Sample records for green attack damage

  1. Estimating the probability of mountain pine beetle red-attack damage

    Treesearch

    Michael A Wulder; J. C. White; Barbara J Bentz; M. F. Alvarez; N. C. Coops

    2006-01-01

    Accurate spatial information on the location and extent of mountain pine beetle infestation is critical for the planning of mitigation and treatment activities. Areas of mixed forest and variable terrain present unique challenges for the detection and mapping of mountain pine beetle red-attack damage, as red-attack has a more heterogeneous distribution under these...

  2. European spruce bark beetle (Ips typographus, L.) green attack affects foliar reflectance and biochemical properties

    NASA Astrophysics Data System (ADS)

    Abdullah, Haidi; Darvishzadeh, Roshanak; Skidmore, Andrew K.; Groen, Thomas A.; Heurich, Marco

    2018-02-01

    The European spruce bark beetle Ips typographus, L. (hereafter bark beetle), causes major economic loss to the forest industry in Europe, especially in Norway Spruce (Picea abies). To minimise economic loss and preclude a mass outbreak, early detection of bark beetle infestation (so-called ;green attack; stage - a period at which trees are yet to show visual signs of infestation stress) is, therefore, a crucial step in the management of Norway spruce stands. It is expected that a bark beetle infestation at the green attack stage affects a tree's physiological and chemical status. However, the concurrent effect on key foliar biochemical such as foliar nitrogen and chlorophyll as well as spectral responses are not well documented in the literature. Therefore, in this study, the early detection of bark beetle green attacks is investigated by examining foliar biochemical and spectral properties (400-2000 nm). We also assessed whether bark beetle infestation affects the estimation accuracy of foliar biochemicals. An extensive field survey was conducted in the Bavarian Forest National Park (BFNP), Germany, in the early summer of 2015 to collect leaf samples from 120 healthy and green attacked trees. The spectra of the leaf samples were measured using an ASD FieldSpec3 equipped with an integrating sphere. Significant differences (p < 0.05) between healthy and infested needle samples were found in the mean reflectance spectra, with the most pronounced differences being observed in the NIR and SWIR regions between 730 and 1370 nm. Furthermore, significant differences (p < 0.05) were found in the biochemical compositions (chlorophyll and nitrogen concentration) of healthy versus green attacked samples. Our results further demonstrate that the estimation accuracy of foliar chlorophyll and nitrogen concentrations, utilising partial least square regression model, was lower for the infested compared to the healthy trees. We show that early stage of infestation reduces not only

  3. About Heart Attacks

    MedlinePlus

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  4. Plants as green phones

    PubMed Central

    Harvey, Jeffrey A; Bezemer, T Martijn; Stuefer, Josef F

    2008-01-01

    Plants can act as vertical communication channels or ‘green phones’ linking soil-dwelling insects and insects in the aboveground ecosystem. When root-feeding insects attack a plant, the direct defense system of the shoot is activated, leading to an accumulation of phytotoxins in the leaves. The protection of the plant shoot elicited by root damage can impair the survival, growth and development of aboveground insect herbivores, thereby creating plant-based functional links between soil-dwelling insects and insects that develop in the aboveground ecosystem. The interactions between spatially separated insects below- and aboveground are not restricted to root and foliar plant-feeding insects, but can be extended to higher trophic levels such as insect parasitoids. Here we discuss some implications of plants acting as communication channels or ‘green phones’ between root and foliar-feeding insects and their parasitoids, focusing on recent findings that plants attacked by root-feeding insects are significantly less attractive for the parasitoids of foliar-feeding insects. PMID:19513244

  5. An extended diffraction tomography method for quantifying structural damage using numerical Green's functions.

    PubMed

    Chan, Eugene; Rose, L R Francis; Wang, Chun H

    2015-05-01

    Existing damage imaging algorithms for detecting and quantifying structural defects, particularly those based on diffraction tomography, assume far-field conditions for the scattered field data. This paper presents a major extension of diffraction tomography that can overcome this limitation and utilises a near-field multi-static data matrix as the input data. This new algorithm, which employs numerical solutions of the dynamic Green's functions, makes it possible to quantitatively image laminar damage even in complex structures for which the dynamic Green's functions are not available analytically. To validate this new method, the numerical Green's functions and the multi-static data matrix for laminar damage in flat and stiffened isotropic plates are first determined using finite element models. Next, these results are time-gated to remove boundary reflections, followed by discrete Fourier transform to obtain the amplitude and phase information for both the baseline (damage-free) and the scattered wave fields. Using these computationally generated results and experimental verification, it is shown that the new imaging algorithm is capable of accurately determining the damage geometry, size and severity for a variety of damage sizes and shapes, including multi-site damage. Some aspects of minimal sensors requirement pertinent to image quality and practical implementation are also briefly discussed. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. Effect of green light spectra on the reduction of retinal damage and stress in goldfish, Carassius auratus

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Song, Jin Ah; Kim, Na Na; Choi, Young Jae

    We investigated the effect of light spectra on retinal damage and stress in goldfish using green (530 nm) and red (620 nm) light emitting diodes (LEDs) at three intensities each (0.5, 1.0, and 1.5 W/m{sup 2}). We measured the change in the levels of plasma cortisol and H{sub 2}O{sub 2} and expression and levels of caspase-3. The apoptotic response of green and red LED spectra was assessed using the terminal transferase dUTP nick end labeling (TUNEL) assay. Stress indicator (cortisol and H{sub 2}O{sub 2}) and apoptosis-related genes (caspase-3) decreased in green light, but increased in red light with higher light intensities over time.more » The TUNEL assay revealed that more apoptotic cells were detected in outer nuclear layers after exposure to red LED over time with the increase in light intensity, than the other spectra. These results indicate that green light efficiently reduces retinal damage and stress, whereas red light induces it. Therefore, red light-induced retina damage may induce apoptosis in goldfish retina. -- Highlights: •Green light efficiently reduces retinal damage and stress. •Green spectra reduce caspase production and apoptosis. •Red light-induced retina damage may induce apoptosis in goldfish retina. •The retina of goldfish recognizes green spectra as a stable environment.« less

  7. Assessment of damage in 'green' composites

    NASA Astrophysics Data System (ADS)

    Malinowski, Paweł H.; Ostachowicz, Wiesław M.; Touchard, Fabienne; Boustie, Michel; Chocinski-Arnault, Laurence; Pascual Gonzalez, Pedro; Berthe, Laurent; de Vasconcellos, Davi; Sorrentino, Luigi

    2017-04-01

    The behaviour of eco-composites, when subjected to laser or mechanical impact loadings, is not well known yet. A research was proposed looking at the behaviour of `green' and synthetic composites under impact loading. The study was focused on composites reinforced with short, medium and long fibres. Short fibre composites were made of spruce fibres and ABS. The fibres were used both as received and after a thermal treatment. Another set of samples was made of 60 mm-long flax fibres. Two types of thermoplastic polymers were used as matrices: polypropylene and polylactide. Also a woven eco-composite was investigated. It was made of plain woven hemp fabric impregnated with epoxy resin. A fully synthetic woven composite, used as reference laminate for comparison with `green' composites, was prepared by using a plain weave woven glass fabric impregnated with epoxy resin. Mechanical impacts were performed by means of a falling dart impact testing machine. The specimens were tested at different impact energy levels (from 1J to 5J) by keeping constant the mass of the impactor and varying the drop height. Laser impact tests were performed by means of a high power laser shock facility. All the samples were tested at six different laser shock intensities, keeping constant the shock diameter and the pulse duration. Six assessment techniques were employed in order to analyse and compare impact damages: eye observation, back face relief, terahertz spectroscopy, laser vibrometry, X-ray micro-tomography and microscopic observations. Different damage detection thresholds for each material and technique were obtained.

  8. Damage Characterization of Bio and Green Polyethylene-Birch Composites under Creep and Cyclic Testing with Multivariable Acoustic Emissions.

    PubMed

    Bravo, Alencar; Toubal, Lotfi; Koffi, Demagna; Erchiqui, Fouad

    2015-11-02

    Despite the knowledge gained in recent years regarding the use of acoustic emissions (AEs) in ecologically friendly, natural fiber-reinforced composites (including certain composites with bio-sourced matrices), there is still a knowledge gap in the understanding of the difference in damage behavior between green and biocomposites. Thus, this article investigates the behavior of two comparable green and biocomposites with tests that better reflect real-life applications, i.e. , load-unloading and creep testing, to determine the evolution of the damage process. Comparing the mechanical results with the AE, it can be concluded that the addition of a coupling agent (CA) markedly reduced the ratio of AE damage to mechanical damage. CA had an extremely beneficial effect on green composites because the Kaiser effect was dominant during cyclic testing. During the creep tests, the use of a CA also avoided the transition to new damaging phases in both composites. The long-term applications of PE green material must be chosen carefully because bio and green composites with similar properties exhibited different damage processes in tests such as cycling and creep that could not be previously understood using only monotonic testing.

  9. Damage Characterization of Bio and Green Polyethylene–Birch Composites under Creep and Cyclic Testing with Multivariable Acoustic Emissions

    PubMed Central

    Bravo, Alencar; Toubal, Lotfi; Koffi, Demagna; Erchiqui, Fouad

    2015-01-01

    Despite the knowledge gained in recent years regarding the use of acoustic emissions (AEs) in ecologically friendly, natural fiber-reinforced composites (including certain composites with bio-sourced matrices), there is still a knowledge gap in the understanding of the difference in damage behavior between green and biocomposites. Thus, this article investigates the behavior of two comparable green and biocomposites with tests that better reflect real-life applications, i.e., load-unloading and creep testing, to determine the evolution of the damage process. Comparing the mechanical results with the AE, it can be concluded that the addition of a coupling agent (CA) markedly reduced the ratio of AE damage to mechanical damage. CA had an extremely beneficial effect on green composites because the Kaiser effect was dominant during cyclic testing. During the creep tests, the use of a CA also avoided the transition to new damaging phases in both composites. The long-term applications of PE green material must be chosen carefully because bio and green composites with similar properties exhibited different damage processes in tests such as cycling and creep that could not be previously understood using only monotonic testing. PMID:28793640

  10. Protective activity of green tea against free radical- and glucose-mediated protein damage.

    PubMed

    Nakagawa, Takako; Yokozawa, Takako; Terasawa, Katsutoshi; Shu, Seiji; Juneja, Lekh Raj

    2002-04-10

    Protein oxidation and glycation are posttranslational modifications that are implicated in the pathological development of many age-related disease processes. This study investigated the effects of green tea extract, and a green tea tannin mixture and its components, on protein damage induced by 2,2'-azobis(2-amidinopropane) dihydrochloride (a free radical generator) and glucose in in vitro assay systems. We found that green tea extract can effectively protect against protein damage, and showed that its action is mainly due to tannin. In addition, it was shown that the chemical structures of tannin components are also involved in this activity, suggesting that the presence of the gallate group at the 3 position plays the most important role in the protective activity against protein oxidation and glycation, and that there is also a contribution by the hydroxyl group at the 5' position in the B ring and the sterical structure. These findings demonstrate the mechanisms of the usefulness of green tea in protein oxidation- and glycation-associated diseases.

  11. Monitoring the Attack Incidences and Damage Caused by the Almond Bark Beetle, Scolytus amygdali, in Almond Orchards

    PubMed Central

    Cuthbertson, Andrew G. S.; Braham, Mohamed

    2018-01-01

    The almond bark beetle, Scolytus amygdali Geurin-Meneville, is responsible for significant loss of fruit production in almond orchards throughout the world. Here, we studied the damage and the incidences of S. amygdali attack on two different scales: (1) at the level of a single tree; and (2) in an entire orchard. Our results revealed no differences in attack level among four orientations (east, west, south and north sides) for the whole tree. However, the bark that was facing west side in the direction of the prevailing wind was found to be the most suitable for females to initiate attack in Stratum S2. Attack distribution remains the same among different strata (strata is vertical divisions of the tree from the ground to the uppermost twigs with ~40 cm intervals). More than 50% of attack was observed in the trunk of the tree and upper strata. However, multiplication rate (number of emerged adults/maternal gallery) varies significantly between strata. In addition, we studied attack intensity (holes produced by beetle per tree) comparing it to tree morphology (flowers, leaves and circumferences) and gum deposit. Our results revealed a positive correlation between attack intensity and gum deposits, and a negative correlation between attack intensity and tree morphology. This revealed that gum on the tree was an indicator for attack intensity. A positive correlation between attack intensity and the circumference of the tree revealed that older trees were more susceptible to S. amygdali attack. These results, while preliminary, aim to help in the monitoring of S. amygdali populations before deciding to apply any control measures. PMID:29301271

  12. Formation and emission of linalool in tea (Camellia sinensis) leaves infested by tea green leafhopper (Empoasca (Matsumurasca) onukii Matsuda).

    PubMed

    Mei, Xin; Liu, Xiaoyu; Zhou, Ying; Wang, Xiaoqin; Zeng, Lanting; Fu, Xiumin; Li, Jianlong; Tang, Jinchi; Dong, Fang; Yang, Ziyin

    2017-12-15

    Famous oolong tea (Oriental Beauty), which is manufactured by tea leaves (Camellia sinensis) infected with tea green leafhoppers, contains characteristic volatile monoterpenes derived from linalool. This study aimed to determine the formation mechanism of linalool in tea exposed to tea green leafhopper attack. The tea green leafhopper responsible for inducing the production of characteristic volatiles was identified as Empoasca (Matsumurasca) onukii Matsuda. E. (M.) onukii attack significantly induced the emission of linalool from tea leaves (p<0.05) as a result of the up-regulation of the linalool synthases (CsLIS1 and CsLIS2) (p<0.05). Continuous mechanical damage significantly enhanced CsLIS1 and CsLIS2 expression levels and linalool emission (p<0.05). Therefore, continuous wounding was a key factor causing the formation and emission of linalool from tea leaves exposed to E. (M.) onukii attack. This information should prove helpful for the future use of stress responses of plant secondary metabolism to improve quality components of agricultural products. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Heart Attack Coronary Artery Disease

    MedlinePlus

    ... our e-newsletter! Aging & Health A to Z Heart Attack Coronary Artery Disease, Angina Basic Facts & Information What ... and oxygen supply; this is what causes a heart attack. If the damaged area is small, however, your ...

  14. Effect of green light spectra on the reduction of retinal damage and stress in goldfish, Carassius auratus.

    PubMed

    Song, Jin Ah; Kim, Na Na; Choi, Young Jae; Choi, Cheol Young

    2016-07-22

    We investigated the effect of light spectra on retinal damage and stress in goldfish using green (530 nm) and red (620 nm) light emitting diodes (LEDs) at three intensities each (0.5, 1.0, and 1.5 W/m(2)). We measured the change in the levels of plasma cortisol and H2O2 and expression and levels of caspase-3. The apoptotic response of green and red LED spectra was assessed using the terminal transferase dUTP nick end labeling (TUNEL) assay. Stress indicator (cortisol and H2O2) and apoptosis-related genes (caspase-3) decreased in green light, but increased in red light with higher light intensities over time. The TUNEL assay revealed that more apoptotic cells were detected in outer nuclear layers after exposure to red LED over time with the increase in light intensity, than the other spectra. These results indicate that green light efficiently reduces retinal damage and stress, whereas red light induces it. Therefore, red light-induced retina damage may induce apoptosis in goldfish retina. Copyright © 2016 Elsevier Inc. All rights reserved.

  15. Heart Attack

    MedlinePlus

    ... it as instructed while awaiting emergency help. Take aspirin, if recommended. Taking aspirin during a heart attack could reduce heart damage by helping to keep your blood from clotting. Aspirin can interact with other medications, however, so don' ...

  16. Douglas-fir beetle attack and tree mortality following wildfire

    Treesearch

    Sharon M. Hood; Barbara Bentz; Kevin C. Ryan

    2003-01-01

    A major concern after wildfires is the buildup of bark beetle populations in fire injured trees, and subsequent attack and population buildup in adjacent unburned areas. To examine this concern, we documented fire injury and insect attacks in Douglas-fir (Pseudotsuga menziesii) on the 2001 Green Knoll Fire, Wyoming to determine attack preferences, brood production, and...

  17. Pathologic features of fatal shark attacks.

    PubMed

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  18. Suicide Bombing Attacks

    PubMed Central

    Almogy, Gidon; Belzberg, Howard; Mintz, Yoaz; Pikarsky, Alon K.; Zamir, Gideon; Rivkind, Avraham I.

    2004-01-01

    Objective: To review the experience of a large-volume trauma center in managing and treating casualties of suicide bombing attacks. Summary Background Data: The threat of suicide bombing attacks has escalated worldwide. The ability of the suicide bomber to deliver a relatively large explosive load accompanied by heavy shrapnel to the proximity of his or her victims has caused devastating effects. Methods: The authors reviewed and analyzed the experience obtained in treating victims of suicide bombings at the level I trauma center of the Hadassah University Hospital in Jerusalem, Israel from 2000 to 2003. Results: Evacuation is usually rapid due to the urban setting of these attacks. Numerous casualties are brought into the emergency department over a short period. The setting in which the device is detonated has implications on the type of injuries sustained by survivors. The injuries sustained by victims of suicide bombing attacks in semi-confined spaces are characterized by the degree and extent of widespread tissue damage and include multiple penetrating wounds of varying severity and location, blast injury, and burns. Conclusions: The approach to victims of suicide bombings is based on the guidelines for trauma management. Attention is given to the moderately injured, as these patients may harbor immediate life-threatening injuries. The concept of damage control can be modified to include rapid packing of multiple soft-tissue entry sites. Optimal utilization of manpower and resources is achieved by recruiting all available personnel, adopting a predetermined plan, and a centrally coordinated approach. Suicide bombing attacks seriously challenge the most experienced medical facilities. PMID:15075644

  19. Localized attacks on spatially embedded networks with dependencies.

    PubMed

    Berezin, Yehiel; Bashan, Amir; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2015-03-11

    Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures-even of finite fraction-if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems.

  20. Shark attack.

    PubMed

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  1. THE EFFECT OF GREEN TEA ON OXIDATIVE DAMAGE AND TUMOUR FORMATION IN LOBUND-WISTAR RATS

    PubMed Central

    O'Sullivan, Jacintha; Sheridan, Juliette; Mulcahy, Hugh; Tenniswood, Martin; Morrissey, Colm

    2014-01-01

    A number of epidemiological studies suggest that the consumption of green tea reduces the incidence of prostate cancer. Since the major catechins present in green tea are potent anti-oxidants, we hypothesized that genetic and cellular damage induced by oxygen free radicals could be significantly reduced by potent anti-oxidants in green tea, thus reducing the cumulative genetic and cellular damage with age, and slowing or preventing tumour formation. Long-term administration of a decaffeinated green tea extract to Lobund-Wistar rats for periods up to 26 months almost halved the incidence of primary tumours in the genitourinary tract when compared to an aged-matched cohort receiving just water. We observed no inhibition of DNA adduct formation or lipid peroxidation in animals consuming green tea compared to animals consuming de-ionized water. The decrease in tumour formation was associated with an increase in 8-hydroxy-2’deoxyguanosine (8-OH-dG) and 4-hydroxynonenal (4-HNE) content (markers of DNA adduct formation and lipid peroxidation respectively) in the epithelium of the ventral prostate in aging animals. There was also an increase in 8-OH-dG expression, but no change in 4-HNE expression in the seminal vesicles of older animals. There was an age associated increase in expression of the anti-oxidant enzymes MnSOD and catalase in the epithelium of the ventral prostate of aging animals. There was also an increase in MnSOD expression, but no change in catalase expression in the seminal vesicles of older animals. These data demonstrate that consumption of green tea decreases the incidence of genitourinary tract tumours in the Lobund-Wistar rat, but has no effect on age associated DNA adduct formation and lipid peroxidation in the aging rat ventral prostate and seminal vesicles. PMID:18941371

  2. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  3. Plants as green phones: Novel insights into plant-mediated communication between below- and above-ground insects.

    PubMed

    Soler, Roxina; Harvey, Jeffrey A; Bezemer, T Martijn; Stuefer, Josef F

    2008-08-01

    Plants can act as vertical communication channels or 'green phones' linking soil-dwelling insects and insects in the aboveground ecosystem. When root-feeding insects attack a plant, the direct defense system of the shoot is activated, leading to an accumulation of phytotoxins in the leaves. The protection of the plant shoot elicited by root damage can impair the survival, growth and development of aboveground insect herbivores, thereby creating plant-based functional links between soil-dwelling insects and insects that develop in the aboveground ecosystem. The interactions between spatially separated insects below- and aboveground are not restricted to root and foliar plant-feeding insects, but can be extended to higher trophic levels such as insect parasitoids. Here we discuss some implications of plants acting as communication channels or 'green phones' between root and foliar-feeding insects and their parasitoids, focusing on recent findings that plants attacked by root-feeding insects are significantly less attractive for the parasitoids of foliar-feeding insects.

  4. A Green's Function Approach to Simulate DNA Damage by the Indirect Effect

    NASA Technical Reports Server (NTRS)

    Plante, Ianik; Cicinotta, Francis A.

    2013-01-01

    The DNA damage is of fundamental importance in the understanding of the effects of ionizing radiation. DNA is damaged by the direct effect of radiation (e.g. direct ionization) and by indirect effect (e.g. damage by.OH radicals created by the radiolysis of water). Despite years of research, many questions on the DNA damage by ionizing radiation remains. In the recent years, the Green's functions of the diffusion equation (GFDE) have been used extensively in biochemistry [1], notably to simulate biochemical networks in time and space [2]. In our future work on DNA damage, we wish to use an approach based on the GFDE to refine existing models on the indirect effect of ionizing radiation on DNA. To do so, we will use the code RITRACKS [3] developed at the NASA Johnson Space Center to simulate the radiation track structure and calculate the position of radiolytic species after irradiation. We have also recently developed an efficient Monte-Carlo sampling algorithm for the GFDE of reversible reactions with an intermediate state [4], which can be modified and adapted to simulate DNA damage by free radicals. To do so, we will use the known reaction rate constants between radicals (OH, eaq, H,...) and the DNA bases, sugars and phosphates and use the sampling algorithms to simulate the diffusion of free radicals and chemical reactions with DNA. These techniques should help the understanding of the contribution of the indirect effect in the formation of DNA damage and double-strand breaks.

  5. DNA Damage during G2 Phase Does Not Affect Cell Cycle Progression of the Green Alga Scenedesmus quadricauda

    PubMed Central

    Vítová, Milada; Bišová, Kateřina; Zachleder, Vilém

    2011-01-01

    DNA damage is a threat to genomic integrity in all living organisms. Plants and green algae are particularly susceptible to DNA damage especially that caused by UV light, due to their light dependency for photosynthesis. For survival of a plant, and other eukaryotic cells, it is essential for an organism to continuously check the integrity of its genetic material and, when damaged, to repair it immediately. Cells therefore utilize a DNA damage response pathway that is responsible for sensing, reacting to and repairing damaged DNA. We have studied the effect of 5-fluorodeoxyuridine, zeocin, caffeine and combinations of these on the cell cycle of the green alga Scenedesmus quadricauda. The cells delayed S phase and underwent a permanent G2 phase block if DNA metabolism was affected prior to S phase; the G2 phase block imposed by zeocin was partially abolished by caffeine. No cell cycle block was observed if the treatment with zeocin occurred in G2 phase and the cells divided normally. CDKA and CDKB kinases regulate mitosis in S. quadricauda; their kinase activities were inhibited by Wee1. CDKA, CDKB protein levels were stabilized in the presence of zeocin. In contrast, the protein level of Wee1 was unaffected by DNA perturbing treatments. Wee1 therefore does not appear to be involved in the DNA damage response in S. quadricauda. Our results imply a specific reaction to DNA damage in S. quadricauda, with no cell cycle arrest, after experiencing DNA damage during G2 phase. PMID:21603605

  6. Analytic barrage attack model. Final report, January 1986-January 1989

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    St Ledger, J.W.; Naegeli, R.E.; Dowden, N.A.

    An analytic model is developed for a nuclear barrage attack, assuming weapons with no aiming error and a cookie-cutter damage function. The model is then extended with approximations for the effects of aiming error and distance damage sigma. The final result is a fast running model which calculates probability of damage for a barrage attack. The probability of damage is accurate to within seven percent or better, for weapon reliabilities of 50 to 100 percent, distance damage sigmas of 0.5 or less, and zero to very large circular error probabilities. FORTRAN 77 coding is included in the report for themore » analytic model and for a numerical model used to check the analytic results.« less

  7. VTAC: virtual terrain assisted impact assessment for cyber attacks

    NASA Astrophysics Data System (ADS)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  8. Fungal Microbiomes Associated with Green and Non-Green Building Materials

    PubMed Central

    Coombs, Kanistha; Vesper, Stephen; Green, Brett J.; Yermakov, Mikhail; Reponen, Tiina

    2018-01-01

    Water-damaged buildings can lead to fungal growth and occupant health problems. Green building materials, derived from renewable sources, are increasingly utilized in construction and renovations. However, the question as to what fungi will grow on these green compared to non-green materials, after they get wet, has not been adequately studied. By determining what fungi grow on each type of material, the potential health risks can be more adequately assessed. In this study, we inoculated green and non-green pieces of ceiling tile, composite board, drywall, and flooring with indoor dust containing a complex mixture of naturally occurring fungi. The materials were saturated with water and incubated for two months in a controlled environment. The resulting fungal microbiomes were evaluated using ITS amplicon sequencing. Overall, the richness and diversity of the mycobiomes on each pair of green and non-green pieces were not significantly different. However, different genera dominated on each type of material. For example, Aspergillus spp. had the highest relative abundance on green and non-green ceiling tiles and green composite boards, but Peniophora spp. dominated the non-green composite board. In contrast, Penicillium spp. dominated green and non-green flooring samples. Green gypsum board was dominated by Phialophora spp. and Stachybotrys spp., but non-green gypsum board by Myrothecium spp. These data suggest that water-damaged green and non-green building materials can result in mycobiomes that are dominated by fungal genera whose member species pose different potentials for health risks. PMID:29681691

  9. Fungal Microbiomes Associated with Green and Non-Green Building Materials.

    PubMed

    Coombs, Kanistha; Vesper, Stephen; Green, Brett J; Yermakov, Mikhail; Reponen, Tiina

    2017-01-01

    Water-damaged buildings can lead to fungal growth and occupant health problems. Green building materials, derived from renewable sources, are increasingly utilized in construction and renovations. However, the question as to what fungi will grow on these green compared to non-green materials, after they get wet, has not been adequately studied. By determining what fungi grow on each type of material, the potential health risks can be more adequately assessed. In this study, we inoculated green and non-green pieces of ceiling tile, composite board, drywall, and flooring with indoor dust containing a complex mixture of naturally occurring fungi. The materials were saturated with water and incubated for two months in a controlled environment. The resulting fungal microbiomes were evaluated using ITS amplicon sequencing. Overall, the richness and diversity of the mycobiomes on each pair of green and non-green pieces were not significantly different. However, different genera dominated on each type of material. For example, Aspergillus spp. had the highest relative abundance on green and non-green ceiling tiles and green composite boards, but Peniophora spp. dominated the non-green composite board. In contrast, Penicillium spp. dominated green and non-green flooring samples. Green gypsum board was dominated by Phialophora spp. and Stachybotrys spp., but non-green gypsum board by Myrothecium spp. These data suggest that water-damaged green and non-green building materials can result in mycobiomes that are dominated by fungal genera whose member species pose different potentials for health risks.

  10. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  11. The Effect of Green Tea and Sour Tea (Hibiscus sabdariffa L.) Supplementation on Oxidative Stress and Muscle Damage in Athletes.

    PubMed

    Hadi, Amir; Pourmasoumi, Makan; Kafeshani, Marzieh; Karimian, Jahangir; Maracy, Mohammad Reza; Entezari, Mohammad Hasan

    2017-05-04

    Additional oxygen consumption during intense exercises may lead to oxidative stress and contribute to muscular fatigue. Green tea and sour tea (Hibiscus sabdariffa L.), which contain various flavonoids and polyphenols, have many healthful properties such as anticarcinogenic, anti-inflammatory, and heart protecting effects. The aim of the present study was to assess the effects of green tea and sour tea supplementation on oxidative stress and muscle damage in soccer athletes. This randomized, double-blind control trial was conducted on 54 male soccer players. Participants were randomly assigned to three groups to receive: 450 mg/d green tea extract (GTE) in the first group (n = 18), 450 mg/d sour tea extract (STE) in the second group (n = 18) and 450 mg/d maltodextrin in the control group (n = 18). Fasting whole blood samples were taken under resting conditions at the beginning and the end of the study to quantify the serum levels of muscle damage indices, aspartate aminotransferase (AST), creatine kinase (CK), lactate dehydrogenase (LDH), and oxidative stress biomarkers, malondialdehyde (MDA), and total antioxidant capacity (TAC). After six weeks intervention, athletes who received GTE and STE supplements compared with the placebo had a significantly decreased MDA level (P = 0.008). Furthermore, STE supplementation resulted in a significant increase in TAC level compared with GTE and placebo groups (P = 0.01). However, supplementation with GTE and STE had no significant effects on muscle damage indices. GTE and STE supplementation have beneficial effects on oxidative stress status in male athletes. However, both kinds of tea extract did not affect muscle damage status.

  12. The effect of green, black and white tea on the level of alpha and gamma tocopherols in free radical-induced oxidative damage of human red blood cells.

    PubMed

    Gawlik, Małgorzata; Czajka, Aneta

    2007-01-01

    The present study was undertaken to investigate the effect of aqueous tea extracts on lipid peroxidation and alpha and gamma tocopherols concentration in the oxidative damage of human red blood cells (RBC). RBC was taken as the model for study of the oxidative damage was induced by cumene hydroperoxide (cumOOH). The antioxidative property of leaf green tea, leaf and granulate of black tea and white tea at levels 1, 2, 4 g/150 mL of water were evaluated. The correlation was observed between reducing power of tea extract and formation of malondialdehyde--MDA (an indicator of lipid peroxidation) in oxidative damage of RBC. All tea extracts at level of 4 g/150 mL of water significantly decreased concentration of MDA. The extract of green tea in comparison to black and white tea extracts at the same levels seems to be a better protective agent against oxidative stress. The antioxidant synergism between components extracted from leaves of green tea and endogenous alpha tocopherol in the oxidative damage of red blood cells was observed. The consumption of alpha tocopherol in oxidative damage of RBC was the lowest after treatment with the highest dose of green tea extract. All tea extracts did not protect against decrease of gamma tocopherol in human erythrocytes treated with cumOOH.

  13. TSARINA: A computer model for assessing conventional and chemical attacks on air bases

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Emerson, D.E.; Wegner, L.H.

    This Note describes the latest version of the TSARINA (TSAR INputs using AIDA) airbase damage assessment computer program that has been developed to estimate the on-base concentration of toxic agents that would be deposited by a chemical attack and to assess losses to various on-base resources from conventional attacks, as well as the physical damage to runways, taxiways, buildings, and other facilities. Although the model may be used as a general-purpose, complex-target damage assessment model, its primary role in intended to be in support of the TSAR (Theater Simulation of Airbase Resources) aircraft sortie generation simulation program. When used withmore » TSAR, multiple trials of a multibase airbase-attack campaign can be assessed with TSARINA, and the impact of those attacks on sortie generation can be derived using the TSAR simulation model. TSARINA, as currently configured, permits damage assessments of attacks on an airbase (or other) complex that is compassed of up to 1000 individual targets (buildings, taxiways, etc,), and 2500 packets of resources. TSARINA determines the actual impact points (pattern centroids for CBUs and container burst point for chemical weapons) by Monte Carlo procedures-i.e., by random selections from the appropriate error distributions. Uncertainties in wind velocity and heading are also considered for chemical weapons. Point-impact weapons that impact within a specified distance of each target type are classed as hits, and estimates of the damage to the structures and to the various classes of support resources are assessed using cookie-cutter weapon-effects approximations.« less

  14. The effects PCSO-524®, a patented marine oil lipid and omega-3 PUFA blend derived from the New Zealand green lipped mussel (Perna canaliculus), on indirect markers of muscle damage and inflammation after muscle damaging exercise in untrained men: a randomized, placebo controlled trial.

    PubMed

    Mickleborough, Timothy D; Sinex, Jacob A; Platt, David; Chapman, Robert F; Hirt, Molly

    2015-01-01

    The purpose of the present study was to evaluate the effects of PCSO-524®, a marine oil lipid and n-3 LC PUFA blend, derived from New Zealand green- lipped mussel (Perna canaliculus), on markers of muscle damage and inflammation following muscle damaging exercise in untrained men. Thirty two untrained male subjects were randomly assigned to consume 1200 mg/d of PCSO- 524® (a green-lipped mussel oil blend) or placebo for 26 d prior to muscle damaging exercise (downhill running), and continued for 96 h following the muscle damaging exercise bout. Blood markers of muscle damage (skeletal muscle slow troponin I, sTnI; myoglobin, Mb; creatine kinase, CK), and inflammation (tumor necrosis factor, TNF-α), and functional measures of muscle damage (delayed onset muscle soreness, DOMS; pressure pain threshold, PPT; knee extensor joint range of motion, ROM; isometric torque, MVC) were assessed pre- supplementation (baseline), and multiple time points post-supplementation (before and after muscle damaging exercise). At baseline and 24 h following muscle damaging exercise peripheral fatigue was assessed via changes in potentiated quadriceps twitch force (∆Qtw,pot) from pre- to post-exhaustive cycling ergometer test in response to supra-maximal femoral nerve stimulation. Compared to placebo, supplementation with the green-lipped mussel oil blend significantly attenuated (p < 0.05) sTnI and TNF-α at 2, 24, 48, 72 and 96 h., Mb at 24, 48, 72, 96 h., and CK-MM at all-time points following muscle damaging exercise, significantly reduced (p < 0.05) DOMS at 72 and 96 h post-muscle damaging exercise, and resulted in significantly less strength loss (MVC) and provided a protective effect against joint ROM loss at 96 h post- muscle damaging exercise. At 24 h after muscle damaging exercise perceived pain was significantly greater (p < 0.05) compared to baseline in the placebo group only. Following muscle damaging exercise ∆Qtw,pot was significantly less (p

  15. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination ofmore » food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.« less

  16. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    NASA Astrophysics Data System (ADS)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  17. Antigenotoxic and Apoptotic Activity of Green Tea Polyphenol Extracts on Hexavalent Chromium-Induced DNA Damage in Peripheral Blood of CD-1 Mice: Analysis with Differential Acridine Orange/Ethidium Bromide Staining

    PubMed Central

    García-Rodríguez, María del Carmen; Carvente-Juárez, Megumi Monserrat; Altamirano-Lozano, Mario Agustín

    2013-01-01

    This study was conducted to investigate the modulating effects of green tea polyphenols on genotoxic damage and apoptotic activity induced by hexavalent chromium [Cr (VI)] in CD-1 mice. Animals were divided into the following groups: (i) injected with vehicle; (ii) treated with green tea polyphenols (30 mg/kg) via gavage; (iii) injected with CrO3 (20 mg/kg) intraperitoneally; (iv) treated with green tea polyphenols in addition to CrO3. Genotoxic damage was evaluated by examining micronucleated polychromatic erythrocytes (MN-PCEs) obtained from peripheral blood at 0, 24, 48, and 72 h after treatment. Induction of apoptosis and cell viability were assessed by differential acridine orange/ethidium bromide (AO/EB) staining. Treatment of green tea polyphenols led to no significant changes in the MN-PCEs. However, CrO3 treatment significantly increased MN-PCEs at 24 and 48 h after injection. Green tea polyphenols treatment prior to CrO3 injection led to a decrease in MN-PCEs compared to the group treated with CrO3 only. The average of apoptotic cells was increased at 48 h after treatment compared to control mice, suggesting that apoptosis could contribute to eliminate the DNA damaged cells induced by Cr (VI). Our findings support the proposed protective effects of green tea polyphenols against the genotoxic damage induced by Cr (VI). PMID:24363823

  18. Individual-tree tests of verbenone flakes, verbenone pouches, and green-leaf volatiles to protect lodgepole pines from mountain pine beetle attack

    Treesearch

    Sandra Kegley; Ken Gibson; Nancy Gillette; Jeff Webster; Lee Pederson; Silvia. Mori

    2010-01-01

    We have long known that the bark beetle-produced pheromone, verbenone (trimethyl-bicyclo-heptenone), can limit damage to pines by scolytid bark beetles (Clarke et al. 1999, Skillen et al. 1997, Syracuse Environmental Research Associates, Inc. 2000). It has also been shown that in some cases the addition of ―green leaf volatiles‖ (GLVs) can increase the efficacy of...

  19. Percolation of localized attack on isolated and interdependent random networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2014-03-01

    Percolation properties of isolated and interdependent random networks have been investigated extensively. The focus of these studies has been on random attacks where each node in network is attacked with the same probability or targeted attack where each node is attacked with a probability being a function of its centrality, such as degree. Here we discuss a new type of realistic attacks which we call a localized attack where a group of neighboring nodes in the networks are attacked. We attack a randomly chosen node, its neighbors, and its neighbor of neighbors and so on, until removing a fraction (1 - p) of the network. This type of attack reflects damages due to localized disasters, such as earthquakes, floods and war zones in real-world networks. We study, both analytically and by simulations the impact of localized attack on percolation properties of random networks with arbitrary degree distributions and discuss in detail random regular (RR) networks, Erdős-Rényi (ER) networks and scale-free (SF) networks. We extend and generalize our theoretical and simulation results of single isolated networks to networks formed of interdependent networks.

  20. Diphenylmethyl selenocyanate attenuates malachite green induced oxidative injury through antioxidation & inhibition of DNA damage in mice

    PubMed Central

    Das, Jayanta Kumar; Sarkar, Sibani; Hossain, Sk Ugir; Chakraborty, Pramita; Das, Rajat Kumar; Bhattacharya, Sudin

    2013-01-01

    Background & objectives: Malachite green (MG), an environmentally hazardous material, is used as a non permitted food colouring agent, especially in India. Selenium (Se) is an essential nutritional trace element required for animals and humans to guard against oxidative stress induced by xenobiotic compounds of diverse nature. In the present study, the role of the selenium compound diphenylmethyl selenocyanate (DMSE) was assessed on the oxidative stress (OS) induced by a food colouring agent, malachite green (MG) in vivo in mice. Methods: Swiss albino mice (Mus musculus) were intraperitoneally injected with MG at a standardized dose of 100 μg/ mouse for 30 days. DMSE was given orally at an optimum dose of 3 mg/kg b.w. in pre (15 days) and concomitant treatment schedule throughout the experimental period. The parameters viz. ALT, AST, LPO, GSH, GST, SOD, CAT, GPx, TrxR, CA, MN, MI and DNA damage have been evaluated. Results: The DMSE showed its potential to protect against MG induced hepatotoxicity by controlling the serum alanine aminotransferase and aspartate amino transferase (ALT and AST) levels and also ameliorated oxidative stress by modulating hepatic lipid peroxidation and different detoxifying and antioxidative enzymes such as glutathione-S-transferase (GST), superoxide dismutase (SOD), catalase (CAT), and also the selenoenzymes such as glutathione peroxidase (GPx) and thioredoxin reductase (TrxR) and reduced glutathione level which in turn reduced DNA damage. Interpretation & conclusions: The organo-selenium compound DMSE showed significant protection against MG induced heptotoxicity and DNA damage in murine model. Better protection was observed in pretreatment group than in the concomitant group. Further studies need to be done to understand the mechanism of action. PMID:23852297

  1. Towards A Taxonomy Of Attacks Against Energy Control Systems

    NASA Astrophysics Data System (ADS)

    Fleury, Terry; Khurana, Himanshu; Welch, Von

    Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.

  2. The Neuroprotective Effects of Brazilian Green Propolis on Neurodegenerative Damage in Human Neuronal SH-SY5Y Cells

    PubMed Central

    Ni, Junjun; Meng, Jie; Zhu, Aiqin; Zhong, Xin; Wu, Shizheng; Nakanishi, Hiroshi

    2017-01-01

    Oxidative stress and synapse dysfunction are the major neurodegenerative damage correlated to cognitive impairment in Alzheimer's disease (AD). We have found that Brazilian green propolis (propolis) improves the cognitive functions of mild cognitive impairment patients living at high altitude; however, mechanism underlying the effects of propolis is unknown. In the present study, we investigated the effects of propolis on oxidative stress, expression of brain-derived neurotrophic factor (BDNF), and activity-regulated cytoskeleton-associated protein (Arc), the critical factors of synapse efficacy, using human neuroblastoma SH-SY5Y cells. Pretreatment with propolis significantly ameliorated the hydrogen peroxide- (H2O2-) induced cytotoxicity in SH-SY5Y cells. Furthermore, propolis significantly reduced the H2O2-generated reactive oxygen species (ROS) derived from mitochondria and 8-oxo-2′-deoxyguanosine (8-oxo-dG, the DNA oxidative damage marker) but significantly reversed the fibrillar β-amyloid and IL-1β-impaired BDNF-induced Arc expression in SH-SY5Y cells. Furthermore, propolis significantly upregulated BDNF mRNA expression in time- and dose-dependent manners. In addition, propolis induced Arc mRNA and protein expression via phosphoinositide-3 kinase (PI3K). These observations strongly suggest that propolis protects from the neurodegenerative damage in neurons through the properties of various antioxidants. The present study provides a potential molecular mechanism of Brazilian green propolis in prevention of cognitive impairment in AD as well as aging. PMID:28265338

  3. The Neuroprotective Effects of Brazilian Green Propolis on Neurodegenerative Damage in Human Neuronal SH-SY5Y Cells.

    PubMed

    Ni, Junjun; Wu, Zhou; Meng, Jie; Zhu, Aiqin; Zhong, Xin; Wu, Shizheng; Nakanishi, Hiroshi

    2017-01-01

    Oxidative stress and synapse dysfunction are the major neurodegenerative damage correlated to cognitive impairment in Alzheimer's disease (AD). We have found that Brazilian green propolis (propolis) improves the cognitive functions of mild cognitive impairment patients living at high altitude; however, mechanism underlying the effects of propolis is unknown. In the present study, we investigated the effects of propolis on oxidative stress, expression of brain-derived neurotrophic factor (BDNF), and activity-regulated cytoskeleton-associated protein (Arc), the critical factors of synapse efficacy, using human neuroblastoma SH-SY5Y cells. Pretreatment with propolis significantly ameliorated the hydrogen peroxide- (H 2 O 2 -) induced cytotoxicity in SH-SY5Y cells. Furthermore, propolis significantly reduced the H 2 O 2 -generated reactive oxygen species (ROS) derived from mitochondria and 8-oxo-2'-deoxyguanosine (8-oxo-dG, the DNA oxidative damage marker) but significantly reversed the fibrillar β -amyloid and IL-1 β -impaired BDNF-induced Arc expression in SH-SY5Y cells. Furthermore, propolis significantly upregulated BDNF mRNA expression in time- and dose-dependent manners. In addition, propolis induced Arc mRNA and protein expression via phosphoinositide-3 kinase (PI3K). These observations strongly suggest that propolis protects from the neurodegenerative damage in neurons through the properties of various antioxidants. The present study provides a potential molecular mechanism of Brazilian green propolis in prevention of cognitive impairment in AD as well as aging.

  4. Planning guidance for emergency response to a hypothetical nuclear attack on Riyadh, Saudi Arabia

    NASA Astrophysics Data System (ADS)

    Shubayr, Nasser Ali M.

    The threat of nuclear attack will remain imminent in an ever-advancing society. Saudi Arabia is not immune to this threat. This dissertation establishes planning guidance for response to a nuclear attack on Riyadh, the capital of Saudi Arabia, based on a hypothetical scenario of a nuclear detonation. A case scenario of a one-megaton thermonuclear bomb detonated at ground level over Riyadh is used to support the thesis. Previous nuclear tests and the Hiroshima and Nagasaki bombings have been used to present possible effects on Riyadh. US planning guidance and lessons learned from the Chernobyl and Fukushima nuclear plants accidents have been used to develop the emergency response guidance. The planning guidance outlines a rapid response to the nuclear detonation. Four damage zones have been identified; severe damage zone, moderate damage zone, light damage zone and dangerous fallout zone. Actions that are recommended, and those that should be avoided, have been determined for each zone. Shelter/ evacuation evaluation for blast-affected and fallout-affected areas is the basis for the recommendation that shelter in place is the best decision for the first hours to days after the attack. Guidelines for medical care response and population monitoring and decontamination are included to reduce the early and long-term effects of the attack. Recommendations to the Saudi Arabian authorities have been made to facilitate suitable preparedness and response for such an event.

  5. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    NASA Astrophysics Data System (ADS)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  6. 7 CFR 29.3017 - Damage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Damage. 29.3017 Section 29.3017 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... Damage. The effect of mold, must, rot, black rot, or other fungous or bacterial diseases which attack...

  7. 7 CFR 30.17 - Damage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Damage. 30.17 Section 30.17 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... Damage. The effect of mold, must, rot, black rot, or other fungous or bacterial diseases which attack...

  8. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    PubMed Central

    Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-01-01

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. PMID:29065461

  9. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    PubMed

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  10. Suicide bombing attacks: update and modifications to the protocol.

    PubMed

    Almogy, Gidon; Belzberg, Howard; Mintz, Yoaz; Pikarsky, Alon K; Zamir, Gideon; Rivkind, Avraham I

    2004-03-01

    To review the experience of a large-volume trauma center in managing and treating casualties of suicide bombing attacks. The threat of suicide bombing attacks has escalated worldwide. The ability of the suicide bomber to deliver a relatively large explosive load accompanied by heavy shrapnel to the proximity of his or her victims has caused devastating effects. The authors reviewed and analyzed the experience obtained in treating victims of suicide bombings at the level I trauma center of the Hadassah University Hospital in Jerusalem, Israel from 2000 to 2003. Evacuation is usually rapid due to the urban setting of these attacks. Numerous casualties are brought into the emergency department over a short period. The setting in which the device is detonated has implications on the type of injuries sustained by survivors. The injuries sustained by victims of suicide bombing attacks in semi-confined spaces are characterized by the degree and extent of widespread tissue damage and include multiple penetrating wounds of varying severity and location, blast injury, and burns. The approach to victims of suicide bombings is based on the guidelines for trauma management. Attention is given to the moderately injured, as these patients may harbor immediate life-threatening injuries. The concept of damage control can be modified to include rapid packing of multiple soft-tissue entry sites. Optimal utilization of manpower and resources is achieved by recruiting all available personnel, adopting a predetermined plan, and a centrally coordinated approach. Suicide bombing attacks seriously challenge the most experienced medical facilities.

  11. Early perception of stink bug damage in developing seeds of field-grown soybean induces chemical defences and reduces bug attack.

    PubMed

    Giacometti, Romina; Barneto, Jesica; Barriga, Lucia G; Sardoy, Pedro M; Balestrasse, Karina; Andrade, Andrea M; Pagano, Eduardo A; Alemano, Sergio G; Zavala, Jorge A

    2016-08-01

    Southern green stink bugs (Nezara viridula L.) invade field-grown soybean crops, where they feed on developing seeds and inject phytotoxic saliva, which causes yield reduction. Although leaf responses to herbivory are well studied, no information is available about the regulation of defences in seeds. This study demonstrated that mitogen-activated protein kinases MPK3, MPK4 and MPK6 are expressed and activated in developing seeds of field-grown soybean and regulate a defensive response after stink bug damage. Although 10-20 min after stink bug feeding on seeds induced the expression of MPK3, MPK6 and MPK4, only MPK6 was phosphorylated after damage. Herbivory induced an early peak of jasmonic acid (JA) accumulation and ethylene (ET) emission after 3 h in developing seeds, whereas salicylic acid (SA) was also induced early, and at increasing levels up to 72 h after damage. Damaged seeds upregulated defensive genes typically modulated by JA/ET or SA, which in turn reduced the activity of digestive enzymes in the gut of stink bugs. Induced seeds were less preferred by stink bugs. This study shows that stink bug damage induces seed defences, which is perceived early by MPKs that may activate defence metabolic pathways in developing seeds of field-grown soybean. © 2015 Society of Chemical Industry. © 2015 Society of Chemical Industry.

  12. Minimum State Awareness for Resilient Control Systems Under Cyber-Attack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kisner, Roger; Fugate, David L; McIntyre, Timothy J

    2012-01-01

    State awareness for a control system is the accurate knowledge of the internal states of the system realization. To maintain stable operation, a controller requires a certain degree of state awareness. By definition, a cyber-attacker decreases the state awareness by modifying or removing the information available to the operator and control system. By doing so, the attacker can directly cause damage to the physical system through the control system, or indirectly by causing the operator to react in a damaging manner to the false information. In a number of recent papers, detection and mitigation strategies have been proposed that assumemore » state awareness. The goal of the attacker to reduce or remove state awareness makes this assumption invalid for most situations. One of the central problems of resilient control is developing methods to retain sufficient state awareness to continue operation during a cyberattack. In this paper, we will define state awareness, discuss the consequences of loss of state awareness, and some potential research directions for maintaining state awareness.« less

  13. Integrated approach for investigating the durability of self-consolidating concrete to sulfate attack

    NASA Astrophysics Data System (ADS)

    Bassuoni, Mohamed Tamer F.

    The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion

  14. Spatial variability in oviposition damage by periodical cicadas in a fragmented landscape.

    PubMed

    Cook, William M; Holt, Robert D; Yao, Jin

    2001-03-01

    Effects of the periodical cicada (Magicicada spp.) on forest dynamics are poorly documented. A 1998 emergence of M. cassini in eastern Kansas led to colonization of a fragmented experimental landscape undergoing secondary succession. We hypothesized that per-tree rates of oviposition damage by cicadas would reflect: (1) distance from the source of the emergence, (2) patch size, and (3) local tree density. Ovipositing females displayed clear preferences for host species and damage incidence showed predictable spatial patterns. Two species (smooth sumac, Rhus glabra, and eastern red cedar, Juniperus virginiana) were rarely attacked, whereas others (rough-leaved dogwood, Cornus drummondii; slippery elm, Ulmus rubra; box elder, Acer negundo, and honey locust, Gleditsia triacanthos) were strongly attacked. The dominant early successional tree, dogwood, received on average the most attacks. As predicted, attacks per stem declined strongly with distance from the emergence source, and with local stem density (a "dilution" effect). Contrary to expectations, there were more attacks per stem on larger patches. Because ovipositing cicadas cut damaging slits in host tree branches, potentially affecting tree growth rate, competitive ability, and capacity to reproduce, cicada damage could potentially influence spatial variation in secondary succession.

  15. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  16. Evidence for Non-Opponent Coding of Colour Information in Human Visual Cortex: Selective Loss of "Green" Sensitivity in a Subject with Damaged Ventral Occipito-Temporal Cortex.

    PubMed

    Rauscher, Franziska G; Plant, Gordon T; James-Galton, Merle; Barbur, John L

    2011-01-01

    Damage to ventral occipito-temporal extrastriate visual cortex leads to the syndrome of prosopagnosia often with coexisting cerebral achromatopsia. A patient with this syndrome resulting in a left upper homonymous quadrantanopia, prosopagnosia, and incomplete achromatopsia is described. Chromatic sensitivity was assessed at a number of locations in the intact visual field using a dynamic luminance contrast masking technique that isolates the use of colour signals. In normal subjects chromatic detection thresholds form an elliptical contour when plotted in the Commission Internationale d'Eclairage, (x-y), chromaticity diagram. Because the extraction of colour signals in early visual processing involves opponent mechanisms, subjects with Daltonism (congenital red/green loss of sensitivity) show symmetric increase in thresholds towards the long wavelength ("red") and middle wavelength ("green") regions of the spectrum locus. This is also the case with acquired loss of chromatic sensitivity as a result of retinal or optic nerve disease. Our patient's results were an exception to this rule. Whilst his chromatic sensitivity in the central region of the visual field was reduced symmetrically for both "red/green" and "yellow/blue" directions in colour space, the subject's lower left quadrant showed a marked asymmetry in "red/green" thresholds with the greatest loss of sensitivity towards the "green" region of the spectrum locus. This spatially localized asymmetric loss of "green" but not "red" sensitivity has not been reported previously in human vision. Such loss is consistent with selective damage of neural substrates in the visual cortex that process colour information, but are spectrally non-opponent.

  17. Metrics for Assessment of Smart Grid Data Integrity Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annarita Giani; Miles McQueen; Russell Bent

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less

  18. Interval forecasting of cyber-attacks on industrial control systems

    NASA Astrophysics Data System (ADS)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  19. DNA Damage by Ionizing Radiation: Tandem Double Lesions by Charged Particles

    NASA Technical Reports Server (NTRS)

    Huo, Winifred M.; Chaban, Galina M.; Wang, Dunyou; Dateo, Christopher E.

    2005-01-01

    Oxidative damages by ionizing radiation are the source of radiation-induced carcinogenesis, damage to the central nervous system, lowering of the immune response, as well as other radiation-induced damages to human health. Monte Carlo track simulations and kinetic modeling of radiation damages to the DNA employ available molecular and cellular data to simulate the biological effect of high and low LET radiation io the DNA. While the simulations predict single and double strand breaks and base damages, so far all complex lesions are the result of stochastic coincidence from independent processes. Tandem double lesions have not yet been taken into account. Unlike the standard double lesions that are produced by two separate attacks by charged particles or radicals, tandem double lesions are produced by one single attack. The standard double lesions dominate at the high dosage regime. On the other hand, tandem double lesions do not depend on stochastic coincidences and become important at the low dosage regime of particular interest to NASA. Tandem double lesions by hydroxyl radical attack of guanine in isolated DNA have been reported at a dosage of radiation as low as 10 Gy. The formation of two tandem base lesions was found to be linear with the applied doses, a characteristic of tandem lesions. However, tandem double lesions from attack by a charged particle have not been reported.

  20. PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure

    NASA Astrophysics Data System (ADS)

    Kaminsky, Dan; Patterson, Meredith L.; Sassaman, Len

    Research unveiled in December of 2008 [15] showed how MD5's long-known flaws could be actively exploited to attack the real-worldCertification Authority infrastructure. In this paper, we demonstrate two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the primary root certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We also draw particular attention to two possibly unrecognized vectors for implementation flaws that have been problematic in the past: the ASN.1 BER decoder required to parsePKCS#10, and the potential for SQL injection fromtext contained within its requests. Finally, we explore why the implications of these attacks are broader than some have realized - first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only intended to stop phishing attacks from names similar to trusted brands. As per the work of Adam Barth and Collin Jackson [4], EV does not prevent an attacker who can synthesize or acquire a "low assurance" certificate for a given name from acquiring the "green bar" EV experience.

  1. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    PubMed

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  2. Using natural dietary sources of antioxidants to protect against ultraviolet and visible radiation-induced DNA damage: an investigation of human green tea ingestion.

    PubMed

    Malhomme de la Roche, Helena; Seagrove, Susan; Mehta, Anisha; Divekar, Preshita; Campbell, Sandra; Curnow, Alison

    2010-11-03

    Oral ingestion of green tea is a potent dietary source of antioxidant polyphenols. These compounds are of interest as they may be able to provide additional protection to the body to help prevent the deleterious effects of ultraviolet A and visible radiation (UVA/VIS) produced indirectly via reactive oxygen species (ROS) in sunlight exposed skin. A small clinical study was conducted in ten healthy adult volunteers. Samples of whole blood were obtained from each before and 30, 60 and 90 min following ingestion of three breakfast cups of green tea (540 ml in total) prepared in a standardised manner. Peripheral leucocytes were isolated from each blood sample and exposed to increasing periods of UVA/VIS irradiation in the laboratory (0, 9, 12 or 18 min). Alkaline single cell gel electrophoresis (the comet assay) was then conducted to determine the level of DNA damage in each sample from each individual. The findings support those of our previous pilot study and indicate that drinking green tea did significantly reduce the genotoxic effects observed in peripheral blood cells 60 min following ingestion when artificially exposed to 12 min of UVA/VIS irradiation in the laboratory. It is postulated that this protection is afforded by the polyphenol compounds (known to be contained within green tea) via scavenging or quenching of the damaging ROS induced by this form of light exposure. Further investigation should consider whether this dietary-induced protection could be extended to cells of the skin. Copyright © 2010 Elsevier B.V. All rights reserved.

  3. Nondestructive Evaluation of Damaged and As-Fabricated Encapsulated Ceramic Panels

    DTIC Science & Technology

    2009-05-01

    Nondestructive Evaluation of Damaged and As-Fabricated Encapsulated Ceramic Panels by William H. Green , Raymond Brennan, and Robert H. Carter...ARL-TR-4823 May 2009 Nondestructive Evaluation of Damaged and As-Fabricated Encapsulated Ceramic Panels William H. Green , Raymond Brennan...William H. Green , Raymond Brennan, and Robert H. Carter 5d. PROJECT NUMBER AH80 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION

  4. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  5. Redox-linked effects of green tea on DNA damage and repair, and influence of microsatellite polymorphism in HMOX-1: results of a human intervention trial.

    PubMed

    Choi, Siu-Wai; Yeung, Vincent T F; Collins, Andrew R; Benzie, Iris F F

    2015-01-01

    Green tea has many reported health benefits, including genoprotective and antioxidant effects, but green tea has pro-oxidant activity in vitro. A tea-induced pro-oxidant shift that triggers cytoprotective adaptations has been postulated, but human data are lacking. We investigated effects on oxidation-induced DNA damage and redox-linked cytoprotective factors, including 8-oxoguanine glycosylase (hOGG1) and heme oxygenase 1 (HMOX-1) in lymphocytes in a randomised, placebo-controlled, cross-over supplementation trial. hOGG1 catalyses the first step in base excision repair; increased HMOX-1 is a sign of cytoprotective response to pro-oxidant change. The influence of microsatellite polymorphisms in the HMOX-1 promoter region was also explored. Higher numbers of GT repeats [GT(n)] in this region reportedly diminish response to pro-oxidant change. Green tea [2 × 150 ml of 1% w/v tea/day (or water as control)] was taken for 12 weeks by 43 Type 2 diabetes subjects {20 with short [S/S; GT(n) < 25] and 23 with long [L/L; GT(n) ≥ 25]}. Fasting venous blood was collected before and after each treatment. The formamidopyrimidine DNA glycosylase-assisted comet assay was used to measure DNA damage in lymphocytes. For measuring hOGG1 activity, we used photo-damaged HeLa cells incubated with lymphocyte extracts from test subjects, in combination with the comet assay. Lymphocyte HMOX-1 and hOGG1 protein concentrations and expression (mRNA) of redox-sensitive genes, including HMOX-1 and hOGG1, were also investigated. Results showed significantly (P < 0.01) lower (~15%) DNA damage, higher (~50%) hOGG1 activity and higher (~40%) HMOX-1 protein concentration after tea. No changes in mRNA expression were seen. Baseline HMOX-1 protein and hOGG1 activity were higher (P < 0.05) in the S/S group, but tea-associated responses were similar in both GT(n) groups. Green tea is clearly associated with lowered DNA damage, increased hOGG1 activity and higher HMOX-1 protein levels. Further study is

  6. Survival of child after lion attack

    PubMed Central

    Dabdoub, Carlos F.; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named “Bang-Bang”, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of the literature. Case Description: We report the case of an 8-year-old boy who was attacked by a lion during a circus show. The patient underwent an emergent neurosurgical procedure, including parietal craniectomy, cleaning, and extensive surgical debridement of the wounds. Despite open severe head trauma with brain damage as well as thorax and abdomen trauma, the child survived, with minimal neurological sequelae. Conclusions: Human injury resulting from encounters with nondomesticated animals is increasingly rising throughout the world. This case highlights the potentially violent and aggressive nature of wild mammals held in captivity. Unusual wild animal attacks and the complex injuries that result may pose a challenge to surgeons practicing in resource-limited settings. In this sense, the best treatment in the mentioned case is the prevention of human injuries by these animals. In addition, to attend to these infrequent cases, the authors emphasize the importance of a multidisciplinary approach to achieve the best cosmetic and functional results. PMID:23869277

  7. Nonlinear analysis of NPP safety against the aircraft attack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Králik, Juraj, E-mail: juraj.kralik@stuba.sk; Králik, Juraj, E-mail: kralik@fa.stuba.sk

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  8. Susceptibility and Interactions of Drosophila suzukii and Zaprionus indianus (Diptera: Drosophilidae) in Damaging Strawberry.

    PubMed

    Bernardi, D; Andreazza, F; Botton, M; Baronio, C A; Nava, D E

    2017-02-01

    Drosophila suzukii (Matsumura) has been recently detected causing damage to strawberries in Brazil. Infestation in strawberry culture has often been observed jointly with the presence of Zaprionus indianus Gupta. This study investigated the susceptibility of strawberries at three ripening stages to infestation of D. suzukii and Z. indianus and their interaction. In the laboratory, strawberries cv. Albion at different ripening stages (green, semi-ripe and ripe) were exposed to D. suzukii and Z. indianus for 24 h in choice and no-choice bioassays. Additionally, we evaluated the effects of mechanical damage incurred artificially or by D. suzukii oviposition on Z. indianus infestation. In no-choice bioassay, there were no significant differences in fruit susceptibility to D. suzukii infestation at different ripening stages. However, in choice bioassay, D. suzukii adults preferred to oviposit on R fruit. The presence of mechanical damage did not increase susceptibility of fruit to D. suzukii oviposition. For Z. indianus, there was greater susceptibility of R fruit in relation to SR and G fruit in both the choice and no-choice bioassays. There was a significant and positive interaction of mechanical damage and damage caused by D. suzukii to R fruit and infestation by Z. indianus, which was not observed in SR and G fruit. Although infestation of Z. indianus is related to attack damaged or decaying fruit, this work shows that this species has the ability to oviposit and develop in healthy strawberry fruit with and increased infestation level when the fruit has damage to its epidermis.

  9. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    NASA Astrophysics Data System (ADS)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  10. Matcha, a powdered green tea, ameliorates the progression of renal and hepatic damage in type 2 diabetic OLETF rats.

    PubMed

    Yamabe, Noriko; Kang, Ki Sung; Hur, Jong Moon; Yokozawa, Takako

    2009-08-01

    Matcha, a powdered green tea produced by grinding with a stone mill, has been popularly used in the traditional tea ceremony and foods in Japan. Matcha is well known to be richer in some nutritional elements and epigallocatechin 3-O-gallate than other green teas. In our previous study, epigallocatechin 3-O-gallate exhibited protective effects against renal damage in a rat model of diabetic nephropathy. In the present study, we investigated the preventive effects of Matcha (50, 100, or 200 mg/kg/day) on the progression of hepatic and renal damage in type 2 diabetic Otsuka Long-Evans Tokushima Fatty (OLETF) rats. OLETF rats were orally administered Matcha for 16 weeks, and we assessed biochemical parameters in the serum, liver, and kidney and expression levels of major products of advanced glycation end products (AGEs), N(6)-(carboxylmethyl)lysine (CML) and N(6)-(carboxylethyl)lysine (CEL), receptor for AGE (RAGE), and sterol regulatory element binding proteins (SREBPs)-1 and -2. Serum total protein levels were significantly increased by Matcha administration, whereas the serum albumin and glycosylated protein levels as well as the renal glucose and triglyceride levels were only slightly or not at all affected. However, Matcha treatment significantly lowered the glucose, triglyceride, and total cholesterol levels in the serum and liver, renal AGE levels, and the serum thiobarbituric acid-reactive substances levels. In addition, Matcha supplementation resulted in decreases in the renal CML, CEL, and RAGE expressions as well as an increase in hepatic SREBP-2 expression, but not that of SREBP-1. These results suggest that Matcha protects against hepatic and renal damage through the suppression of renal AGE accumulation, by decreases in hepatic glucose, triglyceride, and total cholesterol levels, and by its antioxidant activities.

  11. Reducing logging damage

    Treesearch

    Richard D. Cosens

    1952-01-01

    Reducing logging damage to reproduction and residual stands is an important part of harvesting the old-growth forests of California. Much of the over mature timber: is on areas with an acceptable stocking of advance growth. When the old trees are harvested, the advance growth is scarred, deformed, broken, or killed outright. Insects and disease attack the broken and...

  12. Detecting Payload Attacks on Programmable Logic Controllers (PLCs)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan

    Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less

  13. Evolution of Army Attack Aviation: A Chaotic Coupled Pendulums Analogy

    DTIC Science & Technology

    2013-05-23

    forward of the FLOT for 36 minutes.32 Ground Campaign: 4-229 AVN Deep Attack, 26-27 February With the commencement of the ground campaign on 24......battalions worth of tanks and armored personnel carriers while receiving no damage to 4-229 AVN aircraft.34 Prior planning, training, and command

  14. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  15. Fundamental studies of hydrogen attack in carbon-0.5molybdenum steel and weldments applied in petroelum and petrochemical industries

    NASA Astrophysics Data System (ADS)

    Liu, Peng

    High temperature hydrogen attack (HTHA) is a form of surface decarburization, internal decarburization, and/or intergranular cracking in steels exposed to high temperature (>400°F) and high hydrogen pressure. Hydrogen attack is an irreversible process which can cause permanent damage resulting in degradation of mechanical properties and failures such as leakage, bursting, fire, and/or explosion. The continuous progression of hydrogen attack in C-0.5Mo steel and weldments below the C-0.5Mo Nelson Curve has caused a significant concern for the integrity and serviceability of C-0.5Mo steel utilized for pressure vessels and piping in the petroleum refinery and petrochemical industries. A state-of-the-art literature review was implemented to provide a comprehensive overview of the published research efforts on hydrogen attack studies. The evolution of "Nelson Curves" for carbon steel, C-0.5Mo, and Cr-Mo steels was historically reviewed in regard to design applications and limitations. Testing techniques for hydrogen attack assessment were summarized under the categories of hydrogen exposure testing, mechanical evaluation, and dilatometric swelling testing. In accord with the demands of these industries, fundamental studies of hydrogen attack in C-0.5Mo steel and weldments were accomplished in terms of quantitative methodologies for hydrogen damage evaluation; hydrogen damage assessment of service exposed weldments and autoclave exposed materials; effects of carbon and alloying elements, heat treatments, hot and cold working, welding processes and postweld heat treatment (PWHT) on hydrogen attack susceptibility; development of continuous cooling transformation (CCT) diagrams for C-0.5Mo base metals and the coarse grained heat-affected zone (CGHAZ); carbide evaluation for the C-0.5Mo steel after service exposure and heat treatment; methane evolution by the reaction of hydrogen and carbides; hydrogen diffusion and methane pressure through the wall thickness of one

  16. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  17. Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.

    PubMed

    Maqbool, Zahid; Makhijani, Nidhi; Pammi, V S Chandrasekhar; Dutt, Varun

    2017-05-01

    The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. In an experiment, participants were randomly assigned to three between-subjects conditions ( n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker's successful attack was 10 times the reward for analyst's successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst's successful defense was 10 times the reward for hacker's successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.

  18. Heart Attack

    MedlinePlus

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  19. Generalized watermarking attack based on watermark estimation and perceptual remodulation

    NASA Astrophysics Data System (ADS)

    Voloshynovskiy, Sviatoslav V.; Pereira, Shelby; Herrigel, Alexander; Baumgartner, Nazanin; Pun, Thierry

    2000-05-01

    Digital image watermarking has become a popular technique for authentication and copyright protection. For verifying the security and robustness of watermarking algorithms, specific attacks have to be applied to test them. In contrast to the known Stirmark attack, which degrades the quality of the image while destroying the watermark, this paper presents a new approach which is based on the estimation of a watermark and the exploitation of the properties of Human Visual System (HVS). The new attack satisfies two important requirements. First, image quality after the attack as perceived by the HVS is not worse than the quality of the stego image. Secondly, the attack uses all available prior information about the watermark and cover image statistics to perform the best watermark removal or damage. The proposed attack is based on a stochastic formulation of the watermark removal problem, considering the embedded watermark as additive noise with some probability distribution. The attack scheme consists of two main stages: (1) watermark estimation and partial removal by a filtering based on a Maximum a Posteriori (MAP) approach; (2) watermark alteration and hiding through addition of noise to the filtered image, taking into account the statistics of the embedded watermark and exploiting HVS characteristics. Experiments on a number of real world and computer generated images show the high efficiency of the proposed attack against known academic and commercial methods: the watermark is completely destroyed in all tested images without altering the image quality. The approach can be used against watermark embedding schemes that operate either in coordinate domain, or transform domains like Fourier, DCT or wavelet.

  20. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coyle, D R; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the first time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of themore » trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.« less

  1. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    NASA Astrophysics Data System (ADS)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  2. 7 CFR 29.2263 - Damage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Damage. 29.2263 Section 29.2263 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing.... The effect of mold, must, rot, black rot, or other fungous or bacterial diseases which attack tobacco...

  3. Spatial Pattern of Attacks of the Invasive Woodwasp Sirex noctilio, at Landscape and Stand Scales.

    PubMed

    Lantschner, M Victoria; Corley, Juan C

    2015-01-01

    Invasive insect pests are responsible for important damage to native and plantation forests, when population outbreaks occur. Understanding the spatial pattern of attacks by forest pest populations is essential to improve our understanding of insect population dynamics and for predicting attack risk by invasives or planning pest management strategies. The woodwasp Sirex noctilio is an invasive woodwasp that has become probably the most important pest of pine plantations in the Southern Hemisphere. Our aim was to study the spatial dynamics of S. noctilio populations in Southern Argentina. Specifically we describe: (1) the spatial patterns of S. noctilio outbreaks and their relation with environmental factors at a landscape scale; and (2) characterize the spatial pattern of attacked trees at the stand scale. We surveyed the spatial distribution of S. noctilio outbreaks in three pine plantation landscapes, and we assessed potential associations with topographic variables, habitat characteristics, and distance to other outbreaks. We also looked at the spatial distribution of attacked trees in 20 stands with different levels of infestation, and assessed the relationship of attacks with stand composition and management. We found that the spatial pattern of pine stands with S. noctilio outbreaks at the landscape scale is influenced mainly by the host species present, slope aspect, and distance to other outbreaks. At a stand scale, there is strong aggregation of attacked trees in stands with intermediate infestation levels, and the degree of attacks is influenced by host species and plantation management. We conclude that the pattern of S. noctilio damage at different spatial scales is influenced by a combination of both inherent population dynamics and the underlying patterns of environmental factors. Our results have important implications for the understanding and management of invasive insect outbreaks in forest systems.

  4. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    PubMed Central

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  5. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    PubMed

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  6. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    PubMed

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.

  7. Green Leaf Volatiles: A Plant’s Multifunctional Weapon against Herbivores and Pathogens

    PubMed Central

    Scala, Alessandra; Allmann, Silke; Mirabella, Rossana; Haring, Michel A.; Schuurink, Robert C.

    2013-01-01

    Plants cannot avoid being attacked by an almost infinite number of microorganisms and insects. Consequently, they arm themselves with molecular weapons against their attackers. Plant defense responses are the result of a complex signaling network, in which the hormones jasmonic acid (JA), salicylic acid (SA) and ethylene (ET) are the usual suspects under the magnifying glass when researchers investigate host-pest interactions. However, Green Leaf Volatiles (GLVs), C6 molecules, which are very quickly produced and/or emitted upon herbivory or pathogen infection by almost every green plant, also play an important role in plant defenses. GLVs are semiochemicals used by insects to find their food or their conspecifics. They have also been reported to be fundamental in indirect defenses and to have a direct effect on pests, but these are not the only roles of GLVs. These volatiles, being probably one of the fastest weapons exploited, are also able to directly elicit or prime plant defense responses. Moreover, GLVs, via crosstalk with phytohormones, mostly JA, can influence the outcome of the plant’s defense response against pathogens. For all these reasons GLVs should be considered as co-protagonists in the play between plants and their attackers. PMID:23999587

  8. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    PubMed

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. © 2015 Society for Risk Analysis.

  9. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  10. Damage detection and isolation via autocorrelation: a step toward passive sensing

    NASA Astrophysics Data System (ADS)

    Chang, Y. S.; Yuan, F. G.

    2018-03-01

    Passive sensing technique may eliminate the need of expending power from actuators and thus provide a means of developing a compact and simple structural health monitoring system. More importantly, it may provide a solution for monitoring the aircraft subjected to environmental loading from air flow during operation. In this paper, a non-contact auto-correlation based technique is exploited as a feasibility study for passive sensing application to detect damage and isolate the damage location. Its theoretical basis bears some resemblance to reconstructing Green's function from diffusive wavefield through cross-correlation. Localized high pressure air from air compressor are randomly and continuously applied on the one side surface of the aluminum panels through the air blow gun. A laser Doppler vibrometer (LDV) was used to scan a 90 mm × 90 mm area to create a 6 × 6 2D-array signals from the opposite side of the panels. The scanned signals were auto-correlated to reconstruct a "selfimpulse response" (or Green's function). The premise for stably reconstructing the accurate Green's function requires long sensing times. For a 609.6 mm × 609.6 mm flat aluminum panel, the sensing times roughly at least four seconds is sufficient to establish converged Green's function through correlation. For the integral stiffened aluminum panel, the geometrical features of the panel expedite the formation of the diffusive wavefield and thus shorten the sensing times. The damage is simulated by gluing a magnet onto the panels. Reconstructed Green's functions (RGFs) are used for damage detection and damage isolation based on an imaging condition with mean square deviation of the RGFs from the pristine and the damaged structure and the results are shown in color maps. The auto-correlation based technique is shown to consistently detect the simulated damage, image and isolate the damage in the structure subjected to high pressure air excitation. This technique may be transformed into

  11. New estimates of lethality of sea lamprey (Petromyzon marinus) attacks on lake trout (Salvelinus namaycush): Implications for fisheries management

    USGS Publications Warehouse

    Madenjian, C.P.; Chipman, B.D.; Marsden, J.E.

    2008-01-01

    Sea lamprey (Petromyzon marinus) control in North America costs millions of dollars each year, and control measures are guided by assessment of lamprey-induced damage to fisheries. The favored prey of sea lamprey in freshwater ecosystems has been lake trout (Salvelinus namaycush). A key parameter in assessing sea lamprey damage, as well as managing lake trout fisheries, is the probability of an adult lake trout surviving a lamprey attack. The conventional value for this parameter has been 0.55, based on laboratory experiments. In contrast, based on catch curve analysis, mark-recapture techniques, and observed wounding rates, we estimated that adult lake trout in Lake Champlain have a 0.74 probability of surviving a lamprey attack. Although sea lamprey growth in Lake Champlain was lower than that observed in Lake Huron, application of an individual-based model to both lakes indicated that the probability of surviving an attack in Lake Champlain was only 1.1 times higher than that in Lake Huron. Thus, we estimated that lake trout survive a lamprey attack in Lake Huron with a probability of 0.66. Therefore, our results suggested that lethality of a sea lamprey attack on lake trout has been overestimated in previous model applications used in fisheries management. ?? 2008 NRC.

  12. Cross-Layer Damage Assessment for Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason

    Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.

  13. Singapore's Aarden City Construction and Green Building Development

    NASA Astrophysics Data System (ADS)

    Xiong, Chenhui; Chen, Jian

    2018-05-01

    The government of Singapore has a high demand for city construction planning always adhere to the implementation of "garden city " theory. Singapore’s government has been following the "sustainable" of Singapore's requirement and fully embodies the "green building" and "environmental protection"concept. To set the ecological construction and protection of water resources as the total target, minimize damage to the environment of economic development, make Singapore a pioneer "green building". In recent years, the Chinese government is promoting green building but harvest little, in this case, for the development of "green building", China can draw lessons from Singapore's experience.

  14. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    NASA Astrophysics Data System (ADS)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  15. [Studies on photo-electron-chemical catalytic degradation of the malachite green].

    PubMed

    Li, Ming-yu; Diao, Zeng-hui; Song, Lin; Wang, Xin-le; Zhang, Yuan-ming

    2010-07-01

    A novel two-compartment photo-electro-chemical catalytic reactor was designed. The TiO2/Ti thin film electrode thermally formed was used as photo-anode, and graphite as cathode and a saturated calomel electrode (SCE) as the reference electrode in the reactor. The anode compartment and cathode compartment were connected with the ionic exchange membrane in this reactor. Effects of initial pH, initial concentration of malachite green and connective modes between the anode compartment and cathode compartment on the decolorization efficiency of malachite green were investigated. The degradation dynamics of malachite green was studied. Based on the change of UV-visible light spectrum, the degradation process of malachite green was discussed. The experimental results showed that, during the time of 120 min, the decolouring ratio of the malachite green was 97.7% when initial concentration of malachite green is 30 mg x L(-1) and initial pH is 3.0. The catalytic degradation of malachite green was a pseudo-first order reaction. In the degradation process of malachite green the azo bond cleavage and the conjugated system of malachite green were attacked by hydroxyl radical. Simultaneity, the aromatic ring was oxidized. Finally, malachite green was degraded into other small molecular compounds.

  16. Clinical features of 27 shark attack cases on La Réunion Island.

    PubMed

    Ballas, Richard; Saetta, Ghislain; Peuchot, Charline; Elkienbaum, Philippe; Poinsot, Emmanuelle

    2017-05-01

    Between January 2000 and September 2016, there have been 27 documented shark attacks on La Réunion Island. The insular nature of La Réunion has allowed us to perform an extensive survey of these attacks. The objective was to describe the clinical features of these shark attacks, as only case reports have been published up to now. This was a retrospective observational study of the 27 cases of nonprovoked shark attacks that have occurred between January 2000 and September 2016. Post-humate predation, provoked attacks, and isolated attack on devices were excluded. All bone and vascular injuries were documented in the 21 remaining cases. Prehospital tourniquet use was specifically recorded. Among the 21 victims, eight died (38%) despite rapid use of resuscitation techniques in five cases when it was feasible; these techniques were not needed in the survivors. Thirteen patients were immediately treated in the operating room. Amputation or disarticulation occurred 13 times in 10 victims, five of whom died. Twelve injuries to major vascular structures were found in 11 victims, six of which died. A prehospital tourniquet was applied in four of the five surviving victims who had injuries to major vascular structures (including one victim with major humeral and femoral artery damage) and in one victim who died (the very proximal wound was not controlled). Our study found that quickly applying a tourniquet to the injured limb(s) contributes to the victim's survival. Disarticulation is a particular feature of shark attacks. The number and severity of shark attacks at La Réunion Island are worse than in the rest of the world. Epidemiological, level V.

  17. Interaction of insecticide and media moisture on ambrosia beetle (Coleoptera: Curculionidae) attacks on ornamental trees

    USDA-ARS?s Scientific Manuscript database

    Exotic ambrosia beetles, particularly Xylosandrus crassiusculus (Motschulsky) and Xylosandrus germanus (Blandford), are among the most economically damaging pests of ornamental trees in nurseries. Growers have had few tactics besides insecticide applications to reduce ambrosia beetle attacks but rec...

  18. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    NASA Astrophysics Data System (ADS)

    Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.

  19. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  20. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  1. Strength Loss in MA-MOX Green Pellets from Radiation Damage to Binders

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Paul A. Lessing; W.R. Cannon; Gerald W. Egeland

    The fracture strength of green Minor Actinides (MA)-MOX pellets containing 75 wt.% DUO2, 20 wt. % PuO2, 3 wt. % AmO2 and 2 wt. % NpO2 was studied as a function of storage time, after mixing in the binder and before sintering, to test the effect of radiation damage on binders. Fracture strength degraded continuously over the 10 days of the study for all three binders studied: PEG binder (Carbowax 8000), microcrystalline wax (Mobilcer X) and Styrene-acrylic copolymer (Duramax B1022) but the fracture strength of Duramax B1022 degraded the least. For instance, for several hours after mixing Carbowax 8000 withmore » MA MOX, the fracture strength of a pellet was reasonably high and pellets were easily handled without breaking but the pellets were too weak to handle after 10 days. Strength measured using diametral compression test showed strength degradation was more rapid in pellets containing 1.0 wt. % Carbowax PEG 8000 compared to those containing only 0.2 wt. %, suggesting that irradiation not only left the binder less effective but also reduced the pellet strength. In contrast the strength of pellets containing Duramax B1022 degraded very little over the 10 day period. It was suggested that the styrene portion of the Duramax B1022 copolymer provided the radiation resistance.« less

  2. Effects of single dose and regular intake of green tea (Camellia sinensis) on DNA damage, DNA repair, and heme oxygenase-1 expression in a randomized controlled human supplementation study.

    PubMed

    Ho, Cyrus K; Choi, Siu-wai; Siu, Parco M; Benzie, Iris F F

    2014-06-01

    Regular intake of green tea (Camellia sinensis) lowers DNA damage in humans, but molecular mechanisms of genoprotection are not clear. Protection could be via direct antioxidant effects of tea catechins, but, paradoxically, catechins have pro-oxidant activity in vitro, and it is hypothesized that mechanisms relate to redox-sensitive cytoprotective adaptations. We investigated this hypothesis, focusing particularly on effects on the DNA repair enzyme human oxoguanine glycosylase 1 (hOGG1), and heme oxygenase-1, a protein that has antioxidant and anti-inflammatory effects. A randomized, placebo-controlled, human supplementation study of crossover design was performed. Subjects (n = 16) took a single dose (200 mL of 1.5%, w/v) and 7-days of (2 × 200 mL 1%, w/v per day) green tea (with water as control treatment). Lymphocytic DNA damage was ∼30% (p < 0.001) lower at 60 and 120 min after the single dose and in fasting samples collected after 7-day tea supplementation. Lymphocytic hOGG1 activity was higher (p < 0.0001) at 60 and 120 min after tea ingestion. Significant increases (p < 0.0005) were seen in hOGG1 activity and heme oxygenase-1 after 7 days. Results indicate that molecular triggering of redox-sensitive cytoprotective adaptations and posttranslational changes affecting hOGG1 occur in vivo in response to both a single dose and regular intake of green tea, and contribute to the observed genoprotective effects of green tea. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  3. ICS logging solution for network-based attacks using Gumistix technology

    NASA Astrophysics Data System (ADS)

    Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan

    2013-05-01

    Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.

  4. Green Chile Pepper Harvest Mechanization

    USDA-ARS?s Scientific Manuscript database

    Pungent green chile (genus /Capsicum/, also spelled chili) is a large, fragile fruit growing on berry shrubs. Chile is harvested by hand to maximize yields and minimize fruit damage. Labor for hand harvesting chile is increasingly costly and difficult to obtain. Harvest mechanization is viewed as...

  5. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    PubMed Central

    Moisan, Frédéric; Gonzalez, Cleotilde

    2017-01-01

    Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557

  6. Green commercial building insurance in Malaysia

    NASA Astrophysics Data System (ADS)

    Yang, Yu Xin Ou; Chew, Boon Cheong; Loo, Heoy Shin; Tan, Lay Hong

    2017-03-01

    Green building construction is growing tremendously globally even in Malaysia. Currently, there are approximate 636 buildings have registered and to be certified with Green Building Index. Among these buildings, 45 buildings have already fulfilled the requirements and fully certified. The other buildings still under provisional certification stage. Malaysia had adopted Green Building Index in 2009 to support a move to promote green building concept. Malaysia starts to move towards green building because Malaysian construction and building industry realizes that both energy consumed and waste produced are reduced without irreversible impacts to ecosystems. Consequently, insurance companies such as Fireman's Fund from America has started the green building insurance policies for their green building in the year of 2006, while Malaysia still remain the coverage for green buildings using conventional property insurance. There are lacks of efforts to be seen from insurance companies to propose green building insurance for these green buildings. There are a few factors which can take into consideration for insurance companies to start the very first green building insurance in Malaysia. Although there are challenges, some efficient strategies have been identified to overcome the problems. The methods used in this research topic is qualitative research. The results obtained shows that green commercial building insurance has a huge business opportunity in Malaysia because the number of green commercial buildings are increasing tremendously in Malaysia. It is a favor to implement green building insurance in Malaysia. Furthermore, insurance companies can consider to add in extra coverage in standard building policy to provide extra protection for non-certified green buildings which have the intention to rebuilt in green when damage happens. Generally, it is very important to introduce green commercial buildings insurance into Malaysia so that all of the green commercial

  7. Towards green loyalty: the influences of green perceived risk, green image, green trust and green satisfaction

    NASA Astrophysics Data System (ADS)

    Chrisjatmiko, K.

    2018-01-01

    The paper aims to present a comprehensive framework for the influences of green perceived risk, green image, green trust and green satisfaction to green loyalty. The paper also seeks to account explicitly for the differences in green perceived risk, green image, green trust, green satisfaction and green loyalty found among green products customers. Data were obtained from 155 green products customers. Structural equation modeling was used in order to test the proposed hypotheses. The findings show that green image, green trust and green satisfaction has positive effects to green loyalty. But green perceived risk has negative effects to green image, green trust and green satisfaction. However, green perceived risk, green image, green trust and green satisfaction also seems to be a good device to gain green products customers from competitors. The contributions of the paper are, firstly, a more complete framework of the influences of green perceived risk, green image, green trust and green satisfaction to green loyalty analyses simultaneously. Secondly, the study allows a direct comparison of the difference in green perceived risk, green image, green trust, green satisfaction and green loyalty between green products customers.

  8. Seven Deadliest Network Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less

  9. Reactions of green lizards (Lacerta viridis) to major repellent compounds secreted by Graphosoma lineatum (Heteroptera: Pentatomidae).

    PubMed

    Gregorovičová, Martina; Černíková, Alena

    2015-06-01

    The chemical defence of Heteroptera is primarily based on repellent secretions which signal the potential toxicity of the bug to its predators. We tested the aversive reactions of green lizards (Lacerta viridis) towards the major compounds of the defensive secretion of Graphosoma lineatum, specifically: (i) a mixture of three aldehydes: (E)-hex-2-enal, (E)-oct-2-enal, (E)-dec-2-enal; (ii) a mixture of these three aldehydes and tridecane; (iii) oxoaldehyde: (E)-4-oxohex-2-enal; (iv) secretion extracted from metathoracic scent glands of G. lineatum adults and (v) hexane as a non-polar solvent. All chemicals were presented on a palatable food (Tenebrio molitor larvae). The aversive reactions of the green lizards towards the mealworms were evaluated by observing the approach latencies, attack latencies and approach-attack intervals. The green lizards exhibited a strong aversive reaction to the mixture of three aldehydes. Tridecane reduced the aversive reaction to the aldehyde mixture. Oxoaldehyde caused the weakest, but still significant, aversive reaction. The secretion from whole metathoracic scent glands also clearly had an aversive effect on the green lizards. Moreover, when a living specimen of G. lineatum or Pyrrhocoris apterus (another aposematic red-and-black prey) was presented to the green lizards before the trials with the aldehyde mixture, the aversive effect of the mixture was enhanced. In conclusion, the mixture of three aldehydes had the strong aversive effect and could signal the potential toxicity of G. lineatum to the green lizards. Copyright © 2015 Elsevier GmbH. All rights reserved.

  10. Network information attacks on the control systems of power facilities belonging to the critical infrastructure

    NASA Astrophysics Data System (ADS)

    Loginov, E. L.; Raikov, A. N.

    2015-04-01

    The most large-scale accidents occurred as a consequence of network information attacks on the control systems of power facilities belonging to the United States' critical infrastructure are analyzed in the context of possibilities available in modern decision support systems. Trends in the development of technologies for inflicting damage to smart grids are formulated. A volume matrix of parameters characterizing attacks on facilities is constructed. A model describing the performance of a critical infrastructure's control system after an attack is developed. The recently adopted measures and legislation acts aimed at achieving more efficient protection of critical infrastructure are considered. Approaches to cognitive modeling and networked expertise of intricate situations for supporting the decision-making process, and to setting up a system of indicators for anticipatory monitoring of critical infrastructure are proposed.

  11. Heart Attack Recovery FAQs

    MedlinePlus

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Efficient initial attacks: analysis of capacity and funding provides insights to wildfire protection planning

    Treesearch

    Jeremy Fried; Paul Meznarich

    2014-01-01

    Large wildfires in the United States pose significant challenges to fire management agencies charged with protecting lives, property, and natural resources. A vigorous initial response to a wildfire, a process referred to as "initial attack," can greatly reduce the likelihood of the fire becoming larger and causing substantial damage. Successful...

  13. Green Synthesized Zinc Oxide (ZnO) Nanoparticles Induce Oxidative Stress and DNA Damage in Lathyrus sativus L. Root Bioassay System.

    PubMed

    Panda, Kamal K; Golari, Dambaru; Venugopal, A; Achary, V Mohan M; Phaomei, Ganngam; Parinandi, Narasimham L; Sahu, Hrushi K; Panda, Brahma B

    2017-05-18

    Zinc oxide nanoparticles (ZnONP-GS) were synthesised from the precursor zinc acetate (Zn(CH₃COO)₂) through the green route using the milky latex from milk weed ( Calotropis gigantea L. R. Br) by alkaline precipitation. Formation of the ZnONP-GS was monitored by UV-visible spectroscopy followed by characterization and confirmation by energy-dispersive X-ray spectroscopy (EDX), transmission electron microscopy (TEM), and X-ray diffraction (XRD). Both the ZnONP-GS and the commercially available ZnONP-S (Sigma-Aldrich) and cationic Zn 2+ from Zn(CH₃COO)₂ were tested in a dose range of 0-100 mg·L -1 for their potency (i) to induce oxidative stress as measured by the generation reactive oxygen species (ROS: O₂ •- , H₂O₂ and • OH), cell death, and lipid peroxidation; (ii) to modulate the activities of antioxidant enzymes: catalase (CAT), superoxide dismutase (SOD), guaiacol peroxidase (GPX), and ascorbate peroxidase (APX); and (iii) to cause DNA damage as determined by Comet assay in Lathyrus sativus L. root bioassay system. Antioxidants such as Tiron and dimethylthiourea significantly attenuated the ZnONP-induced oxidative and DNA damage, suggesting the involvement of ROS therein. Our study demonstrated that both ZnONP-GS and ZnONP-S induced oxidative stress and DNA damage to a similar extent but were significantly less potent than Zn 2+ alone.

  14. Safety assessment of green tea based beverages and dried green tea extracts as nutritional supplements.

    PubMed

    Dekant, Wolfgang; Fujii, Kenkichi; Shibata, Eiichiro; Morita, Osamu; Shimotoyodome, Akira

    2017-08-05

    The safety of green tea infusions and green tea extract (GTE)-based products is reviewed regarding catechins. Epigallocatechin 3-gallate (EGCG), the major catechin present in green tea, is suspected of being responsible for liver toxicity reported in humans consuming food supplements. Intake of EGCG with green tea infusions and GTE-based beverages is up to about 450mg EGCG/person/day in Europe and higher in Asia. Consumption of green tea is not associated with liver damage in humans, and green tea infusion and GTE-based beverages are considered safe in the range of historical uses. In animal studies, EGCG's potency for liver effects is highly dependent on conditions of administration. Use of NOAELs from bolus administration to derive a tolerable upper intake level applying the margin of safety concept results in acceptable EGCG-doses lower than those from one cup of green tea. NOAELs from toxicity studies applying EGCG with diet/split of the daily dose are a better point of departure for risk characterization. In clinical intervention studies, liver effects were not observed after intakes below 600mg EGCG/person/day. Thus, a tolerable upper intake level of 300mg EGCG/person/day is proposed for food supplements; this gives a twofold safety margin to clinical studies that did not report liver effects and a margin of safety of 100 to the NOAELs in animal studies with dietary administration of green tea catechins. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Suppression of bacterial blight on mustard greens with host plant resistance and Acibenzolar-S-Methyl

    USDA-ARS?s Scientific Manuscript database

    Bacterial blight, caused by Pseudomonas cannabina pv. alisalensis, attacks the leaves of most brassica vegetables, including mustard greens (Brassica juncea). ‘Carolina Broadleaf,’ a new mustard cultivar, is resistant to bacterial blight. Acibenzolar-S-methyl (trade name Actigard) has been used to m...

  16. Prevention of Noise Damage to Cochlear Synapses

    DTIC Science & Technology

    2015-10-01

    AWARD NUMBER: W81XWH-14-1-0494 TITLE: Prevention of Noise Damage to Cochlear Synapses PRINCIPAL INVESTIGATOR: Steven Green CONTRACTING...to Cochlear Synapses 5a. CONTRACT NUMBER 5b. GRANT NUMBER W81XWH-14-1-0494 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Steven Green 5d. PROJECT...ABSTRACT Noise-induced synaptopathy is the result of excitotoxic trauma to cochlear synapses due to glutamate released from the hair cells. Excitotoxic

  17. Adverse effects of concentrated green tea extracts.

    PubMed

    Schönthal, Axel H

    2011-06-01

    A myriad of health claims are being made in favor of the consumption of green tea. However, mostly due to the easy availability and greater than ever popularity of highly concentrated green tea extracts, sometimes combined with an attitude of more-is-better, certain health risks of green tea consumption have begun to emerge. Among such risks are the possibility of liver damage, the potential to interact with prescription drugs to alter their therapeutic efficacy, and the chance to cause harm when combined with other highly popular herbal remedies. This review will summarize documented examples of adverse effects of green tea in humans, and will discuss risks of copious consumption of highly concentrated green tea extracts as indicated by studies in animals. While there is no intention to minimize any of the scientifically established benefits of the use of green tea, the purpose of this review is to focus primarily on the potential for adverse effects and raise awareness of the rare, yet under-appreciated risks. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Hydrogen attack in Cr-Mo steels. [3Cr-1. 5Mo and 2. 25Cr-1Mo steels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruoff, S.; Stone, D.; Wanagel, J.

    Experiments conducted upon 3Cr-1.5Mo steel at elevated temperatures (600 C), and high pressure hydrogen (2000 psi), have shown a greater resistence to hydrogen attack compared with similar studies of 2.25Cr-lMo steels. Hydrogen exposure tests with and without an applied stress have been performed on both types of steels. Results of similar conditions show clear evidence of hydrogen attack in 2.25Cr-lMo steel, however, for the 3Cr-1.5Mo steel with exposure time up to 80 days without an applied stress no evidence of hydrogen attack is observed. For stress-rupture tests using stresses of 14 and 16 ksi, the 3Cr-1.5Mo steel showed no effectsmore » of hydrogen attack, and no damage was observed using a SEM.« less

  19. Compound mechanism of fatal neck injury: A case report of a tiger attack in a zoo.

    PubMed

    Szleszkowski, Łukasz; Thannhäuser, Agata; Jurek, Tomasz

    2017-08-01

    Fatal injuries caused by attacks by large wild cats are extremely rare in forensic medical practice in Europe. There are very few cases described in the forensic medical literature concerning incidents in zoos similar to the tiger attack on a 58-year-old male zoo employee that we present here. While preparing a runway for tigers, the man was attacked by a male Sumatran tiger. Another zoo employee was an eyewitness to the accident; in his testimony he described the sequence of events in detail. The autopsy showed the injuries typical of a tiger attack: traces of claws and canine teeth indicating that the victim of the attack was knocked down from behind, along with deep and extensive fatal wounds to the neck. The injuries were inflicted by means of a compound mechanism: tissues were penetrated by the animal's canines, crushed with great force (transfixing injury), and violently distended. The skin revealed four characteristic deep wounds caused by canines as well as bite marks resulting from the action of six incisors. The neck area revealed extensive damage, including torn muscles, the esophagus and trachea, large blood vessels of the neck, and fractures of vertebrae C2 and C5 with internal channels resulting directly from penetration by the animal's canines. The mechanism of distension, as a result of the animal jerking its head after biting the victim in the neck, produced a complete tear of the spine and the vertebral arteries, as well as an intramural rupture of the carotid arteries which has never been described before. In the interests of a detailed assessment of bone damage, the cervical spine was macerated. The applied autopsy techniques and detailed analysis of injuries enabled us to demonstrate the compound mechanism that inflicted them, combining penetration of tissues by the canines, crushing, and distension. Copyright © 2017. Published by Elsevier B.V.

  20. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    PubMed

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented.

  1. Transient Ischemic Attack

    MedlinePlus Videos and Cool Tools

    Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood ... The only difference between a stroke and TIA is that with TIA the blockage is transient (temporary). ...

  2. Repair of Oxidative DNA Damage in Saccharomyces cerevisiae.

    PubMed

    Chalissery, Jisha; Jalal, Deena; Al-Natour, Zeina; Hassan, Ahmed H

    2017-03-01

    Malfunction of enzymes that detoxify reactive oxygen species leads to oxidative attack on biomolecules including DNA and consequently activates various DNA repair pathways. The nature of DNA damage and the cell cycle stage at which DNA damage occurs determine the appropriate repair pathway to rectify the damage. Oxidized DNA bases are primarily repaired by base excision repair and nucleotide incision repair. Nucleotide excision repair acts on lesions that distort DNA helix, mismatch repair on mispaired bases, and homologous recombination and non-homologous end joining on double stranded breaks. Post-replication repair that overcomes replication blocks caused by DNA damage also plays a crucial role in protecting the cell from the deleterious effects of oxidative DNA damage. Mitochondrial DNA is also prone to oxidative damage and is efficiently repaired by the cellular DNA repair machinery. In this review, we discuss the DNA repair pathways in relation to the nature of oxidative DNA damage in Saccharomyces cerevisiae. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Formosan and native subterranean termite attack of pressure-treated SPF wood species exposed in Louisiana

    Treesearch

    Stan Lebow; Todd Shupe; Bessie Woodward; Douglas Crawford; Brian Via; Cherilyn Hatfield

    2006-01-01

    This study evaluated the relative ability of three types of wood preservatives to inhibit attack by Formosan subterranean termites (FST) (Coptotermes formosanus Shiraki) and native subterranean termites (Reticulitermes spp.). The study also evaluated the roles of preservative retention and penetration in preventing termite damage. Sections of boards from six wood...

  4. 76 FR 78228 - Notice of Request for Extension of Approval of an Information Collection; Citrus Greening and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-16

    ... asiaticus'' that attacks the vascular system of host plants. Citrus greening greatly reduces production... DEPARTMENT OF AGRICULTURE Animal and Plant Health Inspection Service [Docket No. APHIS-2011-0105... Citrus Psyllid; Quarantine and Interstate Movement Regulations AGENCY: Animal and Plant Health Inspection...

  5. Strategically placing green infrastructure: cost-effective land conservation in the floodplain.

    PubMed

    Kousky, Carolyn; Olmstead, Sheila M; Walls, Margaret A; Macauley, Molly

    2013-04-16

    Green infrastructure approaches have attracted increased attention from local governments as a way to lower flood risk and provide an array of other environmental services. The peer-reviewed literature, however, offers few estimates of the economic impacts of such approaches at the watershed scale. We estimate the avoided flood damages and the costs of preventing development of floodplain parcels in the East River Watershed of Wisconsin's Lower Fox River Basin. Results suggest that the costs of preventing conversion of all projected floodplain development would exceed the flood damage mitigation benefits by a substantial margin. However, targeting of investments to high-benefit, low-cost parcels can reverse this equation, generating net benefits. The analysis demonstrates how any flood-prone community can use a geographic-information-based model to estimate the flood damage reduction benefits of green infrastructure, compare them to the costs, and target investments to design cost-effective nonstructural flood damage mitigation policies.

  6. Descriptive Study of Damage Caused by the Rhinoceros Beetle, Oryctes agamemnon, and Its Influence on Date Palm Oases of Rjim Maatoug, Tunisia

    PubMed Central

    Soltani, Rasmi; lkbel, Chaieb; Habib Ben Hamouda, Med

    2008-01-01

    Oryctes agamemnon (Burmeister 1847) (Coleoptera, Scarabaeidae) was accidentally introduced in the southwestern oases of Tunisia (Tozeur) around 1980 and spread to the Rjim Maatoug region. In these areas O. agamemnon was specific to date palm trees causing severe damage that can result in potential danger due to collapse of the tree. This study was conducted from April 2004 to March 2006 in 4 sites in the region of Rjim Maatoug. Different levels of palm tree attack were determined, ovioposition sites were identified, and pest damage was described in detail to specify their relative importance and to indicate factors governing palm tree attack. Eggs were individually oviposited in the attacked parts. Dead parts of palm trees were the main target of O. agamemnon including the respiratory roots, tough, trunk bark, dry petiole and the periphery of the crown. The crown itself was not attacked. Feeding by larvae caused significant damage. The biggest danger occurred when heavy attacks of larvae invaded the respiratory roots at the level of the soil, and secondarily on the periphery of the crown, which can result in fungal diseases. Several cases of Deglet Nour date palm tree collapse were caused by this pest in Rjim Maatoug. Attacks on other parts of the tree were without danger for the palm tree. In the absence of pest management, application of a quarantine program combined with field cultivation techniques could help farmers significantly decrease attack of O. agamemnon on palm trees. PMID:20302545

  7. Descriptive study of damage caused by the rhinoceros beetle, Oryctes agamemnon, and its influence on date palm oases of Rjim Maatoug, Tunisia.

    PubMed

    Soltani, Rasmi; Lkbel, Chaieb; Habib Ben Hamouda, Med

    2008-01-01

    Oryctes agamemnon (Burmeister 1847) (Coleoptera, Scarabaeidae) was accidentally introduced in the southwestern oases of Tunisia (Tozeur) around 1980 and spread to the Rjim Maatoug region. In these areas O. agamemnon was specific to date palm trees causing severe damage that can result in potential danger due to collapse of the tree. This study was conducted from April 2004 to March 2006 in 4 sites in the region of Rjim Maatoug. Different levels of palm tree attack were determined, ovioposition sites were identified, and pest damage was described in detail to specify their relative importance and to indicate factors governing palm tree attack. Eggs were individually oviposited in the attacked parts. Dead parts of palm trees were the main target of O. agamemnon including the respiratory roots, tough, trunk bark, dry petiole and the periphery of the crown. The crown itself was not attacked. Feeding by larvae caused significant damage. The biggest danger occurred when heavy attacks of larvae invaded the respiratory roots at the level of the soil, and secondarily on the periphery of the crown, which can result in fungal diseases. Several cases of Deglet Nour date palm tree collapse were caused by this pest in Rjim Maatoug. Attacks on other parts of the tree were without danger for the palm tree. In the absence of pest management, application of a quarantine program combined with field cultivation techniques could help farmers significantly decrease attack of O. agamemnon on palm trees.

  8. Economic burden of gouty arthritis attacks for employees with frequent and infrequent attacks.

    PubMed

    Lynch, Wendy; Chan, Wing; Kleinman, Nathan; Andrews, L M; Yadao, Anthony M

    2013-04-01

    The objective of this study was to compare episode-related and annual costs and work absence days for employees with <3 versus ≥ 3 annual gout attacks. Human Capital Management Services data (2009-2010) from adult employees with gout (International Classification of Diseases, Ninth Revision code 274.x) and ≥ 12 months of medical and pharmacy benefits were studied. Outcomes of interest included medical and drug costs, number of emergency department and urgent care visits, number of inpatient days, short- and long-term disability, sick leave, workers' compensation costs, and work absence days. An algorithm based on diagnosis code and antigout medication use identified acute gout treatment episodes. Multivariate analysis compared annual and pre-episode vs. during-episode outcomes for employees with ≥ 3 vs. <3 gout annual attacks. Of 3361 employees with gout, 76 had ≥ 3 attacks; these employees had higher short-term disability costs ($1663 vs. $643, P=0.06) and days (11.68 versus 4.61, P<0.05), more emergency room visits (0.55 vs. 0.23, P<0.0001), and urgent care visits (0.07 vs. 0.04, P<0.01), and lower pharmacy costs ($1677 vs. $1108, P<0.0001) than those with <3 attacks. Medical costs both before ($203 higher) and during attacks ($136 higher) were significantly higher for those with ≥ 3 attacks than for those with <3 attacks. Additionally, a quadratic increasing relationship was found between number of attacks and cost. Frequency of acute gout attacks (≥ 3 episodes per year) among employees with gout was associated with greater short-term disability cost, absence days, and emergency department and urgent care visits, and trends toward higher overall costs.

  9. Remote damage control during the attacks on Paris: Lessons learned by the Paris Fire Brigade and evolutions in the rescue system.

    PubMed

    Lesaffre, Xavier; Tourtier, Jean-Pierre; Violin, Yann; Frattini, Benoit; Rivet, Catherine; Stibbe, Olivier; Faure, Florian; Godefroy, Anne; Gallet, Jean-Claude; Ausset, Sylvain

    2017-06-01

    On November 13, 2015, in 40 minutes, Paris suffered four suicide bombers attacks; shootings at three different restaurant terraces; and an attack on the Bataclan concert hall, resulting in 130 dead and 495 wounded. How did the Parisian rescue system respond and how did it evolve since?We proved we could deploy quickly wide prehospital and hospital resources and teams' equipment and preparedness is being further developed. To secure a swifter initial response, we need a better integration of the operators of the rescue chain with a simpler and more robust organization as well as improved communications channels. We must continue to anticipate and prepare for possible future attacks.

  10. Green Synthesized Zinc Oxide (ZnO) Nanoparticles Induce Oxidative Stress and DNA Damage in Lathyrus sativus L. Root Bioassay System

    PubMed Central

    Panda, Kamal K.; Golari, Dambaru; Venugopal, A.; Achary, V. Mohan M.; Phaomei, Ganngam; Parinandi, Narasimham L.; Sahu, Hrushi K.; Panda, Brahma B.

    2017-01-01

    Zinc oxide nanoparticles (ZnONP-GS) were synthesised from the precursor zinc acetate (Zn(CH3COO)2) through the green route using the milky latex from milk weed (Calotropis gigantea L. R. Br) by alkaline precipitation. Formation of the ZnONP-GS was monitored by UV-visible spectroscopy followed by characterization and confirmation by energy-dispersive X-ray spectroscopy (EDX), transmission electron microscopy (TEM), and X-ray diffraction (XRD). Both the ZnONP-GS and the commercially available ZnONP-S (Sigma-Aldrich) and cationic Zn2+ from Zn(CH3COO)2 were tested in a dose range of 0–100 mg·L−1 for their potency (i) to induce oxidative stress as measured by the generation reactive oxygen species (ROS: O2•−, H2O2 and •OH), cell death, and lipid peroxidation; (ii) to modulate the activities of antioxidant enzymes: catalase (CAT), superoxide dismutase (SOD), guaiacol peroxidase (GPX), and ascorbate peroxidase (APX); and (iii) to cause DNA damage as determined by Comet assay in Lathyrus sativus L. root bioassay system. Antioxidants such as Tiron and dimethylthiourea significantly attenuated the ZnONP-induced oxidative and DNA damage, suggesting the involvement of ROS therein. Our study demonstrated that both ZnONP-GS and ZnONP-S induced oxidative stress and DNA damage to a similar extent but were significantly less potent than Zn2+ alone. PMID:28524089

  11. Mathematical modeling of damage function when attacking file server

    NASA Astrophysics Data System (ADS)

    Kozlov, V. G.; Skrypnikov, A. V.; Chernyshova, E. V.; Mogutnov, R. V.; Levushkin, D. M.

    2018-05-01

    The development of information technologies in Russia and the prospects for their further improvement allow us to identify a stable trend of expansion of both functions of the corresponding automated information systems (AIS) and the spheres of their application. At the same time, many threats to information processes in the AIS are expanding, which in turn stimulates the development of adequate means and systems for ensuring the information security of the AS and methods for assessing their protection. It is necessary to assess the ability of the system to continue its normal functioning under the conditions of permanent destructive influences and to resist them, to adapt the functioning algorithms to new conditions and to organize functional restoration or to ensure functioning with a gradual process of degradation, possibly without losing the most significant “critical” information functions. The analysis and evaluation of reliability are needed to be transformed into the analysis and evaluation of survivability. Survivability can be considered as the ability of the information system to store and restore the performance of basic functions in a given volume and for a given time in the case of a change in the system structure and / or algorithms and the conditions of its functioning due to adverse effects. One of the system survivability indicators is the reserve of survivability (S-survivability) that is the critical number of defects reduced by a unit. The authors will consider defect as a unit of measurement of damage to the information system by adverse impact. U is denoted as the critical number of defects, then S = 1-U is the index of S-survivability. The article gives the definition of an analytical formula for the function of damage and risk.

  12. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    PubMed Central

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-01

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies. PMID:28098846

  13. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.

    PubMed

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-15

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  14. Assessing forest damage in high-elevation coniferous forests in Vermont and New Hampshire using Thematic Mapper data

    NASA Technical Reports Server (NTRS)

    Vogelmann, James E.; Rock, Barrett N.

    1988-01-01

    This study evaluates the potential of measuring/mapping forest damage in spruce-fir forests in the Green Mountains of Vermont and White Mountains of New Hampshire using Landsat Thematic Mapper (TM) data. The TM 1.65/0.83-micron (TM5/4) and 2.22/0.83-micron (TM7/4) band ratios were found to correlate well with ground-based measurements of forest damage (a measure of percentage foliar loss) at 11 spruce-fir stands located on Camels Hump, a mountain in northern Vermont. Images using 0.56 and 1.65-micron bands with 1.65/0.83-micron band ratios indicated locations of heavy conifer forest damage. Both 1.65/0.83 and 2.22/0.83-micron band ratios were used to quantify levels of conifer forest damage among individual mountains throughout many of the Green and White Mountains. Damage was found to be consistently higher for the Green than the White Mountains.

  15. Cyber-Physical Attacks With Control Objectives

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-08-18

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  16. Cyber-Physical Attacks With Control Objectives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less

  17. Invisible Trojan-horse attack.

    PubMed

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  18. Degradation pathway of malachite green in a novel dual-tank photoelectrochemical catalytic reactor.

    PubMed

    Diao, Zenghui; Li, Mingyu; Zeng, Fanyin; Song, Lin; Qiu, Rongliang

    2013-09-15

    A novel dual-tank photoelectrochemical catalytic reactor was designed to investigate the degradation pathway of malachite green. A thermally formed TiO₂/Ti thin film electrode was used as photoanode, graphite was used as cathode, and a saturated calomel electrode was employed as the reference electrode in the reactor. In the reactor, the anode and cathode tanks were connected by a cation exchange membrane. Results showed that the decolorization ratio of malachite green in the anode and cathode was 98.5 and 96.5% after 120 min, respectively. Malachite green in the two anode and cathode tanks was oxidized, achieving the bipolar double effect. Malachite green in both the anode and cathode tanks exhibited similar catalytic degradation pathways. The double bond of the malachite green molecule was attacked by strong oxidative hydroxyl radicals, after which the organic compound was degraded by the two pathways into 4,4-bis(dimethylamino) benzophenone, 4-(dimethylamino) benzophenone, 4-(dimethylamino) phenol, and other intermediate products. Eventually, malachite green was degraded into oxalic acid as a small molecular organic acid, which was degraded by processes such as demethylation, deamination, nitration, substitution, addition, and other reactions. Copyright © 2013 Elsevier B.V. All rights reserved.

  19. Correlated Attack Modeling (CAM)

    DTIC Science & Technology

    2003-10-01

    describing attack models to a scenario recognition engine, a prototype of such an engine was developed, using components of the EMERALD intrusion...content. Results – The attacker gains information enabling remote access to database (i.e., privileged login information, database layout to allow...engine that uses attack specifications written in CAML. The implementation integrates two advanced technologies devel- oped in the EMERALD program [27, 31

  20. Blind Data Attack on BGP Routers

    DTIC Science & Technology

    2017-03-01

    implement blind attack protection, leaving long -standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This...protection measures should a discovered vulnerability reduce attack complexity. 14. SUBJECT TERMS BGP, TCP, blind attack, blind data attack 15. NUMBER OF...implementations may not properly implement blind attack protection, leaving long -standing connections, such as BorderGateway Protocol (BGP) sessions

  1. Alligator attacks in southwest Florida.

    PubMed

    Harding, Brett E; Wolf, Barbara C

    2006-05-01

    The American alligator inhabits bodies of fresh water in Florida and other southeastern states. Although attacks on pets are frequent, alligator attacks on humans are relatively rare because of the animal's natural fear of man. Because of the rarity of attacks on humans, the pathologic findings and pathophysiology of death in such cases have not been well characterized in the literature. We report three cases of fatal alligator attacks that occurred in southwest Florida, each with different pathologic findings and mechanisms of death. Although the cause of death in each case was attributed to the alligator attack, the mechanisms of death differed and included exsanguination because of amputation of an extremity, overwhelming sepsis, and drowning. These cases illustrate the varied pathophysiologies associated with deaths due to alligator attacks on humans and the features that distinguish alligator bites from those of other aquatic predators.

  2. Protective effect of green tea polyphenol EGCG against neuronal damage and brain edema after unilateral cerebral ischemia in gerbils.

    PubMed

    Lee, Hyung; Bae, Jae Hoon; Lee, Seong-Ryong

    2004-09-15

    Previous studies have demonstrated that a green tea polyphenol, (-)-epigallocatechine gallate (EGCG), has a potent free radical scavenging and antioxidant effect. Glutamate leads to excitotoxicity and oxidative stress, which are important pathophysiologic responses to cerebral ischemia resulting in brain edema and neuronal damage. We investigated the effect of EGCG on excitotoxic neuronal damage in a culture system and the effect on brain edema formation and lesion after unilateral cerebral ischemia in gerbils. In vitro, excitotoxicity was induced by 24-hr incubation with N-methyl-D-aspartate (NMDA; 10 microM), AMPA (10 microM), or kainate (20 microM). EGCG (5 microM) was added to the culture media alone or with excitotoxins. We examined malondialdehyde (MDA) level and neuronal viability to evaluate the effect of EGCG. In vivo, unilateral cerebral ischemia was induced by occlusion of the right common carotid artery for 30, 60, or 90 min and followed by reperfusion of 24 hr. Brain edema, MDA, and infarction were examined to evaluate the protective effect of EGCG. EGCG (25 or 50 mg/kg, intraperitoneally) was administered twice, at 30 min before and immediately after ischemia. EGCG reduced excitotoxin-induced MDA production and neuronal damage in the culture system. In the in vivo study, treatment of gerbils with the lower EGCG dose failed to show neuroprotective effects; however, the higher EGCG dose attenuated the increase in MDA level caused by cerebral ischemia. EGCG also reduced the formation of postischemic brain edema and infarct volume. These results demonstrate EGCG may have future possibilities as a neuroprotective agent against excitotoxicity-related neurologic disorders such as brain ischemia.

  3. Background of Civil Defense and Current Damage Limiting Studies.

    ERIC Educational Resources Information Center

    Romm, Joseph

    A brief history of civil defense administration precedes analysis of nuclear attack conditions and the influence of protective measures. Damage limitation procedure is explained in terms of--(1) blast effects, (2) radiation doses, (3) geographical fallout distribution patterns, and (4) national shelter needs. Major concept emphasis relates to--(1)…

  4. Developing a Media Moisture Threshold for Nurseries to Reduce Tree Stress and Ambrosia Beetle Attacks.

    PubMed

    Frank, Steven D; Ranger, Christopher M

    2016-08-01

    Exotic ambrosia beetles are among the most damaging pests of trees grown in nurseries. The primary pests Xylosandrus crassiusculus Motschulsky and Xylosandrus germanus Blandford use ethanol to locate vulnerable trees. Research, primarily with X. germanus, has shown that flood-stressed trees emit ethanol and are preferentially attacked by ambrosia beetles. Our goal was to develop a media (also called potting soil) moisture threshold as an integrated pest management (IPM) tactic and assess grower practices that lead to ambrosia beetle attacks. Flooded Cornus florida L., Cornus kousa Burg., and Magnolia grandiflora L. trees incurred more attacks than unflooded trees that were not attacked. To determine optimal media moisture levels, we grew flood-tolerant Acer rubrum L. and flood-intolerant C. florida in containers with 10, 30, 50, 70, or 90% media moisture. No flooded or unflooded A. rubrum were attacked. However, C. florida grown in 70 or 90% moisture were attacked and died, whereas trees at 30 and 50% moisture were not attacked. Thus, we suggest an upper moisture threshold of 50% when growing C. florida and other flood-intolerant trees. However, during peak ambrosia beetle flight activity in spring 2013 and 2014, we found that media moisture levels in commercial nurseries were often between 50 and 90%. Implementing a media moisture threshold, as a new IPM tool, could reduce ambrosia beetle attacks and the need for insecticide applications, which is currently the only available management tactic. Future research should focus on how changes in substrates, irrigation, and other practices could help growers meet this threshold. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. Interaction of Insecticide and Media Moisture on Ambrosia Beetle (Coleoptera: Curculionidae) Attacks on Selected Ornamental Trees.

    PubMed

    Frank, Steven D; Anderson, Amanda L; Ranger, Christopher M

    2017-12-08

    Exotic ambrosia beetles, particularly Xylosandrus crassiusculus (Motschulsky) (Coleoptera: Curculionidae: Scolytinae) and Xylosandrus germanus (Blandford) (Coleoptera: Curculionidae: Scolytinae), are among the most damaging pests of ornamental trees in nurseries. Growers have had few tactics besides insecticide applications to reduce ambrosia beetle attacks but recent research has shown that attacks may be reduced by maintaining media moisture below a 50% threshold thereby reducing flood stress. We compared the efficacy of managing media moisture and insecticide applications for reducing ambrosia beetle attacks on three ornamental tree species in North Carolina. During trials in spring 2013 and 2015, flooded Cornus florida and Cornus kousa were heavily attacked despite sprays with permethrin, but nonflooded C. kousa or C. florida were not attacked. In spring 2015 trials, both nonflooded and flooded Styrax japonicus were heavily attacked regardless of permethrin applications. Although ethanol emissions were not measured, the apparently healthy nonflooded S. japonicus trees may have been exposed to an unknown physiological stress, such as low temperature injury, the previous winter, which predisposed them to beetle attack. However, ethanol levels within host tissues were not measured as part of the current study. X. crassiusculus (75%), Xyloborinus saxesenii Ratzburg (13%), and X. germanus (9%) were the most abundant species collected in ethanol baited traps deployed in 2015, while X. crassiusculus (63%) and X. germanus (36%) were the predominant species reared from attacked trees. Results indicate that managing media moisture levels at or below 50%, and maximizing tree health overall, may provide significant protection against Xylosandrus spp. attacks in flood intolerant tree species. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  6. Damage-tolerance strategies for nacre tablets.

    PubMed

    Wang, Shengnan; Zhu, Xinqiao; Li, Qiyang; Wang, Rizhi; Wang, Xiaoxiang

    2016-05-01

    Nacre, a natural armor, exhibits prominent penetration resistance against predatory attacks. Unraveling its hierarchical toughening mechanisms and damage-tolerance design strategies may provide significant inspiration for the pursuit of high-performance artificial armors. In this work, relationships between the structure and mechanical performance of nacre were investigated. The results show that other than their brick-and-mortar structure, individual nacre tablets significantly contribute to the damage localization of nacre. Affected by intracrystalline organics, the tablets exhibit a unique fracture behavior. The synergistic action of the nanoscale deformation mechanisms increases the energy dissipation efficiency of the tablets and contributes to the preservation of the structural and functional integrity of the shell. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. Host plant invests in growth rather than chemical defense when attacked by a specialist herbivore.

    PubMed

    Arab, Alberto; Trigo, José Roberto

    2011-05-01

    Plant defensive compounds may be a cost rather than a benefit when plants are attacked by specialist insects that may overcome chemical barriers by strategies such as sequestering plant compounds. Plants may respond to specialist herbivores by compensatory growth rather than chemical defense. To explore the use of defensive chemistry vs. compensatory growth we studied Brugmansia suaveolens (Solanaceae) and the specialist larvae of the ithomiine butterfly Placidina euryanassa, which sequester defensive tropane alkaloids (TAs) from this host plant. We investigated whether the concentration of TAs in B. suaveolens was changed by P. euryanassa damage, and whether plants invest in growth, when damaged by the specialist. Larvae feeding during 24 hr significantly decreased TAs in damaged plants, but they returned to control levels after 15 days without damage. Damaged and undamaged plants did not differ significantly in leaf area after 15 days, indicating compensatory growth. Our results suggest that B. suaveolens responds to herbivory by the specialist P. euryanassa by investing in growth rather than chemical defense.

  8. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  9. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  10. Creation of backdoors in quantum communications via laser damage

    NASA Astrophysics Data System (ADS)

    Makarov, Vadim; Bourgoin, Jean-Philippe; Chaiwongkhot, Poompong; Gagné, Mathieu; Jennewein, Thomas; Kaiser, Sarah; Kashyap, Raman; Legré, Matthieu; Minshull, Carter; Sajeed, Shihan

    2016-09-01

    Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behavior on demand. We test it on two practical QC systems for key distribution and coin tossing, and show that newly created deviations lead to side channels. This reveals that laser damage is a potential security risk to existing QC systems, and necessitates their testing to guarantee security.

  11. Reducing the Impact of Attacks against Healthcare by Curbing the Use of Explosive Weapons in Populated Areas: Developments at the Global Level.

    PubMed

    Bagshaw, Simon

    Attacks against healthcare in situations of armed conflict have emerged as an issue of increasing concern with explosive weapons - such as aircraft bombs, mortars and improvised explosive devices - accounting for more deaths, injuries and damage than any other type of weapon in attacks on healthcare facilities. While this is perhaps unsurprising, it offers some insight into a possible course of action for dealing with the problem of attacks against healthcare - by curbing the use of explosive weapons in populated areas. There has been growing recognition in recent years of the humanitarian problems caused by the use of such weapons in populated areas. Steps are now being taken at the global level to curb this use which could, in time, make an important contribution to reducing the incidence and devastating impact of attacks against healthcare.

  12. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.

    PubMed

    Sittig, Dean F; Singh, Hardeep

    2016-01-01

    Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.

  13. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks

    PubMed Central

    Singh, Hardeep

    2016-01-01

    Summary Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user’s computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users. PMID:27437066

  14. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    NASA Astrophysics Data System (ADS)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  15. Pericarditis - after heart attack

    MedlinePlus

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  16. WILD PIG ATTACKS ON HUMANS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mayer, J.

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animalsmore » were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.« less

  17. TSARINA: A Computer Model for Assessing Conventional and Chemical Attacks on Airbases

    DTIC Science & Technology

    1990-09-01

    IV, and has been updated to FORTRAN 77; it has been adapted to various computer systems, as was the widely used AIDA model and the previous versions of...conventional and chemical attacks on sortie generation. In the first version of TSARINA [1 2], several key additions were made to the AIDA model so that (1...various on-base resources, in addition to the estimates of hits and facility damage that are generated by the original AIDA model . The second version

  18. Web Forms and Untraceable DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  19. Heart Attack - Multiple Languages

    MedlinePlus

    ... Heart Attack - العربية (Arabic) Bilingual PDF Health Information Translations Bosnian (bosanski) Expand Section Heart Attack - bosanski (Bosnian) Bilingual PDF Health Information Translations Chinese, Simplified (Mandarin dialect) (简体中文) Expand Section Heart ...

  20. The Approach to Suicide Bombing Attacks: Changing Concepts.

    PubMed

    Almgody, Gidon; Bala, Miklosh; Rivkind, Avraham I

    2007-12-01

    Suicide bombing attacks have emerged as a lethal weapon in the hands of terrorist groups. Our aim was to review the medical experience acquired in Israel, Spain, the United Kingdom and the United States in managing terrorist attacks, and prepare medical systems for the difficult task of managing these events. EMS protocols are amended to deal with a large number of victims in an urban setting who must be rapidly evacuated to a medical center where resuscitative as well as definitive care is delivered. A combination of extensive soft tissue damage caused by penetrating injuries, blast injury to the lungs and tympanic membranes, and burns are common among survivors. Preparation must include establishment of a clear chain-of-command lead by a general surgeon who manages the event and is responsible for decisions regarding OR preferences and ICU admissions. The emergency department is re-organized to handle the influx of numerous severely injured casualties. Professional personnel and resources are recruited and re-directed away from routine tasks towards treating the victims. This is achieved by deferring non-urgent operations, procedures and imaging studies. Victims are frequently re-assessed and re-evaluated to control chaos, minimize missed injuries and ensure delivery of an adequate level of care.

  1. The Approach to Suicide Bombing Attacks: Changing Concepts.

    PubMed

    Almgody, Gidon; Bala, Miklosh; Rivkind, Avraham I

    2008-06-01

    Suicide bombing attacks have emerged as a lethal weapon in the hands of terrorist groups. Our aim was to review the medical experience acquired in Israel, Spain, the United Kingdom and the United States in managing terrorist attacks, and prepare medical systems for the difficult task of managing these events. EMS protocols are amended to deal with a large number of victims in an urban setting who must be rapidly evacuated to a medical center where resuscitative as well as definitive care is delivered. A combination of extensive soft tissue damage caused by penetrating injuries, blast injury to the lungs and tympanic membranes, and burns are common among survivors. Preparation must include establishment of a clear chain-of-command lead by a general surgeon who manages the event and is responsible for decisions regarding OR preferences and ICU admissions. The emergency department is re-organized to handle the influx of numerous severely injured casualties. Professional personnel and resources are recruited and re-directed away from routine tasks towards treating the victims. This is achieved by deferring non-urgent operations, procedures and imaging studies. Victims are frequently re-assessed and re-evaluated to control chaos, minimize missed injuries and ensure delivery of an adequate level of care.

  2. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  3. Predicting Factors of Zone 4 Attack in Volleyball.

    PubMed

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  4. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    PubMed

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  5. Securing internet by eliminating DDOS attacks

    NASA Astrophysics Data System (ADS)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  6. Augmenting the existing survey hierarchy for mountain pine beetle red-attack damage with satellite remotely sensed data

    Treesearch

    M. A. Wulder; J. C. White; B. J. Bentz; T. Ebata

    2006-01-01

    Estimates of the location and extent of the red-attack stage of mountain pine beetle (Dendroctonus ponderosae Hopkins) infestations are critical for forest management. The degree of spatial and temporal precision required for these estimates varies according to the management objectives and the nature of the infestation. This paper outlines the range...

  7. Step-by-Step Simulation of Radiation Chemistry Using Green Functions for Diffusion-Influenced Reactions

    NASA Technical Reports Server (NTRS)

    Plante, Ianik; Cucinotta, Francis A.

    2011-01-01

    Radiolytic species are formed approximately 1 ps after the passage of ionizing radiation through matter. After their formation, they diffuse and chemically react with other radiolytic species and neighboring biological molecules, leading to various oxidative damage. Therefore, the simulation of radiation chemistry is of considerable importance to understand how radiolytic species damage biological molecules [1]. The step-by-step simulation of chemical reactions is difficult, because the radiolytic species are distributed non-homogeneously in the medium. Consequently, computational approaches based on Green functions for diffusion-influenced reactions should be used [2]. Recently, Green functions for more complex type of reactions have been published [3-4]. We have developed exact random variate generators of these Green functions [5], which will allow us to use them in radiation chemistry codes. Moreover, simulating chemistry using the Green functions is which is computationally very demanding, because the probabilities of reactions between each pair of particles should be evaluated at each timestep [2]. This kind of problem is well adapted for General Purpose Graphic Processing Units (GPGPU), which can handle a large number of similar calculations simultaneously. These new developments will allow us to include more complex reactions in chemistry codes, and to improve the calculation time. This code should be of importance to link radiation track structure simulations and DNA damage models.

  8. Laser damage helps the eavesdropper in quantum cryptography.

    PubMed

    Bugge, Audun Nystad; Sauge, Sebastien; Ghazali, Aina Mardhiyah M; Skaar, Johannes; Lydersen, Lars; Makarov, Vadim

    2014-02-21

    We propose a class of attacks on quantum key distribution (QKD) systems where an eavesdropper actively engineers new loopholes by using damaging laser illumination to permanently change properties of system components. This can turn a perfect QKD system into a completely insecure system. A proof-of-principle experiment performed on an avalanche photodiode-based detector shows that laser damage can be used to create loopholes. After ∼1  W illumination, the detectors' dark count rate reduces 2-5 times, permanently improving single-photon counting performance. After ∼1.5  W, the detectors switch permanently into the linear photodetection mode and become completely insecure for QKD applications.

  9. [Heart-attack in pregnancy].

    PubMed

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  10. Improving the Rainbow Attack by Reusing Colours

    NASA Astrophysics Data System (ADS)

    Ågren, Martin; Johansson, Thomas; Hell, Martin

    Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.

  11. Chile stand management for mechanical green chile harvest

    USDA-ARS?s Scientific Manuscript database

    Currently the red chile crop is mechanically harvested. Because the pods will be dehydrated before consumption, breakage and bruising of red pods is not a concern. Green chile, however, is currently hand harvested because of the fragile nature of the fruit and the need to avoid pod damage. Hand h...

  12. Identifying Electromagnetic Attacks against Airports

    NASA Astrophysics Data System (ADS)

    Kreth, A.; Genender, E.; Doering, O.; Garbe, H.

    2012-05-01

    This work presents a new and sophisticated approach to detect and locate the origin of electromagnetic attacks. At the example of an airport, a normal electromagnetic environment is defined, in which electromagnetic attacks shall be identified. After a brief consideration of the capabilities of high power electromagnetic sources to produce high field strength values, this contribution finally presents the approach of a sensor network, realizing the identification of electromagnetic attacks.

  13. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    PubMed Central

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Results Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. Conclusion The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources. PMID:17274813

  14. Hybrid attacks on model-based social recommender systems

    NASA Astrophysics Data System (ADS)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  15. Mealybugs (Hemiptera: Coccomorpha: Pseudococcidae) attacking Hibiscus rosa-sinensis L. in Malaysia, with two new country records

    NASA Astrophysics Data System (ADS)

    Sartiami, Dewi; Watson, Gillian W.; Mohamad Roff, M. N.; Idris, A. B.

    2016-11-01

    A survey of mealybugs (Hemiptera: Coccomorpha: Pseudococcidae) attacking the national flower of Malaysia, Hibiscus rosa-sisnensis L. and Hibiscus spp. (Malvaceae) was conducted in Selangor and Kuala Lumpur, Malaysia, from January to March 2016. Adult females were mounted on microscope slides in Canada balsam. The five species identified were Ferrisia dasylirii (Cockerell), Maconellicoccus hirsutus (Green), Paracoccus marginatus Williams and Granara de Willink, Phenacoccus solenopsis (Tinsley) and Pseudococcus jackbeardsleyi Gimpel & Miller. Two of these, the invasive species Ferrisia dasylirii and P. solenopsis were introduced and first recorded in Malaysia.

  16. Do Unexpected Panic Attacks Occur Spontaneously?

    PubMed Central

    Meuret, Alicia E.; Rosenfield, David; Wilhelm, Frank H.; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T.

    2012-01-01

    Background Spontaneous or unexpected panic attacks, per definition, occur out-of-the blue, in absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of or during the attack, but not preceding it. To test this hypothesisweexaminedif points of significant autonomic changes preceded the onset of spontaneous panic attacks. Methods Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen naturally panic attacks were recorded during 1,960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before, and continuing to 10 minutes after, the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization, and compared to time matched control periods within the same person. Results Significant patterns of instability across a numberof autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes prior to onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt PCO2 increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in PCO2. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before and duringthe attacks. Changes in the matched control periods were largely absent. Conclusions Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction betweenuncuedand cued panic attacks. PMID:21783179

  17. On Patarin's Attack against the lIC Scheme

    NASA Astrophysics Data System (ADS)

    Ogura, Naoki; Uchiyama, Shigenori

    In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.

  18. Bactericidal catechins damage the lipid bilayer.

    PubMed

    Ikigai, H; Nakae, T; Hara, Y; Shimamura, T

    1993-04-08

    The mode of antibacterial action of, the green tea (Camellia sinensis) extracts, (-)-epigallocatechin gallate (EGCg) and (-)-epicatechin (EC) was investigated. Strong bactericidal EGCg caused leakage of 5,6-carboxyfluorescein from phosphatidylcholine liposomes (PC), but EC with very weak bactericidal activity caused little damage to the membrane. Phosphatidylserine and dicetyl phosphate partially protected the membrane from EGCg-mediated damage when reconstituted into the liposome membrane with PC. EGCg, but not EC, caused strong aggregation and NPN-fluorescence quenching of PC-liposomes and these actions were markedly lowered in the presence of negatively charged lipids. These results show that bactericidal catechins primarily act on and damage bacterial membranes. The observation that Gram-negative bacteria are more resistant to bactericidal catechins than Gram-positive bacteria can be explained to some extent by the presence of negatively charged lipopolysaccharide.

  19. Influence of Titanium Dioxide Nanoparticles on the Sulfate Attack upon Ordinary Portland Cement and Slag-Blended Mortars

    PubMed Central

    Atta-ur-Rehman; Qudoos, Abdul; Kim, Hong Gi

    2018-01-01

    In this study, the effects of titanium dioxide (TiO2) nanoparticles on the sulfate attack resistance of ordinary Portland cement (OPC) and slag-blended mortars were investigated. OPC and slag-blended mortars (OPC:Slag = 50:50) were made with water to binder ratio of 0.4 and a binder to sand ratio of 1:3. TiO2 was added as an admixture as 0%, 3%, 6%, 9% and 12% of the binder weight. Mortar specimens were exposed to an accelerated sulfate attack environment. Expansion, changes in mass and surface microhardness were measured. Scanning Electron Microscopy (SEM), Energy Dispersive Spectroscopy (EDS), X-ray Diffraction (XRD), Thermogravimetry Analysis (TGA) and Differential Scanning Calorimetry (DSC) tests were conducted. The formation of ettringite and gypsum crystals after the sulfate attack were detected. Both these products had caused crystallization pressure in the microstructure of mortars and deteriorated the mortars. Our results show that the addition of nano-TiO2 accelerated expansion, variation in mass, loss of surface microhardness and widened cracks in OPC and slag-blended mortars. Nano-TiO2 containing slag-blended mortars were more resistant to sulfate attack than nano-TiO2 containing OPC mortars. Because nano-TiO2 reduced the size of coarse pores, so it increased crystallization pressure due to the formation of ettringite and gypsum thus led to more damage under sulfate attack. PMID:29495616

  20. [Role of green tea in oxidative stress prevention].

    PubMed

    Metro, D; Muraca, U; Manasseri, L

    2006-01-01

    Oxidative stress is a condition caused by an increase of Reactive Oxygen Species (ROS) or by a shortage of the mechanisms of cellular protection and antioxidant defence. ROS have a potential oxidative effect towards various cellular macromolecules: proteins, nucleic acids, proteoglycans, lipids, with consequent damages in several cellular districts and promotion of the ageing process of the organism. However, some substances are able to prevent and/or reduce the damages caused by ROS; therefore, they are defined antioxidant. The present research studied, in a group of subjects, the antioxidant effects of the green tea, that was administered with fruit and vegetables in a strictly controlled diet. 50 subjects were selected and requested to daily consume 2-3 fruit portions (especially pineapple), 3-5 portions of vegetables (especially tomato) and 2-3 glasses of green tea for about 2 months to integrate the controlled basic diet. Some indicators of the oxidative stress were measured in the plasma before and after the integration period. The integration of a basic diet with supplements of fruit, vegetables and green tea turned out to be able in increasing both plasmatic total antioxidant capacity and endogenous antioxidant levels and to reduce the lipid peroxidation of the membranes, suggesting a reduction of the oxidative stress. These data suggest that an adequate supplement of antioxidants can prevent oxidative stress and correlated pathologies.

  1. Going "Green": Environmental Jobs for Scientists and Engineers

    ERIC Educational Resources Information Center

    Ramey, Alice

    2009-01-01

    Green is often used as a synonym for environmental or ecological, especially as it relates to products and activities aimed at minimizing damage to the planet. Scientists and engineers have long had important roles in the environmental movement. Their expertise is focused on a variety of issues, including increasing energy efficiency, improving…

  2. Phytotoxicity, bioaccumulation and degradation of isoproturon in green algae.

    PubMed

    Bi, Yan Fang; Miao, Shan Shan; Lu, Yi Chen; Qiu, Chong Bin; Zhou, You; Yang, Hong

    2012-12-01

    Isoproturon (IPU) is a pesticide used for protection of land crops from weed or pathogen attack. Recent survey shows that IPU has been detected as a contaminant in aquatic systems and may have negative impact on aquatic organisms. To understand the phytotoxicity and potential accumulation and degradation of IPU in algae, a comprehensive study was performed with the green alga Chlamydomonas reinhardtii. Algae exposed to 5-50 μg L(-1) IPU for 3d displayed progressive inhibition of cell growth and reduced chlorophyll fluorescence. Time-course experiments with 25 μg L(-1) IPU for 6d showed similar growth responses. The 72 h EC50 value for IPU was 43.25 μg L(-1), NOEC was 5 μg L(-1) and LOEC was 15 μg L(-1). Treatment with IPU induced oxidative stress. This was validated by a group of antioxidant enzymes, whose activities were promoted by IPU exposure. The up-regulation of several genes coding for the enzymes confirmed the observation. IPU was shown to be readily accumulated by C. reinhardtii. However, the alga showed a weak ability to degrade IPU accumulated in its cells, which was best presented at the lower concentration (5 μg L(-1)) of IPU in the medium. The imbalance of accumulation and degradation of IPU may be the cause that resulted in the detrimental growth and cellular damage. Copyright © 2012 Elsevier B.V. All rights reserved.

  3. Attacks on public telephone networks: technologies and challenges

    NASA Astrophysics Data System (ADS)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  4. Influence of fruit age of the Brazilian Green Dwarf coconut on the relationship between Aceria guerreronis population density and percentage of fruit damage.

    PubMed

    Sousa, André Silva Guimarães; Argolo, Poliane Sá; Gondim, Manoel Guedes Correa; de Moraes, Gilberto José; Oliveira, Anibal Ramadan

    2017-08-01

    The coconut mite, Aceria guerreronis Keifer (Acari: Eriophyidae), is one of the main coconut pests in the American, African and parts of the Asian continents, reaching densities of several thousand mites per fruit. Diagrammatic scales have been developed to standardize the estimation of the population densities of A. guerreronis according to the estimated percentage of damage, but these have not taken into account the possible effect of fruit age, although previous studies have already reported the variation in mite numbers with fruit age. The objective of this study was to re-construct the relation between damage and mite density at different fruit ages collected in an urban coconut plantation containing the green dwarf variety ranging from the beginning to nearly the end of the infestation, as regularly seen under field conditions in northeast Brazil, in order to improve future estimates with diagrammatic scales. The percentage of damage was estimated with two diagrammatic scales on a total of 470 fruits from 1 to 5 months old, from a field at Ilhéus, Bahia, Brazil, determining the respective number of mites on each fruit. The results suggested that in estimates with diagrammatic scales: (1) fruit age has a major effect on the estimation of A. guerreronis densities, (2) fruits of different ages should be analyzed separately, and (3) regular evaluation of infestation levels should be done preferably on fruits of about 3-4 months old, which show the highest densities.

  5. Fasting-induced intestinal damage is mediated by oxidative and inflammatory responses.

    PubMed

    Abdeen, S; Mathew, T C; Khan, I; Dashti, H; Asfar, S

    2009-05-01

    Green tea has been shown to repair fasting-induced mucosal damage in rat intestine. The aim of this study was to elucidate the underlying mechanism. Five groups of rats were used. Group 1 had free access to chow diet and water, and those in group 2 were fasted for 3 days. Animals in group 3 were fasted for 3 days, then were allowed drinking water for a further 7 days. Groups 4 and 5 were fasted for 3 days, then given drinking water containing green tea or vitamin E respectively for 7 days. Blood was collected for estimation of total plasma antioxidants, and jejunal samples were used for immunohistochemical analysis of superoxide dismutase (SOD), catalase and glutathione peroxidase (GPx), and for estimation of myeloperoxidase (MPO) activity. Use of green tea was associated with a significant increase in total plasma antioxidants (P < 0.001), and mucosal SOD (P < 0.001), catalase (P = 0.006) and GPx (P = 0.017), but a significant decrease in MPO activity (P < 0.001). Vitamin E produced similar changes, but the effects were smaller. Green tea reverses the fasting-induced damage to the intestinal mucosa by its antioxidant and anti-inflammatory effect. 2009 British Journal of Surgery Society Ltd. Published by John Wiley & Sons, Ltd.

  6. Cued Panic Attacks in Body Dysmorphic Disorder

    PubMed Central

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  7. Detection of airway ischaemic damage after lung transplantation by using autofluorescence imaging bronchoscopy.

    PubMed

    Iga, Norichika; Oto, Takahiro; Okada, Masanori; Harada, Masaaki; Nishikawa, Hitoshi; Miyoshi, Kentaroh; Otani, Shinji; Sugimoto, Seiichiro; Yamane, Masaomi; Toyooka, Shinichi; Miyoshi, Shinichiro

    2014-03-01

    Airway complications related to ischaemia are a major cause of morbidity after lung transplantation. Early detection of airway ischaemia and optimal management of the anastomotic site could reduce the risk of airway complications. Autofluorescence imaging (AFI) bronchoscopy has been increasingly recognized as an effective technique for detecting abnormal mucosal thickening. The aim of this study was to investigate whether AFI bronchoscopy can facilitate the detection of airway ischaemic damage in lung transplant patients. Twenty Landrace pigs were used to create a tracheal autotransplantation model. A four-ring length of trachea was excised and implanted orthotopically. The tracheal autograft was observed on postoperative days 0, 2, 4 and 7 with AFI bronchoscopy. The extent and origin of graft autofluorescence were examined using histology and measured according to fluorescence intensity. The lesions on the tracheal autografts appeared as bright green fluorescence on AFI bronchoscopy. On confocal fluorescence microscopy, high-intensity green fluorescence was observed in the elastin fibre layer of the submucosa. The fluorescence intensity of elastin was significantly higher in the graft showing fluorescence than the graft that did not show fluorescence and that at the control site. Bright green fluorescence was seen in an elastin fibre layer in the submucosa, which was likely a result of epithelial sloughing. There is a close relationship between the bright green fluorescence pattern observed using AFI bronchoscopy and airway ischaemic damage. We conclude that AFI bronchoscopy may detect airway ischaemic damage after lung transplantation.

  8. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  9. Thrombolytic drugs for heart attack

    MedlinePlus

    ... gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... supply blood and oxygen to the heart. A heart attack can occur if a blood clot stops the ...

  10. Panic Attack History and Smoking Topography

    PubMed Central

    Farris, Samantha G.; Brown, Lily A.; Goodwin, Renee D.; Zvolensky, Michael J.

    2016-01-01

    Background Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Method Participants (n = 124, Mage = 43.9, SD = 9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n = 35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Results Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Discussion Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. PMID:28033542

  11. Panic attack history and smoking topography.

    PubMed

    Farris, Samantha G; Brown, Lily A; Goodwin, Renee D; Zvolensky, Michael J

    2017-02-01

    Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Participants (n=124, M age =43.9, SD=9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n=35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  12. Green tea polyphenols alleviate early BBB damage during experimental focal cerebral ischemia through regulating tight junctions and PKCalpha signaling.

    PubMed

    Liu, Xiaobai; Wang, Zhenhua; Wang, Ping; Yu, Bo; Liu, Yunhui; Xue, Yixue

    2013-07-21

    It has been supposed that green tea polyphenols (GTPs) have neuroprotective effects on brain damage after brain ischemia in animal experiments. Little is known regarding GTPs' protective effects against the blood-brain barrier (BBB) disruption after ischemic stroke. We investigated the effects of GTPs on the expression of claudin-5, occludin, and ZO-1, and the corresponding cellular mechanisms involved in the early stage of cerebral ischemia. Male Wistar rats were subjected to a middle cerebral artery occlusion (MCAO) for 0, 30, 60, and 120 min. GTPs (400 mg/kg/day) or vehicle was administered by intragastric gavage twice a day for 30 days prior to MCAO. At different time points, the expression of claudin-5, occludin, ZO-1, and PKCα signaling pathway in microvessel fragments of cerebral ischemic tissue were evaluated. GTPs reduced BBB permeability at 60 min and 120 min after ischemia as compared with the vehicle group. Transmission electron microscopy also revealed that GTPs could reverse the opening of tight junction (TJ) barrier at 60 min and 120 min after MACO. The decreased mRNA and protein expression levels of claudin-5, occludin, and ZO-1 in microvessel fragments of cerebral ischemic tissue were significantly prevented by treatment with GTPs at the same time points after ischemia in rats. Furthermore, GTPs could attenuate the increase in the expression levels of PKCα mRNA and protein caused by cerebral ischemia. These results demonstrate that GTPs may act as a potential neuroprotective agent against BBB damage at the early stage of focal cerebral ischemia through the regulation of TJ and PKCα signaling.

  13. Application of Green Net Metropolitan Product to Measure ...

    EPA Pesticide Factsheets

    The U.S. Environmental Protection Agency (USEPA) has been increasingly incorporating the concept of sustainability in its research programs. One facet of this research is the quantitative assessment of the sustainability of urban systems in light of several multidisciplinary sustainability metrics. In this work, we explore the estimation of economic measure of sustainability for Chicago Metropolitan Area (CMA) based on Green Net Metropolitan Product (GNMP), by adapting the economic models of sustainability at the macroeconomic level to regional sustainability. GNMP aims at amending the limitations of Net Domestic Product (NDP), a classical indicator of economic wellbeing, which fails to account for the degradation of environmental and natural resources caused by economic activities. We collect data for computing GNMP from publicly available secondary sources on variables such as gross metropolitan product, net income, emissions, solid waste, etc. In estimating GNMP for CMA, we have accounted for the damage costs associated with pollution emissions based on marginal damage values obtained from the literature using benefit transfers method. In addition, we attempt at accounting for the marginal value of depletion of natural resources in the CMA in terms of water depletion and changes in urban ecosystems such as green spaces. We account for the marginal damage cost associated with solid waste generation. It is expected the preliminary results of this exploration se

  14. Visualization of sporopollenin-containing pathogenic green micro-alga Prototheca wickerhamii by fluorescent in situ hybridization (FISH).

    PubMed

    Ueno, Ryohei

    2009-04-01

    Fluorescent in situ hybridization (FISH) using taxon-specific, rRNA-targeted oligonucleotide probes is one of the most powerful tools for the rapid identification of harmful microorganisms. However, eukaryotic algal cells do not always allow FISH probes to permeate over their cell walls. Members of the pathogenic micro-algal genus Prototheca are characterized by their distinctive cell-wall component, sporopollenin, an extremely tough biopolymer that resists acid and alkaline hydrolysis, enzyme attack, and acetolysis. To our knowledge, there has been no report of the successful permeation by the oligonucleotide probes over the cell walls of unicellular green micro-algae, which contain sporopollenin. The DNA probes passed through the cell wall of Prototheca wickerhamii after treating the algal cells with cetyltrimethylammonium bromide (CTAB). Most cells in the middle logarithmic growth phase culture fluoresced when hybridized with the rRNA-targeted universal probe for eukaryotes, though individual cells included in this culture differed in the level of cell-wall vulnerability to attack by the polysaccharide-degrading enzyme, thus reflecting the different stages of the life cycle. This is the first report regarding the visualization of sporopollenin-containing, green micro-algal cells by FISH.

  15. Real-time Attack of LL-37 on Single Bacillus subtilis Cells

    PubMed Central

    Barns, Kenneth J.; Weisshaar, James C.

    2013-01-01

    Time-lapse fluorescence microscopy of single, growing Bacillus subtilis cells with 2-12 s time resolution reveals the mechanisms of antimicrobial peptide (AMP) action on a Gram-positive species with unprecedented detail. For the human cathelicidin LL-37 attacking B. subtilis, the symptoms of antimicrobial stress differ dramatically depending on the bulk AMP concentration. At 2 μM LL-37, the mean single-cell growth rate decreases, but membrane permeabilization does not occur. At 4 μM LL-37, cells abruptly shrink in size at the same time that Sytox Green enters the cytoplasm and stains the nucleoids. We interpret the shrinkage event as loss of turgor pressure (and presumably the membrane potential) due to permeabilization of the membrane. Movies of Sytox Green staining at 0.5 frame/s show that nucleoid staining is initially local, more consistent with pore formation than with global permeabilization models. In a novel “growth recovery” assay, cells are incubated with LL-37 for a variable period and then rinsed with fresh growth medium lacking LL-37. The growth rate attenuation observed at 2 μM LL-37 is a recoverable symptom, while the abrupt cell shrinkage observed at 4 μM LL-37 is not. PMID:23454084

  16. Pre-attack symptomatology and temperament as predictors of children's responses to the September 11 terrorist attacks.

    PubMed

    Lengua, Liliana J; Long, Anna C; Smith, Kimberlee I; Meltzoff, Andrew N

    2005-06-01

    The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Children's responses were assessed in a community sample of children in Seattle, Washington, participating in an ongoing study. Symptomatology and temperament assessed prior to the attacks were examined as prospective predictors of post-attack post-traumatic stress (PTS), anxiety, depression and externalizing problems. Children demonstrated PTS symptoms and worries at levels comparable to those in children directly experiencing disasters, with 77% of children reporting being worried, 68% being upset by reminders, and 39% having upsetting thoughts. The most common PTS symptom cluster was re-experiencing, and 8% of children met criteria consistent with PTSD. African-American children reported more avoidant PTS symptoms and being more upset by the attacks than European-American children. Girls reported being more upset than boys. Prior internalizing, externalizing, social competence and self-esteem were related to post-attack PTS; and child inhibitory control, assessed prior to the 9/11 attacks, demonstrated a trend towards an association with post-attack PTS symptoms controlling for prior levels of symptomatology. PTS predicted child-report anxiety and conduct problem symptoms at follow-up, approximately 6 months after 9/11. Children experiencing a major disaster at a distance or indirectly through media exposure demonstrated worries and PTS symptoms suggesting that communities need to attend to children's mental health needs in response to national or regional disasters. Pre-disaster symptomatology or low self-regulation may render children more vulnerable in response to a disaster, and immediate post-disaster responses predict subsequent symptomatology. These variables might be used in the identification of children in need of

  17. Greens of the European Green Capitals

    NASA Astrophysics Data System (ADS)

    Cömertler, Seval

    2017-10-01

    Well established and maintained green areas have a key role on reaching the high quality of life and sustainability in urban environments. Therefore, green areas must be carefully accounted and evaluated in the urban planning affairs. In this context, the European Green Capitals, which attach a great importance to the green areas, have a great potential to act as a role model for both small and big cities in all around the world. These leading cities (chronologically, Stockholm, Hamburg, Vitoria-Gasteiz, Nantes, Copenhagen, Bristol, Ljubljana, Essen and Nijmegen) are inspiring for the other cities which seek to achieve more sustainable and environmentally friendly places through green areas. From this point of view, the aim of this paper was to investigate the green areas of the European Green Capitals. The paper covered whole European Green Capitals, and the application form of each Green Capital was used as a primary data source. Consequently, the paper put forwarded that the European Green Capitals have considerably large amount and high proportion of green areas. Further, these cities provide an excellent access to the public green areas. As a result of abundant provision and proper distribution, the almost all citizens in most of the Green Capitals live within a distance of 300 meters to a green area. For further researches, the paper suggested that these green capitals should be investigated in terms of their efforts, measures, goals and plans, policies and implications to administer, to protect, to enhance and to expand the green areas.

  18. Health Benefits of Green Public Housing: Associations With Asthma Morbidity and Building-Related Symptoms

    PubMed Central

    Laurent, Jose Guillermo Cedeno; MacNaughton, Piers; Kane, John; Bennett-Fripp, Mae; Spengler, John; Adamkiewicz, Gary

    2015-01-01

    Objectives. We examined associations of several health outcomes with green and conventional low-income housing, where the prevalence of morbidities and environmental pollutants is elevated. Methods. We used questionnaires and a visual inspection to compare sick building syndrome (SBS) symptoms and asthma-related morbidity among residents in multifamily units in Boston, Massachusetts, between March 2012 and May 2013. Follow-up was approximately 1 year later. Results. Adults living in green units reported 1.35 (95% confidence interval [CI] = 0.66, 2.05) fewer SBS symptoms than those living in conventional (control) homes (P < .001). Furthermore, asthmatic children living in green homes experienced substantially lower risk of asthma symptoms (odds ratio [OR] = 0.34; 95% CI = 0.12, 1.00), asthma attacks (OR = 0.31; 95% CI = 0.11, 0.88), hospital visits (OR = 0.24; 95% CI = 0.06, 0.88), and asthma-related school absences (OR = 0.21; 95% CI = 0.06, 0.74) than children living in conventional public housing. Conclusions. Participants living in green homes had improved health outcomes, which remained consistent over the study period. Green housing may provide a significant value in resource-poor settings where green construction or renovation could simultaneously reduce harmful indoor exposures, promote resident health, and reduce operational costs. PMID:26469661

  19. Health Benefits of Green Public Housing: Associations With Asthma Morbidity and Building-Related Symptoms.

    PubMed

    Colton, Meryl D; Laurent, Jose Guillermo Cedeno; MacNaughton, Piers; Kane, John; Bennett-Fripp, Mae; Spengler, John; Adamkiewicz, Gary

    2015-12-01

    We examined associations of several health outcomes with green and conventional low-income housing, where the prevalence of morbidities and environmental pollutants is elevated. We used questionnaires and a visual inspection to compare sick building syndrome (SBS) symptoms and asthma-related morbidity among residents in multifamily units in Boston, Massachusetts, between March 2012 and May 2013. Follow-up was approximately 1 year later. Adults living in green units reported 1.35 (95% confidence interval [CI] = 0.66, 2.05) fewer SBS symptoms than those living in conventional (control) homes (P < .001). Furthermore, asthmatic children living in green homes experienced substantially lower risk of asthma symptoms (odds ratio [OR] = 0.34; 95% CI = 0.12, 1.00), asthma attacks (OR = 0.31; 95% CI = 0.11, 0.88), hospital visits (OR = 0.24; 95% CI = 0.06, 0.88), and asthma-related school absences (OR = 0.21; 95% CI = 0.06, 0.74) than children living in conventional public housing. Participants living in green homes had improved health outcomes, which remained consistent over the study period. Green housing may provide a significant value in resource-poor settings where green construction or renovation could simultaneously reduce harmful indoor exposures, promote resident health, and reduce operational costs.

  20. CPAD: Cyber-Physical Attack Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ferragut, Erik M; Laska, Jason A

    The CPAD technology relates to anomaly detection and more specifically to cyber physical attack detection. It infers underlying physical relationships between components by analyzing the sensor measurements of a system. It then uses these measurements to detect signs of a non-physically realizable state, which is indicative of an integrity attack on the system. CPAD can be used on any highly-instrumented cyber-physical system to detect integrity attacks and identify the component or components compromised. It has applications to power transmission and distribution, nuclear and industrial plants, and complex vehicles.

  1. Know the Warning Signs of a Heart Attack

    MedlinePlus

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  2. Terror attacks influence driving behavior in Israel

    PubMed Central

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  3. Risk of herbivore attack and heritability of ontogenetic trajectories in plant defense.

    PubMed

    Ochoa-López, Sofía; Rebollo, Roberto; Barton, Kasey E; Fornoni, Juan; Boege, Karina

    2018-06-01

    Ontogeny has been identified as a main source of variation in the expression of plant phenotypes. However, there is limited information on the mechanisms behind the evolution of ontogenetic trajectories in plant defense. We explored if risk of attack, herbivore damage, heritability, and phenotypic plasticity can promote or constrain the evolutionary potential of ontogenetic trajectories in three defensive traits. We exposed 20 genotypes of Turnera velutina to contrasting environments (shadehouse and field plots), and measured the cyanogenic potential, trichome density, and sugar content in extrafloral nectar in seedlings, juveniles and reproductive plants. We also assessed risk of attack through oviposition preferences, and quantified herbivore damage in the field. We estimated genetic variance, broad sense heritability, and evolvability of the defensive traits at each ontogenetic stage, and of the ontogenetic trajectories themselves. For plants growing in the shadehouse, we found genetic variation and broad sense heritability for cyanogenic potential in seedlings, and for trichome density at all ontogenetic stages. Genetic variation and heritability of ontogenetic trajectories was detected for trichome density only. These genetic pre-requisites for evolution, however, were not detected in the field, suggesting that environmental variation and phenotypic plastic responses mask any heritable variation. Finally, ontogenetic trajectories were found to be plastic, differing between shadehouse and field conditions for the same genetic families. Overall, we provide support for the idea that changes in herbivore pressure can be a mechanism behind the evolution of ontogenetic trajectories. This evolutionary potential, however, can be constrained by phenotypic plasticity expressed in heterogeneous environments.

  4. Evaluating the damage process of dynamic target by high-energy laser in ocean environment

    NASA Astrophysics Data System (ADS)

    Wang, Jing; Ye, Demao

    2013-12-01

    The high-energy laser, as one of directed energy weapon, is famous for its unique advantage of speed-of-light response which was considered as an ideal weapon against anti-ship missile. This paper commits to evaluate the damage process of missile by high-energy laser weapon. We analyze the propagation properties which are susceptible to atmospheric attenuation effects, atmospheric turbulence effects, thermal blooming effects in sky-sea atmosphere firstly. Then because laser weapons attack one target at a time and it takes several seconds at a minimum for the target engaged, a model of calculating the required t ime for damaging the attack target was built . In the end effective evaluation methods of hot-ablated and high-energy laser weapon's damaging effectiveness are made, when the body or the optical elements of the missile is irradiated by the concatenation wave laser weapon. And one of the issues just as laser power, propagation distance is changed; the model can make different evaluation. The above model can provide the theoretical basis for the high-energy laser weapon intercept anti-ship missile and tactic deraign rationality for naval ship-borne laser weapons.

  5. Genetic doping and health damages.

    PubMed

    Fallahi, Aa; Ravasi, Aa; Farhud, Dd

    2011-01-01

    Use of genetic doping or gene transfer technology will be the newest and the lethal method of doping in future and have some unpleasant consequences for sports, athletes, and outcomes of competitions. The World Anti-Doping Agency (WADA) defines genetic doping as "the non-therapeutic use of genes, genetic elements, and/or cells that have the capacity to enhance athletic performance ". The purpose of this review is to consider genetic doping, health damages and risks of new genes if delivered in athletes. This review, which is carried out by reviewing relevant publications, is primarily based on the journals available in GOOGLE, ELSEVIER, PUBMED in fields of genetic technology, and health using a combination of keywords (e.g., genetic doping, genes, exercise, performance, athletes) until July 2010. There are several genes related to sport performance and if they are used, they will have health risks and sever damages such as cancer, autoimmunization, and heart attack.

  6. Genetic Doping and Health Damages

    PubMed Central

    Fallahi, AA; Ravasi, AA; Farhud, DD

    2011-01-01

    Background: Use of genetic doping or gene transfer technology will be the newest and the lethal method of doping in future and have some unpleasant consequences for sports, athletes, and outcomes of competitions. The World Anti-Doping Agency (WADA) defines genetic doping as “the non-therapeutic use of genes, genetic elements, and/or cells that have the capacity to enhance athletic performance ”. The purpose of this review is to consider genetic doping, health damages and risks of new genes if delivered in athletes. Methods: This review, which is carried out by reviewing relevant publications, is primarily based on the journals available in GOOGLE, ELSEVIER, PUBMED in fields of genetic technology, and health using a combination of keywords (e.g., genetic doping, genes, exercise, performance, athletes) until July 2010. Conclusion: There are several genes related to sport performance and if they are used, they will have health risks and sever damages such as cancer, autoimmunization, and heart attack. PMID:23113049

  7. Novel Method For Low-Rate Ddos Attack Detection

    NASA Astrophysics Data System (ADS)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  8. Genetic attack on neural cryptography.

    PubMed

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  9. Genetic attack on neural cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold formore » the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.« less

  10. Genetic attack on neural cryptography

    NASA Astrophysics Data System (ADS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  11. A Radiation Chemistry Code Based on the Greens Functions of the Diffusion Equation

    NASA Technical Reports Server (NTRS)

    Plante, Ianik; Wu, Honglu

    2014-01-01

    Ionizing radiation produces several radiolytic species such as.OH, e-aq, and H. when interacting with biological matter. Following their creation, radiolytic species diffuse and chemically react with biological molecules such as DNA. Despite years of research, many questions on the DNA damage by ionizing radiation remains, notably on the indirect effect, i.e. the damage resulting from the reactions of the radiolytic species with DNA. To simulate DNA damage by ionizing radiation, we are developing a step-by-step radiation chemistry code that is based on the Green's functions of the diffusion equation (GFDE), which is able to follow the trajectories of all particles and their reactions with time. In the recent years, simulations based on the GFDE have been used extensively in biochemistry, notably to simulate biochemical networks in time and space and are often used as the "gold standard" to validate diffusion-reaction theories. The exact GFDE for partially diffusion-controlled reactions is difficult to use because of its complex form. Therefore, the radial Green's function, which is much simpler, is often used. Hence, much effort has been devoted to the sampling of the radial Green's functions, for which we have developed a sampling algorithm This algorithm only yields the inter-particle distance vector length after a time step; the sampling of the deviation angle of the inter-particle vector is not taken into consideration. In this work, we show that the radial distribution is predicted by the exact radial Green's function. We also use a technique developed by Clifford et al. to generate the inter-particle vector deviation angles, knowing the inter-particle vector length before and after a time step. The results are compared with those predicted by the exact GFDE and by the analytical angular functions for free diffusion. This first step in the creation of the radiation chemistry code should help the understanding of the contribution of the indirect effect in the

  12. Countermeasures for unintentional and intentional video watermarking attacks

    NASA Astrophysics Data System (ADS)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  13. Cougar attacks on humans: a case report.

    PubMed

    McKee, Denise

    2003-01-01

    Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.

  14. Cougar attacks on children: injury patterns and treatment.

    PubMed

    Kadesky, K M; Manarey, C; Blair, G K; Murphy, J J; Verchere, C; Atkinson, K

    1998-06-01

    Cougar attacks on humans appear to be on the rise. A review of all attacks on children was performed to determine the method of attack and injury patterns so that a treatment regimen as well as possible preventative measures could be determined. A review of all attacks, including attacks on children, was performed, including three recent attacks treated at our institution. Situation, adult supervision, patient age, injuries recorded, survival, and mode of attack, if known, were reviewed. There were 50 documented attacks on children with a 25% fatality rate. Most children were not alone at the time of the attack (92%), and in many instances adult supervision was present or nearby. Severe head and neck lacerations along with puncture wounds were the most common injury. Examples of typical cervical injuries include a nonfatal vertebral artery injury, phrenic nerve injury, a fatal internal carotid artery injury, and a fatal cervical spine injury. The cougar was rabid in two cases. Pasteurella resulted in late infections in two patients. Based on the pattern of injuries, the authors recommend aggressive evaluation for occult cervical injuries as well as surgical debridement. Antibiotics should cover oropharyngeal flora including Pasteurella multocida. Rabies prophylaxis is indicated. Adult supervision in wilderness areas is not necessarily protective.

  15. Antioxidative activity of green tea treated with radical initiator 2, 2'-azobis(2-amidinopropane) dihydrochloride.

    PubMed

    Yokozawa, T; Cho, E J; Hara, Y; Kitani, K

    2000-10-01

    This study investigated the antioxidative activity of green tea extract, and a green tea tannin mixture and its components, under conditions of radical generation using the hydrophilic azo compound, 2,2'-azobis(2-amidinopropane) dihydrochloride (AAPH) to generate peroxyl radicals at a constant and measurable rate in the cultured renal epithelial cell line, LLC-PK(1), which is susceptible to oxidative damage. Treatment with AAPH decreased cell viability and increased the formation of thiobarbituric acid-reactive substances. However, green tea extract, and the tannin mixture and its components, comprising (-)-epigallocatechin 3-O-gallate (EGCg), (-)-gallocatechin 3-O-gallate (GCg), (-)-epicatechin 3-O-gallate (ECg), (-)-epigallocatechin (EGC), (+)-gallocatechin (GC), (-)-epicatechin (EC), and (+)-catechin (C), showed protective activity against AAPH-induced cellular damage. The tannin mixture and its components exhibited higher antioxidative activity than the green tea extract. Furthermore, EGCg and GCg had higher activity than EGC and GC, respectively. In particular, EGCg exerted the most significant cellular protective activity against AAPH. These results indicate that green tea tannin may inhibit cellular loss and lipid peroxidation resulting from the peroxyl radical generated by AAPH, and that the chemical structure of tannin is also involved in the activity, suggesting that the O-dihydroxy structure in the B ring and the galloyl groups are important determinants for radical scavenging and antioxidative potential.

  16. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  17. Corneal Crosslinking With Rose Bengal and Green Light: Efficacy and Safety Evaluation.

    PubMed

    Zhu, Hong; Alt, Clemens; Webb, Robert H; Melki, Samir; Kochevar, Irene E

    2016-09-01

    To evaluate crosslinking of cornea in vivo using green light activation of Rose Bengal (RGX) and assess potential damaging effects of the green light on retina and iris. Corneas of Dutch belted rabbits were de-epithelialized, then stained with Rose Bengal and exposed to green light, or not further treated. Corneal stiffness was measured by uniaxial tensiometry. Re-epithelialization was assessed by fluorescein fluorescence. Keratocytes were counted on hematoxylin and eosin (H&E)-stained sections, and iris cell damage was assessed by lactate dehydrogenase staining. Thermal effects on the blood-retinal barrier (BRB) were assessed by fluorescein angiography and those on photoreceptors, retinal pigment epithelium (RPE), and choriocapillaris by light microscopy and transmission electron microscopy. RGX (10-min irradiation; 150 J/cm) increased corneal stiffness 1.9-fold on day 1 (1.25 ± 0.21 vs. 2.38 ± 0.59 N/mm; P = 0.036) and 2.8-fold compared with controls on day 28 (1.70 ± 0.74 vs. 4.95 ± 1.86 N/mm; P = 0.003). Keratocytes decreased only in the anterior stroma on day 1 (24.0 ± 3.0 vs. 3.67 ± 4.73, P = 0.003) and recovered by day 28 (37.7 ± 8.9 vs. 34.5 ± 2.4, P = 0.51). Iris cells were not thermally damaged. No evidence of BRB breakdown was detected on days 1 or 28. Retina from RGX-treated eyes seemed normal with RPE cells showing intact nuclei shielded apically by melanosomes, morphologically intact photoreceptor outer segments, normal outer nuclear layer thickness, and choriocapillaris containing intact erythrocytes. The substantial corneal stiffening produced by RGX together with the lack of significant effects on keratocytes and no evidence for retina or iris damage suggest that RGX-initiated corneal crosslinking may be a safe, rapid, and effective treatment.

  18. Yellow-throated and Red-eyed Vireos foraging on green anoles during migration

    USGS Publications Warehouse

    Sykes, P.W.; Atherton, L.S.; Payne, R.L.

    2007-01-01

    Yellow-throated (Vireo flavifrons) and Red-eyed vireos (V. olivaceus) were observed feeding on green anoles (Anolis carolinensis carolinensis) at two localities in Florida and one in South Carolina. Vireos are long-distance migrants that require foods high in fatty acid content, especially when engaging in migration. It is not unlikely that vireos have an opportunistic foraging strategy to obtain the necessary food requirements, including attacking and consuming prey items such as small lizards. This note provides the first published reports of lizards taken as prey by these two species.

  19. Anger attacks in bipolar versus recurrent depression.

    PubMed

    Grover, Sandeep; Painuly, Nitesh; Gupta, Nitin; Mattoo, Surendra K

    2011-01-01

    Research on anger attacks has been mostly limited to unipolar depression, and only a few studies have focused on anger attacks in bipolar depression. In a cross-sectional study, 22 subjects with bipolar depression were compared to 22 subjects with recurrent unipolar depression using an anger attack questionnaire, irritability, depression and anxiety scale and quality of life scale. Anger attacks were present in 62.5% subjects with recurrent depression (RDD group) compared to 54.5% in subjects with bipolar depression (BD group), but the difference between the groups was not statistically significant. Also, there was no significant difference between the RDD and BD groups on the Irritability Depression and Anxiety Scale and WHOQOL-Bref except that the BD group had a poorer quality of life (QOL) compared to the RDD group in the social relationship domain (t=-2.30, p<0.05). In the BD group, the subjects with anger attacks were older (t=2.77, p<0.05), had significantly higher scores on the Irritability-Outwards component of IDA (t=3.90, p<0.01) and shorter duration of illness (Mann Whitney Signed ranked value 20.00, p<0.01) and duration of treatment (Mann Whitney Signed ranked value 28.00, p<0.05) compared to BD group members without anger attacks. In the RDD group, the subjects with anger attacks had poor QOL in the social domain (t= -2.12, p<0.05), environmental domain (t=2.99, p=.01) and total (t=2.56, p<0.05) QOL compared to those without anger attacks. Anger attacks are equally prevalent in unipolar and bipolar depression, are not influenced by sociodemographic and clinical variables, and lead to comparable impact on the subjective QOL in both groups.

  20. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    MedlinePlus

    ... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...

  1. The effects of metal ions on the DNA damage induced by hydrogen peroxide.

    PubMed

    Kobayashi, S; Ueda, K; Komano, T

    1990-01-01

    The effects of metal ions on DNA damage induced by hydrogen peroxide were investigated using two methods, agarose-gel electrophoretic analysis of supercoiled DNA and sequencing-gel analysis of single end-labeled DNA fragments of defined sequences. Hydrogen peroxide induced DNA damage when iron or copper ion was present. At least two classes of DNA damage were induced, one being direct DNA-strand cleavage, and the other being base modification labile to hot piperidine. The investigation of the damaged sites and the inhibitory effects of radical scavengers revealed that hydroxyl radical was the species which attacked DNA in the reaction of H2O2/Fe(II). On the other hand, two types of DNA damage were induced by H2O2/Cu(II). Type I damage was predominant and inhibited by potassium iodide, but type II was not. The sites of the base-modification induced by type I damage were similar to those by lipid peroxidation products and by ascorbate in the presence of Cu(II), suggesting the involvement of radical species other than free hydroxyl radical in the damaging reactions.

  2. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  3. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  4. Impact of heat stress on the emissions of monoterpenes, sesquiterpenes, phenolic BVOC and green leaf volatiles from several tree species

    NASA Astrophysics Data System (ADS)

    Kleist, E.; Mentel, T. F.; Andres, S.; Bohne, A.; Folkers, A.; Kiendler-Scharr, A.; Rudich, Y.; Springer, M.; Tillmann, R.; Wildt, J.

    2012-07-01

    Changes in the biogenic volatile organic compound (BVOC) emissions from European beech, Palestine oak, Scots pine, and Norway spruce exposed to heat stress were measured in a laboratory setup. In general, heat stress decreased the de novo emissions of monoterpenes, sesquiterpenes and phenolic BVOC. Decreasing emission strength with heat stress was independent of the tree species and whether the de novo emissions being constitutive or induced by biotic stress. In contrast, heat stress induced emissions of green leaf volatiles. It also amplified the release of monoterpenes stored in resin ducts of conifers probably due to heat-induced damage of these resin ducts. The increased release of monoterpenes could be strong and long lasting. But, despite of such strong monoterpene emission pulses, the net effect of heat stress on BVOC emissions from conifers can be an overall decrease. In particular during insect attack on conifers the plants showed de novo emissions of sesquiterpenes and phenolic BVOC which exceeded constitutive monoterpene emissions from pools. The heat stress induced decrease of these de novo emissions was larger than the increased release caused by damage of resin ducts. We project that global change induced heat waves may cause increased BVOC emissions only in cases where the respective areas are predominantly covered with conifers that do not emit high amounts of sesquiterpenes and phenolic BVOC. Otherwise the overall effect of heat stress will be a decrease in BVOC emissions.

  5. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  6. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  7. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    PubMed

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  8. Using agility to combat cyber attacks.

    PubMed

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  9. The United States should forego a damage-limitation capability against China

    NASA Astrophysics Data System (ADS)

    Glaser, Charles L.

    2017-11-01

    Bottom Lines • THE KEY STRATEGIC NUCLEAR CHOICE. Whether to attempt to preserve its damage-limitation capability against China is the key strategic nuclear choice facing the United States. The answer is much less clear-cut than when the United States faced the Soviet Union during the Cold War. • FEASIBILITY OF DAMAGE LIMITATION. Although technology has advanced significantly over the past three decades, future military competition between the U.S. and Chinese forces will favor large-scale nuclear retaliation over significant damage limitation. • BENEFITS AND RISKS OF A DAMAGE-LIMITATION CAPABILITY. The benefits provided by a modest damage-limitation capability would be small, because the United States can meet its most important regional deterrent requirements without one. In comparison, the risks, which include an increased probability of accidental and unauthorized Chinese attacks, as well as strained U.S.—China relations, would be large. • FOREGO DAMAGE LIMITATION. These twin findings—the poor prospects for prevailing in the military competition, and the small benefits and likely overall decrease in U.S. security—call for a U.S. policy that foregoes efforts to preserve or enhance its damage-limitation capability.

  10. Public knowledge of heart attack symptoms in Beijing residents.

    PubMed

    Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan

    2007-09-20

    Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart

  11. Adaptive optimisation-offline cyber attack on remote state estimator

    NASA Astrophysics Data System (ADS)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  12. Lifestyle Changes for Heart Attack Prevention

    MedlinePlus

    ... Venous Thromboembolism Aortic Aneurysm More Lifestyle Changes for Heart Attack Prevention Updated:Mar 29,2018 Sounds simple doesn' ... to read. Many topics also available in Spanish . Heart Attack Tools & Resources My Cardiac Coach What Is a ...

  13. Heartburn or Chest Pain: When Is It Heart Attack?

    MedlinePlus

    Heartburn or heart attack: When to worry Severe heartburn and heart attack can be hard to tell apart. Understand how they typically ... flow to your heart (angina) or an actual heart attack. Heartburn, angina and heart attack may feel very ...

  14. Attack Vulnerability of Network Controllability.

    PubMed

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  15. A fatal elephant attack.

    PubMed

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  16. False Positive and False Negative Effects on Network Attacks

    NASA Astrophysics Data System (ADS)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  17. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  18. Transient ischemic attack

    MedlinePlus

    ... artery surgery - discharge Stroke - discharge Taking warfarin (Coumadin) Images Endarterectomy Transient Ischemic attack (TIA) References Biller J, Ruland S, Schneck MJ. Ischemic cerebrovascular disease. In Daroff ...

  19. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  20. Nonepileptic attack disorder among married women.

    PubMed

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  1. An entangling-probe attack on Shor's algorithm for factorization

    NASA Astrophysics Data System (ADS)

    Azuma, Hiroo

    2018-02-01

    We investigate how to attack Shor's quantum algorithm for factorization with an entangling probe. We show that an attacker can steal an exact solution of Shor's algorithm outside an institute where the quantum computer is installed if he replaces its initialized quantum register with entangled qubits, namely the entangling probe. He can apply arbitrary local operations to his own probe. Moreover, we assume that there is an unauthorized person who helps the attacker to commit a crime inside the institute. He tells garbage data obtained from measurements of the quantum register to the attacker secretly behind a legitimate user's back. If the attacker succeeds in cracking Shor's algorithm, the legitimate user obtains a random answer and does not notice the attacker's illegal acts. We discuss how to detect the attacker. Finally, we estimate a probability that the quantum algorithm inevitably makes an error, of which the attacker can take advantage.

  2. Subclinical endophthalmitis following a rooster attack.

    PubMed

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  3. Assessing the Associations Between Types of Green Space, Physical Activity, and Health Indicators Using GIS and Participatory Survey

    NASA Astrophysics Data System (ADS)

    Akpinar, A.

    2017-11-01

    This study explores whether specific types of green spaces (i.e. urban green spaces, forests, agricultural lands, rangelands, and wetlands) are associated with physical activity, quality of life, and cardiovascular disease prevalence. A sample of 8,976 respondents from the Behavioral Risk Factor Surveillance System, conducted in 2006 in Washington State across 291 zip-codes, was analyzed. Measures included physical activity status, quality of life, and cardiovascular disease prevalence (i.e. heart attack, angina, and stroke). Percentage of green spaces was derived from the National Land Cover Dataset and measured with Geographical Information System. Multilevel regression analyses were conducted to analyze the data while controlling for age, sex, race, weight, marital status, occupation, income, education level, and zip-code population and socio-economic situation. Regression results reveal that no green space types were associated with physical activity, quality of life, and cardiovascular disease prevalence. On the other hand, the analysis shows that physical activity was associated with general health, quality of life, and cardiovascular disease prevalence. The findings suggest that other factors such as size, structure and distribution (sprawled or concentrated, large or small), quality, and characteristics of green space might be important in general health, quality of life, and cardiovascular disease prevalence rather than green space types. Therefore, further investigations are needed.

  4. Robustness analysis of interdependent networks under multiple-attacking strategies

    NASA Astrophysics Data System (ADS)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  5. Passive detection and localization of fatigue cracking in aluminum plates using Green's function reconstruction from ambient noise.

    PubMed

    Yang, Yang; Xiao, Li; Qu, Wenzhong; Lu, Ye

    2017-11-01

    Recent theoretical and experimental studies have demonstrated that a local Green's function can be retrieved from the cross-correlation of ambient noise field. This technique can be used to detect fatigue cracking in metallic structures, owing to the fact that the presence of crack can lead to a change in Green's function. This paper presents a method of structural fatigue cracking characterization method by measuring Green's function reconstruction from noise excitation and verifies the feasibility of crack detection in poor noise source distribution. Fatigue cracks usually generate nonlinear effects, in which different wave amplitudes and frequency compositions can cause different nonlinear responses. This study also undertakes analysis of the capacity of the proposed approach to identify fatigue cracking under different noise amplitudes and frequency ranges. Experimental investigations of an aluminum plate are conducted to assess the cross-correlations of received noise between sensor pairs and finally to detect the introduced fatigue crack. A damage index is proposed according to the variation between cross-correlations obtained from the pristine crack closed state and the crack opening-closure state when sufficient noise amplitude is used to generate nonlinearity. A probability distribution map of damage is calculated based on damage indices. The fatigue crack introduced in the aluminum plate is successfully identified and oriented, verifying that a fatigue crack can be detected by reconstructing Green's functions from an imperfect diffuse field in which ambient noise sources exist locally. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Mothers' functioning and children's symptoms 5 years after a SCUD missile attack.

    PubMed

    Laor, N; Wolmer, L; Cohen, D J

    2001-07-01

    The authors assessed the long-term consequences of the SCUD missile attack in Israel on children as a function of their mothers' psychological functioning, family cohesion, and the event itself. Five years after the Gulf War, the authors assessed the internalizing, externalizing, stress, and posttraumatic symptoms of 81 children aged 8-10 years whose homes were damaged in the SCUD missile attack, as well as general and posttraumatic symptoms, defensive style, and object relations in their mothers. There was a significant decrease in severity in most symptom domains and an increase in avoidant symptoms in the children. Greater severity of symptoms was associated with being displaced, living in a family with inadequate cohesion, and having a mother with poor psychological functioning. The association between the symptoms of children and mothers was stronger among the younger children. Posttraumatic symptoms increased in one-third of the children and decreased in one-third over the last 30 months of the study. Severe posttraumatic symptoms were reported in 8% of the children. Despite a continuous decrease in symptom severity, risk factors identified shortly after the Gulf War continued to exert their influence on children 5 years after the traumatic exposure.

  7. Anxiety-related somatic reactions during missile attacks.

    PubMed

    Carmeli, A; Liberman, N; Mevorach, L

    1991-01-01

    During the Persian Gulf war the Israeli civilian population was the target of missile attacks that could have carried poison gas warheads. During the attacks all civilians were ordered to wear gas masks and move into sealed rooms. Four telephone surveys studied the somatic reactions to this anxiety-arousing situation. The percent of subjects reporting the somatic reactions declined from 38% after the first attack to 20% 12 days later. Somatic reactions were more prevalent among females than males, and among those who completed elementary school only compared to those with an academic education. A complex pattern of relationships between expectancies about chemical warfare attacks and somatic reactions is discussed.

  8. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  9. Execute-Only Attacks against Execute-Only Defenses

    DTIC Science & Technology

    2015-11-13

    attacks that have been widely used to bypass randomization-based memory corruption defenses. A recent technique, Readactor, provides one of the... corruption defenses with various impacts. We analyze the prevalence of opportunities for such attacks in popular code bases and build two proof-of-concept...our countermeasures introduce only a modest additional overhead. I. INTRODUCTION Memory corruption has been a primary vector of attacks against

  10. The contribution of collective attack tactics in differentiating handball score efficiency.

    PubMed

    Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka

    2004-12-01

    The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.

  11. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  12. Detection of complex cyber attacks

    NASA Astrophysics Data System (ADS)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  13. Sleep bruxism possibly triggered by multiple sclerosis attacks and treated successfully with botulinum toxin: Report of three cases.

    PubMed

    Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit

    2015-09-01

    Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack. Copyright © 2015 Elsevier B.V. All rights reserved.

  14. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of...

  15. Panic disorder, panic attacks and panic attack symptoms across race-ethnic groups: results of the collaborative psychiatric epidemiology studies.

    PubMed

    Asnaani, Anu; Gutner, Cassidy A; Hinton, Devon E; Hofmann, Stefan G

    2009-01-01

    The current study investigates race-ethnic differences in rates of panic disorder, panic attacks and certain panic attack symptoms by jointly combining three major national epidemiological databases. The compared groups were White, African American, Latino and Asian. The White group had significantly higher rates of panic disorder, and of many panic symptoms, including palpitations, as compared to the African American, Asian and Latino groups. Several expected race-ethnic differences were not found. An explanation for these findings are adduced, and suggestions are given for future studies so that possible ethnic-racial differences in panic disorder, panic attacks and panic attack symptoms can be investigated in a more rigorous manner.

  16. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  17. Loss of eelgrass in Casco Bay, Maine, linked to Green Crab disturbance

    USGS Publications Warehouse

    Neckles, Hilary A.

    2015-01-01

    Over half of the Zostera marina (Eelgrass) cover disappeared from Casco Bay, ME, largely between 2012 and 2013. Eelgrass decline coincided with a population explosion of the invasive crab Carcinus maenas (European Green Crab). Green Crabs have been found to damage Eelgrass in Atlantic Canada through foraging activity, but destruction of established beds had not been documented in Maine. My objective was to determine whether loss of Eelgrass from Casco Bay was related to Green Crab disturbance. In September 2013, I transplanted Eelgrass shoots inside and outside of replicate Green Crab exclosures in a formerly vegetated area of upper Casco Bay. Following 26 d, mean survival of Eelgrass inside the exclosures was 82% and outside the exclosures was 24%. The mean plastochrone interval (time between formation of 2 successive leaves) of undamaged shoots was the same inside and outside the exclosures, and was comparable to published values from healthy Eelgrass beds in New England. Results implicate Green Crab bioturbation as a leading cause of Eelgrass loss from this system.

  18. Combating Memory Corruption Attacks On Scada Devices

    NASA Astrophysics Data System (ADS)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  19. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  20. Chemical characteristics of normal, woolly apple aphid-damaged, and mechanically damaged twigs of six apple cultivars, measured in autumn wood.

    PubMed

    Zhou, Hong-Xu; Wang, Xi-Cun; Yu, Yi; Tan, Xiu-Mei; Cheng, Zai-Quan; Zhang, An-Sheng; Men, Xing-Yuan; Li-Li, Li

    2013-04-01

    Chemical characteristics of normal, woolly apple aphid-damaged, and mechanically damaged twigs of six apple cultivars: Red Fuji, Golden Delicious, Qinguan, Zhaojin 108, Starkrimson, and Red General, were examined in autumn wood to provide abetter understanding of factors related to cultivar resistance to the woolly apple aphid, Eriosoma lanigerum (Hausmann). Chemical measures examined included soluble sugars, soluble proteins and amino acids, total phenolics, and polyphenol oxidase (that enhances the resistance of plants to insects) and superoxide dismutase, peroxidase, and catalase (that degrade waste products in plants). Soluble sugar, protein, and amino acid contents in normal (undamaged) twigs of Red Fuji, aphid-susceptible cultivar, were higher than in mechanically damaged and aphid-damaged twigs. Total phenolic compounds, an important group of defensive compounds against aphids, increased by 30.5 and 6.0% in mechanically damaged twigs of Qinguan and Zhaojin 108, respectively, and decreased by 21.7 and 16.1% in aphid-damaged twigs of Red Fuji and Red General, respectively. Compared with normal twigs, in aphid-damaged twigs, superoxide dismutase, peroxidase, and polyphenol activity all decreased in Red Fuji. The resistance of some apple cultivars to woolly apple aphid during the growth of autumn shoots was related to several of the physiological indices we monitored. The thin epidermis of callus tissue over healed wounds showed increased susceptibility to the attack by woolly apple aphid. Apple cultivar Qinguan with the highest level of resistance to woolly apple aphid in autumn had increased in amino acid, total phenolic compound levels, and enzyme activity after aphid feeding.

  1. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap

  2. Pre-Attack Symptomatology and Temperament as Predictors of Children's Responses to the September 11 Terrorist Attacks

    ERIC Educational Resources Information Center

    Lengua, Liliana J.; Long, Anna C.; Smith, Kimberlee I.; Meltzoff, Andrew N.

    2005-01-01

    Background: The aims of this study were to assess the psychological response of children following the September 11, 2001 terrorist attacks in New York and Washington, DC and to examine prospective predictors of children's post-attack responses. Method: Children's responses were assessed in a community sample of children in Seattle, Washington,…

  3. Modelling multi-hazard hurricane damages on an urbanized coast with a Bayesian Network approach

    USGS Publications Warehouse

    van Verseveld, H.C.W.; Van Dongeren, A. R.; Plant, Nathaniel G.; Jäger, W.S.; den Heijer, C.

    2015-01-01

    Hurricane flood impacts to residential buildings in coastal zones are caused by a number of hazards, such as inundation, overflow currents, erosion, and wave attack. However, traditional hurricane damage models typically make use of stage-damage functions, where the stage is related to flooding depth only. Moreover, these models are deterministic and do not consider the large amount of uncertainty associated with both the processes themselves and with the predictions. This uncertainty becomes increasingly important when multiple hazards (flooding, wave attack, erosion, etc.) are considered simultaneously. This paper focusses on establishing relationships between observed damage and multiple hazard indicators in order to make better probabilistic predictions. The concept consists of (1) determining Local Hazard Indicators (LHIs) from a hindcasted storm with use of a nearshore morphodynamic model, XBeach, and (2) coupling these LHIs and building characteristics to the observed damages. We chose a Bayesian Network approach in order to make this coupling and used the LHIs ‘Inundation depth’, ‘Flow velocity’, ‘Wave attack’, and ‘Scour depth’ to represent flooding, current, wave impacts, and erosion related hazards.The coupled hazard model was tested against four thousand damage observations from a case site at the Rockaway Peninsula, NY, that was impacted by Hurricane Sandy in late October, 2012. The model was able to accurately distinguish ‘Minor damage’ from all other outcomes 95% of the time and could distinguish areas that were affected by the storm, but not severely damaged, 68% of the time. For the most heavily damaged buildings (‘Major Damage’ and ‘Destroyed’), projections of the expected damage underestimated the observed damage. The model demonstrated that including multiple hazards doubled the prediction skill, with Log-Likelihood Ratio test (a measure of improved accuracy and reduction in uncertainty) scores between 0.02 and 0

  4. Infusing the Chemistry Curriculum with Green Chemistry Using Real-World Examples, Web Modules, and Atom Economy in Organic Chemistry Courses

    ERIC Educational Resources Information Center

    Cann, Michael C.; Dickneider, Trudy A.

    2004-01-01

    Green chemistry is the awareness of the damaging environmental effects due to chemical research and inventions. There is emphasis on a need to include green chemistry in synthesis with atom economy in organic chemistry curriculum to ensure an environmentally conscious future generation of chemists, policy makers, health professionals and business…

  5. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less

  6. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  7. Attacks on Bluetooth Security Architecture and Its Countermeasures

    NASA Astrophysics Data System (ADS)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  8. Green Urbanism for the Greener Future of Metropolitan Areas

    NASA Astrophysics Data System (ADS)

    Zaręba, Anna; Krzemińska, Alicja; Widawski, Krzysztof

    2016-10-01

    Intensive urbanization is swallowing municipal green areas which causes intensification of erosion, decrease in biodiversity and permanent fragmentation of habitats. In the face of these changes, a risk of irreversible damages to urban ecosystems is growing. That is why planning of solutions within the framework of Green Urbanism in metropolitan areas inhabited by over 55% of the global population is of extraordinary importance. The task of the paper is to present patterns of the Green Urbanism using selected examples of metropolitan areas as case studies. The main goal of the research is to make comparison between GU practices in different countries, in various spatial settings. The principles of triple zero framework: zero fossil-fuel energy use, zero waste, zero emissions (from low-to-no-carbon emissions) introduce not only the contemporary trends in theoretical urban planning but are dictated by practical considerations to create a healthy environment for a healthy society with a minimized environmental footprint. The research results help to identify Green Urbanism techniques used for multiple functions, including ecological, recreational, cultural, aesthetic and other uses and present opportunities for implementation of Green Urbanism solutions in metropolitan areas. To achieve healthier society and environment, highly congested and polluted cities have to be recreated through working with the existing landscape, topography and natural resources particular to the site.

  9. Green lasers are beyond power limits mandated by safety standards.

    PubMed

    Lee, M H; Fox, K; Goldwasser, S; Lau, D W M; Aliahmad, B; Sarossy, M

    2016-08-01

    There has been an increasing number of reports of people losing vision from laser exposure from pocket laser pointers despite the safety limit of 1 milliwatt (1mW) imposed by the Australian government. We hypothesize that this is because commercially available red and green laser pointers are exceeding their labeled power outputs. We tested the power outputs of 4 red and 4 green lasers which were purchased for less than AUD$30 each. The average of 10 measurements was recorded for each laser. We found that 3 out of 4 red lasers conformed to the 1mW safety standard; in contrast, all of the green lasers exceeded this limit, with one of the lasers recording an output of 127.9 mW. This contrast in compliance is explained by the construction of these lasers - green lasers are typically Diode Pumped Solid State (DPSS) lasers that can emit excessive infrared (IR) radiation with poor workmanship or inconsistent adherence to practices of safe design and quality control; red lasers are diode lasers which have limited power outputs due to `Catastrophic Optical Damage' (COD). Relevant professional bodies ought to advocate more strongly for stringent testing, quality control and licensing of DPSS lasers with a view towards government intervention to banning green laser pointer use.

  10. Inhibition property of green tea extract in relation to reserpine-induced ribosomal strips of rough endoplasmic reticulum (rER) of the rat kidney proximal tubule cells.

    PubMed

    Abdel-Majeed, Safer; Mohammad, Afzal; Shaima, Al-Bloushi; Mohammad, Rafique; Mousa, Shaker A

    2009-12-01

    The aim of this study was to evaluate the effect of green tea in inhibiting and reversing the nephrotoxicity of reserpine--a potent oxidative stress inducer--which induced cellular kidney damage. Serum biochemical parameters, antioxidant enzyme levels, thiobarbituric acid reactive substances (TBARS) and serum transaminases (glutamic oxaloacetic transaminase (GOT) and glutamic pyruvic transaminase (GPT)) values and histopathology were systematically evaluated. Reserpine exposure led to increase the oxidative stress and organ injury was significantly observed through biochemical parameters and ultrastructural evaluation. Sprague-Dawely (S.D.) rats were intraperitonealy administered reserpine to induce oxidative kidney damage. Experimental rats were given green tea extract according to the protocol given below. Sixty rats were randomly divided into six groups, with 10 rats in each group. Reserpine was found to cause kidney proximal tubule damage, such as stripping and clustering of ribosomes from the rough endoplasmic reticulum (rER) and demolishing of mitochondrial christae with elevated level of oxidative stress markers, such as TBARS. While the ultrastructural study showed a revival of kidney proximal tubule cells as a result of the administration of green tea extract to rats. We suggest that green tea might elevate antioxidant defense system, clean up free radicals, lessen oxidative damages and protect kidney against reserpine-induced toxicity and thus had a potential protective effect.

  11. Temporal Cyber Attack Detection.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ingram, Joey Burton; Draelos, Timothy J.; Galiardi, Meghan

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms requiremore » large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.« less

  12. Defender-Attacker Decision Tree Analysis to Combat Terrorism.

    PubMed

    Garcia, Ryan J B; von Winterfeldt, Detlof

    2016-12-01

    We propose a methodology, called defender-attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game-theoretic formulations of this problem, we assume that the defenders act rationally by maximizing their expected utility or minimizing their expected costs. However, we do not assume that attackers maximize their expected utilities. Instead, we encode the defender's limited knowledge about the attacker's motivations and capabilities as a conditional probability distribution over the attacker's decisions. We apply this methodology to the problem of defending against possible terrorist attacks on commercial airplanes, using one of three weapons: infrared-guided MANPADS (man-portable air defense systems), laser-guided MANPADS, or visually targeted RPGs (rocket propelled grenades). We also evaluate three countermeasures against these weapons: DIRCMs (directional infrared countermeasures), perimeter control around the airport, and hardening airplanes. The model includes deterrence effects, the effectiveness of the countermeasures, and the substitution of weapons and targets once a specific countermeasure is selected. It also includes a second stage of defensive decisions after an attack occurs. Key findings are: (1) due to the high cost of the countermeasures, not implementing countermeasures is the preferred defensive alternative for a large range of parameters; (2) if the probability of an attack and the associated consequences are large, a combination of DIRCMs and ground perimeter control are preferred over any single countermeasure. © 2016 Society for Risk Analysis.

  13. Stress-induced DNA Damage biomarkers: Applications and limitations

    NASA Astrophysics Data System (ADS)

    Nikitaki, Zacharenia; Hellweg, Christine; Georgakilas, Alexandros; Ravanat, Jean-Luc

    2015-06-01

    A variety of environmental stresses like chemicals, UV and ionizing radiation and organism’s endogenous processes like replication stress and metabolism can lead to the generation of reactive oxygen and nitrogen species (ROS/RNS) that can attack cellular vital components like DNA, proteins and lipid membranes. Among them, much attention has been focused on DNA since DNA damages play a role in several biological disorders and aging processes. Thus, DNA damage can be used as a biomarker in a reliable and accurate way to quantify for example radiation exposure and can indicate its possible long term effects and cancer risk. Based on the type of DNA lesions detected one can hypothesize on the most probable mechanisms involved in the formation of these lesions for example in the case of UV and ionizing radiation (e.g. X- or α-, γ-rays, energetic ions, neutrons). In this review we describe the most accepted chemical pathways for DNA damage induction and the different types of DNA lesions, i.e. single, complex DNA lesions etc. that can be used as biomarkers. We critically compare DNA damage detection methods and their limitations. In addition to such DNA damage products, we suggest possible gene inductions that can be used to characterize responses to different types of stresses i.e. radiation, oxidative and replication stress, based on bioinformatic approaches and stringent meta-analysis of literature data.

  14. Salvaging and Conserving Water Damaged Photographic Materials

    NASA Astrophysics Data System (ADS)

    Suzuki, Ryuji

    Degradation of water damaged photographic materials is discussed; the most vulnerable elements are gelatin layers and silver image. A simple and inexpensive chemical treatment is proposed, consisting of a bath containing a gelatin-protecting biocide and a silver image protecting agent. These ingredients were selected among those used in manufacturing of silver halide photographic emulsions or processing chemicals. Experiments confirmed that this treatment significantly reduced oxidative attacks to silver image and bacterial degradation of gelatin layers. The treated material was also stable under intense light fading test. Method of hardening gelatin to suppress swelling is also discussed.

  15. Factors governing risk of cougar attacks on humans

    USGS Publications Warehouse

    Mattson, David; Logan, Kenneth; Sweanor, Linda

    2011-01-01

    Since the 1980s wildlife managers in the United States and Canada have expressed increasing concern about the physical threat posed by cougars (Puma concolor) to humans. We developed a conceptual framework and analyzed 386 human–cougar encounters (29 fatal attacks, 171 instances of nonfatal contact, and 186 close-threatening encounters) to provide information relevant to public safety. We conceived of human injury and death as the outcome of 4 transitions affected by different suites of factors: (1) a human encountering a cougar: (2) given an encounter, odds that the cougar would be aggressive; (3) given aggression, odds that the cougar would attack; and (4) given an attack, odds that the human would die. We developed multivariable logistic regression models to explain variation in odds at transitions three and four using variables pertaining to characteristics of involved people and cougars. Young (≤ 2.5 years) or unhealthy (by weight, condition, or disease) cougars were more likely than any others to be involved in close (typically <5 m) encounters that threatened the involved person. Of cougars in close encounters, females were more likely than males to attack, and of attacking animals, adults were more likely than juveniles to kill the victim (32% versus 9% fatality, respectively). During close encounters, victims who used a weapon killed the involved cougar in 82% of cases. Other mitigating behaviors (e.g., yelling, backing away, throwing objects, increasing stature) also substantially lessened odds of attack. People who were moving quickly or erratically when an encounter happened (running, playing, skiing, snowshoeing, biking, ATV-riding) were more likely to be attacked and killed compared to people who were less active (25% versus 8% fatality). Children (≤ 10 years) were more likely than single adults to be attacked, but intervention by people of any age reduced odds of a child’s death by 4.6×. Overall, cougar attacks on people in Canada and the

  16. Acquired auditory neuropathy spectrum disorder after an attack of chikungunya: case study.

    PubMed

    Prabhu, Prashanth

    2016-01-01

    Auditory neuropathy spectrum disorder (ANSD) is a retrocochlear disorder in which the cochlear functioning is normal but the transmission in the auditory neural pathway is affected. The present study reports of a 14-year-old teenager with acquired ANSD after an attack of chikungunya. He reported symptoms of difficulty in understanding speech, tinnitus and vertigo when exposed to loud sounds. The audiological characteristics suggested auditory neuropathy spectrum disorder with raising audiogram configuration. The results of tinnitus evaluation showed low-pitched tinnitus and it was persistent causing significant handicap to him based on self report tinnitus handicap questionnaire results. The results of depression, anxiety and stress scale also suggested symptoms of mild depression and anxiety. Chikungunya virus is suspected to be neurotropic in nature which can damage auditory nerve cells and may have caused ANSD. The result also shows presence of tullio's phenomenon and absence of cervical vestibular evoked myogenic potentials suggesting damage to the vestibular neuronal system. The possible pathophysiology of chikungunya virus causing ANSD and vestibular symptoms needs to be explored further in future studies.

  17. Step to improve neural cryptography against flipping attacks.

    PubMed

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  18. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    PubMed

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  19. Panic Attack during Elective Gastrointestinal Endoscopy.

    PubMed

    Mitsonis, Charalampos; Dimopoulos, Nikolaos; Zavrou, Marianna; Psarra, Vassiliki; Giofkos, Christos; Fiorakis, Christos; Dimitriadis, Athanasios; Valavanis, Dimitrios; Vousoura, Eleni; Zervas, Iannis; Papavassiliou, Efstathios

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y). Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, P < 0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, P < 0.05). Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  20. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annarita Giani; Eilyan Bitar; Miles McQueen

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacksmore » [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.« less

  1. Behavior of Escherichia coli O157:H7 on damaged leaves of spinach, lettuce, cilantro, and parsley stored at abusive temperatures.

    PubMed

    Khalil, Rowaida K; Frank, Joseph F

    2010-02-01

    Recent foodborne illness outbreaks associated with the consumption of leafy green produce indicates a need for additional information on the behavior of pathogenic bacteria on these products. Previous research indicates that pathogen growth and survival is enhanced by leaf damage. The objective of this study was to compare the behavior of Escherichia coli O157:H7 on damaged leaves of baby Romaine lettuce, spinach, cilantro, and parsley stored at three abusive temperatures (8, 12, and 15 degrees C). The damaged portions of leaves were inoculated with approximately 10(5) CFU E. coli O157:H7 per leaf. The pathogen grew on damaged spinach leaves held for 3 days at 8 and 12 degrees C (P < 0.05), with the population increasing by 1.18 and 2.08 log CFU per leaf, respectively. E. coli O157:H7 did not grow on damaged Romaine leaves at 8 or 12 degrees C, but growth was observed after 8 h of storage at 15 degrees C, with an increase of less than 1.0 log. Growth of E. coli O157:H7 on Romaine lettuce held at 8 or 12 degrees C was enhanced when inocula were suspended in 0.05% ascorbic acid, indicating the possibility of inhibition by oxidation reactions associated with tissue damage. Damaged cilantro and Italian parsley leaves held at 8 degrees C for 4 days did not support the growth of E. coli O157:H7. Behavior of the pathogen in leaf extracts differed from behavior on the damaged tissue. This study provides evidence that the damaged portion of a leafy green is a distinct growth niche that elicits different microbial responses in the various types of leafy greens.

  2. Comparative efficacy of storage bags, storability and damage potential of bruchid beetle.

    PubMed

    Harish, G; Nataraja, M V; Ajay, B C; Holajjer, Prasanna; Savaliya, S D; Gedia, M V

    2014-12-01

    Groundnut during storage is attacked by number of stored grain pests and management of these insect pests particularly bruchid beetle, Caryedon serratus (Oliver) is of prime importance as they directly damage the pod and kernels. In this regard different storage bags that could be used and duration up to which we can store groundnut has been studied. Super grain bag recorded minimum number of eggs laid and less damage and minimum weight loss in pods and kernels in comparison to other storage bags. Analysis of variance for multiple regression models were found to be significant in all bags for variables viz, number of eggs laid, damage in pods and kernels, weight loss in pods and kernels throughout the season. Multiple comparison results showed that there was a high probability of eggs laid and pod damage in lino bag, fertilizer bag and gunny bag, whereas super grain bag was found to be more effective in managing the C. serratus owing to very low air circulation.

  3. Public knowledge of heart attack in a Nepalese population survey.

    PubMed

    Limbu, Yuba R; Malla, Rabi; Regmi, Shyam R; Dahal, Ramesh; Nakarmi, Hari L; Yonzan, Ganesh; Gartaula, Ritu P

    2006-01-01

    Limited knowledge of heart attack symptoms may prevent patients from seeking time-dependent thrombolytic therapy, an intervention that offers impressive survival benefit. Previous studies carried out in developed countries demonstrated a deficit of knowledge about a wide range of heart attack symptoms. The aim of this study was to describe knowledge of heart attack, knowledge of heart attack symptoms, and anticipated first response to symptoms among the lay public in Nepal. A total of 1192 participants (657 men and 535 women age 16 to 88 years old) were interviewed in a cross-sectional manner. Those <16 years of age, all health professionals, and individuals with a history of heart attack were excluded. A total of 862 (72.3%) participants had heard of heart attack. Significantly more male than female participants had heard of heart attack (P <.001). Of the respondents, 91.7% with >or=10 years of education (ED-2) had heard of heart of attack, whereas only 54% respondents with <10 years of education or who were illiterate (unable to read and write) (ED-1) had heard of heart attack, and in both the male and female populations, a higher percentage of the ED-2 group had heard of heart attack than the ED-1 group (92.6% vs. 60% and 85.6% vs. 49.6%, respectively). A significantly higher number of respondents from 31 to 50 years of age (AGE-2) had heard of heart attack than those 16 to 30 years of age (AGE-1) and those >50 years of age (AGE-3) (P <.001). Among 862 respondents who had heard of heart attack, 21.3% could not name any heart attack symptoms. A total of 16 different heart attack symptoms were named. Fainting or collapsing (48%), chest pain (22.4%), shortness of breath (9%), dizziness (8.4%), palpitations (7.4%), and sweating (7.4%) were the leading symptoms named by respondents. Fainting or collapsing and chest pain and shortness of breath were named more frequently among the ED-2 group respondents and the AGE-3 group men. Only 3.7% could name >or=2 typical heart

  4. Panic attacks. Psychologic response or medical illness?

    PubMed

    Katerndahl, D A

    1984-06-01

    Panic attacks are surprisingly common in the United States, costing our economy more than $100 million per year in disability benefits and health care expenses. However, diagnosis is difficult and consequently many patients are treated for other conditions. When an underlying disorder is determined to be present, treatment of that disorder may ameliorate attacks. If none is present, panic symptoms will respond to a variety of drugs. Behavioral therapy may be necessary in severe cases or as adjunctive therapy after attacks abate.

  5. Socioeconomic Inequalities in Green Space Quality and Accessibility—Evidence from a Southern European City

    PubMed Central

    Hoffimann, Elaine; Barros, Henrique; Ribeiro, Ana Isabel

    2017-01-01

    Background: The provision of green spaces is an important health promotion strategy to encourage physical activity and to improve population health. Green space provision has to be based on the principle of equity. This study investigated the presence of socioeconomic inequalities in geographic accessibility and quality of green spaces across Porto neighbourhoods (Portugal). Methods: Accessibility was evaluated using a Geographic Information System and all the green spaces were audited using the Public Open Space Tool. Kendall’s tau-b correlation coefficients and ordinal regression were used to test whether socioeconomic differences in green space quality and accessibility were statistically significant. Results: Although the majority of the neighbourhoods had an accessible green space, mean distance to green space increased with neighbourhood deprivation. Additionally, green spaces in the more deprived neighbourhoods presented significantly more safety concerns, signs of damage, lack of equipment to engage in active leisure activities, and had significantly less amenities such as seating, toilets, cafés, etc. Conclusions: Residents from low socioeconomic positions seem to suffer from a double jeopardy; they lack both individual and community resources. Our results have important planning implications and might contribute to understanding why deprived communities have lower physical activity levels and poorer health. PMID:28809798

  6. Socioeconomic Inequalities in Green Space Quality and Accessibility-Evidence from a Southern European City.

    PubMed

    Hoffimann, Elaine; Barros, Henrique; Ribeiro, Ana Isabel

    2017-08-15

    Background : The provision of green spaces is an important health promotion strategy to encourage physical activity and to improve population health. Green space provision has to be based on the principle of equity. This study investigated the presence of socioeconomic inequalities in geographic accessibility and quality of green spaces across Porto neighbourhoods (Portugal). Methods : Accessibility was evaluated using a Geographic Information System and all the green spaces were audited using the Public Open Space Tool. Kendall's tau-b correlation coefficients and ordinal regression were used to test whether socioeconomic differences in green space quality and accessibility were statistically significant. Results : Although the majority of the neighbourhoods had an accessible green space, mean distance to green space increased with neighbourhood deprivation. Additionally, green spaces in the more deprived neighbourhoods presented significantly more safety concerns, signs of damage, lack of equipment to engage in active leisure activities, and had significantly less amenities such as seating, toilets, cafés, etc. Conclusions : Residents from low socioeconomic positions seem to suffer from a double jeopardy; they lack both individual and community resources. Our results have important planning implications and might contribute to understanding why deprived communities have lower physical activity levels and poorer health.

  7. Spatio-temporal patterns of attacks on human and economic losses from wildlife in Chitwan National Park, Nepal.

    PubMed

    Lamichhane, Babu Ram; Persoon, Gerard A; Leirs, Herwig; Poudel, Shashank; Subedi, Naresh; Pokheral, Chiranjibi Prasad; Bhattarai, Santosh; Thapaliya, Bishnu Prasad; de Iongh, Hans H

    2018-01-01

    Wildlife attacks on humans and economic losses often result in reduced support of local communities for wildlife conservation. Information on spatial and temporal patterns of such losses in the highly affected areas contribute in designing and implementing effective mitigation measures. We analyzed the loss of humans, livestock and property caused by wildlife during 1998 to 2016, using victim family's reports to Chitwan National Park authorities and Buffer Zone User Committees. A total of 4,014 incidents were recorded including attacks on humans, livestock depredation, property damage and crop raiding caused by 12 wildlife species. In total >400,000 US dollar was paid to the victim families as a relief over the whole period. Most of the attacks on humans were caused by rhino, sloth bear, tiger, elephant, wild boar and leopard. A significantly higher number of conflict incidents caused by rhino and elephant were observed during full moon periods. An increase in the wildlife population did not coincide with an equal rise in conflict incidents reported. Underprivileged ethnic communities were attacked by wildlife more frequently than expected. Number of attacks on humans by carnivores and herbivores did not differ significantly. An insignificant decreasing trend of wildlife attacks on humans and livestock was observed with significant variation over the years. Tiger and leopard caused >90% of livestock depredation. Tigers killed both large (cattle and buffalo) and medium sized (goat, sheep, pig) livestock but leopard mostly killed medium sized livestock. Most (87%) of the livestock killing during 2012-2016 occurred within the stall but close (<500m) to the forest edge. Both the percentage of households with livestock and average holding has decreased over the years in buffer zone. Decreased forest dependency as well as conflict mitigation measures (electric and mesh wire fences) have contributed to keep the conflict incidents in control. Strengthening mitigation

  8. OPERATION COBRA. Deliberate Attack, Exploitation

    DTIC Science & Technology

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  9. Green Bonds and climate change: State of the art or artful dodge?

    NASA Astrophysics Data System (ADS)

    Queen, Irene T.

    Debt-finance is a growing opportunity to fund environmental solutions. Green Bonds are being used by investors wishing to improve their Corporate Social Responsibility positions while maintaining valid returns on their investments. Based on the well-established bond-finance model, Green Bonds put money into diverse environmental projects addressing impacts from climate changes, depletion of natural resources, biodiversity loss, and pollution control. “Green” is a voluntary designation, based on a set of guidelines known as the Green Bond Principles. With varying degrees of clarity regarding their use and environmental impact and whether they are a viable solution to climate damages or merely a “greenwashed” ploy used by some issuers to appear more sustainable were questions examined as part of this research. A concise summary briefing (Appendix A), case study draft, and targeted public engagements were completed. Adaptability and responsiveness, sustainability, credibility, legitimacy, and opportunity for social transformation through the use of Green Bonds were reviewed using a case study analysis method. A unique pool of investment capital being mobilized by Green Bonds is emerging through motivated environmental investment coalitions. A review of the integrated impacts of Green Bonds as well as practical knowledge for their issuance is described here.

  10. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    NASA Astrophysics Data System (ADS)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  11. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  12. Counteracting Power Analysis Attacks by Masking

    NASA Astrophysics Data System (ADS)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  13. Damage Assessment of Two-Way Bending RC Slabs Subjected to Blast Loadings

    PubMed Central

    Jia, Haokai; Wu, Guiying

    2014-01-01

    Terrorist attacks on vulnerable structures and their individual structural members may cause considerable damage and loss of life. However, the research work on response and damage analysis of single structural components, for example, a slab to blast loadings, is limited in the literature and this is necessary for assessing its vulnerability. This study investigates the blast response and damage assessment of a two-way bending reinforced concrete (RC) slab subjected to blast loadings. Numerical modeling and analysis are carried out using the commercial finite element code LS-DYNA 971. A damage assessment criterion for the two-way bending RC slab is defined based on the original and residual uniformly distributed load-carrying capacity. Parametric studies are carried out to investigate the effects of explosive weight and explosive position on the damage mode of the two-way RC slab. Some design parameters, such as the boundary conditions and the negative reinforcement steel bar length, are also discussed. The illustrated results show that the proposed criterion can apply to all failure modes. The damage assessment results are more accurate than the ones due to the conventional deformation criterion. PMID:25121134

  14. [Occurrence of Solenopsis saevissima F Smith (Hymenoptera: Formicidae) damaging Schizolobium amazonicum].

    PubMed

    Lunz, Alexandre M; Harada, Ana Y; Aguiar, Tanice da S; Cardoso, Andreza S

    2009-01-01

    Injuries by Solenopsis saevissima F Smith in paricá (Schizolobium amazonicum) trees are described for the first time in Dom Eliseu County, Pará State, Brazil. This ant damages leaves and the shaft where holes and galleries are opened up to the plant shoot. Terminal and new shoots are attacked and destroyed, harming the development of upright and uniform trunks for commercialization. Arboreal nests constructed by this ant were also observed in some plants.

  15. Public Figure Attacks in the United States, 1995-2015.

    PubMed

    Meloy, J Reid; Amman, Molly

    2016-09-01

    An archival descriptive study of public figure attackers in the United States between 1995 and 2015 was undertaken. Fifty-six incidents were identified, primarily through exhaustive internet searches, composed of 58 attackers and 58 victims. A code book was developed which focused upon victims, offenders, pre-attack behaviors including direct threats, attack characteristics, post-offense and other outcomes, motivations and psychological abstracts. The average interrater agreement for coding of bivariate variables was 0.835 (intraclass correlation coefficient). The three most likely victim categories were politicians, judges, and athletes. Attackers were males, many with a psychiatric disorder, most were grandiose, and most had both a violent and nonviolent criminal history. The known motivations for the attacks were often angry and personal, the most common being dissatisfaction with a judicial or other governmental process (23%). In only one case was the primary motivation to achieve notoriety. Lethality risk during an attack was 55%. Collateral injury or death occurred in 29% of the incidents. Only 5% communicated a direct threat to the target beforehand. The term "publicly intimate figure" is introduced to describe the sociocultural blurring of public and private lives among the targets, and its possible role in some attackers' perceptions and motivations. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  16. Shark attack in Natal.

    PubMed

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  17. [Incidence and damages inflicted by simuliid flies in the GDR district of Schwerin].

    PubMed

    Gräfner, G; Zimmermann, H; Karge, E; Münch, J; Ribbeck, R; Hiepe, T

    1976-03-01

    Systematic faunal studies in the district Schwerin showed at the present time there are 3 more or less damage-biotopes existing in the districts of Perleberg, Ludwigslust and Parchim; 5 river sources can be considered as potential sources, 5 are temporary and 2 are ephemeral whilst in 3 further areas environmental influences such as effluent impairs the flow of the river and the developmental stages of Simuliidae were not observed.--The following species were found: Boophthora erythrocephala, Wilhelmia salopiensis, Wilhelmia equina, Odagmia ornata, Eusimulium aureum and Eusimulium lundstroemi.--The damage statistics covering the period 1966--1971 showed in the district of Schwerin, due to Simuliid attacks, 38 cattle died, 170 were seriously ill; in 1967 5 horses were seriously ill; in 1971, 3 pigs died and 27 were seriously ill.--The symptoms were manifested by pathological petechiae, scabs and oedema, also by insufficiency of the heart and circulatory system, diminished performance and growth disturbance. In severe cases heart and circulation failure occurred, paresis, coma and death followed.--The real economic significance of the Simuliid attacks rest with its strong and prolonged distrubance in young animals, as well as in pronounced irreparable diminished performance in diseased dairy cattle.

  18. Sensitivity to carbon dioxide in subjects with a single lifetime panic attack: possible clinical "bedside" predictive test for panic disorder after a first attack.

    PubMed

    Berzak, Elina; Reznik, Mila; Narsia, Oxana; Benjamin, Jonathan

    2004-01-01

    There is currently no way of knowing whether a patient who has recently had a single panic attack has incipient panic disorder. Sensitivity to carbon dioxide (CO2) is lower in healthy volunteers than in panic disorder patients. If this is also true of people who experience a single lifetime panic attack, it could be used as a prognostic test. Subjects with a single lifetime panic attack and subjects with panic disorder received an inhalation of 35% CO2. Subjects completed the panic symptoms scale (PSS), and also stated whether they considered that they had experienced an attack. None of 14 subjects with a single lifetime panic attack, compared to 7 of 17 subjects with panic disorder (P=.009), had an attack. The PSS also distinguished between the groups. The 35% CO2 challenge warrants further investigation as a predictive test after a first panic attack.

  19. Can Vitamins Help Prevent a Heart Attack?

    MedlinePlus

    ... taking vitamins help prevent heart disease or a heart attack? Answers from Rekha Mankad, M.D. It's not yet clear ... risk of developing heart disease or having a heart attack. But, what is known is that no vitamin ...

  20. Attacker-defender game from a network science perspective

    NASA Astrophysics Data System (ADS)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  1. Research on high power intra-channel crosstalk attack in optical networks

    NASA Astrophysics Data System (ADS)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  2. Transient Ischemic Attack

    MedlinePlus

    A transient ischemic attack (TIA) is a stroke that lasts only a few minutes. It happens when the blood supply to part of the brain is briefly blocked. Symptoms of a TIA are like other stroke symptoms, but do not ...

  3. Extraction and removal of caffeine from green tea by ultrasonic-enhanced supercritical fluid.

    PubMed

    Tang, Wei-Qiang; Li, Di-Cai; Lv, Yang-Xiao; Jiang, Jian-Guo

    2010-05-01

    Low-caffeine or caffeine-removed tea and its products are widely welcomed on market in recent years. In the present study, we adopt ultrasonic-enhanced supercritical fluid extraction process to remove caffeine from green tea. An orthogonal experiment (L16 (4(5))) was applied to optimize the best removal conditions. Extraction pressure, extraction time, power of ultrasound, moisture content, and temperature were the main factors to influence the removal rate of caffeine from green tea. The 5 factors chosen for the present investigation were based on the results of a single-factor test. The optimum removal conditions were determined as follows: extraction pressure of 30 MPa, temperature at 55 degrees C, time of 4 h, 30% moisture content, and ultrasound power of 100 W. Chromatogram and ultraviolet analysis of raw material and decaffeinates suggests that under optimized conditions, the caffeine of green tea was effectively removed and minished without damaging the structure of active ingredients in green tea.

  4. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.

    PubMed

    Grosshans, Frédéric; Cerf, Nicolas J

    2004-01-30

    A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.

  5. Risk factors for hypertensive attack during pheochromocytoma resection

    PubMed Central

    Kwon, Se Yun; Lee, Kyung Seop; Lee, Jun Nyung; Ha, Yun-Sok; Choi, Seock Hwan; Kim, Hyun Tae; Kim, Tae-Hwan; Yoo, Eun Sang

    2016-01-01

    Purpose We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. Materials and Methods Data from 53 patients diagnosed with pheochromocytoma at Kyungpook National Uriversity Medical Center between January 2000 and June 2012 were retrospectively analyzed. The subjects were divided into 2 groups depending on the presence or absence of hypertensive attack at the time of surgery. Patient demographic characteristics and preoperative evaluations were assessed for their prognostic relevance with respect to hypertensive attack. A univariate analysis was conducted, and a multivariate logistic regression analysis was also performed. Results In the univariate analysis, systolic blood pressure at presentation, preoperative hormonal status (including epinephrine, norepinephrine, vanillylmandelic acid, and metanephrine levels in a 24-hour urine sample), tumor size, and postoperative systolic blood pressure were significantly associated with the development of hypertensive attack. In the multivariate analysis, preoperative epinephrine level and tumor size were independent factors that predicted hypertensive attack. The highest odds ratio for tumor size (2.169) was obtained at a cutoff value of 4.25 cm and the highest odds ratio for preoperative epinephrine (1.020) was obtained at a cutoff value of 166.3 µg/d. Conclusions In this study, a large tumor size and an elevated preoperative urinary epinephrine level were risk factors for intraoperative hypertensive attack in patients with pheochromocytoma. PMID:27194549

  6. Effectiveness of the call in beach volleyball attacking play.

    PubMed

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-09

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p < 0.0005). Taking into account the findings of the present study, we suggested that the call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  7. The 2009 Sydney shark attacks: case series and literature review.

    PubMed

    Rtshiladze, Michael Alexander; Andersen, Sean Peter; Nguyen, Dai Quoc Anh; Grabs, Anthony; Ho, Kevin

    2011-05-01

    There were 59 unprovoked shark attacks worldwide in 2008. Twelve of these occurred in Australia, ranking it as second only to the USA. In February 2009, two attacks occurred within 72 h in Sydney, Australia. The two patients involved survived severe limb trauma. Case 1 suffered bite trauma to the lower limb and hand and underwent staged debridement and early amputation. Case 2 presented with a hand severed at the level of the wrist that was initially replanted. However, it would succumb to progressive necrosis after 12 days. We discuss the aspects of these cases that contributed to the patients' survival and ultimately good functional outcomes. New paradigms for the management of major trauma patients have emerged over the last decade. We consider recent advances in the understanding of pre-hospital tourniquet use, rapid transit to the operating suite and damage control surgery, and examine how they impacted on the management of our patients. Very little is known about the microbiology of shark bites. Organisms from sea water, the patient's skin and the shark's mouth must all be considered when selecting appropriate antimicrobial prophylaxis. The planning of definitive surgery in severe limb trauma is dependent on the interactions of a number of factors including physical, psychological and social issues. The decision to ultimately replant or amputate the effected limb is best made in union with the patient and their family. © 2011 The Authors. ANZ Journal of Surgery © 2011 Royal Australasian College of Surgeons.

  8. Case report: Pig attack with successful postexposure prophylaxis management.

    PubMed

    Hall, A Brad; Smith, David; Palmer, Jillian

    2014-05-01

    The domesticated pig or boar is ubiquitous to agriculture around the world and is an important food product in most countries. The males that are able to grow tusks that can approach 5 in are the primary contributor to morbidity and mortality from boar attacks. Literature surrounding domesticated boar attacks is sparse. There are no published cases of domesticated boar attacks that describe successful bacterial postexposure prophylaxis. We present a case report of an attack on an adult female by a domesticated boar.

  9. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  10. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-14

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  11. Finite Energy and Bounded Attacks on Control System Sensor Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less

  12. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  13. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  14. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  15. Aircraft Battle Damage Repair for the 90’s and Beyond

    DTIC Science & Technology

    1994-03-01

    far greater than was the US system during the Viet - nam Conflict. In fact, the United States mounted a large-scale resupply effort to assirt the...8217,luded. The procedures restore suffi. ciezu strength to accomplish the required mnission while avoidilig unnecessar-y or cosmetic repairs. The ABDR...from a mission with structural damage. 4 As the war escalated in 1964, the Viet Cong began their attack on US Air Force bases and during the course of

  16. Attack Helicopter Operations: Art or Science

    DTIC Science & Technology

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  17. Attack by Pyemotes johnmoseri (Acari: Pyemotidae)

    Treesearch

    Tulin Askit; Ibrahim Cakmak; John Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸it et al. 2003). This pest attacks...

  18. Normobaric hyperoxia markedly reduces brain damage and sensorimotor deficits following brief focal ischaemia.

    PubMed

    Ejaz, Sohail; Emmrich, Julius V; Sitnikov, Sergey L; Hong, Young T; Sawiak, Stephen J; Fryer, Tim D; Aigbirhio, Franklin I; Williamson, David J; Baron, Jean-Claude

    2016-03-01

    'True' transient ischaemic attacks are characterized not only clinically, but also radiologically by a lack of corresponding changes on magnetic resonance imaging. During a transient ischaemic attack it is assumed that the affected tissue is penumbral but rescued by early spontaneous reperfusion. There is, however, evidence from rodent studies that even brief focal ischaemia not resulting in tissue infarction can cause extensive selective neuronal loss associated with long-lasting sensorimotor impairment but normal magnetic resonance imaging. Selective neuronal loss might therefore contribute to the increasingly recognized cognitive impairment occurring in patients with transient ischaemic attacks. It is therefore relevant to consider treatments to reduce brain damage occurring with transient ischaemic attacks. As penumbral neurons are threatened by markedly constrained oxygen delivery, improving the latter by increasing arterial O2 content would seem logical. Despite only small increases in arterial O2 content, normobaric oxygen therapy experimentally induces significant increases in penumbral O2 pressure and by such may maintain the penumbra alive until reperfusion. Nevertheless, the effects of normobaric oxygen therapy on infarct volume in rodent models have been conflicting, although duration of occlusion appeared an important factor. Likewise, in the single randomized trial published to date, early-administered normobaric oxygen therapy had no significant effect on clinical outcome despite reduced diffusion-weighted imaging lesion growth during therapy. Here we tested the hypothesis that normobaric oxygen therapy prevents both selective neuronal loss and sensorimotor deficits in a rodent model mimicking true transient ischaemic attack. Normobaric oxygen therapy was applied from the onset and until completion of 15 min distal middle cerebral artery occlusion in spontaneously hypertensive rats, a strain representative of the transient ischaemic attack

  19. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  20. A Traceability Attack against e-Passports

    NASA Astrophysics Data System (ADS)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  1. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  2. Multi-criteria analysis of the mechanism of degradation of Portland cement based mortars exposed to external sulphate attack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    El-Hachem, R.; Roziere, E.; Grondin, F.

    2012-10-15

    This work aims to contribute to the design of durable concrete structures exposed to external sulphate attacks (ESA). Following a preliminary study aimed at designing a representative test, the present paper suggests a study on the effect of the water-to-cement (w/c) ratio and the cement composition in order to understand the degradation mechanisms. Length and mass measurements were registered continuously, leached calcium and hydroxide ions were also quantified. In parallel, scanning electron microscopy observations as well as X-ray microtomography were realised at different times to identify the formed products and the crack morphology. Test results provide information on the basicmore » aspects of the degradation mechanism, such as the main role of leaching and diffusion in the sulphate attack process. The mortar composition with a low w/c ratio leads to a better resistance to sulphate attack because the microstructure is less permeable. Reducing the C{sub 3}A content results in a macro-cracking decrease but it does not prevent expansion, which suggests the contribution of other expansive products, such as gypsum, in damage due to ESA. The observation of the cracks network in the microstructure helps to understand the micro-mechanisms of the degradation process.« less

  3. A Unique Fatal Moose Attack Mimicking Homicide.

    PubMed

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  4. Recovery of infrastructure networks after localised attacks

    PubMed Central

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  5. Induction of panic attack by stimulation of the ventromedial hypothalamus.

    PubMed

    Wilent, W Bryan; Oh, Michael Y; Buetefisch, Cathrin M; Bailes, Julian E; Cantella, Diane; Angle, Cindy; Whiting, Donald M

    2010-06-01

    Panic attacks are sudden debilitating attacks of intense distress often accompanied by physical symptoms such as shortness of breath and heart palpitations. Numerous brain regions, hormones, and neurotransmitter systems are putatively involved, but the etiology and neurocircuitry of panic attacks is far from established. One particular brain region of interest is the ventromedial hypothalamus (VMH). In cats and rats, electrical stimulation delivered to the VMH has been shown to evoke an emotional "panic attack-like" escape behavior, and in humans, stimulation targeting nuclei just posterior or anterior to the VMH has reportedly induced panic attacks. The authors report findings obtained in an awake patient undergoing bilateral implantation of deep brain stimulation electrodes into the hypothalamus that strongly implicates the VMH as being critically involved in the genesis of panic attacks. First, as the stimulating electrode progressed deeper into the VMH, the intensity of stimulation required to evoke an attack systematically decreased; second, while stimulation of the VMH in either hemisphere evoked panic, stimulation that appeared to be in the center of the VMH was more potent. Thus, this evidence supports the role of the VMH in the induction of panic attacks purported by animal studies.

  6. Optimal response to attacks on the open science grids.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in themore » grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.« less

  7. Effect of fluorescent pseudomonades and Trichoderma sp. and their combination with two chemicals on Penicillium digitatum caused agent of citrus green mold.

    PubMed

    Zamani, M; Tehrani, A Sharifi; Ahmadzadeh, M; Abadi, A Alizadeh Ali

    2006-01-01

    Citrus green mold (Penicillium digitatum) causes economic losses. Chemical fungicides such as imazalil provide the primary means for controlling green mold decay of citrus fruits. Continuous use of fungicides has faced two major obstacles- increasing public concern regarding contamination of perishables with fungicidal residues, and proliferation of resistance in the pathogen populations. The aim of this research was to determine if the attacks of green mold on orange could be reduced by usage of biocontrol agent alone or in combination with low dosage of imazalil or sodium bicarbonate. Pseudomonas fluorescens isolate PN, P. fluorescens isolate PS and Trichoderma virens isolate TE were evaluated as potential biological agents for control of green mold of oranges caused by P. digitatum. Increasing concentration of SB decreased spore germination of P. digitatum. In laboratory tests, a cell suspension (10(8) cells per ml.) of bacterial strains reduced the incidence of green mold. On fruits surface biocontrol activity of antagonistic isolates was significantly increased when combined with low dosage of imazalil (500ppm) or sodium carbonate (5%). Effect of Trichoderma virens on controlling P. digitatum was better than others with or without these chemicals.

  8. Robustness of network of networks under targeted attack.

    PubMed

    Dong, Gaogao; Gao, Jianxi; Du, Ruijin; Tian, Lixin; Stanley, H Eugene; Havlin, Shlomo

    2013-05-01

    The robustness of a network of networks (NON) under random attack has been studied recently [Gao et al., Phys. Rev. Lett. 107, 195701 (2011)]. Understanding how robust a NON is to targeted attacks is a major challenge when designing resilient infrastructures. We address here the question how the robustness of a NON is affected by targeted attack on high- or low-degree nodes. We introduce a targeted attack probability function that is dependent upon node degree and study the robustness of two types of NON under targeted attack: (i) a tree of n fully interdependent Erdős-Rényi or scale-free networks and (ii) a starlike network of n partially interdependent Erdős-Rényi networks. For any tree of n fully interdependent Erdős-Rényi networks and scale-free networks under targeted attack, we find that the network becomes significantly more vulnerable when nodes of higher degree have higher probability to fail. When the probability that a node will fail is proportional to its degree, for a NON composed of Erdős-Rényi networks we find analytical solutions for the mutual giant component P(∞) as a function of p, where 1-p is the initial fraction of failed nodes in each network. We also find analytical solutions for the critical fraction p(c), which causes the fragmentation of the n interdependent networks, and for the minimum average degree k[over ¯](min) below which the NON will collapse even if only a single node fails. For a starlike NON of n partially interdependent Erdős-Rényi networks under targeted attack, we find the critical coupling strength q(c) for different n. When q>q(c), the attacked system undergoes an abrupt first order type transition. When q≤q(c), the system displays a smooth second order percolation transition. We also evaluate how the central network becomes more vulnerable as the number of networks with the same coupling strength q increases. The limit of q=0 represents no dependency, and the results are consistent with the classical

  9. Pulsed laser-induced damage of metals at 492 nm.

    PubMed

    Marrs, C D; Faith, W N; Dancy, J H; Porteus, J O

    1982-11-15

    A triaxial flashlamp-pumped dye laser has been used to perform laser damage testing of metal surfaces in the blue-green spectral region. Using LD490 laser dye, the laser produces 0.18-J, 0.5-microsec pulses at 492 nm. The spatial profile of the focused beam is measured in orthogonal directions in the plane of the sample surface. The orthogonal profiles are flat-topped Gaussians with 1/e(2) widths of 270 microm. Multithreshold laser damage test results are presented for polished Mo, diamond-turned high-purity Al alloy, diamond-turned bulk Cu, and diamond-turned electrodeposits of Ag and Au on Cu. Comparisons are made between calculated and experimentally measured slip and melt thresholds.

  10. The non-trusty clown attack on model-based speaker recognition systems

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2015-03-01

    Biometric detectors for speaker identification commonly employ a statistical model for a subject's voice, such as a Gaussian Mixture Model, that combines multiple means to improve detector performance. This allows a malicious insider to amend or append a component of a subject's statistical model so that a detector behaves normally except under a carefully engineered circumstance. This allows an attacker to force a misclassification of his or her voice only when desired, by smuggling data into a database far in advance of an attack. Note that the attack is possible if attacker has access to database even for a limited time to modify victim's model. We exhibit such an attack on a speaker identification, in which an attacker can force a misclassification by speaking in an unusual voice, and replacing the least weighted component of victim's model by the most weighted competent of the unusual voice of the attacker's model. The reason attacker make his or her voice unusual during the attack is because his or her normal voice model can be in database, and by attacking with unusual voice, the attacker has the option to be recognized as himself or herself when talking normally or as the victim when talking in the unusual manner. By attaching an appropriately weighted vector to a victim's model, we can impersonate all users in our simulations, while avoiding unwanted false rejections.

  11. Defending networks against denial-of-service attacks

    NASA Astrophysics Data System (ADS)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  12. Green thunderstorms

    NASA Astrophysics Data System (ADS)

    Gallagher, Frank Woolsey, III

    Many people around the world have observed green light apparently emanating from severe thunderstorms, but until recently there has been no scientific study of the phenomenon. Green thunderstorms have been observed from time to time in association with deep convection or severe weather events. Some skeptics who have not personally observed a green thunderstorm suggest that they are some kind of illusion. The existence of green thunderstorms has been objectively demonstrated by recording spectra of light from thunderstorms using a handheld spectrophotometer. During the spring and summer of 1995 and the spring of 1996 numerous storms were observed and spectra of the light emanating from these storms were recorded. Observations were made both at the ground and aboard research aircraft. Furthermore, time series of spectra were recorded as the observed color of some storms changed from dark blue to a bluish-green. Several hypotheses have been advanced to explain the occurrence of green light in connection with severe storms. Fankhauser gave some observational support to the belief that green light from thunderstorms is possible and believed that the source of the light is from the blue sky penetrating thin regions in the clouds. Fraser believes that light from the setting sun, in combination with the process of scattering by atmospheric molecules, creates the green light associated with severe weather and the thunderstorm acts only as a black backdrop. Unfortunately, no cloud illuminated by the sun is black and the green airlight produced by the Fraser theory is in reality overwhelmed by light reflected by the cloud. Often the unusual coloration has been attributed to hail or to reflection of light from foliage on the ground. The quantitative measurements made during the observation period fail to support these assumptions. We have observed thunderstorms to be green over ground that was not green and we have observed blue thunderstorms over ground that was green

  13. Deterring watermark collusion attacks using signal processing techniques

    NASA Astrophysics Data System (ADS)

    Lemma, Aweke N.; van der Veen, Michiel

    2007-02-01

    Collusion attack is a malicious watermark removal attack in which the hacker has access to multiple copies of the same content with different watermarks and tries to remove the watermark using averaging. In the literature, several solutions to collusion attacks have been reported. The main stream solutions aim at designing watermark codes that are inherently resistant to collusion attacks. The other approaches propose signal processing based solutions that aim at modifying the watermarked signals in such a way that averaging multiple copies of the content leads to a significant degradation of the content quality. In this paper, we present signal processing based technique that may be deployed for deterring collusion attacks. We formulate the problem in the context of electronic music distribution where the content is generally available in the compressed domain. Thus, we first extend the collusion resistance principles to bit stream signals and secondly present experimental based analysis to estimate a bound on the maximum number of modified versions of a content that satisfy good perceptibility requirement on one hand and destructive averaging property on the other hand.

  14. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    NASA Astrophysics Data System (ADS)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  15. Effects of green tea tannin on cisplatin-induced nephropathy in LLC-PK1 cells and rats.

    PubMed

    Yokozawa, T; Nakagawa, T; Lee, K I; Cho, E J; Terasawa, K; Takeuchi, S

    1999-11-01

    A study was conducted to clarify whether green tea tannin ameliorated cisplatin-induced renal injury in terms of lactate dehydrogenase and malondialdehyde leakage from a renal epithelial cell line, swine-derived LLC-PK1 cells in culture. Green tea tannin was shown to suppress the cytotoxicity of cisplatin, the suppressive effect increasing with the dose of green tea tannin. The effect of cisplatin was then investigated in rats given green tea tannin for 40 days before cisplatin administration and in control rats given no green tea tannin. In control rats, blood, urinary and renal parameters and the activities of antioxidative enzymes in renal tissue deviated from the normal range, indicating dysfunction of the kidneys. In contrast, rats given green tea tannin showed decreased blood levels of urea nitrogen and creatinine, and decreased urinary levels of protein and glucose, reflecting less damage to the kidney. In this group, the activity of catalase in the renal tissue was increased, while the level of malondialdehyde was decreased, suggesting the involvement of radicals in the normalizing of kidney function. Based on the evidence available it appeared that green tea tannin eliminated oxidative stress and was beneficial to renal function.

  16. Cell Wall Structure of Coccoid Green Algae as an Important Trade-Off Between Biotic Interference Mechanisms and Multidimensional Cell Growth.

    PubMed

    Dunker, Susanne; Wilhelm, Christian

    2018-01-01

    Coccoid green algae can be divided in two groups based on their cell wall structure. One group has a highly chemical resistant cell wall (HR-cell wall) containing algaenan. The other group is more susceptible to chemicals (LR-cell wall - Low resistant cell wall). Algaenan is considered as important molecule to explain cell wall resistance. Interestingly, cell wall types (LR- and HR-cell wall) are not in accordance with the taxonomic classes Chlorophyceae and Trebouxiophyceae, which makes it even more interesting to consider the ecological function. It was already shown that algaenan helps to protect against virus, bacterial and fungal attack, but in this study we show for the first time that green algae with different cell wall properties show different sensitivity against interference competition with the cyanobacterium Microcystis aeruginosa . Based on previous work with co-cultures of M. aeruginosa and two green algae ( Acutodesmus obliquus and Oocystis marssonii ) differing in their cell wall structure, it was shown that M. aeruginosa could impair only the growth of the green algae if they belong to the LR-cell wall type. In this study it was shown that the sensitivity to biotic interference mechanism shows a more general pattern within coccoid green algae species depending on cell wall structure.

  17. Mass casualty response in the 2008 Mumbai terrorist attacks.

    PubMed

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  18. Frost induced damages within porous materials - from concrete technology to fuel cells technique

    NASA Astrophysics Data System (ADS)

    Palecki, Susanne; Gorelkov, Stanislav; Wartmann, Jens; Heinzel, Angelika

    2017-12-01

    Porous media like concrete or layers of membrane electrode assemblies (MEA) within fuel cells are affected by a cyclic frost exposure due to different damage mechanisms which could lead to essential degradation of the material. In general, frost damages can only occur in case of a specific material moisture content. In fuel cells, residual water is generally available after shut down inside the membrane i.e. the gas diffusion layer (GDL). During subsequent freezing, this could cause various damage phenomena such as frost heaves and delamination effects of the membrane electrode assembly, which depends on the location of pore water and on the pore structure itself. Porous materials possess a pore structure that could range over several orders of magnitudes with different properties and freezing behaviour of the pore water. Latter can be divided into macroscopic, structured and pre-structured water, influenced by surface interactions. Therefore below 0 °C different water modifications can coexist in a wide temperature range, so that during frost exposure a high amount of unfrozen and moveable water inside the pore system is still available. This induces transport mechanisms and shrinkage effects. The physical basics are similar for porous media. While the freezing behaviour of concrete has been studied over decades of years, in order to enhance the durability, the know-how about the influence of a frost attack on fuel cell systems is not fully understood to date. On the basis of frost damage models for concrete structures, an approach to describe the impact of cyclic freezing and thawing on membrane electrode assemblies has been developed within this research work. Major aim is beyond a better understanding of the frost induced mechanisms, the standardization of a suitable test procedure for the assessment of different MEA materials under such kind of attack. Within this contribution first results will be introduced.

  19. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  20. Manned and Unmanned Aircraft Effectiveness in Fast Attack Craft / Fast Inshore Attack Craft ASUW Kill Chain Execution

    DTIC Science & Technology

    2016-09-01

    par. 4) Based on a RED projected size of 22.16 m, a sample calculation for the unadjusted single shot probability of kill for HELLFIRE missiles is...framework based on intelligent objects (SIMIO) environment to model a fast attack craft/fast inshore attack craft anti-surface warfare expanded kill chain...concept of operation efficiency. Based on the operational environment, low cost and less capable unmanned aircraft provide an alternative to the

  1. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  2. Using the Domain Name System to Thwart Automated Client-Based Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less

  3. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack or Sudden Cardiac Arrest: How Are They Different? ... and procedures related to heart disease and stroke. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  4. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  5. Resistant starch: a functional food that prevents DNA damage and chemical carcinogenesis.

    PubMed

    Navarro, S D; Mauro, M O; Pesarini, J R; Ogo, F M; Oliveira, R J

    2015-03-06

    Resistant starch is formed from starch and its degradation products and is not digested or absorbed in the intestine; thus, it is characterized as a fiber. Because fiber intake is associated with the prevention of DNA damage and cancer, the potential antigenotoxic, antimutagenic, and anticarcinogenic capabilities of resistant starch from green banana flour were evaluated. Animals were treated with 1,2-dimethylhydrazine and their diet was supplemented with 10% green banana flour according to the following resistant starch protocols: pretreatment, simultaneous treatment, post-treatment, and pre + continuous treatment. The results demonstrated that resistant starch is not genotoxic, mutagenic, or carcinogenic. The results suggest that resistant starch acts through desmutagenesis and bio-antimutagenesis, as well as by reducing aberrant crypt foci, thereby improving disease prognosis. These findings imply that green banana flour has therapeutic properties that should be explored for human dietary applications.

  6. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

  7. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  8. Genoprotective effects of green tea (Camellia sinensis) in human subjects: results of a controlled supplementation trial.

    PubMed

    Han, K C; Wong, W C; Benzie, Iris F F

    2011-01-01

    Green tea is rich in polyphenolic antioxidants and has widely reported but largely unsubstantiated health benefits. In the present study, genoprotective effects of two types of green tea were studied both in an in vitro and in a human supplementation trial. For the in vitro study, human lymphocytes were pre-incubated in tea (0·005-0·1 %, w/v), washed and subjected to oxidant challenge induced by H2O2. In a placebo-controlled, cross-over supplementation study, eighteen healthy volunteers took 2 x 150 ml/d of 1% (w/v) green tea ('Longjing' green tea or 'screw-shaped' green tea) or water (control) for 4 weeks (n 6). Subjects took all the three treatments in a random order, with 6 weeks' washout between each treatment. Fasting blood and urine were collected before and after each treatment. The comet assay was used to measure the resistance of lymphocytic DNA to H2O2-induced challenge. Basal oxidation-induced DNA damage was measured using the formamidopyrimidine glycosylase (Fpg) enzyme-assisted comet assay. Urine 7,8-dihydro-2-deoxyguanosine (8-oxodG, mol/mmol creatinine), a biomarker of whole-body oxidative stress, was measured by liquid chromatography with tandem MS. In vitro testing results of tea-treated cells showed increased (P < 0·05) resistance of DNA to the challenge. In the supplementation trial, a significant (P < 0·05) increase in resistance was also observed. Furthermore, the FPg comet data showed .20% decrease in DNA damage with tea supplementation: mean and standard deviation changes in %DNA in comet tail in the Fpg-assisted comet assay were: -5·96 (SD 3·83) % after Longjing tea; -6·22 (SD 3·34) % after screw-shaped tea; +0·91 (SD 5·79) % after water (P < 0·05). No significant changes in urine 8-oxodG were seen. The results indicate that green tea has significant genoprotective effects and provide evidence for green tea as a 'functional food'.

  9. Spatio-temporal patterns of attacks on human and economic losses from wildlife in Chitwan National Park, Nepal

    PubMed Central

    Persoon, Gerard A.; Leirs, Herwig; Poudel, Shashank; Subedi, Naresh; Pokheral, Chiranjibi Prasad; Bhattarai, Santosh; Thapaliya, Bishnu Prasad; de Iongh, Hans H.

    2018-01-01

    Wildlife attacks on humans and economic losses often result in reduced support of local communities for wildlife conservation. Information on spatial and temporal patterns of such losses in the highly affected areas contribute in designing and implementing effective mitigation measures. We analyzed the loss of humans, livestock and property caused by wildlife during 1998 to 2016, using victim family’s reports to Chitwan National Park authorities and Buffer Zone User Committees. A total of 4,014 incidents were recorded including attacks on humans, livestock depredation, property damage and crop raiding caused by 12 wildlife species. In total >400,000 US dollar was paid to the victim families as a relief over the whole period. Most of the attacks on humans were caused by rhino, sloth bear, tiger, elephant, wild boar and leopard. A significantly higher number of conflict incidents caused by rhino and elephant were observed during full moon periods. An increase in the wildlife population did not coincide with an equal rise in conflict incidents reported. Underprivileged ethnic communities were attacked by wildlife more frequently than expected. Number of attacks on humans by carnivores and herbivores did not differ significantly. An insignificant decreasing trend of wildlife attacks on humans and livestock was observed with significant variation over the years. Tiger and leopard caused >90% of livestock depredation. Tigers killed both large (cattle and buffalo) and medium sized (goat, sheep, pig) livestock but leopard mostly killed medium sized livestock. Most (87%) of the livestock killing during 2012–2016 occurred within the stall but close (<500m) to the forest edge. Both the percentage of households with livestock and average holding has decreased over the years in buffer zone. Decreased forest dependency as well as conflict mitigation measures (electric and mesh wire fences) have contributed to keep the conflict incidents in control. Strengthening mitigation

  10. Shark attack: review of 86 consecutive cases.

    PubMed

    Woolgar, J D; Cliff, G; Nair, R; Hafez, H; Robbs, J V

    2001-05-01

    On average there are approximately 50 confirmed shark attacks worldwide annually. Despite their rarity, such incidents often generate much public and media attention. The injuries of 86 consecutive victims of shark attack were reviewed from 1980 to 1999. Clinical data retrieved from the South African Shark Attack Files, maintained by the Natal Sharks Board, were retrospectively analyzed to determine the nature, treatment, and outcome of injuries. The majority of victims (n = 68 [81%]) had relatively minor injuries that required simple primary suture. Those patients (n = 16 [19%]) with more extensive limb lacerations longer than 20 cm or with soft-tissue loss of more than one myofascial compartment were associated with higher morbidity and limb loss. In 8 of the 10 fatalities, death occurred as a result of exsanguinating hemorrhage from a limb vascular injury. Victims of shark attack usually sustain only minor injuries. In more serious cases, particularly if associated with a major vascular injury, hemorrhage control and early resuscitation are of utmost importance during the initial management if these patients are to survive.

  11. Quantitative patterns between plant volatile emissions induced by biotic stresses and the degree of damage

    PubMed Central

    Niinemets, Ülo; Kännaste, Astrid; Copolovici, Lucian

    2013-01-01

    Plants have to cope with a plethora of biotic stresses such as herbivory and pathogen attacks throughout their life cycle. The biotic stresses typically trigger rapid emissions of volatile products of lipoxygenase (LOX) pathway (LOX products: various C6 aldehydes, alcohols, and derivatives, also called green leaf volatiles) associated with oxidative burst. Further a variety of defense pathways is activated, leading to induction of synthesis and emission of a complex blend of volatiles, often including methyl salicylate, indole, mono-, homo-, and sesquiterpenes. The airborne volatiles are involved in systemic responses leading to elicitation of emissions from non-damaged plant parts. For several abiotic stresses, it has been demonstrated that volatile emissions are quantitatively related to the stress dose. The biotic impacts under natural conditions vary in severity from mild to severe, but it is unclear whether volatile emissions also scale with the severity of biotic stresses in a dose-dependent manner. Furthermore, biotic impacts are typically recurrent, but it is poorly understood how direct stress-triggered and systemic emission responses are silenced during periods intervening sequential stress events. Here we review the information on induced emissions elicited in response to biotic attacks, and argue that biotic stress severity vs. emission rate relationships should follow principally the same dose–response relationships as previously demonstrated for different abiotic stresses. Analysis of several case studies investigating the elicitation of emissions in response to chewing herbivores, aphids, rust fungi, powdery mildew, and Botrytis, suggests that induced emissions do respond to stress severity in dose-dependent manner. Bi-phasic emission kinetics of several induced volatiles have been demonstrated in these experiments, suggesting that next to immediate stress-triggered emissions, biotic stress elicited emissions typically have a secondary induction

  12. The role of mental disorder in attacks on European politicians 1990-2004.

    PubMed

    James, D V; Mullen, P E; Meloy, J R; Pathé, M T; Farnham, F R; Preston, L; Darnley, B

    2007-11-01

    The only systematic studies of attacks on public figures come from the USA. These studies de-emphasize the role of mental illness and suggest threats are of no predictive value. This study re-examines these questions through a study of attacks on European politicians. All non-terrorist attacks on elected politicians in Western Europe between 1990 and 2004 were analysed. Twenty-four attacks were identified, including five involving fatalities, and eight serious injuries. Ten attackers were psychotic, four drunk, nine politically motivated and one unclassifiable. Eleven attackers evidenced warning behaviours. The mentally disordered, most of whom gave warnings, were responsible for most of the fatal and seriously injurious attacks. A greater awareness of the link between delusional fixations on public figures and subsequent attacks could aid prevention. Equally importantly, recognition would encourage earlier intervention in people who, irrespective of whether they eventually attack, have delusional preoccupations which ruin their lives.

  13. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  14. Muscular imbalance and shoulder pain in volleyball attackers.

    PubMed Central

    Kugler, A; Krüger-Franke, M; Reininger, S; Trouillier, H H; Rosemeyer, B

    1996-01-01

    OBJECTIVE: In overhead sports such as volleyball, baseball, or tennis shoulder problems are very common. The aim of this study was to identify features which may correlate with shoulder problems in volleyball attackers. METHODS: 30 competitive volleyball attackers (mean age 25 years) were included in the study; 15 were suffering from shoulder pain and 15 had no history of shoulder pain. The results were compared with those of a control group of 15 recreational athletes without any overhead sports activities. RESULTS: Volleyball attackers have a different muscular and capsular pattern at the playing shoulder compared to the opposite shoulder. Their playing shoulder is depressed, the scapula lateralised, and the dorsal muscles and the posterior and inferior part of the shoulder capsule shortened. These differences were of more significance in volleyball attackers with shoulder pain than in volleyball players without shoulder pain. In contrast to recreational athletes without any overhead sports activity, there were no significant difference in the comparison of the two shoulders. The histories, clinical and sonographic findings did not reveal further typical features for volleyball attackers with shoulder pain. CONCLUSIONS: Muscular balance of the shoulder girdle is very important in this sport. It is therefore imperative to include adequate stretching and muscular training programme for the prevention, as well as for therapy, of shoulder pain in volleyball attackers. Images Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 PMID:8889124

  15. Learning from history: The Glasgow Airport terrorist attack.

    PubMed

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  16. Gait biometrics under spoofing attacks: an experimental investigation

    NASA Astrophysics Data System (ADS)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  17. Flashbulb memories of the Paris attacks.

    PubMed

    Gandolphe, Marie-Charlotte; El Haj, Mohamad

    2017-06-01

    Flashbulb memories are vivid autobiographical memories of the circumstances where an individual first learns about emotionally significant public events. Our paper assesses whether these memories were triggered by the attacks of Friday 13 November 2015 in Paris. Two hundred and ninety-one participants answered a web-based questionnaire that assessed their memory of the circumstances in which they first learned of the attacks. The questionnaire also assessed vividness, rehearsal, emotion, surprise and novelty. The results showed substantial and vivid recall of the context in which the participants first learned of the event. This recall was associated with fair rehearsal, negative emotional valence, surprise, and novelty. Regression analysis showed that the flashbulb recall was predicted by negative emotion. Negative emotion seems to play a key role in the formation of flashbulb memories, at least those associated with the Paris attacks. © 2017 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  18. Epidemics of panic during a bioterrorist attack--a mathematical model.

    PubMed

    Radosavljevic, Vladan; Radunovic, Desanka; Belojevic, Goran

    2009-09-01

    A bioterrorist attacks usually cause epidemics of panic in a targeted population. We have presented epidemiologic aspect of this phenomenon as a three-component model--host, information on an attack and social network. We have proposed a mathematical model of panic and counter-measures as the function of time in a population exposed to a bioterrorist attack. The model comprises ordinary differential equations and graphically presented combinations of the equations parameters. Clinically, we have presented a model through a sequence of psychic conditions and disorders initiated by an act of bioterrorism. This model might be helpful for an attacked community to timely and properly apply counter-measures and to minimize human mental suffering during a bioterrorist attack.

  19. Non-harmful insertion of data mimicking computer network attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  20. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  1. Development of a Near Real-Time Hail Damage Swath Identification Algorithm for Vegetation

    NASA Technical Reports Server (NTRS)

    Bell, Jordan R.; Molthan, Andrew L.; Schultz, Kori A.; McGrath, Kevin M.; Burks, Jason E.

    2015-01-01

    Every year in the Midwest and Great Plains, widespread greenness forms in conjunction with the latter part of the spring-summer growing season. This prevalent greenness forms as a result of the high concentration of agricultural areas having their crops reach their maturity before the fall harvest. This time of year also coincides with an enhanced hail frequency for the Great Plains (Cintineo et al. 2012). These severe thunderstorms can bring damaging winds and large hail that can result in damage to the surface vegetation. The spatial extent of the damage can relatively small concentrated area or be a vast swath of damage that is visible from space. These large areas of damage have been well documented over the years. In the late 1960s aerial photography was used to evaluate crop damage caused by hail. As satellite remote sensing technology has evolved, the identification of these hail damage streaks has increased. Satellites have made it possible to view these streaks in additional spectrums. Parker et al. (2005) documented two streaks using the Moderate Resolution Imaging Spectroradiometer (MODIS) that occurred in South Dakota. He noted the potential impact that these streaks had on the surface temperature and associated surface fluxes that are impacted by a change in temperature. Gallo et al. (2012) examined at the correlation between radar signatures and ground observations from storms that produced a hail damage swath in Central Iowa also using MODIS. Finally, Molthan et al. (2013) identified hail damage streaks through MODIS, Landsat-7, and SPOT observations of different resolutions for the development of a potential near-real time applications. The manual analysis of hail damage streaks in satellite imagery is both tedious and time consuming, and may be inconsistent from event to event. This study focuses on development of an objective and automatic algorithm to detect these areas of damage in a more efficient and timely manner. This study utilizes the

  2. Uptake of indocyanine green by hamster sebaceous glands

    NASA Astrophysics Data System (ADS)

    McMillan, Kathleen; Lo, Kai-Ming; Wang, Zhi

    2001-05-01

    Photothermal injury to the sebaceous glands is a potential curative treatment for the common skin disease acne vulgaris. Accumulation of the exogenous chromophore indocyanine green in the sebaceous glands may be accomplished using an emulsion or liposomal formulation applied to the skin surface. An emulsion containing 0.09% by weight indocyanine green (ICG) was applied to the epidermis of hamster ears ex vivo and the flank organ in vivo. Fluorescence microscopy demonstrated selective accumulation of ICG in the underlying sebaceous glands. The concentration of ICG that may be expected to accumulate in sebaceous glands of humans was then estimated on the basis of the gland size and orifice area, for the case of topical application of a more concentrated 1% ICG liposomal formulation. Monte Carlo modeling and heat transfer calculations showed that the sebaceous glands containing the exogenous chromophore may be selectively damaged by pulsed 810 nm laser radiation in conjunction with cryogen spray cooling.

  3. Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy

    PubMed Central

    Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P

    2002-01-01

    Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044

  4. Network overload due to massive attacks

    NASA Astrophysics Data System (ADS)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  5. The impact of ecolabel knowledge to purchase decision of green producton biology students

    NASA Astrophysics Data System (ADS)

    Sigit, Diana Vivanti; Fauziah, Rizky; Heryanti, Erna

    2017-08-01

    The world needs real solutions to reduce the impact of environmental damages. Students as agents of changes have a role to overcome these problems. One of the important solution is to be a critical consumer who has purchase decisions in a green product. To show the quality of an environmental friendly product, it is then required an ecolabel on the green product which indicates that the product has been through the production processed and come from environmental friendly substances. The research aimed at finding out whether there was an impact of ecolabel knowledge with purchase decision of green product on biology students. This research was conducted in Biology Department. This research used a survey descriptive method. The population used was biology students of Universitas Negeri Jakarta while the sampling technique was done through simple random sampling technique with 147 respondents. Instrument used were ecolabel knowledge test and a questionnaire of green product purchase decision. The result of prerequisite test showed that the data was normally distributed and homogenous variance. The regression model obtained was Ŷ=77.083+ 0.370X. Meanwhile, the determinant coefficient (r2) obtained was 0.047 or 4.7% that mean ecolabel knowledge just contributed 4,71% to the green product purchase decision. These implied that many factors contributed in the purchase decision of green product instead of ecolabel knowledge.

  6. Flashbulb memories of Paris attacks

    PubMed Central

    El Haj, Mohamad; Gandolphe, Marie-Charlotte; Wawrziczny, Emilie; Antoine, Pascal

    2016-01-01

    Abstract Rationale: Flashbulb memories are detailed and vivid memories of attributes of the reception context of surprising and emotionally arousing public events. Patient concerns and diagnosis: This paper offers a fine-grained view of flashbulb memories in a patient with mild Alzheimer's disease (AD). Interventions: The patient underwent a directed interview about the 13 November 2015 attacks in Paris. Outcomes: Unlike her memory about the date and month of the attacks, the patient provided accurate information about the year, time and places they occurred. The patient also provided accurate information about how she first became aware of the attacks, where she was, with whom, what she was doing, and what time it was when she learned about them. As for the affective characteristics of these memories, she tended to have high ratings of vividness and rehearsal. Negative emotional states and great surprise and novelty were also reported. Lessons: By assessing the impact of flashbulb memories in this patient with AD, this paper offers a unique view into how such memories may trigger a considerable recall of context as well much subjective reliving. PMID:27861395

  7. Eccentric localization of catalase to protect chromosomes from oxidative damages during meiotic maturation in mouse oocytes.

    PubMed

    Park, Yong Seok; You, Seung Yeop; Cho, Sungrae; Jeon, Hyuk-Joon; Lee, Sukchan; Cho, Dong-Hyung; Kim, Jae-Sung; Oh, Jeong Su

    2016-09-01

    The maintenance of genomic integrity and stability is essential for the survival of every organism. Unfortunately, DNA is vulnerable to attack by a variety of damaging agents. Oxidative stress is a major cause of DNA damage because reactive oxygen species (ROS) are produced as by-products of normal cellular metabolism. Cells have developed eloquent antioxidant defense systems to protect themselves from oxidative damage along with aerobic metabolism. Here, we show that catalase (CAT) is present in mouse oocytes to protect the genome from oxidative damage during meiotic maturation. CAT was expressed in the nucleus to form unique vesicular structures. However, after nuclear envelope breakdown, CAT was redistributed in the cytoplasm with particular focus at the chromosomes. Inhibition of CAT activity increased endogenous ROS levels, but did not perturb meiotic maturation. In addition, CAT inhibition produced chromosomal defects, including chromosome misalignment and DNA damage. Therefore, our data suggest that CAT is required not only to scavenge ROS, but also to protect DNA from oxidative damage during meiotic maturation in mouse oocytes.

  8. Does enemy damage vary across the range of exotic plant species? Evidence from two coastal dune plant species in eastern Australia.

    PubMed

    Tabassum, Samiya; Leishman, Michelle R

    2018-02-01

    Release from natural enemies is often cited as a key factor for understanding the success of invasive plant species in novel environments. However, with time invasive species will accumulate native enemies in their invaded range, with factors such as spread distance from the site of introduction, climate and leaf-level traits potentially affecting enemy acquisition rates. However, the influence of such factors is difficult to assess without examining enemy attack across the entire species' range. We tested the significance of factors associated with range expansion (distance from source population and maximum population density), climatic variables (annual temperature and rainfall) and leaf-level traits [specific leaf area (SLA) and foliar nitrogen concentration] in explaining variation in enemy damage across multiple populations of two coastal invasive plants (Gladiolus gueinzii Kunze and Hydrocotyle bonariensis Lam.) along their entire introduced distribution in eastern Australia. We found that for H. bonariensis, amount of foliar damage increased with distance from source population. In contrast, for G. gueinzii, probability and amount of foliar damage decreased with decreasing temperature and increasing rainfall, respectively. Our results show that patterns of enemy attack across species' ranges are complex and cannot be generalised between species or even range edges.

  9. TiO2 photocatalysis causes DNA damage via fenton reaction-generated hydroxyl radicals during the recovery period.

    PubMed

    Gogniat, Gaëtan; Dukan, Sam

    2007-12-01

    Here, we show that resistance of Escherichia coli to TiO2 photocatalysis involves defenses against reactive oxygen species. Results support the idea that TiO2 photocatalysis generates damage which later becomes deleterious during recovery. We found this to be partly due to DNA attack via hydroxyl radicals generated by the Fenton reaction during recovery.

  10. Robustness of Controllability for Networks Based on Edge-Attack

    PubMed Central

    Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong

    2014-01-01

    We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components. PMID:24586507

  11. Robustness of controllability for networks based on edge-attack.

    PubMed

    Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong

    2014-01-01

    We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components.

  12. Afghanistan: Green-on-Blue Attacks

    DTIC Science & Technology

    2013-05-02

    burnt copies of the Quran in a garbage dump at Bagram Air Base that sparked several days of anti-American riots in February 2012. An Afghan soldier...reaching a Category II or III threat. A concerted effort between the Afghan government and military and the Coalition lead to several concrete measures

  13. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  14. Attack polish for nickel-base alloys and stainless steels

    DOEpatents

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  15. Cyromazine seed treatments to control onion maggot, Delia antiqua, on green onions.

    PubMed

    Yildirim, Erol; Hoy, Casey W

    2003-10-01

    Cyromazine seed treatments were evaluated for onion maggot control in green onion crops. The more tolerant to organophosphates of two populations of onion maggots was chosen for further research, based on the results of adult assays in a Potter spray tower. In the laboratory, first-instar mortality was compared between film-coated seed treatment and soil drench treatment. The LC50 for the film-coated seed treatment was approximately one fourth that of the soil drench treatment. In choice assays, no significant difference was observed between the number of eggs deposited on seedlings grown from film-coated seeds with cyromazine and film-coated seeds without cyromazine. Field studies demonstrated that all rates of cyromazine seed treatment resulted in protection of onion plants from onion maggot damage. Green onions may not require as high a rate of cyromazine for control of onion maggots as the rate established for use in dry onions for two reasons: the seeding rate is much higher for green onions resulting in more AI/ha for a given amount of AI/kg of seed, and a given percentage of stand loss is more difficult to detect in green onions than in dry onions.

  16. Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.

    PubMed

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads

    2018-05-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p < 0.05) more frequent among men and episodic patients, compared with women and chronic patients respectively, no other differences in the prevalence of pre-attack symptoms were identified between groups. Conclusion Pre-attack symptoms are frequent in cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.

  17. Hereditary Angioedema Attacks Resolve Faster and Are Shorter after Early Icatibant Treatment

    PubMed Central

    Maurer, Marcus; Kaplan, Allen; Investigators, on behalf of I. O. S.

    2013-01-01

    Background Attacks of hereditary angioedema (HAE) are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. Objective To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. Methods The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009–February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. Results Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥1 hour (6.1 hours versus 16.8 hours [p<0.001]). Similar significant effects were observed for <2 hours versus ≥2 hours (7.2 hours versus 20.2 hours [p<0.001]) and <5 hours versus ≥5 hours (8.0 hours versus 23.5 hours [p<0.001]). Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]). Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. Conclusion Early blockade of the bradykinin B2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution. PMID:23390491

  18. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    ERIC Educational Resources Information Center

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes…

  19. A Novel Network Attack Audit System based on Multi-Agent Technology

    NASA Astrophysics Data System (ADS)

    Jianping, Wang; Min, Chen; Xianwen, Wu

    A network attack audit system which includes network attack audit Agent, host audit Agent and management control center audit Agent is proposed. And the improved multi-agent technology is carried out in the network attack audit Agent which has achieved satisfactory audit results. The audit system in terms of network attack is just in-depth, and with the function improvement of network attack audit Agent, different attack will be better analyzed and audit. In addition, the management control center Agent should manage and analyze audit results from AA (or HA) and audit data on time. And the history files of network packets and host log data should also be audit to find deeper violations that cannot be found in real time.

  20. The WOMBAT Attack Attribution Method: Some Results

    NASA Astrophysics Data System (ADS)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  1. Damage of photoreceptor-derived cells in culture induced by light emitting diode-derived blue light

    PubMed Central

    Kuse, Yoshiki; Ogawa, Kenjiro; Tsuruma, Kazuhiro; Shimazawa, Masamitsu; Hara, Hideaki

    2014-01-01

    Our eyes are increasingly exposed to light from the emitting diode (LED) light of video display terminals (VDT) which contain much blue light. VDTs are equipped with televisions, personal computers, and smart phones. The present study aims to clarify the mechanism underlying blue LED light-induced photoreceptor cell damage. Murine cone photoreceptor-derived cells (661 W) were exposed to blue, white, or green LED light (0.38 mW/cm2). In the present study, blue LED light increased reactive oxygen species (ROS) production, altered the protein expression level, induced the aggregation of short-wavelength opsins (S-opsin), resulting in severe cell damage. While, blue LED light damaged the primary retinal cells and the damage was photoreceptor specific. N-Acetylcysteine (NAC), an antioxidant, protected against the cellular damage induced by blue LED light. Overall, the LED light induced cell damage was wavelength-, but not energy-dependent and may cause more severe retinal photoreceptor cell damage than the other LED light. PMID:24909301

  2. Depression After Heart Attack

    MedlinePlus

    ... to use in patients with coronary heart disease. Cognitive behavior therapy is a form of psychological treatment that has ... after a heart attack and that SSRIs and cognitive behavior therapy reduce depression, it stands to reason that treating ...

  3. BFT replication resistant to MAC attacks

    NASA Astrophysics Data System (ADS)

    Zbierski, Maciej

    2016-09-01

    Over the last decade numerous Byzantine fault-tolerant (BFT) replication protocols have been proposed in the literature. However, the vast majority of these solutions reuse the same authentication scheme, which makes them susceptible to a so called MAC attack. Such vulnerability enables malicious clients to undetectably prevent the replicated service from processing incoming client requests, and consequently making it permanently unavailable. While some BFT protocols attempted to address this issue by using different authentication mechanisms, they at the same time significantly degraded the performance achieved in correct environments. This article presents a novel adaptive authentication mechanism which can be combined with practically any Byzantine fault-tolerant replication protocol. Unlike previous solutions, the proposed scheme dynamically switches between two operation modes to combine high performance in correct environments and liveness during MAC attacks. The experiment results presented in the article demonstrate that the proposed mechanism can sufficiently tolerate MAC attacks without introducing any observable overhead whenever no faults are present.

  4. Alcoholism in cockchafers: orientation of male Melolontha melolontha towards green leaf alcohols

    NASA Astrophysics Data System (ADS)

    Reinecke, Andreas; Ruther, Joachim; Tolasch, Till; Francke, Wittko; Hilker, Monika

    2002-03-01

    Chemical orientation of the European cockchafer, Melolontha melolontha L., a serious pest in agriculture and horticulture, was investigated by field tests and electrophysiological experiments using plant volatiles. In total, 16 typical plant volatiles were shown to elicit electrophysiological responses in male cockchafers. Funnel trap field bioassays revealed that green leaf alcohols (i.e. (Z)-3-hexen-1-ol, (E)-2-hexen-1-ol and 1-hexanol) attracted males, whereas the corresponding aldehydes and acetates were behaviourally inactive. Furthermore, male cockchafers were attracted by volatiles from mechanically damaged leaves of Fagus sylvatica L., Quercus robur L. and Carpinus betulus L. However, volatiles emitted by damaged leaves of F. sylvatica attracted significantly more males than those from the other host plants. Odour from intact F. sylvatica leaves was not attractive to M. melolontha males. Females were not attracted by any of the tested volatile sources. The results suggest that plant volatiles play a similar role as a sexual kairomone in mate finding of M. melolontha, as has been shown for the forest cockchafer, Melolontha hippocastani F. Nevertheless, both species show remarkable differences in their reaction to green leaf alcohols.

  5. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    PubMed

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  6. Attack rates of dengue fever in Swedish travellers.

    PubMed

    Rocklöv, Joacim; Lohr, Wolfgang; Hjertqvist, Marika; Wilder-Smith, Annelies

    2014-06-01

    Dengue is endemic in many countries visited by Swedish travellers. We aimed to determine the attack rate of dengue in Swedish travellers and analyse the trends over time and the geographical variation. We obtained the following data from the Swedish Institute for Communicable Disease Control for the y 1995-2010: number of Swedish residents with confirmed dengue, the country and year of infection. We also obtained registers on the Swedish annual air traveller arrivals to dengue endemic areas from the United Nations World Tourist Organization for the time period. We estimated attack rates with 95% confidence intervals (CI). In total, 925 Swedish travellers with confirmed dengue were reported. We found an increasing trend over time for most destinations. The majority of the dengue cases were acquired in Thailand (492 out of 925 travellers; 53%), with an attack rate of 13.6 (95% CI 12.7, 14.4) per 100,000 travellers. However, the 2 highest attack rates per 100,000 travellers were found for Sri Lanka (45.3, 95% CI 34.3, 56.4) and Bangladesh (42.6, 95% CI 23.8, 61.5). Information on attack rates in travellers is more helpful in guiding travel medicine practitioners than reports of absolute numbers, as the latter reflect travel preferences rather than the true risk. Although the majority of dengue infections in Swedish travellers were acquired in Thailand, the attack rates for dengue in travellers to Sri Lanka and Bangladesh were much higher. These data aid in refining information on the risk of dengue in travellers.

  7. Cause-specific temporal and spatial trends in green sea turtle strandings in the Hawaiian Archipelago (1982-2003)

    USGS Publications Warehouse

    Chaloupka, Milani; Work, Thierry M.; Balazs, George H.; Murakawa, Shawn K. K.; Morris, Robert

    2008-01-01

    We investigated cause-specific temporal and spatial trends in sea turtle strandings in the Hawaiian Archipelago. Five species of sea turtle were recorded in 3,861 strandings over a 22-year period (1982–2003). Green turtles comprised 97% of these strandings with size and gender composition reflecting the demographic structure of the resident green turtle population and relative green turtle abundance in Hawaiian waters. The cause of strandings was determined by necropsy based on a complete gross external and internal examination. Totally 75% of the 3,732 green turtle strandings were from Oahu where strandings occur year-round. The most common known cause of the green turtle strandings was the tumour-forming disease, fibropapillomatosis (28%) followed by hook-and-line fishing gear-induced trauma (7%), gillnet fishing gear-induced trauma (5%), boat strike (2.5%), and shark attack (2.7%). Miscellaneous causes comprised 5.4% of strandings whereas 49% of green turtle strandings could not be attributed to any known cause. Green turtle strandings attributable to boat strike were more likely from Kauai and Oahu while fibropapilloma strandings were more likely from Oahu and Maui. Hook-and-line gear strandings were more likely from Oahu due to higher per capita inshore fishing effort. The specific mortality rate (conditional probability) for fibropapillomatosis was 88%, 69% for gillnet gear and 52% for hook-and-line gear. The probability of a dead green turtle stranding increased from 1982 but levelled off by the mid-1990s. The declining mortality risk was because the prevalence and severity of fibropapillomatosis has decreased recently and so has the mortality risk attributable to gillnet gear. Despite exposure to disease and inshore fishing gears, the Hawaiian green turtle stock continues to recover following protection since the late 1970s. Nevertheless, measures to reduce incidental capture of sea turtles in coastal Hawaiian fisheries would be prudent, especially since

  8. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  9. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  10. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  11. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  12. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  13. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    PubMed

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  14. The robustness of multiplex networks under layer node-based attack

    PubMed Central

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-01-01

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology. PMID:27075870

  15. The robustness of multiplex networks under layer node-based attack.

    PubMed

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-04-14

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology.

  16. Construction of a Cyber Attack Model for Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missedmore » if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.« less

  17. On the presence of five species of naupactini (Coleoptera: Curculionidae) damaging soybean in Brazil.

    PubMed

    Lanteri, A A; Bigolin, M; del Río, M G; Guedes, J V C

    2013-06-01

    We report five broad-nosed weevils of the tribe Naupactini, Naupactus leucoloma Boheman, Naupactus minor (Buchanan), Naupactus peregrinus (Buchanan), Naupactus tremolerasi Hustache and Pantomorus viridisquamosus (Boheman) (Coleoptera: Curculionidae) damaging soybean plants in the state of Rio Grande do Sul, Brazil. Some of these species are recorded for the first time in Brazil, and they all belong to species groups naturally distributed in the prairies of southern Brazil, Uruguay, Central Argentina and Paraguay. Three of them have been introduced, established and expanded in other countries outside South America. The five species in conjunction with other native species of Naupactini could cause severe damages to soybean crops if the root-feeding larvae attack young growing plants.

  18. 19 CFR 351.522 - Green light and green box subsidies.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Green light and green box subsidies. 351.522... COUNTERVAILING DUTIES Identification and Measurement of Countervailable Subsidies § 351.522 Green light and green... domestic support measures that are provided to certain agricultural products (i.e., products listed in...

  19. Smoking Behavior and Alcohol Consumption in Individuals With Panic Attacks

    PubMed Central

    Mathew, Amanda R.; Norton, Peter J.; Zvolensky, Michael J.; Buckner, Julia D.; Smits, Jasper A. J.

    2011-01-01

    Individuals with anxiety often report greater smoking and drinking behaviors relative to those without a history of anxiety. In particular, smoking and alcohol use have been directly implicated among individuals experiencing panic attacks, diagnosed with panic disorder, or high on panic-relevant risk factors such as anxiety sensitivity. Less is known, however, about specific features of panic that may differentiate among those who do or do not use cigarettes or alcohol. The purpose of the current study was to replicate previous research findings of an association between panic symptomatology, cigarette smoking, and alcohol consumption, as well as extend findings by examining whether specific symptoms of panic attacks differentiated among those who do or do not use cigarettes or alcohol. Participants (n = 489) completed the Panic Attack Questionnaire-IV, a highly detailed assessment of panic attacks and symptoms, as well as self-report measures of smoking history and alcohol use. Consistent with previous research, participants who reported a history of panic attacks (n = 107) were significantly more likely to report current daily or lifetime daily cigarette smoking, and significantly greater hazardous or harmful alcohol use than participants with no panic history (n = 382). Although smoking and hazardous alcohol use were highly associated regardless of panic status, participants with panic attacks showed elevated hazardous alcohol use after controlling for daily or lifetime smoking. Surprisingly, although participants who reported having had at least one panic attack were more likely to smoke, panic attack symptoms, intensity, or frequency did not differentiate panickers who did or did not smoke. Furthermore, panic-related variables were not shown to differentially relate to problematic drinking among panickers. Implications for understanding the complex relationship between panic attacks and smoking and drinking behaviors are discussed. PMID:21915160

  20. Effects of melatonin injection or green-wavelength LED light on the antioxidant system in goldfish (Carassius auratus) during thermal stress.

    PubMed

    Jung, Seo Jin; Choi, Young Jae; Kim, Na Na; Choi, Ji Yong; Kim, Bong-Seok; Choi, Cheol Young

    2016-05-01

    We tested the mitigating effects of melatonin injections or irradiation from green-wavelength light-emitting diodes (LEDs) on goldfish (Carassius auratus) exposed to thermal stress (high water temperature, 30 °C). The effects of the two treatments were assessed by measuring the expression and activity levels of the antioxidant enzymes, superoxide dismutase and catalase, plasma hydrogen peroxide, lipid hydroperoxide, and lysozyme. In addition, a comet assay was conducted to confirm that high water temperature damaged nuclear DNA. The expression and activity of the antioxidant enzymes, plasma hydrogen peroxide, and lipid hydroperoxide were significantly higher after exposure to high temperature and were significantly lower in fish that received melatonin or LED light than in those that received no mitigating treatment. Plasma lysozyme was significantly lower after exposure to high temperature and was significantly higher after exposure to melatonin or LED light. The comet assay revealed that thermal stress caused a great deal of damage to nuclear DNA; however, treatment with melatonin or green-wavelength LED light prevented a significant portion of this damage from occurring. These results indicate that, although high temperatures induce oxidative stress and reduce immune system strength in goldfish, both melatonin and green-wavelength LED light inhibit oxidative stress and boost the immune system. LED treatment increased the antioxidant and immune system activity more significantly than did melatonin treatment. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Chess therapy: A new approach to curing panic attack.

    PubMed

    Barzegar, Kazem; Barzegar, Somayeh

    2017-12-01

    To study the effect of playing cell phone chess game on treating panic attack. The chess game on an android cell phone was played by the researcher who was affected by panic attack as a post-traumatic disorder immediately after or before feeling of the start of symptoms. The right level of difficulty, i.e., levels 2-4, was selected for optimal results. Playing chess game on the android cell phone prevented the manifestation of panic attack and led to the cure of this traumatic condition. Chess therapy with the right level of difficulty can be recommended as a very effective non-pharmaceutical method for the successful treatment of panic attacks. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Earthquake-Induced Building Damage Assessment Based on SAR Correlation and Texture

    NASA Astrophysics Data System (ADS)

    Gong, Lixia; Li, Qiang; Zhang, Jingfa

    2016-08-01

    Comparing with optical Remote Sensing, the Synthetic Aperture Radar (SAR) has unique advantages as applied to seismic hazard monitoring and evaluation. SAR can be helpful in the whole process of after an earthquake, which can be divided into three stages. On the first stage, pre-disaster imagery provides history information of the attacked area. On the mid-term stage, up-to-date thematic maps are provided for disaster relief. On the later stage, information is provided to assist secondary disaster monitoring, post- disaster assessment and reconstruction second stage. In recent years, SAR has become an important data source of earthquake damage analysis and evaluation.Correlation between pre- and post-event SAR images is considered to be related with building damage. There will be a correlation decrease when the building collapsed in a shock. Whereas correlation decrease does not definitely indicate building changes. Correlation is also affected by perpendicular baseline, the ground coverage type, atmospheric change and other natural conditions, data processing and other factors. Building samples in the earthquake are used to discriminate the relation between damage degree and SAR correlation.

  3. Characterization of attacks on public telephone networks

    NASA Astrophysics Data System (ADS)

    Lorenz, Gary V.; Manes, Gavin W.; Hale, John C.; Marks, Donald; Davis, Kenneth; Shenoi, Sujeet

    2001-02-01

    The U.S. Public Telephone Network (PTN) is a massively connected distributed information systems, much like the Internet. PTN signaling, transmission and operations functions must be protected from physical and cyber attacks to ensure the reliable delivery of telecommunications services. The increasing convergence of PTNs with wireless communications systems, computer networks and the Internet itself poses serious threats to our nation's telecommunications infrastructure. Legacy technologies and advanced services encumber well-known and as of yet undiscovered vulnerabilities that render them susceptible to cyber attacks. This paper presents a taxonomy of cyber attacks on PTNs in converged environments that synthesizes exploits in computer and communications network domains. The taxonomy provides an opportunity for the systematic exploration of mitigative and preventive strategies, as well as for the identification and classification of emerging threats.

  4. Effect of Angle of Attack on Slope Climbing Performance

    NASA Technical Reports Server (NTRS)

    Creager, Colin M.; Jones, Lucas; Smith, Lauren M.

    2017-01-01

    Ascending steep slopes is often a very difficult challenge for off-road vehicles, whether on Earth or on extraterrestrial bodies. This challenge is even greater if the surface consists of loose granular soil that does not provide much shear strength. This study investigated how the path at which a vehicle traverses a slope, specifically the angle that it is commanded to drive relative to the base of the hill (the angle of attack), can affect its performance. A vehicle was driven in loose sand at slope angles up to 15 degrees and angles of attack ranging from 10 to 90 degrees. A novel photogrammetry technique was implemented to both track vehicle motion and create a three-dimensional profile of the terrain. This allowed for true wheel sinkage measurements. The study showed that though low angles of attack result in lower wheel slip and sinkage, the efficiency of the vehicles uphill motion increased at higher angles of attack. For slopes up to 15 degrees, a 90 degree angle of attack provided the greatest likelihood of successful ascent.

  5. Internet Attack Traceback: Cross-Validation and Pebble-Trace

    DTIC Science & Technology

    2013-02-28

    stolen-cyber-attack. [3] Hacked: Data breach costly for Ohio State, victims of compromised info http://www.thelantern.com/campus/hacked- data ... breach -costly-for-ohio-state-victims-of-compromised-info-1.1831311. [4] S. C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical

  6. Random Visitor: Defense against Identity Attacks in P2P Networks

    NASA Astrophysics Data System (ADS)

    Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  7. Attack Detection in Sensor Network Target Localization Systems With Quantized Data

    NASA Astrophysics Data System (ADS)

    Zhang, Jiangfan; Wang, Xiaodong; Blum, Rick S.; Kaplan, Lance M.

    2018-04-01

    We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location with a large mean-square-error. The attack is a combination of man-in-the-middle, hacking, and spoofing attacks that can effectively change both signals going into and coming out of the sensor nodes in a realistic manner. We show that the essential effect of attacks is to alter the estimated distance between the target and each attacked sensor to a different extent, giving rise to a geometric inconsistency among the attacked and unattacked sensors. Hence, with the help of two secure sensors, a class of detectors are proposed to detect the attacked sensors by scrutinizing the existence of the geometric inconsistency. We show that the false alarm and miss probabilities of the proposed detectors decrease exponentially as the number of measurement samples increases, which implies that for sufficiently large number of samples, the proposed detectors can identify the attacked and unattacked sensors with any required accuracy.

  8. Patterns of late spring frost leaf damage and recovery in a European beech (Fagus sylvatica L.) stand in south-eastern Germany based on repeated digital photographs

    PubMed Central

    Menzel, Annette; Helm, Raimund; Zang, Christian

    2015-01-01

    Damage by late spring frost is a risk deciduous trees have to cope with in order to optimize the length of their growing season. The timing of spring phenological development plays a crucial role, not only at the species level, but also at the population and individual level, since fresh new leaves are especially vulnerable. For the pronounced late spring frost in May 2011 in Germany, we studied the individual leaf development of 35 deciduous trees (mainly European beech Fagus sylvatica L.) at a mountainous forest site in the Bayerischer Wald National Park using repeated digital photographs. Analyses of the time series of greenness by a novel Bayesian multiple change point approach mostly revealed five change points which almost perfectly matched the expected break points in leaf development: (i) start of the first greening between day of the year (DOY) 108–119 (mean 113), (ii) end of greening, and (iii) visible frost damage after the frost on the night of May 3rd/4th (DOY 123/124), (iv) re-sprouting 19–38 days after the frost, and (v) full maturity around DOY 178 (166–184) when all beech crowns had fully recovered. Since frost damage was nearly 100%, individual susceptibility did not depend on the timing of first spring leaf unfolding. However, we could identify significant patterns in fitness linked to an earlier start of leaf unfolding. Those individuals that had an earlier start of greening during the first flushing period had a shorter period of recovery and started the second greening earlier. Thus, phenological timing triggered the speed of recovery from such an extreme event. The maximum greenness achieved, however, did not vary with leaf unfolding dates. Two mountain ashes (Sorbus aucuparia L.) were not affected by the low temperatures of -5°C. Time series analysis of webcam pictures can thus improve process-based knowledge and provide valuable insights into the link between phenological variation, late spring frost damage, and recovery within one

  9. Patterns of late spring frost leaf damage and recovery in a European beech (Fagus sylvatica L.) stand in south-eastern Germany based on repeated digital photographs.

    PubMed

    Menzel, Annette; Helm, Raimund; Zang, Christian

    2015-01-01

    Damage by late spring frost is a risk deciduous trees have to cope with in order to optimize the length of their growing season. The timing of spring phenological development plays a crucial role, not only at the species level, but also at the population and individual level, since fresh new leaves are especially vulnerable. For the pronounced late spring frost in May 2011 in Germany, we studied the individual leaf development of 35 deciduous trees (mainly European beech Fagus sylvatica L.) at a mountainous forest site in the Bayerischer Wald National Park using repeated digital photographs. Analyses of the time series of greenness by a novel Bayesian multiple change point approach mostly revealed five change points which almost perfectly matched the expected break points in leaf development: (i) start of the first greening between day of the year (DOY) 108-119 (mean 113), (ii) end of greening, and (iii) visible frost damage after the frost on the night of May 3rd/4th (DOY 123/124), (iv) re-sprouting 19-38 days after the frost, and (v) full maturity around DOY 178 (166-184) when all beech crowns had fully recovered. Since frost damage was nearly 100%, individual susceptibility did not depend on the timing of first spring leaf unfolding. However, we could identify significant patterns in fitness linked to an earlier start of leaf unfolding. Those individuals that had an earlier start of greening during the first flushing period had a shorter period of recovery and started the second greening earlier. Thus, phenological timing triggered the speed of recovery from such an extreme event. The maximum greenness achieved, however, did not vary with leaf unfolding dates. Two mountain ashes (Sorbus aucuparia L.) were not affected by the low temperatures of -5°C. Time series analysis of webcam pictures can thus improve process-based knowledge and provide valuable insights into the link between phenological variation, late spring frost damage, and recovery within one stand.

  10. Indocyanine green video angiography predicts outcome of extravasation injuries.

    PubMed

    Haslik, Werner; Pluschnig, Ursula; Steger, Günther G; Zielinski, Christoph C; Schrögendorfer, K F; Nedomansky, Jakob; Bartsch, Rupert; Mader, Robert M

    2014-01-01

    Extravasation of cytotoxic drugs is a serious complication of systemic cancer treatment. Still, a reliable method for early assessment of tissue damage and outcome prediction is missing. Here, we demonstrate that the evaluation of blood flow by indocyanine green (ICG) angiography in the extravasation area predicts for the need of surgical intervention. Twenty-nine patients were evaluated by ICG angiography after extravasation of vesicant or highly irritant cytotoxic drugs administered by peripheral i.v. infusion. Tissue perfusion as assessed by this standardized method was correlated with clinical outcome. The perfusion index at the site of extravasation differed significantly between patients with reversible tissue damage and thus healing under conservative management (N = 22) versus those who needed surgical intervention due to the development of necrosis (N = 7; P = 0.0001). Furthermore, in patients benefiting from conservative management, the perfusion index was significantly higher in the central extravasation area denoting hyperemia, when compared with the peripheral area (P = 0.0001). In this patient cohort, ICG angiography as indicator of local perfusion within the extravasation area was of prognostic value for tissue damage. ICG angiography could thus be used for the early identification of patients at risk for irreversible tissue damage after extravasation of cytotoxic drugs.

  11. Impact modeling and prediction of attacks on cyber targets

    NASA Astrophysics Data System (ADS)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  12. Facial injuries following hyena attack in rural eastern Ethiopia.

    PubMed

    Fell, M J; Ayalew, Y; McClenaghan, F C; McGurk, M

    2014-12-01

    Hyenas are effective hunters and will consider humans as potential prey if the need and opportunity arise. This study describes the circumstances of hyena attacks, the patterns of injuries sustained, and reconstruction in a resource-poor setting. As part of a charitable surgical mission to Ethiopia in 2012, 45 patients with facial deformities were reviewed, of whom four were victims of hyena attacks. A semi-structured interview was performed to ascertain the circumstances of the attack and the subsequent consequences. The age of the victims at the time of attack varied from 5 to 50 years. The attacks occurred when the victims were alone and vulnerable and took place in outdoor open spaces, during the evening or at night. The initial lunge was made to the facial area; if the jaws closed on the facial bones they were crushed, but in all cases the soft tissues were grasped and torn from the underlying bone. Reconstruction was dictated by the extent of soft tissue loss but could normally be obtained by use of local or regional flaps. Hyenas have been shown to attack humans in a predictable way and cause injuries that typically involve the soft tissues of the face. Copyright © 2014 International Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  13. Green Thunderstorms Observed.

    NASA Astrophysics Data System (ADS)

    Gallagher, Frank W., III; Beasley, William H.; Bohren, Craig F.

    1996-12-01

    Green thunderstorms have been observed from time to time in association with deep convection or severe weather events. Often the green coloration has been attributed to hail or to reflections of light from green foliage on the ground. Some skeptics who have not personally observed a green thunderstorm do not believe that green thunderstorms exist. They suggest that the green storms may be fabrications by excited observers. The authors have demonstrated the existence of green thunderstorms objectively using a spectrophotometer. During the spring and summer of 1995 the authors observed numerous storms and recorded hundreds of spectra of the light emanating corn these storms. It was found that the subjective judgment of colors can vary somewhat between observers, but the variation is usually in the shade of green. The authors recorded spectra of green and nongreen thunderstorms and recorded spectral measurements as a storm changed its appearance from dark blue to a bluish green. The change in color is gradual when observed from a stationary position. Also, as the light from a storm becomes greener, the luminance decreases. The authors also observed and recorded the spectrum of a thunderstorm during a period of several hours as they flew in an aircraft close to a supercell that appeared somewhat green. The authors' observations refute the ground reflection hypothesis and raise questions about explanations that require the presence of hail.

  14. Ordered Conformational Changes in Damaged DNA Induced by Nucleotide Excision Repair Factors*

    PubMed Central

    Tapias, Angels; Auriol, Jerome; Forget, Diane; Enzlin, Jacqueline H.; Schärer, Orlando D; Coin, Frederic; Coulombe, Benoit; Egly, Jean-Marc

    2015-01-01

    In response to genotoxic attacks, cells activate sophisticated DNA repair pathways such as nucleotide excision repair (NER), which consists of damage removal via dual incision and DNA resynthesis. Using permanganate footprinting as well as highly purified factors, we show that NER is a dynamic process that takes place in a number of successive steps during which the DNA is remodeled around the lesion in response to the various NER factors. XPC/HR23B first recognizes the damaged structure and initiates the opening of the helix from position −3 to +6. TFIIH is then recruited and, in the presence of ATP, extends the opening from position −6 to +6; it also displaces XPC downstream from the lesion, thereby providing the topological structure for recruiting XPA and RPA, which will enlarge the opening. Once targeted by XPG, the damaged DNA is further melted from position −19 to +8. XPG and XPF/ERCC1 endo-nucleases then cut the damaged DNA at the limit of the opened structure that was previously “labeled” by the positioning of XPC/HR23B and TFIIH. PMID:14981083

  15. Simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a Gaussian modulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, University Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex

    2010-06-15

    In this article, we give a simple proof of the fact that the optimal collective attacks against continuous-variable quantum key distribution with a Gaussian modulation are Gaussian attacks. Our proof, which makes use of symmetry properties of the protocol in phase space, is particularly relevant for the finite-key analysis of the protocol and therefore for practical applications.

  16. Cyber Security Audit and Attack Detection Toolkit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  17. Protective effects of Asian green vegetables against oxidant induced cytotoxicity

    PubMed Central

    Rose, Peter; Ong, Choon Nam; Whiteman, Matt

    2005-01-01

    AIM: To evaluate the antioxidant and phase II detoxification enzyme inducing ability of green leaf vegetables consumed in Asia. METHODS: The antioxidant properties of six commonly consumed Asian vegetables were determined using the ABTS, DPPH, deoxyribose, PR bleaching and iron- ascorbate induced lipid peroxidation assay. Induce of phase II detoxification enzymes was also determined for each respective vegetable extract. Protection against authentic ONOO- and HOCl mediated cytotoxicity in human colon HCT116 cells was determined using the MTT 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyl tetrasodium bromide) viability assay. RESULTS: All of the extracts derived from green leaf vegetables exhibited antioxidant properties, while also having cytoprotective effects against ONOO- and HOCl mediated cytotoxicity. In addition, evaluation of the phase II enzyme inducing ability of each extract, as assessed by quinone reductase and glutathione-S-transferase activities, showed significant variation between the vegetables analyzed. CONCLUSION: Green leaf vegetables are potential sources of antioxidants and phase II detoxification enzyme inducers in the Asian diet. It is likely that consumption of such vegetables is a major source of beneficial phytochemical constituents that may protect against colonic damage. PMID:16437686

  18. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    PubMed

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p < 0.05). Drop attacks were considered to be epileptic negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  19. Marital History and Survival after a Heart Attack

    PubMed Central

    Dupre, Matthew E.; Nelson, Alicia

    2016-01-01

    Heart disease is the leading cause of death in the United States and nearly one million Americans will have a heart attack this year. Although the risks associated with a heart attack are well established, we know surprisingly little about how marital factors contribute to survival in adults afflicted with heart disease. This study uses a life course perspective and longitudinal data from the Health and Retirement Study to examine how various dimensions of marital life influence survival in U.S. older adults who suffered a heart attack (n=2,197). We found that adults who were never married (odds ratio [OR]=1.73), currently divorced (OR=1.70), or widowed (OR=1.34) were at significantly greater risk of dying after a heart attack than adults who were continuously married; and the risks were not uniform over time. We also found that the risk of dying increased by 12% for every additional marital loss and decreased by 7% for every one-tenth increase in the proportion of years married. After accounting for more than a dozen socioeconomic, psychosocial, behavioral, and physiological factors, we found that current marital status remained the most robust indicator of survival following a heart attack. The implications of the findings are discussed in the context of life course inequalities in chronic disease and directions for future research. PMID:27770749

  20. Incidence and impact of dog attacks on guide dogs in the UK.

    PubMed

    Brooks, A; Moxon, R; England, G C W

    2010-06-19

    In a retrospective survey, researchers identified 100 incidents of attacks on guide dogs by other dogs. These were reviewed in order to determine the number, severity and impact on the handler and dog, and the characteristics of the aggressors and victims. During the study period there were more than three attacks reported each month, with 61 per cent of the attacks being upon dogs that were in harness and working with an owner or trainer. The majority of the dogs that were attacked were male (62 per cent), and the breeds that were over-represented (relative to their prevalence in the general guide dog population) were the labrador and the golden retriever x flat-coated retriever crossbreed. Most of the attacks occurred in public places between 09.00 and 15.00 and the majority (61 per cent) of the attacking dogs were off the lead at the time of the attack. Thirty-eight per cent of the attacking dogs were of bull breeds, which were over-represented among attackers compared with the proportion of this breed type in the general dog population. Veterinary attention was sought after 41 per cent of the attacks, and in 19 per cent of instances there was injury to the handler or to a member of the public. The attacks were reported to have affected the working performance and behaviour of the victim dog in 45 per cent of the instances, and two dogs had to be subsequently withdrawn from working as guide dogs.

  1. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  2. Novel Psychological Formulation and Treatment of "Tic Attacks" in Tourette Syndrome.

    PubMed

    Robinson, Sally; Hedderly, Tammy

    2016-01-01

    One important, but underreported, phenomenon in Tourette syndrome (TS) is the occurrence of "tic attacks." These episodes have been described at conferences as sudden bouts of tics and/or functional tic-like movements, lasting from 15 min to several hours. They have also been described by patients in online TS communities. To date, there are no reports of tic attacks in the literature. The aim of this article is to stimulate discussion and inform clinical practices by describing the clinical presentation of 12 children (mean age 11 years and 3 months; SD = 2 years and 4 months) with TS and tic attacks, with a detailed case report for one case (13-year-old male). These children commonly present acutely to casualty departments and undergo unnecessary medical investigations. Interestingly, all children reported comorbid anxiety, with worries about the tics themselves and an increased internal focus of attention on tics once the attacks had started. In keeping with other children, the index case reported a strong internal focus of attention, with a relationship between physiological sensations/tic urges, worries about having tic attacks, and behavioral responses (e.g., body scanning, situational avoidance, and other responses). In our experience, the attacks reduce with psychological therapy, for example, the index case attended 13 sessions of therapy that included metacognitive and attention training techniques, as well as cognitive-behavioral strategies. Following treatment, an improvement was seen across a range of measures assessing tics, mood, anxiety, and quality of life. Thus, psychological techniques used to treat anxiety disorders are effective at supporting a reduction in tic attacks through modifying attention, worry processes, and negative beliefs. It is hypothesized that an attentional style of threat monitoring, difficulties tolerating internal sensory urges, cognitive misattributions, and maladaptive coping strategies contribute to the

  3. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    ERIC Educational Resources Information Center

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  4. Surgical support during the terrorist attacks in Paris, November 13, 2015: Experience at Bégin Military Teaching Hospital.

    PubMed

    Barbier, Olivier; Malgras, Brice; Choufani, Camille; Bouchard, Antoine; Ollat, Didier; Versier, Gilbert

    2017-06-01

    Recent conflicts have allowed the French Army Health Service to improve management quality for wartime-injured people during military operations. On November 13, 2015, it was in Paris that France was directly attacked and Bégin Military Teaching Hospital, like several hospitals in Paris, had to face a large number of gunshot victims. Thanks to our operational experience, injured people hospitalized in military hospitals benefited from a management based on triage and damage control (DC) principles. Forty-five patients were taken care of in our hospital with an average age of 32 years. During triage, eight patients were categorized T1 (with four extreme emergencies) and 10 were classified T2 and 27 as T3. Twenty-two patients underwent emergency surgery, 15 for soft tissue lesions of limbs, 8 for ballistic fractures (one of which was a cervical wound), and 5 for abdominal wounds. Two patients classified T1 died early. In total, more than 50 operations were performed including iterative debridements, bone fixation, three amputations, and two flaps. After 9 months, all of the patients had healed. One woman with limb stiffness required an arthrolysis. This event showed that terrorist attacks and mass casualties with war wounds can occur in France. Acquired experience regarding war wounds by the French Army Health Service is precious. Everyone must understand the importance of triage and the principles of damage control. Every hospital must be ready to face this type of massive influx of injured people (white plan). Epidemiological study, level V.

  5. Green Chemistry at the present in Korea.

    PubMed

    Lee, Seung-Kyu; Park, Hyeon-Soo

    2015-01-01

    Despite the great contribution made by chemical substances to the development of modern civilization, their indiscriminate use has caused various kinds of damage to the global environment and human beings. Accordingly, the major developed countries and international society have tried to ensure the safe use of chemicals and a reduction in the use of hazardous chemicals through the establishment of the United Nations Environment Programme and various international agreements. In this reason, we tried to introduce about Green Chemistry progress at the present in worldwide and Korea. We checked and analyzed relative journals, reports using keyword as like Green Chemistry, alternative chemicals, eco-friendly etc. and major country's government homepage search. Green Chemistry theory, which argues for the reduction or removal of harmfulness in chemicals throughout their entire life-cycle, has been spreading, and major developed countries, such as the US and Denmark, have developed and operate programs to provide reliable chemical information to help replace hazardous chemicals. Korea has also been conducting studies as like eco-innovation project. Through this project the "Alternative Chemical Search program," has been developed, distributed, and operated since 2011 to provide reliable information to small and medium-sized businesses that have difficulties collecting information to ensure conformity to international regulations. The program provides information that includes the regulations of major countries and Korea, information on 340 alternative chemicals, 70 application cases, and 1:1 consulting. The Alternative Chemical Search program is expected to contribute to the establishment of response systems for regulation of Korean small and medium-sized businesses, and it also will be used to provide basic data for Korean hazardous chemical regulation, together with the Act on the Registration and Evaluation, etc. of Chemical Substances and the Chemical Control act

  6. Prediction of first episode of panic attack among white-collar workers.

    PubMed

    Watanabe, Akira; Nakao, Kazuhisa; Tokuyama, Madoka; Takeda, Masatoshi

    2005-04-01

    The purpose of the present study was to elucidate a longitudinal matrix of the etiology for first-episode panic attack among white-collar workers. A path model was designed for this purpose. A 5-year, open-cohort study was carried out in a Japanese company. To evaluate the risk factors associated with the onset of a first episode of panic attack, the odds ratios of a new episode of panic attack were calculated by logistic regression. The path model contained five predictor variables: gender difference, overprotection, neuroticism, lifetime history of major depression, and recent stressful life events. The logistic regression analysis indicated that a person with a lifetime history of major depression and recent stressful life events had a fivefold and a threefold higher risk of panic attacks at follow up, respectively. The path model for the prediction of a first episode of panic attack fitted the data well. However, this model presented low accountability for the variance in the ultimate dependent variables, the first episode of panic attack. Three predictors (neuroticism, lifetime history of major depression, and recent stressful life events) had a direct effect on the risk for a first episode of panic attack, whereas gender difference and overprotection had no direct effect. The present model could not fully predict first episodes of panic attack in white-collar workers. To make a path model for the prediction of the first episode of panic attack, other strong predictor variables, which were not surveyed in the present study, are needed. It is suggested that genetic variables are among the other strong predictor variables. A new path model containing genetic variables (e.g. family history etc.) will be needed to predict the first episode of panic attack.

  7. Hereditary angioedema: management of laryngeal attacks.

    PubMed

    Christiansen, Sandra C; Zuraw, Bruce L

    2011-01-01

    Hereditary angioedema (HAE) patients suffering from laryngeal attacks in the United States faced severely limited treatment options until 2008. These potentially life-threatening episodes occur in over one-half of the patients affected by HAE during their lifetimes. Acute therapy had been relegated to supportive care, intubation, and consideration of fresh frozen plasma (FFP)--the latter with the potential for actually accelerating the speed and severity of the swelling. In this article we will review the recently approved and emerging HAE treatments that have evolved from the recognition that bradykinin generation is the fundamental abnormality leading to attacks of angioedema. Acute therapy for laryngeal attacks will be discussed including purified plasma-derived C1 inhibitor (C1INH), recombinant C1INH, an inhibitor of plasma kallikrein (ecallantide), and a B2 receptor antagonist (icatibant). Prophylactic care has also been transformed from a reliance on attenuated androgens with their attendant side effects to C1INH replacement. The arrival of these novel therapies promises to transform the future management of HAE.

  8. An Investigation of Kernel Data Attacks and Countermeasures

    DTIC Science & Technology

    2017-02-14

    security impact of such an attack seem s minor, and thus, it h as not yet drawn much attention from the security community. In this project, we...of such an attack seems minor, and thus, it has not yet drawn much attention from the security community. In this project, we have thoroughly

  9. 'Heart attack' symptoms and decision-making: the case of older rural women.

    PubMed

    Jackson, M N G; McCulloch, B J

    2014-01-01

    analysis. The study showed that women had difficulty identifying heart attack symptoms when they did not have previous exposure to the symptoms either through personal experience or educational programs. Individuals incorrectly identified symptoms of a heart attack by associating symptoms with sleep problems, stroke, arthritis, stiffness in the neck, influenza, nerve damage, osteoporosis, bone cancer, tooth infection, and a pulled muscle. Misdiagnosis of symptoms most often led to a delay in seeking treatment in these women. Additionally, the women in this study discussed a reluctance to access care because of concerns related to maintaining their privacy, belief that the ambulance would take too long to reach them, and they did not want to bother their relatives for help. The findings of this study suggest implications for educational programs and interventions in rural environments and provide information that can facilitate better-informed communication between healthcare professionals and rural women.

  10. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information aboutmore » the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.« less

  11. Human behaviour can trigger large carnivore attacks in developed countries

    PubMed Central

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E.; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-01-01

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores. PMID:26838467

  12. Human behaviour can trigger large carnivore attacks in developed countries.

    PubMed

    Penteriani, Vincenzo; Delgado, María del Mar; Pinchera, Francesco; Naves, Javier; Fernández-Gil, Alberto; Kojola, Ilpo; Härkönen, Sauli; Norberg, Harri; Frank, Jens; Fedriani, José María; Sahlén, Veronica; Støen, Ole-Gunnar; Swenson, Jon E; Wabakken, Petter; Pellegrini, Mario; Herrero, Stephen; López-Bao, José Vicente

    2016-02-03

    The media and scientific literature are increasingly reporting an escalation of large carnivore attacks on humans in North America and Europe. Although rare compared to human fatalities by other wildlife, the media often overplay large carnivore attacks on humans, causing increased fear and negative attitudes towards coexisting with and conserving these species. Although large carnivore populations are generally increasing in developed countries, increased numbers are not solely responsible for the observed rise in the number of attacks by large carnivores. Here we show that an increasing number of people are involved in outdoor activities and, when doing so, some people engage in risk-enhancing behaviour that can increase the probability of a risky encounter and a potential attack. About half of the well-documented reported attacks have involved risk-enhancing human behaviours, the most common of which is leaving children unattended. Our study provides unique insight into the causes, and as a result the prevention, of large carnivore attacks on people. Prevention and information that can encourage appropriate human behaviour when sharing the landscape with large carnivores are of paramount importance to reduce both potentially fatal human-carnivore encounters and their consequences to large carnivores.

  13. Weak laws against acid attacks on women: an Indian perspective.

    PubMed

    Ahmad, Nehaluddin

    2012-01-01

    Acid attacks, especially on women, have seen an alarming growth in India over the last decade. While these attacks can be attributed to various factors such as the social weakness of women in a male-dominated society, the situation is exacerbated by the general neglect of the lawmakers. As acid is inexpensive and easily available, it serves as an ideal weapon for the perpetrators. Further, as this offence is bailable in certain situations, the punishment does not act as a sufficient deterrent in most cases. This paper describes the horrendous effects that acid attacks have on the victims physically, psychologically and socially. It also examines the contemporary laws governing acid attacks on victims and offenders. Ideas for a better legal approach will also be examined with special reference to acid attacks as a crime, and the validity of specific legal provisions for female victims.

  14. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Qin, Hao; Kumar, Rupesh; Alléaume, Romain

    2016-07-01

    We identify and study a security loophole in continuous-variable quantum key distribution (CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent-state CVQKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CVQKD. We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criterion imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible countermeasures against the saturation attack and propose a countermeasure based on Gaussian postselection that can be implemented by classical postprocessing and may allow one to distill the secret key when the raw measurement data are partly saturated.

  15. The influence of weather on migraine – are migraine attacks predictable?

    PubMed Central

    Hoffmann, Jan; Schirra, Tonio; Lo, Hendra; Neeb, Lars; Reuter, Uwe; Martus, Peter

    2015-01-01

    Objective The study aimed at elucidating a potential correlation between specific meteorological variables and the prevalence and intensity of migraine attacks as well as exploring a potential individual predictability of a migraine attack based on meteorological variables and their changes. Methods Attack prevalence and intensity of 100 migraineurs were correlated with atmospheric pressure, relative air humidity, and ambient temperature in 4-h intervals over 12 consecutive months. For each correlation, meteorological parameters at the time of the migraine attack as well as their variation within the preceding 24 h were analyzed. For migraineurs showing a positive correlation, logistic regression analysis was used to assess the predictability of a migraine attack based on meteorological information. Results In a subgroup of migraineurs, a significant weather sensitivity could be observed. In contrast, pooled analysis of all patients did not reveal a significant association. An individual prediction of a migraine attack based on meteorological data was not possible, mainly as a result of the small prevalence of attacks. Interpretation The results suggest that only a subgroup of migraineurs is sensitive to specific weather conditions. Our findings may provide an explanation as to why previous studies, which commonly rely on a pooled analysis, show inconclusive results. The lack of individual attack predictability indicates that the use of preventive measures based on meteorological conditions is not feasible. PMID:25642431

  16. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackerman, G; Abhayaratne, P; Bale, J

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CImore » facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a

  17. What does it mean to be green?

    PubMed

    Kleiner, A

    1991-01-01

    Today a company is not considered environmentalist unless it moves beyond mere compliance with government regulations to behavior its competitors, and even customers, do not expect. How should it set its agenda? Author Art Kleiner proposes that, to be green, a company must ask three questions: What products should we bring to market? How much disclosure of pollution information should we support? And how can we reduce waste at its source? These questions can't be answered, Kleiner says, unless managers insist on sustainable growth. In this sense, a big investment in environmentalism is like a big one in R&D--both presuppose patient capital and managerial maturity. What are green products? Kleiner cautions against giving in to misinformed public opinion--as McDonald's did in giving up its styrene "clamshells," which were more recyclable than the composite papers it switched to. Rather, companies should rely on literature that analyzes the product life cycle. As for public disclosure, the benefits may be unexpected. Federal legislation requiring companies to report the emission of potentially hazardous waste to a central data bank has not made environmentalists attack them. Rather, it has forced companies to learn what chemicals they inadvertently produce and how much--knowledge that helps them improve production processes. Sharing it helps ecological researchers study the combined effects of plant emissions. As for pollution prevention, Kleiner notes the analogy to quality and observes that it is better to design harmful waste products out of the system than catch them at the end of the line.(ABSTRACT TRUNCATED AT 250 WORDS)

  18. Kinetic Modeling of the X-ray-induced Damage to a Metalloprotein

    PubMed Central

    Davis, Katherine M.; Kosheleva, Irina; Henning, Robert W.; Seidler, Gerald T.; Pushkar, Yulia

    2013-01-01

    It is well known that biological samples undergo x-ray-induced degradation. One of the fastest occurring x-ray-induced processes involves redox modifications (reduction or oxidation) of redox-active cofactors in proteins. Here we analyze room temperature data on the photoreduction of Mn ions in the oxygen evolving complex (OEC) of photosystem II, one of the most radiation damage sensitive proteins and a key constituent of natural photosynthesis in plants, green algae and cyanobacteria. Time-resolved x-ray emission spectroscopy with wavelength-dispersive detection was used to collect data on the progression of x-ray-induced damage. A kinetic model was developed to fit experimental results, and the rate constant for the reduction of OEC MnIII/IV ions by solvated electrons was determined. From this model, the possible kinetics of x-ray-induced damage at variety of experimental conditions, such as different rates of dose deposition as well as different excitation wavelengths, can be inferred. We observed a trend of increasing dosage threshold prior to the onset of x-ray-induced damage with increasing rates of damage deposition. This trend suggests that experimentation with higher rates of dose deposition is beneficial for measurements of biological samples sensitive to radiation damage, particularly at pink beam and x-ray FEL sources. PMID:23815809

  19. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.

    PubMed

    Wang, Chundong; Zhu, Likun; Gong, Liangyi; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun

    2018-03-15

    With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.

  20. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information

    PubMed Central

    Wang, Chundong; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun

    2018-01-01

    With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks. PMID:29543773

  1. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    DOE PAGES

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-03-31

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less

  2. A decision framework for managing risk to airports from terrorist attack.

    PubMed

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. © 2014 Society for Risk Analysis.

  3. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less

  4. Effect of applying cinnamaldehyde incorporated in wax on green mould decay in citrus fruits.

    PubMed

    Duan, Xiaofang; OuYang, Qiuli; Tao, Nengguo

    2018-01-01

    Green mould caused by Penicillium digitatum is the most damaging postharvest diseases of citrus fruit. Cinnamaldehyde (CA) is a food additive that has potential use in controlling postharvest disease of fruits and vegetables. In this study, the effectiveness of wax with CA (WCA) in controlling Ponkan (Citrus reticulata Blanco) green mould was investigated. The mycelial growth of P. digitatum was inhibited by CA in a dose-dependent manner. The minimum inhibitory concentration and minimum fungicidal concentration (MFC) were both 0.50 mL L -1 . In vivo tests demonstrated that WCA (1 × and 10 × MFC) applied to Ponkan fruits inoculated with P. digitatum could significantly decrease the incidence of green mould for up to 5 days. The WCA treatment increased the activities of catalase, superoxide dismutase, peroxidase, phenylalanine ammonia lyase, polyphenol oxidase, as well as the total phenols and flavonoids contents. Meanwhile, the treatment remarkably decreased the weight loss rate of fruits and maintained fruit quality. These results indicated that WCA treatment might induce defence responses against green mould in citrus fruit. Our findings suggest that WCA might be a promising approach in controlling green mould of citrus fruits. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  5. Potential role of green tea catechins in the management of oxidative stress-associated infertility.

    PubMed

    Roychoudhury, Shubhadeep; Agarwal, Ashok; Virk, Gurpriya; Cho, Chak-Lam

    2017-05-01

    Reactive oxygen species (ROS) are present in low concentrations in the genital tracts of males and females. Excessive ROS lead to oxidative stress, which damages DNA, lipids and proteins. Such molecular changes result in compromised vitality, increased morphological defects and decreased sperm motility in the male. In the female, oxidative stress interferes with oocyte maturation, and may inhibit in-vitro maturation of the oocyte. Recently, green tea supplementation has been reported to possess properties that may improve the quality of male and female gametes largely due to the ability of catechin polyphenols to quench ROS. Epigallocatechin-3-gallate (EGCG) is considered the most promising bioactive compound in green tea due to its strong antioxidant activity. The unique property of green tea catechins may potentially improve reproductive health and pose an important research area. We present a comprehensive overview on the effects and potential roles of green tea catechins on oxidative stress in male and female reproduction and fertility. In this review, possible mechanisms of action are highlighted to better understand the potential use of green tea catechins in the reduction of oxidative stress and its associated beneficial effects in the clinical setting. Copyright © 2017 Reproductive Healthcare Ltd. Published by Elsevier Ltd. All rights reserved.

  6. Psychological distress and prejudice following terror attacks in France.

    PubMed

    Goodwin, Robin; Kaniasty, Krzysztof; Sun, Shaojing; Ben-Ezra, Menachem

    2017-08-01

    Terrorist attacks have the capacity to threaten our beliefs about the world, cause distress across populations and promote discrimination towards particular groups. We examined the impact of two different types of attacks in the same city and same year on psychological distress and probable posttraumatic stress symptoms, and the moderating effects of religion or media use on distress/posttraumatic symptoms and inter-group relations. Two panel surveys four weeks after the January 2015 Charlie Hebdo attack (N = 1981) and the November 2015 Bataclan concert hall/restaurant attacks (N = 1878), measured intrinsic religiosity, social and traditional media use, psychological distress (K6), probable posttraumatic stress symptoms (proposed ICD-11), symbolic racism and willingness to interact with Muslims by non-Muslims. Prevalence of serious mental illness (K6 score > 18) was higher after November 2015 attacks (7.0% after the first attack, 10.2% the second, χ2 (1) = 5.67, p < 0.02), as were probable posttraumatic stress symptoms (11.9% vs. 14.1%; χ2 (1) = 4.15, p < 0.04). In structural equation analyses, sex, age, geographic proximity, media use and religiosity were associated with distress, as was the interaction between event and religiosity. Distress was then associated with racism symbolism and willingness to interact with Muslims. Implications are considered for managing psychological trauma across populations, and protecting inter-group harmony. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Technosocial Modeling of IED Threat Scenarios and Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiationmore » of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.« less

  8. Sleep Deprivation Attack Detection in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  9. Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.

    PubMed

    Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H

    2010-06-01

    Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.

  10. Symptom Induction and De-escalation in the Treatment of Panic Attacks.

    ERIC Educational Resources Information Center

    Dattilio, Frank M.

    1990-01-01

    Describes technique known as symptom induction and de-escalation for panic attacks in which goal is to reproduce the type of situation that may precipitate an attack and then to show the client how the attacks can be "turned on" as well as "turned off." (ABL)

  11. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    NASA Astrophysics Data System (ADS)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  12. Korean immigrants' knowledge of heart attack symptoms and risk factors.

    PubMed

    Hwang, Seon Y; Ryan, Catherine J; Zerwic, Julie Johnson

    2008-02-01

    This study assessed the knowledge of heart attack symptoms and risk factors in a convenience sample of Korean immigrants. A total of 116 Korean immigrants in a Midwestern metropolitan area were recruited through Korean churches and markets. Knowledge was assessed using both open-ended questions and a structured questionnaire. Latent class cluster analysis and Chi-square tests were used to analyze the data. About 76% of the sample had at least one self-reported risk factor for cardiovascular disease. Using an open-ended question, the majority of subjects could only identify one symptom. In the structured questionnaire, subjects identified a mean of 5 out of 10 heart attack symptoms and a mean of 5 out of 9 heart attack risk factors. Latent class cluster analysis showed that subjects clustered into two groups for both risk factors and symptoms: a high knowledge group and a low knowledge group. Subjects who clustered into the risk factor low knowledge group (48%) were more likely than the risk factor high knowledge group to be older than 65 years, to have lower education, to not know to use 911 when a heart attack occurred, and to not have a family history of heart attack. Korean immigrants' knowledge of heart attack symptoms and risk factors was variable, ranging from high to very low. Education should be focused on those at highest risk for a heart attack, which includes the elderly and those with risk factors.

  13. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nichols, Jeff A.; Curtis, Laura

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary tomore » cause this response.« less

  14. Conservation biology: lion attacks on humans in Tanzania.

    PubMed

    Packer, Craig; Ikanda, Dennis; Kissui, Bernard; Kushnir, Hadas

    2005-08-18

    Large carnivores inspire opposition to conservation efforts owing to their impact on livestock and human safety. Here we analyse the pattern of lion attacks over the past 15 years on humans in Tanzania, which has the largest population of lions in Africa, and find that they have killed more than 563 Tanzanians since 1990 and injured at least 308. Attacks have increased dramatically during this time: they peak at harvest time each year and are most frequent in areas with few prey apart from bush pigs (Potamochoerus larvatus), the most common nocturnal crop pest. Our findings provide an important starting point for devising strategies to reduce the risk to rural Tanzanians of lion attacks.

  15. Green Power Partnership 100 Green Power Users

    EPA Pesticide Factsheets

    EPA's Green Power Partnership is a voluntary program designed to reduce the environmental impact of electricity generation by promoting renewable energy. Partners on this list use green power to meet 100 of their U.S. organization-wide electricity use.

  16. Green Design and Sustainable Development of School Uniforms

    NASA Astrophysics Data System (ADS)

    Cui, Yumei; Fang, Xuemeng; Zhou, Honglei

    2018-01-01

    Since the 1990s, the school uniform has gradually become an integral part of campus culture construction. A school uniform is not only an iconic symbol of students and a school, but also the carrier of campus culture, with special education function and cultural connotation. However in the same time, many problems exist in the design, making and material selection of school uniforms, in which, substandard fabric quality is the most serious problem. To ensure the quality, health and safety of school uniforms, in my opinion, priority should be given to green design and sustainable development in the design process of school uniforms, which will be more conducive to promoting the sound development of school uniforms. In today’s economic development, the globalization of mass production is no longer just a symbol of challenging the limits of human beings, but to explore the unlimited potential of human spiritual collaboration. If we want to have a better future on this planet, we need to completely redefine the key issue we need to address, that is, green design. The rise of green products is a great progress of human understanding and solving environmental problems. It is the inevitable development trend of commodity production, and will have a profound impact on human survival and development in the future. School uniform is an important part of campus culture construction. In order to not damage the health of primary and secondary school students, in the school uniform design and production process should follow the concept of “green design” to achieve the school uniform style, color, material design, a comprehensive “green” positioning.

  17. Major depressive disorder with anger attacks and cardiovascular risk factors.

    PubMed

    Fraguas, Renerio; Iosifescu, Dan V; Bankier, Bettina; Perlis, Roy; Clementi-Craven, Nicoletta; Alpert, Jonathan; Fava, Maurizio

    2007-01-01

    Depression and anger have been separately associated with cardiovascular risk factors. We investigated if major depressive disorder (MDD) with concomitant anger attacks was associated with cardiovascular risk factors. We measured total serum cholesterol, glycemia, resting blood pressure, and smoking parameters in 333 (52.9% women) MDD nonpsychotic outpatients, mean age of 39.4 years. MDD was diagnosed with the Structured Clinical Interview (SCID) in accordance with the Diagnostic and Statistic Manual of Mental Disorders, Third Edition, Revised (DSM-III-R). The presence of anger attacks was established with the Massachusetts General Hospital Anger Attacks Questionnaire. In a logistic regression analysis, anger attacks were independently associated with cholesterol levels > or = 200 mg/dL (odds ratio [OR], 2.16; 95% confidence interval [CI], 1.18-3.94) and years of smoking > 11 (OR, 2.59; 95% CI, 1.32-5.04). MDD with anger attacks was significantly associated with increased cholesterol levels and years of smoking.

  18. Pattern association--a key to recognition of shark attacks.

    PubMed

    Cirillo, G; James, H

    2004-12-01

    Investigation of a number of shark attacks in South Australian waters has lead to recognition of pattern similarities on equipment recovered from the scene of such attacks. Six cases are presented in which a common pattern of striations has been noted.

  19. Spectroscopic photoacoustics for assessing ischemic kidney damage

    NASA Astrophysics Data System (ADS)

    Berndl, Elizabeth S. L.; He, Xiaolin; Yuen, Darren A.; Kolios, Michael C.

    2018-02-01

    Ischemic reperfusion injuries (IRIs) are caused by return of blood to a tissue or organ after a period without oxygen or nutrients. Damage in the microvasculature causes an inflammatory response and heterogeneous scarring, which is associated with an increase in collagen in the extracellular matrix. Although most often associated with heart attacks and strokes, IRI also occurs when blood reperfuses a transplanted organ. Currently, monitoring for IRI is limited to biopsies, which are invasive and sample a limited area. In this work, we explored photoacoustic (PA) biomarkers of scarring. IRI events were induced in mice (n=2) by clamping the left renal artery, then re-establishing flow. At 53 days post-surgery, kidneys were saline perfused and cut in half laterally. One half was immediately imaged with a VevoX system (Fujifilm-VisualSonics, Toronto) in two near infrared ranges - 680 to 970 nm (NIR), and 1200 to 1350 nm (NIR II). The other half was decellularized and then imaged at NIR and NIR II. Regions of interest were manually identified and analyzed for each kidney. For both cellularized and decellularized samples, the PA signal ratio based on irradiation wavelengths of 715:930 nm was higher in damaged kidneys than for undamaged kidneys (p < 0.0001 for both). Damaged kidneys had ROIs with spectra indicating the presence of collagen in the NIR II range, while healthy kidneys did not. Collagen rich spectra were more apparent in decellularized kidneys, suggesting that in the cellularized samples, other components may be contributing to the signal. PA imaging using spectral ratios associated with collagen signatures may provide a non-invasive tool to determine areas of tissue damage due to IRIs.

  20. Marital history and survival after a heart attack.

    PubMed

    Dupre, Matthew E; Nelson, Alicia

    2016-12-01

    Heart disease is the leading cause of death in the United States and nearly one million Americans will have a heart attack this year. Although the risks associated with a heart attack are well established, we know surprisingly little about how marital factors contribute to survival in adults afflicted with heart disease. This study uses a life course perspective and longitudinal data from the Health and Retirement Study to examine how various dimensions of marital life influence survival in U.S. older adults who suffered a heart attack (n = 2197). We found that adults who were never married (odds ratio [OR] = 1.73), currently divorced (OR = 1.70), or widowed (OR = 1.34) were at significantly greater risk of dying after a heart attack than adults who were continuously married; and the risks were not uniform over time. We also found that the risk of dying increased by 12% for every additional marital loss and decreased by 7% for every one-tenth increase in the proportion of years married. After accounting for more than a dozen socioeconomic, psychosocial, behavioral, and physiological factors, we found that current marital status remained the most robust indicator of survival following a heart attack. The implications of the findings are discussed in the context of life course inequalities in chronic disease and directions for future research. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Green Chemistry Metrics with Special Reference to Green Analytical Chemistry.

    PubMed

    Tobiszewski, Marek; Marć, Mariusz; Gałuszka, Agnieszka; Namieśnik, Jacek

    2015-06-12

    The concept of green chemistry is widely recognized in chemical laboratories. To properly measure an environmental impact of chemical processes, dedicated assessment tools are required. This paper summarizes the current state of knowledge in the field of development of green chemistry and green analytical chemistry metrics. The diverse methods used for evaluation of the greenness of organic synthesis, such as eco-footprint, E-Factor, EATOS, and Eco-Scale are described. Both the well-established and recently developed green analytical chemistry metrics, including NEMI labeling and analytical Eco-scale, are presented. Additionally, this paper focuses on the possibility of the use of multivariate statistics in evaluation of environmental impact of analytical procedures. All the above metrics are compared and discussed in terms of their advantages and disadvantages. The current needs and future perspectives in green chemistry metrics are also discussed.

  2. Recovery of human remains after shark attack.

    PubMed

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  3. Improved Fake-State Attack to the Quantum Key Distribution Systems

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wang, Jian; Tang, Chao-jing

    2012-09-01

    It has been showed that most commercial quantum cryptosystems are vulnerable to the fake-state attacks, which employ the loophole that the avalanche photodiodes as single photon detectors still produce detection events in the linear mode. However, previous fake-state attacks may be easily prevented by either installing a watch dog or reconfiguring the dead-time assigning component. In this paper, we present a new technique to counteract the after-pulse effect ever enhanced by the fake-state attacks, in order to lower the quantum bit error rate. Obviously, it is more difficult to detect the presented attack scheme. Indeed, it contributes to promoting of implementing a secure quantum cryptosystem in real life.

  4. Practical security and privacy attacks against biometric hashing using sparse recovery

    NASA Astrophysics Data System (ADS)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  5. Serial agonistic attacks by greylag goose families, Anser anser, against the same opponent

    PubMed Central

    Scheiber, Isabella B.R.; Kotrschal, Kurt; Weiß, Brigitte M.

    2011-01-01

    It is known from primates that alliance partners may support each other’s interests in competition with others, for example, through repeated agonistic attacks against a particular individual. We examined serial aggressive interactions between greylag goose families and other flock members. We found that repeated attacks towards the same individual were common and that up to five serial attacks by family members followed an initial attack. Family size did not affect the frequency of such serial attacks. Juvenile geese evidently benefited most from active social support through serial attacks. About 60% of the juveniles’ lost primary interactions were subsequently reversed by another family member. This may be one of the reasons why juveniles rank higher in the social hierarchy than would be expected from their age and size alone. Losses in serial attacks predominantly occurred against other, presumably higher-ranking, family geese and ganders. We propose three major functions/consequences of serial attacks. Analogous to primates, serial attacks in greylag geese may serve to reinforce a losing experience of an opponent defeated in a preceding attack. On the side of the winning family, serial attacks may reinforce the experience of winning. Both winning and losing experiences are linked with physiological consequences in higher vertebrates, affecting the future social performance of winners or losers. Finally, serial attacks may signal the agonistic potential of a family to other flock members. This is supported by heart rate data, which indicate that greylags are competent to interpret third-party relationships. PMID:21984838

  6. Green and Red Fluorescent Dyes for Translational Applications in Imaging and Sensing Analytes: A Dual‐Color Flag

    PubMed Central

    Oliveira, Elisabete; Bértolo, Emilia; Núñez, Cristina; Pilla, Viviane; Santos, Hugo M.; Fernández‐Lodeiro, Javier; Fernández‐Lodeiro, Adrian; Djafari, Jamila; Capelo, José Luis

    2017-01-01

    Abstract Red and green are two of the most‐preferred colors from the entire chromatic spectrum, and red and green dyes are widely used in biochemistry, immunohistochemistry, immune‐staining, and nanochemistry applications. Selective dyes with green and red excitable chromophores can be used in biological environments, such as tissues and cells, and can be irradiated with visible light without cell damage. This critical review, covering a period of five years, provides an overview of the most‐relevant results on the use of red and green fluorescent dyes in the fields of bio‐, chemo‐ and nanoscience. The review focuses on fluorescent dyes containing chromophores such as fluorescein, rhodamine, cyanine, boron–dipyrromethene (BODIPY), 7‐nitobenz‐2‐oxa‐1,3‐diazole‐4‐yl, naphthalimide, acridine orange, perylene diimides, coumarins, rosamine, Nile red, naphthalene diimide, distyrylpyridinium, benzophosphole P‐oxide, benzoresorufins, and tetrapyrrolic macrocycles. Metal complexes and nanomaterials with these dyes are also discussed. PMID:29318095

  7. Panic Attacks and Panic Disorder in the American Indian Community

    PubMed Central

    Sawchuk, Craig N.; Roy-Byrne, Peter; Noonan, Carolyn; Craner, Julia R.; Goldberg, Jack; Manson, Spero; Buchwald, Dedra

    2016-01-01

    Panic disorder is a common mental health condition, but little is known about panic disorder in non-Caucasian populations. The purpose of this study is to describe the epidemiology, clinical features, and comorbidities of panic attacks and panic disorder in two large American Indian (AI) tribes (N = 3,084). A culturally-adapted version of the Composite International Diagnostic Interview assessed panic attacks, panic disorder, and various psychiatric comorbidities. After adjusting for age, gender, and tribe, linear and logistic regression analyses were conducted to compare AIs with panic disorder to those with panic attacks only on clinical characteristics and panic symptoms. Approximately 8.5% (N = 234) of American Indians reported a lifetime history of panic attacks. Among individuals with panic attacks, comorbid posttraumatic stress disorder was higher in females (p = 0.03) and comorbid alcohol-related disorders were higher in males (p ≤ 0.001). The prevalence and clinical features of panic attacks and panic disorder in American Indians were similar to epidemiologic studies with majority populations. However, in contrast to earlier research, panic symptoms were similar in both males and females, and different patterns of comorbidity emerged. Future research should examine the availability and accessibility of evidence-based panic treatments for this traditionally underserved population. PMID:27720578

  8. Panic attacks and panic disorder in the American Indian community.

    PubMed

    Sawchuk, Craig N; Roy-Byrne, Peter; Noonan, Carolyn; Craner, Julia R; Goldberg, Jack; Manson, Spero; Buchwald, Dedra

    2017-05-01

    Panic disorder is a common mental health condition, but little is known about panic disorder in non-Caucasian populations. The purpose of this study is to describe the epidemiology, clinical features, and comorbidities of panic attacks and panic disorder in two large American Indian (AI) tribes (N=3084). A culturally-adapted version of the Composite International Diagnostic Interview assessed panic attacks, panic disorder, and various psychiatric comorbidities. After adjusting for age, gender, and tribe, linear and logistic regression analyses were conducted to compare AIs with panic disorder to those with panic attacks only on clinical characteristics and panic symptoms. Approximately 8.5% (N=234) of American Indians reported a lifetime history of panic attacks. Among individuals with panic attacks, comorbid posttraumatic stress disorder was higher in females (p=0.03) and comorbid alcohol-related disorders were higher in males (p≤0.001). The prevalence and clinical features of panic attacks and panic disorder in American Indians were similar to epidemiologic studies with majority populations. However, in contrast to earlier research, panic symptoms were similar in both males and females, and different patterns of comorbidity emerged. Future research should examine the availability and accessibility of evidence-based panic treatments for this traditionally underserved population. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. The maul of the wild. Animal attacks can produce significant trauma.

    PubMed

    Conrad, L

    1994-03-01

    Wild-animal attacks are almost an anachronism in our day and age. They remind us that humans can still be food or prey. Cougar attacks, though rare, produce significant trauma. Characteristic patterns of injury and wound infection should be appropriately identified and treated. As we protect wild-animal species and acknowledge their right to share territory, interactions--and possibly attacks--are likely to increase. Awareness, education, knowledge and prevention, rather than the elimination of animal populations, may be the best way to control wild-animal attacks on humans in the future.

  10. Fallout risk following a major nuclear attack on the United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harvey, T.F.; Shapiro, C.S.; Wittler, R.F.

    Fallout distributions are calculated for nuclear attacks on the contiguous United States. Four attack scenarios are treated, including counterforce and counterforce-countervalue attacks, for meteorological conditions associated with a typical day in summer and one in winter. The countervalue attacks contain mostly airbursts. To determine fallout effects, the population surviving the prompt effects is first calculated. For the prompt effects, a 'conflagration-type' model is used. The counterforce attack produces about 8 million prompt deaths, and the counterforce-countervalue case projects 98 million prompt deaths. Partial relocation before attack to low-risk fallout areas at least 15 km from potential strategic targets would resultmore » in a decrease in projections of deaths by tens of millions. For fallout risk calculations, only the dose received in the first 48 h (the early or local fallout) is considered. Populations are assumed to be sheltered, with a shelter protection factor profile that varies for a large urban area, a small urban area, or a rural area. With these profiles, without relocation, the fallout fatalities for all four attack scenarios are calculated to be less than one million people. This can be compared to fallout fatalities of about 10 million for a hypothetical unsheltered 'phantom' population.« less

  11. Fallout risk following a major nuclear attack on the United States.

    PubMed

    Harvey, T F; Shapiro, C S; Wittler, R F

    1992-01-01

    Fallout distributions are calculated for nuclear attacks on the contiguous United States. Four attack scenarios are treated, including counterforce and counterforce-countervalue attacks, for meteorological conditions associated with a typical day in summer and one in winter. The countervalue attacks contain mostly airbursts. To determine fallout effects, the population surviving the prompt effects is first calculated. For the prompt effects, a "conflagration-type" model is used. The counterforce attack produces about 8 million prompt deaths, and the counterforce-countervalue case projects 98 million prompt deaths. Partial relocation before attack to low-risk fallout areas at least 15 km from potential strategic targets would result in a decrease in projections of deaths by tens of millions. For fallout risk calculations, only the dose received in the first 48 h (the early or local fallout) is considered. Populations are assumed to be sheltered, with a shelter protection factor profile that varies for a large urban area, a small urban area, or a rural area. With these profiles, without relocation, the fallout fatalities for all four attack scenarios are calculated to be less than one million people. This can be compared to fallout fatalities of about 10 million for a hypothetical unsheltered "phantom" population.

  12. Develop a solution for protecting and securing enterprise networks from malicious attacks

    NASA Astrophysics Data System (ADS)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  13. Decon Green (trademark)

    DTIC Science & Technology

    2004-11-17

    Bacillus stearothermophilus spores, a species considered extremely resistant to peroxide sterilants . As seen for Decon GreenTM Classic, New Decon...Additional data is given for Bacillus anthracis and Bacillus stearothermophilus demonstrating that Decon GreenTM is also effective against bio...GreenTM retains excellent bio decon efficacy. TABLE 4. Decontamination of Bacillus stearothermophilus by New Decon GreenTM Challenge CFU Recovered

  14. Spear Phishing Attack Detection

    DTIC Science & Technology

    2011-03-24

    the insider amongst senior leaders of an organization [Mes08], the undercover detective within a drug cartel, or the classic secret agent planted in...to a mimicry attack that shapes the embedded malware to have a statistical distribution similar to "normal" or benign behavior. 2.3.1.3

  15. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    NASA Astrophysics Data System (ADS)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  16. Understanding public confidence in government to prevent terrorist attacks.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered tomore » small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.« less

  17. Internet-based information-seeking behavior for transient ischemic attack.

    PubMed

    Abedi, Vida; Mbaye, Marieme; Tsivgoulis, Georgios; Male, Shailesh; Goyal, Nitin; Alexandrov, Andrei V; Zand, Ramin

    2015-12-01

    In recent years, Internet became an increasingly important tool for accessing health information and is being used more frequently to promote public health. To use Google search data to explore information seeking behavior for transient ischemic attack. We selected two groups of keywords related to transient ischemic attack: 'Transient Ischemic Attack' and 'Mini Stroke'. We obtained all available online search data performed in the United States from the Google search engine for a 10-year span--January 2004 to December 2013. The monthly and daily search data for the selected keywords were analyzed--using moving average--to explore the trends, peaks, and declining effects. There were three significant concurrent peaks in the Google search data for the selected keywords. Each peak was directly associated with media coverage and news headlines related to the incident of transient ischemic attack in a public figure. Following each event, it took three- to seven-days for the search trend to return to its respective average value. Furthermore, the trend was steady for 'Transient Ischemic Attack'; however, the search interest for the keyword 'Mini Stroke' shows a steady increase. The overall search interest for the selected keywords was significantly higher in the southeastern United States. Our study shows that changes in online search behavior can be associated with media coverage of key events (in our case transient ischemic attack) in public figures. These findings suggest that multimedia health promotion campaigns might be more effective, if increased promptly after similar media coverage. © 2015 World Stroke Organization.

  18. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  19. Evaluation of antifungal activity of carbonate and bicarbonate salts alone or in combination with biocontrol agents in control of citrus green mold.

    PubMed

    Zamani, M; Sharifi Tehrani, A; Ali Abadi, A Alizadeh

    2007-01-01

    The aim of this research was to determine if the attacks of green mold on orange could be reduced by edible salts alone or in combination with biocontrol agent. For this purpose toxicity to Pantoea digitatum and practical use of sodium carbonate (SC), sodium bicarbonate (SBC) and potassium carbonate, and potassium bicarbonate alone or in combination with antagonistic bacteria (Pseudomonas fluorescens isolate PN, Bacillus subtilis isolate VHN, Pantoea agglomerans isolate CA) to control green mold were determined. All were fungistatic. SC and SBC were equal and superior to the other salts for control of green mold on oranges inoculated 6h before treatment and were chosen for subsequent trails under cold storage conditions. The biocontrol agents were found completely tolerant to 3% sodium bicarbonate and sodium carbonate at room temperature; although their culturability was reduced by > 1000-fold after 60 min in 1% other salt solutions. Satisfactory results were also obtained with the combined treatment for control of green mold. A significant increase in biocontrol activity of all isolate was observed when combined with sodium carbonate and sodium bicarbonate. The treatments comprising CA combined with SB was as effective as fungicide treatment. Thus, use of sodium bicarbonate treatment at 3% followed by the antagonist P. agglomerans CA could be an alternative to chemical fungicides for control of green mold on oranges.

  20. Panic Attacks and Panic Disorder

    MedlinePlus

    ... triggers severe physical reactions when there is no real danger or apparent cause. Panic attacks can be ... a loved one A traumatic event, such as sexual assault or a serious accident Major changes in your ...

  1. An Exploration of Hypotheses that Explain Herbivore and Pathogen Attack in Restored Plant Communities

    PubMed Central

    Blaisdell, G. Kai; Roy, Bitty A.; Pfeifer-Meister, Laurel; Bridgham, Scott D.

    2015-01-01

    Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to increased attack on one host species due to transmission from another host species, or enemy dilution may lead to reduced attack on a host that would otherwise have more attack, (iv) physical characteristics of the plant community may influence attack, and (v) plant vigor may affect attack. Restoration experiments with replicated plant communities provide an exceptional opportunity to explore these hypotheses. To explore the relative predictive strengths of these related hypotheses and to investigate the potential effect of several restoration site preparation techniques, we surveyed arthropod herbivore and fungal pathogen attack on the six most common native plant species in a restoration experiment. Multi-model inference revealed a weak but consistent negative correlation with pathogen attack and host diversity across the plant community, and no correlation between herbivory and host diversity. Our analyses also revealed host species-specific relationships between attack and abundance of the target host species, other native plant species, introduced plant species, and physical community characteristics. We found no relationship between enemy attack and plant vigor. We found minimal differences in plant community composition among several diverse site preparation techniques, and limited effects of site preparation techniques on attack. The strongest associations of community characteristics with attack varied among plant species with no community-wide patterns, suggesting that no single hypothesis successfully predicts the dominant community-wide trends in enemy attack. PMID:25699672

  2. A Cyber-Attack Detection Model Based on Multivariate Analyses

    NASA Astrophysics Data System (ADS)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.

  3. Robust allocation of a defensive budget considering an attacker's private information.

    PubMed

    Nikoofal, Mohammad E; Zhuang, Jun

    2012-05-01

    Attackers' private information is one of the main issues in defensive resource allocation games in homeland security. The outcome of a defense resource allocation decision critically depends on the accuracy of estimations about the attacker's attributes. However, terrorists' goals may be unknown to the defender, necessitating robust decisions by the defender. This article develops a robust-optimization game-theoretical model for identifying optimal defense resource allocation strategies for a rational defender facing a strategic attacker while the attacker's valuation of targets, being the most critical attribute of the attacker, is unknown but belongs to bounded distribution-free intervals. To our best knowledge, no previous research has applied robust optimization in homeland security resource allocation when uncertainty is defined in bounded distribution-free intervals. The key features of our model include (1) modeling uncertainty in attackers' attributes, where uncertainty is characterized by bounded intervals; (2) finding the robust-optimization equilibrium for the defender using concepts dealing with budget of uncertainty and price of robustness; and (3) applying the proposed model to real data. © 2011 Society for Risk Analysis.

  4. Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks

    PubMed Central

    Chen, Xi; Zhu, Yuefei

    2017-01-01

    Network address shuffling is a novel moving target defense (MTD) that invalidates the address information collected by the attacker by dynamically changing or remapping the host’s network addresses. However, most network address shuffling methods are limited by the limited address space and rely on the host’s static domain name to map to its dynamic address; therefore these methods cannot effectively defend against random scanning attacks, and cannot defend against an attacker who knows the target’s domain name. In this paper, we propose a network defense method based on random domain name and address mutation (RDAM), which increases the scanning space of the attacker through a dynamic domain name method and reduces the probability that a host will be hit by an attacker scanning IP addresses using the domain name system (DNS) query list and the time window methods. Theoretical analysis and experimental results show that RDAM can defend against scanning attacks and worm propagation more effectively than general network address shuffling methods, while introducing an acceptable operational overhead. PMID:28489910

  5. Topical application of green and white tea extracts provides protection from solar-simulated ultraviolet light in human skin.

    PubMed

    Camouse, Melissa M; Domingo, Diana Santo; Swain, Freddie R; Conrad, Edward P; Matsui, Mary S; Maes, Daniel; Declercq, Lieve; Cooper, Kevin D; Stevens, Seth R; Baron, Elma D

    2009-06-01

    Tea polyphenols have been found to exert beneficial effects on the skin via their antioxidant properties. We sought to determine whether topical application of green tea or white tea extracts would prevent simulated solar radiation-induced oxidative damages to DNA and Langerhans cells that may lead to immune suppression and carcinogenesis. Skin samples were analysed from volunteers or skin explants treated with white tea or green tea after UV irradiation. In another group of patients, the in vivo immune protective effects of green and white tea were evaluated using contact hypersensitivity to dinitrochlorobenzene. Topical application of green and white tea offered protection against detrimental effects of UV on cutaneous immunity. Such protection is not because of direct UV absorption or sunscreen effects as both products showed a sun protection factor of 1. There was no significant difference in the levels of protection afforded by the two agents. Hence, both green tea and white tea are potential photoprotective agents that may be used in conjunction with established methods of sun protection.

  6. Classifier fusion for VoIP attacks classification

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Rezac, Filip

    2017-05-01

    SIP is one of the most successful protocols in the field of IP telephony communication. It establishes and manages VoIP calls. As the number of SIP implementation rises, we can expect a higher number of attacks on the communication system in the near future. This work aims at malicious SIP traffic classification. A number of various machine learning algorithms have been developed for attack classification. The paper presents a comparison of current research and the use of classifier fusion method leading to a potential decrease in classification error rate. Use of classifier combination makes a more robust solution without difficulties that may affect single algorithms. Different voting schemes, combination rules, and classifiers are discussed to improve the overall performance. All classifiers have been trained on real malicious traffic. The concept of traffic monitoring depends on the network of honeypot nodes. These honeypots run in several networks spread in different locations. Separation of honeypots allows us to gain an independent and trustworthy attack information.

  7. Bio-inspired diversity for increasing attacker workload

    NASA Astrophysics Data System (ADS)

    Kuhn, Stephen

    2014-05-01

    Much of the traffic in modern computer networks is conducted between clients and servers, rather than client-toclient. As a result, servers represent a high-value target for collection and analysis of network traffic. As they reside at a single network location (i.e. IP/MAC address) for long periods of time. Servers present a static target for surveillance, and a unique opportunity to observe the network traffic. Although servers present a heightened value for attackers, the security community as a whole has shifted more towards protecting clients in recent years leaving a gap in coverage. In addition, servers typically remain active on networks for years, potentially decades. This paper builds on previous work that demonstrated a proof of concept leveraging existing technology for increasing attacker workload. Here we present our clean slate approach to increasing attacker workload through a novel hypervisor and micro-kernel, utilizing next generation virtualization technology to create synthetic diversity of the server's presence including the hardware components.

  8. [Acute asthma attacks introduced by anesthesia before nasal endoscopic surgery].

    PubMed

    Lü, Xiaofei; Han, Demin; Zhou, Bing; Ding, Bin

    2004-05-01

    In order to pay our attention to the perioperative treatment before nasal endoscopic surgery. Three patients with asthma accompanied chronic sinusitis were analyzed systemically, who had undergone acute attacks of asthma introduced by anesthesia. Anesthetic drugs and instruments can lead to acute attacks of asthma, because sinusitis with asthma means allergic airway inflammation, broncho-hyperreactivity and lower compensatory pulmonary function. Then all of the 3 cases had missed the preoperative treatment. Anesthetic drugs and instruments can lead to acute attacks of asthma. The perioperative treatment before nasal endoscopic surgery is very important for the prevention of the occurrences of this severe complication. Except emergency, the operation should be can celled for avoiding the acute attack of asthma introduced by anesthesia.

  9. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    PubMed

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2017-05-01

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  10. Phenomenology of panic attacks: a descriptive study of panic disorder patients' self-reports.

    PubMed

    Aronson, T A; Logue, C M

    1988-01-01

    The phenomenology of panic disorder and panic attacks was systematically assessed in 46 consecutive patients. The results suggest that DSM-III criteria include several symptoms that are not frequently present during a panic attack and that DSM-III's characterization of a panic attack is imprecise and misleading. Panic attacks were found to vary in intensity, frequency, spontaneity, and associated symptoms. A panic attack typically presents as a unified symptom complex of psychic anxiety and multiple somatic symptoms in multiple body systems. It occurs in a crescendolike pattern, is self-limited, and often leaves the subject weak or shaken. The temporal course as much as the symptomatic presentation defines a panic attack.

  11. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may helpmore » address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-system’s state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.« less

  12. Factors influencing care seeking for a self-defined worst panic attack.

    PubMed

    Katerndahl, David A

    2002-04-01

    Only 60 percent of persons who experience panic attacks seek treatment for them, many at the emergency department. The author documented care-seeking behaviors among persons living in the community who had experienced panic attacks and studied determinants of care seeking. In-depth structured interviews were conducted with 97 randomly selected community-dwelling adults who met DSM-III-R criteria for panic attacks. Participants were asked whether they had contemplated using or had actually used medical, alternative, and family sources of care when they had experienced their worst attack. Seventy-seven participants (79 percent) had considered using a general medical or mental health site when they experienced their worst attack. Of these, 50 (52 percent) had actually used such a site. General medical sites were contemplated more often (72 percent of participants) than mental health sites (27 percent), particularly emergency departments (43 percent) and family physicians' offices (34 percent). Other sources, such as friends or family members, alternative sites, and self-treatment, were contemplated less often. Once contemplated, certain sources were readily used, such as ambulances, family members, and self-treatment. Several factors were significantly associated with whether a person contemplated seeking care: access or barriers to treatment, perception of symptoms and of the reasons for the panic attack, and family-related variables. Contemplation and use of a mental health site after a panic attack was rare among the participants in this study. Further study of determinants of care seeking may help explain why persons who experience panic attacks fail to seek treatment or seek treatment from non-mental health sources.

  13. Testing Silica Fume-Based Concrete Composites under Chemical and Microbiological Sulfate Attacks

    PubMed Central

    Estokova, Adriana; Kovalcikova, Martina; Luptakova, Alena; Prascakova, Maria

    2016-01-01

    Current design practices based on descriptive approaches to concrete specification may not be appropriate for the management of aggressive environments. In this study, the durability of cement-based materials with and without the addition of silica fume, subjected to conditions that leach calcium and silicon, were investigated. Chemical corrosion was simulated by employing various H2SO4 and MgSO4 solutions, and biological corrosion was simulated using Acidithiobacillus sp. bacterial inoculation, leading to disrupted and damaged surfaces; the samples’ mass changes were studied following both chemical and biological attacks. Different leaching trends were observed via X-ray fluorescence when comparing chemical with biological leaching. Lower leaching rates were found for concrete samples fortified with silica fume than those without silica fume. X-ray diffraction and scanning electron microscopy confirmed a massive sulfate precipitate formation on the concrete surface due to bacterial exposure. PMID:28773452

  14. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    ERIC Educational Resources Information Center

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  15. Effects of low dose pre-irradiation on hepatic damage and genetic material damage caused by cyclophosphamide.

    PubMed

    Yu, H-S; Song, A-Q; Liu, N; Wang, H

    2014-01-01

    Cyclophosphamide (CTX) can attack tumour cells, but can also damage the other cells and microstructures of an organism at different levels, such as haematopoietic cells, liver cells, peripheral lymphocyte DNA, and genetic materials. Low dose radiation (LDR) can induce general adaptation reaction. In this study, we explore the effects of low dose radiation on hepatic damage and genetic material damage caused by CTX. Mice were implanted subcutaneously with S180 cells in the left groin (control group excluded). On days 8 and 11, mice of the LDR and LDR+CTX groups were given 75 mGy of whole-body γ-irradiation; whereas mice of the CTX and LDR+CTX groups were injected intraperitoneally with 3.0 mg of CTX. All mice were sacrificed on day 13. DNA damage of the peripheral lymphocytes, alanine aminotransferase (ALT) activity, total protein (TP), albumin (ALB) of the plasma, malonyl-dialdheyde (MDA) content, superoxide dismutase (SOD) and glutathione peroxidase (GSH-PX) activity of the hepatic homogenate, and micronucleus frequency (MNF) of polychromatoerythrocytes in the bone marrow were analysed. The control group had the lowest MDA content and the highest SOD and GSH-PX activity, whereas the CTX group had the highest MDA content and the lowest SOD and GSH-PX activity. Compared with the CTX group, the MDA content decreased significantly (p < 0.01) and the SOD and GSH-PX activity increased significantly (p < 0.05) in the LDR+CTX group. TP and ALB in control group were higher than that of the other groups. Compared with the sham-irradiated group, TP and ALB in the LDR group elevated significantly (p < 0.05). The control group had the lightest DNA damage, whereas the CTX group had the severest. DNA damage in LDR+CTX group was much lighter compared with that of the CTX group (p < 0.05). MNF in the CTX group increased significantly compared with the control and the sham-irradiated groups (p < 0.01). Compared with the CTX group, MNF in LDR+CTX group had a tendency of decline

  16. The Spatial and Temporal Patterns of Insurgent Attacks

    DTIC Science & Technology

    2014-06-13

    INTRODUCTION We must not rely on changing the hearts and minds of terrorists. The motivation for terrorism results from long-term social, cultural and...psychological pressures, which are difficult to alter. But motivation is only part of the formula for terrorism. The other is opportunity for attack that...terrorists; motivation and opportunity reduction brings more immediate protection. In any case, easy opportunities encourage terrorists to attack

  17. A Study on the Rural Residence in the Northern Area of Zhejiang Province from the Perspective of Green Living Environment

    NASA Astrophysics Data System (ADS)

    Wang, J.; Gao, W. J.; Wang, C.

    2018-05-01

    At present, owing to the rapid development of rural construction, it lacks corresponding theories and practices and damages to the features of rural area, ignoring the geography, suitability and green living environment factors. The research selects rural residence as the object, defining “courtyard” as the basic unit for rural residence. It utilizes the principle of topology as the expanding media, by the method of principle of cellular structure and green living environment design strategy. The essay establishes the design and construction system of “rural basic unit”, combining functions and structures, prototype menu, chamber space and compound interface, from the perspective of green living environment. It aims to guide rural construction and protect the ruralliving environment.

  18. Prediction of the noise from a propeller at angle of attack

    NASA Technical Reports Server (NTRS)

    Krejsa, Eugene A.

    1990-01-01

    An analysis is presented to predict the noise of a propeller at angle of attack. The analysis is an extension of that reported by Mani which predicted the change in noise due to angle of attack to both unsteady loading and to azimuthal variation of the radiation efficiency of steady noise sources. Mani's analysis, however, was limited to small angles of attack. The analysis reported herein removes this small angle limitation. Results from the analysis are compared with the data of Woodward for a single rotation propeller and a counter rotating propeller. The comparison shows that including the effect of angle of attack on the steady noise sources significantly improves the agreement with data. Including higher order effects of angle of attack, while changing the predicted noise at far forward and aft angles, has little effect near the propeller plane.

  19. Structural differences in interictal migraine attack after epilepsy: A diffusion tensor imaging analysis.

    PubMed

    Huang, Qi; Lv, Xin; He, Yushuang; Wei, Xing; Ma, Meigang; Liao, Yuhan; Qin, Chao; Wu, Yuan

    2017-12-01

    Patients with epilepsy (PWE) are more likely to suffer from migraine attack, and aberrant white matter (WM) organization may be the mechanism underlying this phenomenon. This study aimed to use diffusion tensor imaging (DTI) technique to quantify WM structural differences in PWE with interictal migraine. Diffusion tensor imaging data were acquired in 13 PWE with migraine and 12 PWE without migraine. Diffusion metrics were analyzed using tract-atlas-based spatial statistics analysis. Atlas-based and tract-based spatial statistical analyses were conducted for robustness analysis. Correlation was explored between altered DTI metrics and clinical parameters. The main results are as follows: (i) Axonal damage plays a key role in PWE with interictal migraine. (ii) Significant diffusing alterations included higher fractional anisotropy (FA) in the fornix, higher mean diffusivity (MD) in the middle cerebellar peduncle (CP), left superior CP, and right uncinate fasciculus, and higher axial diffusivity (AD) in the middle CP and right medial lemniscus. (iii) Diffusion tensor imaging metrics has the tendency of correlation with seizure/migraine type and duration. Results indicate that characteristic structural impairments exist in PWE with interictal migraine. Epilepsy may contribute to migraine by altering WMs in the brain stem. White matter tracts in the fornix and right uncinate fasciculus also mediate migraine after epilepsy. This finding may improve our understanding of the pathological mechanisms underlying migraine attack after epilepsy. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…