model derived through this study can serve as a good basis for intervention programs. Copyright © 2016 Elsevier Ltd and ISBI. All rights reserved.
Optimal attacks on qubit-based Quantum Key Recycling
NASA Astrophysics Data System (ADS)
Leermakers, Daan; Škorić, Boris
2018-03-01
Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.
NASA Astrophysics Data System (ADS)
Gloster, Jonathan; Diep, Michael; Dredden, David; Mix, Matthew; Olsen, Mark; Price, Brian; Steil, Betty
2014-06-01
Small-to-medium sized businesses lack resources to deploy and manage high-end advanced solutions to deter sophisticated threats from well-funded adversaries, but evidence shows that these types of businesses are becoming key targets. As malicious code and network attacks become more sophisticated, classic signature-based virus and malware detection methods are less effective. To augment the current malware methods of detection, we developed a proactive approach to detect emerging malware threats using open source tools and intelligence to discover patterns and behaviors of malicious attacks and adversaries. Technical and analytical skills are combined to track adversarial behavior, methods and techniques. We established a controlled (separated domain) network to identify, monitor, and track malware behavior to increase understanding of the methods and techniques used by cyber adversaries. We created a suite of tools that observe the network and system performance looking for anomalies that may be caused by malware. The toolset collects information from open-source tools and provides meaningful indicators that the system was under or has been attacked. When malware is discovered, we analyzed and reverse engineered it to determine how it could be detected and prevented. Results have shown that with minimum resources, cost effective capabilities can be developed to detect abnormal behavior that may indicate malicious software.
High prevalence of patent foramen ovale in migraine with aura.
Ferrarini, Giovanni; Malferrari, Giovanni; Zucco, Riccardo; Gaddi, Oscar; Norina, Marcello; Pini, Luigi Alberto
2005-04-01
In this study we evaluated the presence of patent foramen ovale (PFO) in a cohort of 25 consecutive patients suffering from migraine with aura (MA) during an attack presenting to the emergency ward of an Italian hospital. Patients underwent brain magnetic resonance imaging (MRI) with contrast medium, routine coagulation tests, contrast transcranial echocolour-coded sonography (c-TCCS) and transoesophageal echocardiography (TEE). Of the enrolled patients, 88.7% showed a PFO according to the c-TCCS test, whereas only in 72% TEE confirmed the presence of PFO. This discordance could be due to the fact that c-TCCS is more sensitive even with shunts with minimal capacity also located in the pulmonary vasculature. After surgical treatment of the PFO, MA disappeared within two months. Also, the treatment with warfarin as well as with acetylsalicylic acid and flunarizine was able to dramatically reduce the frequency of migraine attacks. These data indicate a higher prevalence of PFO in MA vs. normal population (OR=2.92) and could suggest that the presence of arteriovenous (AV) shunts could represent a trigger for MA attacks as well as for stroke, but more studies are needed to confirm this preliminary hypothesis.
Image Encryption Algorithm Based on Hyperchaotic Maps and Nucleotide Sequences Database
2017-01-01
Image encryption technology is one of the main means to ensure the safety of image information. Using the characteristics of chaos, such as randomness, regularity, ergodicity, and initial value sensitiveness, combined with the unique space conformation of DNA molecules and their unique information storage and processing ability, an efficient method for image encryption based on the chaos theory and a DNA sequence database is proposed. In this paper, digital image encryption employs a process of transforming the image pixel gray value by using chaotic sequence scrambling image pixel location and establishing superchaotic mapping, which maps quaternary sequences and DNA sequences, and by combining with the logic of the transformation between DNA sequences. The bases are replaced under the displaced rules by using DNA coding in a certain number of iterations that are based on the enhanced quaternary hyperchaotic sequence; the sequence is generated by Chen chaos. The cipher feedback mode and chaos iteration are employed in the encryption process to enhance the confusion and diffusion properties of the algorithm. Theoretical analysis and experimental results show that the proposed scheme not only demonstrates excellent encryption but also effectively resists chosen-plaintext attack, statistical attack, and differential attack. PMID:28392799
NASA Astrophysics Data System (ADS)
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.
2015-11-01
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A
2015-11-18
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
NASA Technical Reports Server (NTRS)
Chaussee, Denny S.
1993-01-01
The steady 3D viscous flow past the ONERA M6 wing and a slender delta wing-body with trailing edge control surfaces has been computed. A cell-centered finite-volume Navier-Stokes patched zonal method has been used for the numerical simulation. Both diagonalized and LUSGS schemes have been implemented. Besides the standard nonplanar zonal interfacing techniques, a new virtual zone capability has been employed. For code validation, the transonic flow past the ONERA M5 wing is calculated for angles-of-attack of 3.06 deg and 5.06 deg and compared with the available experiments. The wing-body computational results are compared with experimental data for both trailing-edge flaps deflected. The experimental flow conditions are M subinfinity = 0.4, a turbulent Reynolds number of 5.41 million based on a mean aerodynamic chord of 25.959 inches, adiabatic wall, and angles-of-attack varying from 0 deg to 23.85 deg. The computational results are presented for the 23.85 deg angle-of-attack case. The effects of the base flow due to a model sting, the varying second and fourth order numerical dissipation, and the turbulence model are all considered.
NASA Technical Reports Server (NTRS)
Wang, K. C.
1994-01-01
A numerical procedure for predicting the convective heating rate of hypersonic reentry vehicles is described. The procedure, which is based on the axisymmetric analog, consists of obtaining the three-dimensional inviscid flowfield solution; then the surface streamlines and metrics are calculated using the inviscid velocity components on the surface; finally, an axisymmetric boundary layer code or approximate convective heating equations are used to evaluate heating rates. This approach yields heating predictions to general three-dimensional body shapes. The procedure has been applied to the prediction of the wing leading edge heating to the Space Shuttle Orbiter. The numerical results are compared with the results of heat transfer testing (OH66) of an 0.025 scale model of the Space Shuttle Orbiter configuration in the Calspan Hypersonic Shock Tunnel (HST) at Mach 10 and angles of attack of 30 and 40 degrees. Comparisons with STS-5 flight data at Mach 9.15 and angle of attack of 37.4 degrees and STS-2 flight data at Mach 12.86 and angle of attack of 39.7 degrees are also given.
NASA Technical Reports Server (NTRS)
Chandrasekaran, B.
1986-01-01
This document is the user's guide for the method developed earlier for predicting the slipstream wing interaction at subsonic speeds. The analysis involves a subsonic panel code (HESS code) modified to handle the propeller onset flow. The propfan slipstream effects are superimposed on the normal flow boundary condition and are applied over the surface washed by the slipstream. The effects of the propeller slipstream are to increase the axial induced velocity, tangential velocity, and a total pressure rise in the wake of the propeller. Principles based on blade performance theory, momentum theory, and vortex theory were used to evaluate the slipstream effects. The code can be applied to any arbitrary three dimensional geometry, expressed in the form of HESS input format. The code can handle a propeller alone configuration or a propeller/nacelle/airframe configuration, operating up to high subcritical Mach numbers over a range of angles of attack. Inclusion of a viscous modelling is briefly outlined. Wind tunnel results/theory comparisons are included as examples for the application of the code to a generic supercritical wing/overwing Nacelle with a powered propfan. A sample input/output listing is provided.
NASA Technical Reports Server (NTRS)
Allison, Dennis O.; Waggoner, E. G.
1990-01-01
Computational predictions of the effects of wing contour modifications on maximum lift and transonic performance were made and verified against low speed and transonic wind tunnel data. This effort was part of a program to improve the maneuvering capability of the EA-6B electronics countermeasures aircraft, which evolved from the A-6 attack aircraft. The predictions were based on results from three computer codes which all include viscous effects: MCARF, a 2-D subsonic panel code; TAWFIVE, a transonic full potential code; and WBPPW, a transonic small disturbance potential flow code. The modifications were previously designed with the aid of these and other codes. The wing modifications consists of contour changes to the leading edge slats and trailing edge flaps and were designed for increased maximum lift with minimum effect on transonic performance. The prediction of the effects of the modifications are presented, with emphasis on verification through comparisons with wind tunnel data from the National Transonic Facility. Attention is focused on increments in low speed maximum lift and increments in transonic lift, pitching moment, and drag resulting from the contour modifications.
NASA Astrophysics Data System (ADS)
Medley, S. S.; Liu, D.; Gorelenkova, M. V.; Heidbrink, W. W.; Stagner, L.
2016-02-01
A 3D halo neutral code developed at the Princeton Plasma Physics Laboratory and implemented for analysis using the TRANSP code is applied to projected National Spherical Torus eXperiment-Upgrade (NSTX-U plasmas). The legacy TRANSP code did not handle halo neutrals properly since they were distributed over the plasma volume rather than remaining in the vicinity of the neutral beam footprint as is actually the case. The 3D halo neutral code uses a ‘beam-in-a-box’ model that encompasses both injected beam neutrals and resulting halo neutrals. Upon deposition by charge exchange, a subset of the full, one-half and one-third beam energy components produce first generation halo neutrals that are tracked through successive generations until an ionization event occurs or the descendant halos exit the box. The 3D halo neutral model and neutral particle analyzer (NPA) simulator in the TRANSP code have been benchmarked with the Fast-Ion D-Alpha simulation (FIDAsim) code, which provides Monte Carlo simulations of beam neutral injection, attenuation, halo generation, halo spatial diffusion, and photoemission processes. When using the same atomic physics database, TRANSP and FIDAsim simulations achieve excellent agreement on the spatial profile and magnitude of beam and halo neutral densities and the NPA energy spectrum. The simulations show that the halo neutral density can be comparable to the beam neutral density. These halo neutrals can double the NPA flux, but they have minor effects on the NPA energy spectrum shape. The TRANSP and FIDAsim simulations also suggest that the magnitudes of beam and halo neutral densities are relatively sensitive to the choice of the atomic physics databases.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Medley, S. S.; Liu, D.; Gorelenkova, M. V.
2016-01-12
A 3D halo neutral code developed at the Princeton Plasma Physics Laboratory and implemented for analysis using the TRANSP code is applied to projected National Spherical Torus eXperiment-Upgrade (NSTX-U plasmas). The legacy TRANSP code did not handle halo neutrals properly since they were distributed over the plasma volume rather than remaining in the vicinity of the neutral beam footprint as is actually the case. The 3D halo neutral code uses a 'beam-in-a-box' model that encompasses both injected beam neutrals and resulting halo neutrals. Upon deposition by charge exchange, a subset of the full, one-half and one-third beam energy components producemore » first generation halo neutrals that are tracked through successive generations until an ionization event occurs or the descendant halos exit the box. The 3D halo neutral model and neutral particle analyzer (NPA) simulator in the TRANSP code have been benchmarked with the Fast-Ion D-Alpha simulation (FIDAsim) code, which provides Monte Carlo simulations of beam neutral injection, attenuation, halo generation, halo spatial diffusion, and photoemission processes. When using the same atomic physics database, TRANSP and FIDAsim simulations achieve excellent agreement on the spatial profile and magnitude of beam and halo neutral densities and the NPA energy spectrum. The simulations show that the halo neutral density can be comparable to the beam neutral density. These halo neutrals can double the NPA flux, but they have minor effects on the NPA energy spectrum shape. The TRANSP and FIDAsim simulations also suggest that the magnitudes of beam and halo neutral densities are relatively sensitive to the choice of the atomic physics databases.« less
SAFETY ON UNTRUSTED NETWORK DEVICES (SOUND)
2017-10-10
in the Cyber & Communication Technologies Group , but not on the SOUND project, would review the code, design and perform attacks against a live...3.5 Red Team As part of our testing , we planned to conduct Red Team assessments. In these assessments, a group of engineers from BAE who worked...developed under the DARPA CRASH program and SOUND were designed to be companion projects. SAFE focused on the processor and the host, SOUND focused on
Effect of Air Power on Military Operations, Western Europe
1945-07-15
AVAILABILITY CODES DIST AVAIL AND/OR SPECIAL DATE ACCESSIONED UNANNOUNCED Original contains color plates. All DTIC reproduct- DISTRIBUTION STAMP i ons will be...positions of these less massive structures, direct hits were rare. Demorali- zation, neutralization and disruption were an immediate after- effectof the bom...attack and making feints at the DEVELOPED enemy to keep him down while our infantry closed in, marking the target by colored smoke and other details not
A Survey of Visualization Tools Assessed for Anomaly-Based Intrusion Detection Analysis
2014-04-01
objective? • What vulnerabilities exist in the target system? • What damage or other consequences are likely? • What exploit scripts or other attack...languages C, R, and Python; no response capabilities. JUNG https://blogs.reucon.com/asterisk- java /tag/visualization/ Create custom layouts and can...annotate graphs, links, nodes with any Java data type. Must be familiar with coding in Java to call the routines; no monitoring or response
Design and Analysis of a Subcritical Airfoil for High Altitude, Long Endurance Missions.
1982-12-01
Airfoil Design and Analysis Method ......... .... 61 Appendix D: Boundary Layer Analysis Method ............. ... 81 Appendix E: Detailed Results ofr...attack. Computer codes designed by Richard Eppler were used for this study. The airfoil was anlayzed by using a viscous effects analysis program...inverse program designed by Eppler (Ref 5) was used in this study to accomplish this part. The second step involved the analysis of the airfoil under
1980-01-15
Code B364078464 V99QAXNH30303 H2590D. IS KEY WORDS fCo.. e.1 Odn Od It -C.eWV WHO Idnlif b 61-k n 0ber) Strategic Targeting Copper Industry INDATAK 20...develop, debug and test an industrial simulation model (INDATAK) using the LOGATAK model as a point of departure. The copper processing industry is...significant processes in the copper industry, including the transportation network connecting the processing elements, have been formatted for use in
Secure Communication via Key Generation with Quantum Measurement Advantage in the Telecom Band
2013-10-30
II: Summary of Project In this basic research program we proposed to investigate the use of keyed communication in quantum noise as a key generation...implement quantum limited detection in our running-code OCDMA experiment to demonstrate (a) quantum measurement advantage creation between two users, (b...neither is adequate against known-plaintext attacks. This is a serious security problem facing the whole field of quantum cryptography in regard to both
CyberTerrorism: Cyber Prevention vs Cyber Recovery
2007-12-01
appropriate available security measures (i.e. appropriate level of spy ware, IDS, and antivirus protection software installed) are unaffected by worm attacks...a worm is a form of a virus designed to copy itself by utilizing e-mail or other software applications. The main goal of using this technique is...to permeate the network or portions of the Internet with malicious code that will affect the performance of certain software applications or will
Linking Chaotic Advection with Subsurface Biogeochemical Processes
NASA Astrophysics Data System (ADS)
Mays, D. C.; Freedman, V. L.; White, S. K.; Fang, Y.; Neupauer, R.
2017-12-01
This work investigates the extent to which groundwater flow kinematics drive subsurface biogeochemical processes. In terms of groundwater flow kinematics, we consider chaotic advection, whose essential ingredient is stretching and folding of plumes. Chaotic advection is appealing within the context of groundwater remediation because it has been shown to optimize plume spreading in the laminar flows characteristic of aquifers. In terms of subsurface biogeochemical processes, we consider an existing model for microbially-mediated reduction of relatively mobile uranium(VI) to relatively immobile uranium(IV) following injection of acetate into a floodplain aquifer beneath a former uranium mill in Rifle, Colorado. This model has been implemented in the reactive transport code eSTOMP, the massively parallel version of STOMP (Subsurface Transport Over Multiple Phases). This presentation will report preliminary numerical simulations in which the hydraulic boundary conditions in the eSTOMP model are manipulated to simulate chaotic advection resulting from engineered injection and extraction of water through a manifold of wells surrounding the plume of injected acetate. This approach provides an avenue to simulate the impact of chaotic advection within the existing framework of the eSTOMP code.
Assessment of WWMCCS Performance in a Post-Nuclear Attack Environment. Sanitized
1975-11-01
34cONTRACT No. 001-75-C-0217 * 1 THIS WORK SPONSOQRED BY THE DEFENSE NUCLEAR AGENC" UNDER RDT&E RMSS CODE X36075669 Q94OAXDDO01O1 H2590D. Pr p r d 1 rTHIS DOCUM...8217 < : " ! , . .I/• I V...... .... . . . . . . 1 "- 7 . . . • .tEPORT DOCJMENTATION PAGE "rAr, . Irt’. ±~ATSSIS9.C.7NF VMC EPPINEI 21 Jan 75-31 Oc- 75 IOST-I.CLLEA...U .. 4II4 .i %Iy•11 .4 @$ . .~ *.I . 1 . S $P.IL%-V ka"I 1 "- This work sponsored by the Defe.xse Nuclear Agency under %DT&E WISS Code X360075469 Q9
Computational Methods for Dynamic Stability and Control Derivatives
NASA Technical Reports Server (NTRS)
Green, Lawrence L.; Spence, Angela M.; Murphy, Patrick C.
2003-01-01
Force and moment measurements from an F-16XL during forced pitch oscillation tests result in dynamic stability derivatives, which are measured in combinations. Initial computational simulations of the motions and combined derivatives are attempted via a low-order, time-dependent panel method computational fluid dynamics code. The code dynamics are shown to be highly questionable for this application and the chosen configuration. However, three methods to computationally separate such combined dynamic stability derivatives are proposed. One of the separation techniques is demonstrated on the measured forced pitch oscillation data. Extensions of the separation techniques to yawing and rolling motions are discussed. In addition, the possibility of considering the angles of attack and sideslip state vector elements as distributed quantities, rather than point quantities, is introduced.
Computational Methods for Dynamic Stability and Control Derivatives
NASA Technical Reports Server (NTRS)
Green, Lawrence L.; Spence, Angela M.; Murphy, Patrick C.
2004-01-01
Force and moment measurements from an F-16XL during forced pitch oscillation tests result in dynamic stability derivatives, which are measured in combinations. Initial computational simulations of the motions and combined derivatives are attempted via a low-order, time-dependent panel method computational fluid dynamics code. The code dynamics are shown to be highly questionable for this application and the chosen configuration. However, three methods to computationally separate such combined dynamic stability derivatives are proposed. One of the separation techniques is demonstrated on the measured forced pitch oscillation data. Extensions of the separation techniques to yawing and rolling motions are discussed. In addition, the possibility of considering the angles of attack and sideslip state vector elements as distributed quantities, rather than point quantities, is introduced.
RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code
NASA Astrophysics Data System (ADS)
Gonggrijp, Rop; Hengeveld, Willem-Jan; Hotting, Eelco; Schmidt, Sebastian; Weidemann, Frederik
The Rijnland Internet Election System (RIES) is a system designed for voting in public elections over the internet. A rather cursory scan of the source code to RIES showed a significant lack of security-awareness among the programmers which - among other things - appears to have left RIES vulnerable to near-trivial attacks. If it had not been for independent studies finding problems, RIES would have been used in the 2008 Water Board elections, possibly handling a million votes or more. While RIES was more extensively studied to find cryptographic shortcomings, our work shows that more down-to-earth secure design practices can be at least as important, and the aspects need to be examined much sooner than right before an election.
Optical identity authentication technique based on compressive ghost imaging with QR code
NASA Astrophysics Data System (ADS)
Wenjie, Zhan; Leihong, Zhang; Xi, Zeng; Yi, Kang
2018-04-01
With the rapid development of computer technology, information security has attracted more and more attention. It is not only related to the information and property security of individuals and enterprises, but also to the security and social stability of a country. Identity authentication is the first line of defense in information security. In authentication systems, response time and security are the most important factors. An optical authentication technology based on compressive ghost imaging with QR codes is proposed in this paper. The scheme can be authenticated with a small number of samples. Therefore, the response time of the algorithm is short. At the same time, the algorithm can resist certain noise attacks, so it offers good security.
Long-distance continuous-variable quantum key distribution with a Gaussian modulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jouguet, Paul; SeQureNet, 23 avenue d'Italie, F-75013 Paris; Kunz-Jacques, Sebastien
2011-12-15
We designed high-efficiency error correcting codes allowing us to extract an errorless secret key in a continuous-variable quantum key distribution (CVQKD) protocol using a Gaussian modulation of coherent states and a homodyne detection. These codes are available for a wide range of signal-to-noise ratios on an additive white Gaussian noise channel with a binary modulation and can be combined with a multidimensional reconciliation method proven secure against arbitrary collective attacks. This improved reconciliation procedure considerably extends the secure range of a CVQKD with a Gaussian modulation, giving a secret key rate of about 10{sup -3} bit per pulse at amore » distance of 120 km for reasonable physical parameters.« less
Rodrigo, Sander F; van Ramshorst, Jan; Hoogslag, Georgette E; Boden, Helèn; Velders, Matthijs A; Cannegieter, Suzanne C; Roelofs, Helene; Al Younis, Imad; Dibbets-Schneider, Petra; Fibbe, Willem E; Zwaginga, Jaap Jan; Bax, Jeroen J; Schalij, Martin J; Beeres, Saskia L; Atsma, Douwe E
2013-10-01
In experimental studies, mesenchymal stem cell (MSC) transplantation in acute myocardial infarction (AMI) models has been associated with enhanced neovascularization and myogenesis. Clinical data however, are scarce. Therefore, the present study evaluates the safety and feasibility of intramyocardial MSC injection in nine patients, shortly after AMI during short-term and 5-year follow-up. Periprocedural safety analysis demonstrated one transient ischemic attack. No other adverse events related to MSC treatment were observed during 5-year follow-up. Clinical events were compared to a nonrandomized control group comprising 45 matched controls. A 5-year event-free survival after MSC-treatment was comparable to controls (89 vs. 91 %, P = 0.87). Echocardiographic imaging for evaluation of left ventricular function demonstrated improvements up to 5 years after MSC treatment. These findings were not significantly different when compared to controls. The present safety and feasibility study suggest that intramyocardial injection of MSC in patients shortly after AMI is feasible and safe up to 5-year follow-up.
NASA Technical Reports Server (NTRS)
Sandlin, Doral R.; Howard, Kipp E.
1991-01-01
A user friendly FORTRAN code that can be used for preliminary design of V/STOL aircraft is described. The program estimates lift increments, due to power induced effects, encountered by aircraft in V/STOL flight. These lift increments are calculated using empirical relations developed from wind tunnel tests and are due to suckdown, fountain, ground vortex, jet wake, and the reaction control system. The code can be used as a preliminary design tool along with NASA Ames' Aircraft Synthesis design code or as a stand-alone program for V/STOL aircraft designers. The Power Induced Effects (PIE) module was validated using experimental data and data computed from lift increment routines. Results are presented for many flat plate models along with the McDonnell Aircraft Company's MFVT (mixed flow vectored thrust) V/STOL preliminary design and a 15 percent scale model of the YAV-8B Harrier V/STOL aircraft. Trends and magnitudes of lift increments versus aircraft height above the ground were predicted well by the PIE module. The code also provided good predictions of the magnitudes of lift increments versus aircraft forward velocity. More experimental results are needed to determine how well the code predicts lift increments as they vary with jet deflection angle and angle of attack. The FORTRAN code is provided in the appendix.
NASA Technical Reports Server (NTRS)
Finley, Dennis B.; Karman, Steve L., Jr.
1996-01-01
The objective of the second phase of the Euler Technology Assessment program was to evaluate the ability of Euler computational fluid dynamics codes to predict compressible flow effects over a generic fighter wind tunnel model. This portion of the study was conducted by Lockheed Martin Tactical Aircraft Systems, using an in-house Cartesian-grid code called SPLITFLOW. The Cartesian grid technique offers several advantages, including ease of volume grid generation and reduced number of cells compared to other grid schemes. SPLITFLOW also includes grid adaption of the volume grid during the solution to resolve high-gradient regions. The SPLITFLOW code predictions of configuration forces and moments are shown to be adequate for preliminary design, including predictions of sideslip effects and the effects of geometry variations at low and high angles-of-attack. The transonic pressure prediction capabilities of SPLITFLOW are shown to be improved over subsonic comparisons. The time required to generate the results from initial surface data is on the order of several hours, including grid generation, which is compatible with the needs of the design environment.
A novel potential/viscous flow coupling technique for computing helicopter flow fields
NASA Technical Reports Server (NTRS)
Summa, J. Michael; Strash, Daniel J.; Yoo, Sungyul
1993-01-01
The primary objective of this work was to demonstrate the feasibility of a new potential/viscous flow coupling procedure for reducing computational effort while maintaining solution accuracy. This closed-loop, overlapped velocity-coupling concept has been developed in a new two-dimensional code, ZAP2D (Zonal Aerodynamics Program - 2D), a three-dimensional code for wing analysis, ZAP3D (Zonal Aerodynamics Program - 3D), and a three-dimensional code for isolated helicopter rotors in hover, ZAPR3D (Zonal Aerodynamics Program for Rotors - 3D). Comparisons with large domain ARC3D solutions and with experimental data for a NACA 0012 airfoil have shown that the required domain size can be reduced to a few tenths of a percent chord for the low Mach and low angle of attack cases and to less than 2-5 chords for the high Mach and high angle of attack cases while maintaining solution accuracies to within a few percent. This represents CPU time reductions by a factor of 2-4 compared with ARC2D. The current ZAP3D calculation for a rectangular plan-form wing of aspect ratio 5 with an outer domain radius of about 1.2 chords represents a speed-up in CPU time over the ARC3D large domain calculation by about a factor of 2.5 while maintaining solution accuracies to within a few percent. A ZAPR3D simulation for a two-bladed rotor in hover with a reduced grid domain of about two chord lengths was able to capture the wake effects and compared accurately with the experimental pressure data. Further development is required in order to substantiate the promise of computational improvements due to the ZAPR3D coupling concept.
Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wheeler, Timothy A.; Denman, Matthew R.; Williams, R. A.
Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities.more » iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.« less
Yu, Amy Y X; Quan, Hude; McRae, Andrew; Wagner, Gabrielle O; Hill, Michael D; Coutts, Shelagh B
2017-09-18
Validation of administrative data case definitions is key for accurate passive surveillance of disease. Transient ischemic attack (TIA) is a condition primarily managed in the emergency department. However, prior validation studies have focused on data after inpatient hospitalization. We aimed to determine the validity of the Canadian 10th International Classification of Diseases (ICD-10-CA) codes for TIA in the national ambulatory administrative database. We performed a diagnostic accuracy study of four ICD-10-CA case definition algorithms for TIA in the emergency department setting. The study population was obtained from two ongoing studies on the diagnosis of TIA and minor stroke versus stroke mimic using serum biomarkers and neuroimaging. Two reference standards were used 1) the emergency department clinical diagnosis determined by chart abstractors and 2) the 90-day final diagnosis, both obtained by stroke neurologists, to calculate the sensitivity, specificity, positive and negative predictive values (PPV and NPV) of the ICD-10-CA algorithms for TIA. Among 417 patients, emergency department adjudication showed 163 (39.1%) TIA, 155 (37.2%) ischemic strokes, and 99 (23.7%) stroke mimics. The most restrictive algorithm, defined as a TIA code in the main position had the lowest sensitivity (36.8%), but highest specificity (92.5%) and PPV (76.0%). The most inclusive algorithm, defined as a TIA code in any position with and without query prefix had the highest sensitivity (63.8%), but lowest specificity (81.5%) and PPV (68.9%). Sensitivity, specificity, PPV, and NPV were overall lower when using the 90-day diagnosis as reference standard. Emergency department administrative data reflect diagnosis of suspected TIA with high specificity, but underestimate the burden of disease. Future studies are necessary to understand the reasons for the low to moderate sensitivity.
Validation of Carotid Artery Revascularization Coding in Ontario Health Administrative Databases.
Hussain, Mohamad A; Mamdani, Muhammad; Saposnik, Gustavo; Tu, Jack V; Turkel-Parrella, David; Spears, Julian; Al-Omran, Mohammed
2016-04-02
The positive predictive value (PPV) of carotid endarterectomy (CEA) and carotid artery stenting (CAS) procedure and post-operative complication coding were assessed in Ontario health administrative databases. Between 1 April 2002 and 31 March 2014, a random sample of 428 patients were identified using Canadian Classification of Health Intervention (CCI) procedure codes and Ontario Health Insurance Plan (OHIP) billing codes from administrative data. A blinded chart review was conducted at two high-volume vascular centers to assess the level of agreement between the administrative records and the corresponding patients' hospital charts. PPV was calculated with 95% confidence intervals (CIs) to estimate the validity of CEA and CAS coding, utilizing hospital charts as the gold standard. Sensitivity of CEA and CAS coding were also assessed by linking two independent databases of 540 CEA-treated patients (Ontario Stroke Registry) and 140 CAS-treated patients (single-center CAS database) to administrative records. PPV for CEA ranged from 99% to 100% and sensitivity ranged from 81.5% to 89.6% using CCI and OHIP codes. A CCI code with a PPV of 87% (95% CI, 78.8-92.9) and sensitivity of 92.9% (95% CI, 87.4-96.1) in identifying CAS was also identified. PPV for post-admission complication diagnosis coding was 71.4% (95% CI, 53.7-85.4) for stroke/transient ischemic attack, and 82.4% (95% CI, 56.6-96.2) for myocardial infarction. Our analysis demonstrated that the codes used in administrative databases accurately identify CEA and CAS-treated patients. Researchers can confidently use administrative data to conduct population-based studies of CEA and CAS.
140 GHz EC waves propagation and absorption for normal/oblique injection on FTU tokamak
NASA Astrophysics Data System (ADS)
Nowak, S.; Airoldi, A.; Bruschi, A.; Buratti, P.; Cirant, S.; Gandini, F.; Granucci, G.; Lazzaro, E.; Panaccione, L.; Ramponi, G.; Simonetto, A.; Sozzi, C.; Tudisco, O.; Zerbini, M.
1999-09-01
Most of the interest in ECRH experiments is linked to the high localization of EC waves absorption in well known portions of the plasma volume. In order to take full advantage of this capability a reliable code has been developed for beam tracing and absorption calculations. The code is particularly important for oblique (poloidal and toroidal) injection, when the absorbing layer is not simply dependent on the position of the EC resonance only. An experimental estimate of the local heating power density is given by the jump in the time derivative of the local electron pressure at the switching ON of the gyrotron power. The evolution of the temperature profile increase (from ECE polychromator) during the nearly adiabatic phase is also considered for ECRH profile reconstruction. An indirect estimate of optical thickness and of the overall absorption coefficient is given by the measure of the residual e.m. power at the tokamak walls. Beam tracing code predictions of the power deposition profile are compared with experimental estimates. The impact of the finite spatial resolution of the temperature diagnostic on profile reconstruction is also discussed.
Large Eddy Simulations and Turbulence Modeling for Film Cooling
NASA Technical Reports Server (NTRS)
Acharya, Sumanta
1999-01-01
The objective of the research is to perform Direct Numerical Simulations (DNS) and Large Eddy Simulations (LES) for film cooling process, and to evaluate and improve advanced forms of the two equation turbulence models for turbine blade surface flow analysis. The DNS/LES were used to resolve the large eddies within the flow field near the coolant jet location. The work involved code development and applications of the codes developed to the film cooling problems. Five different codes were developed and utilized to perform this research. This report presented a summary of the development of the codes and their applications to analyze the turbulence properties at locations near coolant injection holes.
Dryden/Edwards 1994 Thrust-Vectoring Aircraft Fleet - F-18 HARV, X-31, F-16 MATV
NASA Technical Reports Server (NTRS)
1994-01-01
The three thrust-vectoring aircraft at Edwards, California, each capable of flying at extreme angles of attack, cruise over the California desert in formation during flight in March 1994. They are, from left, NASA's F-18 High Alpha Research Vehicle (HARV), flown by the NASA Dryden Flight Research Center; the X-31, flown by the X-31 International Test Organization (ITO) at Dryden; and the Air Force F-16 Multi-Axis Thrust Vectoring (MATV) aircraft. All three aircraft were flown in different programs and were developed independently. The NASA F-18 HARV was a testbed to produce aerodynamic data at high angles of attack to validate computer codes and wind tunnel research. The X-31 was used to study thrust vectoring to enhance close-in air combat maneuvering, while the F-16 MATV was a demonstration of how thrust vectoring could be applied to operational aircraft.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-21
...The U.S. Department of Commerce and U.S. Department of Homeland Security are requesting information on the requirements of, and possible approaches to creating, a voluntary industry code of conduct to address the detection, notification and mitigation of botnets.\\1\\ Over the past several years, botnets have increasingly put computer owners at risk. A botnet infection can lead to the monitoring of a consumer's personal information and communication, and exploitation of that consumer's computing power and Internet access. Networks of these compromised computers are often used to disseminate spam, to store and transfer illegal content, and to attack the servers of government and private entities with massive, distributed denial of service attacks. The Departments seek public comment from all Internet stakeholders, including the commercial, academic, and civil society sectors, on potential models for detection, notification, prevention, and mitigation of botnets' illicit use of computer equipment. ---------------------------------------------------------------------------
An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity
NASA Astrophysics Data System (ADS)
Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.
2017-08-01
For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.
Supersonic, nonlinear, attached-flow wing design for high lift with experimental validation
NASA Technical Reports Server (NTRS)
Pittman, J. L.; Miller, D. S.; Mason, W. H.
1984-01-01
Results of the experimental validation are presented for the three dimensional cambered wing which was designed to achieve attached supercritical cross flow for lifting conditions typical of supersonic maneuver. The design point was a lift coefficient of 0.4 at Mach 1.62 and 12 deg angle of attack. Results from the nonlinear full potential method are presented to show the validity of the design process along with results from linear theory codes. Longitudinal force and moment data and static pressure data were obtained in the Langley Unitary Plan Wind Tunnel at Mach numbers of 1.58, 1.62, 1.66, 1.70, and 2.00 over an angle of attack range of 0 to 14 deg at a Reynolds number of 2.0 x 10 to the 6th power per foot. Oil flow photographs of the upper surface were obtained at M = 1.62 for alpha approx. = 8, 10, 12, and 14 deg.
NASA Technical Reports Server (NTRS)
Miller, C. G.; Micol, J. R.; Gnoffo, P. A.; Wilder, S. E.
1983-01-01
Laminar heat transfer rates were measured on spherically blunted, 13 deg/7 deg on axis and bent biconics (fore cone bent 7 deg upward relative to aft cone) at hypersonic hypervelocity flow conditions in the Langley Expansion Tube. Freestream velocities from 4.5 to 6.9 km/sec and Mach numbers from 6 to 9 were generated using helium, nitrogen, air, and carbon dioxide test gases, resulting in normal shock density ratios from 4 to 19. Angle of attack, referenced to the axis of the aft cone, was varied from 0 to 20 deg in 4 deg increments. The effect of nose bend, angle of attack, and real gas phenomena on heating distributions are presented along with comparisons of measurement to prediction from a code which solves the three dimensional parabolized Navier-Stokes equations.
Video watermarking for mobile phone applications
NASA Astrophysics Data System (ADS)
Mitrea, M.; Duta, S.; Petrescu, M.; Preteux, F.
2005-08-01
Nowadays, alongside with the traditional voice signal, music, video, and 3D characters tend to become common data to be run, stored and/or processed on mobile phones. Hence, to protect their related intellectual property rights also becomes a crucial issue. The video sequences involved in such applications are generally coded at very low bit rates. The present paper starts by presenting an accurate statistical investigation on such a video as well as on a very dangerous attack (the StirMark attack). The obtained results are turned into practice when adapting a spread spectrum watermarking method to such applications. The informed watermarking approach was also considered: an outstanding method belonging to this paradigm has been adapted and re evaluated under the low rate video constraint. The experimental results were conducted in collaboration with the SFR mobile services provider in France. They also allow a comparison between the spread spectrum and informed embedding techniques.
NASA Astrophysics Data System (ADS)
Timoshevskiy, M. V.; Zapryagaev, I. I.; Pervunin, K. S.; Markovich, D. M.
2016-10-01
In the paper, the possibility of active control of a cavitating flow over a 2D hydrofoil that replicates a scaled-down model of high-pressure hydroturbine guide vane (GV) was tested. The flow manipulation was implemented by a continuous tangential liquid injection at different flow rates through a spanwise slot in the foil surface. In experiments, the hydrofoil was placed in the test channel at the attack angle of 9°. Different cavitation conditions were reached by varying the cavitation number and injection velocity. In order to study time dynamics and spatial patterns of partial cavities, high-speed imaging was employed. A PIV method was used to measure the mean and fluctuating velocity fields over the hydrofoil. Hydroacoustic measurements were carried out by means of a pressure transducer to identify spectral characteristics of the cavitating flow. It was found that the present control technique is able to modify the partial cavity pattern (or even totally suppress cavitation) in case of stable sheet cavitation and change the amplitude of pressure pulsations at unsteady regimes. The injection technique makes it also possible to significantly influence the spatial distributions of the mean velocity and its turbulent fluctuations over the GV section for non-cavitating flow and sheet cavitation.
NASA Technical Reports Server (NTRS)
Koga, J. K.; Lin, C. S.; Winglee, R. M.
1989-01-01
Injections of nonrelativistic electron beams from an isolated equipotential conductor into a uniform background of plasma and neutral gas were simulated using a 2-D electrostatic particle code. The ionization effects on spacecraft charging are examined by including interactions of electrons with neutral gas. The simulations show that the conductor charging potential decreases with increasing neutral background density due to the production of secondary electrons near the conductor surface. In the spacecraft wake, the background electrons accelerated towards the charged spacecraft produce an enhancement of secondary electrons and ions. Simulations run for longer times indicate that the spacecraft potential is further reduced and short wavelength beam-plasma oscillations appear. The results are applied to explain the spacecraft charging potential measured during the SEPAC experiments from Spacelab 1.
Magnetron injection gun for a broadband gyrotron backward-wave oscillator
NASA Astrophysics Data System (ADS)
Yuan, C. P.; Chang, T. H.; Chen, N. C.; Yeh, Y. S.
2009-07-01
The magnetron injection gun is capable of generating relativistic electron beam with high velocity ratio and low velocity spread for a gyrotron backward-wave oscillator (gyro-BWO). However, the velocity ratio (α) varies drastically against both the magnetic field and the beam voltage, which significantly limits the tuning bandwidth of a gyro-BWO. This study remedies this drawback by adding a variable trim field to adjust the magnetic compression ratio when changing the operating conditions. Theoretical results obtained by employing a two-dimensional electron gun code (EGUN) demonstrate a constant velocity ratio of 1.5 with a low axial velocity spread of 6% from 3.4-4.8 Tesla. These results are compared with a three-dimensional particle-tracing code (computer simulation technology, CST). The underlying physics for constant α will be discussed in depth.
Modelling of 13CH4 injection and local carbon deposition at the outer divertor of ASDEX Upgrade
NASA Astrophysics Data System (ADS)
Aho-Mantila, L.; Airila, M. I.; Wischmeier, M.; Krieger, K.; Pugno, R.; Coster, D. P.; Chankin, A. V.; Neu, R.; Rohde, V.
2009-12-01
Numerical modelling of 13CH4 injection into the outer divertor plasma of the full tungsten, vertical target of ASDEX Upgrade is presented. The SOLPS5.0 code package is used to calculate a realistic scrape-off layer plasma background corresponding to L-mode discharges in the attached divertor plasma regime. The ERO code is then used for detailed modelling of the hydrocarbon break-up, re-deposition and re-erosion processes. The deposition patterns observed at two different poloidal locations are shown to strongly reflect the cross-field gradients in divertor plasma density and temperature, as well as the local plasma collisionality. Experimental results with forward and reversed BT, accompanied by numerical modelling, also point towards a significant poloidal hydrocarbon E×B drift in the divertor region.
Modeling the Fluid Withdraw and Injection Induced Earthquakes
NASA Astrophysics Data System (ADS)
Meng, C.
2016-12-01
We present an open source numerical code, Defmod, that allows one to model the induced seismicity in an efficient and standalone manner. The fluid withdraw and injection induced earthquake has been a great concern to the industries including oil/gas, wastewater disposal and CO2 sequestration. Being able to numerically model the induced seismicity is long desired. To do that, one has to consider at lease two processes, a steady process that describes the inducing and aseismic stages before and in between the seismic events, and an abrupt process that describes the dynamic fault rupture accompanied by seismic energy radiations during the events. The steady process can be adequately modeled by a quasi-static model, while the abrupt process has to be modeled by a dynamic model. In most of the published modeling works, only one of these processes is considered. The geomechanicists and reservoir engineers are focused more on the quasi-static modeling, whereas the geophysicists and seismologists are focused more on the dynamic modeling. The finite element code Defmod combines these two models into a hybrid model that uses the failure criterion and frictional laws to adaptively switch between the (quasi-)static and dynamic states. The code is capable of modeling episodic fault rupture driven by quasi-static loading, e.g. due to reservoir fluid withdraw and/or injection, and by dynamic loading, e.g. due to the foregoing earthquakes. We demonstrate a case study for the 2013 Azle earthquake.
Time-dependent modeling of dust injection in semi-detached ITER divertor plasma
NASA Astrophysics Data System (ADS)
Smirnov, Roman; Krasheninnikov, Sergei
2017-10-01
At present, it is generally understood that dust related issues will play important role in operation of the next step fusion devices, i.e. ITER, and in the development of future fusion reactors. Recent progress in research on dust in magnetic fusion devises has outlined several topics of particular concern: a) degradation of fusion plasma performance; b) impairment of in-vessel diagnostic instruments; and c) safety issues related to dust reactivity and tritium retention. In addition, observed dust events in fusion edge plasmas are highly irregular and require consideration of temporal evolution of both the dust and the fusion plasma. In order to address the dust-related fusion performance issues, we have coupled the dust transport code DUSTT and the edge plasma transport code UEDGE in time-dependent manner, allowing modeling of transient dust-induced phenomena in fusion edge plasmas. Using the coupled codes we simulate burst-like injection of tungsten dust into ITER divertor plasma in semi-detached regime, which is considered as preferable ITER divertor operational mode based on the plasma and heat load control restrictions. Analysis of transport of the dust and the dust-produced impurities, and of dynamics of the ITER divertor and edge plasma in response to the dust injection will be presented. This material is based upon work supported by the U.S. Department of Energy, Office of Science, Office of Fusion Energy Sciences, under Award Number DE-FG02-06ER54852.
Talmadge, J E; Talmadge, C B; Zbar, B; McEwen, R; Meeker, A K; Tribble, H
1987-06-01
The mechanism by which tumor allografts escape host immunologic attack was investigated. B16-BL6 cells (the bladder 6 subline of the B16 melanoma) (H-2b) were transfected with a gene (Dd) encoding an allogeneic class I major histocompatibility complex antigen. Clones that expressed Dd antigen were injected into the footpads of nonimmune syngeneic mice, syngeneic immune mice, and nude mice. Under conditions of immunologic selection a clone that contained multiple copies of the transfected gene formed variants that lacked the transfected gene. Primary tumors and pulmonary metastases of immunized mice and pulmonary metastases of nonimmunized mice had lost the Dd gene and, in most cases, all of the associated plasmid. In contrast, in immunodeficient nude mice, primary tumors and pulmonary metastases retained the Dd gene and the associated plasmid. Deletion of genes encoding cell surface antigens may be one of the mechanisms by which allogeneic tumors escape immunologic attack.
Laparoendoscopic transgastric histoacryl injection of gastric varices: a new surgical approach.
Kassem, Mohamed I; El-Haddad, Hani M; El-Bahrawi, Hassan A
2013-02-01
Gastric varices (GVs) are a common finding in Egyptian patients with portal hypertension due to cirrhosis or schistosomal hepatic fibrosis. These patients present with an acute attack or history of hematemesis. Endoscopic histoacryl injection is the standard treatment in Egypt; however, because of technical difficulties it is possible to inject only a little amount of this material, as it may endanger the channels of the flexible endoscope. We thought of a new surgical laparoendoscopic technique to obviate the need for repeated endoscopies and complete obliteration of GVs. This study was conducted on 20 patients with portal hypertension and GVs. After the patient was placed under general anesthesia, a small gastrostomy was done in the anterior gastric wall through which a 10-mm trocar was inserted for the laparoscopic camera. Injection of GVs was done via a spinal needle or a central venous line needle inserted directly. Injection of an adequate amount of histoacryl was done under direct vision. This study was conducted from July 2009 to August 2011 on 20 patients with GVs. The age range was from 22 to 56 years, with a mean age of 39.8±7.85 years. There were 14 men (70%) and 6 women (30%). Fourteen patients (70%) showed complete obliteration of GVs after one session of treatment, whereas 6 patients (30%) had unsatisfactory results and were subjected to another session. GVs were completely obliterated after the second session in 4 patients. Two cases of recurrence of GVs were operated on. This new technique enabled us to inject GVs with a suitable amount of glue material under direct vision without harming the endoscope. Use of this procedure is recommended in patients fit for surgery and those who had failed endoscopic injection sclerotherapy.
Design of 28 GHz, 200 kW Gyrotron for ECRH Applications
NASA Astrophysics Data System (ADS)
Yadav, Vivek; Singh, Udaybir; Kumar, Nitin; Kumar, Anil; Deorani, S. C.; Sinha, A. K.
2013-01-01
This paper presents the design of 28 GHz, 200 kW gyrotron for Indian TOKAMAK system. The paper reports the designs of interaction cavity, magnetron injection gun and RF window. EGUN code is used for the optimization of electron gun parameters. TE03 mode is selected as the operating mode by using the in-house developed code GCOMS. The simulation and optimization of the cavity parameters are carried out by using the Particle-in-cell, three dimensional (3-D)-electromagnetic simulation code MAGIC. The output power more than 250 kW is achieved.
NASA Technical Reports Server (NTRS)
Burley, J. R., II; Carlson, J. R.; Henderson, W. P.
1986-01-01
Static pressure measurements were made on the afterbody, nozzle and tails of a generic single-engine axisymmetric fighter configuration. Data were recorded at Mach numbers of 0.6, 0.9, and 1.2. NPR was varied from 1.0 to 8.0 and angle of attack was varied from -3 deg. to 9 deg. Experimental data were compared with numerical results from two state-of-the-art computer codes.
Improved Aeroprediction Code. Part 1. Summary of New Methods and Comparison with Experiment
1993-05-01
and the results stored in tabular form as functions of Mach number, altitude, and angle of attack. This information can then be accessed by an...WIGBD9AI3OFGRAINUE 10 VALIDATIO ..... PRO .. SS7 . ..CON .......U... 5 ....... ... ........ .. . .. .. ...4-6 0 .......... NSWCDD/TR-93/9 I 256 AP 01 APIS3 1...Unit Block 13. Abstract. Include a brief (Maximum 200 Element Accession No. words) factual summary of the most significant information contained in
An Analysis of Optimal Airfield Attack Parameters
1985-03-01
8217 ." .• . ,n’,,"•.,’." ". ".’ 4,4"- 4 **,- ", -"-"*",", .% - , "**q ~ ",, "." .. V sy random, but served to validate the code. The results were identical...34’kdutput I ,. wi’ltllW ( ’Rudm NOW Test Pratea’ ) Writll t Writela I witall( lIt, ’l7MO RAM Ruda Nabe ’ Test Prgra’ ) I wittll( 1st ) Wtittla( It
2013-09-01
2012.0002- IR -EP7-A 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release; distribution is unlimited 12b. DISTRIBUTION CODE A...extremist web forums is directed at Western audiences and supports Homeland attacks. (U.S. Department of Homeland Security Office of Intelligence and...23 In this context, “before the event.” 24 Yung and Benichou’s paper originally was presented at the 5th Fire
A specialist team of A&E doctors and nurses establish emergency care units in Kosovo.
Hodgetts, Lieutenant Colonel Tim; Kenward, Gary
2000-02-01
On June 12, 1999 NATO troops led by British paratroopers of 5 Airborne Brigade entered Kosovo and secured key military sites. This multinational operation (code named 'OP AGRICOLA') was in response to the ethnic cleansing of Kosovo-Albanians, and followed a sustained period of aerial attack in Kosovo and Serbia. The ground operation required substantial medical support, and the British hospital element was provided by 22 Field Hospital RAMC.
Forces and moments on a slender, cavitating body
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hailey, C.E.; Clark, E.L.; Buffington, R.J.
1988-01-01
Recently a numerical code has been developed at Sandia National Laboratories to predict the pitching moment, normal force, and axial force of a slender, supercavitating shape. The potential flow about the body and cavity is calculated using an axial distribution of source/sink elements. The cavity surface is assumed to be a constant pressure streamline, extending beyond the base of the model. Slender body approximation is used to model the crossflow for small angles of attack. A significant extension of previous work in cavitation flow is the inclusion of laminar and turbulent boundary layer solutions on the body. Predictions with thismore » code, for axial force at zero angle of attack, show good agreement with experiments. There are virtually no published data availble with which to benchmark the pitching moment and normal force predictions. An experiment was designed to measure forces and moments on a supercavitation shape. The primary reason for the test was to obtain much needed data to benchmark the hydrodynamic force and moment predictions. Since the numerical prediction is for super cavitating shapes at very small cavitation numbers, the experiment was designed to be a ventilated cavity test. This paper describes the experimental procedure used to measure the pitching moment, axial and normal forces, and base pressure on a slender body with a ventilated cavity. Limited results are presented for pitching moment and normal force. 5 refs., 7 figs.« less
Self-recovery reversible image watermarking algorithm
Sun, He; Gao, Shangbing; Jin, Shenghua
2018-01-01
The integrity of image content is essential, although most watermarking algorithms can achieve image authentication but not automatically repair damaged areas or restore the original image. In this paper, a self-recovery reversible image watermarking algorithm is proposed to recover the tampered areas effectively. First of all, the original image is divided into homogeneous blocks and non-homogeneous blocks through multi-scale decomposition, and the feature information of each block is calculated as the recovery watermark. Then, the original image is divided into 4×4 non-overlapping blocks classified into smooth blocks and texture blocks according to image textures. Finally, the recovery watermark generated by homogeneous blocks and error-correcting codes is embedded into the corresponding smooth block by mapping; watermark information generated by non-homogeneous blocks and error-correcting codes is embedded into the corresponding non-embedded smooth block and the texture block via mapping. The correlation attack is detected by invariant moments when the watermarked image is attacked. To determine whether a sub-block has been tampered with, its feature is calculated and the recovery watermark is extracted from the corresponding block. If the image has been tampered with, it can be recovered. The experimental results show that the proposed algorithm can effectively recover the tampered areas with high accuracy and high quality. The algorithm is characterized by sound visual quality and excellent image restoration. PMID:29920528
NASA Astrophysics Data System (ADS)
Franchetti, Franz; Sandryhaila, Aliaksei; Johnson, Jeremy R.
2014-06-01
In this paper we introduce High Assurance SPIRAL to solve the last mile problem for the synthesis of high assurance implementations of controllers for vehicular systems that are executed in today's and future embedded and high performance embedded system processors. High Assurance SPIRAL is a scalable methodology to translate a high level specification of a high assurance controller into a highly resource-efficient, platform-adapted, verified control software implementation for a given platform in a language like C or C++. High Assurance SPIRAL proves that the implementation is equivalent to the specification written in the control engineer's domain language. Our approach scales to problems involving floating-point calculations and provides highly optimized synthesized code. It is possible to estimate the available headroom to enable assurance/performance trade-offs under real-time constraints, and enables the synthesis of multiple implementation variants to make attacks harder. At the core of High Assurance SPIRAL is the Hybrid Control Operator Language (HCOL) that leverages advanced mathematical constructs expressing the controller specification to provide high quality translation capabilities. Combined with a verified/certified compiler, High Assurance SPIRAL provides a comprehensive complete solution to the efficient synthesis of verifiable high assurance controllers. We demonstrate High Assurance SPIRALs capability by co-synthesizing proofs and implementations for attack detection and sensor spoofing algorithms and deploy the code as ROS nodes on the Landshark unmanned ground vehicle and on a Synthetic Car in a real-time simulator.
The content of cigarette counter-advertising: are perceived functions of smoking addressed?
Rhodes, Nancy; Roskos-Ewoldsen, David; Eno, Cassie A; Monahan, Jennifer L
2009-01-01
Media campaigns can be an effective tool in reducing adolescent smoking. To better understand the types of ads that have been used in campaigns in the United States, a content analysis was conducted of ads available at the U.S. Centers for Disease Control and Prevention (CDC) Media Campaign Resource Center (MCRC; Waves 1 through 7). A total of 487 ads were coded. Ads were coded for target audience, primary theme present in the ad, and sensation value-production techniques that have been demonstrated to attract attention and increase arousal. Primary themes extended earlier studies by focusing on the perceived functions of smoking (weight lose, stress management, controlling negative affect) as well as the traditional themes of industry attack, the health consequences of smoking, secondhand smoke, quitting, and the social image of smokers. A majority of ads were rated as having moderate sensation value, and ads targeted at teens and children were, on the average, higher in sensation value than those targeting general audiences. Changes across time suggest that campaigns are focusing more on adolescent smoking and relying more on attacking the tobacco industry. Research indicates that the functions of stress relief, mood regulation, and weight loss are strong reasons for initiating and continuing to smoke cigarettes; however, none of the 487 ads addressed these functional themes. Implications for developing campaigns that more closely relate to the functions of smoking are discussed.
Direct Introduction of Genes into Rats and Expression of the Genes
NASA Astrophysics Data System (ADS)
Benvenisty, Nissim; Reshef, Lea
1986-12-01
A method of introducing actively expressed genes into intact mammals is described. DNA precipitated with calcium phosphate has been injected intraperitoneally into newborn rats. The injected genes have been taken up and expressed by the animal tissues. To examine the generality of the method we have injected newborn rats with the chloramphenicol acetyltransferase prokaryotic gene fused with various viral and cellular gene promoters and the gene for hepatitis B surface antigen, and we observed appearance of chloramphenicol acetyltransferase activity and hepatitis B surface antigen in liver and spleen. In addition, administration of genes coding for hormones (insulin or growth hormone) resulted in their expression.
Threshold for electron self-injection in a nonlinear laser-plasma accelerator
NASA Astrophysics Data System (ADS)
Benedetti, Carlo; Schroeder, Carl; Esarey, Eric; Leemans, Wim
2012-10-01
The process of electron self-injection in the nonlinear bubble-wake generated by a short and intense laser pulse propagating in an uniform underdense plasma is investigated. A detailed analysis of particle orbit in the wakefield is performed by using reduced analytical models and numerical simulations carried out with the 2D cylindrical, envelope, ponderomotive, hybrid PIC/fluid code INF&RNO. In particular, we consider a wake generated by a frozen (non-evolving) laser driver traveling with a prescribed velocity, which then sets the properties of the wake, so the injection dynamics is decoupled from driver evolution but a realistic structure for the wakefield is retained. We investigate the dependence of the injection threshold on laser intensity, plasma temperature and wake velocity for a range of parameters of interest for current and future laser plasma accelerators. The phase-space properties of the injected particle bunch will also be discussed.
Effect of inert propellant injection on Mars ascent vehicle performance
NASA Technical Reports Server (NTRS)
Colvin, James E.; Landis, Geoffrey A.
1992-01-01
A Mars ascent vehicle is limited in performance by the propellant which can be brought from Earth. In some cases the vehicle performance can be improved by injecting inert gas into the engine, if the inert gas is available as an in-situ resource and does not have to be brought from Earth. Carbon dioxide, nitrogen, and argon are constituents of the Martian atmosphere which could be separated by compressing the atmosphere, without any chemical processing step. The effect of inert gas injection on rocket engine performance was analyzed with a numerical combustion code that calculated chemical equilibrium for engines of varying combustion chamber pressure, expansion ratio, oxidizer/fuel ratio, and inert injection fraction. Results of this analysis were applied to several candidate missions to determine how the required mass of return propellant needed in low Earth orbit could be decreased using inert propellant injection.
Laboratory Investigation of a Leaking Type 316 Socket Weld in a Boron Injection Tank Sampling Line
NASA Astrophysics Data System (ADS)
Xu, Hongqing; Fyfitch, Steve; Hosier, Ryan; Hyres, James
A leak was discovered in a Type 316 stainless steel socket weld in the sampling line for the boron injection tank. A section of the pipeline containing the leaking weld was removed for laboratory investigation that included visual and Stereovisual inspections, liquid penetrant (PT) testing, metallography, scanning electron microscopy (SEM), energy dispersive spectroscopy (EDS), and ferrite content determinations. The leak path was a through-wall transgranular crack in the socket weld. Cracking initiated along the weld-metal-to-base-metal interface at the tip of the crevice between the socket and pipe. The crevice was exposed to oxygenated boron solution at <180°F. Shallow intergranular attack (IGA) was found in the exposed base metal inside the crevice. Based on the investigation results, it was concluded that transgranular stress corrosion cracking (TGSCC) is the primary cracking mechanism.
Mechanism of demyelination after HSV type I intraocular injection in rabbits.
Narang, H K
1980-02-01
Intraocular injection of herpes simplex virus (HSV) type I into the vitreous body of 18-day-old rabbits induced, on the 7th day post-inoculation, neurological signs with marked head jerking and atazia. Examination of semi-serial 1-micrometers thick sections of the whole lengths of right and left optic nerves and chiasma of 4--64 days post-inoculated rabbits revealed a small lesion, restricted to the medial side, which had extended 2--3 mm, during the first 4 days, along the optic nerve. Ahead of the developing lesion marked chromatin changes of neuroglial cells were noticed followed by cuffing of blood vessels, infiltration by macrophages, demyelination and remyelination. The present study indicated that demyelination occurred following the infection of the myelinating cells. It appeared that virus did not become latent and many cells survived the viral attack. Repeated episodies of viral activity caused further damage while repair did not keep pace.
Gaseous film cooling investigation in a multi-element splash platelet injector
NASA Astrophysics Data System (ADS)
Yin, Liang; Liu, Weiqiang
2018-03-01
Film cooling is an effective technique that protects chamber walls in rocket combustion against chemical attacks and heat fluxes. This study discusses cooling effect in a multi-element GO2/CH4 splash platelet injector. Influence parameters, such as slot height, slot number, percentage of coolant, and injection position on cooling effect, were investigated. GCH4 with 298.15 K was applied as film coolant. In the first step, slot heights of 0.2 and 0.4 mm were compared by applying a constant film mass flow rate. Temperature, CH4 mole fraction distribution, and flow field structure were obtained. The effects of slot number, percentage of coolant, and injection position on wall temperature distribution were then determined. Finally, the reasons for the low cooling efficiency were analyzed. Improvement in the method is proposed to achieve improved cooling effect for splash platelet injectors.
Lore, Jeremy D.; Reinke, M. L.; Brunner, D.; ...
2015-04-28
We study experiments in Alcator C-Mod to assess the level of toroidal asymmetry in divertor conditions resulting from poloidally and toroidally localized extrinsic impurity gas seeding show a weak toroidal peaking (~1.1) in divertor electron temperatures for high-power enhanced D-alpha H-modeplasmas. This is in contrast to similar experiments in Ohmically heated L-modeplasmas, which showed a clear toroidal modulation in the divertor electron temperature. Modeling of these experiments using the 3D edge transport code EMC3-EIRENE [Y. Feng et al., J. Nucl. Mater. 241, 930 (1997)] qualitatively reproduces these trends, and indicates that the different response in the simulations is due tomore » the ionization location of the injected nitrogen. Low electron temperatures in the private flux region (PFR) in L-mode result in a PFR plasma that is nearly transparent to neutral nitrogen, while in H-mode the impurities are ionized in close proximity to the injection location, with this latter case yielding a largely axisymmetric radiation pattern in the scrape-off-layer. In conclusion, the consequences for the ITER gas injection system are discussed. Quantitative agreement with the experiment is lacking in some areas, suggesting potential areas for improving the physics model in EMC3-EIRENE.« less
Pope, Daniel J.
2011-01-01
In the aftermath of the London ‘7/7’ attacks in 2005, UK government agencies required the development of a quick-running tool to predict the weapon and injury effects caused by the initiation of a person borne improvised explosive device (PBIED) within crowded metropolitan environments. This prediction tool, termed the HIP (human injury predictor) code, was intended to: — assist the security services to encourage favourable crowd distributions and densities within scenarios of ‘sensitivity’;— provide guidance to security engineers concerning the most effective location for protection systems;— inform rescue services as to where, in the case of such an event, individuals with particular injuries will be located;— assist in training medical personnel concerning the scope and types of injuries that would be sustained as a consequence of a particular attack;— assist response planners in determining the types of medical specialists (burns, traumatic amputations, lungs, etc.) required and thus identify the appropriate hospitals to receive the various casualty types.This document describes the algorithms used in the development of this tool, together with the pertinent underpinning physical processes. From its rudimentary beginnings as a simple spreadsheet, the HIP code now has a graphical user interface (GUI) that allows three-dimensional visualization of results and intuitive scenario set-up. The code is underpinned by algorithms that predict the pressure and momentum outputs produced by PBIEDs within open and confined environments, as well as the trajectories of shrapnel deliberately placed within the device to increase injurious effects. Further logic has been implemented to transpose these weapon effects into forms of human injury depending on where individuals are located relative to the PBIED. Each crowd member is subdivided into representative body parts, each of which is assigned an abbreviated injury score after a particular calculation cycle. The injury levels of each affected body part are then summated and a triage state assigned for each individual crowd member based on the criteria specified within the ‘injury scoring system’. To attain a comprehensive picture of a particular event, it is important that a number of simulations, using what is substantively the same scenario, are undertaken with natural variation being applied to the crowd distributions and the PBIED output. Accurate mathematical representation of such complex phenomena is challenging, particularly as the code must be quick-running to be of use to the stakeholder community. In addition to discussing the background and motivation for the algorithm and GUI development, this document also discusses the steps taken to validate the tool and the plans for further functionality implementation. PMID:21149351
Pope, Daniel J
2011-01-27
In the aftermath of the London '7/7' attacks in 2005, UK government agencies required the development of a quick-running tool to predict the weapon and injury effects caused by the initiation of a person borne improvised explosive device (PBIED) within crowded metropolitan environments. This prediction tool, termed the HIP (human injury predictor) code, was intended to:--assist the security services to encourage favourable crowd distributions and densities within scenarios of 'sensitivity'; --provide guidance to security engineers concerning the most effective location for protection systems; --inform rescue services as to where, in the case of such an event, individuals with particular injuries will be located; --assist in training medical personnel concerning the scope and types of injuries that would be sustained as a consequence of a particular attack; --assist response planners in determining the types of medical specialists (burns, traumatic amputations, lungs, etc.) required and thus identify the appropriate hospitals to receive the various casualty types. This document describes the algorithms used in the development of this tool, together with the pertinent underpinning physical processes. From its rudimentary beginnings as a simple spreadsheet, the HIP code now has a graphical user interface (GUI) that allows three-dimensional visualization of results and intuitive scenario set-up. The code is underpinned by algorithms that predict the pressure and momentum outputs produced by PBIEDs within open and confined environments, as well as the trajectories of shrapnel deliberately placed within the device to increase injurious effects. Further logic has been implemented to transpose these weapon effects into forms of human injury depending on where individuals are located relative to the PBIED. Each crowd member is subdivided into representative body parts, each of which is assigned an abbreviated injury score after a particular calculation cycle. The injury levels of each affected body part are then summated and a triage state assigned for each individual crowd member based on the criteria specified within the 'injury scoring system'. To attain a comprehensive picture of a particular event, it is important that a number of simulations, using what is substantively the same scenario, are undertaken with natural variation being applied to the crowd distributions and the PBIED output. Accurate mathematical representation of such complex phenomena is challenging, particularly as the code must be quick-running to be of use to the stakeholder community. In addition to discussing the background and motivation for the algorithm and GUI development, this document also discusses the steps taken to validate the tool and the plans for further functionality implementation.
SIMULATIONS OF BOOSTER INJECTION EFFICIENCY FOR THE APS-UPGRADE
DOE Office of Scientific and Technical Information (OSTI.GOV)
Calvey, J.; Borland, M.; Harkay, K.
2017-06-25
The APS-Upgrade will require the injector chain to provide high single bunch charge for swap-out injection. One possible limiting factor to achieving this is an observed reduction of injection efficiency into the booster synchrotron at high charge. We have simulated booster injection using the particle tracking code elegant, including a model for the booster impedance and beam loading in the RF cavities. The simulations point to two possible causes for reduced efficiency: energy oscillations leading to losses at high dispersion locations, and a vertical beam size blowup caused by ions in the Particle Accumulator Ring. We also show that themore » efficiency is much higher in an alternate booster lattice with smaller vertical beta function and zero dispersion in the straight sections.« less
Validation of a Computational Fluid Dynamics (CFD) Code for Supersonic Axisymmetric Base Flow
NASA Technical Reports Server (NTRS)
Tucker, P. Kevin
1993-01-01
The ability to accurately and efficiently calculate the flow structure in the base region of bodies of revolution in supersonic flight is a significant step in CFD code validation for applications ranging from base heating for rockets to drag for protectives. The FDNS code is used to compute such a flow and the results are compared to benchmark quality experimental data. Flowfield calculations are presented for a cylindrical afterbody at M = 2.46 and angle of attack a = O. Grid independent solutions are compared to mean velocity profiles in the separated wake area and downstream of the reattachment point. Additionally, quantities such as turbulent kinetic energy and shear layer growth rates are compared to the data. Finally, the computed base pressures are compared to the measured values. An effort is made to elucidate the role of turbulence models in the flowfield predictions. The level of turbulent eddy viscosity, and its origin, are used to contrast the various turbulence models and compare the results to the experimental data.
NASA Technical Reports Server (NTRS)
Treiber, David A.; Muilenburg, Dennis A.
1995-01-01
The viability of applying a state-of-the-art Euler code to calculate the aerodynamic forces and moments through maximum lift coefficient for a generic sharp-edge configuration is assessed. The OVERFLOW code, a method employing overset (Chimera) grids, was used to conduct mesh refinement studies, a wind-tunnel wall sensitivity study, and a 22-run computational matrix of flow conditions, including sideslip runs and geometry variations. The subject configuration was a generic wing-body-tail geometry with chined forebody, swept wing leading-edge, and deflected part-span leading-edge flap. The analysis showed that the Euler method is adequate for capturing some of the non-linear aerodynamic effects resulting from leading-edge and forebody vortices produced at high angle-of-attack through C(sub Lmax). Computed forces and moments, as well as surface pressures, match well enough useful preliminary design information to be extracted. Vortex burst effects and vortex interactions with the configuration are also investigated.
Hanna, C P; Tyson, J F; McIntosh, S
1993-08-01
A method has been developed for the determination of inorganic arsenic [As(III) and As(V)] and its organic metabolites (monomethylarsenic and dimethylarsenic) in urine by flow-injection hydride generation atomic absorption spectrometry. The nontoxic seafood-derived arsenobetaine and arsenocholine species were first separated by a solid-phase extraction procedure. The remaining sample was digested with a mixture of nitric and sulfuric acids and potassium dichromate, followed by attack with hydrogen peroxide. The resulting As(V) was reduced to As(III) with potassium iodide in hydrochloric acid before injection into the flow-injection manifold. The percentage analytical recoveries (mean +/- 95% confidence interval) of various arsenic species added to a urine specimen at 250 micrograms/L were 108 +/- 2, 112 +/- 11, 104 +/- 7, and 95 +/- 5 for As(III), As(V), monomethylarsenic, and dimethylarsenic, respectively. For the determination of arsenic in Standard Reference Material 2670 (toxic metals in human urine), results agreed with the certified value (480 +/- 100 micrograms/L). Analyses of samples for the Centre de Toxicologie du Quebec, containing seafood-derived species, demonstrated the viability of the separation procedure. Detection limits were between 0.1 and 0.2 microgram/L in the solution injected into the manifold, and precision at 10 micrograms/L was between 2% and 3% (CV). These preliminary results show that the method might be applicable to determinations of arsenic in a range of clinical urine specimens.
The John N. Insall Award: Do Intraarticular Injections Increase the Risk of Infection After TKA?
Bedard, Nicholas A; Pugely, Andrew J; Elkins, Jacob M; Duchman, Kyle R; Westermann, Robert W; Liu, Steve S; Gao, Yubo; Callaghan, John J
2017-01-01
Infection after total knee arthroplasty (TKA) can result in disastrous consequences. Previous research regarding injections and risk of TKA infection have produced conflicting results and in general have been limited by small cohort size. The purpose of this study was to evaluate if intraarticular injection before TKA increases the risk of postoperative infection and to identify if time between injection and TKA affect the risk of TKA infection. The Humana data set was reviewed from 2007 to 2014 for all patients who received a knee injection before TKA. Current Procedural Terminology (CPT) codes and laterality modifiers were used to identify patients who underwent knee injection followed by ipsilateral TKA. Postoperative infection within 6 months of TKA was identified using International Classification of Diseases, 9 th Revision/CPT codes that represent two infectious endpoints: any postoperative surgical site infection (encompasses all severities of infection) and operative intervention for TKA infection (surrogate for deep TKA infection). The injection cohort was stratified into 12 subgroups by monthly intervals out to 12 months corresponding to the number of months that had elapsed between injection and TKA. Risk of postoperative infection was compared between the injection and no injection cohorts. In total, 29,603 TKAs (35%) had an injection in the ipsilateral knee before the TKA procedure and 54,081 TKA cases (65%) did not. The PearlDiver database does not currently support line-by-line output of patient data, and so we were unable to perform a multivariate analysis to determine whether other important factors may have varied between the study groups that might have had a differential influence on the risk of infection between those groups. However, the Charlson Comorbidity index was no different between the injection and no injection cohorts (2.9 for both) suggesting similar comorbidity profiles between the groups. The proportion of TKAs developing any postoperative infection was higher among TKAs that received an injection before TKA than in those that did not (4.4% versus 3.6%; odds ratio [OR], 1.23; 95% confidence interval [CI], 1.15-1.33; p < 0.001). Likewise, the proportion of TKAs developing infection resulting in return to the operating room after TKA was also higher among TKAs that received an injection before TKA than those that did not (1.49% versus 1.04%; OR, 1.4; 95% CI, 1.3-1.63; p < 0.001). Month-by-month analysis of time between injection and TKA revealed the odds of any postoperative infection remained higher for the injection cohort out to a duration of 6 months between injection and TKA (ORs ranged 1.23 to 1.46 when 1-6 months between injection and TKA; p < 0.05 for all) as did the odds of operative intervention for TKA infection when injection occurred within 7 months of TKA (OR ranged from 1.38 to 1.88 when 1-7 months between injection and TKA; p < 0.05 for all). When the duration between injection and TKA was longer than 6 or 7 months, the ORs were no longer elevated at these endpoints, respectively. Injection before TKA was associated with a higher risk of postoperative infection and appears to be time-dependent with closer proximity between injection and TKA having increased odds of infection. Further research is needed to better evaluate the risk injection before TKA poses for TKA infection; a more definitive relationship could be established with a multivariate analysis to control for other known risk factors for TKA infection. Level III, therapeutic study.
Numerical study of supersonic combustors by multi-block grids with mismatched interfaces
NASA Technical Reports Server (NTRS)
Moon, Young J.
1990-01-01
A three dimensional, finite rate chemistry, Navier-Stokes code was extended to a multi-block code with mismatched interface for practical calculations of supersonic combustors. To ensure global conservation, a conservative algorithm was used for the treatment of mismatched interfaces. The extended code was checked against one test case, i.e., a generic supersonic combustor with transverse fuel injection, examining solution accuracy, convergence, and local mass flux error. After testing, the code was used to simulate the chemically reacting flow fields in a scramjet combustor with parallel fuel injectors (unswept and swept ramps). Computational results were compared with experimental shadowgraph and pressure measurements. Fuel-air mixing characteristics of the unswept and swept ramps were compared and investigated.
Vectorized schemes for conical potential flow using the artificial density method
NASA Technical Reports Server (NTRS)
Bradley, P. F.; Dwoyer, D. L.; South, J. C., Jr.; Keen, J. M.
1984-01-01
A method is developed to determine solutions to the full-potential equation for steady supersonic conical flow using the artificial density method. Various update schemes used generally for transonic potential solutions are investigated. The schemes are compared for speed and robustness. All versions of the computer code have been vectorized and are currently running on the CYBER-203 computer. The update schemes are vectorized, where possible, either fully (explicit schemes) or partially (implicit schemes). Since each version of the code differs only by the update scheme and elements other than the update scheme are completely vectorizable, comparisons of computational effort and convergence rate among schemes are a measure of the specific scheme's performance. Results are presented for circular and elliptical cones at angle of attack for subcritical and supercritical crossflows.
NASA Technical Reports Server (NTRS)
Jordan, Keith J.
1998-01-01
This report documents results from the NASA-Langley sponsored Euler Technology Assessment Study conducted by Lockheed-Martin Tactical Aircraft Systems (LMTAS). The purpose of the study was to evaluate the ability of the SPLITFLOW code using viscous and inviscid flow models to predict aerodynamic stability and control of an advanced fighter model. The inviscid flow model was found to perform well at incidence angles below approximately 15 deg, but not as well at higher angles of attack. The results using a turbulent, viscous flow model matched the trends of the wind tunnel data, but did not show significant improvement over the Euler solutions. Overall, the predictions were found to be useful for stability and control design purposes.
Liang, Wen-Ye; Wang, Shuang; Li, Hong-Wei; Yin, Zhen-Qiang; Chen, Wei; Yao, Yao; Huang, Jing-Zheng; Guo, Guang-Can; Han, Zheng-Fu
2014-01-01
We have demonstrated a proof-of-principle experiment of reference-frame-independent phase coding quantum key distribution (RFI-QKD) over an 80-km optical fiber. After considering the finite-key bound, we still achieve a distance of 50 km. In this scenario, the phases of the basis states are related by a slowly time-varying transformation. Furthermore, we developed and realized a new decoy state method for RFI-QKD systems with weak coherent sources to counteract the photon-number-splitting attack. With the help of a reference-frame-independent protocol and a Michelson interferometer with Faraday rotator mirrors, our system is rendered immune to the slow phase changes of the interferometer and the polarization disturbances of the channel, making the procedure very robust. PMID:24402550
A Model to Investigate Losses and Exchange Ratios in Large-Scale Air-to-Air Engagements.
1983-03-01
4,cs3*5,cs4*6 real lowel * ~di7-ensiors nsgn (20), iwg (20) ,vbl (3) , vb2 (3) ,vb3(3) ,vrl (3) ,vr21(3), + vr3(3) ,xlos(3) ,threot(24).red(80),ired(80...qset(ntryl+jl) vb2 (,Jl )=qset(n~jryl+3+jl) vb3(.jl )= vb2 (,jl) 10012 continue vb3(3)=0 call unit(vb3,vb3) if cb(D) + write(8,’(5x,’Blue 1, Mission Code...ntryl+7),tnow, + (j2!,vbl (.j-) ,j2911,3) ,(j2, vb2 (.j2) ,,j2- 1 ,3) *A mission code of 120 signifies *a radar attacK by the aircraft. if (qset(ntry2n+9
Validation of US3D for Capsule Aerodynamics using 05-CA Wind Tunnel Test Data
NASA Technical Reports Server (NTRS)
Schwing, Alan
2012-01-01
Several comparisons of computational fluid dynamics to wind tunnel test data are shown for the purpose of code validation. The wind tunnel test, 05-CA, uses a 7.66% model of NASA's Multi-Purpose Crew Vehicle in the 11-foot test section of the Ames Unitary Plan Wind tunnel. A variety of freestream conditions over four Mach numbers and three angles of attack are considered. Test data comparisons include time-averaged integrated forces and moments, time-averaged static pressure ports on the surface, and Strouhal Number. The applicability of the US3D code to subsonic and transonic flow over a bluff body is assessed on a comprehensive data set. With close comparison, this work validates US3D for highly separated flows similar to those examined here.
NASA Technical Reports Server (NTRS)
Molnar, Melissa; Marek, C. John
2005-01-01
A simplified kinetic scheme for Jet-A, and methane fuels with water injection was developed to be used in numerical combustion codes, such as the National Combustor Code (NCC) or even simple FORTRAN codes. The two time step method is either an initial time averaged value (step one) or an instantaneous value (step two). The switch is based on the water concentration in moles/cc of 1x10(exp -20). The results presented here results in a correlation that gives the chemical kinetic time as two separate functions. This two time step method is used as opposed to a one step time averaged method previously developed to determine the chemical kinetic time with increased accuracy. The first time averaged step is used at the initial times for smaller water concentrations. This gives the average chemical kinetic time as a function of initial overall fuel air ratio, initial water to fuel mass ratio, temperature, and pressure. The second instantaneous step, to be used with higher water concentrations, gives the chemical kinetic time as a function of instantaneous fuel and water mole concentration, pressure and temperature (T4). The simple correlations would then be compared to the turbulent mixing times to determine the limiting rates of the reaction. The NASA Glenn GLSENS kinetics code calculates the reaction rates and rate constants for each species in a kinetic scheme for finite kinetic rates. These reaction rates are used to calculate the necessary chemical kinetic times. Chemical kinetic time equations for fuel, carbon monoxide and NOx are obtained for Jet-A fuel and methane with and without water injection to water mass loadings of 2/1 water to fuel. A similar correlation was also developed using data from NASA's Chemical Equilibrium Applications (CEA) code to determine the equilibrium concentrations of carbon monoxide and nitrogen oxide as functions of overall equivalence ratio, water to fuel mass ratio, pressure and temperature (T3). The temperature of the gas entering the turbine (T4) was also correlated as a function of the initial combustor temperature (T3), equivalence ratio, water to fuel mass ratio, and pressure.
Campos, Regis Albuquerque; Valle, Solange Oliveira Rodrigues; França, Alfeu Tavares; Cordeiro, Elisabete; Serpa, Faradiba Sarquis; Mello, Yara Ferreira; Malheiros, Teresinha; Toledo, Eliana; Mansour, Elie; Fusaro, Gustavo; Grumach, Anete Sevciovic
2014-01-01
Hereditary angioedema (HAE) with C1 inhibitor deficiency manifests as recurrent episodes of edema involving the skin, upper respiratory tract and gastrointestinal tract. It can be lethal due to asphyxia. The aim here was to evaluate the response to therapy for these attacks using icatibant, an inhibitor of the bradykinin receptor, which was recently introduced into Brazil. Prospective experimental single-cohort study on the efficacy and safety of icatibant for HAE patients. Patients with a confirmed HAE diagnosis were enrolled according to symptoms and regardless of the time since onset of the attack. Icatibant was administered in accordance with the protocol that has been approved in Brazil. Symptom severity was assessed continuously and adverse events were monitored. 24 attacks in 20 HAE patients were treated (female/male 19:1; 19-55 years; median 29 years of age). The symptoms were: subcutaneous edema (22/24); abdominal pain (15/24) and upper airway obstruction (10/24). The time taken until onset of relief was: 5-10 minutes (5/24; 20.8%); 10-20 (5/24; 20.8%); 20-30 (8/24; 33.4%); 30-60 (5/24; 20.8%); and 2 hours (1/24; 4.3%). The time taken for complete resolution of symptoms ranged from 4.3 to 33.4 hours. Adverse effects were only reported at injection sites. Mild to moderate erythema and/or feelings of burning were reported by 15/24 patients, itching by 3 and no adverse effects in 6. HAE type I patients who received icatibant responded promptly; most achieved improved symptom severity within 30 minutes. Local adverse events occurred in 75% of the patients.
Efficacy of parecoxib, sumatriptan, and rizatriptan in the treatment of acute migraine attacks.
Müller, Thomas; Lohse, Lutz
2011-01-01
Triptans and analgetic nonsteroidal inflammatory drugs reduce acute pain syndromes in migraine. A further treatment option for an acute headache attack in patients with migraine may be the application of cyclooxygenase-2-specific inhibitors, as they have anti-inflammatory and analgesic properties. The objective of this pilot study was to investigate the effects of an oral fast-dissolving tablet of 10 mg of rizatriptan, an intravenous infusion of 40 mg of parecoxib, and a subcutaneous pen injection of sumatriptan (6 mg/0.5 mL) on pain relief in 3 cohorts of patients with episodic migraine. They were treated owing to the acute onset of a pain attack as a case of emergency. They were randomized to treatment with sumatriptan, rizatriptan, or parecoxib. The participants completed a visual analog scale for pain intensity at baseline before the drug administration and then after intervals of 20, 30, 60, and 120 minutes. Rizatriptan, parecoxib, and sumatriptan reduced pain symptoms. Twenty and 30 minutes after drug intake, rizatriptan was more efficacious than parecoxib and sumatriptan, and parecoxib was more effective than sumatriptan. Only a significant difference between rizatriptan and sumatriptan was found after 60 and 120 minutes. This trial demonstrates the effectiveness of a parecoxib infusion in the treatment of acute migraine and that the circumvention of the first pass effect of the liver by rizatriptan may be beneficial for fast pain relief.
The usual treatment of trigeminal autonomic cephalalgias.
Pareja, Juan A; Álvarez, Mónica
2013-10-01
Trigeminal autonomic cephalalgias include cluster headache, paroxysmal hemicrania, and short-lasting unilateral neuralgiform headache attacks with conjunctival injection, tearing, and rhinorrhea (SUNCT). Conventional pharmacological therapy can be successful in the majority of trigeminal autonomic cephalalgias patients. Most cluster headache attacks respond to 100% oxygen inhalation, or 6 mg subcutaneous sumatriptan. Nasal spray of sumatriptan (20 mg) or zolmitriptan (5 mg) are recommended as second choice. The bouts can be brought under control by a short course of corticosteroids (oral prednisone: 60-100 mg/day, or intravenous methylprednisolone: 250-500 mg/day, for 5 days, followed by tapering off the dosage), or by long-term prophylaxis with verapamil (at least 240 mg/day). Alternative long-term preventive medications include lithium carbonate (800-1600 mg/day), methylergonovine (0.4-1.2 mg/day), and topiramate (100-200 mg/day). As a rule, paroxysmal hemicrania responds to preventive treatment with indomethacin (75-150 mg/day). A short course of intravenous lidocaine (1-4 mg/kg/hour) can reduce the flow of attacks during exacerbations of SUNCT. Lamotrigine (100-300 mg/day) is the preventive drug of choice for SUNCT. Gabapentin (800-2700 mg/day), topiramate (50-300 mg/day), and carbamazepine (200-1600 mg/day) may be of help. © 2013 American Headache Society.
Corrosion due to use of carbon dioxide for enhanced oil recovery. Final report. SumX No. 78-003
DOE Office of Scientific and Technical Information (OSTI.GOV)
DeBerry, D.W.; Clark, W.S.
1979-09-01
This study documents the specific effects of CO/sub 2/ on corrosion and identifies promising methods for controlling corrosion in fields using CO/sub 2/ injection. Information has been assembled on: CO/sub 2/ corrosion problems in general, surface and downhole corrosion problems specifically associated with CO/sub 2/ enhanced oil recovery, and methods to reduce corrosion problems in CO/sub 2/ environments. Corrosion mechanisms, kinetic behavior, and the effects of various parameters on corrosion by CO/sub 2/ are presented in this study. Engineering metals are not attacked by CO/sub 2/ under oil field environments unless liquid water is also present. Plain and low alloymore » steels are attacked by mixtures of CO/sub 2/ and liquid water. Attack on these bare metals may become serious at a CO/sub 2/ partial pressure as low as 4 psi and it increases with CO/sub 2/ partial pressure although not in direct proportion. Fluid flow rate is an important factor in CO/sub 2//water corrosion. Practically all stainless steels and similar resistant alloys are not particularly subject to corrosion by CO/sub 2//water mixtures alone, even at high CO/sub 2/ pressures. Elevated levels of CO/sub 2/ can aggravate the corrosive effects of other species such as hydrogen sulfide, oxygen, and chloride. Mixtures of CO/sub 2/, carbon monoxide (CO), and water can cause stress corrosion cracking of plain steels. Corrosion problems in CO/sub 2/ systems should be circumvented when possible by avoiding combination of the corrosive components. Although water cannot be excluded throughout the CO/sub 2/ injection-oil production-CO/sub 2/ and water reinjection chain, air in-leakage can be minimized and oxygen scavengers used to remove any residual. Exclusion of oxygen is important to the successful use of other corrosion control measures. A discussion is given of the main control methods including metal selection, protective coatings and nonmetallic materials, and chemical inhibition. (DLC)« less
Self-Scheduling Parallel Methods for Multiple Serial Codes with Application to WOPWOP
NASA Technical Reports Server (NTRS)
Long, Lyle N.; Brentner, Kenneth S.
2000-01-01
This paper presents a scheme for efficiently running a large number of serial jobs on parallel computers. Two examples are given of computer programs that run relatively quickly, but often they must be run numerous times to obtain all the results needed. It is very common in science and engineering to have codes that are not massive computing challenges in themselves, but due to the number of instances that must be run, they do become large-scale computing problems. The two examples given here represent common problems in aerospace engineering: aerodynamic panel methods and aeroacoustic integral methods. The first example simply solves many systems of linear equations. This is representative of an aerodynamic panel code where someone would like to solve for numerous angles of attack. The complete code for this first example is included in the appendix so that it can be readily used by others as a template. The second example is an aeroacoustics code (WOPWOP) that solves the Ffowcs Williams Hawkings equation to predict the far-field sound due to rotating blades. In this example, one quite often needs to compute the sound at numerous observer locations, hence parallelization is utilized to automate the noise computation for a large number of observers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gonzalez Gonzalez, R.; Petruzzi, A.; D'Auria, F.
2012-07-01
Atucha-2 is a Siemens-designed PHWR reactor under construction in the Republic of Argentina. Its geometrical complexity and (e.g., oblique Control Rods, Positive Void coefficient) required a developed and validated complex three dimensional (3D) neutron kinetics (NK) coupled thermal hydraulic (TH) model. Reactor shut-down is obtained by oblique CRs and, during accidental conditions, by an emergency shut-down system (JDJ) injecting a highly concentrated boron solution (boron clouds) in the moderator tank, the boron clouds reconstruction is obtained using a CFD (CFX) code calculation. A complete LBLOCA calculation implies the application of the RELAP5-3D{sup C} system code. Within the framework of themore » third Agreement 'NA-SA - Univ. of Pisa' a new RELAP5-3D control system for the boron injection system was developed and implemented in the validated coupled RELAP5-3D/NESTLE model of the Atucha 2 NPP. The aim of this activity is to find out the limiting case (maximum break area size) for the Peak Cladding Temperature for LOCAs under fixed boundary conditions. (authors)« less
Overview of HIT-SI3 experiment: Simulations, Diagnostics, and Summary of Current Results
NASA Astrophysics Data System (ADS)
Penna, James; Jarboe, Thomas; Nelson, Brian; Hossack, Aaron; Sutherland, Derek; Morgan, Kyle; Hansen, Chris; Benedett, Thomas; Everson, Chris; Victor, Brian
2016-10-01
The Helicity Injected Torus - Steady Inductive 3(HIT-SI3)experiment forms and maintains spheromaks via Steady Inductive Helicity Injection (SIHI). Three injector units allow for continuous injection of helicity into a copper flux conserver in order to sustain a spheromak. Firing of the injectors with a phase difference allows finite rotation of the plasma to provide a stabilizing effect. Simulations in the MHD code NIMROD and the fluid-model code PSI-TET provide validation and a basis for interpretation of the observed experimental data. Thompson Scattering (TS) and Far Infrared (FIR) Interferometer systems allow temperature and line-averaged density measurements to be taken. An Ion Doppler Spectroscopy (IDS) system allows measurement of the plasma rotation and velocity. HIT-SI3 data has been used for validation of IDCD predictions, in particular the projected impedance of helicity injectors according to the theory. The experimental impedances have been calculated here for the first time for different HIT-SI3 regimes. Such experimental evidence will contribute to the design of future experiments employing IDCD as a current-drive mechanism. Work supported by the D.O.E., Office of Science, Office of Fusion Science.
Navier-Stokes analysis of airfoils with leading edge ice accretions
NASA Technical Reports Server (NTRS)
Potapczuk, Mark G.
1993-01-01
A numerical analysis of the flowfield characteristics and the performance degradation of an airfoil with leading edge ice accretions was performed. The important fluid dynamic processes were identified and calculated. Among these were the leading edge separation bubble at low angles of attack, complete separation on the low pressure surface resulting in premature shell, drag rise due to the ice shape, and the effects of angle of attack on the separated flow field. Comparisons to experimental results were conducted to confirm these calculations. A computer code which solves the Navier-Stokes equations in two dimensions, ARC2D, was used to perform the calculations. A Modified Mixing Length turbulence model was developed to produce grids for several ice shape and airfoil combinations. Results indicate that the ability to predict overall performance characteristics, such as lift and drag, at low angles of attack is excellent. Transition location is important for accurately determining separation bubble shape. Details of the flowfield in and downstream of the separated regions requires some modifications. Calculations for the stalled airfoil indicate periodic shedding of vorticity that was generated aft of the ice accretion. Time averaged pressure values produce results which compare favorably with experimental information. A turbulence model which accounts for the history effects in the flow may be justified.
A focus group study of the impact of trauma exposure in the 9/11 terrorist attacks.
North, Carol S; Barney, Carissa J; Pollio, David E
2015-04-01
Much of the mental health research that has emerged from the September 11 (9/11) attacks has been focused on posttraumatic stress disorder and its symptoms. To better understand the broader experience of individuals following a disaster, focus groups were conducted with individuals from affected companies both at Ground Zero and elsewhere in New York City. Twenty-one focus groups with a total of 140 participants were conducted in the second post-9/11 year. Areas of identified concern were coded into the following themes: Disaster Experience, Emotional Responses, Workplace Issues, Coping, and Issues of Public Concern. Discussions of focus groups included material represented in all five themes in companies both at Ground Zero and elsewhere. The emphasis and the content within these themes varied between the Ground Zero and other companies. Content suggesting symptoms of PTSD represented only a minority of the material, especially in the company groups not at Ground Zero. This study's findings revealed an array of psychosocial concerns following the 9/11 attacks among employees of companies in New York City that extended far beyond PTSD. This study's results provide further evidence that trauma exposure is central to individuals' post-disaster experience and focus, and to individuals' adjustment and experience after disaster.
A Focus Group Study of the Impact of Trauma Exposure in the 9/11 Terrorist Attacks
North, Carol S.; Barney, Carissa J.; Pollio, David E.
2014-01-01
Purpose Much of the mental health research that has emerged from the September 11 (9/11) attacks has been focused on posttraumatic stress disorder and its symptoms. To better understand the broader experience of individuals following a disaster, focus groups were conducted with individuals from affected companies both at Ground Zero and elsewhere. Methods Twenty-one focus groups with a total of 140 participants were conducted in the second post-9/11 year. Areas of identified concern were coded into the following themes: Disaster Experience, Emotional Responses, Workplace Issues, Coping, and Issues of Public Concern. Results Discussions of focus groups included material represented in all five themes in companies both at Ground Zero and elsewhere. The emphasis and the content within these themes varied between the Ground Zero and other companies. Content suggesting symptoms of PTSD represented only a minority of the material, especially in the company groups not at Ground Zero. Conclusions This study’s findings revealed an array of psychosocial concerns following the 9/11 attacks among employees of companies in New York City that extended far beyond PTSD. This study’s results provide further evidence that trauma exposure is central to individuals’ post-disaster experience and focus, and to individuals’ adjustment and experience after disaster. PMID:25319111
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.
2015-01-01
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement. PMID:26577473
NASA Technical Reports Server (NTRS)
Garrett, L. B.
1971-01-01
An implicit finite difference scheme is developed for the fully coupled solution of the viscous radiating stagnation line equations, including strong blowing. Solutions are presented for both air injection and carbon phenolic ablation products injection into air at conditions near the peak radiative heating point in an earth entry trajectory from interplanetary return missions. A detailed radiative transport code that accounts for the important radiative exchange processes for gaseous mixtures in local thermodynamic and chemical equilibrium is utilized.
ERIC Educational Resources Information Center
San Mateo County Office of Education, Redwood City, CA. Career Preparation Centers.
This tenth of fifteen sets of Adult Competency Education (ACE) Competency Based Job Descriptions in the ACE kit contains job descriptions for Food Assembler, Injection Molder-Machine Operator, Data Entry Typist, Institutional Cook, and Clerk Typist. Each begins with a fact sheet that includes this information: occupational title, D.O.T. code, ACE…
CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 9, September 2007
2007-09-01
underlying application framework, e.g., Java Enter- prise Edition or .NET. This increases the risk that consumer Web services not based on the same...weaknesses and vulnera- bilities that are targeted by attackers and malicious code. For example, Apache Axis 2 enables a Java devel- oper to simply...load his/her Java objects into the Axis SOAP engine. At runtime, it is the SOAP engine that determines which incoming SOAP request messages should be
Comparison of ZigBee Replay Attacks Using a Universal Software Radio Peripheral and USB Radio
2014-03-27
authentication code (CBC-MAC) CPU central processing unit CUT component under test db decibel dbm decibel referenced to one milliwatt FFD full- fuction ...categorized into two different types: full- fuction devices (FFDs) and reduced-function devices (RFDs). The difference between an FFD and an RFD is that...KillerBee Hardware. Although KillerBee can be used with any hardware that can interact with 802.15.4 networks, the primary development hardware is the
System M: A Program Logic for Code Sandboxing and Identification
2014-07-22
M. Ryan. Attack, solution and verification for shared authorisation data in TCG TPM. In Proc. FAST’09, 2010. [8] A. Datta, A. Derek, J. C. Mitchell...11] S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. A formal analysis of authentication in the TPM. In Proc. FAST’10, 2011. [12] S. Delaune, S...A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451–519, July 2003. [16] S. Gürgens, C. Rudolph, D
NASA Technical Reports Server (NTRS)
Lan, C. E.; Chang, J. F.
1981-01-01
A user's guide to an improved version of Woodward's chord plane aerodynamic panel computer code is presumed. The guide can be applied to cambered wings exhibiting edge separated flow, including those with leading edge vortex flow at subsonic and supersonic speeds. New orientations for the rotated suction force are employed based on the momentum principal. The supersonic suction analogy method is improved by using an effective angle of attack defined through a semiempirical method.
2012-03-01
environments where a source is either weak or shielded. A vehicle of this type could survey large areas after a nuclear attack or a nuclear reactor accident...to prevent its detection by γ-rays. The best application for unmanned vehicles is the detection of radioactive material after a nuclear reactor ...accident or a nuclear weapon detonation [70]. Whether by a nuclear detonation or a nuclear reactor accident, highly radioactive substances could be dis
1980-12-01
NTIS GRA&I DTIC TAR Unannou.nced _ Just if i cat i o Distribution/ Availability Codes Avail and/or Dist Special ii -.- ,-4. ,S... -. UNCLASSIFIED...fighting ability. U Biological agents consist of living micro-organisms including bacteria, rickettsia and viruses . These agents are affected by their...six hours when worn with a protective hood. While virus particles are normally extremely minute, it is assumed in this study that they must be
A Technique for Removing an Important Class of Trojan Horses from High-Order Languages
1988-01-01
A Technique for Removing an Important Class of Trojan Horses from High Order Languages∗ John McDermott Center for Secure Information Technology...Ken Thompson described a sophisticated Trojan horse attack on a compiler, one that is undetectable by any search of the compiler source code. The...object of the compiler Trojan horse is to modify the semantics of the high order language in a way that breaks the security of a trusted system generated
Advances in modelling of condensation phenomena
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, W.S.; Zaltsgendler, E.; Hanna, B.
1997-07-01
The physical parameters in the modelling of condensation phenomena in the CANDU reactor system codes are discussed. The experimental programs used for thermal-hydraulic code validation in the Canadian nuclear industry are briefly described. The modelling of vapour generation and in particular condensation plays a key role in modelling of postulated reactor transients. The condensation models adopted in the current state-of-the-art two-fluid CANDU reactor thermal-hydraulic system codes (CATHENA and TUF) are described. As examples of the modelling challenges faced, the simulation of a cold water injection experiment by CATHENA and the simulation of a condensation induced water hammer experiment by TUFmore » are described.« less
NASA Technical Reports Server (NTRS)
Kniskern, Marc W.
1990-01-01
The thermal effects of simulant gas injection and aerodynamic heating at the model's surface on the measurements of a non-watercooled, flow through balance were investigated. A stainless steel model of a hypersonic air breathing propulsion cruise missile concept (HAPCM-50) was used to evaluate this balance. The tests were conducted in the 20-inch Mach 6 wind tunnel at NASA-Langley. The balance thermal effects were evaluated at freestream Reynolds numbers ranging from .5 to 7 x 10(exp 6) ft and angles of attack between -3.5 to 5 deg at Mach 6. The injection gases considered included cold air, hot air, and a mixture of 50 percent Argon and 50 percent Freon-12. The stagnation temperatures of the cold air, hot air, and Ar-Fr(12) reached 111, 214, and 283 F, respectively within the balance. A bakelite sleeve was inserted into the inner tube of the balance to minimize the thermal effects of these injection gases. Throughout the tests, the normal force, side force, yaw moment, roll moment, and pitching moment balance measurements were unaffected by the balance thermal effects of the injection gases and the wind tunnel flow. However, the axial force (AF) measurement was significantly affected by balance heating. The average zero shifts in the AF measurements were 1.9, 3.8, and 5.9 percent for cold air, hot air, and Ar-Fr(12) injection, respectively. The AF measurements decreased throughout these tests which lasted from 70 to 110 seconds. During the cold air injection tests, the AF measurements were accurate up to at least ten seconds after the model was injected into the wind tunnel test section. For the hot air and Ar-Fr(12) tests, the AF measurements were accurate up to at least five seconds after model injection.
NASA Technical Reports Server (NTRS)
Fletcher, D. G.; Mcdaniel, J. C.
1987-01-01
A preliminary quantitative study of the compressible flowfield in a steady, nonreacting model SCRAMJET combustor using laser-induced iodine fluorescence (LIIF) is reported. Measurements of density, temperature, and velocity were conducted with the calibrated, nonintrusive, optical technique for two different combustor operating conditions. First, measurements were made in the supersonic flow over a rearward-facing step without transverse injection for comparison with calculated pressure profiles. The second configuration was staged injection behind the rearward-facing step at an injection dynamic pressure ratio of 1.06. These experimental results will be used to validate computational fluid dynamic (CFD) codes being developed to model supersonic combustor flowfields.
Development and applications of 3D-DIVIMP(HC) Monte Carlo impurity modeling code
NASA Astrophysics Data System (ADS)
Mu, Yarong
A self-contained gas injection system for the Divertor Material Evaluation System (DiMES) on DIII-D, the Porous Plug Injector (PPI), has been employed by A. McLean for in-situ study of chemical erosion in the tokamak divertor environment by injection of CH4. The principal contribution of the present thesis is a new interpretive code, 3D-DIVIMP(HC), which has been developed and successfully applied to the interpretation of the CH, C I, and C II emissions measured during the PPI experiments. The two principal types of experimental data which are compared here with 3D-DIVIMP(HC) code modeling are (a) absolute emissivities measured with a high resolution spectrometer, and (b) 2D filtered camera (TV) pictures taken from a view essentially straight down on the PPI. Incorporating the Janev-Reiter database for the breakup reactions of methane molecules in a plasma, 3D-DIVIMP(HC) is able to replicate these measurements to within the combined experimental and database uncertainties. It is therefore concluded that the basic elements of the physics and chemistry controlling the breakup of methane entering an attached divertor plasma have been identified and are incorporated in 3D-DIVIMP(HC).
MUFITS Code for Modeling Geological Storage of Carbon Dioxide at Sub- and Supercritical Conditions
NASA Astrophysics Data System (ADS)
Afanasyev, A.
2012-12-01
Two-phase models are widely used for simulation of CO2 storage in saline aquifers. These models support gaseous phase mainly saturated with CO2 and liquid phase mainly saturated with H2O (e.g. TOUGH2 code). The models can be applied to analysis of CO2 storage only in relatively deeply-buried reservoirs where pressure exceeds CO2 critical pressure. At these supercritical reservoir conditions only one supercritical CO2-rich phase appears in aquifer due to CO2 injection. In shallow aquifers where reservoir pressure is less than the critical pressure CO2 can split in two different liquid-like and gas-like phases (e.g. Spycher et al., 2003). Thus a region of three-phase flow of water, liquid and gaseous CO2 can appear near the CO2 injection point. Today there is no widely used and generally accepted numerical model capable of the three-phase flows with two CO2-rich phases. In this work we propose a new hydrodynamic simulator MUFITS (Multiphase Filtration Transport Simulator) for multiphase compositional modeling of CO2-H2O mixture flows in porous media at conditions of interest for carbon sequestration. The simulator is effective both for supercritical flows in a wide range of pressure and temperature and for subcritical three-phase flows of water, liquid CO2 and gaseous CO2 in shallow reservoirs. The distinctive feature of the proposed code lies in the methodology for mixture properties determination. Transport equations and Darcy correlation are solved together with calculation of the entropy maximum that is reached in thermodynamic equilibrium and determines the mixture composition. To define and solve the problem only one function - mixture thermodynamic potential - is required. The potential is determined using a three-parametric generalization of Peng-Robinson equation of state fitted to experimental data (Todheide, Takenouchi, Altunin etc.). We apply MUFITS to simple 1D and 2D test problems of CO2 injection in shallow reservoirs subjected to phase changes between liquid and gaseous CO2. We consider CO2 injection into highly heterogeneous the 10th SPE reservoir. We provide analysis of physical phenomena that have control temperature distribution in the reservoir. The distribution is non-monotonic with regions of high and low temperature. The main phenomena responsible for considerable temperature decline around CO2 injection point is the liquid CO2 evaporation process. We also apply the code to real-scale 3D simulations of CO2 geological storage at supercritical conditions in Sleipner field and Johansen formation (Fig). The work is supported financially by the Russian Foundation for Basic Research (12-01-31117) and grant for leading scientific schools (NSh 1303.2012.1). CO2 phase saturation in Johansen formation after 50 years of injection and 1000 years of rest period
Studies of the effects of curvature on dilution jet mixing
NASA Technical Reports Server (NTRS)
Holdeman, James D.; Srinivasan, Ram; Reynolds, Robert S.; White, Craig D.
1992-01-01
An analytical program was conducted using both three-dimensional numerical and empirical models to investigate the effects of transition liner curvature on the mixing of jets injected into a confined crossflow. The numerical code is of the TEACH type with hybrid numerics; it uses the power-law and SIMPLER algorithms, an orthogonal curvilinear coordinate system, and an algebraic Reynolds stress turbulence model. From the results of the numerical calculations, an existing empirical model for the temperature field downstream of single and multiple rows of jets injected into a straight rectangular duct was extended to model the effects of curvature. Temperature distributions, calculated with both the numerical and empirical models, are presented to show the effects of radius of curvature and inner and outer wall injection for single and opposed rows of cool dilution jets injected into a hot mainstream flow.
Numerical simulation of transverse fuel injection
NASA Technical Reports Server (NTRS)
Mao, Marlon; Riggins, David W.; Mcclinton, Charles R.
1991-01-01
A review of recent work at NASA Langley Research Center to compare the predictions of transverse fuel injector flow fields and mixing performance with experimental results is presented. Various cold (non-reactive) mixing studies were selected for code calibration which include the effects of boundary layer thickness and injection angle for sonic hydrogen injection into supersonic air. Angled injection of helium is also included. This study was performed using both the three-dimensional elliptic and the parabolized Navier-Stokes (PNS) versions of SPARK. Axial solution planes were passed from PNS to elliptic and elliptic to PNS in order to efficiently generate solutions. The PNS version is used both upstream and far downstream of the injector where the flow can be considered parabolic in nature. The comparisons are used to identify experimental deficiencies and computational procedures to improve agreement.
Film cooling effectiveness on a large angle blunt cone flying at hypersonic speed
NASA Astrophysics Data System (ADS)
Sahoo, Niranjan; Kulkarni, Vinayak; Saravanan, S.; Jagadeesh, G.; Reddy, K. P. J.
2005-03-01
Effectiveness of film cooling technique to reduce convective heating rates for a large angle blunt cone flying at hypersonic Mach number and its effect on the aerodynamic characteristics is investigated experimentally by measuring surface heat-transfer rates and aerodynamic drag coefficient simultaneously. The test model is a 60° apex-angle blunt cone with an internally mounted accelerometer balance system for measuring aerodynamic drag and an array of surface mounted platinum thin film gauges for measuring heat-transfer rates. The coolant gas (air, carbon dioxide, and/or helium) is injected into the hypersonic flow at the nose of the test model. The experiments are performed at a flow free stream Mach number of 5.75 and 0° angle of attack for stagnation enthalpies of 1.16MJ/kg and 1.6MJ/kg with and without gas injection. About 30%-45% overall reduction in heat-transfer rates is observed with helium as coolant gas except at stagnation regions. With all other coolants, the reduction in surface heat-transfer rate is between 10%-25%. The aerodynamic drag coefficient is found to increase by 12% with helium injection whereas with other gases this increase is about 27%.
Changes in calcium and iron levels in the brains of rats during kainate induced epilepsy
NASA Astrophysics Data System (ADS)
Ren, Min-Qin; Ong, Wei-Yi; Makjanic, Jagoda; Watt, Frank
1999-10-01
Epilepsy is a recurrent disorder of cerebral function characterised by sudden brief attacks of altered consciousness, motor activity or sensory phenomena, and affects approximately 1% of the population. Kainic acid injection induces neuronal degeneration in rats, is associated with glial hypertrophy and proliferation in the CA3-CA4 fields of hippocampal complex, and is a model for temporal lobe epilepsy. In this study we have applied Nuclear Microscopy to the investigation of the elemental changes within the hippocampus and the cortex areas of the rat brain following kainate injection. Analyses of unstained freeze dried tissue sections taken at 1 day and 1, 2, 3 and 4 weeks following injection were carried out using the Nuclear Microscopy facility at the Research Centre for Nuclear Microscopy, National University of Singapore. Quantitative analysis and elemental mapping indicates that there are significant changes in the calcium levels and distributions in the hippocampus as early as 1 day following injection. Preliminary results indicate a rapid increase in cellular calcium. High levels of calcium can activate calcium dependent proteins and phospholipases. Activation of phospholipase A 2 can be harmful to surrounding neurons through free radical damage. In addition to observed increases in calcium, there was evidence of increases in iron levels. This is consistent with measurements in other degenerative brain disorders, and may signal a late surge in free radical production.
Inviscid/Boundary-Layer Aeroheating Approach for Integrated Vehicle Design
NASA Technical Reports Server (NTRS)
Lee, Esther; Wurster, Kathryn E.
2017-01-01
A typical entry vehicle design depends on the synthesis of many essential subsystems, including thermal protection system (TPS), structures, payload, avionics, and propulsion, among others. The ability to incorporate aerothermodynamic considerations and TPS design into the early design phase is crucial, as both are closely coupled to the vehicle's aerodynamics, shape and mass. In the preliminary design stage, reasonably accurate results with rapid turn-representative entry envelope was explored. Initial results suggest that for Mach numbers ranging from 9-20, a few inviscid solutions could reasonably sup- port surface heating predictions at Mach numbers variation of +/-2, altitudes variation of +/-10 to 20 kft, and angle-of-attack variation of +/- 5. Agreement with Navier-Stokes solutions was generally found to be within 10-15% for Mach number and altitude, and 20% for angle of attack. A smaller angle-of-attack increment than the 5 deg around times for parametric studies and quickly evolving configurations are necessary to steer design decisions. This investigation considers the use of an unstructured 3D inviscid code in conjunction with an integral boundary-layer method; the former providing the flow field solution and the latter the surface heating. Sensitivity studies for Mach number, angle of attack, and altitude, examine the feasibility of using this approach to populate a representative entry flight envelope based on a limited set of inviscid solutions. Each inviscid solution is used to generate surface heating over the nearby trajectory space. A subset of a considered in this study is recommended. Results of the angle-of-attack sensitivity studies show that smaller increments may be needed for better heating predictions. The approach is well suited for application to conceptual multidisciplinary design and analysis studies where transient aeroheating environments are critical for vehicle TPS and thermal design. Concurrent prediction of aeroheating environments, coupled with the use of unstructured methods, is considered enabling for TPS material selection and design in conceptual studies where vehicle mission, shape, and entry strategies evolve rapidly.